Patent classifications
G06Q20/38215
Authentication decision engine for real-time resource transfer
Systems, computer program products, and methods are described herein for authentication decision engine for real-time resource transfer. The present invention is configured to electronically receive, from a computing device associated with a user, a resource distribution request at a first time; generate a notification on a computing device associated with a resource distribution source; dynamically generate a first resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the user to display the first resource authentication code to the user; dynamically generate a second resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the resource distribution source to display the second resource authentication code to the resource distribution source; initiate an execution of the resource distribution request at a second time
Method for the encryption of payment means data, corresponding payment means, server and programs
A method for encrypting a piece of payment means data is disclosed. This method is implemented by a payment means having a data processor. Such a method has at least one iteration of the following steps: obtaining a current piece of payment means data from a memory of the payment means; generating a following piece of payment means data as a function of the current piece of payment means data and as a function of an encryption key of the payment means; replacing the current piece of payment means data by the following piece of payment means data within the memory of the payment means.
SECURE RESOURCE MANAGEMENT TO PREVENT FRAUDULENT RESOURCE ACCESS
Systems and methods for secure resource management are provided. A secure resource management system includes a resource record repository, such as a secure database or a blockchain, for storing resource records for resources. The resource records contain information of resource providers, information of resource users having a right to obtain resources, and resource transaction histories. Responsive to a request to verify an authorized user of a resource, the secure resource management system further queries the resource record repository, retrieves the resource record, determines the resource user currently having a right to obtain the resource as the authorized user of the resource, and transmits the verification result in response to the request. The verification result identifies the authorized user of the resource and can be used to grant access to the resource by the authorized user.
Real-time authorization of initiated data exchanges based on tokenized data having limited temporal or geographic validity
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data based on tokenized data characterized by a limited temporal or geographic validity. For example, an apparatus may receive a first signal that includes first information identifying a first geographic position of a client device. The apparatus may also obtain a digital token representative of a pre-authorization of a data exchange between the client device and a terminal device during a corresponding temporal interval. The terminal device may, for example, be disposed within a geographic region that includes the first geographic position of the client device. The apparatus may generate and transmit a second signal that includes the digital token to the client device. In some examples, the apparatus may transmit the second signal being through a programmatic interface associated with an application program executed by the client device.
Rapid and secure off-ledger cryptocurrency transactions through cryptographic binding of a private key to a possession token
Disclosed is a method, a device, and/or a system of rapid and secure off-ledger cryptocurrency transactions through cryptographic binding of a private key to a possession token. In one embodiment, a method for rapid and secure ledger-less transfer of a quantity of cryptocurrency includes generating a public-private key pair, securely storing the private key and utilizing the public key as a public address. The method verifies a ledger transaction on a distributed ledger network associated the quantity of cryptocurrency with the public address. The method generates a possession token having a state indicated by a state indicator. The state evolves upon transfer between two computing devices. The method cryptographically associates the ledger token and the possession token through incorporation of the public address into data generating the state indicator. The possession token is transferred to a computing device over the network while retaining the private key in secure custody.
Systems and methods using mobile communication handsets for providing postage
Systems and methods which provide postage indicia using mobile communication handsets are shown. According to embodiments, users are enabled to introduce mail pieces into a mail delivery stream which are accepted as having activated, value comprising postage indicia associated therewith without the use of traditional metering systems, processor-based postage generation and printing systems, or even printers. Instead, a token comprising substantially unique identification information identifying a mail piece is activated as an activated token having postage value associated therewith using mobile communication handsets, such as a smart phone, network enabled personal digital assistant, etc. according to embodiments of the invention.
SYSTEMS AND METHODS FOR PRIVATE NODE-LEVEL DATA COMPUTING AND RECONCILIATION
Aspects and embodiments are directed to method and system for node based reconciliation. Various aspects also provide for real-time securities exchange while supporting cash based transactions. Additional aspects incorporate improved user interfaces for enabling single selection investment decisions for all of a clients' wealth.
SYSTEM FOR IMPLEMENTING A TRANSACTIONAL TIMELOCK MECHANISM IN A DISTRIBUTED LEDGER
Systems, computer program products, and methods are described herein for implementing a transactional timelock mechanism in a distributed ledger. The present invention is configured to receive, from a computing device, a transaction to be registered in a ledger record associated with a distributed ledger at a future time; retrieve a required amount of resources for the one or more validation nodes to register the transaction in the ledger record; submit a validation request for the transaction to a memory pool associated with the one or more validation nodes with a proposed amount of resources less than the required amount of resources; continuously monitor the transaction in the memory pool until the future time; and at the future time, automatically re-submit the validation request for the transaction to the memory pool with the required amount of resources.
BLOCKCHAIN ADDRESS RISK ASSESSMENT VIA GRAPH ANALYSIS
Novel technical ways of analyzing a blockchain system using machine learning are presented, including structures and techniques that can facilitate blockchain address risk assessment via graph analysis. In various embodiments, a system can access a blockchain. The system can build a transaction graph based on analysis of the blockchain. Nodes of the transaction graph can respectively represent blockchain addresses that are recorded in the blockchain. In various cases, edges in the transaction graph can respectively represent blockchain transactions between different ones of the blockchain addresses that are recorded in the blockchain. The system can calculate risk scores respectively corresponding to the blockchain addresses, based on analyzing the transaction graph via at least one machine learning algorithm. These techniques can improve computer operational efficiency by avoiding the execution of unnecessary blockchain transactions.
BLOCKCHAIN AND NON-FUNGIBLE TOKEN APPLICATION IN A GAMING ENVIRONMENT TO STORE AND TRACK DIGITAL ASSETS
The present invention is directed to systems and methods for utilizing blockchain and non-fungible tokens in a gaming environment. In accordance with some embodiments, a method of transferring ownership of a digital asset between a provider of the asset, a receiver of the asset, and multiple nodes in a distributed file system, may include: assigning a non-fungible token (NFT) to the asset; recording the NFT on the distributed file system; receiving a request for transfer of the asset from the provider to the receiver; confirming ownership of the asset by reviewing the NFT record;
transferring ownership of the asset from the provider to the receiver; updating the NFT record on one or more nodes in the distributed file system to reflect receiver as the owner of the asset; and confirming the receiver as the owner of the asset by one or more other nodes in the distributed file system.