G06Q20/38215

SYSTEMS AND METHODS FOR EXECUTING ECOMMERCE GUEST CHECKOUT TRANSACTIONS

Systems and methods are disclosed for executing an electronic transaction using a digital wallet. One method includes receiving a guest checkout request and electronic transaction data from an electronic transaction browser. Whether a user is enrolled in the digital wallet system may be determined by the digital wallet system. The digital wallet system may authorize an electronic transaction based on the electronic transaction data upon determining the user is not enrolled in the digital wallet system. The digital wallet system may initiate a digital wallet enrollment upon authorizing the electronic transaction. The digital wallet system may store the user data in the digital wallet system and transmit a verification request to the electronic transaction browser. The digital wallet system may receive a verification response from the electronic transaction browser and may generate a digital wallet enrollment status message based on the verification response.

USER DEVICE GATED SECURE AUTHENTICATION COMPUTING SYSTEMS AND METHODS
20230020611 · 2023-01-19 ·

A system is provided that allows users to execute a secure transaction that is authenticated by their user device. Personally identifiable information (PII), such as, but not limited to, biometric authentication data, is locally stored on the user's device so as to protect the PII. A user device private key is associated with the particular user device and the user, and the corresponding public key is registered with a User Device Authentication Alliance server (UDAAS) system. In an online transaction, a LoginID server or an Access Control server interact with the UDAAS to confirm the user is authentic and has confirmed the transaction.

METHODS AND APPARATUS FOR VALIDATION OF RULES OF A SMART CONTRACT ON A CENTRALIZED OR DISTRIBUTED DIGITAL LEDGER
20220383305 · 2022-12-01 ·

Systems and methods are described for policy-validated transactions using a centralized or distributed ledger. A request to execute a transaction and a transaction signature is received from a user's computing device. The transaction signature is generated with a private key of the user's computing device. The transaction corresponds to a token associated with the user's computing device and the transaction is subject to a first policy of a set of one or more policies. The transaction signature corresponds to the request to execute the transaction is determined using a public key of the user's computing device. In response to the determination, the token associated with the user's computing device is retrieved from the centralized or distributed ledger. The transaction is executed if the token is associated with the first policy and the token is valid.

Cryptographic-asset collateral management
11538105 · 2022-12-27 · ·

Provided is a process, including for lending, with a smart contract executable by a decentralized computing platform, money to a borrower. The process includes securing, with the smart contract, the loan by obtaining control of cryptocurrency of the borrower and monitoring, via the smart contract, whether the cryptocurrency satisfies a loan-to-value threshold. In response to the monitoring, an amount of cryptocurrency secured with the loan can be adjusted.

Creating and managing artificially intelligent entities represented by non-fungible tokens on a blockchain
11521200 · 2022-12-06 ·

Some examples of the present disclosure relate to generating artificially intelligent entities represented on a blockchain using a non-fungible token (NFT). In one such example, a system can generate an NFT on a blockchain. The NFT can represent an artificially intelligent entity. The system can also generate a personality dataset on the blockchain, the personality dataset describing personality characteristics of the artificially intelligent entity. The system can then correlate the NFT to the personality dataset, thereby assigning the personality characteristics to the artificially intelligent entity. Once generated, the artificially intelligent entity may reside in a virtual ecosystem in which it can perform tasks and learn over time.

SYSTEMS AND METHODS FOR MANAGEMENT OF NON-FUNGIBLE TOKENS AND CORRESPONDING DIGITAL ASSETS

Systems and techniques are described for situational token generation. A system receives media content that is based on sensor data captured by at least one sensor of a media device. The system determines a position of the media device. The system determines that the position of the media device is within a geographic area. In response to determining that the position of the media device is within the geographic area, the system generates a token corresponding to the media content. A payload of at least one block of a distributed ledger identifies the token.

Method, apparatus, and system for performing online transactions with biometric authentication
11468438 · 2022-10-11 · ·

An apparatus, system and method for conducting financial and other transactions using a wireless device are provided. A computing device includes a display screen, a user input interface, and one or more processors. A memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and a merchant system. The memory device further stores at least one electronic credential. The computing device is configured to wirelessly communicate with the merchant system via at least one of a network transceiver and a short-range RF transceiver, and to display information regarding one or more transactions with the merchant system on the display screen. At least one electronic credential is transmitted to the merchant system based on comparing the biometric characteristic of the user with stored biometric information to initiate the one or more transactions with the merchant system.

LOGICAL VALIDATION OF DEVICES AGAINST FRAUD AND TAMPERING
20220343341 · 2022-10-27 ·

Disclosed herein is a method and system to establish a secure communication channel between a payment object reader and a payment terminal For this, the server determines whether a payment terminal has associated with an attestation ticket. The method further includes determining, whether to approve or deny the request for establishing the secure communication channel between the payment object reader and the payment terminal based on the attestation ticket. If the determination yields that the request has been approved, further generating a session approval interrupt having one or more session approval conditions; and sending the session approval interrupt to the payment terminal, where the session approval interrupt causes a secure communication channel to be established between the payment object reader and the payment terminal.

UTILIZING TRUST TOKENS TO CONDUCT SECURE MESSAGE EXCHANGES
20220329623 · 2022-10-13 ·

Embodiments of the invention are directed to the utilization of trust tokens to perform secure message transactions between two devices. A trust token transmitted in a message from one device may include first data that is digitally signed by a trust provider computer, and second data that is digitally signed by the device itself. Upon receipt of a message containing a trust token, the recipient may utilize the first data to verify with the trust provider computer that the sender of the message is a trusted party. The trust provider computer may provide the recipient device the public key of the sender. The recipient may utilize the second data and the provided public key to verify that the sender signed the message and that the message is unaltered. These techniques may increase detection of relay, replay, or other man-in-the-middle attacks, decreasing the likelihood that such attacks will be successful.

Transaction-enabled systems and methods for creating an aggregate stack of intellectual property

The present disclosure describes transaction-enabling systems and methods. A system may include a smart contract wrapper configured to access a distributed ledger including a plurality of intellectual property (IP) licensing terms corresponding to a plurality of IP assets, wherein the plurality of IP assets include an aggregate stack of IP, interpret an IP description value and an IP addition request, and, in response to the IP addition request and the IP description value, to add an IP asset to the aggregate stack of IP.