Patent classifications
G06Q20/38215
Secure network accessing method for POS terminal, and system thereof
The present invention relates to the method and the system for initializing secure network access for POS terminals. Said system comprises a terminal backend system and a POS terminal. The POS terminal is provided with: a security module, which was preloaded with a terminal default public key certificate, a private key file, and a CA public key certificate of the terminal backend system in the setting of leaving the factory; a transaction module, which is used for performing the acquiring operation with the following core trading module; and a parameter initializing module, which is used for implementing network access. The terminal backend system is provided with: a core trading module, which determines whether an acquiring transaction is able to be executed based on the transaction unique identifier sent from the POS terminal, and completes the acquiring operation with the above transaction module in the case that the acquiring transaction is able to be executed; and a terminal certificate issuing module, which is used for generating a terminal transaction certificate and returning said terminal transaction certificate to said POS terminal. According to the present invention, remotely and securely initializing network access for POS terminals can be achieved.
REISSUING OBLIGATIONS TO PRESERVE PRIVACY
A system is provided for reissuing obligations whose ownership is recorded in a distributed ledger to preserve the identity of prior owners of the obligations. The system accesses a target transaction in which an issuer has a target obligation to a target owner specified in the target transaction. The target transaction has one or more ancestor transactions that each specify an owner. The system retires the target transaction so that the issuer no longer has the target obligation. The system then receives an indication that the issuer created a reissue transaction in which the issuer has a reissued obligation to the target owner that is specified in the reissue transaction. The reissue transaction does not have any ancestor transactions.
Systems And Methods For Using A Transaction Identifier To Protect Sensitive Credentials
Embodiments of the invention are directed to systems and methods of securely transmitting account credentials, such as a token. A user device and application can initially select an account, and then obtain a transaction identifier associated with the account. The user device can provide the transaction identifier to a resource provider, which can then directly exchange the transaction identifier for the account credentials.
METHOD FOR CREATING COMMODITY ASSETS FROM UNREFINED COMMODITY RESERVES UTILIZING BLOCKCHAIN AND DISTRIBUTED LEDGER TECHNOLOGY
A token system and method, employing a token representing an interest in a smart contract, comprising: a distributed ledger, storing parameters of a smart contract, the smart contract representing an agreement, secured by a security interest in property, to execute the security interest unless a token is returned within a period; a communication port configured to interface with an automated communication network for communications between a plurality of cryptographic hardware processors; and an automated distributed virtual state machine, hosted by the plurality of cryptographic hardware processors, employing a distributed consensus model for transaction validation, the automated distributed virtual state machine being configured to: communicate distributed consensus messages through the automated communication network; communicate the token; execute the smart contract defined by the parameters, receiving inputs and producing outputs on a blockchain; and communicate an immutable message for exercise of the security interest.
Method and system for providing validated, auditable, and immutable inputs to a smart contract
A method for posting of auditable, immutable data to a blockchain includes: receiving a blockchain including a plurality of blocks, each block including at least a block header and one or more transaction values, wherein each transaction value includes at least a transaction hash; receiving a data file associated with a specific transaction hash included in a block in the blockchain, wherein the data file includes one or more variables; modifying at least one of the one or more variables included in the data file; generating a new hash value via application of one or more hashing algorithms to the modified data file; generating a new transaction value based on at least the generated new hash value and the specific transaction hash; digitally signing the generated new transaction value; and electronically transmitting the signed new transaction value.
SYSTEMS AND METHODS FOR EFFICIENT AND SECURE PROCESSING, ACCESSING AND TRANSMISSION OF DATA VIA A BLOCKCHAIN NETWORK
The invention provides improved methods and systems for storing, sharing retrieving, writing and accessing data (content) on a blockchain. The invention may form part of a protocol for storing, searching and accessing the data. An embodiment of the invention comprises the step of processing at least one blockchain transaction (Tx) comprising: a protocol flag; a discretionary public key (DPK); and a discretionary transaction ID (DTx ID). These are discretionary in the sense that they are not required as part of the underlying blockchain protocol but in accordance with the present invention. This combination of features enables portions of data to be identified, retrieved and shared on a blockchain, and also to be linked/associated with one another when provided in a plurality of transactions. It enables a graph or tree-like structure to be constructed, which reflects the hierarchical relationships between portions of data, facilitating their processing, searching and sharing.
SYSTEMS AND METHODS FOR EFFICIENT AND SECURE PROCESSING, ACCESSING AND TRANSMISSION OF DATA VIA A BLOCKCHAIN NETWORK
The invention provides improved methods and corresponding systems for the sharing, storage, creation and accessing of data stored on a blockchain eg the Bitcoin blockchain. It may form part of a protocol for searching the blockchain for content/data. A method in accordance with the invention may be used for associating or linking data stored within (separate/different) blockchain transactions to enable the identification, retrieval and/or sharing of data stored therein. Additionally, or alternatively, it facilitates identification of transactions (TX) in a blockchain which store content/data that needs to be shared, transmitted, stored and/or accessed by a user. Such a method comprises the step of mapping a mnemonic to: 1) a public key (PK) associated with the transaction (TX); and 2) the transaction ID (TX.sub.ID) of the transaction (TX).
Authenticator App for Consent Architecture
A method 1000 for authenticating operations within consent architecture includes obtaining an operation request 142 requesting a service application 140 to access a remote entity 130 to perform an operation (138). The method also includes issuing, by the service application, an authentication request 152 requesting an authenticator application 150 to obtain user authentication credentials 154 for authenticating a user 12 before the remote entity performs the operation. The method also includes encrypting, by the authenticator application, the obtained user authentication credentials using a public key 132 of the remote entity. The service application is restricted from obtaining the user authentication credentials in unencrypted form. The method also includes providing, by the authenticator application, the encrypted user authentication credentials to the service application and transmitting, by the service application, the operation request and the encrypted user authentication credentials to the remote entity.
Resource transfer and capital transfer method and apparatus
A blockchain-based resource transfer method, includes: when a resource transfer condition is satisfied, determining a first amount of a to-be-transferred first resource; determining a second amount of a to-be-transferred second resource according to the first amount of the first resource, wherein a type of the first resource is different from a type of the second resource; initiating, by a resource transferor, a transaction request to a blockchain, to transfer the to-be-transferred second resource to a resource transferee, wherein the transaction request comprises first encrypted amount information obtained by encrypting the second amount of the second resource based on a first encrypting function, wherein inputs of the first encrypting function include the second amount of the second resource and a public key of the resource transferee; and after the blockchain verifies the transaction request, executing the transaction request, transferring the to-be-transferred second resource to the resource transferee, and recording an execution result of the transfer on the blockchain. Therefore, privacy information of both a resource transferor and transferee can be protected during resource transfer.
Computer-Implemented System and Method for Facilitating Transactions Associated with a Blockchain Using a Network Identifier for Participating Entities
The present disclosure proposes methods and devices for facilitating IP transaction involving digital assets over the Internet directly based on IP addresses for entities. The aspects and embodiments of the present disclosure enable secure IP address transactions by ensuring that the public key of the recipient is never used in the generation of payment destination addresses, thereby making message replay and MITM attacks extremely hard to implement by an attacker. Furthermore, the aspects and embodiments ensure that the payment destination addresses for digital assets are based on new or single use private as well as public keys that are computed or provided based on the public key for the recipient and are specific to a given transaction.