G06Q20/38215

DATA PROCESSING METHOD, APPARATUS, AND SYSTEM

A data processing method, apparatus and system, for improving the security and accuracy in the data processing process. The method comprises: receiving target biometric information and verification password information of a target object sent by an acquisition institution server; recognizing, from registered biometric information of a plurality of objects, the registered biometric information matching the target biometric information; determining target account information of the target object according to the recognized registered biometric information; and sending a data processing request to a card issuing institution server corresponding to the target account information, the data processing request comprising the target account information and the verification password information, so that the card issuing institution server performs verification using the verification password information and performs data processing according to the target account information after the verification is passed.

SYSTEMS AND METHODS FOR LINKING HIGH-VALUE TOKENS USING A LOW-VALUE TOKEN
20220261782 · 2022-08-18 ·

Embodiments include methods and systems for linking high-value tokens using a low-value token, comprising receiving, from an electronic data server, a first high-value token and a request for a low-value token, the first high-value token being associated with sensitive data associated with a user, and the low-value token being associated with a subset of the sensitive data associated with the user. The methods and systems further comprise providing the low-value token to the electronic data server, and receiving, from a second electronic data server, the low-value token and a request for a second high-value token, the low-value token having been provided to the second electronic data server by the electronic data server. The methods and systems further comprise generating a second high-value token associated with the sensitive data associated with the user, and providing the second high-value token to the second electronic data server.

AUTHENTICATING PHYSICAL ITEMS IN A TOKENIZATION WORKFLOW

The present disclosure includes methods for authenticating items in part of a tokenization workflow. In embodiments, the method includes receiving a photograph of, and information relating to, an item, and generating a virtual representation of the item. The item may be authenticated by making an authentication request via a portal to subject-matter authentication experts, wherein the portal displays the virtual representation of the item in the portal. An authentication report may be received from the experts, and a non-fungible digital token having a unique token identifier may be generated. The non-fungible token may be cryptographically linked to the virtual representation of the item on a cryptographic ledger and ownership data of the non-fungible token is updated to associate an account of an owner of the item with the digital token on the cryptographic ledger.

Reissuing obligations to preserve privacy
11449864 · 2022-09-20 · ·

A system is provided for reissuing obligations whose ownership is recorded in a distributed ledger to preserve the identity of prior owners of the obligations. The system accesses a target transaction in which an issuer has a target obligation to a target owner specified in the target transaction. The target transaction has one or more ancestor transactions that each specify an owner. The system retires the target transaction so that the issuer no longer has the target obligation. The system then receives an indication that the issuer created a reissue transaction in which the issuer has a reissued obligation to the target owner that is specified in the reissue transaction. The reissue transaction does not have any ancestor transactions.

STORING INFORMATION WITHIN A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK

The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.

System and method using interaction token

A communication device may receive input from a user and initiate generation of an interaction token in response. This interaction token can be used by the communication device in order search for a specific resource provider computer from among one or more resource provider computers, and to initiate a resource transfer between the user and a specific resource provider, mediated by a token provider computer.

Blockchain-based node management methods and apparatuses
11461773 · 2022-10-04 · ·

Systems and methods for blockchain-based node management. In an aspect, a system receives, by an existing node of a blockchain, a target transaction, wherein the target transaction comprises a certificate of a new node and a unique identifier of the new node; verifies the target transaction by the target transaction passing consensus verification of the blockchain; and after the target transaction passes consensus verification of the blockchain to verify the blockchain, records, in a node identity table that is used to record a certificate of a blockchain node and a unique identifier that is of the blockchain node and that corresponds to the certificate, the unique identifier and the certificate of the new node.

Systems and methods for data file transfer balancing and control on blockchain

A balance and control system may write a data file transfer confirmation from a transmitter system to a blockchain in response to the transmitter system transmitting a data file to a receiver system with the confirmation including a transmitter system address, a receiver system address, and a first hash of the data file. The system may also write a data file transfer acknowledgement from a receiver system to the blockchain with the acknowledgement including the transmitter system address, the receiver system address, and a second hash of the data file. The blockchain may execute a smart contract to compare the first hash of the data file to the second hash of the data file to identify an out-of-balance file transfer event. A monitoring device of the B&C system may read the out-of-balance file transfer event from the blockchain.

AUTOMATING DIGITAL ASSET TRANSFERS BASED ON HISTORICAL TRANSACTIONS
20220300952 · 2022-09-22 ·

Systems and methods are disclosed for automating digital asset transfers based on historical transactions. In one implementation, a notification corresponding to a first transaction or operation associated with a first entity is received. Based on the notification, a second transaction or operation is initiated with respect to one or more digital tokens. One or more digital tokens are received in response to the second transaction. At least one of the one or more digital tokens, as secured via one or more cryptographic keys, is stored in a wallet associated with the first entity.

CRYPTOASSET CUSTODIAL SYSTEM WITH PROOF-OF-STAKE BLOCKCHAIN SUPPORT

Methods and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving, in a cryptoasset custodial system, a request to authorize a staking operation associated with a blockchain, wherein the staking operation is associated with a private key of an asymmetric cryptographic key pair, the private key is usable to control ownership of a cryptoasset recorded in the blockchain, and the private key is securely held in the custodial system; performing, in response to the request, a portion of the proof-of-stake protocol in a hardware security module using logic designed for the protocol, wherein the logic in the hardware security module is configured to authorize the staking operation by digitally signing an associated staking transaction; and sending the digitally signed staking transaction to another computer to effect the staking operation on behalf of the user.