Patent classifications
G06Q20/38215
Systems and methods for media codecs and containers
Systems and methods for enabling and enforcing cryptocurrency transactions associated with at least a portion of data are provided. Systems and methods may include a cryptocurrency transaction service, the cryptocurrency transaction service including one or more transaction servers and one or more ledger processing devices. At least one streaming server configured to associate at least a portion of data with a cryptocurrency transaction and to transmit the at least a portion of data may be provided. A client device may be provided, the client device being configured to receive the at least a portion of data from the streaming server, wherein at least one of the client device and at least one streaming server are configured to initiate a cryptocurrency transaction with the cryptocurrency transaction server based at least in part on the association between the at least a portion of data, the cryptocurrency transaction, and the cryptocurrency transaction service.
SESSION DATA NETWORK AND METHOD OF PROCESSING SESSION DATA
A session data processing network includes a POS terminal and at least one computer server. The POS terminal is configured to establish a secure communications session with a communications appliance, receive session data from the communications appliance via the communications session, extract a ledger identifier and a token from the session data, transmit an authorization request message and a rewards request message to the server. The authorization request message includes the ledger identifier and an authorization value. The rewards request message includes the token and requests a reward of loyalty points to a secondary ledger associated with the token. The server is configured to receive the authorization request message and the loyalty rewards request message, confirm authorization of a transaction in an amount equal to the authorization value from an account associated with the ledger identifier, and transmit to the POS terminal an authorization response message confirming the authorization.
CRYPTOBIONIC SYSTEM AND ASSOCIATED DEVICES AND METHODS
Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data.
SOURCING INFORMATION FOR A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK
The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
Systems and methods for automated decentralized multilateral transaction processing
Systems and methods for automated decentralized multilateral transaction processing are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a method for automated decentralized multilateral transaction processing may include: (1) receiving a plurality of transaction requests to conduct a plurality of transactions; (2) determining that a party to a first transaction of the plurality of transactions does not meet a liquidity requirement to conduct the first transaction; (3) executing a netting algorithm to identify a second transaction of the plurality of transactions that when executed allows the first transaction to execute; and (4) executing the first and second transactions.
System and method for information protection
A computer-implemented information protection method comprises: obtaining a plurality of encrypted transaction amounts associated with transactions among a plurality of accounts, wherein each of the encrypted transaction amounts is associated with one of the accounts that sends or receives one of the transaction amounts, and the encryption of each of the transaction amounts at least conceals whether the one account sends or receives the one of the transaction amounts; generating a sum proof based on the obtained encrypted transaction amounts, the sum proof at least indicating that the transaction amounts are balanced; and transmitting the encrypted transaction amounts and the sum proof to one or more nodes on a blockchain network for the nodes to verify the transactions.
Multi-approval system using M of N keys to perform an action at a customer device
A computing system that includes at least one processor and at least one memory communicatively coupled to the at least one processor is disclosed. The computing system also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of N private keys or key components associated with a customer. The at least one processor is configured to receive, from each of at least one vault system, a respective private key or key component. The at least one processor is also configured to perform at least one action based on at least M of the N private keys or key components.
SYSTEM AND METHOD FOR IMPLEMENTING MARKET DATA RIGHTS ENFORCEMENT
An embodiment of the present invention is directed to delivering an entitlements model that scales to both mid-frequency and low-latency use cases. The innovative solution may be distributed in nature and able to operate in low priority threads alongside the main logic of the software. An embodiment of the present invention may be implemented as a software module with APIs for ease of adoption.
Passive management of multiple digital tokens for an electronic transaction
Systems and methods for providing a payment system includes processing, by a first payment service provider device, a payment request received from a user device and associated with a first funding instrument. A payment request failed message associated with the payment request is received. A second funding instrument associated with a second payment service provider device is retrieved. First sub-payment request of the payment request associated with the second funding instrument is processed and a first sub-payment successful message associated with the first sub-payment request is obtained. The payment request is determined to be successful based on the first sub-payment successful message. A payment request successful message is provided to the user device indicating that the payment request was successful.
TRANSACTION MANAGEMENT DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN TRANSACTION MANAGEMENT PROGRAM, AND TRANSACTION MANAGEMENT METHOD
A transaction management device includes: a memory; and a processor coupled to the memory. The processor is configured to register, into a database, with respect to a first blockchain that stores a plurality of transactions with which first information and second information are associated, a plurality of multiple pieces of the second information in the plurality of transactions in units of groups based on the first information; and register, into a second blockchain, hash values obtained by hashing the plurality of pieces of second information in the units cf groups.