Patent classifications
G06Q20/38215
SYSTEMS AND METHODS FOR REDUCED INFRASTRUCTURE PAYMENT AUTHENTICATION
Systems and methods for authenticating payments leveraging a reduced infrastructure are disclosed. The merchant services module may receive a first identifier associated with a client device and a second identifier associated with a set of items. The merchant services module may communicate with the client device to generate a request for user input. The client device may communicate with a payment token device. The client device may generate an approval based on the communication between the payment token device and the client device. The merchant services module can receive the approval from the client device. The merchant services module can determine that the approval from the client device corresponds to the second identifier that is associated with the set of items. The merchant services module can provide the one or more items associated with the approval and the second identifier to the user of the client device.
Managing transactions in multiple blockchain networks
Disclosed are computer-implemented methods, non-transitory computer-readable media, and systems for managing transactions in blockchain networks. One computer-implemented method includes identifying a first Hash Time Locked Contract (HTLC) transaction in a first blockchain network that is associated with a second HTLC transaction in a second blockchain network different from the first blockchain network, identifying a third HTLC transaction in the second blockchain network that is associated with the second HTLC transaction, identifying a fourth HTLC transaction in the first blockchain network that is associated with the first, second, and third HTLC transactions, the first, second, third, and fourth HTLC transactions being related to a cross-chain transaction across the first and second blockchain networks, and deriving hidden information of the cross-chain transaction from information of the first, second, third, and fourth HTLC transactions based on associations of the first, second, third and fourth HTLC transactions.
SYSTEMS AND METHODS FOR AUTHENTICATED PEER-TO-PEER DATA TRANSFER USING RESOURCE LOCATORS
An authenticated data transfer system may include generating, after entry of one or more processors of a transmitting device into a communication field, a link, the link comprising a near field communication data exchange format uniform resource locator including identifier data and user data; transmitting, to a first application comprising instructions for execution on a first device, the link to initiate data transfer; authenticating a user associated with the first device by activating one or more actions based on the link; transmitting one or more requests for confirmation of quantity and recipient data associated with the data transfer; receiving one or more notifications that are based on the one or more requests for confirmation of quantity and recipient data associated with the data transfer; and performing one or more login credentials that are responsive to the one or more notifications so as to complete the data transfer.
Guaranteed encryptor authenticity
Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.
Use of mobile identification credential in know your customer assessment
A method for verifying an identity of an individual as a first party via a first party system by a second party system comprises: sending a request for identification information of the first party; receiving first party information associated with a mobile identification credential (MIC) which the first party system received from an authorizing party system (APS) before the second party system sends the request for identification information of the first party to the first party system, the first party having consented to release the first party information to the second party system, and the first party information having been verified by the APS before the APS sends the MIC to the first party system; using the verified first party information associated with the MIC to verify or not verify an identity of the first party; verifying the identity of the first party before providing services to the first party.
SHARED CRYPTOGRAM GENERATION DURING MULTI-PARTY DIGITAL TOKEN PROCESSING
There are provided systems and methods for shared cryptogram generation during multi-party digital token processing. A service provider, such as an electronic transaction processor for digital transactions, may require tokenized data in order to protect sensitive or secure data, such as payment card data during electronic transaction processing. In this regard, the service provider may tokenize the data, which may require a cryptogram for validation of a corresponding digital token. The cryptogram may be generated based on input from multiple participants to the transaction, where a length of the cryptogram may be determined based on a risk score for the transaction. Each transaction participant may be assigned one or more slots or values in the cryptogram to provide based on the risk score and other rules for cryptogram generation. Each participant may provide corresponding portions, where the service provider may generate and backwards update the participants of the cryptogram.
Providing access to a networked application without authentication
A method and apparatus are herein disclosed for allowing suppliers to generate an invoice from a purchase order without requiring them to log in or pre-register with a networked application. Implementation is provided by having a first user provide a first document to a networked application. An electronic notification is dispatched to a receiver for the first document with a unique link to a data entry page within the networked application. The data entry page is sandboxed with limited functionality within the networked application, but accepts data from the receiver to be sent directly into the first user's system.
Secure transactions with offline device
A method being implemented via execution of computing instructions configured to run at one or more processors and stored at one or more non-transitory computer-readable media. The method can include receiving, at a transaction system being situated along a proxy communication channel extending from a point-of-sale terminal of a first entity to a mobile wallet provider, an encrypted transaction code. The encrypted transaction code can be generated and sent to the point-of-sale terminal by a mobile device that runs a mobile application associated with the mobile wallet provider. The mobile device receives from a point-of-sale terminal an identifier of the first entity, a transaction amount of a transaction, and a transaction identifier for the transaction, receives an authorization from a user of the mobile device for the transaction while the user is at the point-of-sale terminal, and determines that the mobile device is unable to communicate with the mobile wallet provider. The encrypted transaction code includes a preauthorization from the user to pay the first entity for the transaction amount from a first account of the user maintained by a first financial institution. The method also can include sending the encrypted transaction code through the proxy communication channel to the mobile wallet provider, to cause the mobile wallet provider to decrypt the encrypted transaction code and verify the preauthorization from the user. The method additionally can include receiving, from the first financial institution, a request comprising the identifier of the first entity. The method further can include determining an account identifier of a second account of the first entity maintained by a second financial institution based on the identifier of the first entity. The method additionally can include sending the account identifier of the second account to the first financial institution. The method further can include receiving, from the first financial institution, payment information regarding a payment to be made to the second account from the first account for the transaction. The method additionally can include sending the payment information to the second financial institution, to cause the point-of-sale terminal to receive a notification in real-time while the user remains at the point-of-sale terminal. Other embodiments are described.
Distributed ledger for device management
Techniques are described for managing devices, such as Internet of Things (IoT) devices, using smart contract(s) on a distributed ledger (e.g., blockchain). Smart contract(s) executing on a distributed ledger may control access to one or more devices in a home or other environment. The smart contract(s) may employ information stored on the distributed ledger and information in a transaction sent to the smart contract(s) to determine whether particular user(s) and/or process(es) may access the device(s), issue commands to the device(s), access data generated by the device(s), and/or control the device(s). The smart contract(s) may provide a secure portal through which user(s) and/or service(s) may access device(s) for command and control of such device(s), and secure access may be based on permission information that is specified or provided by an owner or operator of the device(s) and that is stored on the distributed ledger.
METHODS, SYSTEMS, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIA FOR PROMPT TRANSFER OF CRYPTOCURRENCY
Disclosed is a method, system, and non-transitory computer-readable record medium for immediate or prompt cryptocurrency trading. A cryptocurrency trading method includes receiving, by at least one processor, a transfer request from a user for a transfer transaction to a second party exchange from a first party exchange, the first party exchange being provided by the computer system, and processing, by the at least one processor, the transfer transaction as an internal transaction in response to the transfer request by using a first party account without using a blockchain network, the first party account being an account of the first party exchange on the second party exchange.