Patent classifications
G06Q20/38215
METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR SECURE ENCRYPTION OF DATA FOR TRANSMISSION VIA AN UNTRUSTED INTERMEDIARY
The invention is directed toward systems, methods and computer program products that enable end to end user authentication along with encryption to mitigate the risks posed by untrusted or unsecure intermediary entities. The invention (i) enables full end to end encryption of sensitive data that has been input by a user on a terminal device at one end, and the intended or authorized recipient at the other end, (ii) ensures that data entered by the user on the terminal device is not readable by any intermediary entity including a partner application or other software application implemented within the terminal device, and (iii) eliminates the risk of successful local attacks on the terminal device to unauthorizedly access user data, or to unauthorizedly obtain access to encryption/decryption keys that can be used to unauthorizedly access encrypted user data.
Recommending conditions for blockchain-enforced contracts
In one embodiment, techniques include receiving, from a device associated with a merchant, a request to create blockchain-enforced contract corresponding to a new transaction between the merchant and a customer. Techniques include generating a condition of the blockchain-enforced contract requisite for completion of the new transaction. Techniques include receiving a selection of at least one option for determining that the condition is satisfied. Techniques include generating the blockchain-enforced contract and providing the blockchain-enforced contract to one or more nodes in the blockchain network. Techniques include receiving an input comprising information regarding the condition, creating a blockchain transaction addressed to the blockchain-enforced contract and sending the blockchain transaction to nodes in the blockchain network. Techniques include transferring a corresponding to the new transaction from an escrow account to a merchant account.
Methods and systems for revealing information in content selectively
Methods and systems with “selective-information-revealing” features are described. The features enable a user of an online platform such as an online forum or online publishing platform to post content with one or more elements masked. With the features, an automatically generated suggestion of one or more elements of the content to mask is presented with the suggested elements visually differentiated from the other elements of the content. User interface elements are also provided enabling the user to modify the set of elements to be masked. Further described are additional earn-from-content features enabling a user to be rewarded by disclosing his masked content or selling the privilege of exclusive capabilities regarding his content to another user, and “share-revenue” features enabling revenue earned via earn-from-content features to be shared among a plurality of users.
SYSTEM AND METHOD FOR DETECTING INTRUSIONS BY RECOGNIZING UNAUTHORIZED CRYPTOCURRENCY TRANSACTIONS AT AN OPTIMIZED COST
A system and method for detecting intrusions to a set of assets comprising a list of assets identifications, a list of wallet identifications, a register of asset-wallet associations, a bitcoin blockchain, wherein each asset holds a wallet, and wherein wallet identifications include bitcoin live unspent transactions, the method consisting in the steps of: at the publication of every new block of the bitcoin blockchain, checking if one of the live unspent transactions is missing from the list of live unspent transactions included in the new block of the blockchain, and determining whether an intrusion has happened based on the check.
Secure Off-Line Transactions Through Broadcast Encryption
Techniques for securing peer-to-peer off-line transactions such as mobile device energy sharing through the use of broadcast encryption are provided. In one aspect, a method for securing transactions includes: encrypting the transactions in a digital wallet of a user in a digital network (e.g., a blockchain network) in a manner whereby the user can encrypt but cannot decrypt the transactions, and other users in the digital network can decrypt but cannot encrypt the transactions, thereby requiring the user to reveal all or none of the transactions in the digital wallet of the user since the user does not know which of the transactions is which, wherein one or more of the transactions are conducted off-line without users having a connection to the digital network.
STABLE TOKEN CREATION, PROCESSING AND ENCRYPTION ON BLOCKCHAIN
Disclosed herein are methods and systems for creating or providing a blockchain-based digital stable token, facilitating user identification, fund transfer, and payments and trading. The systems and methods provided herein may comprise providing a stable token, a non-stable token, reward rate for payment in the stable token, interest rate for holding the stable token, wherein zero inflation and deflation of the stable token against a weighted average price, such as the PCE price index, can be achieved by constantly optimizing one or more of the i) the reward rate, ii) the interest rate, and iii) the trading between the non-stable token and stable token through a Linear-Quadratic-Gaussian controller.
Controlling transmission of information through a zero-knowledge data management network
The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
SAFE MOBILE PAYMENT PLATFORM
The system which provides formation of fiscal data and its inspection for the payment methods wherein it comprises; Terminal (20) which is composed of devices used by the taxpayer/job site which will form the fiscal data related to receiving the payment and processing, and which determines the payment method, Fiscal module (27) which is present on the terminal (20) and which provides formation of fiscal information, carrying out of certificate and signature management, Basic sales application (23) which is present on the terminal (20) and which defines the product/division information so as to implement the sales transaction of the job site, and which forms the information related to the sales by using the data which it had defined during the sale, Terminal (20) software module in which all terminal software modules (24) are located, Authorization/approval hosts (30) which meets and feeds back the replies of the approval requests which the establishment giving the service must receive from its systems for payment transactions and added value services of the terminal (20), Central safe mobile payment platform (10) which provides fiscal certificate management related to the terminal (20) on which the sales has been performed, Back office software module (11) which is located on the safe mobile payment platform (10) and which provides face up for making customer and terminals (20) definitions to the system, which offers operator screens for monitoring the system and which provides preparation of awaited reports by receiving report demands, Fiscal data transmission module (12) which is located on the safe mobile payment platform (10) and which provides transmission of fiscal data to the Income Authority Official Corporation (40) with regulation approved content and timing via special integrators (41), Certificate management module (13) which is located on the safe mobile payment platform (10) and which performs certificate management belonging to terminals (20), Online message processing module (14) which is located on the safe mobile payment platform (10) and which meets the transactions starting from the terminal (20) to be done real time/online, which transmits to the respective sides and which receives their replies, which feeds back the replies to the terminal (20) and which records the information required for the transaction on server side.
Method and system for blockchain transaction confirmation for small merchants
A method for facilitating payment transactions for offline merchants through a third party service provider includes: receiving, by processing server, a confirmation message for a payment transaction from a computing device including a merchant identifier, consumer identifier, and transaction amount; generating, by the processing server, a notification message including the merchant identifier, consumer identifier, and transaction amount; encrypting, by the processing server, the notification message using a public key of a first cryptographic key pair; transmitting, by the processing server, the encrypted notification message to the computing device; receiving, by an encryption device, the encrypted notification message from the computing device; decrypting, by the encryption device, the encrypted notification message using a private key of the first cryptographic key pair; and displaying, by a display interfaced with the encryption device, a confirmation message including the consumer identifier included in the decrypted notification message.
SYSTEMS AND METHODS FOR FACILITATING TRANSFER OF OWNERSHIP OF TOKENS BETWEEN USERS ON A DECENTRALIZED DATABASE
Systems and methods for facilitating transfer of ownership of tokens between users on a decentralized database stores a registry of assets and transactions are disclosed. Exemplary implementations may: store, on electronic storage, a set of code executable by the decentralized database to manifest individual tokens on the decentralized database; and record the set of code on the decentralized database such that the set of code is accessible at a creator address that is associated with the creator of the set of code. Using the functions defined by the set of code, an owner of an individual token can offer to sell the individual token, and a buyer can accept this offer to buy the individual token, at an agreed-upon price.