G06Q20/4014

COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK

The invention provides improved verification solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in an SPV wallet. In accordance with one embodiment, a method, system or resource is provided in which Bob verifies a Merkle proof for a first transaction and, upon successful verification, submits a second transaction to the blockchain. The second transaction has an input that spends an output (UTXO) from the first transaction. Generally, the invention provides an arrangement in which Bob sends Alice a payment transaction template (template Tx3) and requests: the full transaction data for all input transactions (Tx1, Tx2) comprising at least one output that Alice wants to spend as inputs to a transfer (Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; the completed transfer transaction (Tx3). Alice provides this information plus her signature and optionally a change address. Bob can then perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and Bob's local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network.

BLOCKCHAIN IDENTITIES
20220103366 · 2022-03-31 · ·

The invention is directed to computer-based method and a computer system for generating a blockchain address. The method comprises receiving a request for a new blockchain address for a user, the request including a public key, which has an associated private key, and identification information for the user, and generating the address based on a combination of the public key and the identification information.

TRANSPORTATION, STORAGE AND SERVICE FUTURES
20220108308 · 2022-04-07 ·

Methods and systems for the creation, validation and trading of transportation, storage or service capacity through future financial instruments, the use of explicit legal futures agreements, the application of insurance contracts to futures, the application of factoring or another form of financing to pay for futures at the time of purchase or fulfillment, the monitoring of futures contract execution and the establishment of futures default contingencies are provided.

SYSTEMS AND METHODS FOR USER AUTHENTICATION BASED ON MULTIPLE DEVICES
20220094678 · 2022-03-24 ·

A user may be authenticated using an authentication scheme based on user access to two or more selected electronic devices. A security key may be assigned to the user. The security key is divided into multiple parts that are distributed among electronic devices associated with the user. The security key can be reconstructed based on a distributed trust among the devices, where some devices may have a higher trust level than others. For example, each device can receive a number of key parts. In response to a request to authenticate the user, parts of the security key may be retrieved from two or more, but less than all, of the plurality of electronic devices associated with the user. The retrieved parts are used to reconstruct the security key, and the user is authenticated based on the reconstructed security key.

Electronic device and payment method using same

The present invention relates to an electronic device and a payment method using the same. The electronic device comprises at least a processor, memory, and touch screen display, the memory storing a call application including a first user interface, a payment application, and instructions which cause the processor to: display the first user interface of the call application on the touch screen display; receive a phone number or indication of the phone number through the first user interface from a user; request a call connection to the phone number; receive data associated with to the phone number from a first server while the request is being made, the data including a currently available item; display the item on an interface while the request is being made; display an input button associated with the payment application; receive an input selecting the input button; and execute the payment application.

SPECULATIVE TRANSACTION OPERATIONS FOR RECOGNIZED DEVICES
20220122074 · 2022-04-21 ·

Techniques are disclosed relating to speculatively processing transactions. A transaction processing system may receive an indication of a trigger event associated with an electronic transaction not yet initiated by a client computing device. In some embodiments, in response to the indication of the trigger event and prior to receiving an indication of the electronic transaction being initiated, the computer system begins speculative processing of the electronic transaction. In some embodiments, the speculative processing includes identifying the client computing device based on device authentication information received from the client device, determining a user account based on the identifier client computing device, retrieving account information for the determined account, and storing the retrieved account information. In response to receiving an indication of the electronic transaction being initiated, in some embodiments, the computer system performs one or more operations using the stored account information to complete the transaction.

SYSTEMS AND METHODS FOR CLASSIFYING ACCOUNTS BASED ON SHARED ATTRIBUTES WITH KNOWN FRAUDULENT ACCOUNTS

Methods and systems are presented for classifying a particular user account as a fraudulent user account by analyzing links between the user account and two or more known fraudulent user accounts collectively. Attributes of the particular user account are compared against attributes of a plurality of known fraudulent accounts to determine that the particular user account has shared attributes with a first known fraudulent account and a second known fraudulent account. The shared attributes with the first known fraudulent account and the second known fraudulent account are analyzed collectively to determine a risk level for the particular user account. The risk level may indicate a likelihood that the particular user account corresponds to a fraudulent account.

METHODS, SYSTEMS, AND DEVICES FOR SECURE CROSS-BORDER PAYMENTS WITH HIGH TRANSACTION THROUGHPUT
20220108312 · 2022-04-07 ·

Disclosed herein are methods, systems, and devices for providing secure national and/or cross-border payments with high transaction throughput using a hybrid of centralized payment system and cryptographically secure distributed ledger technologies? The system combines the benefits of a centralized system, including the ability to deposit and withdraw fiat currency following bank regulations, “Know Your Customer”/“Know Your Business” (KYC/KYB), “Anti-Money Laundering” (AML), with high security of cryptographically secure distributed ledger technology to solve security issues. A multi-chain structure is used to implement the methods with instant settlement, high security, integrity and scalability.

BACKEND ARCHITECTURE METHOD AND SYSTEM FOR AGGREGATE PAYMENT, COMPUTER DEVICE, AND STORAGE MEDIUM
20220084031 · 2022-03-17 ·

A backend architecture method includes: acquiring transaction information from a client, wherein the transaction information includes location information of the client; assigning, based on the location information, the transaction information to a transaction node that has jurisdiction over the location information, wherein the transaction node is a transaction center within a specified region in a distributed transaction system; matching, according to the transaction node, a channel gateway in a channel docking layer that pre-establishes a connection relationship with the transaction node, and sending a transaction request in the transaction information to a transaction object over the matched channel gateway such that the transaction object processes the transaction request; and acquiring a processing result from the transaction object, and transmitting information of the processing result to the client.

AUTOMATED DATA TOKENIZATION THROUGH NETWORKED SENSORS
20220084009 · 2022-03-17 ·

There are provided systems and methods for automated data tokenization through networked sensors. A network of data sensors may detect that a user is likely to engage in electronic transaction processing with a merchant device, for example, based on an action performed by the user and/or with a user device. One or more of the sensors may connect with the user's device and retrieve financial data from the device and/or data necessary to issue a token to the device for transaction processing. The sensor may perform a background process to issue the token to the device, and once onboarded, may store the token to the user's device and/or the merchant device that the user is likely to interact with for transaction processing. The token may be limited in use by location and/or amount, or may be used to fully onboard the user with the token service provider.