G06Q20/4014

DIGITAL IDENTITY NETWORK GATEWAY

Methods and systems for leveraging payment networks to distribute digital identity data are described. In an aspect, a method includes: receiving a digital identity request from a requesting computer system through a payment network, the digital identity request being embedded in a first payment message and the digital identity request including an entity identifier; and in response to receiving the digital identity request: obtaining a digital identity payload based on the entity identifier; and providing the digital identity payload to the requesting computer system in a second payment message sent through the payment network.

DIGITAL GIFTING SYSTEMS AND METHODS
20230114350 · 2023-04-13 ·

A digital gifting system and method utilizing a mobile device with a gifting application is disclosed. The mobile device is configured to receive from a gift sender a gift comprising an identifier of the gift sender, a custom content, and a gift amount, wherein the gift is only spendable if a phone number of the mobile device corresponds to a predetermined phone number associated with the gift; receiving a first selection from a user of the mobile device to accept the gift amount; displaying the identifier of the gift sender and the custom content; transmitting a first notification to the gift sender that the gift has been received by the user and the custom content has been displayed to the user; and after the gift amount has been spent by the user, transmitting a second notification to the gift sender indicating how the gift amount was spent by the user.

ELECTRONIC DEVICE AND PAYMENT METHOD USING THE SAME
20230114336 · 2023-04-13 ·

An electronic device is provided. The electronic device includes a communication module communicable with an external device, a display, a memory, and at least one processor operatively connected to the communication module, wherein the at least one processor is configured to display at least one image and/or text related to payment information on the display in response to at least a part of a user input, determine whether to start a payment process in response to identification of a user authentication, transmit a first signal for requesting an authentication to the external device in response to identification of an approach of the external device within a predetermined distance from the electronic device, and transmit a second signal related to the payment process in response to identification of an authentication of the external device, and determine whether to complete the payment process using the electronic device.

POINT-OF-SALE FRAUD PROTECTION

A method for execution by a point of sale device includes receiving a redemption request from a user computing device, the redemption request including a signature generated utilizing a private key of a public/private key pair associated with the user computing device. The method further includes sending use information regarding the redemption request to a marketplace server. The method further includes receiving authorization information from the marketplace server, the authorization information including a portion of a blockchain associated with the exchange item, the portion including the public key of the public/private key pair. The method further includes extracting the public key from the received portion of the blockchain associated with the exchange item. The method further includes verifying the signature utilizing the extracted public key and when the signature is verified, authorizing the redemption request.

Blockchain methods, nodes, systems and products
11468046 · 2022-10-11 · ·

Proposed is a scalable and computationally light approach to validating blockchains called the Catastrophic Dissent Mechanism (CDM). CDM uses anonymous actors who are free to join and leave the system as they please. The mechanism gives all actors strong incentives to behave honestly, both as individuals, and as members of coalitions who might benefit in compromising the integrity of the blockchain. As a result, CDM offers users Strategically Provable Security (SPS). CDM provides a foundation to create an ecosystem of federated chains which can share heterogeneous tokens using different business logic. As a result, new instances of chains can be created to serve as inexpensive, scalable platforms for a wide variety of blockchain applications and to provide a path for existing instances to be upgraded or altered without the use of hard forks or breaking the rule that code is law.

System and method for transaction authentication
11625721 · 2023-04-11 ·

Some implementations provide a method that includes: generating an association, at a mobile device, between a government-issued identification document of a user and a mode of payment; receiving, at the mobile device, a presentation of the government-issued identification document of the user to support a request for payment; validating whether the presented government-issued identification document is a valid identification of the user; and in response to validating the presented government-issued identification document, proceeding with payment by using the mode of payment.

Method for securing transactional data processing, corresponding terminal and computer program

A method for securing the processing of transactional data is disclosed. The method is implemented within a communications terminal comprising a transactional data processing module. The method has: a step for the detection, by the processing module, of a display of at least one entry area relating to a piece of payment means data; a step for the activation, by the processing module, of a contactless data reading module; a step for the obtaining, by the contactless data reading module, of at least one piece of payment means data coming from a payment means; and a step for the furnishing, at said at least one entry area, of at least one piece of payment means data previously obtained.

Systems and methods for math-based currency escrow transactions
11468413 · 2022-10-11 · ·

Systems and methods for verifying a digital title of an asset transferred via a math-based currency transaction. The method includes receiving a digital title request regarding an asset, creating a digital title for the asset in a digital title database, receiving, from a financial institution computing system, an asset transfer request regarding the asset that is the subject of the math-based currency transaction, verifying that an identity of a seller in the math-based currency transaction matches the identity of the owner of the asset. Then, responsive to the verification that the identity of the seller in the math-based currency transaction matches the identity of the owner of the asset, the method includes transmitting, to the financial institution computing system, a positive title verification and updating the identity of the asset of the digital title for the asset to match an identity of a buyer in the math-based currency transaction.

Identity services systems and methods
11605082 · 2023-03-14 · ·

Systems, methods, and apparatuses for storing verified identification information in a distributed database and for verifying entities to requestors are provided herein. Identity information relating to an entity is verified by a generally recognized identity provider (GRIP). Once verified, the GRIP populates a distributed database with an entry corresponding to the verified identity information. The distributed database is publically accessible such that identity requestors can see the entries in the distributed database. In some arrangements, the distributed database is write-protected such that only an authorized GRIP can modify the distributed database. An entity can provide information to a requestor to verify an identity attribute of the entity to the requestor. The requestor uses information provided by the entity to retrieve verified entity identification information from the distributed database and to confirm that the identity attribute was verified by an authorized GRIP.

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR REMOTE AUTHORIZATION OF PAYMENT TRANSACTIONS
20220335424 · 2022-10-20 ·

Provided are computer-implemented methods for event-based communication and messaging that may include receiving transaction data for a transaction from a mobile device controlled by a requesting user, generating a payment request message based on the transaction data, transmitting the payment request message to a first plurality of mobile devices, and determining if at least one payment response message is received from at least one mobile device of the first plurality of mobile devices within a first time period. In some non-limiting embodiments or aspects, the methods may further include transmitting the payment request message to a second plurality of mobile devices, receiving a payment response message including an indication that the transaction is authorized, and processing the transaction using a payment account associated with the mobile device that transmitted the payment response message. Systems and computer program products are also provided.