G06Q20/4014

Method and system for post authorization payment of transactions using loyalty points

A method for confirming post-authorization erasure of a transaction payment using reward points includes: storing account profiles including data related to reward accounts, each including an account identifier and point amount; receiving a transaction message associated with a payment transaction, the message including a specific account identifier and transaction amount; identifying a specific account profile that includes the specific account identifier; calculating a point cost based on the transaction amount; identifying an authorization reference key associated with the payment transaction and specific account profile; identifying a unique identifier associated with the authorization reference key; storing an authorization record including authorization reference key and unique identifier; generating a request message including the identified unique identifier one of: the point cost and transaction amount; and transmitting the request message to a consumer associated with the specific account profile.

MERCHANT VERIFICATION IN AN EXCHANGE ITEM MARKETPLACE NETWORK

A method for execution by a marketplace server includes generating, in accordance with a secure custody protocol, a secure block of an exchange item blockchain associated with an exchange item, wherein the secure block includes a public key that indicates a computing device has secure custody of the exchange item, information regarding an exchange item data file associated with the exchange item, and a signature of the marketplace server. The method further includes determining an acquisition process between the computing device and a merchant server requires verification of the merchant server. The method further includes obtaining a verification signature of the merchant server and generating a comparative verification signature. The method further includes determining the verification signature of the merchant server is authentic and facilitating exchange of the secure custody of the exchange item between the computing device and the merchant server in accordance with the secure custody protocol.

METHOD FOR USING AND REVOKING AUTHENTICATION INFORMATION AND BLOCKCHAIN-BASED SERVER USING THE SAME
20170330180 · 2017-11-16 ·

A method for using authentication information is provided. The method includes steps of: (a) a managing server, if a request for using the authentication information is acquired, acquiring a transaction ID corresponding to a specific user's identification information; (b) the managing server acquiring an output of a specific transaction corresponding to the transaction ID from a blockchain; (c) the managing server determining revocation of the authentication information by referring to the output of the specific transaction; and (d) the managing server supporting a communication by providing the specific user's public key in the output of the specific transaction, if the authentication information is not revoked, and if (i) a hash value of the specific user's identification information included in the output of the specific transaction or its processed value corresponds to (ii) a hash value of the specific user's identification information pre-stored in a certain database or its processed value.

METHOD AND SYSTEM FOR CONVERSION OF DIGITAL ASSETS TO FIAT CURRENCY

A method for conversion of digital assets to fiat currency using a secondary blockchain and mirrored accounting includes: receiving transaction data corresponding to a first blockchain transaction processed using a first blockchain, the transaction data including a payer identifier, recipient identifier, and blockchain currency amount; validating an entity as an authorized entity associated with the payer identifier; determining a fiat currency amount based on the blockchain currency amount; generating a second blockchain transaction, the second blockchain transaction including an unspent transaction output, destination address associated with the authorized entity, and the blockchain currency amount and/or the fiat currency amount; confirming addition of the second blockchain transaction to a second blockchain; and initiating a transfer for the fiat currency amount from a first transaction account to a second transaction account, the second transaction account being associated with the authorized entity.

MULTI-FACTOR AUTHENTICATION PROVIDING A CREDENTIAL VIA A CONTACTLESS CARD FOR SECURE MESSAGING
20220360986 · 2022-11-10 · ·

Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.

Transaction Card Assembly
20230169491 · 2023-06-01 ·

A modular transaction card assembly includes a card frame having the traditional dimensions of a credit card, and a transaction card that is smaller than a traditional card and that fits into a receptacle of the card frame. Each of the card frame and the transaction card may be capable of performing contactless data transactions individually. The combined assembly of the card frame with the transaction card secured in the receptacle is also capable of performing contact data transactions, and in some instances, with an identifier that is distinct from the card frame or the transaction card alone. The card frame may include a processor enabling it to perform data encryption and authentication of the smaller transaction card.

DETERMINING AN AUTOMATIC ACQUISITION APPROACH FOR AN EXCHANGE ITEM REQUEST
20230169553 · 2023-06-01 · ·

A method for execution by one or more computing devices of an exchange item marketplace network includes determining an issue regarding an exchange item of an exchange item request between a mobile computing device and a point-of-sale device, where the issue prevents the exchange item request from being executed. The method further includes obtaining a set of acquisition and utilization factors based on one or more of the exchange item request and the issue. The method further includes determining an automatic acquisition approach to resolve the issue based on the set of acquisition and utilization factors, where the automatic acquisition approach includes one or more of acquiring a new exchange item, acquiring a marketplace exchange item, and increasing a quantifiable value of the exchange item. The method further includes executing the automatic acquisition approach to resolve the issue associated with the exchange item request.

DISPLAY FIXTURE CONFIGURATION AND MANAGEMENT SYSTEM
20230169507 · 2023-06-01 ·

Systems and methods for managing a store's displays and for automatically ordering components for such displays. A system includes at least one database of products details regarding each product's various prices, physical packaging dimensions, descriptions, and at least one image of each product. The system allows a user to configure a fixture on which products are to be displayed. Each display fixture can then be provisioned by the user so that the identity of the products to be displayed on each display peg or shelf is displayed. The database may also include a database of the various display fixtures used in the store along with the parts, components, and supplies for those fixtures. The system automatically generates purchase orders and authorization requests if an order is above a certain amount. In the event a request is not addressed within a certain amount of time, the system generates automated reminders.

Method, apparatus and electronic device for identifying risks pertaining to transactions to be processed

A method for identifying a risk pertaining to a transaction to be processed, includes: identifying a risk pertaining to a transaction to be processed via a fast identification layer in a risk control system, thereby obtaining a first identification result; identifying a risk of interference pertaining to the transaction to be processed via a model for identifying transactions susceptible to interference, thereby obtaining a second identification result; and determining a processing manner for the transaction to be processed based on the first identification result and the second identification result, the processing manner including releasing the transaction to be processed, or further identifying the risk pertaining to the transaction to be processed via the in-depth identification layer in the risk control system.

Method and system for single purpose public keys for public ledgers
11263630 · 2022-03-01 · ·

A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.