G07F7/0826

BLOCKCHAIN TRACKING OF A PHYSICAL DIAMOND TOKEN
20210133728 · 2021-05-06 ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. A user device executes an application programming interface configured to access a blockchain that stores a smart contract associated with the cryptographic token backed by the value of the one or more diamonds. When the user device receives an instruction to perform a transaction related to the cryptographic token, the user device causes the encryption chip to sign the smart contract. In response to determining that the smart contract was signed by the encryption chip, the user device causes the transaction to be performed.

DEPLOYING PHYSICAL DIAMOND TOKENS ON A BLOCKCHAIN
20210133737 · 2021-05-06 ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

DYNAMIC DIAMOND CATALOG SEARCH ENGINE
20210133863 · 2021-05-06 ·

A market maker system associated with a diamond-backed cryptographic exchange stores for each of a plurality of diamonds, a rating of the diamond according to each of multiple properties. The system receives ratings of a target diamond for each of the multiple properties. From the stored diamond ratings, the system selects one or more diamonds with ratings within a threshold distance from a specified rating of the target diamond. A dynamic order listing the selected diamonds is generated.

SMART CABINET WITH WIRELESS SENSORS FOR AUDITING AND AUTHENTICATING OBJECTS STORED THEREIN
20210136576 · 2021-05-06 ·

Described in this application is a secured smart cabinet having a plurality of retractable shelves mounted therein for storing a plurality of assets with wireless encryption chips for authentication sealed with each asset. Each shelf is partitioned into a plurality of compartments configured to hold an asset and to enable wireless communication between a wireless senor and a wireless encryption chip. A processing system is configured to command the wireless sensors to audit, authenticate and interact with the wireless encryption chip in the asset and exchange data between the processing system and an authentication server. The exchange of data could include receiving commands from and sending authentication results to the authentication server. The smart cabinet also includes a network device to enable the exchange of data between the processing system and the authentication server.

SELF-AUTHENTICATING CHIPS

A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is adapted to be unreadable and unmodifiable by the chip or a chip reader. The chip also includes a comparator for providing an indicator of whether given input matches the second authentication code. The chip also includes an authentication circuit that is operable to read the first authentication code from the first memory region, present the first authentication code to the comparator, and in response to receiving an indicator from the comparator indicating that the first and second authentication codes match, unlock at least one of (i) a communication interface of the chip to allow data to be transmitted therethrough to a chip reader and (ii) a third memory region of the chip to allow data to be read therefrom.

Embedded variable line patterns for images

In some implementations, a system is capable of generating identifications that include distinctive line patterns corresponding to different portions of secure customer information. Data indicating an input image, and a dithering matrix representing a two-dimensional array of pixel values is obtained. Pixel values of pixels included in the input image are transformed using the dithering matrix. For each pixel within the input image, the transformation includes identifying a particular pixel value within the dithering matrix that represents a particular pixel within the input image, and adjusting an intensity value of the particular pixel based on attributes of the dithering matrix. A transformed image is generated based on the transformation and then provided for output.

Secure element management and electronic device performing same and installation package

An electronic device includes a secure element in which at least one application package is installed and a processor for communicating with the secure element. The secure element further stores a list with which a part or all of identification information of the at least one application package is registered. The processor controls the secure element such that an application package indicated by the identification information registered with the list is uninstalled, in response to a specified event. Various other embodiments recognized from the specification are also possible.

RISK MITIGATION FOR A CRYPTOASSET CUSTODIAL SYSTEM USING A HARDWARE SECURITY KEY

An approval request is transmitted for a cryptoasset transaction in accordance with a policy stored in a hardware security module (HSM). The policy specifies at least one specific approver required for approval of the cryptoasset transaction. The approval request is transmitted to a computer device associated with the specific approver and is configured to cause the computer device to prompt the specific approver to approve the cryptoasset transaction. A security key is received from a hardware security token associated with the specific approver. The security key indicates an approval of the cryptoasset transaction. A risk analysis module authenticates an identity of the specific approver based on the security key. Responsive to the authenticating of the identity of the specific approver, the HSM signs the cryptoasset transaction using a cryptographic key stored in the HSM.

POWERING FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE
20210035087 · 2021-02-04 ·

There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality.

Secure card not present transactions using chip-enabled cards
10891625 · 2021-01-12 · ·

Techniques are described for performing secure card not present (CNP) transactions using integrated circuit chip-enabled cards. The techniques include continually or periodically tracking a location of a user's card by a user computing device, e.g., a smart phone, and storing a log of datasets relating to the location of the user's card at a server device. Based on the tracking, the user computing device may alert the user via a push notification or other message when the user's card is not within a preset range of the user computing device. In addition, an authentication server determines a location of a purchaser computing device attempting to perform a CNP transaction using the user's card information, and compares the location of the purchaser computing device with a most recent location of the user's card retrieved from the log of datasets to determine whether to approve the CNP transaction.