H04L9/32

PAYMENT METHOD AND SYSTEM THROUGH GENERATION OF ONE-TIME PAYMENT-ONLY NUMBER OF REAL CARD LINKED WITH APPLICATION
20230053310 · 2023-02-16 ·

Provided are a payment method and system through generation of a one-time payment-only number of a real card linked with an application, wherein in order to make payment safely by generating a one-time payment-only number every payment without leaving card information of a user in a provider's payment terminal or by using the generated one-time payment-only number, when a real card is linked with an application installed on a user terminal and the payment terminal recognizes the real card, a user signature input window, and transaction information about payment performed with a one-time payment-only number generated by a card company server are displayed on a screen of the application of the user terminal, and payment is performed when a signature of the user is input to the signature input window.

DISTRIBUTED PRIVATE KEY RECOVERY

A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.

Method of Building and Searching a Multi-dimensional Cross-linked Distributed Ledger
20230050597 · 2023-02-16 ·

A method for creating a link between hyperledger blocks by a block link server. The method comprises receiving by a block link server executing on a computer system a first link creation message from a first network element, the first link creation message comprising first block information comprising a first hyperledger identifier and a first block identifier, both associated with a first hyperledger, receiving by the block link server a second link creation message, comprising second block information comprising a second hyperledger identifier and a second block identifier, both associated with a second hyperledger, storing by the block link server a link data structure comprising the first block information and the second block information, and sending by the block link server a link identifier of the link data structure to the first network element.

THIRD PARTY CERTIFICATE MANAGEMENT FOR NATIVE AND THIRD PARTY MOBILE APPS
20230049095 · 2023-02-16 · ·

Systems and methods are disclosed herein for real-time digital authentication. According to some embodiments, a certification authentication method includes receiving a list of third party root certificates from a remote server, the list of third party root certificates including at least one association between a program configured to run on the computing apparatus and a public key for authenticating communication between the program and an associated server of the program. The method may also include authenticating the list of third party root certificates. The method may also include initiating a communication between the computing apparatus and the associated server and authenticating the communication with the associated server using the public key. Furthermore, the method may also include loading the program onto the one or more memories during a bootstrapping process in response to determining that the communication with the associated server is authentic.

PROVIDENCE CERTIFICATION
20230048293 · 2023-02-16 ·

Implementations generally relate to providence certificates. In some implementations, a method includes generating a first providence certificate digitally signed with a first private encryption key, where the first providence certificate is associated with a first component of a product, and where the first providence certificate provides a first predetermined assurance. The method further includes generating a second providence certificate digitally signed with a second private encryption key, where the second providence certificate is associated with the product, and where the second providence certificate provides the first providence certificate and a second predetermined assurance.

ELECTRONIC DEVICE USING DIVISION PERMISSION AND OPERATION METHOD THEREOF

An electronic device using a division permission and an operating method thereof are disclosed herein. The electronic device includes a processor or a memory storing at least one instruction executable by the processor, and when the at least one instruction is executed by the processor, the processor receives a request for installing a first application on an electronic device, acquires a division permission information corresponding to a signature permission declared by the first application, applies the division permission information to a database, installs the first application. The division permission information may be used for the signature permission on a second application different from the first application.

ANONYMOUS MESSAGE BOARD
20230049001 · 2023-02-16 · ·

A method of facilitating an anonymous message board may include receiving a secret key share associated with a published public key. An initial table state may be generated by encrypting, via the public key, an initial table including a table index and table initial values. A user post encrypted via the public key may be received, the user post including a message and a message index value. The initial table state may be updated to an updated table state by replacing an initial table value of the initial table values with the message. In response to a time interval associated with a predetermined length of time expiring after generating the initial table state, the updated table state may be partially decrypted via the first secret key share as a partially decrypted table. The partially decrypted table may be broadcast.

REMOTE DEVICE LINKAGE FOR SECURE COMMUNICATIONS

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine, such as an automated teller machine (ATM). In particular, the system may assign exclusive control over an automated device to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions. In some embodiments, the system may invoke one or more auxiliary devices on the same network to complete the interaction.

ELECTRONIC SYSTEM FOR GENERATING AND TRACKING LINKED ELECTRONIC DIGITAL CERTIFICATES
20230046692 · 2023-02-16 · ·

Systems, computer program products, and methods are described herein for the generating and tracking linked electronic digital certificates. The present invention may be configured to generate a first electronic digital certificate having first properties and being associated with a first artifact owned by a first group of users, store the first electronic digital certificate, and record first interests of the first group of users in the first electronic digital certificate. The present invention may be configured to receive a request from a second group of users to generate a second electronic digital certificate, where the request includes a subset of the first properties for generation in the second electronic digital certificate. The present invention may be configured to generate the second electronic digital certificate, record second interests of the second group of users in the second electronic digital certificate, and link the first interests and the second interests.

METHOD AND SYSTEM FOR POINT OF SALE PAYMENT USING A MOBILE DEVICE

To conduct a payment transaction at a merchant's point of sale using a mobile device, the mobile device initiates an authenticated communication session with a payment agent. The payment agent is an entity responsible for facilitating a payment transaction between the merchant and purchaser via their respective financial institutions. During the authenticated communication session, response to an input indicating the user of the mobile device wishes to make a payment, the mobile device generates a unique payment key that is based on at least one unique data of the mobile device. The mobile device transmits the payment key to the payment agent, and then transfers a copy of the payment key to the point of sale system. The merchant's payment system that transmits the payment key to the payment agent in a transaction request. The payment agent then verifies that the received payment key is the same as they received from the mobile device, and that the authenticated communication session is still valid, and then approves the transaction.