H04L2209/56

Systems and methods for facilitating secure streaming of electronic gaming content

A game identifier of an encrypted streaming electronic game to be streamed to a playback device may be received. The game identifier may comprise a title of the encrypted streaming electronic game. An electronic ticket for access by the playback device to a secured portion of the encrypted streaming electronic game may be gathered. The electronic ticket may specify a first gameplay state. The electronic ticket may be used to access the secured portion of the encrypted streaming electronic game at the first gameplay state. One or more gameplay actions to transform the encrypted streaming electronic game to a second gameplay state may be received. The second gameplay state may be provided to a state server, where the state server configured to instruct a license server to modify the electronic ticket to specify the second gameplay state for the encrypted streaming electronic game.

Secure authentication based on physically unclonable functions

The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.

Systems and methods for automatically securing and validating multi-server electronic communications over a plurality of networks
11699154 · 2023-07-11 · ·

In one embodiment, a method includes receiving, at a privacy transaction platform server, from a transaction network server, a transaction approval request associated with a user device and a requesting server including proffered transaction strings and proffered server properties associated with the requesting server, retrieving a privacy transaction record associated with the user device including tagged transaction strings and server properties associated with a provider server, determining that there is a transaction string match between the proffered transaction strings and the corresponding tagged transaction strings, determining that there is a server match between the requesting server and the provider server based on a validity metric for the transaction approval request exceeding a specified confidence threshold based on an analysis of the proffered server properties and the provider server properties, and transmitting, to the transaction network server, a validation response approving the requested transaction.

Multi-merchant loyalty point partnership

A blockchain-based multi-merchant loyalty point partnership system may include a blockchain API host that receives a request to create a partnership smart contract for a multi-merchant loyalty point partnership. The request may specify various partnership parameters to include in the partnership smart contract. The blockchain API host may create the partnership smart contract and write the partnership smart contract to a blockchain. One or more qualified merchants may join the partnership smart contract to make the partnership active. In response to a customer completing a plurality of purchases that complete the partnership parameters of the partnership smart contract, the system may issue the customer a purchase reward which may include a loyalty point payout.

Cryptocurrency mining selection system and method

A system and method of optimizing cryptographic mining yields includes analyzing, by a cryptocurrency mining selection system, data associated with factors of interest for one or more cryptocurrencies using machine learning algorithms. Data that is determined to be predictive of the future value of newly mined tokens is used to determine which tokens will have the highest and lowest future values. Based on the predicted value of tokens in the future and the current value of those tokens for each cryptocurrency, the system outputs one or more instructions to buy tokens in cryptocurrencies predicted to increase in value, to sell tokens in cryptocurrencies predicted to decrease in value, and to instruct associated cryptocurrency mining hardware to switch to generating new tokens in one or more selected cryptocurrencies to maximize yields.

Systems and methods for user authentication based on a genetic sequence
11700249 · 2023-07-11 ·

There is provided a system for creating a cryptographic non-fungible identity unique token (IUT), comprising code for: obtaining a private key linked to a public address of an electronic wallet, associated with a wallet address, obtaining a digital representation of a hashed genetic sequence of a user and an associated wallet address of the electronic wallet, storing in the cryptographic non-fungible IUT, an IUT identifier, the IUT identifier is an outcome of hashing a subset of the hashed digital representation and a unique password, storing the IUT in a genetic sequence record stored in a block of a blockchain dataset, wherein the genetic sequence record is associated with the IUT, the IUT is associated to the wallet address, wherein the user is authenticated by a match between a computed value of a password and the wallet address provided by the user, and the IUT identifier stored on the blockchain.

Body area network facilitated authentication or payment authorization

Disclosed are examples of a method, a wearable device and a system enabling authentication of a user of a payment account or completion of a purchase transaction via signals generated by the wearable device. A process may include a wearable device generating a modulated signal using an encryption algorithm. The modulated signal may contain authentication information related to the wearable device including a cryptographic authentication message. The modulated signal is output to a biological medium interface of the wearable device that is coupled to a biological medium of a wearer of the wearable device. The biological medium is operable to conduct the modulated signal. A receiving device processes including decrypting and demodulating the modulated signal received from the biological medium. Using the demodulated signal, the authentication information transmitted from the wearable device is obtained. Based on the obtained authentication information, a transaction may be authorized, or a user authenticated.

Reducing false positive fraud alerts for online financial transactions

In a method of preventing fraudulent online financial transactions, a request to authorize an online, financial transaction may be received, where the transaction is associated with a debit or credit card account. A computing device at which information associated with the debit or credit card account was entered for the transaction may be identified, and a first geographic location at which the computing device resides may be determined. Based upon geolocation data indicating one or more geographic locations of the authorized cardholder, it may be determined that the authorized cardholder was at a second geographic location at a time of the transaction. If the second geographic location does not correspond to the first geographic location, the financial transaction may be prevented from being executed.

A SYSTEM FOR DIGITAL ASSET EXCHANGE, A DIGITAL WALLET AND AN ARCHITECTURE FOR EXCHANGING DIGITAL ASSETS
20230011788 · 2023-01-12 ·

A system for digital asset exchange, a digital wallet and an architecture for exchanging digital assets. The system for digital asset exchange includes an interface arranged to receive digital asset transaction requests from a user; and a gateway arranged to communicate with one or more exchanges to process the digital asset transaction requests.

Systems and methods for privacy-preserving inventory matching

Systems and methods for privacy-preserving inventory matching are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for inventory matching may include: (1) receiving, from each of a plurality of clients, a masked submission comprising an identification of at least one security to buy or sell and a desired quantity to buy or sell; (2) aggregating the masked submissions resulting in a sum of the desired quantities to buy or sell; (3) matching at least two of the clients to conduct a transaction based on aggregation and their respective masked submissions; and (4) conducing the transaction between the matched clients.