H04L2209/56

Access Control System for Electric Vehicle Charging
20230005315 · 2023-01-05 ·

An access control system for electric vehicle charging is provided that includes an access device, a secure reservation interface, a reservation server and a smartphone application installed on the smartphone. The access device includes a short-range wireless communication module connected to a processor having control of an electric vehicle charger. The secure reservation interface receives a reservation request for a reservation at a given destination. The reservation server receives the reservation request for the destination, issues a reservation certificate, and transmits the reservation certificate from the reservation server to a smartphone. The smartphone application has access to a short range wireless communication setting corresponding to the access device. The access device receives the reservation certificate from the smartphone application based on use by the smartphone application of the short-range wireless communication setting. The processor activates the electric vehicle charger based on at least the receipt of the reservation certificate.

Systems and Methods for Distributed Encoding and Global Exchange Architecture

Various aspects of the disclosure relate to using a verifiable and distributed encoding as a digital currency (e.g., cryptocurrency). According to some embodiments, systems and methods can be executed to transfer cash or “hard” currency responsive to exchange of cryptocurrency supported by blockchain technology. In further example, the systems and methods are tailored to operate within a specified/defined community that ensures the efficient operation of the system by ensuring liquidity of the transfer. According to one embodiment, the system is configured to distribute stable coin, issuing the coin at a discounted value (e.g., relative to a redemption or cash equivalent face value). For example, by issuing coin at a discount the system automatically facilitates peer-to-peer physical cash transfers.

DEPLOYING PHYSICAL DIAMOND TOKENS ON A BLOCKCHAIN
20230237474 · 2023-07-27 ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

METHOD AND SYSTEM FOR THE SECURE TRANSFER OF ENTITIES ON A BLOCKCHAIN
20230004964 · 2023-01-05 ·

The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a method of: generating a first script, the first script comprising: a first set of metadata associated with a first invitation for the exchange of a first entity by a first user, the first set of metadata comprising an indication of the first entity to be offered for exchange and a first location condition for the exchange, a first user public key (P1A) associated with the first user, wherein the first user public key (P1A) is part of an asymmetric cryptographic pair comprising the first user public key (P1A) and a first user private key (V1A). The script may further comprise and a first third-party public key (P1T) associated with a first third-party, wherein the first third-party public key (P1T) is part of an asymmetric cryptographic pair comprising the first third-party public key (P1T) and a first third-party private key (V1T) The method further comprises the steps of hashing the first script to generate a first script hash and publishing the first script and the first script hash on a distributed hash table (DHT).

METHOD AND SYSTEM FOR IDENTIFICATION OF SHARED DEVICES FOR FRAUD MODELING
20230004981 · 2023-01-05 ·

A method for fraud modeling based on shared computing device usage includes: storing transaction data entries, each including a transaction date and/or time, account identifier, and device identifier associated with a computing device; receiving a transaction message for a payment transaction, the transaction message including a specific device identifier, primary account number, and additional transaction data; identifying transaction data entries where the included device identifier corresponds to the specific device identifier; determining a fraud risk rating based on a number of unique account identifiers included in the identified transaction data entries over a predetermined period of time; and transmitting the transaction message and the determined fraud risk rating to a financial institution associated with the primary account number.

NETWORK CONFIGURATION AND MANAGEMENT
20230006982 · 2023-01-05 ·

An Internet-connected device, such as a car, refrigerator, or even a laptop can use a second device, such as a cell phone, to support cryptographic operations and communication with token service providers or other processing services requiring pre-provisioned capabilities that may include cryptographic secrets. By removing the need to store personally sensitive data in “Internet of Things” (IoT) devices, a user's personal information and other sensitive financial information may be contained to a relatively small number of devices. This may help prevent theft of goods or services by IoT devices that are not always under the close control of the user.

INTEGRATING BIOMETRIC DATA ON A BLOCKCHAIN SYSTEM
20230006831 · 2023-01-05 ·

A method of initiating a transaction in a blockchain system includes receiving, by a processing device, biometric data associated with a first party of a transaction to be added to a block of a blockchain system. The method further includes providing the biometric data to a validation node of the blockchain system. The method further includes determining that the biometric data has been validated by the validation node. The method further includes, in response to determining that the biometric data has been validated, recording, by the processing device, the biometric data in the block of the blockchain system.

SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK
20230237167 · 2023-07-27 · ·

A cloud-based system for securely storing data, the system having a processor which obtains a source data file; splits it into at least three fragments; and uses an encryption key associated with the fragments to encrypt the fragments and distributes the encrypted fragments among at least three cloud storage providers, creates a pointer file containing information for retrieving the encrypted fragments. When a system user requests access to the data, the system uses the information stored in the pointer file to retrieve the stored encrypted fragments from the plurality of clouds; decrypts the fragments and reconstructs the data, and provides data access to the system user.

BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES
20230007002 · 2023-01-05 · ·

Arrangements for controlling access to a protected entity include receiving a redirected client request to access the protected entity that includes a public key of the client; granting, in response to the received redirected request, access tokens of a first type to a client using the public key of the client; identifying a conversion transaction identifying a request to convert the first type of access tokens with access tokens of a second type, the transaction designating the protected entity; determining a conversion value for converting the first-type access tokens into second-type access tokens based on at least one access parameter; converting, using the conversion value, a first sum of the first-type access tokens into a second sum of second-type access tokens; and granting the client access to the protected entity when the sum of second-type of access tokens is received as a payment from the protected entity.

TECHNIQUES FOR SECURING APPLICATION PROGRAMMING INTERFACE REQUESTS USING MULTI-PARTY DIGITAL SIGNATURES
20230006838 · 2023-01-05 ·

A system and method for securing application programming interface (API) requests using multi-party digital signatures. The method includes generating, by a first system, at least one first secret share of a plurality of secret shares based on an API secret, wherein the plurality of secret shares includes the at least one first secret share and at least one second secret share, wherein the at least one second secret share is generated by at least one second system; and signing, by the first system, an API request using the at least one first secret share, wherein the API request is further signed by the at least one second system using the at least one second secret share, wherein the API request is signed without revealing any of the at least one first secret share to the at least one second system and without revealing any of the at least one second secret share to the first system.