Patent classifications
G06Q20/3672
Distributed database methods and systems
Data representing ownership of a traditional asset of a first party having a predefined monetary value stored at a first party network node is replicated to a plurality of other party network nodes, including a second party network node, communicably coupled to the first party network node and to one another. Entry of data is received at the first party network node that represents a partition by the first party of the asset of the first party on a non-value axis into at least two non-overlapping assets and a transfer of ownership of one of those two assets to the second party. The data representing the partition of the non-value axis and transfer of ownership of one of the two non-overlapping assets to the second party is replicated to the plurality of other party nodes, including the second party network node.
Secure token distribution
A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.
System and method for inserting data into an internet browser form
Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.
SYSTEMS AND METHODS FOR WIRELESSLY DETERMINING ACCEPTED FORMS OF PAYMENT
Systems and methods are disclosed which may allow a merchant to wirelessly transmit accepted forms of payment using a beacon installed in the merchant location or near the merchant location. A consumer having a device capable of receiving the wireless transmission may receive the accepted forms of payment and have them displayed on a screen of the device. The device may also send the accepted forms of payment to a remote server that has issued the consumer a programmable credit card such that the remote server can program the credit card based on the forms of payment accepted by the merchant.
System and method for cashless exchange at table games
A system includes a smart table that defines a plurality of player positions and that includes a plurality of wireless sensors. Each wireless sensor is associated with a respective player position of the plurality of player positions. The system is configured to determine, using a wireless sensor of the plurality of wireless sensors, that the mobile computing device is located proximate a wireless sensor of the plurality of wireless sensors. The system is further configured to control the wireless sensor to establish a wireless connection between the wireless sensor and the mobile computing device, and receive, from the mobile computing device, via the wireless connection, a player identifier. In addition, the system is configured to determine the respective player position associated with the wireless sensor, in response to determining the respective player position and based on the player identifier, associate the player with the respective player position within a table management database.
Methods and systems for secure cross-platform token exchange
Systems and methods are disclosed for cross-platform token exchange. One method comprises receiving a primary token exchange request from an upstream entity, generating an ancillary detokenization request based on the primary token exchange request, and transmitting the ancillary detokenization request to an input token vault. An ancillary detokenization response comprising sensitive data may then be received from the input token vault, and one or more ancillary tokenization requests may be generated based on the ancillary detokenization response and the primary token exchange request. The one or more ancillary tokenization requests may be transmitted to one or more output token vaults. Subsequently, one or more ancillary tokenization responses may be received from the one or more output token vaults, each ancillary tokenization response comprising an output token. A primary token exchange response may be generated based on the one or more ancillary tokenization responses and transmitted to the upstream entity.
TRANSACTION AUTHORISATION
There is discussed a method of authorising an electronic transaction in which a user device receives a shared secret and a shared secret identifier. Subsequently, on receipt of transaction data from a transaction terminal, the user device calculates a one-way hash of data comprising the shared secret to generate a hash value, generates authentication data comprising the hash value and the shared secret identifier, and transmits the authentication data to the transaction terminal.
CONSUMER AUTHENTICATION SYSTEM AND METHOD
A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized.
TRANSIENT MOBILE WALLETS
A system includes a secondary computing device not owned by a user, a hardware processor, a memory and instructions that cause the processor to generate a transient wallet identifier (ID) for a transient mobile wallet, the transient mobile wallet being of limited duration, and provide a configuration user interface the user, presenting configuration information for the transient mobile wallet. The processor also identifies a usage specification for the transient mobile wallet defining allowed uses for the transient mobile wallet. The processor also activates the transient mobile wallet on the secondary computing device, receives a payment transaction approval request, compares the payment transaction data to the usage specification, determines that the payment transaction data is non-conforming, and transmits a rejection message for the first payment transaction.
Systems and Methods for Distributed Encoding and Global Exchange Architecture
Various aspects of the disclosure relate to using a verifiable and distributed encoding as a digital currency (e.g., cryptocurrency). According to some embodiments, systems and methods can be executed to transfer cash or “hard” currency responsive to exchange of cryptocurrency supported by blockchain technology. In further example, the systems and methods are tailored to operate within a specified/defined community that ensures the efficient operation of the system by ensuring liquidity of the transfer. According to one embodiment, the system is configured to distribute stable coin, issuing the coin at a discounted value (e.g., relative to a redemption or cash equivalent face value). For example, by issuing coin at a discount the system automatically facilitates peer-to-peer physical cash transfers.