Patent classifications
G06Q20/3823
Multi-party encryption cube processing apparatuses, methods and systems
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an operation preference and a cryptographic preference. A data set is stored based on the operation preference and the cryptographic preference. A determination is made that processing the query involves performing an allowable operation on the data set based on the operation preference.
SYSTEMS AND METHODS FOR BLOCKCHAIN BASED PROOF AND PAYMENT
A proof-of-payment system that allows smart connected devices to confirm a payment information. In one example, a smart connected device that comprises a computing device and program instructions. The program instructions, when executed by the processor, cause the computing device to at least retrieve an encrypted proof-of-payment (PoP) payload from a blockchain and decrypt the encrypted PoP payload to retrieve a first identifier from the encrypted PoP payload. The first identifier from the decrypted PoP payload is matched to a second identifier presented at the smart connected device. An action is triggered in response to the first identifier from the encrypted PoP payload matching the second identifier presented at the smart connected device.
BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES
Arrangements for controlling access to a protected entity include receiving a redirected client request to access the protected entity that includes a public key of the client; granting, in response to the received redirected request, access tokens of a first type to a client using the public key of the client; identifying a conversion transaction identifying a request to convert the first type of access tokens with access tokens of a second type, the transaction designating the protected entity; determining a conversion value for converting the first-type access tokens into second-type access tokens based on at least one access parameter; converting, using the conversion value, a first sum of the first-type access tokens into a second sum of second-type access tokens; and granting the client access to the protected entity when the sum of second-type of access tokens is received as a payment from the protected entity.
System, Method, and Apparatus for Securely Transmitting Data via a Third-Party Webpage
Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.
Method for high-performance traceability query oriented to multi-chain data association
The present invention relates a method for high-performance traceability query oriented to multi-chain data association, comprising: identifying a target transaction needing the traceability query; searching out all corresponding target chains based on cross-chain transaction data association; making query requests parallelly; and executing the query among the target chains according to a key value of the target transaction and returning query results. The blockchain traceability query method proposed by the present invention is different from serialized block data query conducted in the chain-type structure, and the disclosed cross-chain query operation can be parallelly executed, leading to improved efficiency of traceability query. Opposite to the conventional blockchain where blocks are used as nodes of chains, the present invention directly uses sub blockchains as nodes of the SRB. Since sub blockchains can be dynamically added or removed, the present invention enhances the scalability of the entire system.
Electronic system and computerized method for verification of transacting parties to process transactions
The present disclosure generally relates to electronic systems and computerized methods for verification of transacting parties to process transactions. A payment network server receives details of a transaction fulfilled by an agent and generates a transaction identification plaintext. A first party keyset for the first transacting party and an agent keyset for the agent is identified. The server generates cryptograms and ciphertexts encrypted by the first party keyset and agent keyset and sends the cryptograms to the first transacting party and agent. An encrypted cryptogram contains an encrypted ciphertext which contains a plaintext representing the transaction identification plaintext. The ciphertexts are exchanged between the first transacting party and agent by a computer handshake for decryption. The plaintexts are extracted from the ciphertexts and compared against the transaction identification plaintext for verifying the first transacting party and agent.
SYSTEM AND METHOD FOR DEVICE MANAGEMENT OF INFORMATION HANDLING SYSTEMS USING CRYPTOGRAPHIC BLOCKCHAIN TECHNOLOGY
According to one embodiment, a computing environment having multiple Information Handling Systems (IHSs), each having one or more field replaceable units (FRUs) and a ledger of a blockchain. Each IHS includes computer-executable instructions to receive a signal indicating that one of the FRUs has been removed, obtain unique identifying information about the removed FRU, and generate a new block to the blockchain indicating that the one FRU has been removed from the IHS. Additionally, the instructions may receive a signal indicating that another FRU has been added, obtain unique identifying information about the added FRU, and generate a new block to the blockchain indicating that the one FRU has been added to the IHS.
Interoperable mobile-initiated transactions with dynamic authentication
A transaction is pre-staged by providing transaction preferences, such as a financial instrument, a transaction type, and a transaction amount, to a user device. The user device captures a visual code at a terminal, such as an ATM. The visual code includes terminal attributes, including a signed hash and call-back URI. The user device authenticates the visual code using the signed hash and requests the transaction through the issuer server. The issuer server creates and sends the card data to the call-back URI. The terminal uses the card data to create a transaction request it routes to through its acquirer server.
Contactless card with multiple rotating security keys
A contactless card can include a plurality of keys for a specific operation, e.g., encryption or signing a communication. The contactless card can also include an applet which uses a key selection module. The key selection module can select one of the plurality of keys and the applet can use the key to, e.g., encrypt or sign a communication using an encryption or signature algorithm. The contactless card can send the encrypted or signed communication to a host computer through a client device. The host computer can repeat the key selection technique of the contactless device to select the same key and thereby decrypt or verify the communication.
OFFLINE COIN PROTOCOL
Methods, apparatus and systems for verifying coin ownership are disclosed. In an embodiment, a coin service provider identifies an online session initiated by a wallet application and a next coin to verify, receives information associated with the next coin from a wallet application, determines that ownership of the next coin was transferred out of the wallet application since the last time coins in the wallet application were verified and that ownership of the next coin has not been updated in a coin data store. The coin service provider then transmits a prompt to the user device for the user to confirm that a transaction involving the next coin completed successfully, receives a confirmation message from the user device, confirms that the next coin was received by a recipient, and next updates ownership information of the next coin in the coin data store.