G06Q2220/145

Mobile wallet systems and methods using trace identifier using card networks

A mobile wallet computer server receives a fund access request from a user device. The fund access request is made in connection with a payment transaction. The mobile wallet server generates a tokenized card number, transmits the tokenized card number to the user device, and receives receive the tokenized card number from a card network computer system after having been routed from the user device via a merchant computer system and via an acquirer processor computer system. The mobile wallet computer server converts the tokenized card number to the actual credit card account number of the user and transmits the actual credit card account number to the card network computer system to process the payment transaction.

MIXD CONTENT DEVICE INCLUDING NON-FUNGIBLE TOKENS (NFTs) AND SYSTEMS FOR PUBLICATION AND DISTRIBUTION
20230153775 · 2023-05-18 ·

A computer-implemented method includes creating a digital media list or collection or digital media files; storing the created digital media list or collection or digital media files on a content device; assigning the content device a unique digital encrypted identification code and store in a database; receiving payment confirmation from a payment processing computing device that a consumer has purchased the content device with the created digital media list or collection or digital media files; and creating shipping information for the purchased content device.

METHOD OF PROVING OWNERSHIP AND OWNERSHIP TRANSFER HISTORY USING DECENTRALIZED ID
20220309514 · 2022-09-29 ·

Provided is a method of proving ownership and an ownership transfer history using a decentralized identifier (DID). The method includes identifying, by a verifier terminal, a product through a DID and identifying an initial producer of the product through the DID, generating, by the verifier terminal, a proof-of-ownership verifiable credential (VC) of the product, which includes metadata including information on the VC, security information (claims) including information on a belonging, and issuing organization electronic signature information (proof) including a digital signature method and a signature value for content certification of the VC, and providing, by the verifier terminal, the generated proof-of-ownership VC of the product to the producer of the product and storing a DID document of the produced product in a decentralized external storage in a decentralized manner.

System and method for servicing customized mobile content
09773226 · 2017-09-26 · ·

Disclosed are a system and a method for servicing a customized mobile content that can allow a user to easily download and use various mobile contents regardless of a type of his/her own terminal by: verifying user information by using metadata and a template that are stored in advance from information published by a content publishing institution, generating a mobile content suitable for types of the content publishing institution and a user terminal and transmitting the generated mobile content to the user terminal, downloading the mobile content through a program for the mobile content installed in the user terminal, and displaying the downloaded mobile content to the user.

Managing rights for installed software applications and items purchased therewith
09760929 · 2017-09-12 · ·

In one example embodiment, a server includes a receiver configured to receive, from a first device, a request to resell an application installed on the first device and an item purchased using the application; a resale manager configured to: issue, to a second device, a resale price of the application and the item, and receive, from the second device, a request to purchase the application and the item; and a rights manager configured to issue, to a user account authenticated on the second device, rights to use the application and the item.

ANTI-FAKE PACKING METHOD FOR PRODUCT LIABILITY INSURANCE

Disclosed is an anti-fake packing method for product liability insurance. The method comprises the following steps: providing an anti-fake electronic liability insurance policy for a product; performing coding to the insurance policy; attaching the code to an insurance policy identifier; disposing the identifier on the product; and correspondingly storing the electronic insurance policy, the anti-fake information and the insurance policy number into the database of an insurance policy claiming system. The consumer, when claiming the electronic insurance policy from the policy claiming system using smart phones, unknowingly identifies the genuineness of the insurance policy. According to the method, a high insurance policy claiming rate is transformed into a high anti-fake inspection rate, thereby improving the anti-fake strength and providing a beneficial technical effect desired by domestic and overseas researchers and developers of anti-fake technologies and insurance technologies.

Laser identification devices and methods

Methods and systems for identification of objects using a laser. Data for an application including transactional data associated with a user is accessed from a computerized database in a system. Systems and methods operate to select objects from an electronic display. In an example, the systems and methods operate to select objects from an electronic display using a handheld laser identification device. In an example, an electronic display is in communication with a database that updates the display of objects displayed on the electronic display.

identification of art /artifacts.
20230325472 · 2023-10-12 ·

I present here methods to have 100 percent identification of an art /artifact at digital format.

Mobile wallet systems and methods

A computer-implemented method for executing a transaction includes receiving, by a card network computer system, an identification number, the identification number being received from an acquirer processor computer system after having been routed from a mobile wallet computer system, via a user device and a merchant computer system, to the acquirer processor computer system. The method also includes transmitting, by the card network computer system, the identification number back to the mobile wallet computer system. The method also includes receiving, by the card network computer system, from the mobile wallet computer system, an approval of the transaction, the approval being generated by the mobile wallet computer system based on a match of the identification number transmitted by the mobile wallet computer system to the user device and the identification number received by the mobile wallet computer system from the card network computer system.

Anti-fake packing method for product liability insurance

Disclosed is an anti-fake packing method for product liability insurance. The method comprises the following steps: providing an anti-fake electronic liability insurance policy for a product; performing coding to the insurance policy; attaching the code to an insurance policy identifier; disposing the identifier on the product; and correspondingly storing the electronic insurance policy, the anti-fake information and the insurance policy number into the database of an insurance policy claiming system. The consumer, when claiming the electronic insurance policy from the policy claiming system using smart phones, unknowingly identifies the genuineness of the insurance policy. According to the method, a high insurance policy claiming rate is transformed into a high anti-fake inspection rate, thereby improving the anti-fake strength and providing a beneficial technical effect desired by domestic and overseas researchers and developers of anti-fake technologies and insurance technologies.