US20170053249A1 - Electronic Crypto-Currency Management Method and System - Google Patents
Electronic Crypto-Currency Management Method and System Download PDFInfo
- Publication number
- US20170053249A1 US20170053249A1 US15/225,780 US201615225780A US2017053249A1 US 20170053249 A1 US20170053249 A1 US 20170053249A1 US 201615225780 A US201615225780 A US 201615225780A US 2017053249 A1 US2017053249 A1 US 2017053249A1
- Authority
- US
- United States
- Prior art keywords
- crypto
- processing component
- currency
- transaction
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/68—Gesture-dependent or behaviour-dependent
Definitions
- the present invention relates generally to crypto-currencies. More particularly, the present invention relates to a secure mobile device capable of managing crypto-currency accounts, balances and transactions in addition to normal electronic smart wallet functions.
- a crypto-currency is a virtual currency that uses cryptography for security, making it difficult to counterfeit while allowing for nearly anonymous financial transactions between two parties using private and public keys.
- Crypto-currencies are not issued by a central authority, theoretically rendering it immune to interference or manipulation.
- the primary drawbacks are theft of the private key thereby allowing the attacker to assume control of the associated crypto-currency “wallet”, and the loss of the private key due to a software or hardware failure thereby rendering the crypto-currency “wallet” orphaned and its contents irretrievable, even by the owner.
- US published patent application number 20140244506 entitled “Dynamic Payment Authorization System and Method” allows a user to locally authenticate their identity to a mobile device and then authorize a financial transaction against their physical account. The mobile device then receives either an approval or disapproved code, which will be compared to the transaction code received by the vendor's POS (point of sale) terminal prior to actually committing the payment transaction.
- US published patent application 20130117185 entitled “Method for conducting a transaction between a merchant site and a customer's electronic device without exposing payment information to a server-side application of the merchant site” allows use of a mobile device to send electronic payment information stored on the device to a payment processor which then creates a token based on the information it received from the mobile device; the token is then delivered to the server-side application to be used in actually conducting the financial transaction.
- U.S. Pat. No. 8,712,918 entitled “Electronic Currency, Electronic Wallet Therefor and Electronic Payment Systems Employing Them” allows for a user to use a mobile device, into which they have already transferred funds electronically from physical financial accounts, to purchase goods or services from a vendor without having to contact the original financial institution to authorize the transaction as the actual electronic currency is held within the mobile device.
- US published patent application 20130166455 entitled “Creating and Using Digital Currency” allows for creation of a physical device or medium that carries a value that can be transferred to a digital domain and is protected by a physical, state-changing tamper device that indicates the device's security state.
- U.S. Pat. No. 8,041,338 entitled “Mobile Wallet and Digital Payment” allows for use of a mobile device to act as one or more mobile payment cards by establishing a link between each mobile payment card and form of currency.
- the payments from this mobile device may employ public-key cryptography to securely transmit payment information wirelessly.
- US published patent application 20060165060 entitled “Method and Apparatus for Managing Credentials Through a Wireless Network” generally outlines the use of a mobile device as a digital wallet that holds cryptographic credentials issued from a financial institution, directly to the device, which in turn can be used to authorize financial transactions at Point of Sales terminals via wireless or other means.
- U.S. Pat. No. 6,157,920 entitled “Executable Digital Cash for Electronic Commerce” allows for a very simplified version of crypto-currency that is protected only by a digital certificate.
- This digital cash is generated by the first user as a type of offer and accepted by a second user using either a computer or mobile device running specific software capable of accepting the offered digital cash from the first user.
- the present invention describes a system and method, that is superior to the prior art, for a new and novel way to effect real-time value transfers using a mobile device and any other device (e.g. automated teller machine, point of sale system, self-service kiosk, personal computer, mobile phone, etc.) over one or more financial networks during a single financial transaction, thereby enabling users to convert a plurality of financial instruments (e.g. cash, check, payment card, crypto-currency, money order, cash voucher, E-coupon, virtual currency, etc.) into a ‘virtual cash token’ which is readily convertible into cash or a cash equivalent that is more universally accepted by merchants and other parties.
- a plurality of financial instruments e.g. cash, check, payment card, crypto-currency, money order, cash voucher, E-coupon, virtual currency, etc.
- Embodiments of the present invention disclosed herein describe methods and systems whereby an electronic smart-wallet device or application can be used by an individual to manage not only all of their conventional financial instruments (e.g. debit cards, check cards, credit cards, etc.), loyalty cards, and membership cards, but also provides secure management for a plurality of crypto-currency accounts. These attributes facilitate the real-time use of one or more crypto-currencies for making a payment, receiving crypto-currency payments, and crypto-currency exchange (e.g. cash to crypto-currency, crypto-currency to cash, crypto-currency to a different crypto-currency, etc.).
- crypto-currency exchange e.g. cash to crypto-currency, crypto-currency to cash, crypto-currency to a different crypto-currency, etc.
- novel techniques and devices employed by the present invention seamlessly integrate accounts, assets and credentials, further facilitate their use as well as their security.
- the user has a uniform experience that is easy to learn without sacrificing security, while protecting the user from loss, theft, and fraud.
- FIG. 1 illustrates devices and their associated interconnects as associated with the present invention.
- FIG. 2 illustrates a user ( 100 ) unlocking a smart wallet ( 101 ) using multifactor authentication.
- FIG. 3 describes the general flow of events and actions when a user unlocks a device ( 120 ), selects that they wish to create a new payment transaction ( 121 ) and selects which account they wish to use for the transaction ( 122 ).
- FIG. 4 generally describes how a user ( 100 ) can select a crypto-currency, such as but not limited to bitcoin, directly to a recipient ( 128 ).
- a crypto-currency such as but not limited to bitcoin
- FIG. 5 shows the general process of the user ( 100 ) using their smart wallet ( 101 ) to purchase more crypto-currency from a crypto-currency exchange ( 130 ) with one of the user's ( 100 ) bank ( 129 ) accounts configured on the smart wallet ( 101 ).
- FIG. 6 illustrates generally how a user's ( 100 ) smart wallet ( 101 ) synchronizes its local block chain ( 132 ) with the full public block chain ( 131 ) by utilizing the User's ( 100 ) smart phone, laptop, desktop, or other computer platform ( 133 ) connected to the Internet ( 127 ).
- FIG. 7 illustrates a transaction ledger synchronization process
- FIG. 8 illustrates an overview of an outgoing payment transaction.
- references to “one embodiment,” “an embodiment,” “example embodiment,” “various embodiments,” etc. may indicate that the embodiment(s) of the invention so described may include a particular feature, structure, or characteristic, but not every embodiment necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrase “in one embodiment,” or “in an exemplary embodiment,” do not necessarily refer to the same embodiment, however, in some instances they may.
- a commercial implementation in accordance with the spirit and teachings of the present invention may be configured according to the needs of the particular application, whereby any aspect(s), feature(s), function(s), result(s), component(s), approach(es), or step(s) of the teachings related to any described embodiment of the present invention may be suitably omitted, included, adapted, mixed and matched, or improved and/or optimized by those skilled in the art, using their average skills and known techniques, to achieve the desired implementation that addresses the needs of the particular application.
- a “computer” may refer to one or more apparatus and/or one or more systems that are capable of accepting a structured input, processing the structured input according to prescribed rules, and producing results of the processing as output.
- Examples of a computer may include non-limiting examples such as: a computer; a stationary and/or portable computer; a computer having a single processor, multiple processors, or multi-core processors, which may operate in parallel and/or not in parallel; a general purpose computer; a supercomputer; a mainframe; a super mini-computer; a mini-computer; a workstation; a micro-computer; a server; a client; an interactive television; a web appliance; a telecommunications device with internet access; a hybrid combination of a computer and an interactive television; a portable computer; a tablet personal computer (PC); a personal digital assistant (PDA); a portable telephone; application-specific hardware to emulate a computer and/or software, such as, for example, a digital signal processor (DSP), a field-programmable gate array (F
- Software may refer to prescribed rules to operate a computer. Examples of software may include: code segments in one or more computer-readable languages; graphical and or/textual instructions; applets; pre-compiled code; interpreted code; compiled code; and computer programs.
- a “computer-readable medium” may refer to any storage device used for storing data accessible by a computer.
- Non-limiting examples of a computer-readable medium may include: a magnetic hard disk; a floppy disk; an optical disk, such as a CD-ROM and a DVD; a magnetic tape; a flash memory; a memory chip; and/or other types of media that can store machine-readable instructions thereon.
- a “computer system” may refer to a system having one or more computers, where each computer may include a computer-readable medium embodying software to operate the computer or one or more of its components.
- Non-limiting examples of a computer system may include: a distributed computer system for processing information via computer systems linked by a network; two or more computer systems connected together via a network for transmitting and/or receiving information between the computer systems; a computer system including two or more processors within a single computer; and one or more apparatuses and/or one or more systems that may accept data, may process data in accordance with one or more stored software programs, may generate results, and typically may include input, output, storage, arithmetic, logic, and control units.
- a “network” may refer to a number of computers and associated devices that may be connected by communication facilities.
- a network may involve permanent connections such as cables or temporary connections such as those made through telephone or other communication links.
- a network may further include hard-wired connections (e.g., coaxial cable, twisted pair, optical fiber, waveguides, etc.) and/or wireless connections (e.g., radio frequency waveforms, free-space optical waveforms, acoustic waveforms, etc.).
- Examples of a network may include: an internet, such as the Internet; an intranet; a local area network (LAN); a wide area network (WAN); and a combination of networks, such as an internet and an intranet.
- Exemplary networks may operate with any of a number of protocols, such as Internet protocol (IP), asynchronous transfer mode (ATM), and/or synchronous optical network (SONET), user datagram protocol (UDP), IEEE 802.x, near field communication (NFC), BluetoothTM, WiFiTM, etc.
- IP Internet protocol
- ATM asynchronous transfer mode
- SONET synchronous optical network
- UDP user datagram protocol
- NFC near field communication
- BluetoothTM WiFiTM
- WiFiTM WiFiTM
- Embodiments of the present invention may include apparatuses for performing the operations disclosed herein.
- An apparatus may be specially constructed for the desired purposes, or it may comprise a general-purpose device selectively activated or reconfigured by a program stored in the device.
- Embodiments of the invention may also be implemented in one or a combination of hardware, firmware, and software. They may be implemented as instructions stored on a machine-readable medium, which may be read and executed by a computing platform to perform the operations described herein.
- computer program medium and “computer readable medium” may be used to generally refer to media such as, but not limited to, removable storage drives, a hard disk installed in hard disk drive, and the like.
- These computer program products may provide software to a computer system. Embodiments of the invention may be directed to such computer program products.
- An algorithm as referred to herein is generally considered to be a self-consistent sequence of acts or operations leading to a desired result. These include physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers or the like. It should be understood, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
- processor may refer to any device or portion of a device that processes electronic data from registers and/or memory to transform that electronic data into other electronic data that may be stored in registers and/or memory.
- a “computing platform” may comprise one or more processors.
- a non-transitory computer readable medium includes, but is not limited to, a hard drive, compact disc, flash memory, volatile memory, random access memory, magnetic memory, optical memory, semiconductor based memory, phase change memory, optical memory, periodically refreshed memory, and the like; however, the non-transitory computer readable medium does not include a pure transitory signal per se.
- the invention described herein consists of a system and method to manage a plurality of traditional financial accounts and crypto-currency accounts including initiating transfers, currency exchanges, submitting payments, and receiving payments.
- a local, abbreviated block chain is synchronized for crypto-currency transactions and balance validation to enable online shopping and retail store crypto-currency transactions from a local smart wallet device (e.g., a smart walled, a smart phone), just as transactions with other traditional financial accounts such as but not limited to credit, debit, bank, and other financial accounts.
- a local block chain is synchronized for crypto-currency transactions and balance validation to enable online and retail crypto transactions, for example, along with access to traditional financial accounts such as but not limited to credit, debit, bank, and other financial accounts.
- This novel approach enables users to authorize the transfer of crypto-currency while offline, while also controlling how and when that data transfer is completed via innovative synchronization of data from the block chain of a crypto-currency device.
- a smart wallet may be protected by a variety of means including one or more private keys, PINs (personal identification numbers), dynamic pairing passwords, symmetric and asymmetric authentication codes, and/or pattern, behavior, or biometric recognition, etc.
- local authentication may not only be used to secure the private information such as account or crypto-currencies, but also personalize the transaction by utilizing the same local authentication to perform remote authentication to approve a transaction, in some embodiments.
- the present invention does not store the block chain per se or a direct copy of it. Instead, the present invention stores an account specific transaction ledger (also referred to as an account specific differential transaction ledger) that is derived from information available in the public block chain. Storing only the “differential” updates to the smart device from the user's computer greatly reduces the CPU and storage requirements of the smart device.
- This method prevents theft, such as the historic crypto-currency theft at Mt GOX, when an owner has a single internet-based wallet that only provides a payment/account address and performs all of the transaction matching in the background. Centralization of all crypto-currency in one purse puts coin at risk, where coin can only be recognized apart from each other by looking at the address to which they were sent.
- a local, abbreviated block chain in effect, a account specific differential transaction ledger
- balance validation enables online shopping and retail store crypto-currency transactions from a local smart wallet device (typically having limited processing power and memory), just as transactions with other traditional financial accounts, such as but not limited to credit, debit, bank, and other financial accounts.
- This invention not only supports storage and selection of multiple accounts and currencies, but also combining multiple currencies to execute a single transaction or transfer. Such examples might include combining an amount of Bitcoin plus an amount of Litecoin to equal a full transaction amount.
- a non-transitory computing device such as a server may be used in conjunction with said transaction to in turn, relegate how each currency is converted and combined. This unique ability leads to further decentralizing crypto-currency transactions by spreading the source of the funds between different exchanges, countries, and wallet IDs, etc.
- FIG. 1 illustrates the general, non-limiting scope of the invention.
- a user ( 100 ) is able to use the smart wallet ( 101 ) to manage a plurality of credit cards ( 102 ), debit/check cards ( 103 ), loyalty & rewards cards ( 104 ), and crypto-currency wallets ( 105 ).
- Management functions include, but are not limited to, viewing balances ( 106 ), credit & overdraft line limits ( 107 ), reviewing historical transactions ( 108 ) or creating new transactions ( 108 ), and viewing rewards/discounts/coupons ( 109 ).
- the user's brokerage account balance is updated. Now the user can either send the crypto-currency directly to the VPN provider (which requires registering their information with the CC-Exchange) or the user can transfer it to their local crypto-currency wallet and then to the VPN provider.
- a user may unlock their mobile device and then select to transfer funds from a checking account into a crypto-currency wallet, while subsequently selecting to pay an online vendor for VPN service using crypto-currency such as but not limited to Bitcoin.
- This transaction flow protects the user's normal financial accounts from disclosure to the VPN vendor as well as providing a level of anonymity for the user.
- the smart wallet device and the configured accounts a granular security model (where granular security refers to the number of different log-in credentials that are required) protects assets, and sensitive information it contains.
- Security may be configured based on one or more of a plurality of physical conditions including, but not limited to, graphical location, time of day, and smart wallet device serial number.
- Security may be configured on a plurality of user supplied authentication mechanisms including, but not limited to fingerprints, PIN codes, voice, sounds, face, iris, heartbeat, scent, challenge response questions, and pass phrases.
- Security may be additionally controlled by the usage of white-lists and black-lists for a variety of parameters including, but not limited to vendor/payment-recipient, time of day, geo-location, account balances, and transaction value/amount.
- vendor/payment-recipient for a variety of parameters including, but not limited to vendor/payment-recipient, time of day, geo-location, account balances, and transaction value/amount.
- FIG. 2 shows a user ( 100 ) unlocking a smart wallet ( 101 ) by using multifactor authentication, which in this case, includes a fingerprint ( 110 ), voice recognition ( 111 ), and a manually entered PIN code ( 112 ).
- multifactor authentication which in this case, includes a fingerprint ( 110 ), voice recognition ( 111 ), and a manually entered PIN code ( 112 ).
- the user ( 100 ) has access to menu items such as transactions ( 108 ), accounts ( 113 ), and configuration ( 114 ).
- Some of the configuration ( 114 ) settings may include device authentication settings ( 115 ), non-centralized backup & restore ( 116 ), and security settings ( 117 ).
- Some of the options available from the accounts ( 113 ) could be security settings ( 117 ), new transactions ( 118 ), and historical transactions ( 119 ).
- Options available from the transactions ( 108 ) include new transactions ( 118 ) and historical transactions ( 119 ).
- Authentication methods may include local authentication and/or remote authentication to validate user ownership of the smart wallet ( 101 ) as well as implement a method to cryptographically secure wipe user data and de-activate the device in the event the device has been reported lost or stolen or if multiple invalid log-in attempts have been made.
- the system may also implement a master code capable of re-activating the device to a factory default state in which no user information is available within the device.
- security settings for the device can be configured independently allowing for greater granularity in securing the device itself and the information contained within the device.
- the user can configure the device where it could be unlocked using only a PIN code, while access to debit/checking accounts require a PIN code and a fingerprint, and access to credit cards requires a PIN Code, a fingerprint, and can only be accessed between 5 AM and 11 PM.
- FIG. 3 describes the general flow of events and actions when a user unlocks a device ( 120 ), such as but not limited to a mobile or wearable device, selects that she wishes to create a new payment transaction ( 121 ), and selects which account she wishes to use for the transaction ( 122 ).
- the account access information is then checked by the smart wallet to ensure the predefined security requirements for access have been met ( 123 ). If the requirements have not been met the user is prompted to select a different account or to provide additional authentication factors to match or override the security rules.
- the user can then present payment to the vendor by using any of the available methods accepted by the vendor (e.g. Magnetic Stripe, Wireless Magnetic Strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, Antenna, WiFi, QR Code, and the like.) ( 124 ). Payment methods can be selected on the present device or the payment information is sent to another “payment” device to conduct the transaction. The transaction information is then transmitted to a payment processor for approval ( 125 ).
- the vendor e.g. Magnetic Stripe, Wireless Magnetic Strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, Antenna, WiFi, QR Code, and the like.
- FIG. 4 generally describes how a user ( 100 ) can select and send a crypto-currency, such as but not limited to Bitcoin, directly to a recipient ( 128 ).
- a crypto-currency such as but not limited to Bitcoin
- the recipient ( 128 ) sends the user ( 100 ) the crypto-currency wallet address via any available method, including but not limited to Magnetic Stripe, Wireless Magnetic Strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, Antenna, WiFi, QR Code, and the like.
- the user ( 100 ) selects an account on their smart wallet ( 101 ) to use to send the funds via the Internet ( 127 ) so that the transaction can be validated via the crypto-currency block chain.
- the validation of the transaction sending crypto-currency to the another user is still accomplished through the public block chain, but the “reception” of that payment on the recipient's or user's device is validated using the “account specific differential transaction ledger” as referred to above.
- This validation process occurs on the smart wallet ( 101 ).
- This feature is unlike the prior art, wherein validation of the transaction via the block chain is executed on a computer/server/processor having sufficient processor “horsepower” to carry out the validation in a relatively short time. Generally smart phones lack such processor “horsepower” and validating the block chain before executing the transaction may require several days.
- the crypto-currency is deposited in the recipient's ( 128 ) crypto-currency wallet and a notification is issued by the recipient's ( 128 ) smart wallet ( 101 ) once it detects the change in the balance of the crypto-currency wallet.
- FIG. 5 shows the general process of the user ( 100 ) using their smart wallet ( 101 ) to purchase more crypto-currency from a crypto-currency exchange ( 130 ) with one of the user's ( 100 ) bank ( 129 ) accounts configured on the smart wallet ( 101 ).
- the user ( 100 ) initiates the transaction by selecting the appropriate financial institution to fund the crypto-currency purchase, then executes the purchase with one of the many crypto-currency exchanges.
- the purchase is then sent through the Internet ( 127 ) for validation prior to being deposited into the user's ( 100 ) crypto-currency wallet, which then appears as a new balance on the user's ( 100 ) smart wallet ( 101 ).
- the new value of the crypto-currency wallet is then immediately available to fund other transactions.
- FIG. 6 shows a very general method of how a user's ( 100 ) smart wallet ( 101 ) synchronizes its local block chain ( 132 ) with the full public block chain ( 131 ) by utilizing the user's ( 100 ) smart phone, laptop, desktop, or other computer platform ( 133 ) connected to the Internet ( 127 ).
- the smart wallet ( 101 ) connects to the computing platform ( 133 )
- it verifies the state of its latest transactions and determines if the local block chain ( 132 ) needs synchronization. It is important to note that without updating the local block chain ( 132 ) on the smart wallet ( 101 ) there is no other way of securely verifying transactions and balances of crypto-currency wallets.
- a user may accept direct payment for an item or service from an individual or entity by using the mobile device's display to show the QR-Code (or another known code format) of the crypto-currency wallet address into which they wish to receive the payment.
- the payor using another device, then scans the visual code from the user's device in order to transfer funds to the payee.
- the user could also wirelessly transmit their wallet address to the payor (via a magnetic stripe, wireless magnetic strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, antenna, WiFi, QR Code, and/or magnetic loop as non-limiting examples), or record their wallet address to a magnetic stripe that could then be received or read by the payor.
- a magnetic stripe wireless magnetic strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, antenna, WiFi, QR Code, and/or magnetic loop as non-limiting examples
- a user may unlock a device and decide to transfer all or some of their LiteCoins and DodgeCoins (or other crypto-currencies) into their BitCoin wallet at the current exchange rate, thereby consolidating funds and possibly taking advantage of favorable exchange rates or funding their account prior to conducting a financial transaction.
- an individual, using their smart wallet device could send Bitcoin or other crypto-currencies to their child, spouse, or friend living in a foreign country that the receiving individual, using their electronic smart wallet, could then use to pay bills either directly with the crypto-currency or by exchanging the crypto-currency into locally accepted currency via a financial institution configured in their smart wallet.
- Such a scenario securely bypasses international banking fees and exchange rates while providing almost instantly available funds to the receiving party and proof of delivery to the sender.
- the electronic smart wallet's security and usage features can be applied to the crypto-currency wallets contained therein such that wallets can only be opened and utilized in transactions when one or more criteria are met.
- the user must provide at least three factors of authentication before the wallet can be opened (e.g.
- transactions can only be performed if they meet certain criteria such as the amount is below a preset limit, the recipient is on a white-list of recipients, the recipient is not on a black-list of recipients, the user is within a certain area (geo-fencing), the transaction is being conducted between certain hours, or the balance of the drawing account is above a predefined limit, etc.
- An additional non-limiting embodiment of the disclosed invention is it's novel handling of the crypto-currency block-chain (the underlying technology that makes crypto-currencies secure and validates transactions) which reduces the storage space requirements and minimizes the impact on battery life for the mobile device.
- the block chain may be considered a “rolling” hash. If one does not have the very first transaction (the start of the block chain) then you cannot validate the last transaction (the end of the block chain). If one retained only the tail end of the block chain, one could only validate transactions up to but not including, the first transaction in the retained segment of the chain. Thus someone could in theory tamper with the short/abbreviated retained block chain segment and thereby lead you to believe certain transactions have occurred.
- the real power of the block chain is derived from its unwieldy size, making it relatively impossible for anyone to tamper with the transaction history due to the requirement of re-calculating the hash of every transaction that has occurred since the time of their “modified” transaction. The more transaction history in the chain, the harder it is to fake it!
- the block chain size for Bitcoin exceeds 30 GB (Gigabytes)
- the user would be required to download the entire block-chain, which could take from many hours to several weeks, while the smart device is plugged into an electrical outlet or charger to ensure adequate power is available during the entire block chain download. Only after the entire block chain has been downloaded to the smart device, can crypto-currency transactions be validated and therefore executed using the smart phone.
- this initial synchronization of the block chain using a dual-core desktop computer with a dedicated, high-speed Internet connection (50 Mbps) takes approximately 1-CPU-Day to process one (1) weeks worth of block chain transactions.
- Processing requirements will only increase as the transaction volume grows by the broader acceptance of Bitcoin (or other crypto-currencies), and the processing load outlined above is only for one of many crypto-currency block chains.
- the user can complete the device setup in a matter of minutes and requires only minimal synchronization of the block code thereafter.
- the synchronization requires that only those crypto-currency transactions that affect the presently-contemplated transaction using the smart device need to be downloaded to the smart device.
- a software application on the user's desktop, laptop, or mobile device that manages a NXT-ID (assignee of the present application) proprietary synchronization process between the mobile device's condensed, wallet specific, version of the block chain and the complete, public block chain for the crypto-currency involved.
- NXT-ID asssignee of the present application
- the following example illustrates certain features of the invention and a crypto-currency transaction.
- a sender wants to send seven Bitcoin to a recipient. But a recipient (the sender was previously a recipient of the Bitcoin he is now sending) can spend only the full-amount of transactions received. Thus the software must gather enough incoming transaction that are greater than or equal to the amount the sender wants to send.
- a transaction request is generated and cryptographically signed by a second processing component (for example a component of a mobile phone).
- the second processing component uses the last transaction index for each unit of crypto-currency to be transferred, the recipient's wallet address, and the senders wallet address in the request.
- the request is signed by a sender's private cryptographic key associated with the crypto-currency wallet that he is sending the funds from. Note that access to the full block chain of all crypto-currency transactions is not required at this point.
- the signed transaction request is forwarded to the crypto-currency network via the Internet for transaction validation and execution.
- a new transaction for the mobile phone user's crypto-currency account
- a first processing component for example a component of a desktop computer
- the second processing component upon receipt of this status-update-packet determines if a local ledger update is required and if so, it requests the required information from the first processing component.
- the updated ledger entries Once the updated ledger entries are received, the data integrity is verified and the new transactions are added to the local ledger. If they are not verified the update is discarded and requested again from the server until either the maximum number of retries is exceeded or the update passes validation.
- the local ledger also referred to as the “differential transaction ledger” total balance is calculated at the second processing component, and the user interface is updated with the new balance.
- the first processing component comprises a server or desktop computer that monitors the full block chain.
- the server or desktop computer creates a message to the first processing component advising that the second processing component may need a balance update, and then review that update packet and decide how to proceed.
- the update packet is either ignored if it is another validation on a previous transaction, updates its outgoing payments ledger, or updates its balance ledger.
- FIG. 7 illustrates a step-by-step flow chart for the transaction ledger synchronization process.
- FIG. 8 illustrates an example of an outgoing payment transaction.
- An exemplary system for implementing the various software aspects of the invention includes a computing device or a network of computing devices.
- computing device may include any type of stationary computing device or a mobile computing device.
- Computing device typically includes at least one processing unit and system memory.
- system memory may be volatile (such as RAM), non-volatile (such as ROM, flash memory, and the like) or some combination of the two.
- System memory typically includes operating system, one or more applications, and may include program data.
- Computing device may also have additional features or functionality.
- computing device may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape.
- Computer storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data.
- System memory, removable storage and non-removable storage are all examples of computer storage media.
- Non-transitory computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other physical medium which can be used to store the desired information and which can be accessed by computing device. Any such computer storage media may be part of device.
- a computing device may also have input device(s) such as a keyboard, mouse, pen, voice input device, touch input device, etc.
- Output device(s) such as a display, speakers, printer, etc. may also be included.
- Computing device also contains communication connection(s) that allow the device to communicate with other computing devices, such as over a network or a wireless network.
- communication connection(s) may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
- Computer program code for carrying out operations of the invention described above may be written in a high-level programming language, such as C or C++, for development convenience.
- computer program code for carrying out operations of embodiments of the present invention may also be written in other programming languages, such as, but not limited to, interpreted languages.
- Some modules or routines may be written in assembly language or even micro-code to enhance performance and/or memory usage. It will be further appreciated that the functionality of any or all of the program modules may also be implemented using discrete hardware components, one or more application specific integrated circuits (ASICs), or a programmed digital signal processor or microcontroller.
- a code in which a program of the present invention is described can be included as a firmware in a RAM, a ROM and a flash memory.
- the code can be stored in a tangible computer-readable storage medium such as a magnetic tape, a flexible disc, a hard disc, a compact disc, a photo-magnetic disc, a digital versatile disc (DVD).
- a tangible computer-readable storage medium such as a magnetic tape, a flexible disc, a hard disc, a compact disc, a photo-magnetic disc, a digital versatile disc (DVD).
- the present invention can be configured for use in a computer or an information processing apparatus which includes a memory, such as a central processing unit (CPU), a RAM and a ROM as well as a storage medium such as a hard disc.
- step-by-step process for performing the claimed functions herein is a specific algorithm, and may be shown as a mathematical formula, in the text of the specification as prose, and/or in a flow chart.
- the instructions of the software program create a special purpose machine for carrying out the particular algorithm.
- the disclosed structure is a computer, or microprocessor, programmed to carry out an algorithm
- the disclosed structure is not the general purpose computer, but rather the special purpose computer programmed to perform the disclosed algorithm.
- a general purpose computer may be programmed to carry out the algorithm/steps of the present invention creating a new machine.
- the general purpose computer becomes a special purpose computer once it is programmed to perform particular functions pursuant to instructions from program software of the present invention.
- the instructions of the software program that carry out the algorithm/steps electrically change the general purpose computer by creating electrical paths within the device. These electrical paths create a special purpose machine for carrying out the particular algorithm/steps.
Abstract
Description
- This patent application claims the benefit of U.S. provisional patent application filed Jul. 30, 2015 and assigned Application No. 62/198,989, which is incorporated herein in its entirety.
- The present invention relates generally to crypto-currencies. More particularly, the present invention relates to a secure mobile device capable of managing crypto-currency accounts, balances and transactions in addition to normal electronic smart wallet functions.
- The following background information may present examples of specific aspects of the prior art (e.g., without limitation, approaches, facts, or common wisdom) that, while expected to be helpful to further educate the reader as to additional aspects of the prior art, is not to be construed as limiting the present invention, or any embodiments thereof, to anything stated or implied therein or inferred thereupon.
- A crypto-currency is a virtual currency that uses cryptography for security, making it difficult to counterfeit while allowing for nearly anonymous financial transactions between two parties using private and public keys. Crypto-currencies are not issued by a central authority, theoretically rendering it immune to interference or manipulation. The primary drawbacks are theft of the private key thereby allowing the attacker to assume control of the associated crypto-currency “wallet”, and the loss of the private key due to a software or hardware failure thereby rendering the crypto-currency “wallet” orphaned and its contents irretrievable, even by the owner.
- Here are examples of relevant prior art.
- US published patent application 20150026072 entitled “Global World Universal Digital Mobile and Wearable Currency Image Token and Ledger,” outlines the basic transfer of value from a sender account to a recipient account using a universal digital currency as a way to circumvent currency exchange costs and banking fees when conducting global commerce.
- Published US Patent application 20150066748 entitled “Systems and Methods for Transferring Value to and Managing User Selected Accounts,” allows the general transfer of value between accounts using a consumer device and based on input from the user resulting in various financial systems interacting in such a way as to create an escrow account and effectuating the transfer of value from the funding account, through the escrow account to the receiving account.
- US published patent application number 20140244506 entitled “Dynamic Payment Authorization System and Method” allows a user to locally authenticate their identity to a mobile device and then authorize a financial transaction against their physical account. The mobile device then receives either an approval or disapproved code, which will be compared to the transaction code received by the vendor's POS (point of sale) terminal prior to actually committing the payment transaction.
- Published US patent application 20140244500 entitled “Intermodal money transport system and method related to real-time cash or cash equivalent transfers on electronic devices with an intermodal money application interface that functions as an automated teller machine over one or more open loop financial networks by utilizing a virtual account management system and an intermodal money transport protocol” allows for conducting financial transactions from an electronic device using escrow accounts in conjunction with a specifically defined data transport protocol which includes an encrypted PIN as a means of security.
- US published patent application 20150120569 entitled “Virtual Currency Address Security” allows for the creation of a digital currency address based on public keys to be used in a web-based crypto-currency wallet.
- Published patent application US 20150088721 entitled “Digital Transactional Procedures & Implements” outlines the basic procedure to transfer value between different crypto-currencies and is intended for a domain-wide approach to the acceptance of new crypto-currencies by giving them an exchange rate with an existing crypto-currency.
- Published patent application US 20140258121 entitled “Method and Apparatus for Providing Secured Anonymized Payment” allows for users to conduct financial transactions utilizing a mobile device without a physical trusted service manager by leveraging an anonymous settlement service platform which in turn uses a database lookup to validate the user's identity and accounts that can be used in the transaction.
- US published patent application 20130117185 entitled “Method for conducting a transaction between a merchant site and a customer's electronic device without exposing payment information to a server-side application of the merchant site” allows use of a mobile device to send electronic payment information stored on the device to a payment processor which then creates a token based on the information it received from the mobile device; the token is then delivered to the server-side application to be used in actually conducting the financial transaction.
- US published patent application 20140279551 entitled “Minting and Use of Digital Money” discusses the overall creation of crypto-currency coins and how transactions can be limited, completed and verified.
- Published US patent application 20120123924 entitled “Virtual Currency Configuration Apparatuses, Methods and Systems” discusses a system for flexible monetization of goods and services and how such a service could interact with a smart wallet device.
- U.S. Pat. No. 8,712,918 entitled “Electronic Currency, Electronic Wallet Therefor and Electronic Payment Systems Employing Them” allows for a user to use a mobile device, into which they have already transferred funds electronically from physical financial accounts, to purchase goods or services from a vendor without having to contact the original financial institution to authorize the transaction as the actual electronic currency is held within the mobile device.
- US published patent application 20130166455 entitled “Creating and Using Digital Currency” allows for creation of a physical device or medium that carries a value that can be transferred to a digital domain and is protected by a physical, state-changing tamper device that indicates the device's security state.
- U.S. Pat. No. 8,041,338 entitled “Mobile Wallet and Digital Payment” allows for use of a mobile device to act as one or more mobile payment cards by establishing a link between each mobile payment card and form of currency. The payments from this mobile device may employ public-key cryptography to securely transmit payment information wirelessly.
- US published patent application 20080195499 entitled “Method of Providing Cash and Cash Equivalent For Electronic Transactions” outlines a system for peer-to-peer commerce using electronic wallets that store electronic token files. Those token files can be passed from wallet to wallet without oversight from a third party and are only validated by the owner of the token for a small fee. In this system token validation is not required prior to conducting a transaction.
- US published patent application 20060165060 entitled “Method and Apparatus for Managing Credentials Through a Wireless Network” generally outlines the use of a mobile device as a digital wallet that holds cryptographic credentials issued from a financial institution, directly to the device, which in turn can be used to authorize financial transactions at Point of Sales terminals via wireless or other means.
- U.S. Pat. No. 7,640,432 entitled “Electronic Cash Controlled by Non-Homomorphic Signatures” describes how digital coins can be managed, verified and digitally signed within a mobile device.
- U.S. Pat. No. 6,157,920 entitled “Executable Digital Cash for Electronic Commerce” allows for a very simplified version of crypto-currency that is protected only by a digital certificate. This digital cash is generated by the first user as a type of offer and accepted by a second user using either a computer or mobile device running specific software capable of accepting the offered digital cash from the first user.
- Although numerous patents exist, including those listed above, that presently appear relevant, the present embodiment of the system and method is novel and substantially different in a plurality of elements and methods, thus rendering the embodiments nonobvious to a person skilled in the art. However, it is recognized that there is a significant body of prior art in the fields of electronic money transfers, electronic payments and financial accounts, including but not limited to cards, virtual accounts, computer systems, automated teller machines, and other computing devices that utilize or access financial networks.
- The present invention describes a system and method, that is superior to the prior art, for a new and novel way to effect real-time value transfers using a mobile device and any other device (e.g. automated teller machine, point of sale system, self-service kiosk, personal computer, mobile phone, etc.) over one or more financial networks during a single financial transaction, thereby enabling users to convert a plurality of financial instruments (e.g. cash, check, payment card, crypto-currency, money order, cash voucher, E-coupon, virtual currency, etc.) into a ‘virtual cash token’ which is readily convertible into cash or a cash equivalent that is more universally accepted by merchants and other parties.
- Embodiments of the present invention disclosed herein describe methods and systems whereby an electronic smart-wallet device or application can be used by an individual to manage not only all of their conventional financial instruments (e.g. debit cards, check cards, credit cards, etc.), loyalty cards, and membership cards, but also provides secure management for a plurality of crypto-currency accounts. These attributes facilitate the real-time use of one or more crypto-currencies for making a payment, receiving crypto-currency payments, and crypto-currency exchange (e.g. cash to crypto-currency, crypto-currency to cash, crypto-currency to a different crypto-currency, etc.).
- It is important to note that the novel techniques and devices employed by the present invention seamlessly integrate accounts, assets and credentials, further facilitate their use as well as their security. By applying a standard set of security features and configurable rules across all of a user's accounts, assets, and credentials, the user has a uniform experience that is easy to learn without sacrificing security, while protecting the user from loss, theft, and fraud.
- The skilled artisan will understand that the drawings, described below, are for illustration purposes only. The drawings are not intended to limit the scope of the present invention in any way.
-
FIG. 1 illustrates devices and their associated interconnects as associated with the present invention. -
FIG. 2 illustrates a user (100) unlocking a smart wallet (101) using multifactor authentication. -
FIG. 3 describes the general flow of events and actions when a user unlocks a device (120), selects that they wish to create a new payment transaction (121) and selects which account they wish to use for the transaction (122). -
FIG. 4 generally describes how a user (100) can select a crypto-currency, such as but not limited to bitcoin, directly to a recipient (128). -
FIG. 5 shows the general process of the user (100) using their smart wallet (101) to purchase more crypto-currency from a crypto-currency exchange (130) with one of the user's (100) bank (129) accounts configured on the smart wallet (101). -
FIG. 6 illustrates generally how a user's (100) smart wallet (101) synchronizes its local block chain (132) with the full public block chain (131) by utilizing the User's (100) smart phone, laptop, desktop, or other computer platform (133) connected to the Internet (127). -
FIG. 7 illustrates a transaction ledger synchronization process. -
FIG. 8 illustrates an overview of an outgoing payment transaction. - Embodiments of the present invention are best understood by reference to the detailed figures and description set forth herein. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments. For example, it should be appreciated that those skilled in the art will, in light of the teachings of the present invention, recognize a multiplicity of alternate and suitable approaches, depending upon the needs of the particular application, to implement the functionality of any given detail described herein, beyond the particular implementation choices in the following embodiments described and shown. That is, there are numerous modifications and variations of the invention that are too numerous to be listed but that all fit within the scope of the invention. Also, singular words should be read as plural and vice versa and masculine as feminine and vice versa, where appropriate, and alternative embodiments do not necessarily imply that the two are mutually exclusive.
- It is to be further understood that the present invention is not limited to the particular methodology, compounds, materials, manufacturing techniques, uses, and applications, described herein, as these may vary. It is also to be understood that the terminology used herein is used for the purpose of describing particular embodiments only, and is not intended to limit the scope of the present invention. It must be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include the plural reference unless the context clearly dictates otherwise. Thus, for example, a reference to “an element” is a reference to one or more elements and includes equivalents thereof known to those skilled in the art. Similarly, for another example, a reference to “a step” or “a means” is a reference to one or more steps or means and may include sub-steps and subservient means.
- All conjunctions used are to be understood in the most inclusive sense possible. Thus, the word “or” should be understood as having the definition of a logical “or” rather than that of a logical “exclusive or” unless the context clearly necessitates otherwise. Structures described herein are to be understood also to refer to functional equivalents of such structures. Language that may be construed to express approximation should be so understood unless the context clearly dictates otherwise.
- Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art to which this invention belongs. Preferred methods, techniques, devices, and materials are described, although any methods, techniques, devices, or materials similar or equivalent to those described herein may be used in the practice or testing of the present invention. Structures described herein are to be understood also to refer to functional equivalents of such structures. The present invention will now be described in detail with reference to embodiments thereof as illustrated in the accompanying drawings.
- From reading the present disclosure, other variations and modifications will be apparent to persons skilled in the art. Such variations and modifications may involve equivalent and other features which are already known in the art, and which may be used instead of or in addition to features already described herein.
- It should be understood that the scope of the disclosure of the present invention also includes any novel feature or any novel combination of features disclosed herein either explicitly or implicitly or any generalization thereof, whether or not it mitigates any or all of the same technical problems as does the present invention.
- Features, which are described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features, which are for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable sub-combination.
- References to “one embodiment,” “an embodiment,” “example embodiment,” “various embodiments,” etc., may indicate that the embodiment(s) of the invention so described may include a particular feature, structure, or characteristic, but not every embodiment necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrase “in one embodiment,” or “in an exemplary embodiment,” do not necessarily refer to the same embodiment, however, in some instances they may.
- As is well known to those skilled in the art many careful considerations and compromises typically must be made when designing for the optimal manufacture of a commercial implementation of any system, and in particular, the embodiments of the present invention. A commercial implementation in accordance with the spirit and teachings of the present invention may be configured according to the needs of the particular application, whereby any aspect(s), feature(s), function(s), result(s), component(s), approach(es), or step(s) of the teachings related to any described embodiment of the present invention may be suitably omitted, included, adapted, mixed and matched, or improved and/or optimized by those skilled in the art, using their average skills and known techniques, to achieve the desired implementation that addresses the needs of the particular application.
- A “computer” may refer to one or more apparatus and/or one or more systems that are capable of accepting a structured input, processing the structured input according to prescribed rules, and producing results of the processing as output. Examples of a computer may include non-limiting examples such as: a computer; a stationary and/or portable computer; a computer having a single processor, multiple processors, or multi-core processors, which may operate in parallel and/or not in parallel; a general purpose computer; a supercomputer; a mainframe; a super mini-computer; a mini-computer; a workstation; a micro-computer; a server; a client; an interactive television; a web appliance; a telecommunications device with internet access; a hybrid combination of a computer and an interactive television; a portable computer; a tablet personal computer (PC); a personal digital assistant (PDA); a portable telephone; application-specific hardware to emulate a computer and/or software, such as, for example, a digital signal processor (DSP), a field-programmable gate array (FPGA), an application specific integrated circuit (ASIC), an application specific instruction-set processor (ASIP), a chip, chips, a system on a chip, or a chip set; a data acquisition device; an optical computer; a quantum computer; a biological computer; and generally, an apparatus that may accept data, process data according to one or more stored software programs, generate results, and typically include input, output, storage, arithmetic, logic, and control units.
- “Software” may refer to prescribed rules to operate a computer. Examples of software may include: code segments in one or more computer-readable languages; graphical and or/textual instructions; applets; pre-compiled code; interpreted code; compiled code; and computer programs.
- A “computer-readable medium” may refer to any storage device used for storing data accessible by a computer. Non-limiting examples of a computer-readable medium may include: a magnetic hard disk; a floppy disk; an optical disk, such as a CD-ROM and a DVD; a magnetic tape; a flash memory; a memory chip; and/or other types of media that can store machine-readable instructions thereon.
- A “computer system” may refer to a system having one or more computers, where each computer may include a computer-readable medium embodying software to operate the computer or one or more of its components. Non-limiting examples of a computer system may include: a distributed computer system for processing information via computer systems linked by a network; two or more computer systems connected together via a network for transmitting and/or receiving information between the computer systems; a computer system including two or more processors within a single computer; and one or more apparatuses and/or one or more systems that may accept data, may process data in accordance with one or more stored software programs, may generate results, and typically may include input, output, storage, arithmetic, logic, and control units.
- A “network” may refer to a number of computers and associated devices that may be connected by communication facilities. A network may involve permanent connections such as cables or temporary connections such as those made through telephone or other communication links. A network may further include hard-wired connections (e.g., coaxial cable, twisted pair, optical fiber, waveguides, etc.) and/or wireless connections (e.g., radio frequency waveforms, free-space optical waveforms, acoustic waveforms, etc.). Examples of a network may include: an internet, such as the Internet; an intranet; a local area network (LAN); a wide area network (WAN); and a combination of networks, such as an internet and an intranet.
- Exemplary networks may operate with any of a number of protocols, such as Internet protocol (IP), asynchronous transfer mode (ATM), and/or synchronous optical network (SONET), user datagram protocol (UDP), IEEE 802.x, near field communication (NFC), Bluetooth™, WiFi™, etc.
- Embodiments of the present invention may include apparatuses for performing the operations disclosed herein. An apparatus may be specially constructed for the desired purposes, or it may comprise a general-purpose device selectively activated or reconfigured by a program stored in the device.
- Embodiments of the invention may also be implemented in one or a combination of hardware, firmware, and software. They may be implemented as instructions stored on a machine-readable medium, which may be read and executed by a computing platform to perform the operations described herein.
- In the following description the terms “computer program medium” and “computer readable medium” may be used to generally refer to media such as, but not limited to, removable storage drives, a hard disk installed in hard disk drive, and the like. These computer program products may provide software to a computer system. Embodiments of the invention may be directed to such computer program products.
- An algorithm as referred to herein is generally considered to be a self-consistent sequence of acts or operations leading to a desired result. These include physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers or the like. It should be understood, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
- Unless specifically stated otherwise, and as may be apparent from the following description and claims, it should be appreciated that throughout the specification descriptions utilizing terms such as “processing,” “computing,” “calculating,” “determining,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
- In a similar manner, the term “processor” may refer to any device or portion of a device that processes electronic data from registers and/or memory to transform that electronic data into other electronic data that may be stored in registers and/or memory. A “computing platform” may comprise one or more processors.
- A non-transitory computer readable medium includes, but is not limited to, a hard drive, compact disc, flash memory, volatile memory, random access memory, magnetic memory, optical memory, semiconductor based memory, phase change memory, optical memory, periodically refreshed memory, and the like; however, the non-transitory computer readable medium does not include a pure transitory signal per se.
- The invention described herein consists of a system and method to manage a plurality of traditional financial accounts and crypto-currency accounts including initiating transfers, currency exchanges, submitting payments, and receiving payments. Under this method and the attendant systems and apparatuses, a local, abbreviated block chain is synchronized for crypto-currency transactions and balance validation to enable online shopping and retail store crypto-currency transactions from a local smart wallet device (e.g., a smart walled, a smart phone), just as transactions with other traditional financial accounts such as but not limited to credit, debit, bank, and other financial accounts.
- In one embodiment, a local block chain is synchronized for crypto-currency transactions and balance validation to enable online and retail crypto transactions, for example, along with access to traditional financial accounts such as but not limited to credit, debit, bank, and other financial accounts. This novel approach enables users to authorize the transfer of crypto-currency while offline, while also controlling how and when that data transfer is completed via innovative synchronization of data from the block chain of a crypto-currency device.
- A smart wallet may be protected by a variety of means including one or more private keys, PINs (personal identification numbers), dynamic pairing passwords, symmetric and asymmetric authentication codes, and/or pattern, behavior, or biometric recognition, etc. Under this invention, local authentication may not only be used to secure the private information such as account or crypto-currencies, but also personalize the transaction by utilizing the same local authentication to perform remote authentication to approve a transaction, in some embodiments.
- Security is also improved under this invention as the smart wallet maintains only enough of the block chain on the device to enable a transaction and the verifications that follow those transactions. The present invention does not store the block chain per se or a direct copy of it. Instead, the present invention stores an account specific transaction ledger (also referred to as an account specific differential transaction ledger) that is derived from information available in the public block chain. Storing only the “differential” updates to the smart device from the user's computer greatly reduces the CPU and storage requirements of the smart device. This method prevents theft, such as the historic crypto-currency theft at Mt GOX, when an owner has a single internet-based wallet that only provides a payment/account address and performs all of the transaction matching in the background. Centralization of all crypto-currency in one purse puts coin at risk, where coin can only be recognized apart from each other by looking at the address to which they were sent.
- Under this invention, the unique manner that a local, abbreviated block chain (in effect, a account specific differential transaction ledger) is synchronized for crypto-currency transactions and balance validation enables online shopping and retail store crypto-currency transactions from a local smart wallet device (typically having limited processing power and memory), just as transactions with other traditional financial accounts, such as but not limited to credit, debit, bank, and other financial accounts.
- This invention not only supports storage and selection of multiple accounts and currencies, but also combining multiple currencies to execute a single transaction or transfer. Such examples might include combining an amount of Bitcoin plus an amount of Litecoin to equal a full transaction amount. A non-transitory computing device such as a server may be used in conjunction with said transaction to in turn, relegate how each currency is converted and combined. This unique ability leads to further decentralizing crypto-currency transactions by spreading the source of the funds between different exchanges, countries, and wallet IDs, etc.
-
FIG. 1 illustrates the general, non-limiting scope of the invention. A user (100) is able to use the smart wallet (101) to manage a plurality of credit cards (102), debit/check cards (103), loyalty & rewards cards (104), and crypto-currency wallets (105). Management functions include, but are not limited to, viewing balances (106), credit & overdraft line limits (107), reviewing historical transactions (108) or creating new transactions (108), and viewing rewards/discounts/coupons (109). - The “flow” of this transaction from a single device done with minimal user input is novel to the invention, as illustrated, Conventionally, to accomplish this transaction according to the prior art, a user must:
- log into a crypto-currency exchange
- register the bank account they wish to use with their crypto-currency brokerage account request to purchase X-Amount of crypto-currency for X-Amount of dollars (Actually the user is placing a bid to see if someone will “sell you the coins” for the amount specified by the user.)
- once the bid is accepted, the owner of the coins sends them to the user's exchange brokerage account
- once the transaction above has been validated by the block chain processing nodes, the user's brokerage account balance is updated. Now the user can either send the crypto-currency directly to the VPN provider (which requires registering their information with the CC-Exchange) or the user can transfer it to their local crypto-currency wallet and then to the VPN provider.
- In one non-limiting embodiment of the present invention, a user may unlock their mobile device and then select to transfer funds from a checking account into a crypto-currency wallet, while subsequently selecting to pay an online vendor for VPN service using crypto-currency such as but not limited to Bitcoin. This transaction flow protects the user's normal financial accounts from disclosure to the VPN vendor as well as providing a level of anonymity for the user.
- Under one embodiment, the smart wallet device and the configured accounts, a granular security model (where granular security refers to the number of different log-in credentials that are required) protects assets, and sensitive information it contains. Security may be configured based on one or more of a plurality of physical conditions including, but not limited to, graphical location, time of day, and smart wallet device serial number. Security may be configured on a plurality of user supplied authentication mechanisms including, but not limited to fingerprints, PIN codes, voice, sounds, face, iris, heartbeat, scent, challenge response questions, and pass phrases. Security may be additionally controlled by the usage of white-lists and black-lists for a variety of parameters including, but not limited to vendor/payment-recipient, time of day, geo-location, account balances, and transaction value/amount. See for example, co-owned patent applications: Methods and Systems Related to Multi-Factor, Multidimensional, Mathematical, Hidden and Motion Security PINS, filed on Aug. 1, 2016 and assigned application Ser. No. 15/224,998 (Attorney Docket Number 12188-022); Sound-Directed or Behavior-Directed Method and System for Authenticating a User Executing a Transaction, filed Feb. 10, 2016 and assigned application Ser. No. 15/040,984 (Attorney Docket Number 12188-015); Sound-Directed or Behavior-Directed Method and System for Authenticating a User Executing a Transaction, filed on Feb. 10, 2016 and assigned application Ser. No. 15/040,984 (Attorney Docket Number 12188-015); Biometric, Behavioral-Metric, Knowledge-Metric, and Electronics-Metric Directed Authentication and Transaction Method and System, filed on Jul. 5, 2016 and assigned application Ser. No. 15/202,515 (Attorney Docket Number 12188-019); and Multi-Instance Shared Authentication (MISA) Method and System Prior to Data Access, filed on Jun. 23, 2016 and assigned application Ser. No. 15/191,456 (Attorney Docket Number 12188-018), all of which are incorporated by reference herein.
- For a non-limiting example,
FIG. 2 shows a user (100) unlocking a smart wallet (101) by using multifactor authentication, which in this case, includes a fingerprint (110), voice recognition (111), and a manually entered PIN code (112). Once the smart wallet (101) is unlocked, the user (100) has access to menu items such as transactions (108), accounts (113), and configuration (114). Some of the configuration (114) settings may include device authentication settings (115), non-centralized backup & restore (116), and security settings (117). Some of the options available from the accounts (113) could be security settings (117), new transactions (118), and historical transactions (119). Options available from the transactions (108) include new transactions (118) and historical transactions (119). - Authentication methods may include local authentication and/or remote authentication to validate user ownership of the smart wallet (101) as well as implement a method to cryptographically secure wipe user data and de-activate the device in the event the device has been reported lost or stolen or if multiple invalid log-in attempts have been made. The system may also implement a master code capable of re-activating the device to a factory default state in which no user information is available within the device.
- It is important to note that security settings for the device (the smart wallet (101)) and account security settings (117) can be configured independently allowing for greater granularity in securing the device itself and the information contained within the device. As a non-limiting example, the user can configure the device where it could be unlocked using only a PIN code, while access to debit/checking accounts require a PIN code and a fingerprint, and access to credit cards requires a PIN Code, a fingerprint, and can only be accessed between 5 AM and 11 PM.
-
FIG. 3 describes the general flow of events and actions when a user unlocks a device (120), such as but not limited to a mobile or wearable device, selects that she wishes to create a new payment transaction (121), and selects which account she wishes to use for the transaction (122). The account access information is then checked by the smart wallet to ensure the predefined security requirements for access have been met (123). If the requirements have not been met the user is prompted to select a different account or to provide additional authentication factors to match or override the security rules. - If access is granted to the account, the user can then present payment to the vendor by using any of the available methods accepted by the vendor (e.g. Magnetic Stripe, Wireless Magnetic Strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, Antenna, WiFi, QR Code, and the like.) (124). Payment methods can be selected on the present device or the payment information is sent to another “payment” device to conduct the transaction. The transaction information is then transmitted to a payment processor for approval (125).
-
FIG. 4 generally describes how a user (100) can select and send a crypto-currency, such as but not limited to Bitcoin, directly to a recipient (128). In this non-limiting example, the recipient (128) sends the user (100) the crypto-currency wallet address via any available method, including but not limited to Magnetic Stripe, Wireless Magnetic Strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, Antenna, WiFi, QR Code, and the like. - The user (100) then selects an account on their smart wallet (101) to use to send the funds via the Internet (127) so that the transaction can be validated via the crypto-currency block chain.
- According to the present invention, the validation of the transaction sending crypto-currency to the another user is still accomplished through the public block chain, but the “reception” of that payment on the recipient's or user's device is validated using the “account specific differential transaction ledger” as referred to above.
- Outgoing payments with crypto-currency occur conventionally as the transaction is directly sent to the crypt-currency block chain network.
- But incoming payments to a user's account are detected on the public block chain and then an intermediate server prepares a cryptographically secure differential update that is then sent to the user's smart wallet where it is processed and integrated into their account ledger. Thus the smart wallet does not have to continuously receive the public block chain and process it for potential incoming transactions, thereby reducing the “horsepower” (i.e., the processor capabilities and speed with which it can process data) required on the recipient's device.
- This validation process, according to the present invention, occurs on the smart wallet (101). This feature is unlike the prior art, wherein validation of the transaction via the block chain is executed on a computer/server/processor having sufficient processor “horsepower” to carry out the validation in a relatively short time. Generally smart phones lack such processor “horsepower” and validating the block chain before executing the transaction may require several days. Once the transaction is validated as described above, the crypto-currency is deposited in the recipient's (128) crypto-currency wallet and a notification is issued by the recipient's (128) smart wallet (101) once it detects the change in the balance of the crypto-currency wallet.
-
FIG. 5 shows the general process of the user (100) using their smart wallet (101) to purchase more crypto-currency from a crypto-currency exchange (130) with one of the user's (100) bank (129) accounts configured on the smart wallet (101). The user (100) initiates the transaction by selecting the appropriate financial institution to fund the crypto-currency purchase, then executes the purchase with one of the many crypto-currency exchanges. The purchase is then sent through the Internet (127) for validation prior to being deposited into the user's (100) crypto-currency wallet, which then appears as a new balance on the user's (100) smart wallet (101). The new value of the crypto-currency wallet is then immediately available to fund other transactions. -
FIG. 6 shows a very general method of how a user's (100) smart wallet (101) synchronizes its local block chain (132) with the full public block chain (131) by utilizing the user's (100) smart phone, laptop, desktop, or other computer platform (133) connected to the Internet (127). When the smart wallet (101) connects to the computing platform (133), it verifies the state of its latest transactions and determines if the local block chain (132) needs synchronization. It is important to note that without updating the local block chain (132) on the smart wallet (101) there is no other way of securely verifying transactions and balances of crypto-currency wallets. Further details of synchronization processes are described in co-owned patent application entitled Low Bandwidth Crypto-Currency Transaction Execution and Synchronization Method and System, filed on Sep. 7, 2015 and assigned application No. 62/215,066 (Attorney Docket Number 12188-026). - In another non-limiting example, a user may accept direct payment for an item or service from an individual or entity by using the mobile device's display to show the QR-Code (or another known code format) of the crypto-currency wallet address into which they wish to receive the payment. The payor, using another device, then scans the visual code from the user's device in order to transfer funds to the payee.
- As a different approach to this embodiment, the user could also wirelessly transmit their wallet address to the payor (via a magnetic stripe, wireless magnetic strip, NFC, Bluetooth, GSM/2G/3G/4G/LTE modem, sound, light, WiFi, Bluetooth, antenna, WiFi, QR Code, and/or magnetic loop as non-limiting examples), or record their wallet address to a magnetic stripe that could then be received or read by the payor.
- In another non-limiting embodiment, a user may unlock a device and decide to transfer all or some of their LiteCoins and DodgeCoins (or other crypto-currencies) into their BitCoin wallet at the current exchange rate, thereby consolidating funds and possibly taking advantage of favorable exchange rates or funding their account prior to conducting a financial transaction.
- In another non-limiting embodiment, an individual, using their smart wallet device, could send Bitcoin or other crypto-currencies to their child, spouse, or friend living in a foreign country that the receiving individual, using their electronic smart wallet, could then use to pay bills either directly with the crypto-currency or by exchanging the crypto-currency into locally accepted currency via a financial institution configured in their smart wallet. Such a scenario securely bypasses international banking fees and exchange rates while providing almost instantly available funds to the receiving party and proof of delivery to the sender.
- In a security related, non-limiting embodiment, the electronic smart wallet's security and usage features can be applied to the crypto-currency wallets contained therein such that wallets can only be opened and utilized in transactions when one or more criteria are met. As a non-limiting example, the user must provide at least three factors of authentication before the wallet can be opened (e.g. fingerprint, voice, PIN, password, NFC/RFID token, etc.) and then transactions can only be performed if they meet certain criteria such as the amount is below a preset limit, the recipient is on a white-list of recipients, the recipient is not on a black-list of recipients, the user is within a certain area (geo-fencing), the transaction is being conducted between certain hours, or the balance of the drawing account is above a predefined limit, etc.
- An additional non-limiting embodiment of the disclosed invention is it's novel handling of the crypto-currency block-chain (the underlying technology that makes crypto-currencies secure and validates transactions) which reduces the storage space requirements and minimizes the impact on battery life for the mobile device.
- In one sense, the block chain may be considered a “rolling” hash. If one does not have the very first transaction (the start of the block chain) then you cannot validate the last transaction (the end of the block chain). If one retained only the tail end of the block chain, one could only validate transactions up to but not including, the first transaction in the retained segment of the chain. Thus someone could in theory tamper with the short/abbreviated retained block chain segment and thereby lead you to believe certain transactions have occurred. The real power of the block chain is derived from its unwieldy size, making it relatively impossible for anyone to tamper with the transaction history due to the requirement of re-calculating the hash of every transaction that has occurred since the time of their “modified” transaction. The more transaction history in the chain, the harder it is to fake it!
- As an example, if the block chain size for Bitcoin exceeds 30 GB (Gigabytes), typically during initial configuration of the device the user would be required to download the entire block-chain, which could take from many hours to several weeks, while the smart device is plugged into an electrical outlet or charger to ensure adequate power is available during the entire block chain download. Only after the entire block chain has been downloaded to the smart device, can crypto-currency transactions be validated and therefore executed using the smart phone.
- As an example, given the current magnitude of crypto-currency transactions, this initial synchronization of the block chain, using a dual-core desktop computer with a dedicated, high-speed Internet connection (50 Mbps) takes approximately 1-CPU-Day to process one (1) weeks worth of block chain transactions.
- Processing requirements will only increase as the transaction volume grows by the broader acceptance of Bitcoin (or other crypto-currencies), and the processing load outlined above is only for one of many crypto-currency block chains.
- According to the present invention, the user can complete the device setup in a matter of minutes and requires only minimal synchronization of the block code thereafter. The synchronization requires that only those crypto-currency transactions that affect the presently-contemplated transaction using the smart device need to be downloaded to the smart device. A software application on the user's desktop, laptop, or mobile device that manages a NXT-ID (assignee of the present application) proprietary synchronization process between the mobile device's condensed, wallet specific, version of the block chain and the complete, public block chain for the crypto-currency involved.
- This capability of having a local, cached, frequently-updated version of the block chain adds significantly to the overall transaction security of the smart device. Until now, this capability has been prevented by mainstream methods of keeping the block chain up to date, with its attendant battery-crushing power requirements and excessive bandwidth data transfers.
- The following example illustrates certain features of the invention and a crypto-currency transaction. Assume a sender wants to send seven Bitcoin to a recipient. But a recipient (the sender was previously a recipient of the Bitcoin he is now sending) can spend only the full-amount of transactions received. Thus the software must gather enough incoming transaction that are greater than or equal to the amount the sender wants to send.
- Assume the sender has incoming transactions that total 12.25 Bitcoin.
- When a transaction request to send seven Bitcoin is generated, two recipients are listed in it. The recipient to receive seven Bitcoin and the sender to receive (back) 5.25 Bitcoin, for a total of 12.25 Bitcoin spent. This technique allows each coin/unit of crypto-currency to be traced all the way back to its origin, even fractional parts of a coin.
- To conduct a transaction, if the sender is sure he has ownership of the “coins”, he does not need to have access to the full block chain, only to the last transaction index and transaction value for each of the “coins” in his wallet. But the sender does need access to the full block chain to ensure he owns those coins.
- Another example transaction is described below. A transaction request is generated and cryptographically signed by a second processing component (for example a component of a mobile phone). The second processing component uses the last transaction index for each unit of crypto-currency to be transferred, the recipient's wallet address, and the senders wallet address in the request. The request is signed by a sender's private cryptographic key associated with the crypto-currency wallet that he is sending the funds from. Note that access to the full block chain of all crypto-currency transactions is not required at this point.
- The signed transaction request is forwarded to the crypto-currency network via the Internet for transaction validation and execution.
- When a new transaction (for the mobile phone user's crypto-currency account) is detected in the public block chain by a first processing component (for example a component of a desktop computer), prepares a cryptographically secure status-update-packet which is then forwarded to the second processing component. The second processing component upon receipt of this status-update-packet determines if a local ledger update is required and if so, it requests the required information from the first processing component. Once the updated ledger entries are received, the data integrity is verified and the new transactions are added to the local ledger. If they are not verified the update is discarded and requested again from the server until either the maximum number of retries is exceeded or the update passes validation.
- The local ledger (also referred to as the “differential transaction ledger”) total balance is calculated at the second processing component, and the user interface is updated with the new balance.
- In the description above, the first processing component comprises a server or desktop computer that monitors the full block chain. When a transaction pertaining to the user's wallet is validated by the block chain processing nodes/network (there must be at least two independent validations and usually not more than six validations), the server or desktop computer creates a message to the first processing component advising that the second processing component may need a balance update, and then review that update packet and decide how to proceed. The update packet is either ignored if it is another validation on a previous transaction, updates its outgoing payments ledger, or updates its balance ledger.
-
FIG. 7 illustrates a step-by-step flow chart for the transaction ledger synchronization process. -
FIG. 8 illustrates an example of an outgoing payment transaction. - An exemplary system for implementing the various software aspects of the invention includes a computing device or a network of computing devices. In a basic configuration, computing device may include any type of stationary computing device or a mobile computing device. Computing device typically includes at least one processing unit and system memory. Depending on the exact configuration and type of computing device, system memory may be volatile (such as RAM), non-volatile (such as ROM, flash memory, and the like) or some combination of the two. System memory typically includes operating system, one or more applications, and may include program data. Computing device may also have additional features or functionality. For example, computing device may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Computer storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data. System memory, removable storage and non-removable storage are all examples of computer storage media. Non-transitory computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other physical medium which can be used to store the desired information and which can be accessed by computing device. Any such computer storage media may be part of device. A computing device may also have input device(s) such as a keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) such as a display, speakers, printer, etc. may also be included. Computing device also contains communication connection(s) that allow the device to communicate with other computing devices, such as over a network or a wireless network. By way of example, and not limitation, communication connection(s) may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
- Computer program code for carrying out operations of the invention described above may be written in a high-level programming language, such as C or C++, for development convenience. In addition, computer program code for carrying out operations of embodiments of the present invention may also be written in other programming languages, such as, but not limited to, interpreted languages. Some modules or routines may be written in assembly language or even micro-code to enhance performance and/or memory usage. It will be further appreciated that the functionality of any or all of the program modules may also be implemented using discrete hardware components, one or more application specific integrated circuits (ASICs), or a programmed digital signal processor or microcontroller. A code in which a program of the present invention is described can be included as a firmware in a RAM, a ROM and a flash memory. Otherwise, the code can be stored in a tangible computer-readable storage medium such as a magnetic tape, a flexible disc, a hard disc, a compact disc, a photo-magnetic disc, a digital versatile disc (DVD). The present invention can be configured for use in a computer or an information processing apparatus which includes a memory, such as a central processing unit (CPU), a RAM and a ROM as well as a storage medium such as a hard disc.
- The “step-by-step process” for performing the claimed functions herein is a specific algorithm, and may be shown as a mathematical formula, in the text of the specification as prose, and/or in a flow chart. The instructions of the software program create a special purpose machine for carrying out the particular algorithm. Thus, in any means-plus-function claim herein in which the disclosed structure is a computer, or microprocessor, programmed to carry out an algorithm, the disclosed structure is not the general purpose computer, but rather the special purpose computer programmed to perform the disclosed algorithm.
- A general purpose computer, or microprocessor, may be programmed to carry out the algorithm/steps of the present invention creating a new machine. The general purpose computer becomes a special purpose computer once it is programmed to perform particular functions pursuant to instructions from program software of the present invention. The instructions of the software program that carry out the algorithm/steps electrically change the general purpose computer by creating electrical paths within the device. These electrical paths create a special purpose machine for carrying out the particular algorithm/steps.
- Unless specifically stated otherwise as apparent from the discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- While the invention has been described with reference to preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalent elements may be substituted for elements thereof without departing from the scope of the present invention. The scope of the present invention further includes any combination of the elements from the various embodiments set forth. In addition, modifications may be made to adapt a particular situation to the teachings of the present invention without departing from its essential scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include all embodiments falling within the scope of the appended claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/225,780 US20170053249A1 (en) | 2015-07-30 | 2016-08-01 | Electronic Crypto-Currency Management Method and System |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562198817P | 2015-07-30 | 2015-07-30 | |
US15/225,780 US20170053249A1 (en) | 2015-07-30 | 2016-08-01 | Electronic Crypto-Currency Management Method and System |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170053249A1 true US20170053249A1 (en) | 2017-02-23 |
Family
ID=57882763
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/224,998 Active 2037-08-24 US10565569B2 (en) | 2015-07-30 | 2016-08-01 | Methods and systems related to multi-factor, multidimensional, mathematical, hidden and motion security pins |
US15/225,780 Abandoned US20170053249A1 (en) | 2015-07-30 | 2016-08-01 | Electronic Crypto-Currency Management Method and System |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/224,998 Active 2037-08-24 US10565569B2 (en) | 2015-07-30 | 2016-08-01 | Methods and systems related to multi-factor, multidimensional, mathematical, hidden and motion security pins |
Country Status (1)
Country | Link |
---|---|
US (2) | US10565569B2 (en) |
Cited By (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170243215A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for external secure access to process data network |
US20170243208A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for control of device identity and usage in a process data network |
US20180042061A1 (en) * | 2016-08-04 | 2018-02-08 | Fujitsu Limited | Connection processing method, communication system, and communication device |
US20180060551A1 (en) * | 2016-08-23 | 2018-03-01 | Lenovo (Singapore) Pte. Ltd. | Using gas chromatography for authentication, advertisements, and therapies |
CN107767135A (en) * | 2017-10-10 | 2018-03-06 | 厦门益协作网络科技有限公司 | A kind of intelligence engineering transaction credit investigation system based on internet |
US20180089688A1 (en) * | 2016-09-27 | 2018-03-29 | Mastercard International Incorporated | System and methods for authenticating a user using biometric data |
CN108199833A (en) * | 2018-01-04 | 2018-06-22 | 成都理工大学 | One kind is based on the distributed stolen mobile phone guard method of block chain |
CN108596588A (en) * | 2018-04-28 | 2018-09-28 | 百度在线网络技术(北京)有限公司 | A kind of processing method of block data, device, computing device and storage medium |
US10091180B1 (en) | 2012-03-20 | 2018-10-02 | United Services Automobile Association (Usaa) | Behavioral profiling method and system to authenticate a user |
US20180293556A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | Method and system for processing blockchain-based real-time transaction |
CN108881231A (en) * | 2018-06-21 | 2018-11-23 | 郑州云海信息技术有限公司 | The method, apparatus and storage medium of synchronous account information in a kind of group system |
US20180357715A1 (en) * | 2017-06-12 | 2018-12-13 | Rodriguez F. Jones | System and Method For a Virtual Currency Exchange |
US10164973B1 (en) | 2015-12-02 | 2018-12-25 | United Services Automobile Association (Usaa) | Public authentication systems and methods |
US10171509B2 (en) * | 2016-11-10 | 2019-01-01 | International Business Machines Corporation | Filtering and redacting blockchain transactions |
CN109274435A (en) * | 2018-08-31 | 2019-01-25 | 海南新软软件有限公司 | A kind of method, apparatus and system using technology of acoustic wave transmission digital asset address |
WO2019043668A1 (en) * | 2017-09-04 | 2019-03-07 | Lingham Investments (Pty) Ltd | Cryptocurrency system |
US10270599B2 (en) | 2017-04-27 | 2019-04-23 | Factom, Inc. | Data reproducibility using blockchains |
CN109981646A (en) * | 2019-03-26 | 2019-07-05 | 阿里巴巴集团控股有限公司 | Resource transfers method and device and electronic equipment based on block chain |
US10361870B2 (en) * | 2017-09-14 | 2019-07-23 | The Toronto-Dominion Bank | Management of cryptographically secure exchanges of data using permissioned distributed ledgers |
US20190236564A1 (en) * | 2018-01-31 | 2019-08-01 | Walmart Apollo, Llc | System and method for digital currency via blockchain |
US20190251551A1 (en) * | 2018-02-14 | 2019-08-15 | Blockchain Goose Inc. | Systems, apparatuses, and methods for assessing, managing, presenting and indicating the value of a set of digital assets |
US10402796B2 (en) | 2016-08-29 | 2019-09-03 | Bank Of America Corporation | Application life-cycle transition record recreation system |
US10411897B2 (en) | 2017-02-17 | 2019-09-10 | Factom, Inc. | Secret sharing via blockchains |
US10419225B2 (en) | 2017-01-30 | 2019-09-17 | Factom, Inc. | Validating documents via blockchain |
US10423938B1 (en) | 2015-11-20 | 2019-09-24 | United Services Automobile Association | Identifying negotiable instrument fraud using distributed ledger systems |
US10454677B1 (en) | 2016-02-24 | 2019-10-22 | United Services Automobile Associate (USAA) | Cryptographic key generation from biometric data |
WO2019210256A1 (en) * | 2018-04-27 | 2019-10-31 | Social Wallet, Inc. | Systems and methods for zero knowledge crypto-asset exchange |
US20190362305A1 (en) * | 2018-05-24 | 2019-11-28 | Walmart Apollo, Llc | Systems and Methods Exception Handling in a Distributed Computing Environment |
US20190392403A1 (en) * | 2018-06-22 | 2019-12-26 | Antonio Alfredo Rainaldi | Collecting and sorting garbage and managing recycling using sensing technology |
US10521780B1 (en) | 2015-12-16 | 2019-12-31 | United Services Automobile Association (Usaa) | Blockchain based transaction management |
CN110766400A (en) * | 2019-10-22 | 2020-02-07 | 全链通有限公司 | Transaction record processing method based on block chain, accounting node and medium |
WO2020043048A1 (en) * | 2018-08-30 | 2020-03-05 | 杭州复杂美科技有限公司 | Parallel chain data synchronization method, device, and storage medium |
US10586062B1 (en) | 2015-11-23 | 2020-03-10 | United Services Automobile Association (Usaa) | Systems and methods to track, store, and manage events, rights and liabilities |
US10685399B2 (en) | 2017-03-31 | 2020-06-16 | Factom, Inc. | Due diligence in electronic documents |
WO2020154277A1 (en) * | 2019-01-21 | 2020-07-30 | Dan Kikinis | Security gateway for high security blockchain systems |
US10762506B1 (en) | 2017-05-11 | 2020-09-01 | United Services Automobile Association | Token device for distributed ledger based interchange |
US10783164B2 (en) | 2018-05-18 | 2020-09-22 | Factom, Inc. | Import and export in blockchain environments |
US10783010B2 (en) * | 2018-09-24 | 2020-09-22 | Salesforce.Com, Inc. | Offline briefcase synchronization |
US10797861B2 (en) | 2017-02-24 | 2020-10-06 | Alibaba Group Holding Limited | Secure data transactions |
US10805085B1 (en) | 2017-08-24 | 2020-10-13 | United Services Automobile Association (Usaa) | PKI-based user authentication for web services using blockchain |
US10817873B2 (en) | 2017-03-22 | 2020-10-27 | Factom, Inc. | Auditing of electronic documents |
US10818170B1 (en) | 2016-01-20 | 2020-10-27 | United Services Automobile Association | Systems and methods for traffic management via inter-party resource allocation |
WO2020219469A1 (en) * | 2019-04-25 | 2020-10-29 | Coinstar Asset Holdings, Llc | Kiosk-based systems and methods for selling cryptocurrencies |
US10833843B1 (en) * | 2015-12-03 | 2020-11-10 | United Services Automobile Association (USAA0 | Managing blockchain access |
US10861039B2 (en) * | 2017-04-12 | 2020-12-08 | Royal Bank Of Canada | Bid platform |
US10873578B1 (en) | 2019-12-09 | 2020-12-22 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US10902705B1 (en) | 2019-12-09 | 2021-01-26 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US10949856B1 (en) | 2015-11-17 | 2021-03-16 | United Services Automobile Association (Usaa) | Systems and methods for adaptive learning to replicate peak performance of human decision making |
US10977626B2 (en) | 2018-06-14 | 2021-04-13 | Capital One Services, Llc | Semi-private blockchain virtual currency exchange systems |
US10979410B1 (en) | 2015-05-04 | 2021-04-13 | United Services Automobile Association (Usaa) | Systems and methods for utilizing cryptology with virtual ledgers in support of transactions and agreements |
CN112990829A (en) * | 2021-04-21 | 2021-06-18 | 江苏荣泽信息科技股份有限公司 | Asset management system based on block chain |
US11044095B2 (en) * | 2018-08-06 | 2021-06-22 | Factom, Inc. | Debt recordation to blockchains |
US11042871B2 (en) | 2018-08-06 | 2021-06-22 | Factom, Inc. | Smart contracts in blockchain environments |
US11049104B2 (en) * | 2017-04-05 | 2021-06-29 | Samsung Sds Co., Ltd. | Method of processing payment based on blockchain and apparatus thereof |
US11050763B1 (en) | 2016-10-21 | 2021-06-29 | United Services Automobile Association (Usaa) | Distributed ledger for network security management |
US11068888B1 (en) * | 2019-02-06 | 2021-07-20 | Countia, LLC. | Value-transfer payment system |
US20210241271A1 (en) * | 2018-04-19 | 2021-08-05 | Vechain Foundation Limited | Transaction Processing |
US11100487B2 (en) * | 2007-10-18 | 2021-08-24 | Jpmorgan Chase Bank, N.A. | System and method for issuing, circulating and trading financial instruments with smart features |
US20210264459A1 (en) * | 2018-07-19 | 2021-08-26 | Asia Top Loyalty Limited | A method of loyalty exchange transaction by using blockchain for reward point exchange |
US11107156B2 (en) * | 2018-03-25 | 2021-08-31 | Gideon Samid | Digital finance: cash, credit, and investment instruments in a unified framework (BitMint) |
US11113665B1 (en) * | 2020-03-12 | 2021-09-07 | Evan Chase Rose | Distributed terminals network management, systems, interfaces and workflows |
US11134120B2 (en) | 2018-05-18 | 2021-09-28 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11164250B2 (en) | 2018-08-06 | 2021-11-02 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11170366B2 (en) | 2018-05-18 | 2021-11-09 | Inveniam Capital Partners, Inc. | Private blockchain services |
US11170092B1 (en) | 2017-12-14 | 2021-11-09 | United Services Automobile Association (Usaa) | Document authentication certification with blockchain and distributed ledger techniques |
US11176609B2 (en) * | 2017-12-12 | 2021-11-16 | Ascent Solutions Pte Ltd | Smart device and tracking system |
US11184171B2 (en) | 2018-05-24 | 2021-11-23 | Walmart Apollo, Llc | System and methods for multi-variant tracking |
US11188907B1 (en) | 2015-08-21 | 2021-11-30 | United Services Automobile Association (Usaa) | ACH authorization validation using public blockchains |
US11186111B1 (en) | 2016-04-04 | 2021-11-30 | United Services Automobile Association (Usaa) | Digitally encoded seal for document verification |
US11195177B1 (en) | 2015-08-21 | 2021-12-07 | United Services Automobile Association (Usaa) | Distributed ledger systems for tracking recurring transaction authorizations |
US11200548B2 (en) | 2019-12-09 | 2021-12-14 | Evan Chase Rose | Graphical user interface and operator console management system for distributed terminal network |
US11216804B2 (en) * | 2018-03-02 | 2022-01-04 | Nicholas B. Griffith | Central registry system for cryptocurrencies |
US11222333B2 (en) * | 2019-05-31 | 2022-01-11 | Panasonic Avionics Corporation | In-flight fiat payment authorization and capture settlement |
US20220020088A1 (en) * | 2020-07-17 | 2022-01-20 | Hon Hai Precision Industry Co., Ltd. | Device and method for assigning virtual object recording electronic voucher based on block chain |
US20220020005A1 (en) * | 2020-07-16 | 2022-01-20 | Mehdi M. Rohani | Mobile device, system and method for currency exchange |
US11257071B2 (en) * | 2018-10-08 | 2022-02-22 | Bank Of America Corporation | Closed loop platform for dynamic currency conversion |
US11276055B1 (en) | 2017-10-11 | 2022-03-15 | Wells Fargo Bank, N.A. | Cash delivery service |
US11297001B2 (en) | 2018-10-08 | 2022-04-05 | Bank Of America Corporation | Closed loop resource distribution platform |
US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11334882B1 (en) | 2016-03-28 | 2022-05-17 | United Services Automobile Association (Usaa) | Data access management on a distributed ledger system |
US11343075B2 (en) | 2020-01-17 | 2022-05-24 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11354672B2 (en) | 2016-02-10 | 2022-06-07 | Bank Of America Corporation | System for secure routing of data to various networks from a process data network |
US11361286B1 (en) | 2015-11-20 | 2022-06-14 | United Services Automobile Association (Usaa) | Identifying negotiable instrument fraud using distributed ledger systems |
US11368416B2 (en) * | 2018-02-01 | 2022-06-21 | Red Hat, Inc. | Reconciliation of a blockchain ledger during failures of an enterprise service bus |
US11392947B1 (en) | 2017-02-27 | 2022-07-19 | United Services Automobile Association (Usaa) | Distributed ledger for device management |
US20220255725A1 (en) * | 2018-12-21 | 2022-08-11 | Capital One Services, Llc | System and method for authorizing transactions in an authorized member network |
US11416475B2 (en) * | 2018-10-19 | 2022-08-16 | Adobe Inc. | Block quantity reduction in distributed ledgers |
WO2022173856A1 (en) * | 2021-02-11 | 2022-08-18 | National Currency Technologies, Inc. | Security mechanisms for digital currencies |
US20220300949A1 (en) * | 2021-03-17 | 2022-09-22 | International Business Machines Corporation | Centralized digital currency transactions utilizing a digital wallet |
US11455642B1 (en) | 2016-09-19 | 2022-09-27 | United Services Automobile Association (Usaa) | Distributed ledger based interchange |
US11501290B2 (en) | 2019-07-08 | 2022-11-15 | International Business Machines Corporation | Digital currency transfer |
US11556909B2 (en) | 2019-08-16 | 2023-01-17 | Visa International Service Association | Universal payment channels |
US11574307B2 (en) | 2020-08-06 | 2023-02-07 | Bank Of America Corporation | Three party authentication using quantum key distribution |
US20230144486A1 (en) * | 2021-11-09 | 2023-05-11 | Vincent Bono | Cryptocurrency Transaction Process |
US11651352B2 (en) * | 2016-07-15 | 2023-05-16 | Visa International Service Association | Digital asset distribution by transaction device |
US11741535B2 (en) * | 2019-03-25 | 2023-08-29 | Gideon Samid | Digital cash register: a comprehensive layout for cyber banking and digital coins |
WO2023235138A1 (en) * | 2022-06-03 | 2023-12-07 | Paypal, Inc. | Facilitating cryptocurrency-based transactions with time constraint |
US11854011B1 (en) | 2016-07-11 | 2023-12-26 | United Services Automobile Association (Usaa) | Identity management framework |
US11972418B2 (en) * | 2023-05-11 | 2024-04-30 | Eurocan Royal | Mobile device, system and method for currency exchange |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5796725B2 (en) * | 2013-03-22 | 2015-10-21 | カシオ計算機株式会社 | Authentication processing apparatus, authentication processing method, and program |
EP3022675B1 (en) * | 2013-07-16 | 2019-05-22 | Nokia Technologies OY | Methods, apparatuses, and computer program products for hiding access to information in an image |
US10325259B1 (en) | 2014-03-29 | 2019-06-18 | Acceptto Corporation | Dynamic authorization with adaptive levels of assurance |
USD789417S1 (en) * | 2014-12-22 | 2017-06-13 | Google Inc. | Portion of a display panel with a transitional graphical user interface component for a lock screen interface |
US10387980B1 (en) | 2015-06-05 | 2019-08-20 | Acceptto Corporation | Method and system for consumer based access control for identity information |
US11010763B1 (en) * | 2016-09-27 | 2021-05-18 | United Services Automobile Association (Usaa) | Biometric authentication on push notification |
USD866575S1 (en) * | 2017-03-20 | 2019-11-12 | Exfo Inc. | Display screen, or portion thereof, with graphical user interface for multi-fiber connector, fiber inspection probe testing |
US10417410B2 (en) * | 2017-03-27 | 2019-09-17 | International Business Machines Corporation | Access control to protected resource based on images at changing locations identifiable by their type |
CN107122838B (en) * | 2017-04-21 | 2021-06-25 | 杭州趣链科技有限公司 | Intelligent network car booking system and method based on block chain technology |
US11367323B1 (en) | 2018-01-16 | 2022-06-21 | Secureauth Corporation | System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score |
US11133929B1 (en) * | 2018-01-16 | 2021-09-28 | Acceptto Corporation | System and method of biobehavioral derived credentials identification |
CN108449511A (en) * | 2018-03-22 | 2018-08-24 | 上海爱优威软件开发有限公司 | A kind of presentation of information update method and system |
FR3086775B1 (en) * | 2018-10-02 | 2023-02-24 | Evidian | USER AUTHENTICATION METHOD BY USER IDENTIFIER AND ASSOCIATED GRAPHIC PASSWORD |
SG10201809937PA (en) * | 2018-11-08 | 2020-06-29 | Mastercard International Inc | Method and system for authenticating users |
US11171938B2 (en) * | 2018-12-21 | 2021-11-09 | Wells Fargo Bank, N.A. | Multi-layer user authentication with live interaction |
US11714891B1 (en) * | 2019-01-23 | 2023-08-01 | Trend Micro Incorporated | Frictionless authentication for logging on a computer service |
GB2585837A (en) * | 2019-07-16 | 2021-01-27 | British Telecomm | User authentication based on behavioural biometrics |
US11096059B1 (en) | 2019-08-04 | 2021-08-17 | Acceptto Corporation | System and method for secure touchless authentication of user paired device, behavior and identity |
US11328047B2 (en) * | 2019-10-31 | 2022-05-10 | Microsoft Technology Licensing, Llc. | Gamified challenge to detect a non-human user |
US11695758B2 (en) * | 2020-02-24 | 2023-07-04 | International Business Machines Corporation | Second factor authentication of electronic devices |
US11329998B1 (en) | 2020-08-31 | 2022-05-10 | Secureauth Corporation | Identification (ID) proofing and risk engine integration system and method |
US20230020997A1 (en) * | 2021-03-04 | 2023-01-19 | Regwez, Inc. | Systems and methods for using media objects to create high entropy passwords |
US20220343922A1 (en) * | 2021-04-26 | 2022-10-27 | Microsoft Technology Licensing, Llc | Selectively authenticating a user using voice recognition and random representations |
Family Cites Families (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8925801B2 (en) | 1996-11-27 | 2015-01-06 | Diebold, Incorporated | Securing communications with a pin pad |
US6270011B1 (en) | 1998-05-28 | 2001-08-07 | Benenson Tal | Remote credit card authentication system |
US7086085B1 (en) | 2000-04-11 | 2006-08-01 | Bruce E Brown | Variable trust levels for authentication |
US7676030B2 (en) | 2002-12-10 | 2010-03-09 | Ewi Holdings, Inc. | System and method for personal identification number distribution and delivery |
US7093281B2 (en) | 2001-06-04 | 2006-08-15 | G.E. Information Services, Inc. | Casual access application with context sensitive pin authentication |
US20040236699A1 (en) | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US7360689B2 (en) | 2001-07-10 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a FOB |
US7992007B2 (en) | 2002-02-05 | 2011-08-02 | Cardinalcommerce Corporation | Dynamic pin pad for credit/debit/ other electronic transactions |
US20120323788A1 (en) | 2002-02-05 | 2012-12-20 | Cardinalcommerce Corporation | Dynamic pin pad for credit/debit/other electronic transactions |
US7357310B2 (en) | 2005-03-11 | 2008-04-15 | Gerry Calabrese | Mobile phone charge card notification and authorization method |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
KR100847532B1 (en) * | 2006-04-06 | 2008-07-21 | 재단법인서울대학교산학협력재단 | User terminal and authenticating apparatus used for user authentication using information of user's behavior pattern |
US8831189B2 (en) | 2006-06-12 | 2014-09-09 | Microsoft Corporation | Device authentication techniques |
GB0910545D0 (en) | 2009-06-18 | 2009-07-29 | Therefore Ltd | Picturesafe |
US8825548B2 (en) | 2009-06-30 | 2014-09-02 | Ebay Inc. | Secure authentication between multiple parties |
SK288521B6 (en) | 2009-07-08 | 2017-12-04 | Smk Corporation | Method and system for entering the PIN code at non-cash payments, carrier PIN code |
US8384514B2 (en) | 2009-08-07 | 2013-02-26 | At&T Intellectual Property I, L.P. | Enhanced biometric authentication |
US8572394B2 (en) | 2009-09-04 | 2013-10-29 | Computer Associates Think, Inc. | OTP generation using a camouflaged key |
US8181029B2 (en) * | 2009-09-23 | 2012-05-15 | At&T Intellectual Property I, L.P. | Apparatus, methods, and computer program products for entering secure passwords |
US8296568B2 (en) | 2009-10-27 | 2012-10-23 | Google Inc. | Systems and methods for authenticating an electronic transaction |
US8843757B2 (en) | 2009-11-12 | 2014-09-23 | Ca, Inc. | One time PIN generation |
US9292731B2 (en) | 2009-12-30 | 2016-03-22 | Intel Corporation | Gesture-based signature authentication |
US9277403B2 (en) | 2010-03-02 | 2016-03-01 | Eko India Financial Services Pvt. Ltd. | Authentication method and device |
WO2011124275A1 (en) | 2010-04-09 | 2011-10-13 | Jasbir Singh | Authentication system and method thereof |
CN102971758A (en) | 2010-04-14 | 2013-03-13 | 诺基亚公司 | Method and apparatus for providing automated payment |
WO2012014231A1 (en) | 2010-07-29 | 2012-02-02 | Nirmal Juthani | System and method for generating a strong multi factor personalized server key from a simple user password |
US10042993B2 (en) | 2010-11-02 | 2018-08-07 | Homayoon Beigi | Access control through multifactor authentication with multimodal biometrics |
US9552470B2 (en) * | 2010-11-29 | 2017-01-24 | Biocatch Ltd. | Method, device, and system of generating fraud-alerts for cyber-attacks |
US9009793B2 (en) | 2011-03-31 | 2015-04-14 | Infosys Limited | Dynamic pin dual factor authentication using mobile device |
US9331852B2 (en) | 2011-04-07 | 2016-05-03 | Infosys Technologies, Ltd. | System and method for securing data transaction |
US8612766B2 (en) | 2011-07-05 | 2013-12-17 | Microsoft Corporation | Secure credential unlock using trusted execution environments |
NO333223B1 (en) | 2011-07-13 | 2013-04-15 | Trond Lemberg | Alternate PIN transfer |
US8627096B2 (en) | 2011-07-14 | 2014-01-07 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics |
US8868921B2 (en) | 2011-07-20 | 2014-10-21 | Daon Holdings Limited | Methods and systems for authenticating users over networks |
US8819428B2 (en) | 2011-10-21 | 2014-08-26 | Ebay Inc. | Point of sale (POS) personal identification number (PIN) security |
US8893244B2 (en) | 2011-11-30 | 2014-11-18 | Verizon Patent And Licensing Inc. | Application-based credential management for multifactor authentication |
US8752146B1 (en) | 2012-03-29 | 2014-06-10 | Emc Corporation | Providing authentication codes which include token codes and biometric factors |
US9137246B2 (en) | 2012-04-09 | 2015-09-15 | Brivas Llc | Systems, methods and apparatus for multivariate authentication |
US20130322705A1 (en) | 2012-05-30 | 2013-12-05 | Google Inc. | Facial and fingerprint authentication |
CA2817431A1 (en) | 2012-06-01 | 2013-12-01 | Nameh Jabbour | System and method for requesting and processing pin data using a digit subset for subsequent pin authentication |
US9135622B2 (en) | 2012-06-28 | 2015-09-15 | Paypay, Inc. | Secure payment made from a mobile device through a service provider |
US8819812B1 (en) | 2012-08-16 | 2014-08-26 | Amazon Technologies, Inc. | Gesture recognition for device input |
US8970348B1 (en) | 2012-08-28 | 2015-03-03 | Intuit Inc. | Using sequences of facial gestures to authenticate users |
US8955045B2 (en) | 2012-09-28 | 2015-02-10 | Intel Corporation | Facilitating varied access based on authentication scoring |
EP2747366A1 (en) | 2012-12-24 | 2014-06-25 | British Telecommunications public limited company | Client/server access authentication |
US9274607B2 (en) | 2013-03-15 | 2016-03-01 | Bruno Delean | Authenticating a user using hand gesture |
US9020567B2 (en) | 2013-04-05 | 2015-04-28 | Blackberry Limited | Authentication using fingerprint sensor in gesture path |
US9207771B2 (en) | 2013-07-08 | 2015-12-08 | Augmenta Oy | Gesture based user interface |
US9147063B1 (en) | 2013-09-27 | 2015-09-29 | Emc Corporation | Passcode generation utilizing selected permutation type applied to tokencode and personal identifier |
WO2015070160A1 (en) * | 2013-11-08 | 2015-05-14 | MustBin Inc. | Bin enabled data object encryption and storage apparatuses, methods and systems |
US9223955B2 (en) | 2014-01-30 | 2015-12-29 | Microsoft Corporation | User-authentication gestures |
US20160239649A1 (en) * | 2015-02-13 | 2016-08-18 | Qualcomm Incorporated | Continuous authentication |
-
2016
- 2016-08-01 US US15/224,998 patent/US10565569B2/en active Active
- 2016-08-01 US US15/225,780 patent/US20170053249A1/en not_active Abandoned
Cited By (167)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11100487B2 (en) * | 2007-10-18 | 2021-08-24 | Jpmorgan Chase Bank, N.A. | System and method for issuing, circulating and trading financial instruments with smart features |
US10091180B1 (en) | 2012-03-20 | 2018-10-02 | United Services Automobile Association (Usaa) | Behavioral profiling method and system to authenticate a user |
US10979410B1 (en) | 2015-05-04 | 2021-04-13 | United Services Automobile Association (Usaa) | Systems and methods for utilizing cryptology with virtual ledgers in support of transactions and agreements |
US11188907B1 (en) | 2015-08-21 | 2021-11-30 | United Services Automobile Association (Usaa) | ACH authorization validation using public blockchains |
US11195177B1 (en) | 2015-08-21 | 2021-12-07 | United Services Automobile Association (Usaa) | Distributed ledger systems for tracking recurring transaction authorizations |
US11720900B1 (en) * | 2015-11-17 | 2023-08-08 | United Services Automobile Association (Usaa) | Systems and methods for adaptive learning to replicate peak performance of human decision making |
US10949856B1 (en) | 2015-11-17 | 2021-03-16 | United Services Automobile Association (Usaa) | Systems and methods for adaptive learning to replicate peak performance of human decision making |
US11361286B1 (en) | 2015-11-20 | 2022-06-14 | United Services Automobile Association (Usaa) | Identifying negotiable instrument fraud using distributed ledger systems |
US10423938B1 (en) | 2015-11-20 | 2019-09-24 | United Services Automobile Association | Identifying negotiable instrument fraud using distributed ledger systems |
US11023604B1 (en) | 2015-11-23 | 2021-06-01 | United Services Automobile Association (Usaa) | Systems and methods to track, store, and manage events, rights and liabilities |
US11790097B1 (en) | 2015-11-23 | 2023-10-17 | United Services Automobile Association (Usaa) | Systems and methods to track, store, and manage events, rights, and liabilities |
US10586062B1 (en) | 2015-11-23 | 2020-03-10 | United Services Automobile Association (Usaa) | Systems and methods to track, store, and manage events, rights and liabilities |
US11201862B1 (en) | 2015-12-02 | 2021-12-14 | United Services Automobile Association (Usaa) | Public authentication systems and methods |
US11765158B1 (en) | 2015-12-02 | 2023-09-19 | United Services Automobile Association (Usaa) | Multi-factor authentication systems and methods |
US10164973B1 (en) | 2015-12-02 | 2018-12-25 | United Services Automobile Association (Usaa) | Public authentication systems and methods |
US11722482B1 (en) | 2015-12-02 | 2023-08-08 | United Services Automobile Association (Usaa) | Public authentication systems and methods |
US10263981B1 (en) | 2015-12-02 | 2019-04-16 | United Services Automobile Association (Usaa) | Public authentication systems and methods |
US11032286B1 (en) | 2015-12-02 | 2021-06-08 | United Services Automobile Association (Usaa) | Block chain authentication systems and methods |
US10601819B1 (en) | 2015-12-02 | 2020-03-24 | United Services Automobile Association (Usaa) | Public authentication systems and methods |
US11615386B1 (en) | 2015-12-02 | 2023-03-28 | United Services Automobile Association (Usaa) | Block chain authentication systems and methods |
US11539507B1 (en) | 2015-12-03 | 2022-12-27 | United Services Automobile Association (Usaa) | Managing blockchain access |
US10833843B1 (en) * | 2015-12-03 | 2020-11-10 | United Services Automobile Association (USAA0 | Managing blockchain access |
US10521780B1 (en) | 2015-12-16 | 2019-12-31 | United Services Automobile Association (Usaa) | Blockchain based transaction management |
US11816984B1 (en) | 2016-01-20 | 2023-11-14 | United Services Automobile Association (Usaa) | Systems and methods for traffic management via inter-party resource allocation |
US10818170B1 (en) | 2016-01-20 | 2020-10-27 | United Services Automobile Association | Systems and methods for traffic management via inter-party resource allocation |
US11354672B2 (en) | 2016-02-10 | 2022-06-07 | Bank Of America Corporation | System for secure routing of data to various networks from a process data network |
US20170243215A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for external secure access to process data network |
US10679215B2 (en) * | 2016-02-22 | 2020-06-09 | Bank Of America Corporation | System for control of device identity and usage in a process data network |
US10762504B2 (en) * | 2016-02-22 | 2020-09-01 | Bank Of America Corporation | System for external secure access to process data network |
US20170243208A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for control of device identity and usage in a process data network |
US10880080B1 (en) | 2016-02-24 | 2020-12-29 | Unites Services Automobile Association (USAA) | Cryptographic key generation from biometric data |
US10454677B1 (en) | 2016-02-24 | 2019-10-22 | United Services Automobile Associate (USAA) | Cryptographic key generation from biometric data |
US11334882B1 (en) | 2016-03-28 | 2022-05-17 | United Services Automobile Association (Usaa) | Data access management on a distributed ledger system |
US11186111B1 (en) | 2016-04-04 | 2021-11-30 | United Services Automobile Association (Usaa) | Digitally encoded seal for document verification |
US11854011B1 (en) | 2016-07-11 | 2023-12-26 | United Services Automobile Association (Usaa) | Identity management framework |
US11651352B2 (en) * | 2016-07-15 | 2023-05-16 | Visa International Service Association | Digital asset distribution by transaction device |
US10582554B2 (en) * | 2016-08-04 | 2020-03-03 | Fujitsu Client Computing Limited | Connection processing method, communication system, and communication device |
US20180042061A1 (en) * | 2016-08-04 | 2018-02-08 | Fujitsu Limited | Connection processing method, communication system, and communication device |
US10942998B2 (en) * | 2016-08-23 | 2021-03-09 | Lenovo (Singapore) Pte. Ltd. | Using gas chromatography for authentication, advertisements, and therapies |
US20180060551A1 (en) * | 2016-08-23 | 2018-03-01 | Lenovo (Singapore) Pte. Ltd. | Using gas chromatography for authentication, advertisements, and therapies |
US10402796B2 (en) | 2016-08-29 | 2019-09-03 | Bank Of America Corporation | Application life-cycle transition record recreation system |
US11455642B1 (en) | 2016-09-19 | 2022-09-27 | United Services Automobile Association (Usaa) | Distributed ledger based interchange |
US20180089688A1 (en) * | 2016-09-27 | 2018-03-29 | Mastercard International Incorporated | System and methods for authenticating a user using biometric data |
US11050763B1 (en) | 2016-10-21 | 2021-06-29 | United Services Automobile Association (Usaa) | Distributed ledger for network security management |
US11706231B1 (en) | 2016-10-21 | 2023-07-18 | United Services Automobile Association (Usaa) | Distributed ledger for network security management |
US10171509B2 (en) * | 2016-11-10 | 2019-01-01 | International Business Machines Corporation | Filtering and redacting blockchain transactions |
US11044272B2 (en) * | 2016-11-10 | 2021-06-22 | International Business Machines Corporation | Filtering and redacting blockchain transactions |
US11044100B2 (en) | 2017-01-30 | 2021-06-22 | Factom, Inc. | Validating documents |
US10419225B2 (en) | 2017-01-30 | 2019-09-17 | Factom, Inc. | Validating documents via blockchain |
US11863686B2 (en) | 2017-01-30 | 2024-01-02 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
US10411897B2 (en) | 2017-02-17 | 2019-09-10 | Factom, Inc. | Secret sharing via blockchains |
US11296889B2 (en) | 2017-02-17 | 2022-04-05 | Inveniam Capital Partners, Inc. | Secret sharing via blockchains |
US10797861B2 (en) | 2017-02-24 | 2020-10-06 | Alibaba Group Holding Limited | Secure data transactions |
US10878130B2 (en) * | 2017-02-24 | 2020-12-29 | Advanced New Technologies Co., Ltd. | Secure data transactions |
US11763305B1 (en) | 2017-02-27 | 2023-09-19 | United Services Automobile Association (Usaa) | Distributed ledger for device management |
US11392947B1 (en) | 2017-02-27 | 2022-07-19 | United Services Automobile Association (Usaa) | Distributed ledger for device management |
US10817873B2 (en) | 2017-03-22 | 2020-10-27 | Factom, Inc. | Auditing of electronic documents |
US11580534B2 (en) | 2017-03-22 | 2023-02-14 | Inveniam Capital Partners, Inc. | Auditing of electronic documents |
US10685399B2 (en) | 2017-03-31 | 2020-06-16 | Factom, Inc. | Due diligence in electronic documents |
US11443371B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
US11443370B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
US11468510B2 (en) | 2017-03-31 | 2022-10-11 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
US10762479B2 (en) * | 2017-04-05 | 2020-09-01 | Samsung Sds Co., Ltd. | Method and system for processing blockchain-based real-time transaction |
US11049104B2 (en) * | 2017-04-05 | 2021-06-29 | Samsung Sds Co., Ltd. | Method of processing payment based on blockchain and apparatus thereof |
US20180293556A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | Method and system for processing blockchain-based real-time transaction |
US10861039B2 (en) * | 2017-04-12 | 2020-12-08 | Royal Bank Of Canada | Bid platform |
US10693652B2 (en) | 2017-04-27 | 2020-06-23 | Factom, Inc. | Secret sharing via blockchain distribution |
US11044097B2 (en) | 2017-04-27 | 2021-06-22 | Factom, Inc. | Blockchain recordation of device usage |
US10270599B2 (en) | 2017-04-27 | 2019-04-23 | Factom, Inc. | Data reproducibility using blockchains |
US11373187B1 (en) | 2017-05-11 | 2022-06-28 | United Services Automobile Association (Usaa) | Token device for distributed ledger based interchange |
US11769154B1 (en) | 2017-05-11 | 2023-09-26 | United Services Automobile Association (Usaa) | Token device for distributed ledger based interchange |
US10762506B1 (en) | 2017-05-11 | 2020-09-01 | United Services Automobile Association | Token device for distributed ledger based interchange |
US20180357715A1 (en) * | 2017-06-12 | 2018-12-13 | Rodriguez F. Jones | System and Method For a Virtual Currency Exchange |
US11711219B1 (en) | 2017-08-24 | 2023-07-25 | United Services Automobile Association (Usaa) | PKI-based user authentication for web services using blockchain |
US10805085B1 (en) | 2017-08-24 | 2020-10-13 | United Services Automobile Association (Usaa) | PKI-based user authentication for web services using blockchain |
US11961068B2 (en) | 2017-09-04 | 2024-04-16 | Newtown Partners (Pty) Ltd | Cryptocurrency system |
WO2019043668A1 (en) * | 2017-09-04 | 2019-03-07 | Lingham Investments (Pty) Ltd | Cryptocurrency system |
US11483157B2 (en) | 2017-09-14 | 2022-10-25 | The Toronto-Dominion Bank | Management of cryptographically secure exchanges of data using permissioned distributed ledgers |
US10361870B2 (en) * | 2017-09-14 | 2019-07-23 | The Toronto-Dominion Bank | Management of cryptographically secure exchanges of data using permissioned distributed ledgers |
CN107767135A (en) * | 2017-10-10 | 2018-03-06 | 厦门益协作网络科技有限公司 | A kind of intelligence engineering transaction credit investigation system based on internet |
US11276055B1 (en) | 2017-10-11 | 2022-03-15 | Wells Fargo Bank, N.A. | Cash delivery service |
US11803904B2 (en) | 2017-12-12 | 2023-10-31 | Ascent Solutions Pte Ltd | Smart device and tracking system |
US11176609B2 (en) * | 2017-12-12 | 2021-11-16 | Ascent Solutions Pte Ltd | Smart device and tracking system |
US11170092B1 (en) | 2017-12-14 | 2021-11-09 | United Services Automobile Association (Usaa) | Document authentication certification with blockchain and distributed ledger techniques |
CN108199833A (en) * | 2018-01-04 | 2018-06-22 | 成都理工大学 | One kind is based on the distributed stolen mobile phone guard method of block chain |
US20190236564A1 (en) * | 2018-01-31 | 2019-08-01 | Walmart Apollo, Llc | System and method for digital currency via blockchain |
US11368416B2 (en) * | 2018-02-01 | 2022-06-21 | Red Hat, Inc. | Reconciliation of a blockchain ledger during failures of an enterprise service bus |
US20190251551A1 (en) * | 2018-02-14 | 2019-08-15 | Blockchain Goose Inc. | Systems, apparatuses, and methods for assessing, managing, presenting and indicating the value of a set of digital assets |
US11216804B2 (en) * | 2018-03-02 | 2022-01-04 | Nicholas B. Griffith | Central registry system for cryptocurrencies |
US11107156B2 (en) * | 2018-03-25 | 2021-08-31 | Gideon Samid | Digital finance: cash, credit, and investment instruments in a unified framework (BitMint) |
US11797988B2 (en) * | 2018-04-19 | 2023-10-24 | Vechain Foundation Limited | Transaction processing |
US20210241271A1 (en) * | 2018-04-19 | 2021-08-05 | Vechain Foundation Limited | Transaction Processing |
WO2019210256A1 (en) * | 2018-04-27 | 2019-10-31 | Social Wallet, Inc. | Systems and methods for zero knowledge crypto-asset exchange |
CN108596588A (en) * | 2018-04-28 | 2018-09-28 | 百度在线网络技术(北京)有限公司 | A kind of processing method of block data, device, computing device and storage medium |
US11930072B2 (en) | 2018-05-18 | 2024-03-12 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11134120B2 (en) | 2018-05-18 | 2021-09-28 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11477271B2 (en) | 2018-05-18 | 2022-10-18 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11580535B2 (en) | 2018-05-18 | 2023-02-14 | Inveniam Capital Partners, Inc. | Recordation of device usage to public/private blockchains |
US10783164B2 (en) | 2018-05-18 | 2020-09-22 | Factom, Inc. | Import and export in blockchain environments |
US11587074B2 (en) | 2018-05-18 | 2023-02-21 | Inveniam Capital Partners, Inc. | Recordation of device usage to blockchains |
US11347769B2 (en) | 2018-05-18 | 2022-05-31 | Inveniam Capital Partners, Inc. | Import and export in blockchain environments |
US11170366B2 (en) | 2018-05-18 | 2021-11-09 | Inveniam Capital Partners, Inc. | Private blockchain services |
US20190362305A1 (en) * | 2018-05-24 | 2019-11-28 | Walmart Apollo, Llc | Systems and Methods Exception Handling in a Distributed Computing Environment |
US11184171B2 (en) | 2018-05-24 | 2021-11-23 | Walmart Apollo, Llc | System and methods for multi-variant tracking |
US10977626B2 (en) | 2018-06-14 | 2021-04-13 | Capital One Services, Llc | Semi-private blockchain virtual currency exchange systems |
CN108881231A (en) * | 2018-06-21 | 2018-11-23 | 郑州云海信息技术有限公司 | The method, apparatus and storage medium of synchronous account information in a kind of group system |
US20190392403A1 (en) * | 2018-06-22 | 2019-12-26 | Antonio Alfredo Rainaldi | Collecting and sorting garbage and managing recycling using sensing technology |
US20210264459A1 (en) * | 2018-07-19 | 2021-08-26 | Asia Top Loyalty Limited | A method of loyalty exchange transaction by using blockchain for reward point exchange |
US11334874B2 (en) | 2018-08-06 | 2022-05-17 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11348097B2 (en) | 2018-08-06 | 2022-05-31 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11348098B2 (en) | 2018-08-06 | 2022-05-31 | Inveniam Capital Partners, Inc. | Decisional architectures in blockchain environments |
US11615398B2 (en) | 2018-08-06 | 2023-03-28 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11295296B2 (en) | 2018-08-06 | 2022-04-05 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11587069B2 (en) | 2018-08-06 | 2023-02-21 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11042871B2 (en) | 2018-08-06 | 2021-06-22 | Factom, Inc. | Smart contracts in blockchain environments |
US11044095B2 (en) * | 2018-08-06 | 2021-06-22 | Factom, Inc. | Debt recordation to blockchains |
US11276056B2 (en) | 2018-08-06 | 2022-03-15 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11620642B2 (en) | 2018-08-06 | 2023-04-04 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11531981B2 (en) | 2018-08-06 | 2022-12-20 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11676132B2 (en) | 2018-08-06 | 2023-06-13 | Inveniam Capital Partners, Inc. | Smart contracts in blockchain environments |
US11687916B2 (en) | 2018-08-06 | 2023-06-27 | Inveniam Capital Partners, Inc. | Decisional architectures in blockchain environments |
US11164250B2 (en) | 2018-08-06 | 2021-11-02 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11205172B2 (en) | 2018-08-06 | 2021-12-21 | Inveniam Capital Partners, Inc. | Factom protocol in blockchain environments |
WO2020043048A1 (en) * | 2018-08-30 | 2020-03-05 | 杭州复杂美科技有限公司 | Parallel chain data synchronization method, device, and storage medium |
CN109274435A (en) * | 2018-08-31 | 2019-01-25 | 海南新软软件有限公司 | A kind of method, apparatus and system using technology of acoustic wave transmission digital asset address |
US10783010B2 (en) * | 2018-09-24 | 2020-09-22 | Salesforce.Com, Inc. | Offline briefcase synchronization |
US11297001B2 (en) | 2018-10-08 | 2022-04-05 | Bank Of America Corporation | Closed loop resource distribution platform |
US11257071B2 (en) * | 2018-10-08 | 2022-02-22 | Bank Of America Corporation | Closed loop platform for dynamic currency conversion |
US11416475B2 (en) * | 2018-10-19 | 2022-08-16 | Adobe Inc. | Block quantity reduction in distributed ledgers |
US20220255725A1 (en) * | 2018-12-21 | 2022-08-11 | Capital One Services, Llc | System and method for authorizing transactions in an authorized member network |
WO2020154277A1 (en) * | 2019-01-21 | 2020-07-30 | Dan Kikinis | Security gateway for high security blockchain systems |
US11068888B1 (en) * | 2019-02-06 | 2021-07-20 | Countia, LLC. | Value-transfer payment system |
US11741535B2 (en) * | 2019-03-25 | 2023-08-29 | Gideon Samid | Digital cash register: a comprehensive layout for cyber banking and digital coins |
CN109981646A (en) * | 2019-03-26 | 2019-07-05 | 阿里巴巴集团控股有限公司 | Resource transfers method and device and electronic equipment based on block chain |
WO2020219469A1 (en) * | 2019-04-25 | 2020-10-29 | Coinstar Asset Holdings, Llc | Kiosk-based systems and methods for selling cryptocurrencies |
US11367056B2 (en) | 2019-04-25 | 2022-06-21 | Coinstar Asset Holdings, Llc | Kiosk-based systems and methods for selling cryptocurrencies |
US11222333B2 (en) * | 2019-05-31 | 2022-01-11 | Panasonic Avionics Corporation | In-flight fiat payment authorization and capture settlement |
US11501290B2 (en) | 2019-07-08 | 2022-11-15 | International Business Machines Corporation | Digital currency transfer |
US11556909B2 (en) | 2019-08-16 | 2023-01-17 | Visa International Service Association | Universal payment channels |
CN110766400A (en) * | 2019-10-22 | 2020-02-07 | 全链通有限公司 | Transaction record processing method based on block chain, accounting node and medium |
US10911463B1 (en) | 2019-12-09 | 2021-02-02 | Evan Chase Rose | Graphical user interface and console management system for distributed terminal network |
US11019055B1 (en) | 2019-12-09 | 2021-05-25 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US11108771B2 (en) * | 2019-12-09 | 2021-08-31 | Evan Chase Rose | Facial recognition, image analysis, and decentralized learning framework using adaptive security protocols in distributed terminal network |
US11184361B2 (en) * | 2019-12-09 | 2021-11-23 | Evan Chase Rose | Graphical user interface and operator console management system for distributed terminal network |
US10873578B1 (en) | 2019-12-09 | 2020-12-22 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US11200548B2 (en) | 2019-12-09 | 2021-12-14 | Evan Chase Rose | Graphical user interface and operator console management system for distributed terminal network |
US10904259B1 (en) * | 2019-12-09 | 2021-01-26 | Evan Chase Rose | Graphical user interface and console management system for distributed terminal network |
US10902705B1 (en) | 2019-12-09 | 2021-01-26 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US10931677B1 (en) | 2019-12-09 | 2021-02-23 | Evan Chase Rose | Graphical user interface and console management system for distributed terminal network |
US11343075B2 (en) | 2020-01-17 | 2022-05-24 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11444749B2 (en) | 2020-01-17 | 2022-09-13 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
US11943334B2 (en) | 2020-01-17 | 2024-03-26 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
US11863305B2 (en) | 2020-01-17 | 2024-01-02 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11113665B1 (en) * | 2020-03-12 | 2021-09-07 | Evan Chase Rose | Distributed terminals network management, systems, interfaces and workflows |
US11687917B2 (en) * | 2020-07-16 | 2023-06-27 | Mehdi M. Rohani | Mobile device, system and method for currency exchange |
US20230281610A1 (en) * | 2020-07-16 | 2023-09-07 | Mehdi M. Rohani | Mobile device, system and method for currency exchange |
US20220020005A1 (en) * | 2020-07-16 | 2022-01-20 | Mehdi M. Rohani | Mobile device, system and method for currency exchange |
US20220020088A1 (en) * | 2020-07-17 | 2022-01-20 | Hon Hai Precision Industry Co., Ltd. | Device and method for assigning virtual object recording electronic voucher based on block chain |
US11574307B2 (en) | 2020-08-06 | 2023-02-07 | Bank Of America Corporation | Three party authentication using quantum key distribution |
WO2022173856A1 (en) * | 2021-02-11 | 2022-08-18 | National Currency Technologies, Inc. | Security mechanisms for digital currencies |
US20220300949A1 (en) * | 2021-03-17 | 2022-09-22 | International Business Machines Corporation | Centralized digital currency transactions utilizing a digital wallet |
US11816661B2 (en) * | 2021-03-17 | 2023-11-14 | International Business Machines Corporation | Centralized digital currency transactions utilizing a digital wallet |
CN112990829A (en) * | 2021-04-21 | 2021-06-18 | 江苏荣泽信息科技股份有限公司 | Asset management system based on block chain |
US20230144486A1 (en) * | 2021-11-09 | 2023-05-11 | Vincent Bono | Cryptocurrency Transaction Process |
WO2023235138A1 (en) * | 2022-06-03 | 2023-12-07 | Paypal, Inc. | Facilitating cryptocurrency-based transactions with time constraint |
US11972418B2 (en) * | 2023-05-11 | 2024-04-30 | Eurocan Royal | Mobile device, system and method for currency exchange |
Also Published As
Publication number | Publication date |
---|---|
US20170032113A1 (en) | 2017-02-02 |
US10565569B2 (en) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170053249A1 (en) | Electronic Crypto-Currency Management Method and System | |
US10535065B2 (en) | Secure payment transactions based on the public bankcard ledger | |
US20220114584A1 (en) | Apparatus and methods to define and use bearer tokens, certified tokens and applications using bearer tokens and certified tokens | |
US20090070263A1 (en) | Peer to peer fund transfer | |
JP6031524B2 (en) | Safely refillable electronic wallet | |
AU2010295188B2 (en) | Asset storage and transfer system for electronic purses | |
CN107230055B (en) | Method and system for paying digital currency | |
AU2019355834B2 (en) | Systems and methods for cryptographic authentication of contactless cards | |
WO2017160877A1 (en) | Technical architecture supporting tokenized payments | |
US11062290B2 (en) | Secure real-time transactions | |
US20200013045A1 (en) | Stake pool for a secure and trusted data communication system | |
US20200051068A1 (en) | Dynamic provisioning of wallets in a secure payment system | |
US20210383335A1 (en) | Systems, methods, and computer program products providing an identity-storing browser | |
US20180144325A1 (en) | Secure real-time transactions | |
US20180144326A1 (en) | Secure real-time transactions | |
CN116802661A (en) | Token-based out-of-chain interaction authorization | |
JP7258378B2 (en) | Systems and methods for processing payment transactions over blockchain networks | |
KR20190065832A (en) | Method for Providing Payment based on Sound Wave by using Cryptocurrency | |
US20230274269A1 (en) | Apparatus and methods to define and use bearer tokens and certified tokens and applications using bearer tokens and certified tokens | |
US20230004958A1 (en) | Systems and methods for managing cryptocurrency | |
US20210090061A1 (en) | Systems and methods for device-present electronic commerce transaction checkout |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NXT-ID, INC., CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TUNNELL, DAVID;MORGAN, CHARLES;SIGNING DATES FROM 20160823 TO 20160902;REEL/FRAME:040308/0440 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: SAGARD HOLDINGS MANAGER LP, CANADA Free format text: SECURITY AGREEMENT;ASSIGNORS:LOGICMARK, LLC;NXT-ID, INC.;FIT PAY, INC.;AND OTHERS;REEL/FRAME:046269/0411 Effective date: 20180524 |
|
AS | Assignment |
Owner name: FIT PAY, INC., COLORADO Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050235/0083 Effective date: 20190503 Owner name: 3D-ID, LLC, FLORIDA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050235/0083 Effective date: 20190503 Owner name: LOGICMARK, LLC, KENTUCKY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050235/0083 Effective date: 20190503 Owner name: NXT-ID, INC., FLORIDA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050235/0083 Effective date: 20190503 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
AS | Assignment |
Owner name: NXT-ID, INC., FLORIDA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050246/0397 Effective date: 20190503 Owner name: 3D-ID, LLC, FLORIDA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050246/0397 Effective date: 20190503 Owner name: FIT PAY, INC., COLORADO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050246/0397 Effective date: 20190503 Owner name: LOGICMARK, LLC, KENTUCKY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SAGARD HOLDINGS MANAGER LP;REEL/FRAME:050246/0397 Effective date: 20190503 |
|
AS | Assignment |
Owner name: FIT PAY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NXT-ID, INC.;REEL/FRAME:050322/0163 Effective date: 20190909 |
|
AS | Assignment |
Owner name: GARMIN INTERNATIONAL, INC., KANSAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FIT PAY, INC.;REEL/FRAME:050588/0972 Effective date: 20191001 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |