专利汇可以提供DISTRIBUTED CRYPTO CURRENCY UNAUTHORIZED TRANSFER MONITORING SYSTEM专利检索,专利查询,专利分析的服务。并且Distributed crypto currency systems and methods include receiving a payer public key that is associated with a current transaction between a payer and a payee. It is determined whether the payer public key is included in a plurality of previous transaction public keys that are each associated with a respective unauthorized crypto currency transfer as a result of a previous transaction. In response to determining that the payer public key is included in the plurality of previous transaction public keys, a message is sent to the payee to not proceed with the current transaction. In response to determining that the payer public key is not included in the plurality of previous transaction public keys, a message is sent to the payee to proceed with the current transaction.,下面是DISTRIBUTED CRYPTO CURRENCY UNAUTHORIZED TRANSFER MONITORING SYSTEM专利的具体信息内容。
What is claimed is:
1. Field of the Invention
The present invention generally relates to online and/or mobile payments and more particularly to a system for monitoring unauthorized transfers in a distributed crypto currency system that may be used to make online and/or mobile payments.
2. Related Art
More and more consumers are purchasing items and services over electronic networks such as, for example, the Internet. Consumers routinely purchase products and services from merchants and individuals alike. The transactions may take place directly between a conventional or on-line merchant or retailer and the consumer, and payment is typically made by entering credit card or other financial information. Transactions may also take place with the aid of an on-line or mobile payment service provider such as, for example, PayPal, Inc. of San Jose, Calif. Such payment service providers can make transactions easier and safer for the parties involved. Purchasing with the assistance of a payment service provider from the convenience of virtually anywhere using a mobile device is one main reason why on-line and mobile purchases are growing very quickly.
Conventional payment service providers typically provide for payment by a payer to a payee through the use of payer accounts of the payer (e.g., credit accounts, banking account, and/or a variety of other payer accounts that may be provided by an account provider.). For example, the payment service provider may provide a payment service account to the payer, and the payer may link one or more payer accounts to the payment service account (or the payment service account may include a payer account provided by the payment service provider). In a transaction between the payer and the payee, the payment service provider may then transfer funds from one of the payer accounts to a payee account of the payee (which may also be provided by the account providers or payment service provider). The use of such payer accounts, payee accounts, and payment service accounts is controlled by one or more account providers that operate to ensure that funds in the payer accounts or payee accounts are not misappropriated, and to mediate disputes associated with the transfer of funds between payer accounts and payee accounts.
An alternative to payer accounts and payee accounts provided by account providers is the use of distributed crypto currencies such as, for example, Bitcoin, Ripple, Litecoin, Aurora Coin, Peercoin, and/or a variety of other distributed crypto currencies known in the art. Distributed crypto currencies are not controlled by any central authority, but rather by a distributed network of computing devices that operate to confirm transfers of the crypto currency between payers and payees. Such decentralized distributed crypto currencies provide for the non-reversible transfer of the crypto currency between users in the system, as there is no central authority that ensures that funds of the users are not misappropriated or that mediates disputes associated with the transfer of the crypto currency between users. In other words, once a transfer has been made from a payer to a payee, there is no way to reverse that transfer unless the payee decides to transfer the crypto currency back to the payer in a new transaction. This feature of distributed crypto currencies provides a number of benefits (e.g., reduced transaction costs), but opens the system up to theft by any user that can access the crypto currency of another user such that that crypto currency may be transferred.
Thus, there is a need for an improved distributed crypto currency system.
Embodiments of the present disclosure and their advantages are best understood by referring to the detailed description that follows. It should be appreciated that like reference numerals are used to identify like elements illustrated in one or more of the figures, wherein showings therein are for purposes of illustrating embodiments of the present disclosure and not for purposes of limiting the same.
Embodiments of the present disclosure describe systems and methods for providing a distributed crypto currency unauthorized transaction monitoring system that introduces disincentives for stealing or otherwise transferring that crypto currency with the authorization of its owner. In embodiments discussed below, a system provider or providers operate to provide for the reporting of unauthorized crypto currency transfers, record public keys that are used in the unauthorized transfer of crypto currencies from their owner, and store any of those public keys in a database. Those public keys may then become blacklisted such that when a current transaction between a payer and a payee is performed, the payer public key that is associated with the current transaction ay be sent to the system provider and if the system provider determines that the payer public key is blacklisted (i.e., explicitly stored in the database or associated with a public key that is stored in the database), the current transaction may be stopped and/or the payee may be informed not to proceed with the current transaction. Thus, payers that attempt to spend crypto currencies that they have obtained through unauthorized transfer from a previous owner will be unable to do so with payees participating in the system, reducing the value of any crypto currency obtained through unauthorized transfer.
Referring now to
Referring now to
Referring now to
In the manner described above, a distributed crypto currency system is provided in which payers and payees may participate in transactions with each other using the electronic coins discussed above and without the need for a centralized authority such as a bank. Each of those transactions is recorded in the crypto currency public ledger to ensure that the electronic coins may only be spent by a payer once. However, as described above, the transactions in such distributed crypto currency systems are not reversible without cooperation of a payee and, as such, allow for users of the crypto currency system who gain access to the electronic coins of another user to transfer those electronic coins to themselves with little to no repercussions. The method 100 contemplates improvements on such distributed crypto currency systems that provides for incentives against such activities by reducing and/or eliminating the value of electronic coins that are transferred from a user without their authorization.
Referring now to
In an embodiment of block 102, the system provider device(s) 402 receive an unauthorized crypto currency transfer report from one of the user device(s) 12 over the network 406. As discussed above, users of the distributed crypto currency system 400 are subject to theft of their electronic coins due to unauthorized transfers of those electronic coins that can occur in a wide variety of manners. For example, a user device 412 of a user of the distributed crypto currency system 400 that is an owner of electronic coins may store an “electronic wallet” that includes the private key that allows that user to sign transactions such that those electronic coins may be transferred to other users of the distributed crypto currency system 400. In some examples of electronic coin theft, a first electronic wallet may be left unprotected on a first user device of a first user (e.g., unencrypted such that a user identifier and password do not need to be provided on the first user device to sign transactions using the first electronic wallet) such that a second user may gain access to the first electronic wallet on the first user device and sign a transaction involving their own public key (e.g., a public key associated with a second electronic wallet on a second user device of the second user), which results in the electronic coins associated with the first electronic wallet being “transferred to” (i.e., associated with) the second electronic wallet of the second user.
Furthermore, even protected electronic wallets are subject to theft based on password theft (e.g., guessing a user password, stealing a user password via a virus placed on the user device (e.g., a virus that installs a key logger on the user device), etc.), accessing an electronic wallet seed (i.e., a seed for a deterministic electronic wallet that allows for reproduction of a users private key), and/or otherwise gaining access to a private key of a user to transfer their electronic coins (i.e., associate their electronic coins) with another wallet (i.e., a public key generated by that electronic wallet) without their authorization.
In response to an unauthorized crypto currency transfer of electronic coins from their electronic wallet, a user may use their user device 412 to provide an unauthorized crypto currency transfer report over the network 406 to the system provider device(s) 402. For example, upon the occurrence of (or sometime following) an unauthorized crypto currency transfer (e.g., in response to a crypto currency transfer notification (e.g., an email), checking an electronic wallet, etc.), the user experiencing the unauthorized crypto currency transfer may send the details of the unauthorized crypto currency transfer over the network 406 to the system provider device(s) 402. In the illustrated embodiment, the public key database(s) 404 include a public key list 404a having a plurality of public keys that are associated with unauthorized crypto currency transfers (e.g., that were reported at block 102 in previous iterations of the method 100).
Referring to
The method 100 then proceeds to block 104 where the unauthorized crypto currency transfer report is confirmed. In different embodiments of block 102, the system provider device(s) 402 may operate in a variety of ways to confirm the unauthorized crypto currency transfer report received at block 102. For example, the system provider device(s) 402 may provide a reporting tool or application such as, for example, a website, at which a user may use the user device 412 to provide the unauthorized crypto currency transfer report. The reporting tool or application may operate to confirm unauthorized crypto currency transfer reports that provide a plurality of requested information (e.g., the details of the unauthorized crypto currency transfer discussed above), that provide a confirmation of the identity of the user, that provide a police report of the unauthorized crypto currency transfer, and/or that provide a plurality of other confirmation information known in the art.
In an embodiment, there may be a maximum amount of time (e.g., as measured from the date and time of the unauthorized crypto currency transfer) that may pass before an unauthorized crypto currency transfer report will not be confirmed at block 104. For example, users may be required to report unauthorized crypto currency transfers within 1 hour of their transfer date in order for such unauthorized crypto currency transfer reports to be confirmed. However, in other embodiments (or as part of similar embodiments), the system provider device(s) 402 may wait a predetermined time period (e.g., a time period necessary for a predetermined number of confirmations from the distributed network) subsequent to receiving an unauthorized crypto currency transfer report before confirming that unauthorized crypto currency transfer report (and subsequently storing its associated public key, discussed below).
For example, the system provider device(s) may operate to contact a user associated with the public key that is part of an unauthorized crypto currency transfer report in order to confirm the unauthorized crypto currency transfer report. In some embodiments, users may register themselves (e.g., via a user name or other identifier) and public keys that they use to receive electronic coins with the system provider device(s) 402, and at block 104, a public key that is associated with an unauthorized crypto currency transfer report and that is also registered with the system provider device(s) 402 may allow the system provider device(s) 402 to contact the registered user to inform that registered user of the unauthorized crypto currency transfer report that includes one of their public keys. In such situations, the registered user associated with a public key in a unauthorized crypto currency transfer report may respond to the unauthorized crypto currency transfer report such that a dispute between the registered user and the reporting user may be mediated by the system provider device(s) 402 in confirming the unauthorized crypto currency transfer report, while a registered user (or a public key that is registered) that does not respond in the predetermined amount of time may result in the unauthorized crypto currency transfer report being confirmed.
In other embodiments, any public key associated with an unauthorized crypto currency transfer report may be made publicly available in a searchable database such that users of the distributed crypto currency system may determine whether their public keys have been provided in unauthorized crypto currency transfer reports. While a few examples have been provided, any of a variety of systems and methods may be instituted to determine how and when an unauthorized crypto currency transfer report should be confirmed or not.
The method 100 then proceeds to block 106 where the public key associated with the unauthorized crypto currency transfer report is stored in a database. In an embodiment, in response to confirming the unauthorized crypto currency transfer report at block 104, the system provider device(s) 402 may store the public key associated with the unauthorized crypto currency transfer report in the public key database 404. As such, any of the public keys (e.g., the public keys 502, 504, and 506) and associated unauthorized crypto currency transfer details in the public key lists 404a or 500 may have been stored in the public key database 404 in the manner discussed above. In some embodiments, identifiers for the public keys (or the positions of the public keys in the crypto currency public ledger) may be stored in the public key database 404 rather than the actual public keys. Furthermore, the public keys (or identifiers) stored in the public key database 404 may be forwarded to other system provider devices 402 following receipt of their unauthorized crypto currency transfer reports, following the confirmation of such reports, etc., such that the public key database 404 is distributed throughout the distributed network.
As discussed in further detail below, by compiling public keys that are associated with unauthorized crypto currency transfers in the public key database(s) 404, a public key “blacklist” is created that includes public keys that have been used in the unauthorized transfer of electronic coins. The public key “blacklist” may allow for the position of unauthorized transactions (e.g., electronic coin thefts) in the crypto currency public ledger to be determined, and allows for the distributed crypto currency system to track the further use of those electronic coins in subsequent transactions. As such, a subsequent transaction using electronic coins that are associated with a public key that is stored in the public key database(s) 404 may be tracked. For example, a first public key may be stored in the public key database(s) 404 in response to a confirmed unauthorized crypto currency transfer report associated with an initial transaction of electronic coins, and a subsequent transaction may involve a second public key that transfers at least some of those electronic coins to another user. In such an example, that second public key may also be stored in the public key database(s) 404 based on the electronic coin transfer that includes electronic coins that were associated with the first public key that is stored in the public key database(s) 404. In some embodiments, the “blacklist” may have different levels for reported public keys that indicate whether those public keys are currently in dispute or have been determined to be part of an unauthorized transaction.
The method 100 then proceeds to decision block 108 where it is determined whether a current transaction inquiry has been received. As discussed in further detail below, a current transaction inquiry may be received by the system provider device(s) 402 from any payee receiving electronic coins from a payer. If at decision block 108 it is determined that no current transaction inquiry is received, the method 100 proceeds back to loop through blocks 102-106 of the method 100 such that public keys are stored in the public key database(s) 404 in response to receiving and confirming unauthorized crypto currency transfer reports. If at decision block 108, it is determined that a current transaction inquiry is received, the method 100 proceeds to block 110, discussed below.
In an embodiment, the system provider device(s) 402 may receive a current transaction inquiry over the network 406 from one of the payee devices 410. For example, any one of each of the payer devices 408 and payee devices 410 may initiate a current transaction. For example, a payer associated with the payer device 408 may wish to purchase one or more products from a payee associated with the payee device 410, and in response may attempt to transfer electronic coins to the payee as discussed above with reference to
At block 110, a payer public key that is associated with the current transaction between the payer and the payee is determined. As discussed above, an electronic coin owned by the payer will have a public key of the payer associated with it (e.g., the electronic coin 200 of
The method 100 then proceeds to decision block 112 where it is determined whether the payer public key is associated with previous transaction public keys in the database. In an embodiment, for any performance of the method 100, the public keys that are stored in the public key database 404 may be referred to as previous transaction public keys relative to a payer public key that is being used in a current transaction (e.g., for which the current transaction inquiry was received at decision block 108). Thus, at decision block 112, the system provider device(s) 402 use the payer public key determined at block 110 of the method 100 to reference the public key database 404 and determine whether that payer public key is associated with one of the previous transaction public keys in the public key database.
In an embodiment of decision block 112, the system provider device(s) 402 may determine whether the payer public key is associated with the previous transaction public keys in the public key database 404 by determining whether the payer public key is the same as one of the previous transaction public keys that are stored in the public key database 404. For example, the system provider device may determine whether the payer public key being used in the current transaction is one of the previous transaction public keys in the public key database 404 (i.e., whether that payer public key was included in a previously received and confirmed unauthorized transaction report such that it was added to the public key database 404). In another example, the system provider device(s) 402 may determine whether the payer public key being used in the current transaction was previously added to the public key database 404 in response to determining that it was involved in a transfer with one of the previous transaction public keys in the public key database 404 (i.e., that payer public key was not part of an unauthorized crypto currency transfer report, but rather was involved in a transfer with a previous transaction public key that was part of an unauthorized crypto currency transfer report).
In another embodiment of decision block 112, the system provider device(s) 402 may determine whether the payer public key is associated with the previous transaction public keys in the public key database 404 by determining whether the payer public key was involved in a transaction with one of the previous transaction public keys that are stored in the public key database 404. For example, the system provider device(s) 402 may determine (e.g., using the crypto currency ledger) whether the payer public key (which is not currently included in the public key database 404) was involved with a previous transaction public key that is stored in the public key database 404 (e.g., subsequent to receiving an unauthorized crypto currency transfer report for that previous transaction public key based on a previous transaction, but without determining any association between the payer public key and that previous transaction public key between that previous transaction and the current transaction).
In some embodiments, a network of payees may agree to not accept electronic coins associated with a payer public key if that payer public key was used to receive electronic coins from a previous transaction public key (which is stored in the public key database 404 based on a confirmed unauthorized crypto currency transfer report) over a minimum amount of time following the adding of that previous transaction public key to the public key database 404. As such, payees and system providers may agree on the minimum time interval following the adding of a public key to the blacklist of public keys after which electronic coins having any association with that public key will not be accepted by the payees.
If, at decision block 112, the system provider device(s) determine that the payer public key is not associated with a previous transaction public key in the public key database 404, the method 100 proceeds to block 114 where a message is sent to proceed with the current transaction. A determination that a payer public key is not associated with a previous transaction public key in the public key database 404 informs the system provider device(s) 402 that the payer involved in the current transaction has obtained the electronic coins legitimately (e.g., through authorized crypto currency transfer from the previous owner). Furthermore, in embodiments where any previous transaction associated with the electronic coins are checked to ensure no previous transaction public keys associated with the electronic coin have been stored in the public key database 404, the determination that a payer public key is not associated with a previous transaction public key in the public key database 404 informs the system provider device(s) that the electronic coins involved in the current transaction have never been involved in an unauthorized crypto currency transfer from any of its previous owners.
As such, in response to determining that the payer public key is not associated with the previous transaction public keys in the public key database 404, the system provider device(s) 402 may send a message to the payer device 410 over the network 406 that informs the payer that they should proceed with the current transaction. Messages sent at block 114 may include emails, texts, application specific messages, and/or any other notification known in the art that would inform the payee that they should proceed with the transaction. In some embodiments, the system provider device(s) may act as an intermediary between the payer and the payee to receive and hold the electronic coins received from the payer prior to transferring them to the payee. In such embodiments, at block 114, the message sent to proceed in the current transaction may actually include the electronic coins that the system provider device(s) 402 received from the payer and is transferring to the payee. As such, only current transactions that include a payer public key (or payer public keys) that are not included in the public key database 404 may be participated in by payees that are part of the distributed crypto currency system 400.
If, at decision block 112, the system provider device(s) determine that the payer public key is associated with a previous transaction public key in the public key database 404, the method 100 proceeds to block 116 where a message is sent to not proceed with the current transaction. A determination that a payer public key is associated with a previous transaction public key in the public key database 404 informs the system provider device(s) 402 that the payer involved in the current transaction has obtained the electronic coins illegitimately (e.g., through an unauthorized crypto currency transfer from the previous owner). Furthermore, in embodiments where any previous transaction associated with the electronic coins are checked to determine whether previous transaction public keys associated with the electronic coin have been stored in the public key database 404, the determination that a payer public key is associated with a previous transaction public key in the public key database 404 informs the system provider device(s) that the electronic coins involved in the current transaction were at some time in the past involved in an unauthorized crypto currency transfer from at least one of its previous owners.
As such, in response to determining that the payer public key is associated with the previous transaction public keys in the public key database 404, the system provider device(s) 402 may send a message to the payer device 410 over the network 406 that informs the payer that they should not proceed with the current transaction. Messages sent at block 114 may include emails, texts, application specific messages, and/or any other notification known in the art that would inform the payee that they should not proceed with the transaction. In some embodiments, the system provider device(s) may act as an intermediary between the payer and the payee to receive and hold the electronic coins received from the payer prior to transferring them to the payee. In such embodiments, at block 114, the message sent to not proceed in the current transaction may include a message that the electronic coins are being held by the system provider device(s) or being returned to the payer because they have been involved in an unauthorized crypto currency transfer. As such, current transactions that include a payer public key (or payer public keys) that are included in the public key database 404 will be not be participated in by payees that are part of the distributed crypto currency system 400.
The method 100 may then proceed to optional block 118 where communication between the payer and a reporting user is facilitated. In an embodiment, the system provider device(s) 402 may operate to facilitate communication between the payer (who is associated with the payer public key that is associated with a previous transaction public key in the public key database 404) and the reporting user that provided the unauthorized crypto currency transfer report at block 106 that included the previous transaction public key that is associated with the payer public key. In some embodiments, the system provider device(s) 402 may provide a mediation authority for electronic coins that are associated with unauthorized crypto currency transfers to allow arbitration of disputes over electronic coins and all users of those electronic coins to “rehabilitate” electronic coins that have been associated with unauthorized crypto currency transfers. As discussed above, in embodiments where the system provider device(s) 402 are used to hold the electronic coins that are part of the transaction between the payer and the payee, the system provider device(s) 402 may either return the electronic coins to the payer or hold those electronic coins as part of a rehabilitation process to return those electronic coins (or a portion of those electronic coins) to the previous owner that reported their unauthorized transfer.
For example, a payee may require a payer to transfer electronic coins to be used in a current transaction with the payee to the system provider device(s) 402 such the system provider actually owns those coins, and can transfer those electronic coins to the payee in the event the method proceeds to block 114. However, in such embodiments in which the method proceeds to block 116, at block 118 the system provider device(s) may hold those electronic coins and institute block 118 as an arbitration system in which the system provider device(s) 402 act to determine the rightful owner of those electronic coins. Furthermore, in the situations where the payer public key is not included in the public key database 404 but rather is associated with a previous transaction public key that is included in the public key database 404, the system provider device(s) 404 may institute some equitable division of the electronic coins between that payer and the user that provided the unauthorized crypto currency transfer report associated with those electronic coins. For example, the system provider device(s) 402 may facilitate a crypto currency transfer between the payer and the reporting user (or from the system provider device to the reporting user) such that the payer transfers some reduced percentage of a crypto currency transfer that was associated with the previous transaction that resulted in the reporting user providing the unauthorized crypto currency transfer report. As such, electronic coins may be “rehabilitated” and any public key associated with rehabilitated electronic coins may be removed from the public key database 404.
Thus, systems and methods for providing a distributed crypto currency system have been described that provide for the collection of public keys that are associated with unauthorized crypto currency transactions, and the monitoring of current transactions for those or related public keys to determine if a payer is attempting to spend an electronic coin that has been stolen from a prior user. By preventing (or advising payees to refrain from) transactions involving such electronic coins, the systems and methods described herein reduce the incentives to steal electronic coins by reducing their value through the reduction of the ability to use such electronic coins. Furthermore, any public key used to receive stolen electronic coins will be associated with those stolen electronic coins and, as such, will taint any prior crypto currency associated with that public key. A network of payees agreeing to participate in the systems and methods of the present disclosure provides for a level of additional security in distributed crypto currency systems by reducing the ability to spend electronic coins obtained by illegitimate means and providing for the rehabilitation of those electronic coins by returning as least some portion of those electronic coins to their legitimate owners if they are found.
Furthermore, the systems and methods of the present disclosure may operate to disincentive the use of current methods for hiding the theft of crypto currencies. For example, crypto currencies “tumblers” are sometimes used for electronic coins associated with unauthorized crypto currency transfers in order to “launder” those electronic coins. Crypto currency tumblers operate by transferring the electronic coins from an owner first public key associated with an owner of stolen electronic coins to a tumbler public key associated with the tumbler provider. The tumbler provider then transfers electronic coins, in the same amount as were transferred from the owner first public key to the tumbler public key, from one or more other user public keys to an owner second public key of the owner. As such, the owner receives electronic coins in an amount that is the same as the stolen electronic coins, but now associated with a “clean” public key. To further launder the stolen electronic coins, the tumbler provider may time delay the electronic coin transfer to the owner second public key, and may also have the owner withdraw the electronic coins in different amounts over time. Over time, the tumbler provider will transfer electronic coins associated with the tumbler public key (i.e., that received the stolen electronic coins from the owner first public key) to other user public keys performing the same function as described above. However, the systems and methods of the present disclosure make it much more dangerous to use or run a tumbler, as the possibility of receiving electronic coins (or any portion of an electronic coin) that are associated with a public key that has been stored in the public key database 404 will always be present, operating to possibly taint any electronic coins received and transferred from the tumbler.
Referring now to
The payer devices, payee devices, user devices, payment service provider device, and/or system provider device may each include one or more processors, memories, and other appropriate components for executing instructions such as program code and/or data stored on one or more computer readable mediums to implement the various applications, data, and steps described herein. For example, such instructions may be stored in one or more computer readable mediums such as memories or data storage devices internal and/or external to various components of the system 600, and/or accessible over the network 610.
The network 610 may be implemented as a single network or a combination of multiple networks. For example, in various embodiments, the network 610 may include the Internet and/or one or more intranets, landline networks, wireless networks, and/or other appropriate types of networks.
The payer devices 602 may be implemented using any appropriate combination of hardware and/or software configured for wired and/or wireless communication over network 610. For example, in one embodiment, the payer devices 602 may be implemented as a personal computer of a user in communication with the Internet. In other embodiments, the payer devices 602 may be a smart phone, laptop computer, wearable computing device, and/or other types of computing devices.
The payer devices 602 may include one or more browser applications which may be used, for example, to provide a convenient interface to permit the payers to browse information available over the network 610. For example, in one embodiment, the browser application may be implemented as a web browser configured to view information available over the Internet.
The payer devices 602 may also include one or more toolbar applications which may be used, for example, to provide user-side processing for performing desired tasks in response to operations selected by the payer. In one embodiment, the toolbar application may display a user interface in connection with the browser application.
The payer devices 602 may further include other applications as may be desired in particular embodiments to provide desired features to the payer devices 602. In particular, the other applications may include a payment application for payments assisted by a payment service provider through the payment service provider device 606. The other applications may also include security applications for implementing user-side security features, programmatic user applications for interfacing with appropriate application programming interfaces (APIs) over the network 610, or other types of applications. Email and/or text applications may also be included, which allow the payer to send and receive emails and/or text messages through the network 610. The payer devices 602 include one or more user and/or device identifiers which may be implemented, for example, as operating system registry entries, cookies associated with the browser application, identifiers associated with hardware of the payer devices 602, or other appropriate identifiers, such as a phone number. In one embodiment, the user identifier may be used by the payee devices 604, the payment service provider device 606, and/or the system provider devices 608 to associate the payer with a particular account as further described herein.
The payee devices 604 may be maintained, for example, by a conventional or on-line merchant, conventional or digital goods seller, individual seller, and/or application developer offering various products and/or services in exchange for payment to be received conventionally or over the network 610. In this regard, the payee devices 604 may include a database identifying available products and/or services (e.g., collectively referred to as items) which may be made available for viewing and purchase by the payee.
The payee devices 604 also may include a checkout application which may be configured to facilitate the purchase by the payer of items. The checkout application may be configured to accept payment information from the payer through the payer device 602 and/or from the payment service provider through the payment service provider device 606 over the network 610.
Referring now to
Referring now to
In accordance with various embodiments of the present disclosure, computer system 800, such as a computer and/or a network server, includes a bus 802 or other communication mechanism for communicating information, which interconnects subsystems and components, such as a processing component 804 (e.g., processor, micro-controller, digital signal processor (DSP), etc.), a system memory component 806 (e.g., RAM), a static storage component 808 (e.g., ROM), a disk drive component 810 (e.g., magnetic or optical), a network interface component 812 (e.g., modem or Ethernet card), a display component 814 (e.g., CRT or LCD), an input component 818 (e.g., keyboard, keypad, or virtual keyboard), a cursor control component 820 (e.g., mouse, pointer, or trackball), and/or a location determination component 822 (e.g., a Global Positioning System (GPS) device as illustrated, a cell tower triangulation device, and/or a variety of other location determination devices known in the art). In one implementation, the disk drive component 810 may comprise a database having one or more disk drive components.
In accordance with embodiments of the present disclosure, the computer system 800 performs specific operations by the processor 804 executing one or more sequences of instructions contained in the memory component 806, such as described herein with respect to the payer devices, payee devices, user devices, payment service provider device, and/or system provider devices. Such instructions may be read into the system memory component 806 from another computer readable medium, such as the static storage component 808 or the disk drive component 810. In other embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the present disclosure.
Logic may be encoded in a computer readable medium, which may refer to any medium that participates in providing instructions to the processor 804 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. In one embodiment, the computer readable medium is non-transitory. In various implementations, non-volatile media includes optical or magnetic disks, such as the disk drive component 810, volatile media includes dynamic memory, such as the system memory component 806, and transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise the bus 802. In one example, transmission media may take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
Some common forms of computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, carrier wave, or any other medium from which a computer is adapted to read. In one embodiment, the computer readable media is non-transitory.
In various embodiments of the present disclosure, execution of instruction sequences to practice the present disclosure may be performed by the computer system 800. In various other embodiments of the present disclosure, a plurality of the computer systems 800 coupled by a communication link 824 to the network 610 (e.g., such as a LAN, WLAN, PTSN, and/or various other wired or wireless networks, including telecommunications, mobile, and cellular phone networks) may perform instruction sequences to practice the present disclosure in coordination with one another.
The computer system 800 may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) through the communication link 824 and the network interface component 812. The network interface component 812 may include an antenna, either separate or integrated, to enable transmission and reception via the communication link 824. Received program code may be executed by processor 804 as received and/or stored in disk drive component 810 or some other non-volatile storage component for execution.
Referring now to
Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also, where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the scope of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components and vice-versa.
Software, in accordance with the present disclosure, such as program code and/or data, may be stored on one or more computer readable mediums. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.
The foregoing disclosure is not intended to limit the present disclosure to the precise forms or particular fields of use disclosed. As such, it is contemplated that various alternate embodiments and/or modifications to the present disclosure, whether explicitly described or implied herein, are possible in light of the disclosure. For example, the above embodiments have focused on payers and payees; however, a payer can pay, or otherwise interact with any type of recipient, including charities and individuals. The payment does not have to involve a purchase, but may be a loan, a charitable contribution, a gift, etc. Thus, payee as used herein can also include charities, individuals, and any other entity or person receiving a payment from a customer. Having thus described embodiments of the present disclosure, persons of ordinary skill in the art will recognize that changes may be made in form and detail without departing from the scope of the present disclosure. Thus, the present disclosure is limited only by the claims.
标题 | 发布/更新时间 | 阅读量 |
---|---|---|
使用交易证明使得区块链安全化的方法和系统 | 2020-05-11 | 702 |
用于实时车辆事故管理的区块链和加密货币 | 2020-05-16 | 627 |
一种增强加密货币匿名性的方法 | 2020-05-20 | 187 |
区块链系统中自私挖矿的屏蔽机制 | 2020-05-12 | 128 |
使用区块链进行访问控制的工业网络以及访问控制方法 | 2020-05-15 | 235 |
区块链的安全风险评估方法 | 2020-05-22 | 127 |
一种基于加密资产的跨区域市场奖励系统 | 2020-05-23 | 595 |
数字资产账户管理 | 2020-05-16 | 320 |
一种线上及线下的虚拟货币转移方法及其系统 | 2020-05-25 | 1035 |
虛擬貨幣與法定貨幣服務整合平台 | 2020-05-14 | 615 |
高效检索全球专利专利汇是专利免费检索,专利查询,专利分析-国家发明专利查询检索分析平台,是提供专利分析,专利查询,专利检索等数据服务功能的知识产权数据服务商。
我们的产品包含105个国家的1.26亿组数据,免费查、免费专利分析。
专利汇分析报告产品可以对行业情报数据进行梳理分析,涉及维度包括行业专利基本状况分析、地域分析、技术分析、发明人分析、申请人分析、专利权人分析、失效分析、核心专利分析、法律分析、研发重点分析、企业专利处境分析、技术处境分析、专利寿命分析、企业定位分析、引证分析等超过60个分析角度,系统通过AI智能系统对图表进行解读,只需1分钟,一键生成行业专利分析报告。