Patent classifications
G06Q20/3674
Method and system for authenticating digital transactions
A system and computer-implemented method for authenticating digital transactions. The method includes receiving a device registration request and a device attestation response including at least a device integrity status from a device. In response to the device registration request, the method includes providing a device registration response to the device, based on validation of the device integrity status. Further, the method includes receiving a first payment transaction request and an enrolment request from the device via an application to authenticate a second payment transaction request using a first type of authentication technique. Finally, the method includes enrolling the device to the first type of authentication technique and providing a second token to the device based on a result of the first payment transaction request, wherein the second token is used for authenticating the second payment transaction request.
Implementing non-fungible tokens using bitcoin
A novel method and instruction set for storing and trading Non-Fungible Tokens (NFTs), on Bitcoin blockchain. As proof of NFT ownership, proposed methods allow a user to perform the following operations with an NFT: (1) store NFT token on Bitcoin blockchain; (2) securely associate NFT data unit with digital assets (photos, video, audio, digital documents, etc.); (3) grouping many NFT tokens together to a collection with a single unique identifier; (4) safely sell and buy an NFT using Bitcoin ecosystem. These actions and validation of the transactions are performed using Bitcoin transactions.
METHOD AND SYSTEM FOR MEDIATED CROSS LEDGER STABLE COIN ATOMIC SWAPS USING HASHLOCKS
A method for mediating an atomic swap includes: receiving a swap request from a first computing device including a first address associated with a first blockchain and a network identifier associated with a second blockchain; identifying a second computing device using the network identifier and a second address associated with the second blockchain; generating a proof value and a hashlock using the proof value; transmitting (i) the hashlock and second address to the first computing device, and (ii) the hashlock and first address to the second computing device; verifying a first blockchain transaction on the first blockchain for transfer to the first address, and a second blockchain transaction on the second blockchain for transfer to the second address; and transmitting the proof value to blockchains node associated with the first and second blockchains.
System and Methods for Creating Non-Fungible Tokens
Systems and methods for creating non-fungible tokens (“NFTs”), preferably of medical imagery, automates the creation of NFTs utilizing a software application integrated with an imaging device. In preferred embodiments, the imaging device is a medical imaging device, a device associated with the imaging device, or otherwise resident on a computing device. In other embodiments, the software application is associated with medical record systems. Thus, the software application automatically creates an NFT based on imagery created by the imaging device and incorporates associated image, owner and/or software identifiers.
Gaming service automation system with graphical user interface
A robot management system (RMS) includes a plurality of service robots deployed within an operations venue that includes a plurality of gaming devices, an operator terminal presenting a graphical user interface (GUI) to an operator, and a robot management system server (RMS server) configured in networked communication with the plurality of service robots. The RMS server is configured to: identify location data for the service robots; create an interactive overlay map of the operations venue that includes a static map of the operations venue, overlay data showing the location data of the plurality of service robots over the static map, and an interactive icon for each service robot of the plurality of service robots; display, via the GUI, the overlay map; receive a first input indicating a selection of a first interactive icon associated with a first service robot; and display current status information associated with the first service robot.
Home router authentication device
A user authorization device (or UAD) physically connected to a user's router to aid in the authentication of the user. A bank server polls the user's router to verify that the UAD is connected to the router before granting the user the capability to perform transactions on the user's account that would be otherwise restricted. The bank server implements a set of policies designed by the user that require the UAD to be present for some transactions with the account to be performed. The presence of this device thus adds an extra layer of security to such financial transactions beyond the use of a username and password.
PEER-TO-PEER MONEY TRANSFERS
Systems and methods for peer-to-peer money transfers are disclosed. The system may allow senders to transmit money transfers to receivers. The system may receive a money transfer request from the sender comprising the designated receiver, a money transfer amount, and a sender transaction account. The system may generate a receiver transaction account associated with the designated receiver, wherein the receiver transaction account comprises the money transfer amount. The system may provide the receiver access to the receiver transaction account using different channels, including by providing a digital transaction instrument or a physical transaction instrument.
Methods and systems for authorizing devices in multiple domains
A system and method are provided for authorizing devices in multiple domains. The method includes receiving customer account information having been provided to the management engine during an interaction between a transaction device and a first storefront domain or between the transaction device and the management engine, creating an authorization token corresponding to at least a portion of the customer account information, having the authorization token provided to the transaction device for subsequent transactions, receiving a redirection from the second storefront domain, requesting the authorization token, and providing at least some of the customer account information to the second storefront domain when the authorization token is authenticated by the resource computer device.
Systems and methods relating to identity authentication and validation
There is provided an authentication system for validating identity credentials of a user attempting to access a resource provided by a remote resource provision system. The authentication system includes an input configured to receive, from the resource provision system, an authentication request comprising a cryptographic representation of digital identity data of the user and an associated token identifier, where the digital identity data comprises at least one image of an identity credential of the user. The system also includes a processor configured to: determine a pre-stored cryptographic identifier corresponding to the token identifier; and compare the received cryptographic representation with the pre-stored cryptographic identifier. The system further includes an output configured to transmit, to the remote resource provision system and in response to determining a match between the received cryptographic representation and the pre-stored cryptographic identifier, an authentication confirmation indicating successful validation of the digital identity data.
Mobile device verification for an electronic application before providing a digital pass to an approved customer
A system and method for mobile device verification for an electronic application before providing a digital pass to an approved customer is disclosed. The method and system receives, at a store's customer credit application computer, an application for a new account, the application including a contact information for a customer's mobile device providing, from the store's customer credit application computer, the contact information for the customer's mobile device to a verification system to authenticate the customer's mobile device providing, from a credit account provider, a text to the customer's mobile device, the text causing the customer's mobile device to be subjected to a second authentication; receiving, at the customer's mobile device, a message that includes a link to the digital pass; and utilizing the link to receive the digital pass at a mobile wallet of the customer's mobile device.