G06Q20/38215

Access Control System and Method for Use by an Access Device
20220122398 · 2022-04-21 · ·

Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when a current reservation certificate has been presented.

FINANCIAL PAYMENT METHOD AND PAYMENT SYSTEM USING MOBILE DEVICE
20220108324 · 2022-04-07 ·

This application relates to a financial payment method using biometric information. Biometric information of an individual collected in a mobile device of an affiliated member is transmitted to a mobile device of the individual to allow the biometric information to be authenticated in the mobile device of the individual. After the authentication of the biometric information, a substitute key that corresponds to a card password preset by the individual is inputted, and a financial payment is requested based on the payment content.

Systems and methods for providing tokenized transaction accounts

The disclosed embodiments include methods and systems for providing tokenized transaction accounts. In one embodiment, a computer-implemented method is provided that may include generating, by one or more processors, a first tokenized transaction account from a first transaction account associated with a first user. The method may also include providing the first tokenized transaction account to a client device associated with the first user for storage in the client device and use in transactions. The method may also include updating the first tokenized transaction account based on one or more conditions and providing the updated first tokenized transaction account to the client device for storage and use in a subsequent transaction.

Cryptographic authentication and tokenized transactions

A cryptographic method of performing a tokenised transaction between a payment offering party and a payment accepting party is described. The tokenised transaction is mediated by a transaction scheme. The payment accepting party is provided with a merchant identity and a merchant certificate associated with that identity by the transaction scheme provider. The payment accepting party provides the merchant identity and transaction seed data to the payment offering party. The payment offering party validates the merchant identity and uses the merchant identity and the transaction seed data to generate a cryptogram for the tokenised transaction. The payment offering party provides the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction. A suitable user computing device and merchant computing device for acting as payment offering party and payment accepting party respectively are also described.

Method and system for authenticating a virtual currency instrument

Various aspects of a method and system for authentication of a virtual currency instrument for a monetary transaction are disclosed herein. In accordance with an embodiment, the method includes activation of a software module different from a payment application at an electronic device. An authentication of secure information, which is read through the payment application by the software module, is performed at the electronic device. Output of an authentication result occurs at the electronic device based on the authentication from the software module for the monetary transaction.

System built by connection between a mobile terminal and a service providing device, and service providing method
11295292 · 2022-04-05 ·

The present disclosure provides a system constructed by connecting a mobile terminal and a service providing device, and a service providing method, wherein the service providing device and the mobile terminal are directly connected via an interface of the mobile terminal; the service providing device provides a service independently or through collaboration between the service providing device and various parties such as the mobile terminal and/or the background server based on the service information parsed and extracted the code information, identification information of any one or more parties among the user, the first mobile terminal, and the service providing device, and/or information bound to the identification information. Through active code scanning or passive code scanning or a combination of the two, the present disclosure may conveniently and quickly implement sensing access and effectively enhance security for operations such as mobile payment, etc.

Electronic payment service processing
11282080 · 2022-03-22 · ·

Implementations of electronic payment service processing methods and devices are disclosed. In an implementation, a server receives a first information set for performing an electronic payment, where the first information set includes payment information of a first payment option and service information for performing the electronic payment. The server may determine that the electronic payment has not been successfully performed. In response to determining that the electronic payment has not been successfully performed, a one-click payment link associated with payment information of a second payment option and the service information is generated, and the one-click payment link is provided to a mobile computing device.

Methods and Devices for Registering and Authenticating Miner Identity in a Blockchain Network

Methods and systems for registering identity of a mining node on a blockchain in a blockchain network. The methods may include creating a validity-check transaction having a first output controlled by the mining node and containing a miner identifier and propagating the validity-check transaction on the blockchain network. The methods may further include mining, by the mining node, a new block containing a generation transaction, wherein the generation transaction includes an information field that contains the miner identifier and a reference to the validity-check transaction. Another node may validate identity by receiving the miner identifier and the reference to the validity-check transaction, retrieving the validity-check transaction to confirm it contains the miner identifier, and determining that the first output is an unspent transaction output.

Methods and Devices for Recording Work History and Proving Reputation in a Blockchain Network

Methods and system of recording work history of a mining node on a blockchain in a blockchain network. The methods may include mining a first block containing a registration generation transaction that includes, within a registration information field, a miner identifier for the mining node; and mining two or more additional blocks in an order, each additional block containing a generation transaction that includes an information field containing the miner identifier, a reference to the generation transaction of the preceding additional block in the order, wherein the registration generation transaction is a first block in the order. Work history may be verified by tracing the recorded work history and validating the miner identifier. Recorded work history may serve as the basis for a reputation score for the miner, which reflects contributed work evidenced by the proof-of-work secured work history.

MULTI-APPROVAL SYSTEM USING M OF N KEYS TO RESTORE A CUSTOMER WALLET
20220084022 · 2022-03-17 · ·

A customer device that includes at least one processor and at least one memory communicatively coupled to the at least one processor. The at least one memory stores a customer private key of N private keys associated with a customer. The customer device also includes at least one network interface communicatively coupled to the at least one processor and configured to communicate with at least one vault system, each of the at least one vault system storing a respective one of the N private keys. The at least one processor is configured to receive at least one private key of the N private keys from the at least one vault system. The at least one processor is also configured to perform at least one cryptographic action based on the at least one private key and the customer private key.