Patent classifications
G06Q20/38215
Method, Apparatuses and System for Authorizing a Third Party
A method for authorizing a third party includes performing, at a first entity, obtaining a biometric feature of the third party, obtaining a secret value and combining the biometric feature and the secret value so as to obtain a combined secret value. The method further includes performing, at an access controller, receiving the secret value, receiving the combined secret value and processing the combined secret value using the secret value so as to obtain a decoded biometric feature. The method further includes obtaining a biometric feature to be verified, comparing the decoded biometric feature with the biometric feature to be verified so as to obtain a comparison result, and authorizing the third party based on the comparison result.
PAYMENT PROCESSING METHOD, APPARATUS, DEVICE, AND SYSTEM
Embodiments of the present specification provide a payment processing method, apparatus, device, and system. The method includes: an Internet of Things (IoT) device determining payment information of a payment to be paid in response to a payment operation of a first user, and collecting to-be-verified biometric feature information of the first user; generating a payment request offline based on the payment information, the biometric feature information, and payment certificate information of the IoT device obtained in advance from a first service terminal; and sending the payment request to a second service terminal, for the second service terminal to send the payment request to the first service terminal, and for the first service terminal to perform payment processing based on the payment information and a payment account of the first user in response to the first service terminal determining that the payment request satisfies a predetermined payment condition. The first service terminal is a service terminal corresponding to a payment application of the first user, and the second service terminal is a service terminal of a merchant corresponding to the IoT device.
METHODS AND APPARATUS FOR MORTGAGE LOAN SECURITIZATION BASED UPON MORTGAGE SERVICING STORED ON BLOCKCHAIN
Apparatus and methods for creation of securities based upon servicing records verified via a blockchain distributed ledger. The Blockchain is distributed to Participants in the Loan, such as the Borrowers, Regulators, Servicers, and Vendors. Participants may submit an aggregation criteria, such as for example a criteria used for selecting loans to be included in a securitization pool. The present disclosure further provides a method for homogenizing a variety of loan criteria and memorializing execution of a smart contract on the Blockchain.
System and method for blockchain tokens for gaming
A system and method for in-game tokens or specialized virtual currency which may be used for a variety of transactions, including within a plurality of games, yet for which transactions may be sufficiently controlled to avoid adverse real world effects. The system and method provide blockchain tokens for gaming, in which transactions related to such blockchain transactions are both controlled and flexible.
NON-FUNGIBLE CRYPTOGRAPHIC TOKENS FOR TRACKING TREES
Provided is a process for tracking trees. The process of tracking trees may include one or more of generating a listing of trees, generating digital tokens representing the trees, or performing one or more operations associated with the trees using the digital tokens (e.g., creating a market place for trading digital tokens, trading digital tokens, or computing carbon credits associated with a tree).
SECURE PROCESS TO AVOID STORING PAYMENT CREDENTIALS
A credential security tool may avoid storing payment credentials at online services. Generally, the credential security tool issues authorization tokens to merchants when users attempt to store payment credentials with the merchants. The merchants store these authorization tokens rather than the payment credentials. When a user initiates a transaction with a merchant, the merchant can present the authorization token to receive a masked card that can be used to complete the transaction. When the merchant presents the masked card for payment, the credential security tool can use the actual card information to complete the transaction.
USER DEVICE GATED SECURE AUTHENTICATION COMPUTING SYSTEMS AND METHODS
A system is provided that allows users to execute a secure transaction that is authenticated by their user device. Personally identifiable information (PII), such as, but not limited to, biometric authentication data, is locally stored on the user's device so as to protect the PII. A user device private key is associated with the particular user device and the user, and the corresponding public key is registered with a User Device Authentication Alliance server (UDAAS) system. In an online transaction, a LoginID server or an Access Control server interact with the UDAAS to confirm the user is authentic and has confirmed the transaction.
System for securing user information by employing phone number and personal identification number
A system, method and computer program product for securing user information, including processing circuitry that receives an encrypted first request from a first party and that includes a unique identifier associated with an account of a user, sends, based on the encrypted first request, an encrypted authorization request to an operator servicing the account of the user, and receives, in response to the encrypted authorization request, an authorization from the operator based on a result of an authorization message exchange for authorizing or not authorizing the request sent by the operator to a device associated with the user over a network controlled by the operator. No pecuniary information of the user nor the personal identification number of the user is received by the processing circuitry thereby shielding the pecuniary information of the user from the first party.
METHOD AND APPARATUS FOR PROCESSING ACCOUNT OF BLOCKCHAIN NETWORK, AND STORAGE MEDIUM
Disclosed are a method and apparatus for processing an account of a blockchain network. The method includes: obtaining an account transaction request associated with a chain account, wherein, the chain account belongs to the blockchain; obtaining an account smart contract from the account transaction request, and writing the account smart contract into a block, wherein, the account smart contract is configured to perform operation on a chain element in the chain account when executed.
Identity system for use with blockchain platform
An identity system is provided that may include an attestation service that is configured to communicate with a user computer device and a blockchain platform, and create a blockchain account for the attestation service on the blockchain platform, the account having an associated backend blockchain identity application. The attestation service may further be configured to determine that a user of the user computing device owns a user blockchain account by obtaining a signed message of the user. The signed message may include a user access token from the user of the user computer device and a blockchain address of the user to associate with the access token, the user access token having been generated by a trusted identity provider service. The attestation service may further be configured to identify one or more identity claims associated with the token, and store the identity claim for future presentation to a third party.