Patent classifications
G06Q20/4014
WAGERING PLATFORMS AND ACCESS DERIVED FROM MACHINE-READABLE CODES
A system for verifying a user device for authorizing access to a wagering portal comprising: a server system comprising at least one server, at least one database, and at least one user device; a plurality of operable rules populated on said server system wherein said operable rules are met by actions performed by scanning by the user device one or more tags positioned within a geofence within a venue; verifying an identification card or another verification data confirm age of the user; verifying a location by determining whether the scan by the user device of the first tag was within a geofence corresponding to the venue; and upon verifying the age and a location, redirecting the user device from a server, a URL, or a Web app to a wagering portal.
TOUCHLESS AUTHENTICATION AT RESOURCE DISTRIBUTION SYSTEMS
Touchless/contactless user authentication is provided at apparatus requiring user authentication. The user authentication credentials are input or otherwise communicated to the apparatus absent the need to physically contact the input mechanisms of the apparatus or the display of the user communication device. The user communication device is equipped with motion sensing mechanisms configured to detect a preconfigured user gesture, which is either preconfigured to be associated with specific user authentication credentials or serves as the user authentication credentials. Monitoring for the preconfigured user gesture is initiated by a triggering event, which may include co-location of the user communication device and the apparatus or short-range wireless communication between the user communication device and the apparatus.
EXCLUDING FRAUDULENT TRANSACTIONS IN TRANSACTION BASED AUTHENTICATION
Methods, systems, and apparatuses are described herein for improving computer authentication processes through excluding fraudulent transactions in transaction-based authentication. A computing device may receive a request for access to an account from a user. The computing device may provide transaction data to a machine learning model. The computing device may receive data indicating a confidence threshold associated with the user from the machine learning model. The computing device may generate a modified set of merchant choices for the user by excluding merchants related to potentially fraudulent transactions within a predetermined time period. An authentication question may be generated, and access to the account may be provided based on a response to the authentication question.
Method and device for end-user verification of an electronic transaction
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
IN-APP TRANSACTION VALIDATION
A system to perform operations that include: executing an application at a client device; presenting a graphical user interface (GUI) associated with the application at the client device, the GUI including an icon to initiate a request for a payment to a merchant; receiving an input that selects the icon from the client device; accessing a user profile associated with the client device in response to the request to initiate the payment, the user profile comprising user profile data; generating a payment credential based on the user profile data from the user profile; authorizing the payment to the merchant based on the payment credetitial; executing the payment to the merchant at the client device, within the application, based on the authorizing the payment; and passing a payment token to the merchant responsive to the executing the payment to the merchant within the application, the payment token comprising a validation.
RECHARGEABLE WIRELESS POWER BANK AND METHOD OF USING
Disclosed herein is a rechargeable power bank, comprising a charging system comprising a controller coupled to a receiving system in electrical communication with an electrical storage device; configured to harvest energy from one or more directional electromagnetic energy beams provided by an external wireless charging system over a distance of greater than about 50 cm, convert the harvested energy into electrical energy, and direct the electrical energy into the electrical storage device, wherein the controller is configurable to direct or not direct the electrical energy from the electrical storage device into an attached electronic device to power and/or recharge the attached electronic device based on one or more authorization criteria. A method of utilizing the power bank is also disclosed.
IDENTITY MANAGEMENT SERVICE VIA A USER-LEVEL TOKEN
A computing system includes an interface configured to communicate with an entity computing system associated with a merchant via a network, an identity database storing verified personal identifying information, a memory, and at least one processor configured to: determine whether an individual is associated with an existing user account; prompt the individual to create a user account; verify an identity of the individual using personal identifying information associated with the individual; receive non-financial information associated with the individual; generate a user-level profile having the non-financial information; generate a user-level token unique to the individual; transmit the user-level token to a device associated with the individual; receive an identity verification request having the user-level token; validate the user-level token; determine that the identity verification request includes contextual data; determine the non-financial information that is relevant to the contextual data; and transmit a verification approval and the non-financial information.
APPARATUS AND METHODS TO DEFINE AND USE BEARER TOKENS AND CERTIFIED TOKENS AND APPLICATIONS USING BEARER TOKENS AND CERTIFIED TOKENS
Methods, apparatus and techniques are disclosed to define and use bearer token records to transfer a crypto asset from a sending account and where a secret is required to be provided as a proof of possession of the bearer token to complete the transfer to a receiving account. Certified bearer tokens are locked for later transfer to a defined receiving account at generation. Lockable bearer tokens are lockable after generation via a second secret. Bearer token records may be expired to revert the crypto asset to the sending account if not completed using the secret. Bearer token records are implementable on a blockchain. Bearer tokens of small denomination crypto assets are useful for various transactions such a streaming or other online services. A computing device provides a change purse to carry and use bearer tokens. Multiple signature accounts and payment transactions are provided for crypto assets.
SYSTEMS AND METHODS FOR MINTING NON-FUNGIBLE TOKENS AT A POINT OF SALE
Systems and methods are disclosed that generate Non-Fungible Tokens (NFTs) at a point of sale using a QR code and a private key. The systems and methods can also be used to verify the purchase of a ticket to a real-world event such as a concert for display, purchase, or sale in the so-called Metaverse. The systems and methods can be used to verify the source of a credential such as a diploma, degree, or certification of any kind. The systems and methods mint NFTs that can be used to prove the source or authenticity of the real-world product, event, or credential. The requestor of the verification can be a 3.sup.rd party such as a social media, ecommerce, or dating platform.
Management device, cryptocurrency system, and system
[Problem] Provided are a management device and a cryptocurrency system capable of smoothly operating an entire system by detecting fraud on cryptocurrencies without using enormous calculation amounts. [Solution] A management device connected to a plurality of user devices via a network, the management device including: an issued information storage area that stores a cryptocurrency ID of an issued cryptocurrency; an account information storage area that stores account information in association with one or a plurality of cryptocurrency IDs; and a history information storage area that stores history information of a cryptocurrency in association with a cryptocurrency ID.