Patent classifications
G06Q20/4014
Automated store system and server
A store management server configured to communicate with an alert device installed in a store, includes a network interface and a processor configured to identify a customer entering the store, acquire customer information about the identified customer, detect that the customer is holding a commodity in the store, acquire sales restriction information about the commodity held by the customer, determine whether the customer is eligible to buy the commodity held by the customer based on the acquired customer information and sales restriction information, and control the network interface to transmit, when it is not determined that the customer is eligible to buy the commodity, a first command to an alert device. The first command causes the alert device to output an alert.
Cryptocurrency system, terminal, server, trading method of cryptocurrency, and program
A cryptocurrency system that enables to verify the origin of a cryptocurrency is provided. A cryptocurrency system includes: at least one terminal; and a plurality of management servers configured to manage a blockchain storing a trading history in a cryptocurrency. The at least one terminal includes a trading control section, and a transmission section. The trading control section is configured to generate a transaction including a first signature for a trading content and a second signature enabling to verify a validity of a remittance source address described in the trading content. The transmission section is configured to transmit the generated transaction to the plurality of management servers.
Method, system, and medium for managing suspended customer transactions in a retail environment
A network node associated with a retail store receives digital images from customers who have initiated a customer transaction at a first location. The digital images are unique and are associated with the transaction. The transaction is then temporarily suspended. To resume the transaction, the customer provides information describing features of the previously provided digital image. The network node uses this information to locate the corresponding digital image, and thus, the corresponding suspended transaction, and to authenticate the customer to resume the transaction. Provided the customer is authenticated, the node resumes the suspended transaction.
Mobile application with dynamic feature set
A computing device may include a provider application and data defining perceptible elements that provide users with various functionalities in more easily consumable stages. The application may determine that the user is at a first level of sophistication based on user activities and/or circumstances, and present a first set of perceptible elements in response thereto to provide a first set of functionalities. The application may then determine the user is at a second, higher level of sophistication based on subsequent activities and/or circumstances, and present a second set of perceptible elements to provide a second set of functionalities that includes at least one new functionality not provided via the first set of perceptible elements. Applications can be less resource intensive by evolving to strategically tailor available functionality to the circumstances and needs of particular users.
Private key security in the cloud
Techniques for providing to a user with an anonymous user signature on a message in a distributed decentralized network are presented. The techniques use a hardware security module and a certificate authority. The certificate authority: obtains a credential that includes a certificate for the user, where the certificate includes a user public key and a plurality of user attributes; receives a request for a signature on the message, where the request includes an indication of a subset of the plurality of user attributes to be revealed; accesses from the hardware security module a user secret key; and provides to the user at least the message signed by the user secret key and a zero-knowledge proof that establishes that the message is signed by the user secret key corresponding to the user public key in the credential without revealing the plurality of user attributes.
Distributed ledger for device management
Techniques are described for managing devices, such as Internet of Things (IoT) devices, using smart contract(s) on a distributed ledger (e.g., blockchain). Smart contract(s) executing on a distributed ledger may control access to one or more devices in a home or other environment. The smart contract(s) may employ information stored on the distributed ledger and information in a transaction sent to the smart contract(s) to determine whether particular user(s) and/or process(es) may access the device(s), issue commands to the device(s), access data generated by the device(s), and/or control the device(s). The smart contract(s) may provide a secure portal through which user(s) and/or service(s) may access device(s) for command and control of such device(s), and secure access may be based on permission information that is specified or provided by an owner or operator of the device(s) and that is stored on the distributed ledger.
OUTER SPACE DIGITAL LOGISTICS SYSTEM
A method for verifying and authenticating additive manufactured products utilizing extraterrestrial communication including generating a product geometry file, recording to a distributed transaction register stored on a server network having a plurality of node servers a first transaction reflecting the product geometry file, the first transaction having a first output associated with the first transaction and including a blockchain address, transmitting the first output between a terrestrial transceiver that is communicatively connected to the server network and an extraterrestrial transceiver that is communicatively connected to the terrestrial transceiver, and printing, with a 3D additive printer, a product that utilizes the product geometry file.
IDENTITY AUTHENTICATION, NUMBER SAVING AND SENDING, AND NUMBER BINDING METHOD, APPARATUS AND DEVICE
Disclosed are an identity authentication, number saving and sending, and number binding method, apparatus and device. The identity authentication method comprises: receiving a user identity authentication request sent by a data authentication platform client, wherein the user identity authentication request comprises user authentication information and user identification information, and a data authentication platform server pre-stores the user authentication information and a registration number and a password, which correspond to the user identification information; acquiring, according to the user identification information, the user authentication information pre-stored in the data authentication platform server; matching the user authentication information in the acquired user identity authentication request with the acquired user authentication information pre-stored in the data authentication platform server; when the matching is successful, receiving a result, sent by the data authentication platform client, of confirming the acquisition of the registration number by a user.
COMPUTER-IMPLEMENTED METHOD AND COMPUTER PROGRAM PRODUCT FOR TRANSFERRING PAYMENTS BETWEEN USERS OF A SOCIAL MEDIA PLATFORM
The present disclosure relates to a computer-implemented method for transferring a payment between users of at least one social media platform (SMP), which is designed for publishing contributions and for publishing comments (K) associated to a contribution, wherein any user is associated at least one social media account of the social media platform (SMP). The method comprises a registration step (R1, R29, at least one comment analysis step and at least one payment step. The comment analysis step comprises the at least partial extraction, by means of a programmatically accessible interface of the social media platform (SMP), of a string from a comment (K) comprising a comment text, wherein the comment (K) is assigned to a contribution published on the social media platform (SMP), wherein the comment (K) is associated with a contribution published on the social media platform (SMP), the validation of the string for determining whether it is a well-formed payment string and, if the string is a well-formed payment string, the determination of an amount of money specified by the payment string, the identification of the social media account of the commenting author that created the comment, and the identification of the social media account of the contributing author that created the contribution to which the comment (K) is associated. The present disclosure further relates to a computer program product for executing the computer-implemented method.
PRESCIENT AND ADAPTIVE POINT-OF-SALE SYSTEMS
Systems, apparatus, methods, and non-transitory media for providing prescient and adaptive point-of-sale services via electronic networks are discussed herein. Some embodiments may include a system with one or more servers. The one or more servers may be configured to generate digital consumer tokens and provide the digital consumer tokens to consumer devices for sharing with merchant devices. When a merchant device receives the digital consumer token, the merchant device may forward the digital consumer token to the one or more servers in exchange for consumer data to facilitate consumer service. In some embodiments, the one or more servers may be configured to provide point-of-sale interfaces that adapt to different consumer preferences or consumer device signals. Some embodiments may provide for consumer interfaces that allow consumers to manage their electronic identity at various (e.g., merchant) locations.