G06Q20/4014

METHODS AND SYSTEMS FOR ACCESS CONTROL IN A COMPUTING SYSTEM BASED ON VERIFIED EVENT RECORD
20230351369 · 2023-11-02 · ·

Methods and systems for access control in an online environment, such as an e-commerce platform. The system may receive a request from a user device for access to an online resource that is subject to an access control rule. The user device may provide the system with non-fungible token data, and the system may query a blockchain network based on the non-fungible token data to obtain data regarding ownership of one or more non-fungible tokens. The system may then determine whether the data from the blockchain network matches a condition in the access control rule and, based on a match, may provide the user device with access to the online resource.

GPS determined location based access to linked information and delivery thereof

Various methods are provided for facilitating access to linked information to GPS or short-range wireless equipped devices. One example method may comprise receiving, via a network, an indication of an interaction between a primary device and a third-party device, the indication comprising at least a first element and a second element, the first element indicative of user identification information and the second element indicative of at least one of a location or a bounded region, determining, as a function of at least the first element and the second element, a data object that upon validation is configured for use a subsequent interaction, and transmitting, to a mobile device, an electronic communication comprising an indication, configured for rendering on the mobile device, of the data object.

System and method for transferring funds

Systems, methods for payment processing performed by one or more processors of a payment service computer system. One method includes receiving a fund transfer request from a recipient identifying a sender and a fund transfer amount. The method further includes identifying a financial institution associated with the sender. The method further includes determining the financial institution is not associated with the payment system. The method further includes selecting an authentication process for the recipient based on a level of risk. The method further includes performing the authentication process based on the level of risk, the authentication process including prompting the sender to provide information regarding the sender. The method further includes verifying accuracy of the information regarding the sender by scraping the information maintained by the financial institution using the access credentials and sending the fund transfer amount to the recipient.

CUSTOMER INFORMATION REGISTRATION APPARATUS
20230368205 · 2023-11-16 · ·

A customer information registration apparatus includes: a matching unit configured to match face data of a customer based on image data acquired by a camera in a shop against face data stored in a storage unit; a storing unit configured to store face data which is not stored in the storage unit into the storage unit in a case where the matching by the matching unit fails; a behavior information acquisition unit configured to acquire behavior information according to a behavior in the shop of the customer; a condition determination unit configured to determine whether or not to delete the face data stored in the storage unit based on the behavior information acquired by the behavior information acquisition unit; and a deletion unit configured to delete the face data stored in the storage unit based on a result of the determination by the condition determination unit are provided.

LOCAL CACHE-BASED IDENTIFICATION SYSTEM
20230360462 · 2023-11-09 ·

An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.

QUANTUM-SAFE PAYMENT SYSTEM
20230360040 · 2023-11-09 ·

A computer-implemented method of secure quantum safe (QS) payments using a quantum cloud payment platform, the method, performed by the quantum cloud payment platform, comprising: receiving one or more quantum safe deposit payment transactions from one or more endpoint devices of one or more registered users, each QS deposit payment transaction of a user comprising data representative of a deposit fiat cash value; transferring each of the deposit fiat cash values from a bank account associated with a user and linked to the QS payment account of the user to a quantum cloud account for pooling each of the deposit fiat cash values; for each deposit fiat cash value transferred in relation to a user of an endpoint device, performing: converting said each deposit fiat cash value to a corresponding number of quantum money tokens; linking said number of quantum money tokens to the QS payment account of the user; and sending said number of quantum money tokens to the endpoint device of the user for updating an electronic wallet of said user.

SYSTEMS AND METHODS FOR ACCESS TOKENS CONFIGURATION WITH UNIFORM RESOURCE LOCATOR (URL) PARAMETERS

In some embodiments, Uniform Resource Locator (URL) parameters may be used to bind access tokens to authorize web-browser-initiated network operations. In some embodiments, a user input at a data exchange gateway associated with a first website to perform a first network operation (e.g., a request to access resources associated with the first website) may be detected. In response to the detected user input, an access token may be generated based on user specific information associated with the user, where the access token is associated with one or more network operation parameters. In response to a use of the access token for authorizing the first network operation and successful authorization of the first network operation, the access token may be configured to be bound to a first URL identifier parameter associated with the first website.

Blockchain identities
11811945 · 2023-11-07 · ·

The invention is directed to computer-based method and a computer system for generating a blockchain address. The method comprises receiving a request for a new blockchain address for a user, the request including a public key, which has an associated private key, and identification information for the user, and generating the address based on a combination of the public key and the identification information.

Method of Authentication Using Device Token
20230360038 · 2023-11-09 ·

The present invention discloses a method for enabling a secure data transfer comprising verifying the identity of a user having a payment device and a personal communication device; generating a payment token associated with the payment device of the user; generating a merchant device token associated with a merchant and linked to the personal communication device of the user; and processing a transaction between the user and the merchant using the payment token and the merchant device token.

VERIFICATION SYSTEM AND METHOD
20230360047 · 2023-11-09 ·

A computer-implemented method of authorising a payment by a target party to a verifying party. The method comprises, by the verifying party: performing a payment verification to verify a source of funds of the target party; and performing an identity verification to verify an identity of the target party. The identity verification comprises accessing response data stored in a data store in association with the identity of the target party, the data store being implemented in third party computer equipment of a trusted third party or on a peer-to-peer publication medium, wherein the response data comprises either a) a stored instance of a response to a challenge, or b) an attestation comprising a transformation of the response. The payment is authenticated on condition that the outputs of both the payment verification and identity verifications is true.