Patent classifications
G06Q20/4014
System and method for processing payment transactions via blockchain network
The invention discloses a system and method for processing a payment transaction via a blockchain network. The method includes: providing a payment transaction message that includes a payer identity data item, a transaction amount, and a recipient account data item; sending the payment transaction message to an intermediary processing node through a recipient node; verifying the received identity data item by the intermediary processing node, and then sending the payment transaction message to a payer account node; confirming the identity data item and transaction amount by the payer account node, and sending a payment transaction confirmation message to the intermediary processing node; broadcasting the payment transaction message to the blockchain network by the intermediary processing node or the recipient node.
TRANSACTION VERIFICATION SYSTEM FOR BLOCKCHAIN, AND TRANSACTION VERIFICATION METHOD FOR BLOCKCHAIN
A blockchain transaction confirmation system according to the present disclosure includes: a user information input interface to which user information is inputted; an external information input interface to which external information related to a cryptocurrency system is inputted; an appropriate confirmation number searcher configured to search for a block confirmation number appropriate for confirmation of a transaction in progress of creation by using the external information and the user information; and an appropriate confirmation number output interface configured to output the block confirmation number. According to the present disclosure, a user can automatically find out the block confirmation number required for safe and quick transaction.
Unique identification of customer using an image
A method for authenticating an individual for login to a server computer includes receiving at the server computer data for a first authentication image from an electronic computing device. First attributes are identified of one or more similar geometrical shapes from the data for the first authentication image. A determination is made as to whether the first attributes of the one or more similar geometrical shapes from the data for the first authentication image correspond to second attributes from a second authentication image accessible on or by the server computer. When the first attributes correspond to the second attributes, the individual is authenticated on the server computer.
SYSTEM AND METHOD FOR RETAIL MANAGEMENT OF CONTROLLED SUBSTANCES
A method and system for retail management of controlled substances is provided. Controlled substances such as alcohol or Cannabis may be sold as products or served at a venue. The process of purchasing the controlled substance, or service of a controlled substance the current venue includes a customer presenting the controlled substance for purchase and providing a customer identifier. The point of sale device at the venue may send an authorization request to a processing server at a remote service, which may reply with an advisory response including information from a customer profile. Optionally, a system and method of retail management of controlled substances provides for a law enforcement system may send an investigation request comprising a vehicle identifier to the processing server, and in response an investigation response may be sent to the law enforcement system may be sent including information from the customer profile.
Cryptocurrency securing method and device thereof
The present disclosure provides a cryptocurrency securing method and device thereof. The device receives an encrypted personal identification number from a user device, and decrypts the encrypted personal identification number via a first asymmetric key for deriving a personal identification number. The device decrypts an encrypted personal key via the personal identification number for deriving a personal key, and decrypts an encrypted cryptocurrency private key information via the personal key for deriving a cryptocurrency private key information.
Item-identifying carts
This disclosure is directed to an item-identifying cart that may be utilized by a user in a materials handling facility to automatically identify items that the user places in their cart, and update a virtual shopping cart to include items taken by the user. The mobile cart may include four capture assemblies that are disposed proximate to each of the four corners of a basket of the cart, and oriented such that their respective optical axes are directed towards an interior of a perimeter of the top of the basket, and above the top of the basket. The capture assemblies may include proximity sensors that are used to detect movement above the top of the basket, LEDs that illuminate items, and cameras that generate image data representing the items as they are placed in, or removed from, the cart.
Method and system for user address validation
A system and method for validating user address information is disclosed herein. A computing system periodically polls a client device associated with a user to identify a current location of the user. The computing system records the current location of the user after polling and a time associated with the polling. The computing system receives one or more transactions from one or more third party vendors. The computing system identifies, based on the one or more transactions, a location and a time associated with each transaction in the one or more transactions. The computing system defines a geographic area. The computing system determines that a current primary address on file for the user is outside of the geographic area. The computing system prompts, based on the determining, the user to update the current primary address.
TECHNIQUES TO GENERATE AND STORE CHARACTERISTICS OF A SIGNATURE ON A TRANSACTION CARD CIRCUIT
Various embodiments are generally directed to techniques to perform transaction with transaction cards utilizing characteristics of customer's signature. Techniques may further include determining characteristics of a signature including a reduced set of data points for the signature and storing the characteristics in secure memory of transaction card.
Systems, methods, and apparatuses for implementing a role based access control and authorization validator via blockchain smart contract execution using distributed ledger technology (DLT)
Described herein are means for implementing a role based access control and authorization validator via blockchain smart contract execution using Distributed Ledger Technology (DLT) in conjunction with a cloud based computing environment. According to a particular embodiment, there is a system having at least a processor and a memory therein, wherein the system is configurable with means for: operating a blockchain interface to a public blockchain on behalf of a plurality of customers of the host organization, wherein each of the plurality of customers operate as a participating node on the blockchain; executing an API gateway on behalf of the plurality of customers; receiving an API definition from one of the plurality of customers defining at least access permissions for use of the defined API and a plurality of permitted functions for the defined API; transacting a new asset onto the blockchain having embodied therein, metadata representing the API definition and the access permissions for use of the defined API and the plurality of permitted functions for the defined API; intercepting, via the executing API gateway, an API call directed at the defined API; retrieving the metadata from the blockchain; authenticating an API caller associated with the API call based on the access permissions from the retrieved metadata; and forwarding the API call to the appropriate customer pursuant to successful authentication of the API caller. Other related embodiments are disclosed.
Security for contactless transactions
A method of performing a contactless transaction between a payment device and a terminal is described. The method comprises establishing a data connection between the payment device and the terminal and then establishing if the payment device and the terminal both support an enhanced security architecture. If they do not, they will then perform the contactless transaction according to a basic transaction flow using a first cryptographic system. If they do, they will perform the contactless transaction according to an enhanced transaction flow using a second cryptographic system. The first cryptographic system and the second cryptographic system comprise different asymmetric cryptographic systems. Suitable payment devices and terminals, and methods at the payment devices and terminals, are described.