Patent classifications
G06Q20/4014
Systems and methods for providing notifications to devices
A system for providing notifications to client devices that includes one or more processors and one or more storage devices. The storage devices may store instructions that, when executed, configure the processors to perform operations. The operations include receiving a transaction notification from a third party; identifying a user account associated with the transaction notification; generating a push notification with a payload describing instructions to display a message and an interactive icon, and a resource identifier associated with the interactive icon, where the resource identifier includes a message ID encoding an interactive session and an action ID encoding a requested action. The operations also include transmitting the push notification to a client device associated with the user account; receiving a first indication indicating a user interaction with the interactive icon, the first indication having the resource identifier and updating the user account based on the action request.
BLOCKCHAIN SYSTEM THAT INCLUDES BANK NODES EACH HAVING SEPARATE LEDGERS FOR IDENTITY, DIGITAL CURRENCY AND OTHER FUNCTIONS, AND OPERATION METHOD THEREOF
A blockchain system is disclosed. The blockchain system includes bank nodes and mobile nodes, and each of the bank nodes includes an identity ledger that includes a public key of each of the bank nodes, a digital ID for identifying an identity of a user of each of the bank nodes, a public key of each of the mobile nodes, and a digital ID for identifying an identity of each of the mobile nodes.
System architecture and database for context-based authentication
An authentication correlation (AC) computing device is provided. The AC computing device includes a processor and a memory. The AC computing device receives a first authentication request from a requesting computer device including an account identifier, a first timestamp, and at least one authentication factor, and determines a first security level of the first authentication request. The AC computing device stores the first security level and the first timestamp. The AC computing device is also configured to receive a second authentication request including the account identifier and a second timestamp, determine that the second authentication satisfies an authentication rule based on the account identifier, the second timestamp, and the stored authentication data wherein the rule defines a timeframe and an authentication threshold, and generate an authentication response based on the determination and the authentication rule wherein the authentication response includes an approval indicator.
TRAINING A NEURAL NETWORK MODEL FOR RECOGNIZING HANDWRITTEN SIGNATURES BASED ON DIFFERENT CURSIVE FONTS AND TRANSFORMATIONS
A device receives information indicating first names and last names of individuals and applies different cursive fonts to each of the first names and the last names to generate images of different cursive first names and different cursive last names. The device applies different transformations to the images of the different cursive first names and the different cursive last names to generate a set of first name images and a set of last name images. The device combines each first name image with each last name image to form a set of signature images and trains a neural network model, with the set of signature images, to generate a trained neural network model. The device receives an image of a signature and processes the image of the signature, with the trained neural network model, to recognize a first name and a last name in the signature.
METHOD, SYSTEM AND COMPUTER READABLE STORAGE MEDIUM FOR HANDLING AUTOMATIC-PAYMENT AND NON-PAYMENT
A method performed on a system to handle automatic payment and non-payment is described. The method may include receiving, from a user using a service associated with the system, a first input indicating an absence of a payment means; in response to the reception of the first input, displaying collection clauses on a display of the system; receiving, from the user, a second input indicating an agreement for the collection clauses; generating, in response to the reception of the second input, a first verification code to display, on the display, the generated first verification code together with a guide for inputting a phone number; receiving, from the user, the phone number; making a call using the received phone number; receiving a second verification code through the call; determining that the first verification code and the second verification code are matched; and in response to the determining, transmitting information for payment using the phone number.
Systems and methods for blockchain-based payments
Methods and systems for processing a blockchain comprising a plurality of immutable insurance policy payment records corresponding to insurance policies are provided. According to certain aspects, a transaction request indicating a policy payment for an insurance policy may be received at a first node. A block including an insurance policy payment record indicating the policy payment may be added to a blockchain and transmitted to another node for validation. The first node may add the block to a copy of the blockchain, where the block may be identified by a hash value that references a previous block in the blockchain that includes at least one additional insurance policy payment record.
AUTHOR VERIFYING APPARATUS / METHOD USING DECENTRALIZED NETWORK AND SELF-SOVEREIGN ID
Provided is an author verifying apparatus and method which can receive contests stored online or offline by a user, and register a verifiable credential in a decentralized network, the verifiable credential including metadata having information on at least a part of the attribute and hash value of the contents, at least some of the contents, and the DID of the user. Thus, the author verifying apparatus and method can objectively verify the creator of contents stored online or offline without an error, regardless of an environment such as the place in which the contents are stored.
Data check methods, apparatuses, and devices
Examples in this application disclose data check computer-implemented methods, media, and systems. One example computer-implemented method includes retrieving, by a trusted execution environment (TEE), a check-triggering instruction from a server, where the check-triggering instruction is configured to trigger the TEE to perform a consistency check on basic data of a user to be identified, in response to the check-triggering instruction, retrieving, by the TEE, encrypted standard basic data of the user from a trusted institution, retrieving, by the TEE, encrypted basic data of the user from a first institution, retrieving, by the TEE, the basic data of the user by decrypting the encrypted basic data, performing, by the TEE, the consistency check on the basic data of the user based on the encrypted standard basic data to obtain a check result, and sending, from the TEE, the check result to a second institution.
Reducing information requirements in digital electronic transfers
Systems and methods for transferring between accounts in the absence of sensitive information needed to perform a direct transfer between accounts are described herein. In an embodiment, an intermediary system receives a request to perform a digital electronic transfer of an item from a first online account to a second online account through the intermediary system, wherein the intermediary system does not have access to the sensitive information for either the first online account or the second online account. Without requesting the sensitive information for either the first online account or the second online account, the intermediary system responds to the request by: performing a first digital electronic transfer of the item from the first online account to a system account, storing data assigning the item to an intermediary account for which the intermediary system has the sensitive information, and performing a second digital electronic transfer of the item from the system account to the second online account.
GOODS DISTRIBUTION TRACKING APPARATUS / METHOD USING DECENTRALIZED NETWORK AND SELF-SOVEREIGN ID
A goods distribution tracking apparatus and method may request an issue of a verifiable credential including the DID of a user and distribution-related information on goods distributed by the user, receive the verifiable credential issued in response to the issue request, output the received verifiable credential in the form of encoded identification information, accurately and objectively track a goods distribution process without exposing the personal information of the user and the like, and enable a user, involved in each distribution process, to pay only the cost required for using the corresponding distribution process.