G06Q20/4014

Enclave interactions

Aspects of the disclosure provide various methods relating to enclaves. For instance, a method of authentication for an enclave entity with a second entity may include receiving, by one or more processors of a host computing device of the enclave entity, a request and an assertion of identity for the second entity, the assertion including identity information for the second identity; using an assertion verifier of the enclave entity to determine whether the assertion is valid; when the assertion is valid, extracting the identity information; authenticating the second entity using an access control list for the enclave entity to determine whether the identity information meets expectations of the access control list; when the identity information meets the expectations of the access control list, completing the request.

Systems and methods for scheduling and performing self-guided tours of multi-unit residential facilities

Systems, methods and software for scheduling and performing self-guided tours (SGTs) of multi-unit residential facilities (MURFs) are provided. For scheduling SGTs, the method includes receiving guest information, payment information, and identification (ID) information from a client device, determining validity of the payment and ID information, and receiving and confirming an SGT tour time. For performing SGTs, the method includes sending property access information to a client device, receiving a trigger from a property access control system indicating that a user of the client device has entered the MURF, providing MURF tour directions to the client device, and receiving tour data for the SGT. The disclosed systems, methods, and software provide prospective tenant users and owners and/or management of MURFs efficient and user-friendly interaction to accomplish and enhance their tour operation experiences.

Services for entity trust conveyances

Services for trust conveyances of entities can be provided and managed. In connection with a transaction between first and second devices, a trust management component (TMC) can indicate trust levels of entities associated with the devices with regard to the transaction and/or an action attempted by an entity. With regard to an action attempted by the first entity, the trust level of the first entity can be evaluated to determine whether it is high enough to allow the action to proceed or to have the second entity respond to the action accordingly. If it is not high enough, the second entity, using the second device, can request a trust conveyance from the first entity via the TMC. The TMC can adjust the respective trust levels based on the outcome(s) of the action(s) of the respective entities with regard to executing the transaction.

Methods for conducting electronic payment transactions with scannable codes
11507941 · 2022-11-22 ·

One embodiment of the invention provides for making electronic payments by scanning a merchant 2D code located near the point of sale with the customer's cell phone and transmitting the code or data embodied by the code to a payment center where the merchant's account can be credited and the customer's account debited without transmitting account information over the airwaves. In another embodiment of the invention, both parties transmit the same randomly generated 2D code or data embodied by the code to the payment center where they are matched to each other and to the buyer and seller to process the transaction. In a further embodiment of the invention, an inked tattoo or barcode marking is employed as a password to authorize access to smartphone applications for example, to make an electronic payment over a threshold amount.

Method and system for usage of cryptocurrency, preventing financial crime
11507945 · 2022-11-22 ·

The usage of money has been always abused for financial crime. The invention of cryptocurrency on Blockchain did not change that since the ownership essentially remained anonymous. The present invention deals with the programmatic parameterization of cryptocurrency Smart Contracts to include the binding between the user's cryptocurrency transaction and user's Identity, thus creating “permissioned” crypto-token transfer. Such binding has advantageous properties as being resilient to any form of financial crime, preventing cryptocurrency theft, and precluding “bad actors” from using this cryptocurrency. The system for Identity-Bound Cryptocurrency Transfer (IBCT) will include IBCT Blockchain Smart Contract, IBCT Blockchain Oracle Smart Contract, and off-chain Identification-as-a-Service for the IBCT owner using dedicated CryptoWallet for executing IBCT Smart Contract. The Financial crime-preventive usage of cryptocurrency is achieved through user-opted, while pseudonymous, binding of the user's Blockchain public address with the user's identity. This Financial crime-preventive usage of cryptocurrency is facilitated via a specialized crypto wallet.

Authentication system and method

The invention relates to a computer-implemented system and method for authenticating a customer of a business. The method may include the steps of: receiving from the customer at least one item of identifying information; confirming the identity of the customer; generating a token that represents an active session in which the customer interacts with one or more systems or personnel at the business; conducting a first set of communications between the customer and a first system of the business; inquiring with the customer as to whether the customer desires to transfer the active session to a second system at the business or to a third party system; and transferring the active session using the token to the second system or the third party system. The method may also comprise the steps of retrieving background information on the customer to assist a representative of the business in assisting the customer.

Systems for alerting user to undesired components in purchase items

A system for alerting a user of undesired components in purchase items is provided. The system comprises receiving a list of undesired components of purchased items, and defining an alert to a user of an undesired component in a purchased item, the alert comprising an alert timing configuration and an undesired component identification. The system further comprises receiving a notice that the user purchased an item, determining whether a listing of the purchased item has been automatically collected, and generating a list of components of the purchased item when the purchased item listing has been automatically collected, and obtaining from the user the list of components of the purchased item when the purchased item listing has not been automatically collected. The system further determines whether the purchased item contains an undesired component, and upon determining that the purchased item contains art undesired component, sends the alert to the user.

SERVER ARRANGEMENT AND RELATED METHODS FOR PERFORMING FINANCIAL OPERATIONS

The present disclosure relates to server arrangement for operating, controlling and managing financial operations. The server arrangement implements a shared ledger for recording and storing financial data (e.g., financial transactions) of accounts that are supported by distinct licensed core banking engines. This may allow the server arrangement to implement the licensed core banking engines to perform financial transactions without the use of a payment processor. The server arrangement implements a virtual marketplace where banking services are rendered available to users. Each banking service may be sold by one of the licensed banks to a banking client entity and the banking client entity may select and bundle the banking services of the licensed banks and offer the bundle for sale to the clients in the virtual marketplace. This may facilitate operation for the banking client entities and management of financial assets for the user.

Secure Shipping Interactions Using Blockchains

Technologies are shown for securing private information during shipping of an item storing shipping information at a blockchain address that includes a recipient geolocation address and generating a shipping label that includes a machine-readable pointer to the blockchain address. The label can be scanned to obtain the blockchain address and request the shipping information. In response to a request, the recipient geolocation address or a next intermediate shipper can be provided. The recipient can be notified to obtain authorization to release the recipient geolocation address or provide an alternative geolocation for delivery.

STORE MANAGEMENT SYSTEM AND STORE MANAGEMENT METHOD

A store management system includes a first determination unit, a monitoring unit, a settlement unit, a second determination unit, and a generation unit. The first determination unit determines a customer entering a store displaying and selling a commodity. The monitoring unit monitors that the customer determined by the first determination unit carries the commodity. The settlement unit settles price of the commodity monitored by the monitoring unit as being carried by the customer, according to instruction from the customer. The second determination unit determines that the customer leaves the store. The generation unit generates history data including suspicious data indicating that the customer, identified by an identification code, is associated with an unsettled commodity being carried out of the store, when a settlement of the commodity carried by the customer which is determined by the second determination unit as leaving the store has not been completed by the settlement unit.