Patent classifications
G06Q20/4014
SYSTEMS AND METHODS FOR PROVIDING DIGITAL IDENTITY RECORDS TO VERIFY IDENTITIES OF USERS
Systems and methods are provided for verifying identities of users. One example computer-implemented method includes requesting a unique ID for a user, from a software development kit (SDK) in a mobile device, and issuing the unique ID for the user. The method also includes generating, by the SDK, a public/private key pair specific to the unique ID, prompting the user to capture an image of a government issued document, and capturing the image of the document. The method further includes validating, by the mobile device, the identity of the user based on the image of the document and, based on the validation, (i) converting the image via a one-way hash function, (ii) signing the hashed image with the private key of the public/private key pair, and (iii) transmitting the signed hashed image, the unique ID, and the public key of the public/private key pair to an identification provider.
Spectrum authentication in edge devices
A fog/edge server machine for authenticating a user in an edge computing model is disclosed using a data spectrum table and spectrum hash values to improve performance, efficiency, and/or security. The edge computing model may include, in some examples, a secure Internet of Things (IoT) and/or mobile-based authentication system. Illustrative embodiments of a spectrum table stored at fog/edge server, a spectrum data array and spectrum hash value generated and stored in memory at the fog/edge sever, and a large, data table stored at an application server are disclosed herein to show continuous/subsequent authentication of the user with attributes/values/inputs collected by one or more edge devices during post-login activities/interactions to re-authenticate/maintain the authentication.
USING A THIRD PARTY DYNAMIC QR CODE ON A PERSONAL MOBILE DEVICE TO COMPLETE A TRANSACTION AT AN ATM
Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine-readable image may be transmitted to the mobile device. When the customer visits the ATM, the machine-readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.
METHOD AND APPARATUS FOR LOCATION-BASED CROWDFUNDING
System for peer-to-peer lending, comprises a first borrowing customer application and a second lending customer application. The borrowing customer application requests a loan and detects a current location, the current location being transmitted with the loan request. The current location is inserted along with the loan request into a view shown at the second lending customer application to enable lending customers to consider a borrower's location when deciding whether to provide a loan.
OPERATION METHOD OF BLOCKCHAIN REMITTANCE SERVICE SYSTEM, AND ELECTRONIC WALLET FOR REMITTANCE
Provided is an operation method of a blockchain remittance service system. The operation method includes storing, performed by a sender's electronic wallet, remittance information in a blockchain network, the sender's electronic wallet being executed on a sender computing device; and transmitting, performed by the sender's electronic wallet, sender information to an information transmission channel to allow a receiver's electronic wallet to acquire the sender information, the receiver's electronic wallet being executed on a receiver computing device.
AUTOMATED FRAUD MONITORING AND TRIGGER-SYSTEM FOR DETECTING UNUSUAL PATTERNS ASSOCIATED WITH FRAUDULENT ACTIVITY, AND CORRESPONDING METHOD THEREOF
An automated real-time fraud monitoring and detection system for detecting unusual and/or suspicious activities within a network of nodes interconnected by edges triggered by captured synthetic forms of social data, in particular social networking and/or linkage and/or relationship data and social metadata including at least data from microblogging services and/or social networking services by pattern recognition and matching.
Method and apparatus for digital identity authentication
A system and method for providing proof of a digital identification of a user which may include activating, on a mobile computing device, a bank application and a digital identification service provider application, and which may allow the bank application to have access to user accounts after the bank application receives a digital identification from the digital identification service provider application in order to provide proof of identify with speed and security.
Financial Service Providing Method and Electronic Apparatus Performing the Same
Provided is a financial service providing method of an electronic apparatus comprising checking whether a financial service is available for a user based on the user's first sales information, checking a condition of use of the financial service for the user based on the user's second sales information, providing information on whether the financial service is available and the condition of use to an external apparatus, providing unsettled sales information of the user based on an information request from the external apparatus, and changing payment account information of a sales price to be paid to the user based on receiving information related to approval of providing the financial service from the external apparatus. Other example embodiments are also possible.
Multi-Tenant Node on a Private Network of Distributed, Auditable, and Immutable Databases
The present disclosure describes a technology platform for creating and updating records of resources in a ledger. To create a record, a tenant organization may prepare a record to write to the ledger that may be flagged as temporary. Metadata may be added to the record, which flags the record as temporary. The metadata may comprise a unique code and an identification of a user that can approve the temporary record. The unique code and the identification may be sent, by the technology platform, to a device associated with one or more approving devices. Upon receiving the code and the identification of the transaction, the device may sign the unique code and invoke a routine based on the identification. The routine may fetch the temporary record. The device may compare the unique code to a code stored in the metadata of the temporary record. Upon valid verification of the unique code, the device may indicate authorization of the write. Based on the authorization, a proxy node associated with the technology platform may write a definitive record to the ledger based on the temporary record.
PROGRESSIVELY VALIDATING ACCESS TOKENS
Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.