Patent classifications
G06Q20/4014
CUSTOMER AUTHENTICATION APPARATUS, CUSTOMER AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
A customer authentication apparatus includes: a first acquisition unit which acquires master information including face or iris information about a customer, and acquires information of the same kind as that of at least a part of the master information and personal information about the customer from a customer's certificate; a storage processing unit which stores the master information and the personal information in association with each other when the master information and the acquired information of the same kind coincide with each other; a second acquisition unit which acquires, from an in-store capturing apparatus, authentication information including the information of the same kind as that of the master information, and acquires the personal information corresponding the master information when there is the master information that coincides with the authentication information; and an execution unit which causes an in-store apparatus to execute predetermined processing using the personal information.
METHOD AND DEVICE FOR CONTROL OF BLOCKCHAIN DATA ACCESS BASED ON SMART CONTRACT
The present disclosure provides a method and a device for control of blockchain data access based on a smart contract. The method includes obtaining, by a blockchain node, an access operation request of an institution, the access operation request including a transaction identifier of a transaction to be accessed, according to the transaction identifier, determining a blockchain state corresponding to the transaction identifier, the blockchain state including a hash value of the transaction corresponding to a last time change of the blockchain state, according to the hash value of the transaction corresponding to the last time change in the blockchain state and an identifier of the institution, performing data access control on the institution, obtaining control result, and transmitting the control result to the institution.
SYSTEM AND METHOD FOR TOKEN PROCESSING
A method includes receiving a token associated with the credential or a token reference identifier associated with the token from a processor computer. The method also includes transmitting the token to a biller computer, which uses the token to process the bill, by generating an authorization request message comprising the token for an interaction involving the bill. The method also includes receiving the authorization request message comprising the token, retrieving the credential associated with the token, and transmitting a modified authorization request message including the credential to an authorizing entity computer, which authorizes the interaction.
PROCESSING APPARATUS, PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
The present invention provides a processing apparatus (10) including: a registration unit (12) that recognizes, based on image processing, product discrimination information of a product picked up from a product placing space, and registers the recognized product discrimination information in association with customer discrimination information; and a settlement unit (13) that executes, when it is detected, based on image processing, that a customer having picked up the product performs a predetermined action, a settlement based on a registration content resulting from the registration unit (12).
APPARATUS FOR CRYPTOGRAPHIC RESOURCE TRANSFER BASED ON QUANTITATIVE ASSESSMENT REGARDING NON-FUNGIBLE TOKENS
An apparatus for cryptographic resource transfer based on quantitative assessment regarding non-fungible tokens is presented. The apparatus includes at least a processor and a memory communicatively connected to the at least a processor containing instructions configuring the at least a processor to receive a user profile representing a user and an associated cryptographic security, a user digest, and a temporal resource request. The at least a processor is configured to determine a predictive quantifier of the user profile, identify a resource-backed entity to the user as a function of the predictive quantifier, wherein the resource-backed entity includes a cryptographic resource, and generate a token entry. The token entry includes a conditional trigger configured to enable a cryptographic transfer of the cryptographic security and the cryptographic resource, wherein the token entry is configured to be deployed on an immutable sequential listing.
USER AUTHENTICATION AT ACCESS CONTROL SERVER USING MOBILE DEVICE
A method is disclosed. The method includes receiving, by an access control server, an authentication request message comprising a credential or a token from an access device, after the access device receives the credential or the token from a portable device of a user. The method also includes responsive to receiving the authentication request message, transmitting, by the access control server, a challenge message to a user device associated with the user; generating, by the access control server, an authentication indicator. The method also includes transmitting, by the access control server, an authentication response message including the authentication indicator to the access device.
METHOD AND SYSTEM FOR ANONYMOUS CHECKOUT IN A STORE
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for anonymous checkout in a store. One of the methods includes receiving, by a computer system of the store, information associated with a payment account of a person; sending, by the computer system to a server associated with a payment system, the received information associated with the payment account of the person; receiving, by the computer system from the server associated with the payment system, a token associated with the payment account of the person; receiving, by the computer system from a plurality of sensors, data associated with the person; extracting, by the computer system based on the received data associated with the person, a plurality of features of the person; and storing, by the computer system, the received token in correspondence with information associated with the extracted features of the person.
SYSTEM FOR VALIDATING TICKET TRANSACTIONS VIA TICKET NFTS AND METHODS FOR USE THEREWITH
A client device operates by: receiving a ticket transaction request for a ticket transaction having a ticket NFT associated therewith; generating, in response to the ticket transaction request, transaction metadata that includes user identification data; sending the transaction metadata to a wallet associated with a user of a client device, the wallet containing a private key associated with the ticket NFT; receiving, from the wallet, a transaction response that is generated based on the private key; generating, based on the transaction response, ownership check data; sending the ownership check data to a blockchain system that stores the ticket NFT; receiving, from the blockchain system, an ownership validation response; and indicating approval of the ticket transaction when ownership of the ticket NFT is verified.
PSEUDONYMOUS TRANSACTIONS ON BLOCKCHAINS COMPLIANT WITH KNOW YOUR CUSTOMER REGULATIONS AND REPORTING REQUIREMENTS
A method for compliance with Know Your Customer (KYC) and other regulations includes a pseudonymous globally unique identifier stored on a blockchain that associates a pseudonymous first party address with a globally unique identifier representing the vetted identity of the owner of the address. The method also includes a trusted third party issuing a verifiable credential for a first pseudonymous party to a proposed transaction to a second pseudonymous party to the transaction.
Systems And Methods For Monitoring, Analyzing and Regulating Blockchain Transactions
Systems and methods for generating a metric based on blockchain data for use in controlling, evaluating, or otherwise regulating a transaction. The metric may be used to control the release of assets, to trigger an event, or as a measure of the satisfaction of contractual conditions based on whether the characteristics of a transaction or of a party engaging in a transaction are associated with a score that satisfies a threshold value. In some embodiments, a state-change derived score or metric allows the creation of a layer of trust or reliability that a blockchain network can reference in situations where a greater degree of trust is desired.