G06Q20/4014

Use of identity and access management for service provisioning

Described is a system for monitoring provisions of services. The system includes a work order system for producing one or more work orders, an identity and access management system to verify information regarding a service provider and a system that receives a produced work order associated with a service provider upon receipt of a service request. The system requests information regarding service provider attributes from the identity and access management system, and receives from the identity and access management system information regarding at least some of the attributes of the service provider. The system determines a requisite level of expertise required for the service and determines whether the attributes received from the identity and access management system indicate that the service provider has the requisite level of attributes.

System and method for advanced identification of a customer

In a method for advanced identification of a customer, a customer may remotely place an order, intending to later go to a store to pick up the ordered item. The store may have a pick-up area (e.g., at the back of the store) where the customer can go to pick up the ordered item. To save the customer time, the customer may be identified when she enters the store so that an employee can obtain her ordered item and have it ready to pick up by the time the customer walks through the store and arrives at the pick-up area.

SYSTEM AND METHOD TO CHARACTERIZE RISK OF OCCUPATIONAL HEALTH HAZARDS AND IMPLEMENT CONTROL MEASURES TO PROTECT WORKERS, WITH REAL TIME EVALUATIONS OF ENVIRONMENTAL CONDITIONS AND EXPOSURE CONCENTRATIONS
20230153829 · 2023-05-18 ·

A system and method to characterize risk of occupational health hazards and implement control measures to protect workers, with real time evaluations of environmental conditions and exposure concentrations, and platform for use are disclosed herein. The present disclosure provides a system and method for characterizing the risk of various occupational health hazards across various industries, implementing and providing control measures that can be adopted to protect workers in such hazards or situations, and even provide real-time evaluations and recommendations based on existing conditions of environmental conditions to mitigate exposure concentrations of various hazards that may be experienced by or induced upon a worker in an environment.

METHOD AND SYSTEM FOR IDENTIFYING PROSPECTIVE TRANSACTION PARTICIPANTS

A method and a system for identifying suitable participants for a proposed transaction is provided. The method includes receiving transaction-specific information that relates to a proposed transaction; determining a search term based on the transaction-specific information; retrieving, from a memory, participant-specific information that relates to at least one prospective participant with respect to the proposed transaction; applying, to the participant-specific information, a search algorithm that uses the determined search term; and using a result of the applying of the search algorithm to determine whether to offer an opportunity to participate in the proposed transaction to each of the at least one prospective participant. The search algorithm is initially applied to a first list of prospective participants, and when a number of prospective participants to which an opportunity is offered is less than a threshold number, then the search algorithm is applied to a broader list of prospective participants.

Booking management system

Secure authentication and delayed transaction processing for booking management systems is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system can maintain and process authentication information associated with traveler payment cards, and provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the traveler payment card information maintained by the booking management system.

Zero-step user recognition and biometric access control
11651371 · 2023-05-16 · ·

A zero-step user recognition and biometric access control system and method which comprises various sensors configured to capture a plurality of biometric data associated with a user, a database configured to store a plurality of user information including identifiable biometric data associated with the user, a biometric verification server configured to receive a plurality of biometric data from the sensors and user information from the database, and to return a confirmation of the user's identity, in order to provide real-time user recognition, authentication, and access control using biometric data.

Terminal for conducting electronic transactions

The present disclosure is drawn to, among other things, a method of providing a payment terminal application on an electronic device, the electronic device comprising a volatile storage module, a user input module and a network interface module. In some aspects the method includes receiving user credentials from the user input module, transmitting an authentication request message to a remote data center via the network interface module, the authentication request message including the user credentials, receiving an authentication response message from the remote data center, the authentication response message including an indication as to whether authentication was successful, and if the authentication was successful, receiving at least one encryption key from the remote data center; and storing the at least one encryption key in the volatile storage module.

System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies
11645632 · 2023-05-09 ·

A mechanism for verifying digital information provenance and attestation using blockchain distributed ledger technology which reveals unauthorized tampering with credentialed information. Content modifications are detectable leveraging only local edge validation supported by the normative Bitcoin Core cryptographic libraries or equivalent blockchain implementations. The invention prevents unauthorized access, unregulated copy distribution, and orphaned ownership lacking issuer provenance and attestation. The preferred embodiment provides tamper detectable digital content containers supporting credentialing, remote administration, localized validation, distributed access control, and processing instruction signaling. Intermediary third-party services are not required to verify provenance and issuer attestation. Blockchain integrated cryptographic information containers and administrative transactions immutably record the binding between participating parties (e.g., issuer, administrator, requestor) and associated digital assets (e.g., insurance card, medical records, driver's license, passport, biometric, business contract, software application files, data).

Transaction authorization
11645653 · 2023-05-09 · ·

There is discussed a method of authorising an electronic transaction in which a user device receives a shared secret and a shared secret identifier. Subsequently, on receipt of transaction data from a transaction terminal, the user device calculates a one-way hash of data comprising the shared secret to generate a hash value, generates authentication data comprising the hash value and the shared secret identifier, and transmits the authentication data to the transaction terminal.

System for harnessing a connected network to securely verify a transaction

A method for harnessing a connected network to securely verify and execute a transaction is provided. The method may include requesting a PIN from a mobile device. The request may be transmitted via a USSD message. The method may also include receiving the PIN from the mobile device. The PIN may be received via a response to the USSD message. The method may also include authenticating the mobile device. The method may also include accessing a third-party network to verify an authentication status of the mobile device. The third-party network may include a plurality of IoT endpoints. Each IoT endpoint may include a stored verification usage process. The stored verification usage process may relate to a user associated with the mobile device. The method may also include executing the transaction upon receipt of an authentication signal from the third-party network.