Patent classifications
G06Q20/4014
PUBLIC LEDGER AUTHENTICATION SYSTEM
Systems and methods for public ledger authentication include receiving a first previous authentication public ledger address and a first current authentication public ledger address from a user. A verified static user key is identified in a public ledger using the first previous authentication public ledger address. A second current authentication public ledger address is then provided to the user for use in the current authentication attempt. Authentication attempt information is determined that includes a number of authentication attempts by the user, and used in a hash operation with the verified static user key to generate a first user authentication key. A second user authentication key is retrieved from the public ledger that was sent from the first current authentication public ledger address to the second current authentication public ledger address in a transaction, and the user is authenticated if the second user authentication key matches the first user authentication key.
ELECTRONIC DISTRIBUTION OF APPLICATIONS HAVING MULTIPLE SERVICE LEVELS
Techniques for electronic distribution of software applications to users and devices belonging to a single network domain, wherein such applications are configurable to provide multiple service levels. In an aspect, a first service level is provided to users and/or devices sharing the same network domain. Upon request by an admin of the network domain, an application control server verifies the admin's control of the domain, as well as fulfillment of conditions for accessing a second service level. Upon verification of control and fulfillment, the application control server allows access by the admin to an admin portal. The application control server further reassigns the service level of users and/or devices sharing the network domain from the first service level to the second service level.
Linking channel-specific systems with a user authentication hub to provide omni-channel user authentication
Aspects of the disclosure relate to linking channel-specific systems with a user authentication hub. In some embodiments, a computing platform may receive, from a mobile device, an authentication request for a user account and may generate one or more authentication prompts. Subsequently, the computing platform may provide the one or more authentication prompts and may validate responses to the authentication prompts. Based on validating the responses to the authentication prompts, the computing platform may generate one or more security questions based on historical information associated with the user account. Subsequently, the computing platform may provide the one or more security questions and may validate one or more responses to the one or more security questions. Based on validating the one or more responses to the one or more security questions, the computing platform may provide user account information associated with the user account to the mobile device.
Payment Approval Method and System
There is provided methods and systems for approving a payment from a customer to a merchant. A merchant device, an approval server, a client device plus a method and system for configuring pre-approved payments from a customer to a merchant are also disclosed.
Method of Governing Content Presentation and the Altering of Multi-Page Electronic Documents
A method of governing presentation of electronic documents includes providing a document file. The document file includes a program file and an associated text file. The text file is provided to an author, who creates a current version of a work of content, which is parsed into defined units of content. The author provides the current version to a user in a sequence determined by the author. The work of content is arranged such that a predefined action and/or condition causes redirection of the viewing of the content from a current unit to a different unit, regardless of the sequence; revealing to the user previously unviewable units and/or concealing a currently viewable unit; addition of a subsequent unit and/or removal of a current unit; replacement of a current unit by a subsequent unit; and/or replacement of the current version with a subsequent version.
Generating derived credentials for a multi-tenant identity cloud service
A multi-tenant system that provides cloud-based identity management receives a request to execute a job, where the job has a scheduled start time, or a timeframe to complete, that exceeds the validity time of a request access token. The system generates the request access token corresponding to the job, where the request access token has access privileges. The system schedules the job and persists the request access token. The system triggers the job at the scheduled start time and generates a derived access token based on the request access token, where the derived access token includes the access privileges. The system then injects the derived access token during runtime of the job and calls a service using the derived access token to execute the job.
RISK-LINK AUTHENTICATION FOR OPTIMIZING DECISIONS OF MULTI-FACTOR AUTHENTICATIONS
A system for evaluating risk in an electronic banking transaction by estimating an aggregated risk value from a set of risk factors that are either dependent or independent of each other, comprising: user input means for enabling an end user to provide authentication information related to a desired electronic banking transaction; financial institution authentication means for authenticating that an end user is authorized to conduct the desired electronic transaction; risk computation means for imposing authentication requirements upon the end user in adaptation to a risk value of the desired banking electronic banking transaction; transaction session means for tracking an amount of time that the desired electronic banking transaction is taking; and financial institution transaction means for storing data related to the desired electronic banking transaction.
Portable electronic device for exchanging values and method of using such a device
The invention concerns a portable electronic transfer device using a near-field wireless communication module and a method of using it. The device includes means for entering an amount and an acceptance command so that a debtor can enter their personal identification number on their portable device and not on that of a third party. If the acceptance command is authenticated, a secure message containing the amount is sent via the near-field. wireless communication module to a creditor. The creditor can then add their references to the message and send it to effect the transaction. Alternatively, the creditor sends their references to the debtor via the near-field wireless communication module and the debtor can formulate a transaction request including the amount and the references of the creditor.
Method and secure device for performing a secure transaction with a terminal
A method for performing a secure transaction between a secure device (2) and a terminal (4), the method being carried out by the secure device (2) and comprising the steps of: receiving transaction data from the terminal (4),
characterized in that it comprises, before the step of receiving transaction data from the terminal (4), the steps of obtaining transaction data entered by a user of the secure device (2), and transmitting the transaction data to the terminal (4).
Method, apparatus and electronic device for blockchain transactions
A method for implementing blockchain-based transactions includes: determining a to-be-remitted amount for each of a plurality of remitters participating in a transaction and a to-be-received amount for each of a plurality of receivers participating in the transaction, wherein the plurality of remitters include one or more real remitters, the plurality of receivers include one or more real receivers, and the plurality of remitters include one or more cover-up remitters and/or the plurality of receivers include one or more cover-up receivers; generating a commitment of the to-be-remitted amount corresponding to the each remitter and a commitment of the to-be-received amount corresponding to the each receiver; and submitting the transaction to a blockchain for execution, wherein the transaction comprises blockchain account addresses of the remitters and receivers, and the commitments of the to-be-remitted amounts and the to-be-received amounts.