G06Q20/4014

Digital Asset Custody Method and Apparatus and Storage Medium
20210406877 · 2021-12-30 ·

A digital asset custody method and apparatus, and a storage medium is disclosed. The method includes acquiring identity information of a first user; allocating a first public-private key pair to the first user; encrypting and storing a correspondence between the first public-private key pair and the identity information, generating multiple first addresses on a first blockchain, so as to allow a client of the first user to acquire the same; monitoring whether the client performs transfer to at least one of the first addresses; and if so, performing, on a second blockchain, corresponding token transfer to a second address of the first user according to a currency type and the amount of the transfer. The second address is generated according to a first public key of the first public-private key pair. The method provides a user with a solution in which safe custody of digital assets requires only identity authentication, such that the user is not required to memorize or store private key information or mnemonic information.

Method for Processing a Transaction, Corresponding Device, System and Program
20210406866 · 2021-12-30 ·

A method for processing a transaction, wherein the method is implemented by an electronic device for processing transactions, accessible via a communication network. The includes a transaction processing phase. The transaction processing phase: obtaining a contextual cryptographic fingerprint, previously generated during an authentication of a user on a communication terminal; verifying validity of the contextual cryptographic fingerprint in a blockchain including a set of cryptographic fingerprints; and validating a transaction when the verifying the validity of the contextual cryptographic fingerprint in a blockchain is positive.

Systems and methods for authenticating an electronic transaction

Devices and methods for securing electronic transactions in a computing network are configured to receive a transaction, access transaction contextual data for the transaction, and apply one or more authentication decision rules to the transaction contextual data to determine initial authentication assessment information for the transaction. Further, aspects are configured to convert the initial authentication assessment information into a condensed authentication assessment indicator having an assessment value selected from a plurality of assessment values based on an assessment value definition, and transmit the condensed authentication assessment indicator. Also, aspects receive a transaction authentication decision based in part on the condensed authentication assessment indicator, and process or deny processing of the transaction based on the transaction authentication decision.

GENERATION AND PROVISIONING OF DIGITAL TOKENS BASED ON DYNAMICALLY OBTAINED CONTEXTUAL DATA

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, generate and provision digital tokens based on dynamically obtained contextual data. For example, an apparatus may receive first information that characterizes an exchange of data initiated by a first application program executed by the apparatus, and may generate and transmit a signal to a computing system through a programmatic interface associated with a second application program executed by the apparatus. In some instances, the first signal may include the first information and data that instructs the computing system to obtain a digital token representative of a data type available for use in the data exchange. The apparatus may also receive a second signal that includes the digital token and based on the digital token, perform operations that present second information characterizing the available data type on an interface.

IDENTITY VERIFICATION AND SERVICE PROVISION PLATFORM AND METHOD

Disclosed herein are methods and systems for identifying a user's identity. In some embodiments, a method comprises through an electronic device, presenting to the user a user interface enabling the user to select a primary third party and a secondary third party, wherein at least the primary third party has previously authenticated an identity of the user; obtaining, from the user interface, a user input identifying a selected primary third party and a selected secondary third party; through the electronic device, directing the user to a login interface associated with the selected primary third party, wherein the login interface enables the user to provide, directly to a primary third-party system associated with the selected primary third party, at least one preexisting login credential for the primary third-party system; receiving, from the primary third-party system, an indication of whether the primary third-party system recognized the at least one preexisting login credential as valid; receiving a response from a secondary third-party system associated with the selected secondary third party, wherein the response comprises information usable to verify the identity of the user; determining, based on the indication from the primary third-party system and the response from the secondary third-party system, whether the identity of the user has been verified; if it is determined that the identity of the user has been verified, authorizing the user to be provided a service; and if it is determined that the identity of the user has not been verified, preventing the user from being provided the service.

CONTENT WALLET, TERMINAL DEVICE, AND CONTENT SALES SYSTEM COMPRISING SAME WALLET AND DEVICE
20220230163 · 2022-07-21 ·

A content wallet includes a network module configured to communicate with a terminal device; and a toggle switch configured to control a connection between an external memory inserted into an accommodation groove and the network module, in which content stored in the external memory is transmitted to the terminal device through the network module, when the external memory and the network module are connected according to a manipulation of a user for the toggle switch.

Real Time Selection of Payment Account
20210406879 · 2021-12-30 ·

The invention provides a method and system allowing a consumer to update (secondary) payment credentials linked to a single set of main (first) payment credentials. This allows consumers to initiate transactions using such first set of payment credentials, which are treated by the merchant and acquirer as the payment credentials for the transaction, while the transaction is funded using payment credentials that the consumer dynamically selected. The selection may be performed before the transaction begins, or in some cases the selection can be made in real time whilst the transaction is ongoing.

TECHNIQUES FOR PERFORMING AUTHENTICATION IN ECOMMERCE TRANSACTIONS

The present invention provides a technical solution by which a consumer can be successfully authenticated in the scenario where the payment card or payment token provided by the consumer in an e-commerce/card not present transaction does not correspond to the payment account that is to provide the funds for effecting payment. This technical solution advantageously ensures that authentication security is not compromised whilst also enabling the consumer to enjoy the increased flexibility that comes with funding a transaction using a payment account that is not associated with the payment card/token provided by the consumer. Additionally, the present invention requires relatively little change to the configuration of the computing devices that collectively function to enable the transaction to take place (e.g. payment network computing devices, merchant computing devices, access control servers (ACS)).

SYSTEM FOR SALE-RESTRICTED ITEMS MANAGEMENT
20220230215 · 2022-07-21 ·

Examples provides sale-restricted items management for self-checkout. A list of sale-restricted items is displayed via a graphical user interface (GUI) provided by a user interface. A notification component transmits a notification to a user device associated with an authorized user to verify a transaction responsive to an unauthorized user selection of a sale-restricted item from the list of sale-restricted items displayed. The notification includes an identification of the selected sale-restricted item and location of the selected sale-restricted item. A verification component authorizes completion of the transaction associated with the selected sale-restricted item by the unauthorized user on condition an age verification is obtained from the user device associated with the authorized user. Responsive to the authorization, an unlocking signal is sent to a locking storage device storing the selected sale-restricted item.

ELECTRONIC DEVICE AND METHOD FOR CONTROLLING THE SAME

The present disclosure relates to an electronic device that is capable of multimodal biometric authentication and a method of controlling the electronic device.