SYSTEM AND METHOD FOR FULFILLING AN INQUIRY THROUGH AN ONLINE STRUCTURE

    公开(公告)号:US20180047069A1

    公开(公告)日:2018-02-15

    申请号:US15234957

    申请日:2016-08-11

    CPC classification number: G06Q30/0279 H04L63/166 H04L67/10

    Abstract: Systems, methods, and software products, fulfill a request through an online structure. The request for a request amount is received within the online structure from a requestor. The request amount is divided by a split amount to determine a chosen number of potential donors from which to request donations. The chosen number of potential donors are selected from a pool of potential donors and are each sent a request for the split amount in a communication based upon a protocol of the online structure and via a network of the online structure. A response, received from each of the selected chosen number of potential donors via the network using another communication of the protocol. When the response includes the donation amount, the donation amount is collected as received donations within the online structure. The received donations are sent to the requestor when the requested amount is fulfilled.

    SYSTEM AND METHOD FOR GRADUATED SECURITY IN USER AUTHENTICATION
    42.
    发明申请
    SYSTEM AND METHOD FOR GRADUATED SECURITY IN USER AUTHENTICATION 有权
    用户认证中的分级安全的系统和方法

    公开(公告)号:US20150052587A1

    公开(公告)日:2015-02-19

    申请号:US13969684

    申请日:2013-08-19

    Abstract: A computer system for authenticating user access to at least one computer application of a plurality of computer applications is provided. The computer system includes a memory device and a processor. The computer system is programmed to identify a security level from a plurality of security levels for each computer application within the plurality of computer applications. The plurality of security levels include at least a first-tier security level and a second-tier security level. The second-tier security level requires additional authentication information as compared to the first-tier security level. The computer system is also programmed to create a user account for a user within the memory device with the first-tier security level, and to determine that the user account requires the second-tier security level, and prompt the user to enter the additional authentication information. The computer system is also programmed to promote the user account to the second-tier security level.

    Abstract translation: 提供了一种用于验证对多个计算机应用的至少一个计算机应用的用户访问的计算机系统。 计算机系统包括存储装置和处理器。 计算机系统被编程为从多个计算机应用程序内的每个计算机应用程序的多个安全级别识别安全级别。 多个安全级别至少包括第一级安全级别和第二级安全级别。 与第一级安全级别相比,第二层安全级别需要额外的身份验证信息。 计算机系统还被编程为利用第一级安全级别为存储器设备内的用户创建用户帐户,并且确定用户帐户需要第二级安全级别,并提示用户输入附加认证 信息。 计算机系统也被编程为将用户帐户推广到二级安全级别。

    Systems and methods for use in implementing self-exclusion preferences

    公开(公告)号:US12278903B2

    公开(公告)日:2025-04-15

    申请号:US17976144

    申请日:2022-10-28

    Abstract: Systems and methods are provided for imposing self-exclusion preferences for data access. One example computer-implemented method includes, in response to a request by a user to impose a self-exclusion preference on a digital identity of the user, requesting a token for the digital identity. The method also includes receiving and storing the token and a secret associated with the token in a record associated with the user and assigning the self-exclusion preference to the token. The method then includes receiving a request to share an identity attribute of the user's digital identity with a relying party, where the request includes the token, and retrieving the self-exclusion preference assigned to the token. And, in response to validation of the request to share the identity attribute, based on the self-exclusion preference, authorizing a mobile device of the user to share the at least one identity attribute with the relying party.

    SYSTEMS AND METHODS FOR USE IN SECURING BACKUP DATA FILES

    公开(公告)号:US20240419832A1

    公开(公告)日:2024-12-19

    申请号:US18820694

    申请日:2024-08-30

    Abstract: Systems and methods are provided for backing up a data file. One example computer-implemented method includes generating an L4 key and, for each contact attribute of the data file, generating an L3 file including the L4 key and an identifier of a user and encrypting the L3 file with an un-masked version of the contact attribute. The method also includes compiling the encrypted L3 file(s) and the masked version(s) of the contact attribute(s) into an L2 file, generating an L2 key, encrypting the L2 file with the L2 key, compiling the encrypted L2 file and L2 key into an L1 file, generating an L1 key, encrypting the L1 file with the L1 key, compiling an L4 file to include identity attributes of the user, encrypting the L4 file with the L4 key, and combining the encrypted L4 file and the encrypted L1 file.

    Systems and methods for provisioning accounts

    公开(公告)号:US11989731B2

    公开(公告)日:2024-05-21

    申请号:US17834582

    申请日:2022-06-07

    Abstract: Systems and methods are provided for use in provisioning accounts to mobile devices. One example method includes receiving, at a mobile device, a request to provision an account to a mobile device; prompting a user associated with the account for authentication at a wireless device associated with the account; receiving an account credential from the wireless device, via a local wireless communication between the mobile device and the wireless device, when the user is authenticated at the wireless device; transmitting the account credential toward a first party associated with the account, whereby the account credential is indicative of the authentication of the user; and provisioning the account to the mobile device, in response to an approval received from the first party.

    Digital rights management platform
    47.
    发明授权

    公开(公告)号:US11977611B2

    公开(公告)日:2024-05-07

    申请号:US17075592

    申请日:2020-10-20

    CPC classification number: G06F21/105 G06Q2220/18

    Abstract: Various implementations described herein may refer to a digital rights management (DRM) platform. In one implementation, a method may include receiving first biometric data associated with a user. The method may also include generating first biometric templates based on the first biometric data using a DRM platform. The method may further include receiving access control data from the user, where the access control data includes data indicating time periods during which requestors are permitted to authenticate the user using the first biometric templates. The method may additionally include transmitting the first biometric templates and the access control data to the requestors using the DRM platform, where the first biometric templates are configured to be compared to second biometric templates based on the access control data, and where the second biometric templates are configured to be generated using the DRM platform based on second biometric data associated with the user.

    Systems and methods for use in provisioning credentials

    公开(公告)号:US11956373B2

    公开(公告)日:2024-04-09

    申请号:US18128983

    申请日:2023-03-30

    Abstract: Systems and methods are provided for provisioning identity credentials based on interactions with verified or trusted users. One exemplary computer-implemented method includes receiving a request for a digital identity from a user, where the request includes identifying information for the user and a verified user identifier, and transmitting, to a verified user associated with the verified user identifier, an attestation request for the user. The method also includes receiving, from the verified user, an attestation in response to the attestation request with regard to at least some of the identifying information for the user, generating a digital identity for the user based on a number of attestations of the identifying information for the user, and sharing a digital identity notice with the user including an identifier for the user, whereby the user is permitted to share the digital identity with a relying party via the identifier.

    Compliance Platform for use with Identity Data

    公开(公告)号:US20240064015A1

    公开(公告)日:2024-02-22

    申请号:US18385470

    申请日:2023-10-31

    Abstract: Various implementations described herein may refer to a compliance platform for use with identity data. In one implementation, a method may include receiving a compliance data package from a user, where the compliance data package includes encrypted evidence data corresponding to digital identity data of the user. The method may also include encrypting the compliance data package using a first cryptographic key. The method may further include generating a user key shard, a requestor key shard, and a regulator key shard based on the first cryptographic key. The method may include generating an unlock data package that includes the requestor key shard and encrypting the unlock data package using a second cryptographic key. The method may also include transmitting the user key shard, the encrypted unlock data package, and the encrypted compliance data package to the user. The method may include transmitting the regulator key shard to a regulator.

Patent Agency Ranking