VERIFYING USER IDENTITIES DURING TRANSACTIONS USING IDENTIFICATION TOKENS THAT INCLUDE USER FACE DATA

    公开(公告)号:WO2021222073A1

    公开(公告)日:2021-11-04

    申请号:PCT/US2021/029103

    申请日:2021-04-26

    Inventor: KUMAR, Rakesh

    Abstract: The disclosure herein describes enabling authentication of a user's identity based on a user identification (ID) token. An enrollment request is received by an identity platform from a computing device of the user. The enrollment request includes face data and payment account data associated with a payment account of the user. A face identification template of the user is generated based on the face data. Based on verifying the user's identity using data in the enrollment request, an ID token is generated including the face identification template and the payment account data. The ID token is then provided to the computing device of the user, wherein the computing device is enabled to verify the user's identity based on comparison of the captured image data of the face of the user to the face identification template of the ID token during transactions associated with the computing device.

    SECURE AND TRUSTWORTHY BRIDGE FOR TRANSFERRING ASSETS ACROSS NETWORKS WITH DIFFERENT DATA ARCHITECTURE

    公开(公告)号:WO2023283303A2

    公开(公告)日:2023-01-12

    申请号:PCT/US2022/036309

    申请日:2022-07-07

    Applicant: AVA LABS, INC.

    Abstract: Described herein is technology for providing the secure transfer of assets between blockchain networks. A secure-execution server can be configured to execute a bridge program in a secure execution environment to interact with a first pool of warden servers to facilitate secure transfer of assets between a first blockchain network and a second blockchain network. The bridge program may include instructions that, when executed by the secure execution environment, cause the secure-execution server to perform operations that may include performing lock operations that lock first assets from a contractless blockchain network and mint second assets representing the first assets in a contracting blockchain network, where the contracting blockchain network supports smart-contracts that are unsupported on the contractless blockchain network; and performing unlock operations that unlock the first assets by transferring the first assets in the first blockchain network in response to the second assets being returned or destroyed.

    DELEGATION METHOD AND DELEGATION REQUEST MANAGING METHOD

    公开(公告)号:WO2022240425A1

    公开(公告)日:2022-11-17

    申请号:PCT/US2021/040063

    申请日:2021-07-01

    Applicant: HIRES, Richard

    Inventor: HIRES, Richard

    Abstract: A computer-implemented method for managing a delegation request is provided. The method includes linking a first account of a first user with a second account of the first user and receiving the delegation request from the first user, to delegate an access for the second account of the first user to a second user. The method further includes extracting, from the received delegation request, a delegation request payload and verifying the delegation request based on the extracted delegation request payload. Furthermore, the method includes transmitting the verified delegation request to an identity verification database, receiving, from the identity verification database, an authentication response indicating authentication of the first user, the second user and the delegation of access for the second account of the first user to the second user, and allocating, to the second user, an authority to conduct a transaction for the second account based on the authentication response.

    IOT DEVICES
    10.
    发明申请
    IOT DEVICES 审中-公开

    公开(公告)号:WO2021252125A1

    公开(公告)日:2021-12-16

    申请号:PCT/US2021/032240

    申请日:2021-05-13

    Abstract: A method of operating an Internet of Things (IoT) device, the IoT device capable of communicating with a third-party system in order to perform an autonomous task subject to authorisation by an IoT authorisation device, the method comprising: sending operating parameters relating to the autonomous task to a user for approval; receiving user-approved operating parameters for the autonomous task; configuring the IoT device to perform the autonomous task within the user approved operating parameters; registering the user approved operating parameters with the IoT device management server to enable the IoT authorisation device to check that the IoT device is operating within the user-approved operating parameters when it performs an autonomous task with the third-party system.

Patent Agency Ranking