US20180285879A1 - Blockchain-based identity and transaction platform - Google Patents
Blockchain-based identity and transaction platform Download PDFInfo
- Publication number
- US20180285879A1 US20180285879A1 US15/767,969 US201615767969A US2018285879A1 US 20180285879 A1 US20180285879 A1 US 20180285879A1 US 201615767969 A US201615767969 A US 201615767969A US 2018285879 A1 US2018285879 A1 US 2018285879A1
- Authority
- US
- United States
- Prior art keywords
- information
- blockchain
- identity
- person
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
-
- G06F17/30185—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
- G06Q20/3255—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- H04L2209/38—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- identity information e.g., a photo
- identity information can be encrypted and stored in a blockchain as part of enrolling the person as a user in a blockchain-based identity and transaction platform.
- Trust relationships can be formed between the user and other users, and records of the trust relationships can be stored in the blockchain.
- Transactions between the user and other users with whom the user has formed a trust relationship can be authorized. Records of the transactions can also be stored in the blockchain.
- Authorization can involve, for example, a multi-stage verification process that accesses information stored on the blockchain.
- the transactions and identity information, along with other information, can contribute to an economic identity of the person. Storing an economic identity (and the underlying information that forms the economic identity of the person) in the blockchain results in a secure platform accessible to people regardless of their economic or geographic circumstances.
- FIG. 1 is a block diagram of an example environment in which a blockchain-based identity and transaction platform can be implemented.
- FIG. 2 illustrates an example economic identity
- FIG. 3 is a diagram illustrating an example method of authorizing transactions in a blockchain-based identity and transaction platform.
- FIG. 4 is a diagram illustrating an example method of enrolling a person as a user in a blockchain-based identity and transaction platform.
- FIG. 5 is a diagram illustrating an example method of authorizing transactions in a blockchain-based identity and transaction platform using a multi-stage verification process.
- FIG. 6 illustrates interactions in an example transaction authorization.
- FIG. 7 illustrates interactions in an example transaction authorization in which a second code is sent to a user's mobile device.
- FIGS. 8-23 illustrate example user interfaces for interacting with a blockchain-based identity and transaction platform.
- FIG. 24 is a diagram of an example computing system in which some described embodiments can be implemented.
- FIG. 25 is an example mobile device that can be used in conjunction with the technologies described herein.
- FIG. 26 is an example cloud-supported environment that can be used in conjunction with the technologies described herein.
- FIG. 27 is a diagram of example personas based on a secured, blockchain-based economic identity.
- a blockchain-based identity and transaction platform can be implemented. People can enroll as users in the platform using identity information such as an image or photo (e.g., of the person's face). Once a user profile has been established, the user can form trust relationships with other users of the platform and perform transactions. Transactions can include, for example, funds transfers, medical treatment authorization, food assistance authorization, and other transactions.
- identity information such as an image or photo (e.g., of the person's face).
- Transactions can include, for example, funds transfers, medical treatment authorization, food assistance authorization, and other transactions.
- the identity information, trust relationships, transactions, and other information are stored in blocks in a blockchain.
- the blockchain-based identity and transaction platform examples described herein provide secure storage of an individual's information through a distributed network of computers.
- the example blockchain-based identity and transaction platforms also allow a person to integrate various types of information to create an economic identity that can be used to access goods and services.
- the economic identity can include, for example, a person's history of income, employment, payments to creditors or other parties, etc.
- the economic identity can be used to establish the qualifications and background that allow the person to participate in a credit-based (or otherwise sophisticated) economy.
- individuals in developing countries or refugee areas may not have access to institutions and entities necessary to build a history (e.g., a credit score) that allows the individual to access credit that can be used to start a business, purchase necessary farming equipment, make capital improvements, etc.
- An economic identity established through a blockchain-based identity and transaction platform can provide evidence of a person's creditworthiness, identity, legal status, etc. that enables the person to obtain credit. Because of the distributed nature of a blockchain, such an economic identity is both portable and accessible regardless of the economic or geopolitical situation in a user's current location. In addition to providing those in the developed world with a secure, integrated platform, the examples described herein have the potential to drastically reduce poverty in developing countries and help millions of refugees establish themselves in the world economy by providing access to credit. Examples are described below with reference to FIGS. 1-27 .
- FIG. 1 illustrates an example environment 100 in which a blockchain-based identity and transaction platform can be implemented.
- blockchain refers to a distributed storage platform and network in which individual “blocks” are connected in a chain. Each block is linked to the previous block in the blockchain by, for example, including a hash of the previous block as a “proof of work.”
- Various hash functions including functions in the Secure Hash Algorithm (SHA)-1 or -2 families, such as SHA-256, can be used to perform a one-way hash. For a one-way hash, it is generally considered to be impossible or impractical to generate the input (the “message”) to the hash function based on the output (the “message digest” or “digest”) of the hash function.
- SHA Secure Hash Algorithm
- the individual blocks can store a variety of data that may or may not be related (e.g., may or may not be associated with a same user).
- mobile computing devices 102 and 104 are in communication with computing device(s) 106 over a network 108 .
- Network 108 can be the Internet, a Local Area Network (LAN), a Wireless Local Area Network (WLAN), a Wide Area Network (WAN), or other type of network, wired or wireless.
- Computing device(s) 106 can be, for example, one or more server computers.
- Computing device(s) 106 includes processor(s) 110 , local storage 112 , and memory 114 .
- Environment 100 can also include one or more additional computing devices, such as desktop computers, (not shown) in communication with computing devices(s) 106 over network 108 .
- Computing device(s) 106 also includes an enrollment engine 116 and a transaction engine 118 .
- Enrollment engine 116 is configured to enroll, by processor(s) 110 , a person as a user in the blockchain-based economic identity and transaction platform based on identity information for the person.
- a person can use mobile computing device 102 (or other computing device, such as a desktop computer) to enter a name, government-assigned identification number, etc. and/or to take an image (e.g., a “selfie”) of themselves and, using a web application or using client-side software installed on mobile computing device 102 , upload the image and/or other information to computing device(s) 106 as the identity information.
- Example software user interfaces are illustrated in FIGS. 8-23 .
- Enrollment engine 116 is configured to create a unique identifier for the person based on the uploaded identity information.
- the identity information can be encrypted, either by computing device(s) 106 or through an encryption service 120 . Encryption services are discussed in more detail below.
- the encrypted identity information can then be stored in a blockchain 122 .
- Blockchain 122 is implemented on a group of distributed computing devices 124 that are accessible via network 108 . Additional enrollment examples are discussed in detail below with respect, e.g., to FIG. 4 .
- Transaction engine 118 is configured to authorize, by processor(s) 110 , transactions between users who are in a trust relationship. Trust relationships can be established, for example, by request or invitation of a user and an acceptance by another user. Transactions can be authorized, at least in part, through interaction with a verification agent computing device 126 . Verification agent computing device 126 communicates with computing device(s) 106 through network 108 . As an example, a first user can initiate a funds transfer to a second user through a web application or through client-side software. Transaction engine 118 can be configured to perform a verification of the funds transfer using, for example, a multi-stage verification approach that accesses information stored in blockchain 122 . Transaction verification examples are discussed in detail below with respect, e.g., to FIGS. 5, 6, and 7 .
- FIG. 2 illustrates an example economic identity 200 .
- Economic identity 200 includes identity information 202 , linked accounts 204 , employment history 206 , utility information 208 , education history 210 , aid record 212 , property ownership 214 , medical history 216 , and transaction history 218 .
- economic identity 200 is shown as including each of the preceding particular categories of information, example economic identities can also include only some of these categories of information and/or include additional categories of information.
- Identity information 202 can include, for example, an image of a user, a name, government identifier(s), and/or fingerprint or eye pattern information of the user (or other biometric information of the user).
- Linked accounts 204 can include, for example, banking, investment, or credit accounts associated with the user.
- Employment history 206 can include employer names and/or addresses, job titles, dates of employment, salaries, and/or other employment information.
- Utility information 208 can include utility accounts for the user, records of past payments, and/or other information.
- Education history 210 can include degrees earned, educational levels completed, courses completed, certifications obtained, test scores, etc.
- Aid record 212 can include food assistance (e.g., food packets distributed by a United Nations or other aid entity) or loans received, loans repaid, etc.
- Property ownership 214 can include property deed information, property location information, property transaction information, etc.
- Medical history 216 can include medical records, medical insurance information, medical aid information (e.g., vaccinations received), etc.
- Transaction history 218 can include funds transfers received or provided, aid or medical assistance authorizations (even if also included in aid record 212 or medical history 216 ), or other transaction information.
- identity information 202 linked accounts 204 , employment history 206 , utility information 208 , education history 210 , aid record 212 , property ownership 214 , medical history 216 , and transaction history 218 can be presented as aggregated information or as individual items.
- Economic identity 200 can also include a “trust” score similar to a credit score that indicates a level of creditworthiness or responsibility that can be used by businesses or institutions who are users in the blockchain-based identity and transaction platform.
- the trust score can be determined based on a weighting scheme (e.g., quantification of employment history weighted at 50%, quantification of transaction history weighted at 30%, quantification of education history weighted at 20%, etc.).
- particular businesses or institutions are able to select particular criteria of interest and/or desired weightings for different criteria, and a custom trust score is determined based on those criteria.
- Various approaches to quantifying a particular category can be used (e.g., percentile rank of criteria, scale of 1-10, etc.).
- Economic identity 200 is stored in blockchain 220 .
- Blocks 222 , 224 , 226 , and 228 of blockchain 220 are shown in FIG. 2 , but any number of blocks can form blockchain 220 .
- the respective blocks are linked to the previous block in the blockchain. This link can be in the form of, for example, a hash of the previous block.
- FIG. 3 illustrates a method 300 of authorizing transactions in a blockchain-based identity and transaction platform.
- identity information for a person is encrypted, and the encrypted identity information is stored in a blockchain as part of enrolling the user in the blockchain-based economic identity and transaction platform.
- the identity information can include, for example, an image of the person.
- the identity information can alternatively or additionally include at least one of a name, government identifier(s), fingerprint, or eye pattern information.
- a trust relationship can be formed, e.g., by performing a search or lookup of registered users and sending a user identified through the search or lookup a message indicating that a trust relationship is desired. If the other user accepts the request, then a trust relationship is established.
- a user may wish to transfer funds or perform another transaction with a person who is not a user of the blockchain-based identity and transaction platform. In such situations, a user may send an invitation to connect to the person's email address, messaging account, or other contact point, with the message including a link or instructions for creating an account with the platform and indicating that the user would like to establish a trusted relationship.
- Transactions between the user and one or more of the other users with whom the user has formed a trust relationship are authorized in process block 306 .
- the transactions are stored in the blockchain. Records of the transactions are stored in the blockchain in process block 308 .
- At least some of the transactions and identity information contribute to the economic identity of the person.
- the economic identity can also include at least one of employment history information, education history information, land ownership information, or medical history information for the user. Additional information that can be part of the economic identity is illustrated, e.g., in FIG. 2 .
- the identity information of a user can be used in the authorization.
- the identity information includes an image of the person, this image can be used in authorizing the transactions.
- Process block 306 can include a multi-stage verification approach as discussed, for example, with respect to FIGS. 5 and 6 .
- method 300 further comprises providing the economic identity of the user to a requesting party, where the requesting party is a user in the blockchain-based economic identity and transaction platform.
- a user may wish to establish a line of credit, purchase equipment, or perform another transaction, and prior to initiating or authorizing the transaction, the requesting party can request the user's economic identity (e.g., through a client-side software application) in order to evaluate the user as a potential debtor, purchaser, employee, etc.
- the user's economic identity e.g., through a client-side software application
- businesses and institutions that establish accounts with the blockchain-based economic identity and transaction platform can access (e.g., through a web application or client-side software) a user interface to allow the business or institution to view economic identities for other users who give permission.
- users can control which categories of information are included in their economic identity and/or can authorize read access of only certain categories in response to a request. For example, if a user is interested in taking out a loan from an entity, and the entity requests the user's economic identity, the user may choose not to share medical history information or other information that may not be relevant to the entity.
- FIG. 4 illustrates a method 400 of enrolling a person as a user in a blockchain-based identity and transaction platform.
- identity information for a person is received.
- Identity information can include an image of the person (e.g., a selfie) and/or a name, government identifier(s), fingerprint, or eye pattern information.
- the identity information is encrypted.
- Various encryption techniques can be used.
- the encrypted identity information is stored in a block of a blockchain.
- a single encryption key can be used and can be stored as, for example, an environmental variable on a computer storage device associated with the blockchain-based identity and transaction platform.
- an encryption service such as encryption service 120 of FIG. 1
- the encryption service can create and manage encryption keys.
- software implementing aspects of the blockchain-based identity and transaction platform can make a call to the encryption service to encrypt the identity information received in process block 402 .
- the service creates the keys, retains a private key, and provides both a public key and the encrypted identity information to the software that made the call to the service.
- the encryption service can be a web service.
- process block 408 a unique identifier associated with the person is established based on the encrypted identity information.
- process block 408 includes designating the encrypted identity information as the unique identifier.
- Other unique identifiers can also be used.
- various actions may be taken to validate or authenticate a user's identity prior to establishing the unique identifier.
- various third-party sources of information can be used to verify the user's identity.
- Method 400 can also further comprise associating, with the unique identifier, at least one of medical, employment, educational, property ownership, or economic information (e.g., linked accounts, transaction history, etc.) corresponding to the person and storing the medical, employment, educational, property ownership, or economic information in the blockchain. Some or all of the associated information can be used to form the economic identity of the person, as discussed, for example, above with respect to FIG. 2 .
- Transaction information representing one or more transactions between the person and one or more additional parties, as well as trust relationships between the person and additional parties, can also be stored in the blockchain in association with the unique identifier or other information indicating the user (such as the public key, even if the public key is not used as the unique identifier).
- FIG. 5 illustrates a method 500 of verifying a transaction in a blockchain-based identity and transaction platform.
- a recipient for a transaction is identified.
- a recipient is, for example, the person or user who will receive a funds transfer, receive medical assistance, receive food assistance, etc.
- a recipient can be any person, and in some examples, the recipient is limited to a user of the blockchain-based identity and transaction platform.
- the person can be sent a link or instructions for enrolling as a user in the platform after the transaction is initiated, and the transaction does not proceed until the person enrolls and establishes a trust relationship with the sender.
- the recipient is a prospective recipient until the person enrolls and establishes the trust relationship.
- First stage authentication data is generated in process block 504 .
- First stage authentication data can be, for example, a code including numbers and/or letters.
- the first stage authentication data can be provided to the recipient and can serve as an indication to the recipient that a benefit is available to be claimed.
- the recipient can receive a text message, email message, or application alert including: a statement that a benefit is available to be claimed; a code (e.g., a 9-digit numeric, alphanumeric, or letter code); and instructions to complete the verification process in order to claim the benefit.
- the first stage authentication data is only valid for a certain amount of time (one hour, one day, one week, etc.).
- the first stage authentication data is valid long enough to allow for the recipient to claim the benefit according to the recipient's schedule (e.g., until after a work shift, trip, or other event is completed).
- a verification agent is a user in the blockchain-based identity and transaction platform who serves in a third-party role.
- the verification agent can communicate with the platform through, for example, verification agent computing device 126 of FIG. 1 .
- the verification agent can be a member of a United Nations or other entity that is an assistance provider, and when a refugee receives (e.g., via a text on the refugee's mobile phone) a message and code indicating that a food assistance packet is available, the refugee takes the code to the verification agent, who can be located at a kiosk, building, or other facility.
- the verification agent then enters the code through a software application user interface.
- “Verification agent” as used herein may also refer to a verification agent computing device. In some examples, the person can enter a code into an automated terminal.
- the first stage authentication data is verified.
- the code provided in the initial message can be compared against the code entered by the agent (or in some examples, entered by the person). Verification of the first stage authentication data provides some confirmation that the person who provided the code to the agent is the actual recipient.
- identity information for the recipient is retrieved from one or more blocks in a blockchain after verifying the first stage authentication data and is transmitted (e.g., to the verification agent).
- the identity information can be used to further confirm that the person is the actual recipient.
- an image of the recipient can be provided to the agent.
- the image can be the image used to create the recipient's profile (and the image that is encrypted and stored in the blockchain). If the image appears to be the same person as the person in the presence of the agent who provided the code, then the agent confirms an identity match.
- facial recognition software is used to determine whether there is a match between the person and the image.
- fingerprint or eye pattern matching can be performed instead of comparing the appearance of the person to an image.
- instructions can be presented for the person to place their finger, eye, or face on a scanner or in front of a camera, and comparison of the identity information can be performed by software.
- the agent can refuse to complete any further actions (e.g., entering a second code) if the person in the agent's presence does not appear to match the image (or other biometric information).
- Identity information such as an image
- software associated with the platform can make a call to the encryption service and request a temporary token to decrypt the image.
- the token can be valid for a limited time, and by providing the token back to the encryption service, the decrypted image (or fingerprint, eye pattern, etc.) is provided to the software (or to the verification agent computing device).
- the software then provides or otherwise makes available the decrypted image to the verification agent.
- Second stage authentication data (e.g., a second code such as a 6-digit code) is generated and transmitted in process block 512 .
- the second stage authentication data is transmitted at substantially the same time as the identity information is transmitted.
- the second stage authentication data is transmitted after a match is confirmed between biometric information and the person in the presence of the verification agent.
- the blockchain-based identity and transaction platform account of the recipient can include an associated phone number or other information identifying a mobile device such as a smart phone, feature phone, or tablet.
- the second stage authentication data is sent to the mobile device associated with the recipient, and if the person in the presence of the verification agent is in possession of the associated mobile device, then the person can provide the second code to the verification agent.
- the second stage authentication data is sent in a similar manner to the first stage authentication data (e.g., via email message, application alert, or text message).
- an indication is received that the second stage authentication data has been provided to the verification agent.
- the second stage authentication data and the code provided to the verification agent can then be compared to verify that the code provided to the verification agent is correct.
- authorization can include the food packet being given to the refugee.
- authorization can include physically handing money to the person or initiating/completing a transfer between accounts.
- the blockchain-based identity and transaction platform can hold funds as an intermediary and disburse them to a linked account when the transaction is authorized. In other examples, the platform does not actually access or have control over the funds.
- the multi-stage verification provides several layers of security and requires that a person attempting to claim a benefit must have the first stage authentication data (e.g., first code) associated with the benefit as well as the second stage authentication data (e.g., second code) sent after verification of the first code.
- the agent explicitly confirms that the person has a physical appearance or other characteristic corresponding to the actual recipient or implicitly confirms an identity match by entering the second code.
- Further security can be implemented by requiring that the person in the agent's presence be in physical possession of the intended recipient's mobile device.
- one or more of these security layers may be omitted. In one particular example, fewer layers of security are used for lower value transactions (e.g., funds transfers under $100), and additional layers of security are provided for higher value transactions. Additional layers of security beyond those discussed with respect to FIG. 5 are also possible.
- process block 510 is omitted (and an image or biometric data of the intended recipient is not transmitted), and after the first stage authentication data is verified, second stage authentication data is generated and transmitted to the recipient's account and/or mobile device.
- Method 500 can also include storing a record of the transaction (e.g., including particular transaction components, location data, technical device/network details, etc.) in the blockchain in association with the recipient and/or sender.
- a record of the transaction e.g., including particular transaction components, location data, technical device/network details, etc.
- the information stored can include the recipient, the sender, and characteristics of the transaction (e.g., funds transfer, aid assistance, etc.).
- the first and second stage authentication data can be associated with both the recipient and the transaction.
- FIG. 6 is an interaction diagram 600 illustrating a transaction verification process such as that described with respect to FIG. 5 .
- FIG. 6 is discussed with reference to a specific example in which the transaction is a funds transfer, the first stage authentication data is a first code, the identity information is an image, and the second stage authentication data is a second code.
- the transaction is a funds transfer
- the first stage authentication data is a first code
- the identity information is an image
- the second stage authentication data is a second code.
- a similar set of interactions applies to other scenarios, such as authorization of food or medical assistance.
- a sender initiates a funds transfer to a recipient who has an account with the blockchain-based identity and transaction platform.
- the recipient has a trust relationship with the sender.
- the details of the initiated transaction including the recipient, type of transaction (funds transfer), and amount to transfer are submitted by the sender to a server(s) computer implementing aspects of the blockchain-based identity and transaction platform, such as server computer(s) 106 of FIG. 1 .
- first stage authentication data (a first code) is sent to the recipient's account.
- the first code can be sent, for example, as a text message or email.
- the first code can also be sent as an account alert that appears in a web interface (or in client-side software running on a computing device or mobile device).
- the message can also provide instructions to the recipient for completing the transaction to claim the funds.
- the recipient then provides the first code to a verification agent in interaction 606 .
- the code can be shown to a person serving as an agent, who then enters the code into a verification agent computing device.
- the recipient can enter the code into an automated terminal or kiosk.
- the verification agent computing device can be remote, and the recipient either forwards the message to the verification agent or enters the code via a web interface.
- the verification agent enters and sends the code provided by the recipient back to the server(s) in interaction 608 .
- the server(s) verify that the code matches the first code sent in interaction 604 . In some examples, if there is not a match, the transaction is cancelled. In other examples, a limited number of code entry attempts are permitted before the transaction is cancelled.
- identity information e.g. an image of the intended recipient
- identity information e.g. an image of the intended recipient
- the server(s) send the recipient's unique identifier (e.g., the public key corresponding to the recipient's encrypted image or other identity information) to the blockchain to retrieve the recipient's encrypted image.
- the encrypted image is provided to the server(s).
- the server(s) interact with the encryption service to decrypt the image. In FIG. 6 , this is done through use of a decryption token.
- the server(s) send a token request to the encryption service in interaction 614 , and a decryption token is provided back to the server(s) in interaction 616 .
- the decryption token allows the server(s) to decrypt the image and provide the decrypted image to the verification agent in interaction 618 .
- the decrypted image can be sent directly from the encryption service to the verification agent.
- the decryption steps can include matching a physically presented fingerprint, iris, or face to stored biometric data (e.g., biometric data encrypted and stored on the blockchain).
- the verification agent is a person interacting with a verification agent computing device
- the decrypted image of the intended recipient can be presented on the verification agent computing device, and the agent can make a judgment as to whether the person in the agent's presence appears to be the same as the person pictured in the image.
- the verification agent is an automated terminal
- the person can present their face to allow the terminal to create an image and then compare that image to the decrypted image of the intended recipient using facial recognition or other image recognition software.
- the verification agent is remote (whether a remote person or a remote computing device)
- the person can be instructed to take a selfie and send the selfie to a verification agent/upload the selfie.
- the selfie and the decrypted image can then be compared either by the remote person or by software executing on the remote computing device.
- an identity match confirmation is provided back to the server(s) by the verification agent computing device indicating that the person appears to be the intended recipient.
- both the first code and an image of the intended recipient have been used to verify that the person attempting to claim the funds is the intended recipient. It is possible that a person who is not the intended recipient could have intercepted the first code (e.g., by accessing the initial message while using the intended recipient's phone), and it is further possible that the person intercepting the first code resembles the intended recipient sufficiently to convince a verification agent (or facial recognition software). Although such situations would likely be rare, an additional layer of security can also be used—sending a second code to the recipient.
- the server(s) send second stage authentication data (e.g., a second code), which can be time-limited, to the recipient's account (e.g., via text message, email message, or application alert).
- second stage authentication data e.g., a second code
- the recipient then provides the second code back to the verification agent in interaction 624 .
- the verification agent sends the provided second code back to the server(s) in interaction 626 , and if the code matches the second code sent to the recipient's account in interaction 622 , then the transaction is authorized.
- the second code is time-limited
- the transaction is only authorized if executed within predetermined time constraints. The funds transfer can then be completed or authorized.
- the server(s) communicate to the verification agent that release of the item/service is authorized.
- a food packet can then be handed or automatically dispensed to the recipient.
- the completed transaction is then stored in the blockchain in association with the recipient and/or the sender.
- interaction 620 in which the identity match confirmation is provided back to the server(s), is not performed affirmatively, but a match is implicitly confirmed when the verification agent enters the second code in interaction 626 .
- the verification agent has provided the first code to the server(s) in interaction 608 , and the first code has been verified by the server(s) (and after the retrieval/decryption interactions 610 , 612 , 614 , and 616 , if performed) the second code is sent to the recipient account in interaction 622 at substantially the same time as the decrypted image is sent to the verification agent in interaction 618 .
- the agent can refuse to enter the second code (or cancel the transaction) if the person in the agent's presence does not appear to match the decrypted image.
- FIG. 7 Such an example is illustrated in FIG. 7 .
- the verification agent can be implemented on the server(s) or eliminated.
- the first code provided in interaction 604 can be provided directly back to the server(s);
- the decrypted image can be retained at the server(s) and not be sent to the verification agent and instead a person can provide a selfie which is compared to the decrypted image at the server(s);
- the second code received at the recipient's mobile device can be provided directly back to the server(s) (e.g., by entering/uploading the code through an interface on the mobile device).
- FIG. 7 is an interaction diagram 700 illustrating a transaction verification process such as that described with respect to FIGS. 5 and 6 .
- the transaction is a funds transfer
- the first stage authentication data is a 9-digit code
- the identity information is an image
- the second stage authentication data is a 6-digit code.
- a similar set of interactions can apply to other scenarios, such as authorization of food or medical assistance.
- a sender initiates a funds transfer to a recipient who has an account with the blockchain-based identity and transaction platform.
- the recipient has a trust relationship with the sender.
- the details of the initiated transaction including the recipient, type of transaction (funds transfer), and amount to transfer are submitted by the sender to a server(s) computer implementing aspects of the blockchain-based identity and transaction platform, such as server computer(s) 106 of FIG. 1 .
- first stage authentication data (a 9-digit code) is sent to the recipient's account.
- the 9-digit code can be sent, for example, as a text message or email.
- the code can also be sent as an account alert that appears in a web interface (or client-side software running on a computing device or mobile device).
- the message can also provide instructions to the recipient for completing the transaction to claim the funds.
- the recipient then provides the 9-digit code to a verification agent in interaction 706 .
- the code can be shown to a person serving as an agent, who then enters the code into a verification agent computing device.
- the recipient can enter the code into an automated terminal or kiosk.
- the verification agent computing device can be remote, and the recipient either forwards the message to the verification agent or enters the code via a web interface.
- the verification agent enters and sends the 9-digit code provided by the recipient back to the server(s) in interaction 708 .
- the server(s) verify that the code matches the code sent in interaction 704 . In some examples, if the code does not match, the transaction is cancelled. In other examples, a limited number of code entry attempts are permitted before the transaction is cancelled.
- identity information e.g. an image of the intended recipient
- identity information e.g. an image of the intended recipient
- the server(s) send the recipient's unique identifier (e.g., the public key corresponding to the recipient's encrypted image or other identity information) to the blockchain to retrieve the recipient's encrypted image.
- the encrypted image is provided to the server(s).
- the server(s) interact with the encryption service to decrypt the image.
- FIG. 6 and 7 the server(s) interact with the encryption service to decrypt the image.
- decryption token this is done through use of a decryption token.
- the server(s) send a token request to the encryption service in interaction 714 , and a decryption token is provided back to the server(s) in interaction 716 .
- the decryption token allows the server(s) to decrypt the image and provide the decrypted image to the verification agent in interaction 718 .
- the server(s) send second stage authentication data (e.g., a 6-digit code), which can be time-limited, to the recipient's mobile device (or in some examples, to the user's account).
- Interaction 720 can occur substantially at the same time as the decrypted image is transmitted to the verification agent in interaction 718 .
- the recipient then provides the 6-digit code back to the verification agent in interaction 722 . If the decrypted image provided to the agent in interaction 718 does not appear to match the person in the agent's presence, the verification agent can refuse to enter the 6-digit code or otherwise cancel the transaction. This serves as an extra layer of security to ensure that the person attempting to claim a benefit is the intended recipient.
- the verification agent sends the provided 6-digit code back to the server(s) in interaction 724 , and if the code matches the 6-digit code sent to the recipient's mobile device in interaction 720 , then the transaction is authorized.
- the transaction is only authorized if executed within predetermined time constraints.
- the funds transfer can then be completed or authorized.
- the benefit is a physical item or service such as a food packet or medical aid (e.g., a vaccine, medication, supplement, procedure, etc.)
- the server(s) communicate to the verification agent that release of the item/service is authorized.
- a food packet can then be handed or automatically dispensed to the recipient.
- the completed transaction is then stored in the blockchain in association with the recipient and/or the sender.
- FIG. 8 illustrates a user interface 800 that provides a number of different options to sign in to a blockchain-based identity and transaction platform, including option 802 to sign in using a Facebook account, option 804 to sign in using a Twitter account, option 806 to sign in using a Google account, and option 808 to sign in using a phone number or email address.
- User interface 800 can be presented in a web application or client-side software executing on a client computing device.
- FIG. 9 user interface 900 displays an email sign in user interface.
- FIG. 10 illustrates a user interface 1000 in which the user has signed in.
- User interface 1000 includes a “Transfers” tab 1002 , a “Connections” tab 1004 , and a user tab 1006 (user “Ashish Gadnis” shown).
- Transfers tab 1002 can display all or recent transfers to or from the signed-in user made through the blockchain-based identity and transaction platform.
- Connections tab 1004 the active tab in user interface 1000 , shows connections with whom the user has established a trust relationship.
- FIG. 11 shows a user interface 1100 in which a user tab 1102 , which can be similar to user tab 1006 , is active.
- User interface 1100 displays profile information for the user, including the user's platform profile 1104 , which can include login/password information, birth date, text-capable mobile phone number, email address, physical address, or other information.
- the profile information can also include passport information 1106 , driver license information 1108 , U.S. social security information 1110 , and non-U.S. identity information 1112 .
- Profile information can also include additional information such as visa or other status information. Some or all of the profile information can also be part of the user's economic identity.
- FIG. 12 illustrates a user interface 1200 through which a user can invite another person to either form a trust relationship or to establish an account as a user of the platform and form a trust relationship.
- User interface 1200 is presented while a connections tab 1202 is active.
- invitation information 1204 can include the invitee's name, email address, text-capable mobile phone number, country, address, and/or other information. Once invitation information 1204 is entered, a message can be sent to the invitee, and the invitee can be prompted to establish an account and/or establish a trust relationship with the user.
- FIG. 13 illustrates a user interface 1300 showing a number of previous transactions 1302 displayed under a “My Transfers” heading.
- Previous transactions 1302 include funds transfers both to and from the user.
- the user is able to filter the types of transactions displayed (e.g., show only funds transfers, show food and medical assistance authorization, etc.).
- FIG. 14 shows a user interface 1400 in which a detailed transaction view is displayed.
- Transaction 1402 includes a message “Health,” as well as first authentication data “Secret Key Code: B33-99C-861,” and instructions to provide the code to the local agent to receive the transfer.
- Transaction 1404 includes similarly includes a message, code, and instructions.
- FIG. 15 illustrates a user interface 1500 in which a platform administrator is logged in, as indicated by the “BanQu Administrator” tab 1502 .
- the administrator can view additional information and perform additional actions.
- “Agent” tab 1504 allows the administrator to act as an agent
- “Blockchain” tab 1506 allows the administrator to access a blockchain view of a transaction, as illustrated in FIG. 20 .
- agent tab 1602 is active, and a transfer lookup interface 1604 is presented. Transfers can be looked up by a key code (e.g., a 9-digit code) and/or additional information such as recipient name, email address, or phone number.
- User interface 1600 can be, for example, the interface through which an agent enters first authentication data (such as a 9-digit code).
- a key code has been entered, and a transfer found interface 1702 is presented that includes identity information 1704 for the recipient (an image) along with the “PhotoETag” 1706 , which is a private key, enabled for one-time usage, that verifies the photo and the receiver's identity.
- transfer lookup interface 1604 is what a verification agent can use during a transaction verification process as discussed, for example, with respect to FIGS. 5, 6, and 7 .
- FIG. 18 illustrates a user interface 1800 similar to user interface 1700 of FIG. 17 , but additional information is present (indicating a later stage in verification), including second-stage authentication data 1802 , shown as a 6-digit code, that has been sent to a recipient's mobile device or account and presented to and entered by a verification agent.
- second-stage authentication data 1802 shown as a 6-digit code
- user interface 1700 of FIG. 17 and user interface 1800 of FIG. 18 are what an agent sees after the first-stage authentication data is determined to be a match ( FIG. 17 ) and after second stage authentication data has been entered by the agent ( FIG. 18 ).
- the image (identity information 1704 ) shown in transfer found user interface 1702 can be the decrypted identity information provided to the agent.
- a verification agent who has entered a 9-digit code is presented with the image of the intended recipient and can (in some examples) confirm that a person in the agent's presence appears to match the image. Confirmation can either be an explicit step, or confirmation can be implicit if the agent enters a second code (or other second stage authentication data that was generated after verification of the first stage authentication data) provided by the person in the agent's presence.
- the agent confirms that the displayed image resembles a person in the agent's presence, and then second-stage authentication data 1802 is generated and sent to the recipient's mobile device and is displayed in user interface 1800 .
- confirmation of the person's identity is either not performed or is implicit in the verification agent entering a second code.
- second-stage authentication data 1802 is shown in user interface 1800 at the time second-stage authentication data 1802 is sent to the mobile device of the recipient, and the agent can verify whether or not the person in the agent's presence has provided the correct code. In other examples, the agent is not provided the code, and the agent simply enters what the person in the agent's presence provides, and verification of the code is determined by the platform.
- the agent can either authorize the transaction if there is a match or enter the provided code, and if a match is determined, the agent is notified that the transaction is authorized and/or has been completed, as is shown in transfer complete user interface 1902 of user interface 1900 of FIG. 19 .
- user interface 2000 of FIG. 20 blockchain tab 2002 is active.
- User interface 2000 includes a dashboard view that includes a current block number 2004 in the blockchain where the completed transaction is stored.
- the dashboard view also includes a browser session information 2006 that indicates how many browsers are currently directly accessing the blockchain at the current point in time and blockchain peer information 2008 that indicates how many blockchain nodes are being accessed in order to display the platform blockchain transactions.
- Pending view 2010 illustrates the data stored in the current block, including the transaction.
- FIG. 21 shows a user interface 2100 in which a pending view 2102 includes a transaction-by-transaction breakdown of what is stored in the current block.
- Encrypted and hashed data are stored on the blockchain.
- Each transaction, and the different information describing the transaction becomes part of the immutable blocks that are stored on the permissioned blockchain (for example, an Ethereum blockchain).
- the stored information representing including the first stage authentication data (“token”), amount transferred (“amount”), as well as sender, receiver, and agent information.
- FIG. 22 illustrates a user interface 2200 of an email program in which a message 2202 is sent to the recipient indicating that first-stage authentication data has been provided and including a “Cash Out confirmation Code” (second-stage authentication data) that is to be provided to the verification agent to complete the transaction.
- the second-stage authentication data is sent to a mobile device associated with the recipient, and in other examples, such as that shown in FIG. 22 , the second-stage authentication data is sent via email, or message alert sent through a software application associated with the platform.
- FIG. 23 illustrates a user interface 2300 illustrating a transfer complete email confirmation 2302 provided to the sender after successful completion of a transfer.
- the information associated with a user can be stored in different blocks, either pre-defined by the application or created ad-hoc by the user, in the blockchain.
- a “projection” can be created by searching the blockchain for information associated with the user and retrieving that information. For example, a search based on the user's unique identifier can be performed.
- Projections can be created for all information associated with a user's account and/or for different “personas.”
- a user can establish different personas within the user's account that can each include different types and amounts of information. For example, a user can create a “health” persona that includes identity information and health information (vaccine records, medical records, etc.) but not employment information, education information, etc. that is unrelated to the user's health. Similarly, a user can create an education persona that includes identity and education information but not health, property ownership information, etc. that is unrelated to the user's education.
- the user can also establish different logins/login approaches to access the different personas.
- logins of varying levels of security are available, and more secure login approaches (e.g., multi-factor authentication, thumb/fingerprints, etc.) can be used for information the user considers to be more sensitive or confidential, and less secure login approaches (e.g., pin, password, passphrase, etc.) can be used for information the user considers less sensitive or confidential.
- less secure login approaches e.g., pin, password, passphrase, etc.
- a same login is used for some or all personas.
- Logins can be used, for example, when a user wishes to share a particular persona with another user or entity.
- Example personas are illustrated in FIG. 27 .
- a secured, blockchain-based economic identity 2702 (which can be similar to economic identity 200 of FIG. 2 , for example) is stored on one or more blocks in a blockchain.
- Different personas include or access different aspects of economic identity 2702 .
- a health persona 2704 accessible by a thumbprint login 2706 , can include a user's medical records or vaccination history and allows a user to visit a medical clinic or medical aid station that has an account in the blockchain-based identity and transaction platform, enter contact information and/or a username, and provide a thumbprint to allow the medical clinic to have access to the user's health records and other information included in health persona 2704 .
- a medical clinic can also have a pre-defined persona established which can access the user's information (with the user's permission).
- Education persona 2708 can include grade reports, transcripts, or other information and can be accessible, for example, via passphrase 2710 .
- Utility persona 2712 can include various utility records, including service addresses, payments, usage history, etc. and can be accessed by PIN code 2714 .
- a general or default persona can also be created. The persona approach allows a user to control what information the user is releasing to various institutions and other users and to maintain other data as private.
- particular access methods thumbnailprint 2706 , passphrase 2710 , and PIN code 2714
- FIG. 27 particular access methods (thumbprint 2706 , passphrase 2710 , and PIN code 2714 ) are shown in FIG. 27 as associated with particular personas, various different access methods can be selected or assigned to any persona.
- the secure storage capabilities of the blockchain have been discussed herein, but the blockchain can also be capable of executing code, which can be implemented as “smart contracts,” which are programs that are stored on the blockchain and executed on the blockchain.
- FIG. 24 depicts a generalized example of a suitable computing system 2400 in which the described innovations may be implemented.
- the computing system 2400 is not intended to suggest any limitation as to scope of use or functionality, as the innovations may be implemented in diverse general-purpose or special-purpose computing systems.
- the computing system 2400 includes one or more processing units 2410 , 2415 and memory 2420 , 2425 .
- the processing units 2410 , 2415 execute computer-executable instructions.
- a processing unit can be a general-purpose central processing unit (CPU), processor in an application-specific integrated circuit (ASIC), or any other type of processor.
- ASIC application-specific integrated circuit
- FIG. 24 shows a central processing unit 2410 as well as a graphics processing unit or co-processing unit 2415 .
- the tangible memory 2420 , 2425 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two, accessible by the processing unit(s).
- the memory 2420 , 2425 stores software 2480 implementing one or more innovations described herein, in the form of computer-executable instructions suitable for execution by the processing unit(s).
- memory 2420 can store software 2480 implementing enrollment engine 116 and transaction engine 118 of FIG. 1 .
- a computing system may have additional features.
- the computing system 2400 includes storage 2440 , one or more input devices 2450 , one or more output devices 2460 , and one or more communication connections 2470 .
- An interconnection mechanism such as a bus, controller, or network interconnects the components of the computing system 2400 .
- operating system software provides an operating environment for other software executing in the computing system 2400 , and coordinates activities of the components of the computing system 2400 .
- the tangible storage 2440 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, DVDs, or any other medium which can be used to store information and which can be accessed within the computing system 2400 .
- the storage 2440 stores instructions for the software 2480 implementing one or more innovations described herein.
- the input device(s) 2450 may be a touch input device such as a keyboard, mouse, pen, or trackball, a voice input device, a scanning device, or another device that provides input to the computing system 2400 .
- the input device(s) 2450 may be a camera, video card, TV tuner card, or similar device that accepts video input in analog or digital form, or a CD-ROM or CD-RW that reads video samples into the computing system 2400 .
- the output device(s) 2460 may be a display, printer, speaker, CD-writer, or another device that provides output from the computing system 2400 .
- the communication connection(s) 2470 enable communication over a communication medium to another computing entity.
- the communication medium conveys information such as computer-executable instructions, audio or video input or output, or other data in a modulated data signal.
- a modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media can use an electrical, optical, RF, or other carrier.
- program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- the functionality of the program modules may be combined or split between program modules as desired in various embodiments.
- Computer-executable instructions for program modules may be executed within a local or distributed computing system.
- system and “device” are used interchangeably herein. Unless the context clearly indicates otherwise, neither term implies any limitation on a type of computing system or computing device. In general, a computing system or computing device can be local or distributed, and can include any combination of special-purpose hardware and/or general-purpose hardware with software implementing the functionality described herein.
- FIG. 25 is a system diagram depicting an example mobile device 2500 including a variety of optional hardware and software components, shown generally at 2502 . Any components 2502 in the mobile device can communicate with any other component, although not all connections are shown, for ease of illustration.
- the mobile device can be any of a variety of computing devices (e.g., cell phone, smartphone, handheld computer, Personal Digital Assistant (PDA), etc.) and can allow wireless two-way communications with one or more mobile communications networks 2504 , such as a cellular, satellite, or other network.
- PDA Personal Digital Assistant
- the illustrated mobile device 2500 can include a controller or processor 2510 (e.g., signal processor, microprocessor, ASIC, or other control and processing logic circuitry) for performing such tasks as signal coding, data processing, input/output processing, power control, and/or other functions.
- An operating system 2512 can control the allocation and usage of the components 2502 and support for one or more application programs 2514 .
- the application programs can include common mobile computing applications (e.g., email applications, calendars, contact managers, web browsers, messaging applications), or any other computing application.
- Functionality 2513 for accessing an application store can also be used for acquiring and updating application programs 2514 .
- the illustrated mobile device 200 can include memory 2520 .
- Memory 2520 can include non-removable memory 2522 and/or removable memory 2524 .
- the non-removable memory 2522 can include RAM, ROM, flash memory, a hard disk, or other well-known memory storage technologies.
- the removable memory 2524 can include flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM communication systems, or other well-known memory storage technologies, such as “smart cards.”
- SIM Subscriber Identity Module
- the memory 2520 can be used for storing data and/or code for running the operating system 2512 and the applications 2514 .
- Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks.
- the memory 2520 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment.
- the memory 2520 can store instructions or code implementing enrollment engine 116 and transaction engine 118 of FIG. 1 .
- the mobile device 2500 can support one or more input devices 2530 , such as a touchscreen 2532 , microphone 2534 , camera 2536 , physical keyboard 2538 and/or trackball 2540 and one or more output devices 2550 , such as a speaker 2552 and a display 2554 .
- input devices 2530 such as a touchscreen 2532 , microphone 2534 , camera 2536 , physical keyboard 2538 and/or trackball 2540
- output devices 2550 such as a speaker 2552 and a display 2554 .
- Other possible output devices can include piezoelectric or other haptic output devices. Some devices can serve more than one input/output function.
- touchscreen 2532 and display 2554 can be combined in a single input/output device.
- the input devices 2530 can include a Natural User Interface (NUI).
- NUI is any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of NUI methods include those relying on speech recognition, touch and stylus recognition, gesture recognition both on screen and adjacent to the screen, air gestures, head and eye tracking, voice and speech, vision, touch, gestures, and machine intelligence.
- NUI Non-limiting embodiments
- the operating system 2512 or applications 2514 can comprise speech-recognition software as part of a voice user interface that allows a user to operate the device 2500 via voice commands
- the device 2500 can comprise input devices and software that allows for user interaction via a user's spatial gestures, such as detecting and interpreting gestures to provide input to a gaming application.
- a wireless modem 2560 can be coupled to an antenna (not shown) and can support two-way communications between the processor 2510 and external devices, as is well understood in the art.
- the modem 2560 is shown generically and can include a cellular modem for communicating with the mobile communication network 2504 and/or other radio-based modems (e.g., Bluetooth 2564 or Wi-Fi 2562 ).
- the wireless modem 2560 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN).
- GSM Global System for Mobile communications
- PSTN public switched telephone network
- the mobile device can further include at least one input/output port 2580 , a power supply 2582 , a satellite navigation system receiver 2584 , such as a Global Positioning System (GPS) receiver, an accelerometer 2586 , and/or a physical connector 2590 , which can be a USB port, IEEE 1394 (FireWire) port, and/or RS-232 port.
- GPS Global Positioning System
- the illustrated components 2502 are not required or all-inclusive, as any components can be deleted and other components can be added.
- FIG. 26 illustrates a generalized example of a suitable cloud-supported environment 2600 in which described embodiments, techniques, and technologies may be implemented.
- various types of services e.g., computing services
- the cloud 2610 can comprise a collection of computing devices, which may be located centrally or distributed, that provide cloud-based services to various types of users and devices connected via a network such as the Internet.
- the implementation environment 2600 can be used in different ways to accomplish computing tasks.
- some tasks can be performed on local computing devices (e.g., connected devices 2630 , 2640 , 2650 ) while other tasks (e.g., storage of data to be used in subsequent processing) can be performed in the cloud 2610 .
- local computing devices e.g., connected devices 2630 , 2640 , 2650
- other tasks e.g., storage of data to be used in subsequent processing
- the cloud 2610 provides services for connected devices 2630 , 2640 , 2650 with a variety of screen capabilities.
- Connected device 2630 represents a device with a computer screen 2635 (e.g., a mid-size screen).
- connected device 2630 could be a personal computer such as desktop computer, laptop, notebook, netbook, or the like.
- Connected device 2640 represents a device with a mobile device screen 2645 (e.g., a small size screen).
- connected device 2640 could be a mobile phone, smart phone, personal digital assistant, tablet computer, and the like.
- Connected device 2650 represents a device with a large screen 2655 .
- connected device 2650 could be a television screen (e.g., a smart television) or another device connected to a television (e.g., a set-top box or gaming console) or the like.
- One or more of the connected devices 2630 , 2640 , 2650 can include touchscreen capabilities.
- Touchscreens can accept input in different ways. For example, capacitive touchscreens detect touch input when an object (e.g., a fingertip or stylus) distorts or interrupts an electrical current running across the surface.
- touchscreens can use optical sensors to detect touch input when beams from the optical sensors are interrupted. Physical contact with the surface of the screen is not necessary for input to be detected by some touchscreens.
- Devices without screen capabilities also can be used in example environment 2600 .
- the cloud 2610 can provide services for one or more computers (e.g., server computers) without displays.
- Services can be provided by the cloud 2610 through service providers 2620 , or through other providers of online services (not depicted).
- cloud services can be customized to the screen size, display capability, and/or touchscreen capability of a particular connected device (e.g., connected devices 2630 , 2640 , 2650 ).
- the cloud 2610 provides the technologies and solutions described herein to the various connected devices 2630 , 2640 , 2650 using, at least in part, the service providers 2620 .
- the service providers 2620 can provide a centralized solution for various cloud-based services.
- the service providers 2620 can manage service subscriptions for users and/or devices (e.g., for the connected devices 2630 , 2640 , 2650 and/or their respective users).
- Some or all of the functionality of enrollment engine 2660 and transaction engine 2662 which can be similar to enrollment engine 116 and transaction engine 118 of FIG. 1 , can be implemented in the cloud 2610 .
- Computer-readable storage media are any available tangible media that can be accessed within a computing environment (e.g., one or more optical media discs such as DVD or CD, volatile memory components (such as DRAM or SRAM), or nonvolatile memory components (such as flash memory or hard drives)).
- computer-readable storage media include memory 2420 and 2425 , and storage 2440 .
- computer-readable storage media include memory and storage 2520 , 2522 , and 2524 .
- the term computer-readable storage media does not include signals and carrier waves.
- the term computer-readable storage media does not include communication connections (e.g., 2470 , 2560 , 2562 , and 2564 ).
- any of the computer-executable instructions for implementing the disclosed techniques as well as any data created and used during implementation of the disclosed embodiments can be stored on one or more computer-readable storage media.
- the computer-executable instructions can be part of, for example, a dedicated software application or a software application that is accessed or downloaded via a web browser or other software application (such as a remote computing application).
- Such software can be executed, for example, on a single local computer (e.g., any suitable commercially available computer) or in a network environment (e.g., via the Internet, a wide-area network, a local-area network, a client-server network (such as a cloud computing network), or other such network) using one or more network computers.
- any of the software-based embodiments can be uploaded, downloaded, or remotely accessed through a suitable communication means.
- suitable communication means include, for example, the Internet, the World Wide Web, an intranet, software applications, cable (including fiber optic cable), magnetic communications, electromagnetic communications (including RF, microwave, and infrared communications), electronic communications, or other such communication means.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Application No. 62/495,574, filed on Oct. 17, 2015, and titled “UNIVERSAL IDENTITY AND PERSONAL DATA STORAGE, UPDATE AND RETRIEVAL IN THE BLOCKCHAIN. THIS INCLUDES PERSONAL DEMOGRAPHIC INFORMATION, CREDIT HISTORY AND TRANSACTIONS, CONTACTS AND RELATED RELATIONSHIPS, PROPERTY AND ASSET RIGHTS, GENERAL PREFERENCES AND GEO-LOCATION. ALL STORED IN THE BLOCKCHAIN,” which is incorporated herein by reference in its entirety.
- In today's modern economy, individuals typically establish accounts with different institutions and entities and use these accounts to interact with others to obtain goods and services and establish histories. Accounts are typically maintained on server computers under the control of the institution or entity. Such accounts, however, are often vulnerable to security risks such as hacking and identity theft and are frequently out-of-date or inconsistent. Such accounts are also traditionally less accessible to individuals in developing countries or refugee areas.
- Examples described herein relate to blockchain-based identity and transaction platforms. In an example approach, identity information (e.g., a photo) for a person can be encrypted and stored in a blockchain as part of enrolling the person as a user in a blockchain-based identity and transaction platform. Trust relationships can be formed between the user and other users, and records of the trust relationships can be stored in the blockchain. Transactions between the user and other users with whom the user has formed a trust relationship can be authorized. Records of the transactions can also be stored in the blockchain. Authorization can involve, for example, a multi-stage verification process that accesses information stored on the blockchain. The transactions and identity information, along with other information, can contribute to an economic identity of the person. Storing an economic identity (and the underlying information that forms the economic identity of the person) in the blockchain results in a secure platform accessible to people regardless of their economic or geographic circumstances.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
- The foregoing and other objects, features, and advantages of the invention will become more apparent from the following detailed description, which proceeds with reference to the accompanying figures.
-
FIG. 1 is a block diagram of an example environment in which a blockchain-based identity and transaction platform can be implemented. -
FIG. 2 illustrates an example economic identity. -
FIG. 3 is a diagram illustrating an example method of authorizing transactions in a blockchain-based identity and transaction platform. -
FIG. 4 is a diagram illustrating an example method of enrolling a person as a user in a blockchain-based identity and transaction platform. -
FIG. 5 is a diagram illustrating an example method of authorizing transactions in a blockchain-based identity and transaction platform using a multi-stage verification process. -
FIG. 6 illustrates interactions in an example transaction authorization. -
FIG. 7 illustrates interactions in an example transaction authorization in which a second code is sent to a user's mobile device. -
FIGS. 8-23 illustrate example user interfaces for interacting with a blockchain-based identity and transaction platform. -
FIG. 24 is a diagram of an example computing system in which some described embodiments can be implemented. -
FIG. 25 is an example mobile device that can be used in conjunction with the technologies described herein. -
FIG. 26 is an example cloud-supported environment that can be used in conjunction with the technologies described herein. -
FIG. 27 is a diagram of example personas based on a secured, blockchain-based economic identity. - Using the systems, methods, and computer-readable media described herein, a blockchain-based identity and transaction platform can be implemented. People can enroll as users in the platform using identity information such as an image or photo (e.g., of the person's face). Once a user profile has been established, the user can form trust relationships with other users of the platform and perform transactions. Transactions can include, for example, funds transfers, medical treatment authorization, food assistance authorization, and other transactions. The identity information, trust relationships, transactions, and other information are stored in blocks in a blockchain. Unlike conventional approaches in which a user's information is stored and maintained on centralized server computers managed by many different entities and stored behind entity-specific firewalls, each of which may be vulnerable to security threats, the blockchain-based identity and transaction platform examples described herein provide secure storage of an individual's information through a distributed network of computers.
- The example blockchain-based identity and transaction platforms also allow a person to integrate various types of information to create an economic identity that can be used to access goods and services. The economic identity can include, for example, a person's history of income, employment, payments to creditors or other parties, etc. The economic identity can be used to establish the qualifications and background that allow the person to participate in a credit-based (or otherwise sophisticated) economy. As an example, individuals in developing countries or refugee areas may not have access to institutions and entities necessary to build a history (e.g., a credit score) that allows the individual to access credit that can be used to start a business, purchase necessary farming equipment, make capital improvements, etc. An economic identity established through a blockchain-based identity and transaction platform can provide evidence of a person's creditworthiness, identity, legal status, etc. that enables the person to obtain credit. Because of the distributed nature of a blockchain, such an economic identity is both portable and accessible regardless of the economic or geopolitical situation in a user's current location. In addition to providing those in the developed world with a secure, integrated platform, the examples described herein have the potential to drastically reduce poverty in developing countries and help millions of refugees establish themselves in the world economy by providing access to credit. Examples are described below with reference to
FIGS. 1-27 . -
FIG. 1 illustrates anexample environment 100 in which a blockchain-based identity and transaction platform can be implemented. As used herein, “blockchain” refers to a distributed storage platform and network in which individual “blocks” are connected in a chain. Each block is linked to the previous block in the blockchain by, for example, including a hash of the previous block as a “proof of work.” Various hash functions, including functions in the Secure Hash Algorithm (SHA)-1 or -2 families, such as SHA-256, can be used to perform a one-way hash. For a one-way hash, it is generally considered to be impossible or impractical to generate the input (the “message”) to the hash function based on the output (the “message digest” or “digest”) of the hash function. - In a blockchain, the individual blocks can store a variety of data that may or may not be related (e.g., may or may not be associated with a same user). In
environment 100,mobile computing devices network 108.Network 108 can be the Internet, a Local Area Network (LAN), a Wireless Local Area Network (WLAN), a Wide Area Network (WAN), or other type of network, wired or wireless. Computing device(s) 106 can be, for example, one or more server computers. Computing device(s) 106 includes processor(s) 110,local storage 112, andmemory 114.Environment 100 can also include one or more additional computing devices, such as desktop computers, (not shown) in communication with computing devices(s) 106 overnetwork 108. - Computing device(s) 106 also includes an
enrollment engine 116 and atransaction engine 118.Enrollment engine 116 is configured to enroll, by processor(s) 110, a person as a user in the blockchain-based economic identity and transaction platform based on identity information for the person. As an example, a person can use mobile computing device 102 (or other computing device, such as a desktop computer) to enter a name, government-assigned identification number, etc. and/or to take an image (e.g., a “selfie”) of themselves and, using a web application or using client-side software installed onmobile computing device 102, upload the image and/or other information to computing device(s) 106 as the identity information. Example software user interfaces are illustrated inFIGS. 8-23 .Enrollment engine 116 is configured to create a unique identifier for the person based on the uploaded identity information. The identity information can be encrypted, either by computing device(s) 106 or through anencryption service 120. Encryption services are discussed in more detail below. The encrypted identity information can then be stored in ablockchain 122.Blockchain 122 is implemented on a group of distributedcomputing devices 124 that are accessible vianetwork 108. Additional enrollment examples are discussed in detail below with respect, e.g., toFIG. 4 . -
Transaction engine 118 is configured to authorize, by processor(s) 110, transactions between users who are in a trust relationship. Trust relationships can be established, for example, by request or invitation of a user and an acceptance by another user. Transactions can be authorized, at least in part, through interaction with a verificationagent computing device 126. Verificationagent computing device 126 communicates with computing device(s) 106 throughnetwork 108. As an example, a first user can initiate a funds transfer to a second user through a web application or through client-side software.Transaction engine 118 can be configured to perform a verification of the funds transfer using, for example, a multi-stage verification approach that accesses information stored inblockchain 122. Transaction verification examples are discussed in detail below with respect, e.g., toFIGS. 5, 6, and 7 . - Identity information, transaction information, and other information for a user that is stored in
blockchain 122 can form an economic identity of the user.FIG. 2 illustrates an exampleeconomic identity 200.Economic identity 200 includesidentity information 202, linked accounts 204,employment history 206,utility information 208,education history 210,aid record 212,property ownership 214,medical history 216, andtransaction history 218. Althougheconomic identity 200 is shown as including each of the preceding particular categories of information, example economic identities can also include only some of these categories of information and/or include additional categories of information.Identity information 202 can include, for example, an image of a user, a name, government identifier(s), and/or fingerprint or eye pattern information of the user (or other biometric information of the user). Linked accounts 204 can include, for example, banking, investment, or credit accounts associated with the user.Employment history 206 can include employer names and/or addresses, job titles, dates of employment, salaries, and/or other employment information. -
Utility information 208 can include utility accounts for the user, records of past payments, and/or other information.Education history 210 can include degrees earned, educational levels completed, courses completed, certifications obtained, test scores, etc.Aid record 212 can include food assistance (e.g., food packets distributed by a United Nations or other aid entity) or loans received, loans repaid, etc.Property ownership 214 can include property deed information, property location information, property transaction information, etc.Medical history 216 can include medical records, medical insurance information, medical aid information (e.g., vaccinations received), etc.Transaction history 218 can include funds transfers received or provided, aid or medical assistance authorizations (even if also included inaid record 212 or medical history 216), or other transaction information. The information included inidentity information 202, linked accounts 204,employment history 206,utility information 208,education history 210,aid record 212,property ownership 214,medical history 216, andtransaction history 218 can be presented as aggregated information or as individual items. -
Economic identity 200 can also include a “trust” score similar to a credit score that indicates a level of creditworthiness or responsibility that can be used by businesses or institutions who are users in the blockchain-based identity and transaction platform. The trust score can be determined based on a weighting scheme (e.g., quantification of employment history weighted at 50%, quantification of transaction history weighted at 30%, quantification of education history weighted at 20%, etc.). In some examples, particular businesses or institutions are able to select particular criteria of interest and/or desired weightings for different criteria, and a custom trust score is determined based on those criteria. Various approaches to quantifying a particular category can be used (e.g., percentile rank of criteria, scale of 1-10, etc.). -
Economic identity 200 is stored inblockchain 220.Blocks blockchain 220 are shown inFIG. 2 , but any number of blocks can formblockchain 220. As indicated by the arrows betweenblocks -
FIG. 3 illustrates amethod 300 of authorizing transactions in a blockchain-based identity and transaction platform. Inprocess block 302, identity information for a person is encrypted, and the encrypted identity information is stored in a blockchain as part of enrolling the user in the blockchain-based economic identity and transaction platform. The identity information can include, for example, an image of the person. The identity information can alternatively or additionally include at least one of a name, government identifier(s), fingerprint, or eye pattern information. - In
process block 304, records of trust relationships between the user and other users are stored in the blockchain. For users of the blockchain-based identity and transaction platform, a trust relationship can be formed, e.g., by performing a search or lookup of registered users and sending a user identified through the search or lookup a message indicating that a trust relationship is desired. If the other user accepts the request, then a trust relationship is established. In some situations, however, a user may wish to transfer funds or perform another transaction with a person who is not a user of the blockchain-based identity and transaction platform. In such situations, a user may send an invitation to connect to the person's email address, messaging account, or other contact point, with the message including a link or instructions for creating an account with the platform and indicating that the user would like to establish a trusted relationship. - Transactions between the user and one or more of the other users with whom the user has formed a trust relationship are authorized in
process block 306. The transactions are stored in the blockchain. Records of the transactions are stored in the blockchain inprocess block 308. At least some of the transactions and identity information contribute to the economic identity of the person. The economic identity can also include at least one of employment history information, education history information, land ownership information, or medical history information for the user. Additional information that can be part of the economic identity is illustrated, e.g., inFIG. 2 . - In
process block 306, the identity information of a user can be used in the authorization. For example, when the identity information includes an image of the person, this image can be used in authorizing the transactions.Process block 306 can include a multi-stage verification approach as discussed, for example, with respect toFIGS. 5 and 6 . In some examples,method 300 further comprises providing the economic identity of the user to a requesting party, where the requesting party is a user in the blockchain-based economic identity and transaction platform. As an example, a user may wish to establish a line of credit, purchase equipment, or perform another transaction, and prior to initiating or authorizing the transaction, the requesting party can request the user's economic identity (e.g., through a client-side software application) in order to evaluate the user as a potential debtor, purchaser, employee, etc. - In some examples, businesses and institutions that establish accounts with the blockchain-based economic identity and transaction platform can access (e.g., through a web application or client-side software) a user interface to allow the business or institution to view economic identities for other users who give permission. In some examples, users can control which categories of information are included in their economic identity and/or can authorize read access of only certain categories in response to a request. For example, if a user is interested in taking out a loan from an entity, and the entity requests the user's economic identity, the user may choose not to share medical history information or other information that may not be relevant to the entity.
-
FIG. 4 illustrates amethod 400 of enrolling a person as a user in a blockchain-based identity and transaction platform. Inprocess block 402, identity information for a person is received. Identity information can include an image of the person (e.g., a selfie) and/or a name, government identifier(s), fingerprint, or eye pattern information. Inprocess block 404, the identity information is encrypted. Various encryption techniques can be used. Inprocess block 406, the encrypted identity information is stored in a block of a blockchain. In some examples, a single encryption key can be used and can be stored as, for example, an environmental variable on a computer storage device associated with the blockchain-based identity and transaction platform. - In some examples, an encryption service, such as
encryption service 120 ofFIG. 1 , can be used. The encryption service can create and manage encryption keys. In such an example, software implementing aspects of the blockchain-based identity and transaction platform can make a call to the encryption service to encrypt the identity information received inprocess block 402. The service creates the keys, retains a private key, and provides both a public key and the encrypted identity information to the software that made the call to the service. The encryption service can be a web service. - In
process block 408, a unique identifier associated with the person is established based on the encrypted identity information. In some examples, process block 408 includes designating the encrypted identity information as the unique identifier. Other unique identifiers can also be used. In some examples, various actions may be taken to validate or authenticate a user's identity prior to establishing the unique identifier. As an example, various third-party sources of information can be used to verify the user's identity. -
Method 400 can also further comprise associating, with the unique identifier, at least one of medical, employment, educational, property ownership, or economic information (e.g., linked accounts, transaction history, etc.) corresponding to the person and storing the medical, employment, educational, property ownership, or economic information in the blockchain. Some or all of the associated information can be used to form the economic identity of the person, as discussed, for example, above with respect toFIG. 2 . Transaction information representing one or more transactions between the person and one or more additional parties, as well as trust relationships between the person and additional parties, can also be stored in the blockchain in association with the unique identifier or other information indicating the user (such as the public key, even if the public key is not used as the unique identifier). -
FIG. 5 illustrates amethod 500 of verifying a transaction in a blockchain-based identity and transaction platform. Inprocess block 502, a recipient for a transaction is identified. A recipient is, for example, the person or user who will receive a funds transfer, receive medical assistance, receive food assistance, etc. In some examples, a recipient can be any person, and in some examples, the recipient is limited to a user of the blockchain-based identity and transaction platform. In some examples in which the recipient is not a user of the platform, the person can be sent a link or instructions for enrolling as a user in the platform after the transaction is initiated, and the transaction does not proceed until the person enrolls and establishes a trust relationship with the sender. In such examples, the recipient is a prospective recipient until the person enrolls and establishes the trust relationship. - First stage authentication data is generated in
process block 504. First stage authentication data can be, for example, a code including numbers and/or letters. The first stage authentication data can be provided to the recipient and can serve as an indication to the recipient that a benefit is available to be claimed. For example, the recipient can receive a text message, email message, or application alert including: a statement that a benefit is available to be claimed; a code (e.g., a 9-digit numeric, alphanumeric, or letter code); and instructions to complete the verification process in order to claim the benefit. In some examples, the first stage authentication data is only valid for a certain amount of time (one hour, one day, one week, etc.). In some examples, the first stage authentication data is valid long enough to allow for the recipient to claim the benefit according to the recipient's schedule (e.g., until after a work shift, trip, or other event is completed). - In
process block 506, an indication is received that the first stage authentication data has been provided to a verification agent. A verification agent is a user in the blockchain-based identity and transaction platform who serves in a third-party role. The verification agent can communicate with the platform through, for example, verificationagent computing device 126 ofFIG. 1 . As an example, in a refugee context, the verification agent can be a member of a United Nations or other entity that is an assistance provider, and when a refugee receives (e.g., via a text on the refugee's mobile phone) a message and code indicating that a food assistance packet is available, the refugee takes the code to the verification agent, who can be located at a kiosk, building, or other facility. The verification agent then enters the code through a software application user interface. “Verification agent” as used herein may also refer to a verification agent computing device. In some examples, the person can enter a code into an automated terminal. - In
process block 508, the first stage authentication data is verified. For example, the code provided in the initial message can be compared against the code entered by the agent (or in some examples, entered by the person). Verification of the first stage authentication data provides some confirmation that the person who provided the code to the agent is the actual recipient. - In
process block 510, identity information for the recipient is retrieved from one or more blocks in a blockchain after verifying the first stage authentication data and is transmitted (e.g., to the verification agent). The identity information can be used to further confirm that the person is the actual recipient. Continuing the refugee example above, after the verification agent has entered the code provided by the person, and the code has been verified (e.g., by a remote server computer) as a match to the code provided in the original message, an image of the recipient can be provided to the agent. The image can be the image used to create the recipient's profile (and the image that is encrypted and stored in the blockchain). If the image appears to be the same person as the person in the presence of the agent who provided the code, then the agent confirms an identity match. - In some examples, facial recognition software is used to determine whether there is a match between the person and the image. In some examples, fingerprint or eye pattern matching can be performed instead of comparing the appearance of the person to an image. In examples in which an automated terminal is used, instructions can be presented for the person to place their finger, eye, or face on a scanner or in front of a camera, and comparison of the identity information can be performed by software.
- In some examples, rather than affirmatively confirming an identity match, the agent can refuse to complete any further actions (e.g., entering a second code) if the person in the agent's presence does not appear to match the image (or other biometric information).
- Identity information, such as an image, is stored in an encrypted form in the blockchain. In examples in which an encryption service is used, software associated with the platform can make a call to the encryption service and request a temporary token to decrypt the image. The token can be valid for a limited time, and by providing the token back to the encryption service, the decrypted image (or fingerprint, eye pattern, etc.) is provided to the software (or to the verification agent computing device). The software then provides or otherwise makes available the decrypted image to the verification agent.
- Second stage authentication data (e.g., a second code such as a 6-digit code) is generated and transmitted in
process block 512. In some examples, the second stage authentication data is transmitted at substantially the same time as the identity information is transmitted. In some examples, the second stage authentication data is transmitted after a match is confirmed between biometric information and the person in the presence of the verification agent. The blockchain-based identity and transaction platform account of the recipient can include an associated phone number or other information identifying a mobile device such as a smart phone, feature phone, or tablet. In some examples, the second stage authentication data is sent to the mobile device associated with the recipient, and if the person in the presence of the verification agent is in possession of the associated mobile device, then the person can provide the second code to the verification agent. In some examples, the second stage authentication data is sent in a similar manner to the first stage authentication data (e.g., via email message, application alert, or text message). - In
process block 514, an indication is received that the second stage authentication data has been provided to the verification agent. The second stage authentication data and the code provided to the verification agent can then be compared to verify that the code provided to the verification agent is correct. After verifying the second stage authentication data, it is determined in process block 516 that the person in the presence of the verification agent is the actual recipient, and the transaction is authorized. In the refugee example, authorization can include the food packet being given to the refugee. In funds transfer examples, authorization can include physically handing money to the person or initiating/completing a transfer between accounts. In some examples, the blockchain-based identity and transaction platform can hold funds as an intermediary and disburse them to a linked account when the transaction is authorized. In other examples, the platform does not actually access or have control over the funds. - The multi-stage verification provides several layers of security and requires that a person attempting to claim a benefit must have the first stage authentication data (e.g., first code) associated with the benefit as well as the second stage authentication data (e.g., second code) sent after verification of the first code. Further, in some examples, the agent explicitly confirms that the person has a physical appearance or other characteristic corresponding to the actual recipient or implicitly confirms an identity match by entering the second code. Further security can be implemented by requiring that the person in the agent's presence be in physical possession of the intended recipient's mobile device. In some examples, one or more of these security layers may be omitted. In one particular example, fewer layers of security are used for lower value transactions (e.g., funds transfers under $100), and additional layers of security are provided for higher value transactions. Additional layers of security beyond those discussed with respect to
FIG. 5 are also possible. - In some examples, process block 510 is omitted (and an image or biometric data of the intended recipient is not transmitted), and after the first stage authentication data is verified, second stage authentication data is generated and transmitted to the recipient's account and/or mobile device.
-
Method 500 can also include storing a record of the transaction (e.g., including particular transaction components, location data, technical device/network details, etc.) in the blockchain in association with the recipient and/or sender. In some examples, only authorized and completed transactions are stored. The information stored can include the recipient, the sender, and characteristics of the transaction (e.g., funds transfer, aid assistance, etc.). The first and second stage authentication data can be associated with both the recipient and the transaction. -
FIG. 6 is an interaction diagram 600 illustrating a transaction verification process such as that described with respect toFIG. 5 .FIG. 6 is discussed with reference to a specific example in which the transaction is a funds transfer, the first stage authentication data is a first code, the identity information is an image, and the second stage authentication data is a second code. A similar set of interactions applies to other scenarios, such as authorization of food or medical assistance. - A sender initiates a funds transfer to a recipient who has an account with the blockchain-based identity and transaction platform. The recipient has a trust relationship with the sender. In
interaction 602, the details of the initiated transaction, including the recipient, type of transaction (funds transfer), and amount to transfer are submitted by the sender to a server(s) computer implementing aspects of the blockchain-based identity and transaction platform, such as server computer(s) 106 ofFIG. 1 . Ininteraction 604, first stage authentication data (a first code) is sent to the recipient's account. The first code can be sent, for example, as a text message or email. The first code can also be sent as an account alert that appears in a web interface (or in client-side software running on a computing device or mobile device). The message can also provide instructions to the recipient for completing the transaction to claim the funds. - The recipient then provides the first code to a verification agent in
interaction 606. In some examples, the code can be shown to a person serving as an agent, who then enters the code into a verification agent computing device. In other examples, the recipient can enter the code into an automated terminal or kiosk. In still other examples, the verification agent computing device can be remote, and the recipient either forwards the message to the verification agent or enters the code via a web interface. - The verification agent enters and sends the code provided by the recipient back to the server(s) in
interaction 608. The server(s) verify that the code matches the first code sent ininteraction 604. In some examples, if there is not a match, the transaction is cancelled. In other examples, a limited number of code entry attempts are permitted before the transaction is cancelled. - After determining that the first code matches, identity information (e.g. an image of the intended recipient) is used to further confirm that the person who provided the first code is the intended recipient. In
interaction 610, the server(s) send the recipient's unique identifier (e.g., the public key corresponding to the recipient's encrypted image or other identity information) to the blockchain to retrieve the recipient's encrypted image. Intransaction 612, the encrypted image is provided to the server(s). In examples in which encryption is handled by the server(s), the image is then decrypted. In examples in which an encryption service is used, such asFIG. 6 , the server(s) interact with the encryption service to decrypt the image. InFIG. 6 , this is done through use of a decryption token. The server(s) send a token request to the encryption service ininteraction 614, and a decryption token is provided back to the server(s) ininteraction 616. The decryption token allows the server(s) to decrypt the image and provide the decrypted image to the verification agent ininteraction 618. In some examples, the decrypted image can be sent directly from the encryption service to the verification agent. In certain instances when other forms of biometrics (such as fingerprints, iris patterns, or facial recognition) are used, the decryption steps can include matching a physically presented fingerprint, iris, or face to stored biometric data (e.g., biometric data encrypted and stored on the blockchain). - In examples in which the verification agent is a person interacting with a verification agent computing device, the decrypted image of the intended recipient can be presented on the verification agent computing device, and the agent can make a judgment as to whether the person in the agent's presence appears to be the same as the person pictured in the image. In examples in which the verification agent is an automated terminal, the person can present their face to allow the terminal to create an image and then compare that image to the decrypted image of the intended recipient using facial recognition or other image recognition software. In examples in which the verification agent is remote (whether a remote person or a remote computing device), the person can be instructed to take a selfie and send the selfie to a verification agent/upload the selfie. The selfie and the decrypted image can then be compared either by the remote person or by software executing on the remote computing device. In
interaction 620, an identity match confirmation is provided back to the server(s) by the verification agent computing device indicating that the person appears to be the intended recipient. - At this point, both the first code and an image of the intended recipient have been used to verify that the person attempting to claim the funds is the intended recipient. It is possible that a person who is not the intended recipient could have intercepted the first code (e.g., by accessing the initial message while using the intended recipient's phone), and it is further possible that the person intercepting the first code resembles the intended recipient sufficiently to convince a verification agent (or facial recognition software). Although such situations would likely be rare, an additional layer of security can also be used—sending a second code to the recipient.
- In
interaction 622, the server(s) send second stage authentication data (e.g., a second code), which can be time-limited, to the recipient's account (e.g., via text message, email message, or application alert). The recipient then provides the second code back to the verification agent ininteraction 624. The verification agent sends the provided second code back to the server(s) ininteraction 626, and if the code matches the second code sent to the recipient's account ininteraction 622, then the transaction is authorized. In examples in which the second code is time-limited, the transaction is only authorized if executed within predetermined time constraints. The funds transfer can then be completed or authorized. In examples in which the benefit is a physical item or service such as a food packet or medical aid (e.g., a vaccine, medication, supplement, procedure, etc.), then the server(s) communicate to the verification agent that release of the item/service is authorized. In a refugee context, for example, a food packet can then be handed or automatically dispensed to the recipient. The completed transaction is then stored in the blockchain in association with the recipient and/or the sender. - In some examples,
interaction 620, in which the identity match confirmation is provided back to the server(s), is not performed affirmatively, but a match is implicitly confirmed when the verification agent enters the second code ininteraction 626. In such examples, after the verification agent has provided the first code to the server(s) ininteraction 608, and the first code has been verified by the server(s) (and after the retrieval/decryption interactions interaction 622 at substantially the same time as the decrypted image is sent to the verification agent ininteraction 618. When the person in the verification agent's presence provides the second code to the agent ininteraction 624, the agent can refuse to enter the second code (or cancel the transaction) if the person in the agent's presence does not appear to match the decrypted image. Such an example is illustrated inFIG. 7 . - In various examples, the verification agent can be implemented on the server(s) or eliminated. For example: the first code provided in
interaction 604 can be provided directly back to the server(s); the decrypted image can be retained at the server(s) and not be sent to the verification agent and instead a person can provide a selfie which is compared to the decrypted image at the server(s); and the second code received at the recipient's mobile device can be provided directly back to the server(s) (e.g., by entering/uploading the code through an interface on the mobile device). -
FIG. 7 is an interaction diagram 700 illustrating a transaction verification process such as that described with respect toFIGS. 5 and 6 . InFIG. 7 , the transaction is a funds transfer, the first stage authentication data is a 9-digit code, the identity information is an image, and the second stage authentication data is a 6-digit code. As withFIG. 6 , a similar set of interactions can apply to other scenarios, such as authorization of food or medical assistance. - A sender initiates a funds transfer to a recipient who has an account with the blockchain-based identity and transaction platform. The recipient has a trust relationship with the sender. In
interaction 702, the details of the initiated transaction, including the recipient, type of transaction (funds transfer), and amount to transfer are submitted by the sender to a server(s) computer implementing aspects of the blockchain-based identity and transaction platform, such as server computer(s) 106 ofFIG. 1 . Ininteraction 704, first stage authentication data (a 9-digit code) is sent to the recipient's account. The 9-digit code can be sent, for example, as a text message or email. The code can also be sent as an account alert that appears in a web interface (or client-side software running on a computing device or mobile device). The message can also provide instructions to the recipient for completing the transaction to claim the funds. - The recipient then provides the 9-digit code to a verification agent in
interaction 706. In some examples, the code can be shown to a person serving as an agent, who then enters the code into a verification agent computing device. In other examples, the recipient can enter the code into an automated terminal or kiosk. In still other examples, the verification agent computing device can be remote, and the recipient either forwards the message to the verification agent or enters the code via a web interface. - The verification agent enters and sends the 9-digit code provided by the recipient back to the server(s) in
interaction 708. The server(s) verify that the code matches the code sent ininteraction 704. In some examples, if the code does not match, the transaction is cancelled. In other examples, a limited number of code entry attempts are permitted before the transaction is cancelled. - After determining that the 9-digit code matches, identity information (e.g. an image of the intended recipient) is used to further confirm that the person who provided the 9-digit code is the intended recipient. In
interaction 710, the server(s) send the recipient's unique identifier (e.g., the public key corresponding to the recipient's encrypted image or other identity information) to the blockchain to retrieve the recipient's encrypted image. Intransaction 712, the encrypted image is provided to the server(s). In examples in which encryption is handled by the server(s), the image is then decrypted. In examples in which an encryption service is used, such asFIGS. 6 and 7 , the server(s) interact with the encryption service to decrypt the image. InFIG. 7 , this is done through use of a decryption token. The server(s) send a token request to the encryption service ininteraction 714, and a decryption token is provided back to the server(s) ininteraction 716. The decryption token allows the server(s) to decrypt the image and provide the decrypted image to the verification agent ininteraction 718. - In
interaction 720, the server(s) send second stage authentication data (e.g., a 6-digit code), which can be time-limited, to the recipient's mobile device (or in some examples, to the user's account).Interaction 720 can occur substantially at the same time as the decrypted image is transmitted to the verification agent ininteraction 718. The recipient then provides the 6-digit code back to the verification agent ininteraction 722. If the decrypted image provided to the agent ininteraction 718 does not appear to match the person in the agent's presence, the verification agent can refuse to enter the 6-digit code or otherwise cancel the transaction. This serves as an extra layer of security to ensure that the person attempting to claim a benefit is the intended recipient. If the decrypted image does match the person in the agent's presence, then the verification agent sends the provided 6-digit code back to the server(s) ininteraction 724, and if the code matches the 6-digit code sent to the recipient's mobile device ininteraction 720, then the transaction is authorized. - In examples in which the 6-digit code is time-limited, the transaction is only authorized if executed within predetermined time constraints. The funds transfer can then be completed or authorized. In examples in which the benefit is a physical item or service such as a food packet or medical aid (e.g., a vaccine, medication, supplement, procedure, etc.), then the server(s) communicate to the verification agent that release of the item/service is authorized. In a refugee context, for example, a food packet can then be handed or automatically dispensed to the recipient. The completed transaction is then stored in the blockchain in association with the recipient and/or the sender.
-
FIG. 8 illustrates auser interface 800 that provides a number of different options to sign in to a blockchain-based identity and transaction platform, includingoption 802 to sign in using a Facebook account,option 804 to sign in using a Twitter account,option 806 to sign in using a Google account, andoption 808 to sign in using a phone number or email address.User interface 800, as well as the user interfaces discussed with reference toFIGS. 9-23 , can be presented in a web application or client-side software executing on a client computing device. - In
FIG. 9 ,user interface 900 displays an email sign in user interface.FIG. 10 illustrates auser interface 1000 in which the user has signed in.User interface 1000 includes a “Transfers”tab 1002, a “Connections”tab 1004, and a user tab 1006 (user “Ashish Gadnis” shown).Transfers tab 1002 can display all or recent transfers to or from the signed-in user made through the blockchain-based identity and transaction platform.Connections tab 1004, the active tab inuser interface 1000, shows connections with whom the user has established a trust relationship. -
FIG. 11 shows auser interface 1100 in which auser tab 1102, which can be similar touser tab 1006, is active.User interface 1100 displays profile information for the user, including the user'splatform profile 1104, which can include login/password information, birth date, text-capable mobile phone number, email address, physical address, or other information. The profile information can also includepassport information 1106,driver license information 1108, U.S.social security information 1110, andnon-U.S. identity information 1112. Profile information can also include additional information such as visa or other status information. Some or all of the profile information can also be part of the user's economic identity. -
FIG. 12 illustrates auser interface 1200 through which a user can invite another person to either form a trust relationship or to establish an account as a user of the platform and form a trust relationship.User interface 1200 is presented while aconnections tab 1202 is active.Invitation information 1204 can include the invitee's name, email address, text-capable mobile phone number, country, address, and/or other information. Onceinvitation information 1204 is entered, a message can be sent to the invitee, and the invitee can be prompted to establish an account and/or establish a trust relationship with the user. -
FIG. 13 illustrates auser interface 1300 showing a number ofprevious transactions 1302 displayed under a “My Transfers” heading.Previous transactions 1302 include funds transfers both to and from the user. In some examples, the user is able to filter the types of transactions displayed (e.g., show only funds transfers, show food and medical assistance authorization, etc.).FIG. 14 shows auser interface 1400 in which a detailed transaction view is displayed.Transaction 1402 includes a message “Health,” as well as first authentication data “Secret Key Code: B33-99C-861,” and instructions to provide the code to the local agent to receive the transfer.Transaction 1404 includes similarly includes a message, code, and instructions. -
FIG. 15 illustrates auser interface 1500 in which a platform administrator is logged in, as indicated by the “BanQu Administrator”tab 1502. The administrator can view additional information and perform additional actions. For example, “Agent”tab 1504 allows the administrator to act as an agent, and “Blockchain”tab 1506 allows the administrator to access a blockchain view of a transaction, as illustrated inFIG. 20 . - In
user interface 1600 ofFIG. 16 ,agent tab 1602 is active, and atransfer lookup interface 1604 is presented. Transfers can be looked up by a key code (e.g., a 9-digit code) and/or additional information such as recipient name, email address, or phone number.User interface 1600 can be, for example, the interface through which an agent enters first authentication data (such as a 9-digit code). Inuser interface 1700 ofFIG. 17 , a key code has been entered, and a transfer foundinterface 1702 is presented that includesidentity information 1704 for the recipient (an image) along with the “PhotoETag” 1706, which is a private key, enabled for one-time usage, that verifies the photo and the receiver's identity. In some examples,transfer lookup interface 1604 is what a verification agent can use during a transaction verification process as discussed, for example, with respect toFIGS. 5, 6, and 7 . -
FIG. 18 illustrates auser interface 1800 similar touser interface 1700 ofFIG. 17 , but additional information is present (indicating a later stage in verification), including second-stage authentication data 1802, shown as a 6-digit code, that has been sent to a recipient's mobile device or account and presented to and entered by a verification agent. In some examples,user interface 1700 ofFIG. 17 anduser interface 1800 ofFIG. 18 are what an agent sees after the first-stage authentication data is determined to be a match (FIG. 17 ) and after second stage authentication data has been entered by the agent (FIG. 18 ). The image (identity information 1704) shown in transfer founduser interface 1702 can be the decrypted identity information provided to the agent. For example, a verification agent who has entered a 9-digit code is presented with the image of the intended recipient and can (in some examples) confirm that a person in the agent's presence appears to match the image. Confirmation can either be an explicit step, or confirmation can be implicit if the agent enters a second code (or other second stage authentication data that was generated after verification of the first stage authentication data) provided by the person in the agent's presence. - In some examples, after transfer found
user interface 1702 is displayed, the agent confirms that the displayed image resembles a person in the agent's presence, and then second-stage authentication data 1802 is generated and sent to the recipient's mobile device and is displayed inuser interface 1800. In some examples, confirmation of the person's identity is either not performed or is implicit in the verification agent entering a second code. In some examples, second-stage authentication data 1802 is shown inuser interface 1800 at the time second-stage authentication data 1802 is sent to the mobile device of the recipient, and the agent can verify whether or not the person in the agent's presence has provided the correct code. In other examples, the agent is not provided the code, and the agent simply enters what the person in the agent's presence provides, and verification of the code is determined by the platform. - Once the recipient receives the second-
stage authentication data 1802 and provides this code to the agent, the agent can either authorize the transaction if there is a match or enter the provided code, and if a match is determined, the agent is notified that the transaction is authorized and/or has been completed, as is shown in transfercomplete user interface 1902 ofuser interface 1900 ofFIG. 19 . - In
user interface 2000 ofFIG. 20 ,blockchain tab 2002 is active.User interface 2000 includes a dashboard view that includes acurrent block number 2004 in the blockchain where the completed transaction is stored. The dashboard view also includes abrowser session information 2006 that indicates how many browsers are currently directly accessing the blockchain at the current point in time andblockchain peer information 2008 that indicates how many blockchain nodes are being accessed in order to display the platform blockchain transactions.Pending view 2010 illustrates the data stored in the current block, including the transaction. -
FIG. 21 shows auser interface 2100 in which a pendingview 2102 includes a transaction-by-transaction breakdown of what is stored in the current block. Encrypted and hashed data are stored on the blockchain. Each transaction, and the different information describing the transaction, becomes part of the immutable blocks that are stored on the permissioned blockchain (for example, an Ethereum blockchain). The stored information representing , including the first stage authentication data (“token”), amount transferred (“amount”), as well as sender, receiver, and agent information. -
FIG. 22 illustrates auser interface 2200 of an email program in which amessage 2202 is sent to the recipient indicating that first-stage authentication data has been provided and including a “Cash Out confirmation Code” (second-stage authentication data) that is to be provided to the verification agent to complete the transaction. In some examples, the second-stage authentication data is sent to a mobile device associated with the recipient, and in other examples, such as that shown inFIG. 22 , the second-stage authentication data is sent via email, or message alert sent through a software application associated with the platform. -
FIG. 23 illustrates auser interface 2300 illustrating a transfercomplete email confirmation 2302 provided to the sender after successful completion of a transfer. - The information associated with a user can be stored in different blocks, either pre-defined by the application or created ad-hoc by the user, in the blockchain. To retrieve this information, for example when a user logs in to a web application and the user's profile is presented, a “projection” can be created by searching the blockchain for information associated with the user and retrieving that information. For example, a search based on the user's unique identifier can be performed.
- Projections can be created for all information associated with a user's account and/or for different “personas.” A user can establish different personas within the user's account that can each include different types and amounts of information. For example, a user can create a “health” persona that includes identity information and health information (vaccine records, medical records, etc.) but not employment information, education information, etc. that is unrelated to the user's health. Similarly, a user can create an education persona that includes identity and education information but not health, property ownership information, etc. that is unrelated to the user's education.
- The user can also establish different logins/login approaches to access the different personas. In some examples, logins of varying levels of security are available, and more secure login approaches (e.g., multi-factor authentication, thumb/fingerprints, etc.) can be used for information the user considers to be more sensitive or confidential, and less secure login approaches (e.g., pin, password, passphrase, etc.) can be used for information the user considers less sensitive or confidential. In some examples, a same login is used for some or all personas. Logins can be used, for example, when a user wishes to share a particular persona with another user or entity.
- Example personas are illustrated in
FIG. 27 . A secured, blockchain-based economic identity 2702 (which can be similar toeconomic identity 200 ofFIG. 2 , for example) is stored on one or more blocks in a blockchain. Different personas include or access different aspects ofeconomic identity 2702. For example, a health persona 2704, accessible by athumbprint login 2706, can include a user's medical records or vaccination history and allows a user to visit a medical clinic or medical aid station that has an account in the blockchain-based identity and transaction platform, enter contact information and/or a username, and provide a thumbprint to allow the medical clinic to have access to the user's health records and other information included in health persona 2704. A medical clinic can also have a pre-defined persona established which can access the user's information (with the user's permission). - Education persona 2708 can include grade reports, transcripts, or other information and can be accessible, for example, via
passphrase 2710. Utility persona 2712 can include various utility records, including service addresses, payments, usage history, etc. and can be accessed byPIN code 2714. A general or default persona can also be created. The persona approach allows a user to control what information the user is releasing to various institutions and other users and to maintain other data as private. Although particular access methods (thumbprint 2706, passphrase 2710, and PIN code 2714) are shown inFIG. 27 as associated with particular personas, various different access methods can be selected or assigned to any persona. - The secure storage capabilities of the blockchain have been discussed herein, but the blockchain can also be capable of executing code, which can be implemented as “smart contracts,” which are programs that are stored on the blockchain and executed on the blockchain.
-
FIG. 24 depicts a generalized example of asuitable computing system 2400 in which the described innovations may be implemented. Thecomputing system 2400 is not intended to suggest any limitation as to scope of use or functionality, as the innovations may be implemented in diverse general-purpose or special-purpose computing systems. - With reference to
FIG. 24 , thecomputing system 2400 includes one ormore processing units memory FIG. 24 , thisbasic configuration 2430 is included within a dashed line. Theprocessing units FIG. 24 shows acentral processing unit 2410 as well as a graphics processing unit orco-processing unit 2415. Thetangible memory memory stores software 2480 implementing one or more innovations described herein, in the form of computer-executable instructions suitable for execution by the processing unit(s). For example,memory 2420 can storesoftware 2480 implementingenrollment engine 116 andtransaction engine 118 ofFIG. 1 . - A computing system may have additional features. For example, the
computing system 2400 includesstorage 2440, one ormore input devices 2450, one ormore output devices 2460, and one ormore communication connections 2470. An interconnection mechanism (not shown) such as a bus, controller, or network interconnects the components of thecomputing system 2400. Typically, operating system software (not shown) provides an operating environment for other software executing in thecomputing system 2400, and coordinates activities of the components of thecomputing system 2400. - The
tangible storage 2440 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, DVDs, or any other medium which can be used to store information and which can be accessed within thecomputing system 2400. Thestorage 2440 stores instructions for thesoftware 2480 implementing one or more innovations described herein. - The input device(s) 2450 may be a touch input device such as a keyboard, mouse, pen, or trackball, a voice input device, a scanning device, or another device that provides input to the
computing system 2400. For video encoding, the input device(s) 2450 may be a camera, video card, TV tuner card, or similar device that accepts video input in analog or digital form, or a CD-ROM or CD-RW that reads video samples into thecomputing system 2400. The output device(s) 2460 may be a display, printer, speaker, CD-writer, or another device that provides output from thecomputing system 2400. - The communication connection(s) 2470 enable communication over a communication medium to another computing entity. The communication medium conveys information such as computer-executable instructions, audio or video input or output, or other data in a modulated data signal. A modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media can use an electrical, optical, RF, or other carrier.
- The innovations can be described in the general context of computer-executable instructions, such as those included in program modules, being executed in a computing system on a target real or virtual processor. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Computer-executable instructions for program modules may be executed within a local or distributed computing system.
- The terms “system” and “device” are used interchangeably herein. Unless the context clearly indicates otherwise, neither term implies any limitation on a type of computing system or computing device. In general, a computing system or computing device can be local or distributed, and can include any combination of special-purpose hardware and/or general-purpose hardware with software implementing the functionality described herein.
- For the sake of presentation, the detailed description uses terms like “determine” and “use” to describe computer operations in a computing system. These terms are high-level abstractions for operations performed by a computer, and should not be confused with acts performed by a human being. The actual computer operations corresponding to these terms vary depending on implementation.
-
FIG. 25 is a system diagram depicting an examplemobile device 2500 including a variety of optional hardware and software components, shown generally at 2502. Anycomponents 2502 in the mobile device can communicate with any other component, although not all connections are shown, for ease of illustration. The mobile device can be any of a variety of computing devices (e.g., cell phone, smartphone, handheld computer, Personal Digital Assistant (PDA), etc.) and can allow wireless two-way communications with one or moremobile communications networks 2504, such as a cellular, satellite, or other network. - The illustrated
mobile device 2500 can include a controller or processor 2510 (e.g., signal processor, microprocessor, ASIC, or other control and processing logic circuitry) for performing such tasks as signal coding, data processing, input/output processing, power control, and/or other functions. Anoperating system 2512 can control the allocation and usage of thecomponents 2502 and support for one ormore application programs 2514. The application programs can include common mobile computing applications (e.g., email applications, calendars, contact managers, web browsers, messaging applications), or any other computing application.Functionality 2513 for accessing an application store can also be used for acquiring and updatingapplication programs 2514. - The illustrated
mobile device 200 can includememory 2520.Memory 2520 can includenon-removable memory 2522 and/orremovable memory 2524. Thenon-removable memory 2522 can include RAM, ROM, flash memory, a hard disk, or other well-known memory storage technologies. Theremovable memory 2524 can include flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM communication systems, or other well-known memory storage technologies, such as “smart cards.” Thememory 2520 can be used for storing data and/or code for running theoperating system 2512 and theapplications 2514. Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks. Thememory 2520 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment. Thememory 2520 can store instructions or code implementingenrollment engine 116 andtransaction engine 118 ofFIG. 1 . - The
mobile device 2500 can support one ormore input devices 2530, such as atouchscreen 2532,microphone 2534, camera 2536,physical keyboard 2538 and/ortrackball 2540 and one ormore output devices 2550, such as aspeaker 2552 and adisplay 2554. Other possible output devices (not shown) can include piezoelectric or other haptic output devices. Some devices can serve more than one input/output function. For example,touchscreen 2532 anddisplay 2554 can be combined in a single input/output device. - The
input devices 2530 can include a Natural User Interface (NUI). An NUI is any interface technology that enables a user to interact with a device in a “natural” manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of NUI methods include those relying on speech recognition, touch and stylus recognition, gesture recognition both on screen and adjacent to the screen, air gestures, head and eye tracking, voice and speech, vision, touch, gestures, and machine intelligence. Other examples of a NUI include motion gesture detection using accelerometers/gyroscopes, facial recognition, 3D displays, head, eye , and gaze tracking, immersive augmented reality and virtual reality systems, all of which provide a more natural interface, as well as technologies for sensing brain activity using electric field sensing electrodes (EEG and related methods). Thus, in one specific example, theoperating system 2512 orapplications 2514 can comprise speech-recognition software as part of a voice user interface that allows a user to operate thedevice 2500 via voice commands Further, thedevice 2500 can comprise input devices and software that allows for user interaction via a user's spatial gestures, such as detecting and interpreting gestures to provide input to a gaming application. - A
wireless modem 2560 can be coupled to an antenna (not shown) and can support two-way communications between theprocessor 2510 and external devices, as is well understood in the art. Themodem 2560 is shown generically and can include a cellular modem for communicating with themobile communication network 2504 and/or other radio-based modems (e.g.,Bluetooth 2564 or Wi-Fi 2562). Thewireless modem 2560 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN). - The mobile device can further include at least one input/
output port 2580, apower supply 2582, a satellitenavigation system receiver 2584, such as a Global Positioning System (GPS) receiver, anaccelerometer 2586, and/or aphysical connector 2590, which can be a USB port, IEEE 1394 (FireWire) port, and/or RS-232 port. The illustratedcomponents 2502 are not required or all-inclusive, as any components can be deleted and other components can be added. -
FIG. 26 illustrates a generalized example of a suitable cloud-supportedenvironment 2600 in which described embodiments, techniques, and technologies may be implemented. In theexample environment 2600, various types of services (e.g., computing services) are provided by acloud 2610. For example, thecloud 2610 can comprise a collection of computing devices, which may be located centrally or distributed, that provide cloud-based services to various types of users and devices connected via a network such as the Internet. Theimplementation environment 2600 can be used in different ways to accomplish computing tasks. For example, some tasks (e.g., processing user input and presenting a user interface) can be performed on local computing devices (e.g., connecteddevices cloud 2610. - In
example environment 2600, thecloud 2610 provides services forconnected devices Connected device 2630 represents a device with a computer screen 2635 (e.g., a mid-size screen). For example, connecteddevice 2630 could be a personal computer such as desktop computer, laptop, notebook, netbook, or the like.Connected device 2640 represents a device with a mobile device screen 2645 (e.g., a small size screen). For example, connecteddevice 2640 could be a mobile phone, smart phone, personal digital assistant, tablet computer, and the like.Connected device 2650 represents a device with alarge screen 2655. For example, connecteddevice 2650 could be a television screen (e.g., a smart television) or another device connected to a television (e.g., a set-top box or gaming console) or the like. One or more of theconnected devices example environment 2600. For example, thecloud 2610 can provide services for one or more computers (e.g., server computers) without displays. - Services can be provided by the
cloud 2610 throughservice providers 2620, or through other providers of online services (not depicted). For example, cloud services can be customized to the screen size, display capability, and/or touchscreen capability of a particular connected device (e.g., connecteddevices - In
example environment 2600, thecloud 2610 provides the technologies and solutions described herein to the variousconnected devices service providers 2620. For example, theservice providers 2620 can provide a centralized solution for various cloud-based services. Theservice providers 2620 can manage service subscriptions for users and/or devices (e.g., for theconnected devices enrollment engine 2660 andtransaction engine 2662, which can be similar toenrollment engine 116 andtransaction engine 118 ofFIG. 1 , can be implemented in thecloud 2610. - Although the operations of some of the disclosed methods are described in a particular, sequential order for convenient presentation, it should be understood that this manner of description encompasses rearrangement, unless a particular ordering is required by specific language set forth below. For example, operations described sequentially may in some cases be rearranged or performed concurrently. Moreover, for the sake of simplicity, the attached figures may not show the various ways in which the disclosed methods can be used in conjunction with other methods.
- Any of the disclosed methods can be implemented as computer-executable instructions or a computer program product stored on one or more computer-readable storage media and executed on a computing device (e.g., any available computing device, including smart phones or other mobile devices that include computing hardware). Computer-readable storage media are any available tangible media that can be accessed within a computing environment (e.g., one or more optical media discs such as DVD or CD, volatile memory components (such as DRAM or SRAM), or nonvolatile memory components (such as flash memory or hard drives)). By way of example and with reference to
FIG. 24 , computer-readable storage media includememory storage 2440. By way of example and with reference toFIG. 25 , computer-readable storage media include memory andstorage - Any of the computer-executable instructions for implementing the disclosed techniques as well as any data created and used during implementation of the disclosed embodiments can be stored on one or more computer-readable storage media. The computer-executable instructions can be part of, for example, a dedicated software application or a software application that is accessed or downloaded via a web browser or other software application (such as a remote computing application). Such software can be executed, for example, on a single local computer (e.g., any suitable commercially available computer) or in a network environment (e.g., via the Internet, a wide-area network, a local-area network, a client-server network (such as a cloud computing network), or other such network) using one or more network computers.
- For clarity, only certain selected aspects of the software-based implementations are described. Other details that are well known in the art are omitted. For example, it should be understood that the disclosed technology is not limited to any specific computer language or program. For instance, the disclosed technology can be implemented by software written in C++, Java, Perl, JavaScript, Adobe Flash, or any other suitable programming language. Likewise, the disclosed technology is not limited to any particular computer or type of hardware. Certain details of suitable computers and hardware are well known and need not be set forth in detail in this disclosure.
- Furthermore, any of the software-based embodiments (comprising, for example, computer-executable instructions for causing a computer to perform any of the disclosed methods) can be uploaded, downloaded, or remotely accessed through a suitable communication means. Such suitable communication means include, for example, the Internet, the World Wide Web, an intranet, software applications, cable (including fiber optic cable), magnetic communications, electromagnetic communications (including RF, microwave, and infrared communications), electronic communications, or other such communication means.
- The disclosed methods, apparatus, and systems should not be construed as limiting in any way. Instead, the present disclosure is directed toward all novel and nonobvious features and aspects of the various disclosed embodiments, alone and in various combinations and sub combinations with one another. The disclosed methods, apparatus, and systems are not limited to any specific aspect or feature or combination thereof, nor do the disclosed embodiments require that any one or more specific advantages be present or problems be solved.
- The technologies from any example can be combined with the technologies described in any one or more of the other examples. In view of the many possible embodiments to which the principles of the disclosed technology may be applied, it should be recognized that the illustrated embodiments are examples of the disclosed technology and should not be taken as a limitation on the scope of the disclosed technology.
Claims (22)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/767,969 US20180285879A1 (en) | 2015-10-17 | 2016-09-30 | Blockchain-based identity and transaction platform |
US18/815,573 US12244719B1 (en) | 2015-10-17 | 2024-08-26 | Computer-implemented authentication platform |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562495574P | 2015-10-17 | 2015-10-17 | |
PCT/US2016/054920 WO2017066002A1 (en) | 2015-10-17 | 2016-09-30 | Blockchain-based identity and transaction platform |
US15/767,969 US20180285879A1 (en) | 2015-10-17 | 2016-09-30 | Blockchain-based identity and transaction platform |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/054920 A-371-Of-International WO2017066002A1 (en) | 2015-10-17 | 2016-09-30 | Blockchain-based identity and transaction platform |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/698,908 Continuation US20230129693A1 (en) | 2015-10-17 | 2022-03-18 | Transaction authentication and verification using text messages and a distributed ledger |
US18/815,573 Continuation US12244719B1 (en) | 2015-10-17 | 2024-08-26 | Computer-implemented authentication platform |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180285879A1 true US20180285879A1 (en) | 2018-10-04 |
Family
ID=58517745
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/767,969 Abandoned US20180285879A1 (en) | 2015-10-17 | 2016-09-30 | Blockchain-based identity and transaction platform |
US17/698,908 Abandoned US20230129693A1 (en) | 2015-10-17 | 2022-03-18 | Transaction authentication and verification using text messages and a distributed ledger |
US18/815,573 Active US12244719B1 (en) | 2015-10-17 | 2024-08-26 | Computer-implemented authentication platform |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/698,908 Abandoned US20230129693A1 (en) | 2015-10-17 | 2022-03-18 | Transaction authentication and verification using text messages and a distributed ledger |
US18/815,573 Active US12244719B1 (en) | 2015-10-17 | 2024-08-26 | Computer-implemented authentication platform |
Country Status (12)
Country | Link |
---|---|
US (3) | US20180285879A1 (en) |
EP (3) | EP3362970B1 (en) |
BR (1) | BR112018007449B1 (en) |
CO (1) | CO2018004808A2 (en) |
ES (1) | ES2990144T3 (en) |
HR (1) | HRP20241496T1 (en) |
HU (1) | HUE068146T2 (en) |
MX (1) | MX2018004693A (en) |
PH (1) | PH12018550046A1 (en) |
PL (1) | PL3362970T3 (en) |
WO (1) | WO2017066002A1 (en) |
ZA (1) | ZA201802203B (en) |
Cited By (131)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180115426A1 (en) * | 2016-10-26 | 2018-04-26 | Fintech Fund Family Limited Partnership | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US20180129952A1 (en) * | 2016-11-09 | 2018-05-10 | Cognitive Scale, Inc. | Cognitive Information Processing Using a Cognitive Blockchain Architecture |
US20180204213A1 (en) * | 2017-01-17 | 2018-07-19 | HashLynx Inc. | System for facilitating secure electronic communications between entities and processing resource transfers |
CN108766511A (en) * | 2018-05-30 | 2018-11-06 | 北京阿尔山金融科技有限公司 | Medical examination data sharing method, system and electronic equipment |
US20190036702A1 (en) * | 2016-03-31 | 2019-01-31 | bitFlyer, Inc | Private node, processing method for private node, and program for same |
CN109636558A (en) * | 2018-12-12 | 2019-04-16 | 重庆金窝窝网络科技有限公司 | Based on employee's data processing method of block chain, apparatus and system |
US10291627B2 (en) * | 2016-10-17 | 2019-05-14 | Arm Ltd. | Blockchain mining using trusted nodes |
US20190149418A1 (en) * | 2017-11-16 | 2019-05-16 | International Business Machines Corporation | Clustered application management with a blockchain |
US20190199700A1 (en) * | 2017-11-20 | 2019-06-27 | Marc Lauren Abramowitz | System and method for block chain encrypted communication and identification |
US20190205889A1 (en) * | 2017-12-29 | 2019-07-04 | Walmart Apollo, Llc | System and method for biometric credit based on blockchain |
US10373159B2 (en) * | 2016-12-07 | 2019-08-06 | International Business Machines Corporation | Concomitance of an asset and identity block of a blockchain |
US20190288854A1 (en) * | 2016-09-18 | 2019-09-19 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
US20190295164A1 (en) * | 2016-02-18 | 2019-09-26 | Nomura Research Institute, Ltd. | Information processing apparatus, information processing method, and recording medium |
US10484178B2 (en) * | 2016-10-26 | 2019-11-19 | Black Gold Coin, Inc. | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US10505720B2 (en) | 2017-02-17 | 2019-12-10 | Alibaba Group Holding Limited | Blockchain system and data storage method and apparatus |
US20190379754A1 (en) * | 2018-06-06 | 2019-12-12 | International Business Machines Corporation | Proxy agents and proxy ledgers on a blockchain |
CN110599342A (en) * | 2019-09-23 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based identity information authorization method and device |
CN110597840A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Partner relationship establishing method, device, equipment and storage medium based on block chain |
US10530859B1 (en) * | 2016-11-28 | 2020-01-07 | EMC IP Holding Company LLC | Blockchain functionalities in data storage system |
US20200065822A1 (en) * | 2017-08-30 | 2020-02-27 | Alibaba Group Holding Limited | Resource transfer method, fund payment method, and electronic device |
CN110866855A (en) * | 2019-11-13 | 2020-03-06 | 复旦大学 | License issuing and safety management system based on block chain |
US10621233B2 (en) | 2016-11-09 | 2020-04-14 | Cognitive Scale, Inc. | Cognitive session graphs including blockchains |
US10621510B2 (en) | 2016-11-09 | 2020-04-14 | Cognitive Scale, Inc. | Hybrid blockchain data architecture for use within a cognitive environment |
US10621511B2 (en) | 2016-11-09 | 2020-04-14 | Cognitive Scale, Inc. | Method for using hybrid blockchain data architecture within a cognitive environment |
US10628491B2 (en) | 2016-11-09 | 2020-04-21 | Cognitive Scale, Inc. | Cognitive session graphs including blockchains |
US20200184470A1 (en) * | 2018-12-08 | 2020-06-11 | International Business Machines Corporation | Identity ecosystem |
US10685099B2 (en) * | 2019-07-02 | 2020-06-16 | Alibaba Group Holding Limited | System and method for mapping decentralized identifiers to real-world entities |
US10700851B2 (en) | 2019-07-02 | 2020-06-30 | Alibaba Group Holding Limited | System and method for implementing a resolver service for decentralized identifiers |
US10719771B2 (en) * | 2016-11-09 | 2020-07-21 | Cognitive Scale, Inc. | Method for cognitive information processing using a cognitive blockchain architecture |
US10719884B2 (en) | 2018-03-30 | 2020-07-21 | Alibaba Group Holding Limited | Blockchain-based service execution method and apparatus, and electronic device |
CN111444204A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Synchronous processing method, device, equipment and medium |
US10726343B2 (en) | 2016-11-09 | 2020-07-28 | Cognitive Scale, Inc. | Performing compliance operations using cognitive blockchains |
US10728042B2 (en) | 2019-07-02 | 2020-07-28 | Alibaba Group Holding Limited | System and method for blockchain-based cross-entity authentication |
US10726346B2 (en) | 2016-11-09 | 2020-07-28 | Cognitive Scale, Inc. | System for performing compliance operations using cognitive blockchains |
US10756885B2 (en) | 2019-07-02 | 2020-08-25 | Alibaba Group Holding Limited | System and method for blockchain-based cross entity authentication |
US20200304289A1 (en) * | 2019-03-22 | 2020-09-24 | International Business Machines Corporation | Information management in a database |
US10824746B1 (en) * | 2017-01-25 | 2020-11-03 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US10833843B1 (en) * | 2015-12-03 | 2020-11-10 | United Services Automobile Association (USAA0 | Managing blockchain access |
US10846733B2 (en) * | 2018-12-11 | 2020-11-24 | block.one | Systems and methods for incentivizing digital identity verification |
US10846808B1 (en) * | 2016-12-14 | 2020-11-24 | Kaboodl, LLC | 3D printer and inventory control and distribution system for 3D designs |
WO2020236832A1 (en) * | 2019-05-23 | 2020-11-26 | Healthpointe Solutions, Inc. | System and method for using a blockchain to manage knowledge in a healthcare ecosystem |
US10922757B2 (en) | 2018-05-29 | 2021-02-16 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
US10938569B2 (en) | 2019-07-02 | 2021-03-02 | Advanced New Technologies Co., Ltd. | System and method for verifying verifiable claims |
US10938562B2 (en) | 2019-07-02 | 2021-03-02 | Advanced New Technologies Co., Ltd. | System and method for creating decentralized identifiers |
US10979557B2 (en) * | 2019-03-18 | 2021-04-13 | Numeracle, Inc. | Validating telephone calls by verifying entity identities using blockchains |
CN112789642A (en) * | 2018-10-10 | 2021-05-11 | 西门子股份公司 | Association of identities in a distributed database |
US20210160059A1 (en) * | 2018-04-25 | 2021-05-27 | Siemens Aktiengesellschaft | Data processing device for processing a radio signal |
US20210174625A1 (en) * | 2019-02-01 | 2021-06-10 | James P. Pinkerton | Multi-level integrated utility to collect and provide information and effectuate political actions |
US20210194701A1 (en) * | 2016-11-03 | 2021-06-24 | Visa International Service Association | Systems and methods for creating a universal record |
US11062554B2 (en) | 2019-07-15 | 2021-07-13 | Igt | Decentralized distributed peer-to-peer wagering architecture and related systems and methods |
CN113256420A (en) * | 2021-05-27 | 2021-08-13 | 中国航空结算有限责任公司 | Enterprise user identification method, device, equipment and medium in transaction |
US11108627B2 (en) * | 2016-12-30 | 2021-08-31 | Intel Corporation | Object identification for groups of IoT devices |
US11115420B2 (en) * | 2019-04-26 | 2021-09-07 | Visa International Service Association | Distributed ledger data verification network |
US11139978B2 (en) * | 2017-06-15 | 2021-10-05 | Accenture Global Solutions Limited | Portable biometric identity on a distributed data storage layer |
CN113569298A (en) * | 2021-07-23 | 2021-10-29 | 徐丹梅 | Identity generation method and identity system based on block chain |
US11178151B2 (en) * | 2018-12-19 | 2021-11-16 | International Business Machines Corporation | Decentralized database identity management system |
US11226956B2 (en) * | 2017-07-07 | 2022-01-18 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based entity identification network |
US11244316B2 (en) * | 2018-06-07 | 2022-02-08 | International Business Machines Corporation | Biometric token for blockchain |
US11251937B2 (en) * | 2018-01-21 | 2022-02-15 | CipherTrace, Inc. | Distributed security mechanism for blockchains and distributed ledgers |
US11258778B2 (en) | 2019-02-28 | 2022-02-22 | Advanced New Technologies Co., Ltd. | System and method for blockchain-based data management |
US11263405B2 (en) | 2018-10-10 | 2022-03-01 | Healthpointe Solutions, Inc. | System and method for answering natural language questions posed by a user |
US20220092587A1 (en) * | 2018-01-21 | 2022-03-24 | CipherTrace, Inc. | Verification systems for blockchains and distributed ledgers |
US11296889B2 (en) * | 2017-02-17 | 2022-04-05 | Inveniam Capital Partners, Inc. | Secret sharing via blockchains |
US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11334874B2 (en) | 2018-08-06 | 2022-05-17 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US20220158968A1 (en) * | 2019-10-02 | 2022-05-19 | Paypal, Inc. | System and method for unified multi-channel messaging with block-based datastore |
US20220164753A1 (en) * | 2020-11-23 | 2022-05-26 | Verizon Patent And Licensing Inc. | Systems and methods for service allocation based on real-time service provider and requestor attributes |
US11348104B2 (en) * | 2019-03-14 | 2022-05-31 | Advanced New Technologies Co., Ltd. | Methods and devices for acquiring and recording tracking information on blockchain |
US11368289B1 (en) | 2020-04-06 | 2022-06-21 | Bank Of America Corporation | Video registration and authentication using blockchain |
US20220198458A1 (en) * | 2017-07-17 | 2022-06-23 | Agasthya P. Narendranathan | Systems and methods for blockchain based identity assurance and risk management |
US11386080B2 (en) | 2019-08-23 | 2022-07-12 | Capital One Services, Llc | Transaction processing failover |
US11418590B2 (en) * | 2017-06-20 | 2022-08-16 | Nchain Licensing Ag | Fast propagation of recent transactions over a blockchain network |
US11416944B1 (en) | 2018-09-19 | 2022-08-16 | State Farm Mutual Automobile Insurance Company | Blockchain-based systems and methods for self-managed peer group insurance |
US11438175B2 (en) | 2020-12-29 | 2022-09-06 | CipherTrace, Inc. | Systems and methods for correlating cryptographic addresses between blockchain networks |
US20220286438A1 (en) * | 2021-03-08 | 2022-09-08 | Adobe Inc. | Machine learning techniques for mitigating aggregate exposure of identifying information |
US11475451B2 (en) * | 2017-03-31 | 2022-10-18 | Bayer Healthcare Llc | Biometric authentication for, and secure electronic tracking of, restricted over-the-counter drug sales |
US11477271B2 (en) | 2018-05-18 | 2022-10-18 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
USRE49334E1 (en) | 2005-10-04 | 2022-12-13 | Hoffberg Family Trust 2 | Multifactorial optimization system and method |
US11546373B2 (en) | 2018-11-20 | 2023-01-03 | CipherTrace, Inc. | Cryptocurrency based malware and ransomware detection systems and methods |
US11553337B2 (en) | 2019-12-10 | 2023-01-10 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US11563582B2 (en) | 2019-12-10 | 2023-01-24 | Winkk, Inc. | Method and apparatus for optical encryption communication using a multitude of hardware configurations |
US11574045B2 (en) | 2019-12-10 | 2023-02-07 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
US11573953B2 (en) | 2020-09-22 | 2023-02-07 | Bank Of America Corporation | Error correction for integrated data control ledgers |
US11580535B2 (en) | 2018-05-18 | 2023-02-14 | Inveniam Capital Partners, Inc. | Recordation of device usage to public/private blockchains |
US11580534B2 (en) | 2017-03-22 | 2023-02-14 | Inveniam Capital Partners, Inc. | Auditing of electronic documents |
US11588794B2 (en) | 2019-12-10 | 2023-02-21 | Winkk, Inc. | Method and apparatus for secure application framework and platform |
US11593351B2 (en) | 2020-09-22 | 2023-02-28 | Bank Of America Corporation | Error correction for data control ledgers |
US11626997B2 (en) | 2020-03-06 | 2023-04-11 | Vaultie, Inc. | System and method for authenticating digitally signed documents |
US11637694B2 (en) | 2018-07-16 | 2023-04-25 | Winkk, Inc. | Secret material exchange and authentication cryptography operations |
US11636935B2 (en) | 2018-03-02 | 2023-04-25 | Bayer Healthcare Llc | Authenticating, establishing and tracking eligibility of a patient to purchase an over-the-counter drug |
US11640602B2 (en) | 2016-09-30 | 2023-05-02 | Winkk, Inc. | Authentication and personal data sharing for partner services using out-of-band optical mark recognition |
US11652815B2 (en) | 2019-12-10 | 2023-05-16 | Winkk, Inc. | Security platform architecture |
US11657140B2 (en) | 2019-12-10 | 2023-05-23 | Winkk, Inc. | Device handoff identification proofing using behavioral analytics |
US11658832B2 (en) | 2020-09-22 | 2023-05-23 | Bank Of America Corporation | Information security using data control ledgers |
US20230206255A1 (en) * | 2021-12-27 | 2023-06-29 | Google Llc | Automated Customer Trust Measurement and Insights Generation Platform |
US11763296B2 (en) | 2020-09-22 | 2023-09-19 | Bank Of America Corporation | Information security using integrated data control ledgers |
US11769146B1 (en) * | 2016-09-30 | 2023-09-26 | Hrb Innovations, Inc. | Blockchain transactional identity verification |
US11782902B2 (en) | 2017-07-07 | 2023-10-10 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based rewards network |
US20230334476A1 (en) * | 2019-03-20 | 2023-10-19 | Capital One Services, Llc | Using a contactless card to securely share personal data stored in a blockchain |
US11824999B2 (en) | 2021-08-13 | 2023-11-21 | Winkk, Inc. | Chosen-plaintext secure cryptosystem and authentication |
WO2023231361A1 (en) * | 2022-05-30 | 2023-12-07 | 华为云计算技术有限公司 | Data transaction method, and apparatus |
US11843943B2 (en) | 2021-06-04 | 2023-12-12 | Winkk, Inc. | Dynamic key exchange for moving target |
US11861031B2 (en) | 2020-06-15 | 2024-01-02 | Allstate Solutions Private Limited | Distributed ledger interface system for background verification of an individual |
US11861697B1 (en) * | 2018-09-14 | 2024-01-02 | United Services Automobile Association (Usaa) | Distributed ledger for letter of credit tracking |
US11863305B2 (en) | 2020-01-17 | 2024-01-02 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11863686B2 (en) | 2017-01-30 | 2024-01-02 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
US11870929B2 (en) * | 2020-09-30 | 2024-01-09 | International Business Machines Corporation | Telecommunication mediation using blockchain based microservices |
US11880828B2 (en) * | 2016-08-01 | 2024-01-23 | Nuggets Limited | Data protection system and method |
US11928193B2 (en) | 2019-12-10 | 2024-03-12 | Winkk, Inc. | Multi-factor authentication using behavior and machine learning |
US11928194B2 (en) | 2019-12-10 | 2024-03-12 | Wiinkk, Inc. | Automated transparent login without saved credentials or passwords |
US11936787B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | User identification proofing using a combination of user responses to system turing tests using biometric methods |
US11941583B1 (en) * | 2017-04-12 | 2024-03-26 | Massachusetts Mutual Life Insurance Company | Intelligent employment-based blockchain |
US20240121608A1 (en) * | 2022-10-11 | 2024-04-11 | At&T Intellectual Property I, L.P. | Apparatuses and methods for facilitating dynamic badges and identities |
US11989208B2 (en) | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
US12008015B2 (en) | 2018-05-18 | 2024-06-11 | Inveniam Capital Partners, Inc. | Import and export in blockchain environments |
US12007972B2 (en) | 2021-06-19 | 2024-06-11 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
US12008526B2 (en) | 2021-03-26 | 2024-06-11 | Inveniam Capital Partners, Inc. | Computer system and method for programmatic collateralization services |
US12026789B2 (en) | 2021-02-08 | 2024-07-02 | CipherTrace, Inc. | Systems and methods of forensic analysis of cryptocurrency transactions |
US20240242592A1 (en) * | 2019-04-25 | 2024-07-18 | Capital One Services, Llc | Systems and methods for card-handling by point of sale devices |
US12051066B2 (en) | 2022-03-15 | 2024-07-30 | Capital One Services, Llc | Systems and methods for validating asset destinations in blockchain networks |
US12073378B2 (en) * | 2019-12-10 | 2024-08-27 | Winkk, Inc. | Method and apparatus for electronic transactions using personal computing devices and proxy services |
US12095751B2 (en) | 2021-06-04 | 2024-09-17 | Winkk, Inc. | Encryption for one-way data stream |
US12132763B2 (en) | 2019-12-10 | 2024-10-29 | Winkk, Inc. | Bus for aggregated trust framework |
US12137179B2 (en) | 2021-06-19 | 2024-11-05 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
US12143419B2 (en) | 2019-12-10 | 2024-11-12 | Winkk, Inc. | Aggregated trust framework |
US12153678B2 (en) | 2019-12-10 | 2024-11-26 | Winkk, Inc. | Analytics with shared traits |
US12159113B2 (en) | 2019-08-26 | 2024-12-03 | Healthpointe Solutions, Inc. | System and method for diagnosing disease through cognification of unstructured data |
US12164607B2 (en) | 2016-12-14 | 2024-12-10 | Kaboodl, LLC | 3D printer and inventory control and distribution system for 3D designs |
US12192371B2 (en) | 2017-04-27 | 2025-01-07 | Inveniam Capital Partners, Inc. | Artificial intelligence modifying federated learning models |
US12223469B2 (en) | 2021-01-25 | 2025-02-11 | Neurosymbolic Ai-Ip, Llc | Systems and methods for project accountability services |
US12231566B2 (en) | 2017-09-13 | 2025-02-18 | Inveniam Capital Partners, Inc. | Apparatus and methods for producing data structures having internal self-references suitable for immutably representing and verifying data |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11188907B1 (en) | 2015-08-21 | 2021-11-30 | United Services Automobile Association (Usaa) | ACH authorization validation using public blockchains |
US11195177B1 (en) | 2015-08-21 | 2021-12-07 | United Services Automobile Association (Usaa) | Distributed ledger systems for tracking recurring transaction authorizations |
CA3002034A1 (en) | 2015-10-14 | 2017-04-20 | Cambridge Blockchain, LLC | Systems and methods for managing digital identities |
US10949856B1 (en) | 2015-11-17 | 2021-03-16 | United Services Automobile Association (Usaa) | Systems and methods for adaptive learning to replicate peak performance of human decision making |
US11361286B1 (en) | 2015-11-20 | 2022-06-14 | United Services Automobile Association (Usaa) | Identifying negotiable instrument fraud using distributed ledger systems |
US10423938B1 (en) | 2015-11-20 | 2019-09-24 | United Services Automobile Association | Identifying negotiable instrument fraud using distributed ledger systems |
SG10202006900PA (en) | 2015-12-22 | 2020-08-28 | Financial & Risk Organisation Ltd | Methods and systems for identity creation, verification and management |
CA3017578A1 (en) | 2016-06-06 | 2017-12-14 | Thomson Reuters Global Resources Unlimited Company | Systems and methods for providing identity scores |
US10185550B2 (en) | 2016-09-28 | 2019-01-22 | Mcafee, Inc. | Device-driven auto-recovery using multiple recovery sources |
US9992022B1 (en) | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
US11501365B1 (en) | 2017-02-17 | 2022-11-15 | State Farm Mutual Automobile Insurance Company | Blockchain systems and methods for managing property loan information |
US10432585B2 (en) * | 2017-02-25 | 2019-10-01 | Xage Security, Inc. | Autonomous decentralization of centralized stateful security services with systematic tamper resistance |
EA035281B1 (en) * | 2017-04-25 | 2020-05-25 | Товарыство З Обмеженою Видповидальнистю "Симкорд" | Method for executing a digital value transfer transaction and digital value transfer system for its implementation |
US20180322489A1 (en) * | 2017-05-03 | 2018-11-08 | Meredith Altenhofen | System and method for restricted transaction processing |
US11190355B2 (en) | 2017-06-02 | 2021-11-30 | Visa International Service Association | Secure biometric authentication using electronic identity |
WO2019195821A1 (en) * | 2018-04-06 | 2019-10-10 | Daniel Maurice Lerner | Authentication and validation of data storage and transmission using blockchain |
RU2664402C1 (en) * | 2017-06-21 | 2018-08-17 | Элдар Али Оглы Разроев | Method of providing access to the databases |
TWI646487B (en) * | 2017-06-23 | 2019-01-01 | 現代財富控股有限公司 | Smart contract executing system with permission rating and avoid duplication and method thereof |
CN107248076A (en) * | 2017-06-24 | 2017-10-13 | 北京天德科技有限公司 | A kind of core algorithm of the double-chain block chain the Internet model merchandised across chain |
CN111034114B (en) | 2017-08-07 | 2023-07-28 | 维萨国际服务协会 | Blockchain architecture with record security |
WO2019032538A1 (en) * | 2017-08-08 | 2019-02-14 | Walmart Apollo, Llc | Validating identification of a user for purchase of age-restricted items |
US10735203B2 (en) | 2017-10-09 | 2020-08-04 | Cisco Technology, Inc. | Sharing network security threat information using a blockchain network |
US12148004B2 (en) * | 2017-10-30 | 2024-11-19 | Iotecha Corp. | Method and system for delivery of a targeted advertisement by an electric vehicle charging apparatus |
WO2019086677A1 (en) * | 2017-11-03 | 2019-05-09 | Aid Technology Limited | Method, apparatus, and computer-readable medium for securely performing digital asset transactions |
CN107819770A (en) * | 2017-11-15 | 2018-03-20 | 中国联合网络通信集团有限公司 | Medical data sharing method for secret protection and device based on block chain |
CN107767926A (en) * | 2017-11-15 | 2018-03-06 | 中国联合网络通信集团有限公司 | Medical data management system and access method based on block chain |
WO2019100056A1 (en) * | 2017-11-20 | 2019-05-23 | Vetty, Inc. | Systems and methods for computer-assisted evaluation and scoring |
WO2019103707A1 (en) * | 2017-11-27 | 2019-05-31 | Sagiroglu Zahid | A credibility evaluation system and method |
CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
US9990504B1 (en) | 2017-12-18 | 2018-06-05 | Northern Trust Corporation | Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes |
US11544708B2 (en) | 2017-12-29 | 2023-01-03 | Ebay Inc. | User controlled storage and sharing of personal user information on a blockchain |
US10715323B2 (en) | 2017-12-29 | 2020-07-14 | Ebay Inc. | Traceable key block-chain ledger |
US10924489B2 (en) | 2018-01-19 | 2021-02-16 | International Business Machines Corporation | Building trusted public blockchain networks based on participants' digital social behavior |
WO2019144948A1 (en) * | 2018-01-27 | 2019-08-01 | Redrock Biometrics Inc | Decentralized biometric authentication platform |
CN110322207A (en) * | 2018-03-28 | 2019-10-11 | 中思博安科技(北京)有限公司 | A kind of construction method and device of the intellectual capital management platform based on block chain |
US10958642B2 (en) | 2018-04-05 | 2021-03-23 | The Toronto-Dominion Bank | Dynamic biometric authentication based on distributed ledger data |
KR102646102B1 (en) | 2018-04-12 | 2024-03-08 | 주식회사 넥슨코리아 | Apparatus, method and computer program for playing game between plurality of users and recording result |
WO2019204414A1 (en) | 2018-04-19 | 2019-10-24 | Walmart Apollo, Llc | System and method for storing third party items at automated locker |
CN108647361B (en) * | 2018-05-21 | 2021-12-03 | 中国工商银行股份有限公司 | Data storage method, device and system based on block chain |
TWI674543B (en) * | 2018-08-17 | 2019-10-11 | 郭谷彰 | A blockchain-based advertisement delivering and evaluation |
CN109119135A (en) * | 2018-08-22 | 2019-01-01 | 广东工业大学 | A kind of medical safety retroactive method and system based on block chain |
US10826704B2 (en) | 2018-08-31 | 2020-11-03 | Hewlett Packard Enterprise Development Lp | Blockchain key storage on SIM devices |
WO2020060835A1 (en) | 2018-09-20 | 2020-03-26 | Walmart Apollo, Llc | Systems and methods for the sale of age-restricted merchandise |
DE102018007628A1 (en) | 2018-09-26 | 2020-03-26 | Giesecke+Devrient Mobile Security Gmbh | Decentralized identity management solution |
US11301452B2 (en) | 2018-10-09 | 2022-04-12 | Ebay, Inc. | Storing and verification of derivative work data on blockchain with original work data |
EP3566391B1 (en) * | 2018-12-28 | 2021-04-21 | Advanced New Technologies Co., Ltd. | Parallel execution of transactions in a blockchain network based on smart contract whitelists |
KR102234128B1 (en) | 2018-12-28 | 2021-04-02 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | Parallel execution of transactions on the blockchain network |
US11316663B2 (en) | 2019-01-25 | 2022-04-26 | International Business Machines Corporation | One-time password with unpredictable moving factor |
US11531686B2 (en) | 2019-02-04 | 2022-12-20 | Apex Data Solutions, Llc | Computing system providing blockchain-facilitated semantic interoperability between multiple disparate systems of record (SORs) and related methods |
DE102019000985A1 (en) | 2019-02-12 | 2020-08-13 | Ngadhnjim Simnica | System and computer network for the secure creation, adaptation and validation of smart contracts |
US12002117B1 (en) | 2019-03-12 | 2024-06-04 | T-Mobile Innovations Llc | Advanced metering with distributed ledger control |
CN111726324A (en) * | 2019-03-20 | 2020-09-29 | 上海御行信息技术有限公司 | A Consortium Multi-Node Network Identity Authentication System Based on Blockchain Technology |
WO2019141294A2 (en) * | 2019-05-20 | 2019-07-25 | Alibaba Group Holding Limited | Identifying copyrighted material using copyright information embedded in tables |
CN110211651A (en) * | 2019-05-30 | 2019-09-06 | 爱多特(广东)网络技术有限公司 | The health account system of diabetes remote comprehensive intervention based on block chain |
US10474834B1 (en) | 2019-06-04 | 2019-11-12 | Capital One Services, Llc | Data sharing via distributed ledgers |
US10554406B1 (en) | 2019-06-04 | 2020-02-04 | Capital One Services, Llc | Authorized data sharing using smart contracts |
CN111226249B (en) * | 2019-08-12 | 2023-11-28 | 创新先进技术有限公司 | Trusted platform based on blockchain |
US11275865B2 (en) | 2019-08-23 | 2022-03-15 | Conduent Business Services, Llc | Privacy friendly decentralized ledger based identity management system and methods |
US11405394B2 (en) | 2019-10-30 | 2022-08-02 | Pulse Secure, Llc | Trust broker system for managing and sharing trust levels |
US11455650B2 (en) * | 2020-05-27 | 2022-09-27 | Coinbase, Inc. | System and method for on-chain rewards |
CN112800441B (en) * | 2021-01-05 | 2023-08-29 | 上海零数众合信息科技有限公司 | Rights management method of energy platform based on blockchain |
CN114553437B (en) * | 2022-03-02 | 2023-12-05 | 安徽师范大学 | Authorization verification method based on medical block chain |
CA3194512A1 (en) * | 2022-03-29 | 2023-09-29 | Telesola Corporation | System and method for fully distributed and decentralized communication |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110137789A1 (en) * | 2009-12-03 | 2011-06-09 | Venmo Inc. | Trust Based Transaction System |
US9397985B1 (en) * | 2015-04-14 | 2016-07-19 | Manifold Technology, Inc. | System and method for providing a cryptographic platform for exchanging information |
US20190197534A1 (en) * | 2016-08-01 | 2019-06-27 | Nuggets Limited | Data protection system and method |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR19990037007U (en) * | 1999-06-09 | 1999-10-05 | 황종호 | Handicraft paper which is fabricated of packing box |
US9092828B2 (en) * | 2012-09-19 | 2015-07-28 | Mastercard International Incorporated Purchase | Data sharing platform |
US8662384B2 (en) * | 2006-02-28 | 2014-03-04 | Google Inc. | Text message payment |
US7669760B1 (en) * | 2006-10-31 | 2010-03-02 | United Services Automobile Association (Usaa) | GPS validation for transactions |
US20080127296A1 (en) | 2006-11-29 | 2008-05-29 | International Business Machines Corporation | Identity assurance method and system |
US8572711B1 (en) * | 2010-10-21 | 2013-10-29 | Google Inc. | Real identity verification |
EP2624190A1 (en) * | 2012-02-03 | 2013-08-07 | Pieter Dubois | Authentication of payment transactions using an alias |
US9876775B2 (en) * | 2012-11-09 | 2018-01-23 | Ent Technologies, Inc. | Generalized entity network translation (GENT) |
WO2015142765A1 (en) * | 2014-03-17 | 2015-09-24 | Coinbase, Inc | Bitcoin host computer system |
US11023968B2 (en) * | 2015-03-05 | 2021-06-01 | Goldman Sachs & Co. LLC | Systems and methods for updating a distributed ledger based on partial validations of transactions |
GB2540975A (en) | 2015-07-31 | 2017-02-08 | British Telecomm | Mitigating blockchain attack |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
WO2018049656A1 (en) | 2016-09-18 | 2018-03-22 | 深圳前海达闼云端智能科技有限公司 | Blockchain-based identity authentication method, device, node and system |
KR20210030534A (en) | 2019-09-09 | 2021-03-18 | 서강대학교산학협력단 | System for managing medicine and medical supplies based on a blockchain network |
-
2016
- 2016-09-30 EP EP16855952.4A patent/EP3362970B1/en active Active
- 2016-09-30 MX MX2018004693A patent/MX2018004693A/en unknown
- 2016-09-30 BR BR112018007449-7A patent/BR112018007449B1/en active IP Right Grant
- 2016-09-30 ES ES16855952T patent/ES2990144T3/en active Active
- 2016-09-30 EP EP24160636.7A patent/EP4375908A1/en active Pending
- 2016-09-30 WO PCT/US2016/054920 patent/WO2017066002A1/en active Application Filing
- 2016-09-30 PL PL16855952.4T patent/PL3362970T3/en unknown
- 2016-09-30 EP EP24160651.6A patent/EP4354311A3/en active Pending
- 2016-09-30 HR HRP20241496TT patent/HRP20241496T1/en unknown
- 2016-09-30 US US15/767,969 patent/US20180285879A1/en not_active Abandoned
- 2016-09-30 HU HUE16855952A patent/HUE068146T2/en unknown
-
2018
- 2018-04-04 ZA ZA2018/02203A patent/ZA201802203B/en unknown
- 2018-04-16 PH PH12018550046A patent/PH12018550046A1/en unknown
- 2018-05-04 CO CONC2018/0004808A patent/CO2018004808A2/en unknown
-
2022
- 2022-03-18 US US17/698,908 patent/US20230129693A1/en not_active Abandoned
-
2024
- 2024-08-26 US US18/815,573 patent/US12244719B1/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110137789A1 (en) * | 2009-12-03 | 2011-06-09 | Venmo Inc. | Trust Based Transaction System |
US9397985B1 (en) * | 2015-04-14 | 2016-07-19 | Manifold Technology, Inc. | System and method for providing a cryptographic platform for exchanging information |
US20190197534A1 (en) * | 2016-08-01 | 2019-06-27 | Nuggets Limited | Data protection system and method |
Cited By (228)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE49334E1 (en) | 2005-10-04 | 2022-12-13 | Hoffberg Family Trust 2 | Multifactorial optimization system and method |
US10833843B1 (en) * | 2015-12-03 | 2020-11-10 | United Services Automobile Association (USAA0 | Managing blockchain access |
US11539507B1 (en) | 2015-12-03 | 2022-12-27 | United Services Automobile Association (Usaa) | Managing blockchain access |
US20190295164A1 (en) * | 2016-02-18 | 2019-09-26 | Nomura Research Institute, Ltd. | Information processing apparatus, information processing method, and recording medium |
US20190036702A1 (en) * | 2016-03-31 | 2019-01-31 | bitFlyer, Inc | Private node, processing method for private node, and program for same |
US11880828B2 (en) * | 2016-08-01 | 2024-01-23 | Nuggets Limited | Data protection system and method |
US10581615B2 (en) * | 2016-09-18 | 2020-03-03 | Cloudminds (Shenxhen) Robotics) Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
US20190288854A1 (en) * | 2016-09-18 | 2019-09-19 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
US11769146B1 (en) * | 2016-09-30 | 2023-09-26 | Hrb Innovations, Inc. | Blockchain transactional identity verification |
US11640602B2 (en) | 2016-09-30 | 2023-05-02 | Winkk, Inc. | Authentication and personal data sharing for partner services using out-of-band optical mark recognition |
US20190306176A1 (en) * | 2016-10-17 | 2019-10-03 | Arm Limited | Blockchain mining using trusted nodes |
US10291627B2 (en) * | 2016-10-17 | 2019-05-14 | Arm Ltd. | Blockchain mining using trusted nodes |
US10721240B2 (en) * | 2016-10-17 | 2020-07-21 | Arm Limited | Blockchain mining using trusted nodes |
US20180115426A1 (en) * | 2016-10-26 | 2018-04-26 | Fintech Fund Family Limited Partnership | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US10484178B2 (en) * | 2016-10-26 | 2019-11-19 | Black Gold Coin, Inc. | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US10749681B2 (en) * | 2016-10-26 | 2020-08-18 | Black Gold Coin, Inc. | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US11764973B2 (en) * | 2016-11-03 | 2023-09-19 | Visa International Service Association | Systems and methods for creating a universal record |
US12244729B2 (en) | 2016-11-03 | 2025-03-04 | Visa International Service Association | Systems and methods for creating a universal record |
US20210194701A1 (en) * | 2016-11-03 | 2021-06-24 | Visa International Service Association | Systems and methods for creating a universal record |
US10621233B2 (en) | 2016-11-09 | 2020-04-14 | Cognitive Scale, Inc. | Cognitive session graphs including blockchains |
US10726343B2 (en) | 2016-11-09 | 2020-07-28 | Cognitive Scale, Inc. | Performing compliance operations using cognitive blockchains |
US10726346B2 (en) | 2016-11-09 | 2020-07-28 | Cognitive Scale, Inc. | System for performing compliance operations using cognitive blockchains |
US20180129952A1 (en) * | 2016-11-09 | 2018-05-10 | Cognitive Scale, Inc. | Cognitive Information Processing Using a Cognitive Blockchain Architecture |
US10726342B2 (en) * | 2016-11-09 | 2020-07-28 | Cognitive Scale, Inc. | Cognitive information processing using a cognitive blockchain architecture |
US10621510B2 (en) | 2016-11-09 | 2020-04-14 | Cognitive Scale, Inc. | Hybrid blockchain data architecture for use within a cognitive environment |
US10621511B2 (en) | 2016-11-09 | 2020-04-14 | Cognitive Scale, Inc. | Method for using hybrid blockchain data architecture within a cognitive environment |
US10628491B2 (en) | 2016-11-09 | 2020-04-21 | Cognitive Scale, Inc. | Cognitive session graphs including blockchains |
US10719771B2 (en) * | 2016-11-09 | 2020-07-21 | Cognitive Scale, Inc. | Method for cognitive information processing using a cognitive blockchain architecture |
US11748411B2 (en) | 2016-11-09 | 2023-09-05 | Tecnotree Technologies, Inc. | Cognitive session graphs including blockchains |
US10530859B1 (en) * | 2016-11-28 | 2020-01-07 | EMC IP Holding Company LLC | Blockchain functionalities in data storage system |
US10373159B2 (en) * | 2016-12-07 | 2019-08-06 | International Business Machines Corporation | Concomitance of an asset and identity block of a blockchain |
US11037145B2 (en) * | 2016-12-07 | 2021-06-15 | International Business Machines Corporation | Concomitance of an asset and identity block of a blockchain |
US10846808B1 (en) * | 2016-12-14 | 2020-11-24 | Kaboodl, LLC | 3D printer and inventory control and distribution system for 3D designs |
US11593902B2 (en) | 2016-12-14 | 2023-02-28 | Kaboodl, LLC | 3D printer and inventory control and distribution system for 3D designs |
US12164607B2 (en) | 2016-12-14 | 2024-12-10 | Kaboodl, LLC | 3D printer and inventory control and distribution system for 3D designs |
US11637746B2 (en) | 2016-12-30 | 2023-04-25 | Intel Corporation | Object identification for groups of IoT devices |
US12132609B2 (en) | 2016-12-30 | 2024-10-29 | Intel Corporation | Blockchains for securing IoT devices |
US12218795B2 (en) | 2016-12-30 | 2025-02-04 | Intel Corporation | Internet of things |
US11108627B2 (en) * | 2016-12-30 | 2021-08-31 | Intel Corporation | Object identification for groups of IoT devices |
US20230298014A1 (en) * | 2017-01-17 | 2023-09-21 | HashLynx Inc. | System for facilitating secure electronic communications between entities and processing resource transfers |
US11631077B2 (en) * | 2017-01-17 | 2023-04-18 | HashLynx Inc. | System for facilitating secure electronic communications between entities and processing resource transfers |
US20180204213A1 (en) * | 2017-01-17 | 2018-07-19 | HashLynx Inc. | System for facilitating secure electronic communications between entities and processing resource transfers |
US20240143806A1 (en) * | 2017-01-25 | 2024-05-02 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US12235979B2 (en) * | 2017-01-25 | 2025-02-25 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US10824746B1 (en) * | 2017-01-25 | 2020-11-03 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US10824759B1 (en) * | 2017-01-25 | 2020-11-03 | State Farm Mutual Automobile Insurance Company | Systems and methods for verifying agent sales data via blockchain |
US10824747B1 (en) * | 2017-01-25 | 2020-11-03 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to policy data on blockchain |
US11270276B1 (en) | 2017-01-25 | 2022-03-08 | State Farm Mutual Automobile Insurance Company | Systems and methods for blockchain-based payments |
US11514176B1 (en) * | 2017-01-25 | 2022-11-29 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US12141328B1 (en) | 2017-01-25 | 2024-11-12 | State Farm Mutual Automobile Insurance Company | Systems and methods for fund transfers via blockchain |
US11599653B1 (en) * | 2017-01-25 | 2023-03-07 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to policy data on blockchain |
US20230185936A1 (en) * | 2017-01-25 | 2023-06-15 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to policy data on blockchain |
US20230039746A1 (en) * | 2017-01-25 | 2023-02-09 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US11914728B2 (en) * | 2017-01-25 | 2024-02-27 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to blockchain data |
US11443063B1 (en) | 2017-01-25 | 2022-09-13 | State Farm Mutual Automobile Insurance Company | Systems and methods for verifying agent sales data via blockchain |
US11880228B2 (en) | 2017-01-25 | 2024-01-23 | State Farm Mutual Automobile Insurance Company | Systems and methods for verifying data via blockchain |
US11954214B2 (en) * | 2017-01-25 | 2024-04-09 | State Farm Mutual Automobile Insurance Company | Systems and methods for controlled access to policy data on blockchain |
US11863686B2 (en) | 2017-01-30 | 2024-01-02 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
US10505720B2 (en) | 2017-02-17 | 2019-12-10 | Alibaba Group Holding Limited | Blockchain system and data storage method and apparatus |
US10749669B2 (en) | 2017-02-17 | 2020-08-18 | Alibaba Group Holding Limited | Blockchain system and data storage method and apparatus |
US11296889B2 (en) * | 2017-02-17 | 2022-04-05 | Inveniam Capital Partners, Inc. | Secret sharing via blockchains |
US11580534B2 (en) | 2017-03-22 | 2023-02-14 | Inveniam Capital Partners, Inc. | Auditing of electronic documents |
US11475451B2 (en) * | 2017-03-31 | 2022-10-18 | Bayer Healthcare Llc | Biometric authentication for, and secure electronic tracking of, restricted over-the-counter drug sales |
US11941583B1 (en) * | 2017-04-12 | 2024-03-26 | Massachusetts Mutual Life Insurance Company | Intelligent employment-based blockchain |
US12192371B2 (en) | 2017-04-27 | 2025-01-07 | Inveniam Capital Partners, Inc. | Artificial intelligence modifying federated learning models |
US20210409221A1 (en) * | 2017-06-15 | 2021-12-30 | Accenture Global Solutions Limited | Portable Biometric Identity on a Distributed Data Storage Layer |
US11139978B2 (en) * | 2017-06-15 | 2021-10-05 | Accenture Global Solutions Limited | Portable biometric identity on a distributed data storage layer |
US11418590B2 (en) * | 2017-06-20 | 2022-08-16 | Nchain Licensing Ag | Fast propagation of recent transactions over a blockchain network |
US20230082444A1 (en) * | 2017-06-20 | 2023-03-16 | Nchain Licensing Ag | Fast propagation of recent transactions over a blockchain network |
US11863624B2 (en) * | 2017-06-20 | 2024-01-02 | Nchain Licensing Ag | Fast propagation of recent transactions over a blockchain network |
US12034806B2 (en) | 2017-06-20 | 2024-07-09 | Nchain Licensing Ag | Fast propagation of recent transactions over a blockchain network |
US20240163336A1 (en) * | 2017-06-20 | 2024-05-16 | Nchain Licensing Ag | Fast propagation of recent transactions over a blockchain network |
US11226956B2 (en) * | 2017-07-07 | 2022-01-18 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based entity identification network |
US11782902B2 (en) | 2017-07-07 | 2023-10-10 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based rewards network |
US12248938B2 (en) * | 2017-07-17 | 2025-03-11 | Neurosymbolic Ai-Ip, Llc | Systems and methods for blockchain based identity assurance and risk management |
US20220198458A1 (en) * | 2017-07-17 | 2022-06-23 | Agasthya P. Narendranathan | Systems and methods for blockchain based identity assurance and risk management |
US20200065822A1 (en) * | 2017-08-30 | 2020-02-27 | Alibaba Group Holding Limited | Resource transfer method, fund payment method, and electronic device |
US11087327B2 (en) * | 2017-08-30 | 2021-08-10 | Advanced New Technologies Co., Ltd. | Resource transfer method, fund payment method, and electronic device |
US12231566B2 (en) | 2017-09-13 | 2025-02-18 | Inveniam Capital Partners, Inc. | Apparatus and methods for producing data structures having internal self-references suitable for immutably representing and verifying data |
US10764142B2 (en) * | 2017-11-16 | 2020-09-01 | International Business Machines Corporation | Clustered application management with a blockchain |
US20190149418A1 (en) * | 2017-11-16 | 2019-05-16 | International Business Machines Corporation | Clustered application management with a blockchain |
US20190199700A1 (en) * | 2017-11-20 | 2019-06-27 | Marc Lauren Abramowitz | System and method for block chain encrypted communication and identification |
US20190205889A1 (en) * | 2017-12-29 | 2019-07-04 | Walmart Apollo, Llc | System and method for biometric credit based on blockchain |
US10902425B2 (en) * | 2017-12-29 | 2021-01-26 | Walmart Apollo, Llc | System and method for biometric credit based on blockchain |
US20220092587A1 (en) * | 2018-01-21 | 2022-03-24 | CipherTrace, Inc. | Verification systems for blockchains and distributed ledgers |
US11251937B2 (en) * | 2018-01-21 | 2022-02-15 | CipherTrace, Inc. | Distributed security mechanism for blockchains and distributed ledgers |
US11636935B2 (en) | 2018-03-02 | 2023-04-25 | Bayer Healthcare Llc | Authenticating, establishing and tracking eligibility of a patient to purchase an over-the-counter drug |
US11923060B2 (en) | 2018-03-02 | 2024-03-05 | Bayer Healthcare Llc | Authenticating, establishing and tracking eligibility of a patient to purchase an over-the-counter drug |
US11113769B2 (en) | 2018-03-30 | 2021-09-07 | Advanced New Technologies Co., Ltd. | Blockchain-based service execution method and apparatus, and electronic device |
US11049188B2 (en) | 2018-03-30 | 2021-06-29 | Advanced New Technologies Co., Ltd. | Blockchain-based service execution method and apparatus, and electronic device |
US10719884B2 (en) | 2018-03-30 | 2020-07-21 | Alibaba Group Holding Limited | Blockchain-based service execution method and apparatus, and electronic device |
US20210160059A1 (en) * | 2018-04-25 | 2021-05-27 | Siemens Aktiengesellschaft | Data processing device for processing a radio signal |
US11587074B2 (en) | 2018-05-18 | 2023-02-21 | Inveniam Capital Partners, Inc. | Recordation of device usage to blockchains |
US11580535B2 (en) | 2018-05-18 | 2023-02-14 | Inveniam Capital Partners, Inc. | Recordation of device usage to public/private blockchains |
US11477271B2 (en) | 2018-05-18 | 2022-10-18 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US12118541B2 (en) | 2018-05-18 | 2024-10-15 | Inveniam Capital Partners, Inc. | Recordation of device usage to blockchains |
US11930072B2 (en) | 2018-05-18 | 2024-03-12 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US12008015B2 (en) | 2018-05-18 | 2024-06-11 | Inveniam Capital Partners, Inc. | Import and export in blockchain environments |
US10922757B2 (en) | 2018-05-29 | 2021-02-16 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
US11023981B2 (en) | 2018-05-29 | 2021-06-01 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
CN108766511A (en) * | 2018-05-30 | 2018-11-06 | 北京阿尔山金融科技有限公司 | Medical examination data sharing method, system and electronic equipment |
US11323530B2 (en) * | 2018-06-06 | 2022-05-03 | International Business Machines Corporation | Proxy agents and proxy ledgers on a blockchain |
US20190379754A1 (en) * | 2018-06-06 | 2019-12-12 | International Business Machines Corporation | Proxy agents and proxy ledgers on a blockchain |
US11244316B2 (en) * | 2018-06-07 | 2022-02-08 | International Business Machines Corporation | Biometric token for blockchain |
US11637694B2 (en) | 2018-07-16 | 2023-04-25 | Winkk, Inc. | Secret material exchange and authentication cryptography operations |
US12206763B2 (en) | 2018-07-16 | 2025-01-21 | Winkk, Inc. | Secret material exchange and authentication cryptography operations |
US11620642B2 (en) | 2018-08-06 | 2023-04-04 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11615398B2 (en) | 2018-08-06 | 2023-03-28 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11676132B2 (en) | 2018-08-06 | 2023-06-13 | Inveniam Capital Partners, Inc. | Smart contracts in blockchain environments |
US11587069B2 (en) | 2018-08-06 | 2023-02-21 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11989208B2 (en) | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
US11348097B2 (en) | 2018-08-06 | 2022-05-31 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11687916B2 (en) | 2018-08-06 | 2023-06-27 | Inveniam Capital Partners, Inc. | Decisional architectures in blockchain environments |
US11334874B2 (en) | 2018-08-06 | 2022-05-17 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11531981B2 (en) | 2018-08-06 | 2022-12-20 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11861697B1 (en) * | 2018-09-14 | 2024-01-02 | United Services Automobile Association (Usaa) | Distributed ledger for letter of credit tracking |
US11416944B1 (en) | 2018-09-19 | 2022-08-16 | State Farm Mutual Automobile Insurance Company | Blockchain-based systems and methods for self-managed peer group insurance |
US12032913B2 (en) | 2018-10-10 | 2024-07-09 | Better Care Technologies, LLC | System and method for answering natural language questions posed by a user |
CN112789642A (en) * | 2018-10-10 | 2021-05-11 | 西门子股份公司 | Association of identities in a distributed database |
US20210391991A1 (en) * | 2018-10-10 | 2021-12-16 | Siemens Aktiengesellschaft | Linking identities in a distributed database |
US11263405B2 (en) | 2018-10-10 | 2022-03-01 | Healthpointe Solutions, Inc. | System and method for answering natural language questions posed by a user |
US11888892B2 (en) | 2018-11-20 | 2024-01-30 | CipherTrace, Inc. | Cryptocurrency based malware and ransomware detection systems and methods |
US11546373B2 (en) | 2018-11-20 | 2023-01-03 | CipherTrace, Inc. | Cryptocurrency based malware and ransomware detection systems and methods |
US20200184470A1 (en) * | 2018-12-08 | 2020-06-11 | International Business Machines Corporation | Identity ecosystem |
US10846733B2 (en) * | 2018-12-11 | 2020-11-24 | block.one | Systems and methods for incentivizing digital identity verification |
CN109636558A (en) * | 2018-12-12 | 2019-04-16 | 重庆金窝窝网络科技有限公司 | Based on employee's data processing method of block chain, apparatus and system |
US11178151B2 (en) * | 2018-12-19 | 2021-11-16 | International Business Machines Corporation | Decentralized database identity management system |
US20210174625A1 (en) * | 2019-02-01 | 2021-06-10 | James P. Pinkerton | Multi-level integrated utility to collect and provide information and effectuate political actions |
US11258778B2 (en) | 2019-02-28 | 2022-02-22 | Advanced New Technologies Co., Ltd. | System and method for blockchain-based data management |
US11348104B2 (en) * | 2019-03-14 | 2022-05-31 | Advanced New Technologies Co., Ltd. | Methods and devices for acquiring and recording tracking information on blockchain |
US20210136196A1 (en) * | 2019-03-18 | 2021-05-06 | Numeracle, Inc. | Validating telephone calls by verifying entity identities using blockchains |
US20230073809A1 (en) * | 2019-03-18 | 2023-03-09 | Numeracle, Inc. | Validating Telephone Calls by Verifying Entity Identities Using Blockchains |
US11956382B2 (en) * | 2019-03-18 | 2024-04-09 | Numeracle, Inc. | Validating telephone calls by verifying entity identities using blockchains |
US10979557B2 (en) * | 2019-03-18 | 2021-04-13 | Numeracle, Inc. | Validating telephone calls by verifying entity identities using blockchains |
US11533396B2 (en) * | 2019-03-18 | 2022-12-20 | Numeracle, Inc. | Validating telephone calls by verifying entity identities using blockchains |
US20230334476A1 (en) * | 2019-03-20 | 2023-10-19 | Capital One Services, Llc | Using a contactless card to securely share personal data stored in a blockchain |
US20200304289A1 (en) * | 2019-03-22 | 2020-09-24 | International Business Machines Corporation | Information management in a database |
US11777712B2 (en) * | 2019-03-22 | 2023-10-03 | International Business Machines Corporation | Information management in a database |
US20240242592A1 (en) * | 2019-04-25 | 2024-07-18 | Capital One Services, Llc | Systems and methods for card-handling by point of sale devices |
US12236771B2 (en) * | 2019-04-25 | 2025-02-25 | Capital One Services, Llc | Systems and methods for card-handling by point of sale devices |
US20210377274A1 (en) * | 2019-04-26 | 2021-12-02 | Visa International Service Association | Distributed ledger data verification network |
US11115420B2 (en) * | 2019-04-26 | 2021-09-07 | Visa International Service Association | Distributed ledger data verification network |
US12250223B2 (en) * | 2019-04-26 | 2025-03-11 | Visa International Service Association | Distributed ledger data verification network |
WO2020236832A1 (en) * | 2019-05-23 | 2020-11-26 | Healthpointe Solutions, Inc. | System and method for using a blockchain to manage knowledge in a healthcare ecosystem |
US11159526B2 (en) | 2019-07-02 | 2021-10-26 | Advanced New Technologies Co., Ltd. | System and method for decentralized-identifier authentication |
US10938551B2 (en) | 2019-07-02 | 2021-03-02 | Advanced New Technologies Co., Ltd. | System and method for implementing a resolver service for decentralized identifiers |
US10917246B2 (en) | 2019-07-02 | 2021-02-09 | Advanced New Technologies Co., Ltd. | System and method for blockchain-based cross-entity authentication |
US11477032B2 (en) | 2019-07-02 | 2022-10-18 | Advanced New Technologies Co., Ltd. | System and method for decentralized-identifier creation |
US10756885B2 (en) | 2019-07-02 | 2020-08-25 | Alibaba Group Holding Limited | System and method for blockchain-based cross entity authentication |
US11038883B2 (en) | 2019-07-02 | 2021-06-15 | Advanced New Technologies Co., Ltd. | System and method for decentralized-identifier creation |
US11171789B2 (en) | 2019-07-02 | 2021-11-09 | Advanced New Technologies Co., Ltd. | System and method for implementing a resolver service for decentralized identifiers |
US10924284B2 (en) | 2019-07-02 | 2021-02-16 | Advanced New Technologies Co., Ltd. | System and method for decentralized-identifier authentication |
US11165576B2 (en) | 2019-07-02 | 2021-11-02 | Advanced New Technologies Co., Ltd. | System and method for creating decentralized identifiers |
US10685099B2 (en) * | 2019-07-02 | 2020-06-16 | Alibaba Group Holding Limited | System and method for mapping decentralized identifiers to real-world entities |
US10938569B2 (en) | 2019-07-02 | 2021-03-02 | Advanced New Technologies Co., Ltd. | System and method for verifying verifiable claims |
US11025435B2 (en) | 2019-07-02 | 2021-06-01 | Advanced New Technologies Co., Ltd. | System and method for blockchain-based cross-entity authentication |
US11082233B2 (en) | 2019-07-02 | 2021-08-03 | Advanced New Technologies Co., Ltd. | System and method for issuing verifiable claims |
US11277268B2 (en) | 2019-07-02 | 2022-03-15 | Advanced New Technologies Co., Ltd. | System and method for verifying verifiable claims |
US10708060B2 (en) | 2019-07-02 | 2020-07-07 | Alibaba Group Holding Limited | System and method for blockchain-based notification |
US10938562B2 (en) | 2019-07-02 | 2021-03-02 | Advanced New Technologies Co., Ltd. | System and method for creating decentralized identifiers |
US10700851B2 (en) | 2019-07-02 | 2020-06-30 | Alibaba Group Holding Limited | System and method for implementing a resolver service for decentralized identifiers |
US11316697B2 (en) | 2019-07-02 | 2022-04-26 | Advanced New Technologies Co., Ltd. | System and method for issuing verifiable claims |
US10728042B2 (en) | 2019-07-02 | 2020-07-28 | Alibaba Group Holding Limited | System and method for blockchain-based cross-entity authentication |
US11062554B2 (en) | 2019-07-15 | 2021-07-13 | Igt | Decentralized distributed peer-to-peer wagering architecture and related systems and methods |
US11934388B2 (en) | 2019-08-23 | 2024-03-19 | Capital One Services, Llc | Transaction processing failover |
US11386080B2 (en) | 2019-08-23 | 2022-07-12 | Capital One Services, Llc | Transaction processing failover |
US11625391B2 (en) | 2019-08-23 | 2023-04-11 | Capital One Services, Llc | Transaction processing failover |
US12248460B2 (en) | 2019-08-23 | 2025-03-11 | Capital One Services, Llc | Transaction processing failover |
US12159113B2 (en) | 2019-08-26 | 2024-12-03 | Healthpointe Solutions, Inc. | System and method for diagnosing disease through cognification of unstructured data |
CN110599342A (en) * | 2019-09-23 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based identity information authorization method and device |
CN110597840A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Partner relationship establishing method, device, equipment and storage medium based on block chain |
US11924159B2 (en) * | 2019-10-02 | 2024-03-05 | Paypal, Inc. | System and method for unified multi-channel messaging with block-based datastore |
US20220158968A1 (en) * | 2019-10-02 | 2022-05-19 | Paypal, Inc. | System and method for unified multi-channel messaging with block-based datastore |
CN110866855A (en) * | 2019-11-13 | 2020-03-06 | 复旦大学 | License issuing and safety management system based on block chain |
US11563582B2 (en) | 2019-12-10 | 2023-01-24 | Winkk, Inc. | Method and apparatus for optical encryption communication using a multitude of hardware configurations |
US11657140B2 (en) | 2019-12-10 | 2023-05-23 | Winkk, Inc. | Device handoff identification proofing using behavioral analytics |
US11928194B2 (en) | 2019-12-10 | 2024-03-12 | Wiinkk, Inc. | Automated transparent login without saved credentials or passwords |
US11553337B2 (en) | 2019-12-10 | 2023-01-10 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US11936787B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | User identification proofing using a combination of user responses to system turing tests using biometric methods |
US11934514B2 (en) | 2019-12-10 | 2024-03-19 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
US12073378B2 (en) * | 2019-12-10 | 2024-08-27 | Winkk, Inc. | Method and apparatus for electronic transactions using personal computing devices and proxy services |
US12067107B2 (en) | 2019-12-10 | 2024-08-20 | Winkk, Inc. | Device handoff identification proofing using behavioral analytics |
US12212959B2 (en) | 2019-12-10 | 2025-01-28 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US12132763B2 (en) | 2019-12-10 | 2024-10-29 | Winkk, Inc. | Bus for aggregated trust framework |
US11652815B2 (en) | 2019-12-10 | 2023-05-16 | Winkk, Inc. | Security platform architecture |
US11574045B2 (en) | 2019-12-10 | 2023-02-07 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
US11928193B2 (en) | 2019-12-10 | 2024-03-12 | Winkk, Inc. | Multi-factor authentication using behavior and machine learning |
US12058127B2 (en) | 2019-12-10 | 2024-08-06 | Winkk, Inc. | Security platform architecture |
US11588794B2 (en) | 2019-12-10 | 2023-02-21 | Winkk, Inc. | Method and apparatus for secure application framework and platform |
US12010511B2 (en) | 2019-12-10 | 2024-06-11 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US12153678B2 (en) | 2019-12-10 | 2024-11-26 | Winkk, Inc. | Analytics with shared traits |
US12155637B2 (en) | 2019-12-10 | 2024-11-26 | Winkk, Inc. | Method and apparatus for secure application framework and platform |
US12143419B2 (en) | 2019-12-10 | 2024-11-12 | Winkk, Inc. | Aggregated trust framework |
US11902777B2 (en) | 2019-12-10 | 2024-02-13 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
US12231535B2 (en) | 2020-01-17 | 2025-02-18 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11863305B2 (en) | 2020-01-17 | 2024-01-02 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11943334B2 (en) | 2020-01-17 | 2024-03-26 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
US12225107B2 (en) | 2020-01-17 | 2025-02-11 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
US11626997B2 (en) | 2020-03-06 | 2023-04-11 | Vaultie, Inc. | System and method for authenticating digitally signed documents |
CN111444204A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Synchronous processing method, device, equipment and medium |
US11368289B1 (en) | 2020-04-06 | 2022-06-21 | Bank Of America Corporation | Video registration and authentication using blockchain |
US11861031B2 (en) | 2020-06-15 | 2024-01-02 | Allstate Solutions Private Limited | Distributed ledger interface system for background verification of an individual |
US11658832B2 (en) | 2020-09-22 | 2023-05-23 | Bank Of America Corporation | Information security using data control ledgers |
US11573953B2 (en) | 2020-09-22 | 2023-02-07 | Bank Of America Corporation | Error correction for integrated data control ledgers |
US11763296B2 (en) | 2020-09-22 | 2023-09-19 | Bank Of America Corporation | Information security using integrated data control ledgers |
US11593351B2 (en) | 2020-09-22 | 2023-02-28 | Bank Of America Corporation | Error correction for data control ledgers |
US11870929B2 (en) * | 2020-09-30 | 2024-01-09 | International Business Machines Corporation | Telecommunication mediation using blockchain based microservices |
US11816608B2 (en) * | 2020-11-23 | 2023-11-14 | Verizon Patent And Licensing Inc. | Systems and methods for service allocation based on real-time service provider and requestor attributes |
US20220164753A1 (en) * | 2020-11-23 | 2022-05-26 | Verizon Patent And Licensing Inc. | Systems and methods for service allocation based on real-time service provider and requestor attributes |
US11438175B2 (en) | 2020-12-29 | 2022-09-06 | CipherTrace, Inc. | Systems and methods for correlating cryptographic addresses between blockchain networks |
US12155778B2 (en) | 2020-12-29 | 2024-11-26 | CipherTrace, Inc. | Systems and methods for correlating cryptographic addresses between blockchain networks |
US12223469B2 (en) | 2021-01-25 | 2025-02-11 | Neurosymbolic Ai-Ip, Llc | Systems and methods for project accountability services |
US12026789B2 (en) | 2021-02-08 | 2024-07-02 | CipherTrace, Inc. | Systems and methods of forensic analysis of cryptocurrency transactions |
US12047355B2 (en) * | 2021-03-08 | 2024-07-23 | Adobe Inc. | Machine learning techniques for mitigating aggregate exposure of identifying information |
US20220286438A1 (en) * | 2021-03-08 | 2022-09-08 | Adobe Inc. | Machine learning techniques for mitigating aggregate exposure of identifying information |
US12008526B2 (en) | 2021-03-26 | 2024-06-11 | Inveniam Capital Partners, Inc. | Computer system and method for programmatic collateralization services |
CN113256420A (en) * | 2021-05-27 | 2021-08-13 | 中国航空结算有限责任公司 | Enterprise user identification method, device, equipment and medium in transaction |
US11843943B2 (en) | 2021-06-04 | 2023-12-12 | Winkk, Inc. | Dynamic key exchange for moving target |
US12095751B2 (en) | 2021-06-04 | 2024-09-17 | Winkk, Inc. | Encryption for one-way data stream |
US12137179B2 (en) | 2021-06-19 | 2024-11-05 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
US12007972B2 (en) | 2021-06-19 | 2024-06-11 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
CN113569298A (en) * | 2021-07-23 | 2021-10-29 | 徐丹梅 | Identity generation method and identity system based on block chain |
US11824999B2 (en) | 2021-08-13 | 2023-11-21 | Winkk, Inc. | Chosen-plaintext secure cryptosystem and authentication |
US20230206255A1 (en) * | 2021-12-27 | 2023-06-29 | Google Llc | Automated Customer Trust Measurement and Insights Generation Platform |
US12051066B2 (en) | 2022-03-15 | 2024-07-30 | Capital One Services, Llc | Systems and methods for validating asset destinations in blockchain networks |
WO2023231361A1 (en) * | 2022-05-30 | 2023-12-07 | 华为云计算技术有限公司 | Data transaction method, and apparatus |
US20240121608A1 (en) * | 2022-10-11 | 2024-04-11 | At&T Intellectual Property I, L.P. | Apparatuses and methods for facilitating dynamic badges and identities |
Also Published As
Publication number | Publication date |
---|---|
ES2990144T3 (en) | 2024-11-29 |
US20230129693A1 (en) | 2023-04-27 |
EP4375908A1 (en) | 2024-05-29 |
MX2018004693A (en) | 2018-11-29 |
HRP20241496T1 (en) | 2025-01-03 |
EP3362970A1 (en) | 2018-08-22 |
EP3362970C0 (en) | 2024-08-14 |
BR112018007449B1 (en) | 2024-02-20 |
EP4354311A2 (en) | 2024-04-17 |
EP4354311A3 (en) | 2024-05-22 |
HUE068146T2 (en) | 2024-12-28 |
US12244719B1 (en) | 2025-03-04 |
PH12018550046A1 (en) | 2018-10-15 |
PL3362970T3 (en) | 2025-01-07 |
CO2018004808A2 (en) | 2018-07-19 |
EP3362970A4 (en) | 2019-06-26 |
WO2017066002A1 (en) | 2017-04-20 |
ZA201802203B (en) | 2019-07-31 |
BR112018007449A2 (en) | 2018-10-23 |
EP3362970B1 (en) | 2024-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230129693A1 (en) | Transaction authentication and verification using text messages and a distributed ledger | |
US20220318355A1 (en) | Remote usage of locally stored biometric authentication data | |
US11930122B2 (en) | Network-based device authentication system | |
US11514155B1 (en) | Multifactor identity authentication via cumulative dynamic contextual identity | |
US10440019B2 (en) | Method, computer program, and system for identifying multiple users based on their behavior | |
US12250228B2 (en) | Targeted authentication queries based on detected user actions | |
US10242362B2 (en) | Systems and methods for issuance of provisional financial accounts to mobile devices | |
US20230125611A1 (en) | Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices | |
US11588804B2 (en) | Providing verified claims of user identity | |
JP7458661B2 (en) | Biometric digital signature generation for identity verification | |
IL290370B1 (en) | Risk mitigation for a cryptoasset custodial system using a hardware security key | |
JP2021099878A (en) | Control system, control method, and program | |
KR20230005213A (en) | System and method for data access control of individual user data using short-range transceiver | |
US11936649B2 (en) | Multi-factor authentication | |
US20240007293A1 (en) | Systems and methods for user identification and/or retrieval of user-related data at a local auxiliary system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: BANQU, INC., MINNESOTA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GADNIS, ASHISH;KEISER, JEFFREY A.;LINTON, MICHAEL;AND OTHERS;REEL/FRAME:059469/0819 Effective date: 20160928 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |