Invented by Robert Cantrell, David M. Nelms, Sid Shake, Charles Lobo, Donald R. High, Todd Mattingly, Brian McHale, John J. O’Brien, Bruce Wilkinson, Walmart Apollo LLC
The Walmart Apollo LLC invention works as followsThe following is an example of how to perform the concepts: obtaining first biometric information of a user, hashing it to create a hash, registering the user in a digital credit system with the hash created; obtaining second biometric information of the user, hashing it to create a hash. Comparing the hash of the first and second authentication factors; and proceeding to the transaction on the basis of the comparison.
Background for Blockchain-based system and method of biometric credit
The present disclosure is related to payment transactions and, more specifically, to biometric credit systems and methods based on Blockchain.
Biometric information such as fingerprints or the shape of a palm, eye (iris, retina), voice, face shape, signature dynamics, (e.g. speed of movement, accelerations and pressure applied, inclination) may be used to identify and authenticate a person. Biometric templates (samples of biometric data) from a person can be stored in a computer database, and then compared with the biometric data of that person. The person’s identity is verified by comparing the biometric template to the received biometric information of the person.
Blockchain technology is an authentication system that uses peer-to-peer communication to authenticate valuable digital items. It allows direct online interaction between two or multiple parties, without the need for a trusted intermediary. The system may use a peer to peer network, and the timestamps of actions are hashed together into an ongoing hash-based code proof-of work chain. This creates a record which cannot be altered without redoing proof-ofwork. The longest chain on the peer to peer network is proof that the data had to exist at the time for it be hashed, thus proving a sequence of events was witnessed. Blockchain technology allows digitized items to be used as intended, using cryptographic proof rather than trust. This means that any two or three willing parties can use the content.
The current Blockchain systems are not able to provide a system of biometric credit. It is necessary to develop systems and methods based on Blockchain for biometric credit, allowing payment transactions for online or store purchases.
The system disclosed herein includes a computing device with a biometric capture unit that captures first biometric information of a user. It also receives a biometric authentication factor, which contains the biometric information of the users. This computing device is configured to receive and store this biometric authentication factor; to hash it to create a hash and to register the user to a digital credit scheme using the hash. The second computing unit is configured to receive the second verification factor from the third device, hash the second authenticity factor to generate another hash, and compare the generated second hash to the first hash. The third computing device can also be configured to receive the comparison of the first hash with the second hash, and then proceed a user-initiated transaction based on that comparison.
Another System Configured as Disclosed Herein” can include a computing device with a biometric data capture unit. The first computing unit is configured to: collect first biometric information of a user using the biometric data collection unit. A second computing unit with a secondary biometric data capture unit is configured to: collect second biometric information of a user via the unit’s second biometric capturing unit, generate a third authentication factor that includes the biometrics of the user and hash it to create a fourth hash. Respond to the multiparty transaction by using the second hash. A third computing device with a biometric data-capturing unit is configured to: capture the third data of a user using the biometric data-capturing unit, generate a second authentication factor that includes the biometric information of the user, hash the second authentication factor to create a secondary hash and respond to the multiparty transaction by using the secondary hash. The multi-party transaction involves the first, second and even third users.
The method can include obtaining first biometric information of a user, hashing it to create a hash, registering the user in a digital credit system with the hash created; obtaining second biometric information of the user, hashing it to create a hash. Comparing the hash of the first and second authentication factors; and completing the transaction on the basis of the comparison.
Additional features of the disclosure are described in the following description. In part, they will be evident from the description or can be learnt by applying the principles disclosed here.” Features and advantages of disclosure can be obtained and realized by using the instruments and authentications specifically mentioned in the appended claim. The following description and the appended claims will make these and other features more apparent, or they can be learned through the application of the principles outlined here.
Systems or methods described in this disclosure may allow a person be treated like a credit card. The credit is pre-approved based on the biometric data (e.g. fingerprints or eye patterns) of the individual. The transactions can be made without cash, a credit card or any other physical item. They also do not have to pay the fees associated with credit cards or carry cash. A biometric scan can be used to generate a hash that may then be used in future transactions. This hash can be linked to a person’s account. The biometric system disclosed can recognize a person using biometric data, and then authorize various money services, such as paying for goods, transferring funds, receiving funds, etc. Once a biometric system has been used to identify a person, they can purchase items that are restricted by age and get prescriptions from a pharmacist.
In some embodiments, disclosed systems and method may be applied to a multi-party transaction. A three-party transaction, for example, may involve a customer, a sales associate, and the manager of the shop, all of whom are involved in receiving returned products. The customer, the associate receiving the product in the store, and the manager can all provide their biometric hash. When a customer tries to buy age-restricted products, the associate at the POS (points of sale) has to be older than 21. The system disclosed can allow the customer’s biometric hash to be provided as would an under-age employee in the store, and the manager (over 21).
The disclosed systems and methods can also be used to allow a child to purchase items that were restricted on the account of their parent. The disclosed system allows the parent to enter their biometric hash, and the child’s to enter theirs to complete the transaction.
Another example of multiple parties using the disclosed systems and method(s) may allow roommates to pool money for purchases, and approve the purchase for one roommate when the other(s are) remote. Remote roommates can approve the transaction by using biometric hash data. This is done with a smart device that includes a biometric scanner.
The systems disclosed herein allow for remote digital authentication. The blockchain can be used in conjunction with biometric data to make a person a biometric card. The disclosed systems and method may also allow users to request payment via their smart devices from a self-checkout or kiosk.
The systems disclosed herein may be used as a biometric payment system. The digital credit system of a retailer can be registered by a customer. A customer’s account can be created by registering with the usual information such as name age address passwords etc. Further biometric information can be obtained from the customer. This includes an iris scan, fingerprints, palm prints, hand geometry or facial scan. One or more biometric pieces can be combined to create a hash. Create the account for the customer and associate the hash with it. Store employees and other people can also have accounts. For example, a customer might be in the store of a retailer to complete a purchase. The transaction is created, and it’s associated with the account of the customer. It is possible to set the transaction up so that it requires multi-party approval. To complete the transaction, the hashes of the biometric information from the multiple parties must be verified. To set up a transaction, for example, a smartcontract with the biometric hash of the customer may be created. Other parties can scan their biomarker to gain access to their crypto currency and accounts. Smart contracts may have an expiration date. The smart contract application can be installed on devices with GPS, biometric sensors and clocks. The customer can be present in the store and confirm their presence by scanning their biomarker. Smart contracts can use biometric inputs from the customer to transfer crypto currency into the account of the customer with a specified time period to spend it. Store employees can use the hash of a customer’s biometric data to approve transactions.
In certain embodiments, the transaction request can be broadcasted through a mesh network or peer-topeer network, between devices (e.g. device for the customer A, device to the customer B, device to the store associate, and device to the store manager), until the entire group of devices, or devices within a specified radius from the initial requesting devices, has received the request. The responses are sent to the requesting device as the devices receive the transaction request. Each response provides an answer on how to complete the request. The device that is requesting the response aggregates, analyzes, and decides on how to move information and resources in order to complete the transaction. This can sometimes require information to be transferred from one device to another through a peer-to-peer system.
In some cases, peer-to-peer verification may be needed to allow online interactions between devices directly without having to go through trusted intermediaries. This peer-to-peer system can timestamp transactions (e.g. sending a request for a transaction from device A to B), and hash the actions to create an ongoing chain hash-based proof of work code. The record created cannot be altered without redoing proof of work. The longest chain on the peer to peer network proves the sequence of events. The integrity of the digitalized document was maintained. In one embodiment, the authentication can utilize one or several aspects of a conventional blockchain. The authentication can allow two or more parties (e.g. a customer and a manager of a retail store) to use the content. The authentication may allow two or more willing parties (e.g., a customer, a store associate and a store manager) to use the content (e.g.
In some configurations, communication between devices (e.g. device for a roommate A, roommate B and roommate C) may take the form a blockchain. Each request and response from devices will be added to the blockchain ledger. The blockchain is updated as each device performs an action, such as sending a request for a transfer, sending a reply to a request for a transfer, or sending the capabilities to handle a particular transaction. The request, response or other action will be hashed and added to the previous blockchain. The new updated blockchain is distributed to all devices in the group.
The devices that are part of the peer-topeer network can be either a database or communication device used by an individual user. In one configuration, the device sending the request for a transaction could be an electronic gadget (such as a tablet or smartphone) that is used by the user initiating the transaction. In a second configuration, the devices could be smart home devices configured to respond to a request for completing a transaction. In a third configuration, devices can be different types, like a kiosk at a retailer’s store or smart home devices for communication, making requests and generating answers to those requests.
The information (e.g. transaction requests and capabilities to handle transaction requests as well as responses to transactions requests) will be shared in a decentralized peer-to-peer network. All devices are capable of sharing and distributing transactional information. A block chain system of authentication and decentralization can authenticate, share, and manage this system. If a child wants to buy an item that is restricted by age for his family, they can send a block chain as a request to the other devices. This request may include the name of the product to be bought, the price, the quantity, the type, the expiration date, the name of the store, the time stamp, the digital currency information and authentication information. This request can also include supplementary information such as “is the store located near my home?” Other devices in the group can receive the transmission and authenticate it, then provide more information to answer the transaction request. A parent may approve the purchase of an item while another parent may want to alter the quantity. Finaly, a device within a group can complete the transaction by relying on responses from the other devices. This causes an update of the previous block in the blockchain which contains the “slave”. The second device (second) updates the original “master” block. Initial block (the request for transaction). So, the information can be shared accurately between devices, including the updates and necessary information.Click here to view the patent on Google Patents.