| CPC G06Q 10/0832 (2013.01) [G06F 16/1824 (2019.01); G06F 16/2379 (2019.01); G06F 16/955 (2019.01); G06K 7/1408 (2013.01); G06K 19/0717 (2013.01); G06Q 10/08 (2013.01); G06Q 10/0833 (2013.01); G06Q 10/08345 (2013.01); G06Q 10/0835 (2013.01); G06Q 10/08355 (2013.01); G06Q 20/382 (2013.01); G06Q 20/3825 (2013.01); G06Q 20/4014 (2013.01); G06Q 30/0283 (2013.01); G06Q 30/08 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/0869 (2013.01); H04L 9/3242 (2013.01); H04L 9/3263 (2013.01); H04L 9/50 (2022.05)] | 20 Claims |

|
1. A method comprising:
receiving, by a first computing device, a request from a second computing device to access the first computing device;
responsive to receiving the request from the second computing device to access the first computing device, generating, by the first computing device, challenge content;
sending, by the first computing device to the second computing device, the challenge content generated;
receiving, by the first computing device from the second computing device, a signature comprising a hash of the challenge content generated using a private key in which the private key corresponds to a public key associated with a blockchain address associated with a user account, and the blockchain address;
accessing, by the first computing device, the public key;
validating, by the first computing device, the signature using the public key; and
responsive to validating the signature, associating, by the first computing device, a characteristic of the user account with the blockchain address.
|