CPC G06Q 40/04 (2013.01) [G06Q 20/065 (2013.01); G06Q 20/3678 (2013.01); G06Q 20/3821 (2013.01); G06Q 20/3829 (2013.01); G06Q 20/4014 (2013.01)] | 3 Claims |
1. A computer executable method for controlling secure access to multiple protected services, said protected services comprise a protected cryptocurrency conversion service, the method comprising extracting computer readable instructions stored on a non-transitory medium and executing the computer readable instructions on a processor, wherein execution of the computer readable instructions by the processor:
detects a selection of the protected cryptocurrency conversion service from within an online portal running on a mobile device;
detects a request for access to the protected cryptocurrency conversion service, the protected cryptocurrency conversion service for establishing an electronically executable communication connection with a cryptocurrency conversion exchange;
based on the request, accesses a webpage hosting the protected cryptocurrency conversion service;
identifies a username input field and a password input field on the webpage;
in response to identifying the username and password input fields, triggers activation of a secure application program interface (“API”) accessible via the webpage that detects an activation of the protected cryptocurrency conversion service on the mobile device;
obtains, at the secure API, biometric authentication before using a second protected application, wherein, once the biometric authentication is obtained, the secure API accesses an authentication token, said authentication token stored in a digital wallet;
bypasses, using the secure API, the username field and the password field that secure access to a service provided by a first protected cryptocurrency conversion application, wherein the service provided is the protected cryptocurrency conversion service;
activates, using the second protected application, the first protected cryptocurrency conversion application;
automatically validates, using a smart contract running on a distributed ledger, credentials provided by a password generation application, wherein: the credentials comprise a digital signature, said digital signature provided by the password generation application; and the smart contract automatically determines that the digital signature is associated with a user profile that is authorized to access protected services;
generates, using said password generation application, a dynamic password using the authentication token, wherein the dynamic password is different for each access request to the protected cryptocurrency conversion service;
validates, using a password validation application, the dynamic password, the password validation application uses the secure API to interact with the smart contract that controls access to the protected cryptocurrency conversion service; and
in response to validating the dynamic password with the password validation application, the smart contract contains programming that allows access to the protected cryptocurrency conversion service.
|