1
John Philip Pettitt: Method and system for controlling distribution of software in a multitiered distribution chain. Cybersource Corporation, Sawyer & Associates, January 26, 1999: US05864620 (158 worldwide citation)

A system and method and system for controlling distribution of software to an user in a multitiered distribution chain. The system includes at least one entity that distributes the software in a locked software container, and includes means for receiving a request from the user to use the software. ...


2
Michael Lewis, Frank King, Thomas Arnold, William Wright, John Pettit: Method and apparatus for evaluating fraud risk in an electronic commerce transaction. Cybersource Corporation, Hickman Palermo Truong & Becker, Christopher J Palmero, July 22, 2008: US07403922 (153 worldwide citation)

A technique for evaluating fraud risk in e-commerce transactions between consumer and a merchant is disclosed. The merchant requests service from the system using a secure, open messaging protocol. An e-commerce transaction or electronic purchase order is received from the merchant, the level of ris ...


3
Thomas Andrew Arnold, John Philip Pettitt, Jesse Noel Rendleman Jr, Robert Lincoln Lewis Jr: Method and system for delivering digital products electronically. Cybersource Corporation, September 11, 2001: US06289452 (80 worldwide citation)

A system and method for delivering a digital product electronically is disclosed. The system and method comprises providing an electronic license certificate (ELC) from an enduser to a server and then validating the ELC by the server. Finally, the method and system includes sending the digital produ ...


4
Vishnu Shankar, Jason Eaton: System and method for generating encryption seed values. Cybersource Corporation, Hickman Palmero Truong & Becker, John D Henkhaus, April 24, 2007: US07209561 (48 worldwide citation)

A method for generating a seed value for use in symmetric encryption includes creating and storing a first data set and generating a hashed value based on the first data set. A replacement position in the first data set is selected, and at least a portion of the hashed value is written into the firs ...


5
John Philip Pettitt: Method and system for detecting fraud in a credit card transaction over a computer network. CyberSource Corporation, Hickman Palermo Truong & Becker, August 22, 2006: US07096192 (32 worldwide citation)

A method and system for detecting fraud in a credit card transaction between consumer and a merchant over the Internet. The method and system comprises obtaining credit card information relating to the transaction from the consumer; and verifying the credit card information based upon a variety of p ...


6
Michael Lewis, Frank King, Thomas Arnold, William Wright, John Pettit: Method and apparatus for evaluating fraud risk in an electronic commerce transaction. Cybersource Corporation, Hickman Palermo Truong & Becker, June 28, 2011: US07970701 (30 worldwide citation)

A technique for evaluating fraud risk in e-commerce transactions between consumer and a merchant is disclosed. The merchant requests service from the system using a secure, open messaging protocol. An e-commerce transaction or electronic purchase order is received from the merchant, the level of ris ...


7
William Wright, Hung Tzaw Hu: Method and apparatus for evaluating fraud risk in an electronic commerce transaction. CyberSource Corporation, Kilpatrick Townsend & Stockton, September 13, 2011: US08019678 (22 worldwide citation)

Transaction information is received and applied to multiple fraud risk mathematical models that each produce a respective raw score, which are transformed with respective sigmoidal transform functions to produce optimized likelihood of fraud risk estimates to provide to a merchant. Respective fraud ...


8
Eric Gordon Vortriede: Non-extensible thin server that generates user interfaces via browser. CyberSource Corporation, Marcel K Bingham, Hickman Palermo Truong & Becker, April 10, 2001: US06216153 (21 worldwide citation)

A system and method for displaying and processing information on a computer or communicating with a remote server is disclosed. The method and system include providing a browser and providing a thin server. The browser is configured to allow a user to view information and enter information. The thin ...


9
John Philip Pettitt: Method and system for detecting fraud in a credit card transaction over the internet. Cybersource Corporation, Reed Smith, Carina M Tan, Craig P Opperman, July 6, 2010: US07752084 (18 worldwide citation)

A computer-implemented method is disclosed, where first information that is related to a current commercial transaction that is being evaluated for fraud is received, either directly or indirectly, from a consumer through an online service or internet. The computer obtains an internet address from w ...


10
William Wright, Hung Tzaw Hu: Method and apparatus for evaluating fraud risk in an electronic commerce transaction. Cybersource Corporation, Hickman Palermo Truong & Becker, January 4, 2011: US07865427 (14 worldwide citation)

According to one aspect, transaction information is received and applied to multiple fraud risk mathematical models that each produce a respective raw score, which are transformed with respective sigmoidal transform functions to produce optimized likelihood of fraud risk estimates to provide to a me ...