1
James F Chen, Jieh Shan Wang: Electronic payment system and method. V ONE Corporation, Bacon & Thomas, December 31, 1996: US05590197 (838 worldwide citation)

A cyber wallet in the form of stored and protected account information, which may be "carried" on a tamper resistant portable electronic storage medium such as a smartcard, or stored on the customer's computer (or personal digital assistant, PCMCIA card, or the like) together with the browser/mosaic ...


2
Steven R Wright, Christopher T Brook: Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network. V One Corporation, Bacon & Thomas PLLC, July 4, 2000: US06084969 (256 worldwide citation)

A method and system allows encryption services can be added to an existing wireless two-way alphanumeric pager network by providing a pager proxy which is arranged to receive an encrypted message from a sending pager and re-packages it for re-transmission to the destination pager. The sending pager ...


3
James F Chen, Jieh Shan Wang: Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method. V ONE Corporation, Bacon & Thomas, July 21, 1998: US05784463 (243 worldwide citation)

A shared secret key distribution system which enables secure on-line registration for services provided by an application server through an application level security system or firewall utilizes an authentication token containing a server public key. The server public key is used to encrypt a client ...


4
James F Chen, Jieh Shan Wang, Christopher T Brook, Francis Garvey: Multi-access virtual private network. V One Corporation, Bacon & Thomas PLLC, May 9, 2000: US06061796 (231 worldwide citation)

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer ...


5
James F Chen, Jieh Shan Wang: Counterfeit-proof identification card. V ONE Corporation, Bacon & Thomas, December 2, 1997: US05694471 (193 worldwide citation)

A system and method for preventing counterfeiting of an identification or transaction card, and for verifying that the user of the card is an authorized user, involves the use of a unique, unalterable serial number and an exclusive OR function to generate a private key protected digital signature. T ...


6
James F Chen, Jieh Shan Wang, Christopher T Brook, Francis Garvey: Multi-access virtual private network. V One Corporation, Bacon & Thomas PLLC, December 5, 2000: US06158011 (124 worldwide citation)

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer ...


7
Jieh Shan Wang: Secure internet applications with mobile code. V One Corporation, Bacon & Thomas PLLC, June 14, 2005: US06907530 (79 worldwide citation)

A system and method for securing pathways to a remote application server involves a gateway or authentication server, and a mobile code authentication and encryption client available for download from the gateway or authentication server. Upon connection of a user's computing device to the authentic ...


8
Leroy K Stanton, Steven R Wright, Christopher T Brook, Russell F Loane: Session key recovery system and method. V One Corporation, Bacon & Thomas PLLC, June 12, 2001: US06246771 (75 worldwide citation)

A system and method for providing access to an encrypted communication involves recording the session during which the communication is encrypted, replaying the session to recover data used to recover a session key, accessing a server to retrieve secret information also used to generate the session ...


9
Chen James F, Wang Jieh Shan: Token distribution, registration, and dynamic configuration of user entitlement for and application level security system and method. V One Corporation, July 1, 1999: TW363154 (1 worldwide citation)

A shared secret key distribution system which enables secure on-line registration for services provided by an application server through an application level security system or firewall utilizes an authentication token containing a server public key. The server public key is used to encrypt a client ...


10
Chen James F, Wang Jieh Shan: Systeme de securite a niveaux dapplication et procede associe, Application level security system and method. V One Corporation, Ssl Services, RIDOUT & MAYBEE, July 3, 1997: CA2241052

A system and method for establishing secured communications pathways across an open unsecured network, without compromising the security of any parties to the communication, involves establishing secured gateways or firewalls between the Internet and any party which desires protection by 1.) using a ...