1
James F Chen, Jieh Shan Wang: Electronic payment system and method. V ONE Corporation, Bacon & Thomas, December 31, 1996: US05590197 (838 worldwide citation)

A cyber wallet in the form of stored and protected account information, which may be "carried" on a tamper resistant portable electronic storage medium such as a smartcard, or stored on the customer's computer (or personal digital assistant, PCMCIA card, or the like) together with the browser/mosaic ...


2
James F Chen, Jieh Shan Wang: Application level security system and method. Virtual Open Network Environment, Bacon & Thomas, February 11, 1997: US05602918 (316 worldwide citation)

A system and method for establishing secured communications pathways across an open unsecured network, without compromising the security of any parties to the communication, involves establishing secured gateways or firewalls between the Internet and any party which desires protection by 1.) using a ...


3
James F Chen, Jieh Shan Wang: Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method. V ONE Corporation, Bacon & Thomas, July 21, 1998: US05784463 (243 worldwide citation)

A shared secret key distribution system which enables secure on-line registration for services provided by an application server through an application level security system or firewall utilizes an authentication token containing a server public key. The server public key is used to encrypt a client ...


4
James F Chen, Jieh Shan Wang, Christopher T Brook, Francis Garvey: Multi-access virtual private network. V One Corporation, Bacon & Thomas PLLC, May 9, 2000: US06061796 (231 worldwide citation)

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer ...


5
James F Chen, Jieh Shan Wang: Counterfeit-proof identification card. V ONE Corporation, Bacon & Thomas, December 2, 1997: US05694471 (193 worldwide citation)

A system and method for preventing counterfeiting of an identification or transaction card, and for verifying that the user of the card is an authorized user, involves the use of a unique, unalterable serial number and an exclusive OR function to generate a private key protected digital signature. T ...


6
James F Chen, Jieh Shan Wang, Christopher T Brook, Francis Garvey: Multi-access virtual private network. V One Corporation, Bacon & Thomas PLLC, December 5, 2000: US06158011 (124 worldwide citation)

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer ...


7
James F Chen, Chen Qian, Zilong Tang: Method and system for interoperable identity and interoperable credentials. DrFirst com, Brake Hughes Bellermann, December 25, 2018: US10162960

The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management ...


8
James F Chen, Chen Qian, Zilong Tang: Method and system for interoperable identity and interoperable credentials. DrFirst com, Brake Hughes Bellermann, April 10, 2018: US09940452

The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management ...


9
Zilong Tang, James F Chen, Chen Qian: Self-consistent structures for secure transmission and temporary storage of sensitive data. DrFirst com, Brake Hughes Bellermann, February 12, 2019: US10204236

Implementations provide self-consistent, temporary, secure storage of information. An example system includes fast, short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each ...