1
James F Chen, Jieh Shan Wang: Electronic payment system and method. V ONE Corporation, Bacon & Thomas, December 31, 1996: US05590197 (838 worldwide citation)

A cyber wallet in the form of stored and protected account information, which may be "carried" on a tamper resistant portable electronic storage medium such as a smartcard, or stored on the customer's computer (or personal digital assistant, PCMCIA card, or the like) together with the browser/mosaic ...


2
James F Chen, Jieh Shan Wang: Application level security system and method. Virtual Open Network Environment, Bacon & Thomas, February 11, 1997: US05602918 (316 worldwide citation)

A system and method for establishing secured communications pathways across an open unsecured network, without compromising the security of any parties to the communication, involves establishing secured gateways or firewalls between the Internet and any party which desires protection by 1.) using a ...


3
James F Chen, Jieh Shan Wang: Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method. V ONE Corporation, Bacon & Thomas, July 21, 1998: US05784463 (243 worldwide citation)

A shared secret key distribution system which enables secure on-line registration for services provided by an application server through an application level security system or firewall utilizes an authentication token containing a server public key. The server public key is used to encrypt a client ...


4
James F Chen, Jieh Shan Wang, Christopher T Brook, Francis Garvey: Multi-access virtual private network. V One Corporation, Bacon & Thomas PLLC, May 9, 2000: US06061796 (231 worldwide citation)

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer ...


5
James F Chen, Jieh Shan Wang: Counterfeit-proof identification card. V ONE Corporation, Bacon & Thomas, December 2, 1997: US05694471 (193 worldwide citation)

A system and method for preventing counterfeiting of an identification or transaction card, and for verifying that the user of the card is an authorized user, involves the use of a unique, unalterable serial number and an exclusive OR function to generate a private key protected digital signature. T ...


6
James F Chen, Jieh Shan Wang, Christopher T Brook, Francis Garvey: Multi-access virtual private network. V One Corporation, Bacon & Thomas PLLC, December 5, 2000: US06158011 (124 worldwide citation)

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer ...


7
Jieh Shan Wang: Secure internet applications with mobile code. V One Corporation, Bacon & Thomas PLLC, June 14, 2005: US06907530 (79 worldwide citation)

A system and method for securing pathways to a remote application server involves a gateway or authentication server, and a mobile code authentication and encryption client available for download from the gateway or authentication server. Upon connection of a user's computing device to the authentic ...


8
Jieh Shan Wang: Secure internet applications with mobile code. Bacon & Thomas Pllc, July 25, 2002: US20020099940-A1

A system and method for securing pathways to a remote application server involves a gateway or authentication server, and a mobile code authentication and encryption client available for download from the gateway or authentication server. Upon connection of a user's computing device to the authentic ...