41
Pichler Johannes Prof Dr: Computer system and method for processing commercial transactions via data transmission lines. Pichler Johannes Prof Dr, April 28, 2004: EP1413966-A1

The system has a trusted data processing system that can be interconnected using an auxiliary tool on the seller's terminal via a second data line to the buyer's terminal and via a third data line to the seller's terminal for further data exchanges to compete the transaction between the seller's and ...


42
Robert S Alvin: Internet transactions based on user-specific information. February 12, 2013: US08374956

An Internet business transaction processor of the present invention has a distributed processing architecture which allows the processing load to be distributed among multiple parallel servers. The transaction processor of the present invention provides a virtual store front utilizing ÔÇťothers people ...


43
Chiu Yeong How: Internet business security method. Chiu Yeong How, September 17, 2008: EP1970848-A1

An internet business security method is disclosed. According to this method, first, a one-time password is generated based on a smart card that includes a chip to perform the processes of storing data, processing data and encoding/decoding data. Then, the one-time password is identified by the websi ...


44
Stanley C Baker, Laurence H Cooke: Internet business model for the production, market making and distribution of audio and multimedia programs. Michael Hetherington, Woodside I P Law Group, December 6, 2001: US20010049824-A1

An Internet business model for conducting distribution of audio and multimedia programs, including the buying and selling of the advertisment space in the programs, integrating the selected ads into the programs, and distributing them to the listeners/viewers, using the internet. The Method includes ...


45
Kee hwan Lee, Sun jung Kim, Gwi ho Lee, Hye ju Kim: Points trading service method and system therefor. Sughrue Mion Zinn Macpeak & Seas Pllc, December 20, 2001: US20010054006-A1

A points trading service method is provided and includes the steps of (a) collecting information on a customers' trading points total from a member shop and storing the information in a customer database; (b) receiving information on a points trade request from a customer; and (c) trading points wit ...


46
Chen Liyu: Method for authenticating the dwelling address information in the internet user registration process. Chen Liyu, wangji, October 17, 2007: CN200710040831

The present invention relates to a method for residence address information authentication during registration process of an internet user. Said method comprises the steps: an authentication administrator connecting an authentication controller and inputting residence address information of an user ...


47
Jiang Weifeng, Ye Chaoyang: System and method for realizing mobile-fixed convergence home business based on IMS network. Zhejiang of China Mobile Communications Corporation, Gan Weimin, September 23, 2009: CN200910096844

The invention provides a system and a method for realizing mobile-fixed convergence home business based on an IMS network. The system comprises a CSCF network element, an HSS network element and an SBC network element, an IMS core network realizes the Internet business access through a fixed broadba ...


48
Wang Wendong, Gong Xiangyang, Que Xirong, Wang Ruisi: Real-time context perceiving and classification marking method of internet business flow. Beijing University of Posts and Telecommunications, Xia Xianfu, December 23, 2009: CN200910089415

The invention provides a real-time context perceiving and classification marking method of internet business flow, comprising the following steps: analyzing IP data packet received from a business resource terminal; perceiving business types thereof; dynamically perceiving importance of the each IP ...


49
Helsper David, Maicon Dennis: Fraud risk advisor. Digital Envoy, July 25, 2007: EP1810235-A2

A fraudulent business transaction application (FBTA) is provided for monitoring application based fraud. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and ident ...


50
Greene Todd, Helsper David: Fraud analyst smart cookie. Digital Envoy, January 7, 2009: EP2011074-A1

A fraudulent business transaction application (FBTA) is provided in embodiments of the present invention for monitoring fraudulent transactions. When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine ...



Click the thumbnails below to visualize the patent trend.