91
Avi Turgeman: Method, device, and system of protecting a log-in process of a computerized service. BioCatch, Eitan Mehulal & Sadot, January 31, 2017: US09558339 (1 worldwide citation)

Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerize ...


92
Yun Shen Song, Catherine Lew, Alexander Song, Victoria Song: Anti-crime online transaction system. Fulbright & Jaworski, May 18, 2010: US07717337 (1 worldwide citation)

A method to enforce anti-money laundering, anti-terrorist financing and other anti-crime measures in compliance with the Bank Secrecy Act and the USA PATRIOT Act in the USA or equivalent laws in other countries, and to reduce fraud in e-commerce activities such as online banking, trading, money serv ...


93
Hogl Christian: Method and device for transferring data from a first data processing unit to a second data processing unit. Hogl Christian, May 16, 2007: EP1785900-A1 (1 worldwide citation)

The method involves generating an encrypted input mask by a data processing device (1) e.g. server, and transmitting the mask to another data processing device (2) e.g. computer. The encrypted input mask is displayed by the data processing device (2). The encrypted input mask is decrypted in such a ...


94
William Earnest Kelley: Mobile device enrollment for online banking transactions. Bank of America Corporation, Michael A Springs, Moore and Van Allen PLLC, Peter B Stewart, March 24, 2015: US08990568 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods and computer program products for enrolling a user in a device identification program. In some embodiments, a system is configured to: receive device identification information from a mobile device, receive user information associated wit ...


95
Lawrence N Friedman, Yedidya Dotan, Gareth Richards, Daniel V Bailey, William M Duane, John G Brainard: Situationally aware authentication. EMC IP Holding Company, BainwoodHuang, May 30, 2017: US09667611 (1 worldwide citation)

Improved techniques involve selecting a set of authentication factors from among multiple factors based on a current situation and information about how well the multiple authentication factors have worked in similar situations in the past. Along these lines, when an authentication system performs a ...


96
Glass Randal, Salganicoff Marcos, Von Seelen Ulf Cahn: Procede et appareil de transmission et dauthentification sures de donnees biometriques via un reseau, Method and apparatus for securely transmitting and authenticating biometric data over a network. Iridian Technologies, Iridian Technologies, CASSAN MACLEAN, July 20, 2000: CA2358535 (1 worldwide citation)

A method and apparatus for collecting and securely transmitting biometric data over a network contains a sensor, preferably a camera, for collecting biometric data and code generating hardware and software. The camera data is digitized and a unique code which is a function of the digitized camera da ...


97
Scott Walter Guy: Systems and methods for facilitating transactions. Cross Match Technologies, Scott Walter Guy, MESSINGER MICHAEL V, January 27, 2005: WO/2005/008399 (1 worldwide citation)

Figure 1, is a diagram of a marketplace (100) that supports limited conventional transactions. In marketplace (100), users (102A-102D) carry out a variety of electronic transactions over network (120). User (102A) interfaces with a terminal (104A) at a merchant store in a retail transaction. Termina ...


98
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam, ROGITZ John L, February 23, 2006: WO/2006/019451 (1 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


99
Boesgaard, Sørensen Hans Martin: Digital data authentication. Boesgaard, Sørensen Hans Martin, INSPICOS, June 19, 2008: WO/2008/071795 (1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


100
Fleishman Jack, Fuerstenberg Zack: Online payment transfer and identity management system and method. Certapay, Fleishman Jack, Fuerstenberg Zack, WILSON Jenna L, August 1, 2002: WO/2002/059847 (1 worldwide citation)

A person-to-person (P2P) payment platform and identity management system which facilitates online banking by allowing consumers to send and receive money in real-time, with no special registration outside of the users' existing banking relationship, and under the security, brand and control of their ...



Click the thumbnails below to visualize the patent trend.