91
Justin Pike: Authentication method and system. LICENTIA GROUP, MYPINPAD, Troutman Sanders, Ryan A Schneider, Christopher C Close Jr, January 24, 2017: US09552465

The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image ...


92
David M Grigg, Joseph Neil Johansen, Michael E Toth, Daniel Lynn Carpenter, Hood Qaim Maqami, Carrie Anne Hanson, Elizabeth S Votaw: Sorting mobile banking functions into authentication buckets. Bank of America Corporation, Michael A Springs, Moore & Van Allen PLLC, Peter B Stewart, March 14, 2017: US09595025

Embodiments are directed to systems, methods and computer program products for sorting mobile banking functions into authentication buckets. Embodiments determine, for each of a plurality of mobile banking functions, a corresponding authentication buckets, where each authentication bucket correspond ...


93
Clay von Mueller, Scott R Yale, Patrick K Hazel, Paul Catinella: System and method for updating a transactional device. VERIFONE, Sheppard Mullin Richter & Hampton, Daniel Yannuzzi, Hector Agdeppa, November 14, 2017: US09818108

Systems and methods for updating a transactional device having a reader is provided. In one embodiment, the method includes: reading data on a command token, wherein the data is stored in a memory device; identifying the token as a command token based on the data; generating transaction data that in ...


94
Carrie Anne Hanson, David M Grigg, Kim Stittsworth: Accessing secure areas based on identification via personal device. Bank of America Corporation, Banner & Witcoff, Michael A Springs, August 15, 2017: US09734643

Systems and methods for using proximity positioning systems to determine a location of a user, identify the user and provide additional services and/or functionality to the user based on the determined location and/or identity are presented. In some examples, a low-power radio signal emitted from a ...


95
Darren E Canavor, Jesper M Johansson: Managing security credentials. AMAZON TECHNOLOGIES, Thomas Horstemeyer, September 19, 2017: US09767262

Disclosed are various embodiments for managing security credentials. In one embodiment, a request for a security credential is obtained from a client and is stored in association with a user account. Knowledge-based questions are provided to the client in response to the request. At least one of the ...


96
Eric H Greenberg, Mark E Rolston, Jared L Ficklin, John M Garris, Matthew J Santone: Authoring tool for the mixing of cards of wrap packages. Wrap Media, Beyer Law Group, February 28, 2017: US09582917

An authoring tool for authoring a set of cards of a first wrap package including a card mixing tool for mixing a card from a second wrap package into the first wrap package. The authoring tool further includes a set of authoring component tools for selectively adding components to the one more cards ...


97
Michael Emil Ogrinz, Evan Sachs, Stephen A Corrado, Joseph Benjamin Castinado, Matthew Hsieh: Security implementation for resource distribution. Bank of America Corporation, Michael A Springs, Moore & Van Allen PLLC, Peter B Stewart, August 22, 2017: US09743272

A system for securely distributing and managing resources includes a smart device, a resource management device, and a third party system, each having communication interfaces, and memory device, and processing device. In the resource management device, the processing device is configured to: receiv ...


98
Elizabeth S Votaw, Charles Jason Burrell, Carrie Anne Hanson, Alicia C Jones, Michael Patrick Lynch, Hood Qaim Maqami: Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device. Bank of America Corporation, Michael A Springs, Moore & Van Allen PLLC, Peter B Stewart, March 14, 2017: US09595032

Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) det ...


99
Ezra Spiro, Joseph Staehle, Andrew Levine, Juan Ricafort, Alvaro Morales: Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications. Palantir Technologies, Knobbe Martens Olson & Bear, April 25, 2017: US09635046

A data analysis system receives potentially undesirable electronic communications and automatically groups them in computationally-efficient data clusters, automatically analyze those data clusters, automatically tags and groups those data clusters, and provides results of the automated analysis and ...


100
Elizabeth S Votaw, Charles Jason Burrell, Carrie Anne Hanson, Alicia C Jones, Michael Patrick Lynch, Hood Qaim Maqami: Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device. Bank of America Corporation, Michael A Springs, Moore & Van Allen PLLC, Peter B Stewart, March 7, 2017: US09589261

Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) det ...



Click the thumbnails below to visualize the patent trend.