21
Au Kean Hoe: Method of secure payment over a network. Au Kean Hoe, WYATT David Alan, December 21, 2007: WO/2007/144708 (6 worldwide citation)

A secure transaction is carried out by a merchant application which provides details of the customer bank and the transaction amount to a host system (104) and receives a transaction identifier. The merchant provides the customer with the identifier. The customer uses the bank's online banking and e ...


22
Bao Q Tran: Systems and methods for providing interoperability among healthcare devices. Tran & Associates, November 21, 2017: US09820658 (5 worldwide citation)

A medical system includes a network; one or more medical data collection appliances coupled to the network, each appliance transmitting data conforming to an interoperable format; and a server coupled to the network to store data for each individual in accordance with the interoperable format.


23
Ian M Snyder, Morgan Teachworth: Location-based VoIP functions in a wireless network. Cisco Technology, Polsinelli, May 2, 2017: US09642167 (5 worldwide citation)

A wireless network can include one or more nodes distributed throughout a physical environment. The locations of client devices within the wireless network can be determined based on observing measurements of wireless signals exchanged between the nodes and the client devices. In some example embodi ...


24
Hans Martin Boesgaard Sørensen: Digital data authentication. Codesealer APS, Harness Dickey & Pierce, June 18, 2013: US08468351 (5 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


25
Jonathan D Main: Computerized banking device and method of use. White Welker & Welker, June 17, 2008: US07387237 (5 worldwide citation)

The present invention is banking device that has a slot on the top surface to accept coins and contains therein a locking reservoir for the collection of change. A money sorter is used to count the deposited money. The reservoir is “keyed” and can only be opened by the local bank, where an account i ...


26
Delaram Fakhrai, Mehran Moshfeghi: Method and system for improved security utilizing location based services for authentication. GOLBA, Adeli, December 22, 2015: US09218480 (5 worldwide citation)

An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a brid ...


27
Brian Colella: System for secure online selling, buying and bill pay in an electronic commerce setting. Ober Kaler, Royal W Craig, May 24, 2011: US07949609 (5 worldwide citation)

A method and system for biometric-secure online selling, buying and bill paying in electronic commerce and retail point-of-sale settings that also simplifies the checkout process and eliminates fraudulent transactions. The system relies on an exchange service provider (ESP) that hosts multiple serve ...


28
Ori Eisen, Raz Yalov: Methods and apparatus for securely displaying digital images. The 41st Parameter, Knobbe Martens Olson & Bear, July 11, 2017: US09703983 (4 worldwide citation)

The invention provides methods and apparatus for securing personalized or sensitive information appearing in digital images. Digital images containing information to be secured is processed and divided into a plurality of image cells. At least one image cell from the plurality of image cells is sele ...


29
Elazar Katz: Methods and systems for fraud containment. The 41st Parameter, Knobbe Martens Olson & Bear, April 25, 2017: US09633201 (4 worldwide citation)

Systems and methods for fraud containment are provided in accordance with an embodiment of the invention. A fraud event may be detected. One or more devices that may be used in perpetrating the fraud event may be detected. Additionally one or more potential fraud victims, who may be grouped into vic ...


30
Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St John Redmond: Methods and systems for secure and reliable identity-based computing. Advanced Elemental Technologies, Finnegan Henderson Farabow Garrett & Dunner, August 1, 2017: US09721086 (4 worldwide citation)

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement r ...