31
Hogl Christian: Method and device for transferring data from a first data processing unit to a second data processing unit. Hogl Christian, May 16, 2007: EP1785900-A1 (1 worldwide citation)

The method involves generating an encrypted input mask by a data processing device (1) e.g. server, and transmitting the mask to another data processing device (2) e.g. computer. The encrypted input mask is displayed by the data processing device (2). The encrypted input mask is decrypted in such a ...


32
Tak Markus: Installation-free chipcard reader for secure online banking. Kobil Systems, February 18, 2009: EP2026213-A2 (1 worldwide citation)

The method involves connecting a chip card reader (3) to a personal computer (PC) through a universal serial bus (USB) port (8), to perform data communication on the basis of protocol provided in an operating system. A browser plug-in is provided on an internet server so as to control the functions ...


33
William Earnest Kelley: Mobile device enrollment for online banking transactions. Bank of America Corporation, Michael A Springs, Moore and Van Allen PLLC, Peter B Stewart, March 24, 2015: US08990568 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods and computer program products for enrolling a user in a device identification program. In some embodiments, a system is configured to: receive device identification information from a mobile device, receive user information associated wit ...


34
Glass Randal, Salganicoff Marcos, Von Seelen Ulf Cahn: Procede et appareil de transmission et dauthentification sures de donnees biometriques via un reseau, Method and apparatus for securely transmitting and authenticating biometric data over a network. Iridian Technologies, Iridian Technologies, CASSAN MACLEAN, July 20, 2000: CA2358535 (1 worldwide citation)

A method and apparatus for collecting and securely transmitting biometric data over a network contains a sensor, preferably a camera, for collecting biometric data and code generating hardware and software. The camera data is digitized and a unique code which is a function of the digitized camera da ...


35
Scott Walter Guy: Systems and methods for facilitating transactions. Cross Match Technologies, Scott Walter Guy, MESSINGER MICHAEL V, January 27, 2005: WO/2005/008399 (1 worldwide citation)

Figure 1, is a diagram of a marketplace (100) that supports limited conventional transactions. In marketplace (100), users (102A-102D) carry out a variety of electronic transactions over network (120). User (102A) interfaces with a terminal (104A) at a merchant store in a retail transaction. Termina ...


36
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam, ROGITZ John L, February 23, 2006: WO/2006/019451 (1 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


37
Boesgaard, Sørensen Hans Martin: Digital data authentication. Boesgaard, Sørensen Hans Martin, INSPICOS, June 19, 2008: WO/2008/071795 (1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


38
Michael Burger, Mark Joseph Kapczynski: Systems and methods of identity protection and management. Consumerinfo com, Knobbe Martens Olson & Bear, January 10, 2017: US09542553

In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitor ...


39
Glenn Stuart Benson, Sean Croston: System and method for partner key management. JPMorgan Chase Bank N A, Goodwin Procter, March 28, 2017: US09608826

A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in hig ...


40
Matthew Brezina, Adam Smith: Presentation of organized personal and public data using communication mediums. YAHOO, James J DeCarlo, Greenberg Traurig, February 28, 2017: US09584343

Systems, methods and computer program products for providing information associated with an attachment (e.g., attachment received through an instant message system, online collaboration tool, electronic message and the like). A sidebar may allow a user to view comprehensive profile and content infor ...



Click the thumbnails below to visualize the patent trend.