41
Jeffrey L Kapp, Martin A Tiernan, Zhi Qiang Wei, Xiao Qing Zhang, Cheng Zhou: Unlocking electronic devices using touchscreen input gestures. International Business Machines Corporation, Nicholas D Bowman, June 13, 2017: US09679121 (1 worldwide citation)

A computer implemented method for detecting input gesture events on a touchscreen of an electronic device and for unlocking the electronic device is disclosed. The method may include displaying, while the electronic device is in a locked state, a plurality of guidance lines on the touchscreen of the ...


42
Matthew J Homier, Craig A Heath, Thomas E Hurlbutt, Jose M Resendiz: Methods and systems for integrated and automated financial services. Intuit, Vista IP Law Group, December 10, 2013: US08606708 (1 worldwide citation)

Systems, methods and articles of manufacture for a computerize method of providing financial management to a user by integrating financial data from a plurality of sources such as online financial services. The system analyzes the financial data from a plurality of sources together to determine fina ...


43
James E Whitelaw: Method and system for obscuring and securing financial data in an online banking application. Intuit, Park Vaughan Fleming & Dowler, Shun Yao, October 18, 2011: US08041127 (1 worldwide citation)

One embodiment of the present invention provides a system that obscures critical information communicated over a network. During operation, the system receives a set of data and produces a file which represents a character in the data with at least one image, thereby avoiding representing the data i ...


44
Georg Fasching: Methods and apparatus for providing centralized web services for funds transfer system. MasterCard International, Buckley Maschoff & Talwalkar, September 18, 2012: US08271362 (1 worldwide citation)

A method of operating a centralized web services computer system includes providing a standard interface for financial institutions (FIs) and for funds transfer service providers that participate in a remittance system. The centralized web services computer system may also provide services such as i ...


45
Avinash Kalgi: Hybrid applications utilizing distributed models and views apparatuses, methods and systems. Visa International Service Association, Loeb & Loeb, February 28, 2017: US09582598 (1 worldwide citation)

The Hybrid Applications Utilizing Distributed Models And Views Apparatuses, Methods And Systems (“HAP”) transform hybrid application user inputs using HAP components into web-view secured data populated application views. In some implementations, the disclosure provides a processor-implemented metho ...


46
Glenn Grossman: Providing information from use of readable indicia with mobile device. Bank of America Corporation, Michael A Springs, Moore and Van Allen PLLC, Patrick B Horne, January 27, 2015: US08939355 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods and computer program products for providing information from use of readable indicia. Embodiments may include receiving usage information corresponding to a plurality of readable indicia read at one or more points of transaction during on ...


47
Kimberly Belle Summerrow, Faith A Tucker, John Franklin Tuders: Entry level banking products. Bank of America Corporation, Banner & Witcoff, Michael A Springs, February 11, 2014: US08650123 (1 worldwide citation)

Entry level banking products that may be offered through traditional sales channels (e.g., retail banking locations, online, and the like) or alternative sales channels (co-placement or co-branded with a third-party), to new customers who traditionally do not rely on conventional or mainstream check ...


48
Joseph B Castinado, Phillip W Mork, Kimberly C Turner: System for authentication levels associated with a wearable device. BANK OF AMERICA CORPORATION, Michael A Springs, Moore & Van Allen PLLC, W Kevin Ransom, January 24, 2017: US09554274 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods, and computer program products for authentication levels associated with a wearable device. The system is configured to receive an indication that a user is in possession of the wearable device; authenticate the wearable device; receive a ...


49
Chik Weng Leong, Chee Hoo Lau, Yuen Len Kong, Tau Wei Phang, Hoon Sin Cheong: Method of controlling access to an internet-based application. E LOCK CORPORATION SDN BHD, Ladas & Parry, April 18, 2017: US09628460 (1 worldwide citation)

A novel method of dealing with the problem of phishing, pharming, key-logging and man-in-the-middle attacks on internet-based applications which require the submission of valid login credentials, by permitting a user to control access to an internet-based application (3) (such as an internet banking ...


50
Avi Turgeman: Method, device, and system of protecting a log-in process of a computerized service. BioCatch, Eitan Mehulal & Sadot, January 31, 2017: US09558339 (1 worldwide citation)

Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerize ...



Click the thumbnails below to visualize the patent trend.