41
Tak Markus: Installation-free chipcard reader for secure online banking. Kobil Systems, February 18, 2009: EP2026213-A2 (1 worldwide citation)

The method involves connecting a chip card reader (3) to a personal computer (PC) through a universal serial bus (USB) port (8), to perform data communication on the basis of protocol provided in an operating system. A browser plug-in is provided on an internet server so as to control the functions ...


42
William Earnest Kelley: Mobile device enrollment for online banking transactions. Bank of America Corporation, Michael A Springs, Moore and Van Allen PLLC, Peter B Stewart, March 24, 2015: US08990568 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods and computer program products for enrolling a user in a device identification program. In some embodiments, a system is configured to: receive device identification information from a mobile device, receive user information associated wit ...


43
Glass Randal, Salganicoff Marcos, Von Seelen Ulf Cahn: Procede et appareil de transmission et dauthentification sures de donnees biometriques via un reseau, Method and apparatus for securely transmitting and authenticating biometric data over a network. Iridian Technologies, Iridian Technologies, CASSAN MACLEAN, July 20, 2000: CA2358535 (1 worldwide citation)

A method and apparatus for collecting and securely transmitting biometric data over a network contains a sensor, preferably a camera, for collecting biometric data and code generating hardware and software. The camera data is digitized and a unique code which is a function of the digitized camera da ...


44
Scott Walter Guy: Systems and methods for facilitating transactions. Cross Match Technologies, Scott Walter Guy, MESSINGER MICHAEL V, January 27, 2005: WO/2005/008399 (1 worldwide citation)

Figure 1, is a diagram of a marketplace (100) that supports limited conventional transactions. In marketplace (100), users (102A-102D) carry out a variety of electronic transactions over network (120). User (102A) interfaces with a terminal (104A) at a merchant store in a retail transaction. Termina ...


45
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam, ROGITZ John L, February 23, 2006: WO/2006/019451 (1 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


46
Boesgaard, Sørensen Hans Martin: Digital data authentication. Boesgaard, Sørensen Hans Martin, INSPICOS, June 19, 2008: WO/2008/071795 (1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


47
Jorey Ramer, Adam Soroca, Dennis Doughty: Predictive text completion for a mobile communication facility. Millennial Media, Shook Hardy & Bacon L, July 11, 2017: US09703892

A system predicts a search query term, wherein the prediction is based at least in part on a plurality of keystrokes entered on a mobile communication facility and wherein the prediction is further based at least in part on information relating to the mobile communication facility and/or its user.


48
Ayman Hammad: Verification of portable consumer devices. Visa International Service Association, Kilpatrick Townsend & Stockton, July 25, 2017: US09715681

Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a req ...


49
Glenn Stuart Benson, Sean Croston: System and method for partner key management. JPMorgan Chase Bank N A, Goodwin Procter, March 28, 2017: US09608826

A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in hig ...


50
Tenni Theurer, Thomas Purves, Shilpak Mahadkar, Ayman Hammad: Third-party value added wallet features and interfaces apparatuses, methods and systems. VISA INTERNATIONAL SERVICE ASSOCIATION, Loeb & Loeb, July 18, 2017: US09710807

The THIRD-PARTY VALUE ADDED WALLET FEATURES AND INTERFACES APPARATUSES, METHODS, AND SYSTEMS (“VAW”) facilitates allowing a third party service provider to integrate with an electronic wallet to provide a value-added service to a wallet consumer. The VAW may also be configured to facilitate the crea ...



Click the thumbnails below to visualize the patent trend.