41
Stephen M Ellis, Michael J Kennedy, Ashish Bhoopen Kurani, Melissa Lowry, Uma Meyyappan, Bipin Sahni, Nikolai Stroke: Interoperable mobile wallet refund. Wells Fargo Bank N A, Foley & Lardner, July 25, 2017: US09715689 (2 worldwide citation)

A computer-implemented system and method that includes receiving, by a messaging hub computer system, from a point of sale (POS) device of a merchant, a request to process a refund for a transaction that occurred between the merchant and a mobile device of a payor, the request comprising a previousl ...


42
Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St John Redmond: Methods and systems for secure and reliable identity-based computing. Advanced Elemental Technologies, Finnegan Henderson Farabow Garrett & Dunner, August 1, 2017: US09721086 (2 worldwide citation)

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement r ...


43
Paul Timothy Miller, George Allen Tuvell: Cryptographic security functions based on anticipated changes in dynamic minutiae. mSignia, Haynes and Boone, January 31, 2017: US09559852 (2 worldwide citation)

Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of hardware, firmware, and software minutiae, user secrets, and user biometric values found in or collected by the device. Processes for uniquely iden ...


44
Ian M Snyder, Morgan Teachworth: Location-based VoIP functions in a wireless network. Cisco Technology, Polsinelli, May 2, 2017: US09642167 (2 worldwide citation)

A wireless network can include one or more nodes distributed throughout a physical environment. The locations of client devices within the wireless network can be determined based on observing measurements of wireless signals exchanged between the nodes and the client devices. In some example embodi ...


45
Sandor Lukacs, Radu I Ciocas, Vlad I Topan, Adrian V Colesa, Raul V Tosa: Enabling a secure environment through operating system switching. Bitdefender IPR Management, Law Office of Andrei D Popovici PC, February 7, 2017: US09563457 (2 worldwide citation)

Described systems and methods allow a host system, such as a computer or a smartphone, to enable a secure environment, which can be used to carry out secure communications with a remote service provider, for applications such as online banking, e-commerce, private messaging, and online gaming, among ...


46
Brett Dunlap, Paul Wickboldt: Fingerprint sensor and button combinations and methods of making same. Synaptics Incorporated, Leydig Voit & Mayer, May 16, 2017: US09651513 (2 worldwide citation)

It will be understood by those skilled in the art that there is disclosed in the present application a biometric sensor that may comprise a plurality of a first type of signal traces formed on a first surface of a first layer of a multi-layer laminate package; at least one trace of a second type, fo ...


47
Suresh N Chari, Pau Chen Cheng, Lawrence Koved, Ian M Molloy, Youngja Park: Correlating cognitive biometrics for continuous identify verification. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cantor Colburn, David Quinn, June 20, 2017: US09686275 (2 worldwide citation)

A technique is provided for continuous user authentication through real-time fusion and correlation of multiple factors. Monitored data is continuously obtained from a computer. The monitored data is related to user actions on the computer of a user. A server analyzes the monitored data of the compu ...


48
Zhou Lu, Huazhang Yu: System for self-service recharging and method for the same. Feitian Technologies, Hammer & Associates P C, February 7, 2012: US08112627 (2 worldwide citation)

The present invention discloses a method for self-service recharging and a system for the same, relating to the security communications of online banking. The system comprises a client and a server. The method mainly comprises the steps of: 1) establishing a data security channel between the client ...


49
Avi Turgeman, Itai Novick: Identification of computerized bots, and identification of automated cyber-attack modules. BioCatch, Eitan Mehulal & Sadot, April 18, 2017: US09626677 (2 worldwide citation)

Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or by an automated cyber-attack unit or malware or automatic script. The system monitors interactions performed via one or more input units of t ...


50
SHNOWSKE DANIEL P, TREADWELL WILLIAM S: [en] Online banking through a gaming console. BANK OF AMERICA, December 23, 2009: GB2460955-A (2 worldwide citation)

[en] Online banking using a gaming console 503 is provided by establishing a network connection between gaming console 503 and remote financial institution 501. To access a financial account, console 503 transmits an authorization request 2 to the financial institution, the request including one or ...