51
Suresh N Chari, Pau Chen Cheng, Lawrence Koved, Ian M Molloy, Youngja Park: Correlating cognitive biometrics for continuous identify verification. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cantor Colburn, David Quinn, June 20, 2017: US09686275 (1 worldwide citation)

A technique is provided for continuous user authentication through real-time fusion and correlation of multiple factors. Monitored data is continuously obtained from a computer. The monitored data is related to user actions on the computer of a user. A server analyzes the monitored data of the compu ...


52
Jeffrey L Kapp, Martin A Tiernan, Zhi Qiang Wei, Xiao Qing Zhang, Cheng Zhou: Unlocking electronic devices using touchscreen input gestures. International Business Machines Corporation, Nicholas D Bowman, June 13, 2017: US09679121 (1 worldwide citation)

A computer implemented method for detecting input gesture events on a touchscreen of an electronic device and for unlocking the electronic device is disclosed. The method may include displaying, while the electronic device is in a locked state, a plurality of guidance lines on the touchscreen of the ...


53
Mark B Wiesman: Systems and methods for risk based decisioning. MasterCard International Incorporated, Armstrong Teasdale, March 21, 2017: US09600819 (1 worldwide citation)

A method and system for creating an assurance level based on authentication data attributes using a computer device coupled to a database are provided. The method includes receiving an authorization request associated with the financial transaction from the sender, the authorization request includin ...


54
David Eric Hagar, Steve Eddy: Dashboards for displaying threat insight information. Proofpoint, Carr & Ferrell, March 21, 2017: US09602523 (1 worldwide citation)

Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments, methods for providing a threat dashboard may include locating metrics regarding a malicious attack against a targeted resource, where the m ...


55
James E Whitelaw: Method and system for obscuring and securing financial data in an online banking application. Intuit, Park Vaughan Fleming & Dowler, Shun Yao, October 18, 2011: US08041127 (1 worldwide citation)

One embodiment of the present invention provides a system that obscures critical information communicated over a network. During operation, the system receives a set of data and produces a file which represents a character in the data with at least one image, thereby avoiding representing the data i ...


56
Georg Fasching: Methods and apparatus for providing centralized web services for funds transfer system. MasterCard International, Buckley Maschoff & Talwalkar, September 18, 2012: US08271362 (1 worldwide citation)

A method of operating a centralized web services computer system includes providing a standard interface for financial institutions (FIs) and for funds transfer service providers that participate in a remittance system. The centralized web services computer system may also provide services such as i ...


57
Glenn Grossman: Providing information from use of readable indicia with mobile device. Bank of America Corporation, Michael A Springs, Moore and Van Allen PLLC, Patrick B Horne, January 27, 2015: US08939355 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods and computer program products for providing information from use of readable indicia. Embodiments may include receiving usage information corresponding to a plurality of readable indicia read at one or more points of transaction during on ...


58
Avi Turgeman, Edo Dekel, Itai Novick, Yaron Lehmann, Lev Kadyshevitch: Device, system, and method of detecting malicious automatic script and code injection. BioCatch, Eitan Mehulal & Sadot, January 17, 2017: US09547766 (1 worldwide citation)

Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elemen ...


59
Kimberly Belle Summerrow, Faith A Tucker, John Franklin Tuders: Entry level banking products. Bank of America Corporation, Banner & Witcoff, Michael A Springs, February 11, 2014: US08650123 (1 worldwide citation)

Entry level banking products that may be offered through traditional sales channels (e.g., retail banking locations, online, and the like) or alternative sales channels (co-placement or co-branded with a third-party), to new customers who traditionally do not rely on conventional or mainstream check ...


60
Joseph B Castinado, Phillip W Mork, Kimberly C Turner: System for authentication levels associated with a wearable device. BANK OF AMERICA CORPORATION, Michael A Springs, Moore & Van Allen PLLC, W Kevin Ransom, January 24, 2017: US09554274 (1 worldwide citation)

Embodiments of the invention are directed to systems, methods, and computer program products for authentication levels associated with a wearable device. The system is configured to receive an indication that a user is in possession of the wearable device; authenticate the wearable device; receive a ...



Click the thumbnails below to visualize the patent trend.