51
Glass Randal, Salganicoff Marcos, Von Seelen Ulf Cahn: Procede et appareil de transmission et dauthentification sures de donnees biometriques via un reseau, Method and apparatus for securely transmitting and authenticating biometric data over a network. Iridian Technologies, Iridian Technologies, CASSAN MACLEAN, July 20, 2000: CA2358535 (1 worldwide citation)

A method and apparatus for collecting and securely transmitting biometric data over a network contains a sensor, preferably a camera, for collecting biometric data and code generating hardware and software. The camera data is digitized and a unique code which is a function of the digitized camera da ...


52
Scott Walter Guy: Systems and methods for facilitating transactions. Cross Match Technologies, Scott Walter Guy, MESSINGER MICHAEL V, January 27, 2005: WO/2005/008399 (1 worldwide citation)

Figure 1, is a diagram of a marketplace (100) that supports limited conventional transactions. In marketplace (100), users (102A-102D) carry out a variety of electronic transactions over network (120). User (102A) interfaces with a terminal (104A) at a merchant store in a retail transaction. Termina ...


53
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam, ROGITZ John L, February 23, 2006: WO/2006/019451 (1 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


54
Boesgaard, Sørensen Hans Martin: Digital data authentication. Boesgaard, Sørensen Hans Martin, INSPICOS, June 19, 2008: WO/2008/071795 (1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


55
Jorey Ramer, Adam Soroca, Dennis Doughty: Predictive text completion for a mobile communication facility. Millennial Media, Shook Hardy & Bacon L, July 11, 2017: US09703892

A system predicts a search query term, wherein the prediction is based at least in part on a plurality of keystrokes entered on a mobile communication facility and wherein the prediction is further based at least in part on information relating to the mobile communication facility and/or its user.


56
Ayman Hammad, Patrick Faith, Krishna Prasad Koganti, Ben Rewis, Brendan Xavier Louis, Kevin Weller, Benedicto Hernandez Dominguez: Secure authentication system and method. Visa International Service Association, Kilpatrick Townsend & Stockton, October 17, 2017: US09792611

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a verification token is associated with a computer and can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation ...


57
Ayman Hammad: Verification of portable consumer devices. Visa International Service Association, Kilpatrick Townsend & Stockton, July 25, 2017: US09715681

Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a req ...


58
Glenn Stuart Benson, Sean Croston: System and method for partner key management. JPMorgan Chase Bank N A, Goodwin Procter, March 28, 2017: US09608826

A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in hig ...


59
Tenni Theurer, Thomas Purves, Shilpak Mahadkar, Ayman Hammad: Third-party value added wallet features and interfaces apparatuses, methods and systems. VISA INTERNATIONAL SERVICE ASSOCIATION, Loeb & Loeb, July 18, 2017: US09710807

The THIRD-PARTY VALUE ADDED WALLET FEATURES AND INTERFACES APPARATUSES, METHODS, AND SYSTEMS (“VAW”) facilitates allowing a third party service provider to integrate with an electronic wallet to provide a value-added service to a wallet consumer. The VAW may also be configured to facilitate the crea ...


60
Bruce Bent, Bruce Bent II, Rebecca Gareis Bent, David Edgar Gareis: Method and system for allocating deposits over a plurality of depository institutions. Island Intellectual Property, Amster Rothstein & Ebenstein, November 7, 2017: US09811811

Computer system, computer-implemented method, and program product for managing transaction comprising: administering clients' deposits to and withdrawals from client transaction accounts; determining a client available deposit amount, Di, determining, for Di, a value of Ni banks for the respective c ...



Click the thumbnails below to visualize the patent trend.