51
Sanjay Mijar, Phani Achanta, Brian J Vetter, Justin P Marston: System, method and computer program product for connecting roaming mobile devices to a virtual device platform. Hypori, Sprinkle IP Law Group, April 11, 2017: US09622068 (2 worldwide citation)

Systems, methods and computer program products that enable efficient roaming of virtual mobile devices. In one embodiment, multiple PoP locations having a set of common master images are maintained. A communication from a mobile device received at a central facility identifies a user, a location and ...


52
Stephen M Ellis, Michael J Kennedy, Ashish Bhoopen Kurani, Melissa Lowry, Uma Meyyappan, Bipin Sahni, Nikolai Stroke: Interoperable mobile wallet refund. Wells Fargo Bank N A, Foley & Lardner, July 25, 2017: US09715689 (2 worldwide citation)

A computer-implemented system and method that includes receiving, by a messaging hub computer system, from a point of sale (POS) device of a merchant, a request to process a refund for a transaction that occurred between the merchant and a mobile device of a payor, the request comprising a previousl ...


53
Christopher Andrew Nordstrom, Romit Roy Choudhury: Systems and methods for establishing communications between mobile device users. Kinectus, Schmeiser Olsen & Watts, February 28, 2017: US09584464 (2 worldwide citation)

Provided are systems and methods for establishing a communication between mobile device users that register with a collaboration system. The collaboration system determines a match between profile data of the first registered mobile device and profile data of the second registered mobile device. Dis ...


54
Sandor Lukacs, Radu I Ciocas, Vlad I Topan, Adrian V Colesa, Raul V Tosa: Enabling a secure environment through operating system switching. Bitdefender IPR Management, Law Office of Andrei D Popovici PC, February 7, 2017: US09563457 (2 worldwide citation)

Described systems and methods allow a host system, such as a computer or a smartphone, to enable a secure environment, which can be used to carry out secure communications with a remote service provider, for applications such as online banking, e-commerce, private messaging, and online gaming, among ...


55
Brett Dunlap, Paul Wickboldt: Fingerprint sensor and button combinations and methods of making same. Synaptics Incorporated, Leydig Voit & Mayer, May 16, 2017: US09651513 (2 worldwide citation)

It will be understood by those skilled in the art that there is disclosed in the present application a biometric sensor that may comprise a plurality of a first type of signal traces formed on a first surface of a first layer of a multi-layer laminate package; at least one trace of a second type, fo ...


56
Jeremy Wyn Harris: Automated identity assessment method and system. 3FISH, Stephen M DeKlerk, March 21, 2017: US09602495 (2 worldwide citation)

A method, system and software for assessing an entity (15) at a first user terminal (13) connected to a data network (10). A control system (11) is used to receive an access request (101) from the entity (15) or an assessing user (16) at a second user terminal (14). The control system (11) invokes o ...


57
Suresh N Chari, Pau Chen Cheng, Lawrence Koved, Ian M Molloy, Youngja Park: Correlating cognitive biometrics for continuous identify verification. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cantor Colburn, David Quinn, June 20, 2017: US09686275 (2 worldwide citation)

A technique is provided for continuous user authentication through real-time fusion and correlation of multiple factors. Monitored data is continuously obtained from a computer. The monitored data is related to user actions on the computer of a user. A server analyzes the monitored data of the compu ...


58
Zhou Lu, Huazhang Yu: System for self-service recharging and method for the same. Feitian Technologies, Hammer & Associates P C, February 7, 2012: US08112627 (2 worldwide citation)

The present invention discloses a method for self-service recharging and a system for the same, relating to the security communications of online banking. The system comprises a client and a server. The method mainly comprises the steps of: 1) establishing a data security channel between the client ...


59
Avi Turgeman, Itai Novick: Identification of computerized bots, and identification of automated cyber-attack modules. BioCatch, Eitan Mehulal & Sadot, April 18, 2017: US09626677 (2 worldwide citation)

Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is being controlled by a legitimate human user, or by an automated cyber-attack unit or malware or automatic script. The system monitors interactions performed via one or more input units of t ...


60
Joseph B Castinado, Phillip W Mork, Kimberly C Turner: System for authentication levels associated with a wearable device. BANK OF AMERICA CORPORATION, Michael A Springs, Moore & Van Allen PLLC, W Kevin Ransom, January 24, 2017: US09554274 (2 worldwide citation)

Embodiments of the invention are directed to systems, methods, and computer program products for authentication levels associated with a wearable device. The system is configured to receive an indication that a user is in possession of the wearable device; authenticate the wearable device; receive a ...