61
Simon Law, Dennis Poon, Richard Burnison, Jerry Bokser: System and method for initiating transactions on a mobile device. SALT TECHNOLOGY, Perry Currier, March 14, 2017: US09596237 (1 worldwide citation)

Systems and methods are provided for providing a more seamless purchasing experience using a mobile device. The mobile device acquires data, such a barcode image, an image of an object or text, or audio data. A non-limiting example of a barcode is a Quick Response (QR) barcode. The acquired data is ...


62
Brian J Vetter, Justin P Marston: System, method and computer program product for providing notifications from a virtual device to a disconnected physical device. Hypori, Sprinkle IP Law Group, June 6, 2017: US09674171 (1 worldwide citation)

Systems, methods and computer program products for providing notifications to physical devices when they are disconnected from corresponding virtual devices. In one embodiment, a system includes a host server executing a virtual device, and a notification server. A notification manager on the virtua ...


63
Andrew T Keys: Ensuring information security using one-time tokens. Bank of America Corporation, Banner & Witcoff, Michael A Springs, June 27, 2017: US09692752 (1 worldwide citation)

Methods, systems, and computer-readable media for ensuring information security using one-time tokens are presented. In one or more embodiments, a computing platform may receive, from a user device, a request to access an online banking portal using a user account. Based on the request, the computin ...


64
Michael E Globe, Mazin Al Samadi, Lauren Van Heerden, Gunalan Nadarajah, Orin Del Vecchio, Michael D Cummins, Prabaharan Sivashanmugam: Systems and methods for identifying product recommendations based on investment portfolio data. The Toronto Dominion Bank, Duane Morris, May 16, 2017: US09652798 (1 worldwide citation)

The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on investment portfolio data. In one aspect, the disclosed embodiments may include a system that is configured to obtain information associated with o ...


65
Jeffrey Mark Sieracki: System and method for discriminating nature of communication traffic transmitted through network based on envelope characteristics. Reality Analytics, Rosenberg Klein & Lee, November 7, 2017: US09813310 (1 worldwide citation)

A system and method are provided for discriminating the nature of traffic flowing through a computer network. Various types of traffic are distinguished. For example, traffic sourced by a software application that generates them may be distinguished. The problem of detecting malicious traffic either ...


66
Jacqueline Anne Lapstun, Paul Lapstun, Kia Silverbrook: Method and system for banking using coded forms. Silverbrook Research, February 21, 2012: US08121919 (1 worldwide citation)

Methods and systems are disclosed which relate to online banking via interface surfaces printed with information and coded data. The coded data, encoded visibly or invisibly, may be queried by an appropriate sensing device. The sensing device communicates with a computer system. Together, the interf ...


67
John Ryan Caldwell: Distributed, decentralized data aggregation. MX Technologies, Kunzler Law Group, June 27, 2017: US09692815 (1 worldwide citation)

Apparatuses, systems, methods, and computer program products are disclosed for distributed and/or decentralized data aggregation. A method includes determining a user's electronic credentials for a plurality of third party service providers. A method includes accessing each of a plurality of third p ...


68
Paul Timothy Miller, George Allen Tuvell: Cryptographic security functions based on anticipated changes in dynamic minutiae. mSignia, Haynes & Boone, August 1, 2017: US09722804 (1 worldwide citation)

Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of hardware, firmware, and software minutiae, user secrets, and user biometric values found in or collected by the device. Processes for uniquely iden ...


69
Angelo Starink, David Knight: Malicious message detection and processing. Proofpoint, Carr & Ferrell, June 20, 2017: US09686297 (1 worldwide citation)

Malicious message detection and processing systems and methods are provided herein. According to various embodiments, a method includes detecting, via an intermediary node, a link included in a message, the link being associated with an unknown resource, hashing a unique identifier for a recipient o ...


70
Justin Lewis, Joseph Daverin: Subscribable channel collections. GOOGLE, Lowenstein Sandler, February 21, 2017: US09578382 (1 worldwide citation)

A system for creating and maintaining subscribable channel collections includes a computer-readable storage medium having encoded thereon a program of instructions for generating and maintaining channel collections, and a processor that executes the program of instructions to: display a channel coll ...