1
Geoffrey V Arone, Michael P Clark, Adam T Thompson: Online identity management. Safetyweb, Knobbe Martens Olson & Bear, July 15, 2014: US08782217 (60 worldwide citation)

An identity scanner monitors information regarding a target individual on various data sources, such as social networking sites. The information is analyzed to identify risk and/or reward factors that are indicative of risk levels associated with the target's privacy, reputation, safety, health, and ...


2
Hue Rhodes: Online identity management and identity verification. Jeffrey D Myers, Justin R Jackson, Peacock Myers P C, August 21, 2012: US08250097 (12 worldwide citation)

A user identity verification apparatus and method comprising, via one or more processors, collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources comprising credit bureau information, information from data vendors, and public in ...


3
Paul McDaniel, Neil Shipp: Techniques to perform federated authentication. MICROSOFT TECHNOLOGY LICENSING, August 15, 2017: US09736153 (2 worldwide citation)

Techniques to perform federated authentication are described. An apparatus may comprise a resource server may have an authentication proxy component to perform authentication operations on behalf of a client. The authentication proxy component comprises an authentication handling module operative to ...


4
Hue Rhodes: Online Identity Management and Identity Verification. Peacock Myers PC, May 7, 2009: US20090119299-A1

A user identity verification apparatus and method comprising, via one or more processors, collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources comprising credit bureau information, information from data vendors, and public in ...


5
Mcafee Preston R: Method of online identity management. Yahoo, Mcafee Preston R, BERNSTEIN Frank L, April 23, 2009: WO/2009/052077

A method which may allow a user to create more than one online identity in a Web browser, and associate each online identify with one type of intended online activity. The user may be able to switch to a different online identity without logging out from his/her computer or Web browser. The inventio ...


6
Rhodes Hue: Online identity management and identity verification. Rhodes Hue, Myers Jeffrey D, June 3, 2010: WO/2010/062759

A user identity verification apparatus and method comprising, via one or more processors, collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources comprising credit bureau information, information from data vendors, and public in ...


7

8

9
KIOSKS FOR REMOTE COLLECTION OF ELECTRONIC DEVICES FOR VALUE, AND ASSOCIATED MOBILE APPLICATION FOR ENHANCED DIAGNOSTICS AND SERVICES. November 9, 2017: US20170323279-A1

A kiosk for accepting a portable electronic device from a client in exchange for payment includes a display, one or more cameras, a portable device receiving arrangement, a payment dispensing arrangement, and a communication connection to a remote server and/or operator. The kiosk is configured to, ...


10
Multi-Function Data Key. uQontrol, February 15, 2018: US20180047014-A1

A data key for secure financial and other types of data transactions with a key-shaped case, lightbox touch sensor carrying a removable wafer, processor, secure memory, general-purpose memory, battery, antenna, speaker, microphone, and a dual-purpose USB and chip pin pad. Bluetooth, NFC and/or RFID ...