1
Sead Muftic: Secure world wide electronic commerce over an open network. Entegrity Solutions Corporation, Foley & Lardner, December 15, 1998: US05850442 (693 worldwide citation)

A network of users and servers of a type found in the Internet system is extended to permit secure electronic commercial transactions to be accomplished. The network is extended to include a public key infrastructure and electronic transactions can be securely performed utilizing smart token technol ...


2
Sead Muftic: Smart token system for secure electronic transactions and identification. Entegrity Solutions Corporation, Foley & Lardner, August 24, 1999: US05943423 (390 worldwide citation)

Smart token technology, using a smart card, PCMCIA card or any other medium containing storage or processing capability is used to facilitate a variety of secure business transactions, including those which might occur over an unsecured network such as the Internet. Application programs can obtain a ...


3
Chauncey Warner Griswold, Joseph R Hedrick: Smart token. IGT, Marshall Gerstein & Borun, October 7, 2003: US06629591 (273 worldwide citation)

A token for use in a cashless transaction involving an electronic device includes a token body having a coin shape. The token has a digital circuit embedded within the token body and a memory embedded within the token body that is coupled to the digital circuit. The token also includes an input/outp ...


4
Timothy J Chainer, Claude A Greengard, William R Pulleyblank, Charles P Tresser, Chai W Wu: Method and apparatus for securely determining aspects of the history of a good. International Business Machines Corporation, Stephen C Kaufman, Whitham Curtis & Christofferson P C, December 31, 2002: US06501390 (81 worldwide citation)

The present invention provides methods and apparatus to detect and reliably record the physical history of a product including effects due to one or more of the following: 1) product use 2) handling 3) tampering and 4) environment of the product (as changes in the environment, such as excessive temp ...


5
Christopher J Riddick, Lan Huu Tran: Media protection system and method. CLWT, Joseph G Seeber, June 13, 2006: US07062045 (23 worldwide citation)

In a media protection system and method, an original media item is encrypted before it is distributed. At the point of sale (POS) or point of distribution, the consumer presents his personal smart token to the clerk who inserts it into a POS reader along with a companion digital identifier (CDI™). T ...


6
Chainer Timothy J, Greengard Claude A, Pulleyblank William R, Tresser Charles P, Wu Chai W: Method and apparatus for securely determining aspects of the history of a good. Ibm, July 19, 2000: EP1020813-A2 (4 worldwide citation)

The present invention provides methods and apparatus to detect and reliably record the physical history of a product including effects due to one or more of the following: 1) product use 2) handling 3) tampering and 4) environment of the product (as changes in the environment, such as excessive temp ...


7
Steven M Hoffberg: System and method for determining contingent relevance. Steven M Hoffberg Esq, Ostrolenk Faber, November 14, 2017: US09818136 (1 worldwide citation)

A system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof. A user interface having express representation of both information elemen ...


8
Richard L Gregg, Sandeep Giri, Timothy C Goeke: Method for managing access to protected computer resources. PRISM TECHNOLOGIES, Martin & Ferraro, January 10, 2017: US09544314

A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software me ...


9
Nicholas Kim Rosenberg, Richard John Carey, Marsha A Vincent: System and method for mobile device docking station. JPMorgan Chase Bank N A, Goodwin Procter, April 17, 2018: US09946300

Embodiments of the invention are related to systems and methods for a docking station that wirelessly connects to a mobile device, facilitates charging the mobile device, and enables the mobile device to interact with a virtual desktop infrastructure.


10
Marten E Van Dijk, Todd A Morneau, William M Duane: Managing use of security keys. EMC IP Holding Company, Krishnendu Gupta, Jason A Reyes, September 26, 2017: US09774446

A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of crit ...