1
Sead Muftic: Secure world wide electronic commerce over an open network. Entegrity Solutions Corporation, Foley & Lardner, December 15, 1998: US05850442 (681 worldwide citation)

A network of users and servers of a type found in the Internet system is extended to permit secure electronic commercial transactions to be accomplished. The network is extended to include a public key infrastructure and electronic transactions can be securely performed utilizing smart token technol ...


2
Sead Muftic: Smart token system for secure electronic transactions and identification. Entegrity Solutions Corporation, Foley & Lardner, August 24, 1999: US05943423 (379 worldwide citation)

Smart token technology, using a smart card, PCMCIA card or any other medium containing storage or processing capability is used to facilitate a variety of secure business transactions, including those which might occur over an unsecured network such as the Internet. Application programs can obtain a ...


3
Chauncey Warner Griswold, Joseph R Hedrick: Smart token. IGT, Marshall Gerstein & Borun, October 7, 2003: US06629591 (258 worldwide citation)

A token for use in a cashless transaction involving an electronic device includes a token body having a coin shape. The token has a digital circuit embedded within the token body and a memory embedded within the token body that is coupled to the digital circuit. The token also includes an input/outp ...


4
Timothy J Chainer, Claude A Greengard, William R Pulleyblank, Charles P Tresser, Chai W Wu: Method and apparatus for securely determining aspects of the history of a good. International Business Machines Corporation, Stephen C Kaufman, Whitham Curtis & Christofferson P C, December 31, 2002: US06501390 (79 worldwide citation)

The present invention provides methods and apparatus to detect and reliably record the physical history of a product including effects due to one or more of the following: 1) product use 2) handling 3) tampering and 4) environment of the product (as changes in the environment, such as excessive temp ...


5
Christopher J Riddick, Lan Huu Tran: Media protection system and method. CLWT, Joseph G Seeber, June 13, 2006: US07062045 (23 worldwide citation)

In a media protection system and method, an original media item is encrypted before it is distributed. At the point of sale (POS) or point of distribution, the consumer presents his personal smart token to the clerk who inserts it into a POS reader along with a companion digital identifier (CDI™). T ...


6
Chainer Timothy J, Greengard Claude A, Pulleyblank William R, Tresser Charles P, Wu Chai W: Method and apparatus for securely determining aspects of the history of a good. Ibm, July 19, 2000: EP1020813-A2 (4 worldwide citation)

The present invention provides methods and apparatus to detect and reliably record the physical history of a product including effects due to one or more of the following: 1) product use 2) handling 3) tampering and 4) environment of the product (as changes in the environment, such as excessive temp ...


7
Steven M Hoffberg: System and method for determining contingent relevance. Steven M Hoffberg Esq, Ostrolenk Faber, November 14, 2017: US09818136

A system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof. A user interface having express representation of both information elemen ...


8
Richard L Gregg, Sandeep Giri, Timothy C Goeke: Method for managing access to protected computer resources. PRISM TECHNOLOGIES, Martin & Ferraro, January 10, 2017: US09544314

A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software me ...


9
Marten E Van Dijk, Todd A Morneau, William M Duane: Managing use of security keys. EMC IP Holding Company, Krishnendu Gupta, Jason A Reyes, September 26, 2017: US09774446

A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of crit ...


10
Matthew Lazzaro, Stanley Fong, Todd Lutton, Uday Shenvi, Ghanshyam Dave, William Toth: Multi-function smart communication card. The United States of America represented by the Secretary of the Army, Ronald Krosky, Azza Jayaprakash, May 16, 2017: US09654470

Various embodiments are described that relate to a smart card. When not connected to an external system, such as a laptop computer, the smart card can be configured to power itself. Thus, various functions can be practiced on the smart card in absence of connection to the external system. Example fu ...



Click the thumbnails below to visualize the patent trend.