11
Karl L Ginter, Victor H Shear, Francis J Spahn, David M Van Wie, Robert P Weber: Trusted and secure techniques, systems and methods for item delivery and execution. Intertrust Technologies Corporation, Finnegan Henderson Farabow Garrett & Dunner, November 3, 2005: US20050246541-A1

Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively parti ...


12
Karl L Ginter, Victor H Shear, Francis J Spahn, David M Van Wie, Robert P Weber: Trusted and secure techniques, systems and methods for item delivery and execution. Intertrust Technologies Corporation, Finnegan Henderson Farabow Garrett & Dunner, August 18, 2005: US20050182956-A1

Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively parti ...


13
Karl L Ginter, Victor H Shear, Francis J Spahn, David M Van Wie, Robert P Weber: Trusted and secure techniques, systems and methods for item delivery and execution. Intertrust Technologies Corporation, Finnegan Henderson Farabow Garrett & Dunner, October 27, 2005: US20050240771-A1

Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively parti ...


14
SECURE AUTHENTICATION SYSTEMS AND METHODS. January 19, 2017: US20170019395-A1

Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the ...