Movatterモバイル変換


[0]ホーム

URL:


US20040117321A1 - System and method for secure network purchasing - Google Patents

System and method for secure network purchasing
Download PDF

Info

Publication number
US20040117321A1
US20040117321A1US10/688,734US68873403AUS2004117321A1US 20040117321 A1US20040117321 A1US 20040117321A1US 68873403 AUS68873403 AUS 68873403AUS 2004117321 A1US2004117321 A1US 2004117321A1
Authority
US
United States
Prior art keywords
computer
user
server
buyer
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/688,734
Inventor
Enrique Sancho
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
iPass Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/688,734priorityCriticalpatent/US20040117321A1/en
Assigned to LEMLE, ROBERT S., C&C INTERNET SECURITYreassignmentLEMLE, ROBERT S.SECURITY AGREEMENTAssignors: SAFE3W, R&D, LTD
Publication of US20040117321A1publicationCriticalpatent/US20040117321A1/en
Assigned to SAFE3W, INC.reassignmentSAFE3W, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SANCHO, ENRIQUE DAVID
Assigned to IPASS INC.reassignmentIPASS INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: SAFE3W, INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

There is disclosed a method for performing secure electronic transactions on a computer network, the network comprising a buyer's computer, a vendor server, a creditor server and a security server. The buyer's computer has a fingerprint file stored in the memory thereof. The method includes the steps of:
i) the buyer computer requesting to purchase merchandise to the vendor server, the purchase request including said buyer computer's IP address;
ii) the buyer computer selecting a predetermined form of secured payment method;
iii) the payment method selection causing the vendor server to transmit to the security server a request for confirmation of the buyer computer's identity at the buyer computer's IP address;
iv) the confirmation request causing the security server to send a retrieval request to the IP address, the retrieval request including a retrieval program for detecting and retrieving the buyer's computer's fingerprint file, and the retrieval request further comprising a response request asking for confirmation of the purchase request; whereby a positive response from the buyer's computer to the security server accompanied by the fingerprint file causes the security server to confirm the buyer computer's identity to the vendor server and to approve the purchase.

Description

Claims (37)

I claim:
1) In a computer network, a system for performing a secured transaction between a buyer's PC, a vendor server, a creditor server and a security server, wherein said buyer's PC has received fingerprint programming from said security server.
2) A system for performing a secured transaction according toclaim 1, wherein said buyer's PC has received encryption programming and decryption programming from said security server.
3) A method for performing secure electronic transactions on a computer network, said network comprising a buyer's computer, a vendor server, a creditor server and a security server, said buyer's computer having a fingerprint file stored in the memory thereof, including the steps of:
i) said buyer computer requesting to purchase merchandise to said vendor server, said purchase request including said buyer computer's IP address;
ii) said buyer computer selecting a predetermined form of secured payment method;
iii) said payment method selection causing said vendor server to transmit to said security server a request for confirmation of said buyer computer's identity at said buyer computer's IP address;
iv) said confirmation request causing said security server to send a retrieval request to said IP address, said retrieval request including a retrieval program for detecting and retrieving said buyer's computer's fingerprint file, and said retrieval request further comprising a response request asking for confirmation of said purchase request; whereby a positive response from said buyer's computer to said security server accompanied by said fingerprint file causes said security server to confirm said buyer computer's identity to said vendor server and to approve said purchase.
4) A method of performing secure electronic transactions on a computer network, said network comprising a buying computer, an ISP computer and a vendor computer, including the steps of:
said ISP computer assigning to buying computer a Buyer-ID code and IP address;
said buying computer communicating via said ISP computer with said vendor computer and allowing an operator to select merchandise or services for purchase;
said Buyer-ID and buyer computer's IP address are provided to vendor computer programmed to request and receive said information;
vendor computer is programmed to use Buyer-ID and BC's current IP address along with information such as desired Item ID, cost and name for generating an electronic purchase inquiry which is transmitted to ISP computer;
ISP is programmed such that upon receipt of purchase inquiry from MC, ISP uses combination of IP address and Buyer-ID to determine within ISP's internal network whether Buyer is in fact still online at the address assigned at the beginning of the online session;
whereby if buyer computer is determined to be connected to ISP computer at correct address, ISP computer then generates and transmits Transaction Confirmation Number and instructs MC to generate and forward invoice to ISP computer.
sending at least one verification response, based upon the comparing of the first fingerprint file against the second fingerprint file and upon the comparing of the first identification for the user against the second identification for the user.
6. The method according to claim5 wherein the verification computer is a clearinghouse computer.
7. The method according to claim5 wherein the verification computer is a vendor computer.
8. A method according to claim5, wherein said step of sending at least one request to a user computer includes:
sending a first request to the user computer for the first fingerprint file; and
sending a second request to the user computer for the first identification for the user.
9. A method according to claim5, wherein said step of receiving at least one response from the user computer includes:
receiving a first response from the user computer including the fingerprint file; and
receiving a second response from the user computer including the first identification for the user.
10. A method according toclaim 9, wherein the second response from the user computer is received prior to first response from the user computer.
11. A method according to claim5, wherein said steps of comparing the first fingerprint file against a second fingerprint file, and comparing the first identification for the user against a second identification for the user are not performed simultaneously.
12. A method according toclaim 7, wherein said step of sending at least one response to the vendor computer, based upon the comparing of the first fingerprint file against the second fingerprint file and upon the comparing of the first identification for the user against the second identification for the user includes sending a confirmation only when both the first fingerprint file and the first identification of the user match the second fingerprint file and the second identification for the user respectively.
13. A method according toclaim 8, wherein said step of receiving at least one response from the user computer includes:
receiving a first response from the user computer including the first fingerprint file; and
receiving a second response from the user computer including the first identification for the user.
14. A method according to13, wherein the second response from the user computer is received prior to first response from the user computer.
15. A method according to claim5, wherein the first identification for the user includes a password.
16. A method according to claim5, wherein the first fingerprint file includes information based upon an identification number of a CPU of the user computer.
17. A method according to claim5, wherein the first fingerprint file includes information based upon a MAC address associated with the user computer.
18. A method according to claim5, wherein prior to the step of receiving the first request from the verification computer,
storing the second fingerprint file in a first data base accessible by verification computer, and
storing the second identifications for the user in a second database accessible by the verification computer.
19. A method according toclaim 7, wherein prior to the step of receiving the first request from the vendor computer,
storing the second fingerprint file in a first data base accessible by a clearinghouse computer, and
storing the second identifications for the user in a second database accessible by a clearinghouse computer.
20. A method according toclaim 17, wherein the first database and second database are the same.
21. A method according toclaim 7, wherein the step of receiving a request from a vendor computer includes receiving an internet address of the user computer.
22. A method according toclaim 21, wherein prior to the step of sending the at least one request to the user computer, identifying the user computer based upon the internet address received from the vendor computer.
23. A clearinghouse computer comprising:
a storage unit for storing information received from a user computer; the information including a second fingerprint file and a second identification for a user;
a memory unit for receiving information indicative of first fingerprint file and a first identification for the user; and
a processor for communicating with the storage unit and the memory unit for comparing information indicative of the second fingerprint file and the second identification for the user with information indicative of the first fingerprint file and first identification for the user, and causing a message to be generated based upon the comparing.
24. A clearinghouse computer according toclaim 23, wherein the storage unit includes:
a first storage location for storing the second fingerprint file, and
a second storage location for storing the second identification for the user.
25. A clearinghouse computer according toclaim 23, wherein the memory unit includes:
a first memory location for storing, at least temporarily, the first fingerprint file, and
a second memory location for storing, at least temporarily, the first identification for the user.
26. A clearinghouse computer according toclaim 23, further including:
an output for receiving the message to be generated based upon the comparison, and
the output further capable of communicating with a vendor computer.
27. A clearinghouse computer according toclaim 23, wherein the second identification for the user includes a password.
28. A clearinghouse computer according toclaim 23, wherein the second fingerprint file includes information based upon an identification number of a CPU of the user computer.
29. A method for verifying a user and a user computer comprising:
receiving at a first server at least one first message from the user computer, the at least one first message including a first fingerprint file;
comparing the first fingerprint file against a second fingerprint file to verify the user computer, the second fingerprint file accessible by the first server;
receiving at a second server at least one second message from the user computer, the at least one second message including a first identification for the user; and
comparing the first identification for the user against a second identification for the user to verify the user, the second identification for the user accessible by the second server.
30. A method according toclaim 29 where at least one server is a mini-server
31. The method according toclaim 30 where the first and second servers are mini-servers.
32. A method according toclaim 31, wherein the first mini-server is associated with a first clearinghouse computer and the second mini-server is associated with a second clearinghouse computer.
33. A method according toclaim 31, wherein the first mini-server is associated with a first clearinghouse computer and the second mini-server is associated also with the clearinghouse computer.
34. A method according toclaim 29, wherein:
after the step of comparing the first fingerprint file against the second fingerprint file to verify the user computer, generating a first-mini-server message at the first mini-server based upon the results of said comparison; and
after the step of comparing the first identification for the user against the second identification for the user to verify the user, generating a second-mini-server message at the second mini-server based upon the results of said comparison.
35. A method according toclaim 34, further including:
sending the first-mini-server message to a vendor computer; and
sending the second-mini-server message to the vendor computer.
36. A method according toclaim 35, further including:
authorizing an action by the vendor computer only if both the first-mini-server message contains information indicating the user computer was verified and the second-mini-server message contains information indicating the user was verified.
37. A vendor computer comprising:
a first input for communicating with a first mini-server for receiving a first-mini-server message containing information indicating if a user computer was verified;
a second input for communicating with a second mini-server for receiving a second-mini-server message containing information indicating if a user was verified;
a processor for receiving the first-mini-server message from the first output and the second mini-server message from the second output and authorizing an action only if both the first-mini-server message contains information indicating the user computer was verified and the second-mini-server message contains information indicating the user was verified.
38. A vendor computer according toclaim 37, wherein the first input and the second input are the same.
US10/688,7341999-07-302003-10-16System and method for secure network purchasingAbandonedUS20040117321A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/688,734US20040117321A1 (en)1999-07-302003-10-16System and method for secure network purchasing

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US14662899P1999-07-301999-07-30
US16735299P1999-11-241999-11-24
US09/500,601US7885899B1 (en)2000-02-082000-02-08System and method for secure network purchasing
US10/688,734US20040117321A1 (en)1999-07-302003-10-16System and method for secure network purchasing

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/500,601DivisionUS7885899B1 (en)1999-07-302000-02-08System and method for secure network purchasing

Publications (1)

Publication NumberPublication Date
US20040117321A1true US20040117321A1 (en)2004-06-17

Family

ID=43532017

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US09/500,601Expired - Fee RelatedUS7885899B1 (en)1999-07-302000-02-08System and method for secure network purchasing
US10/688,734AbandonedUS20040117321A1 (en)1999-07-302003-10-16System and method for secure network purchasing
US10/776,954AbandonedUS20050108177A1 (en)1999-07-302004-02-11System and method for secure network purchasing

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/500,601Expired - Fee RelatedUS7885899B1 (en)1999-07-302000-02-08System and method for secure network purchasing

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US10/776,954AbandonedUS20050108177A1 (en)1999-07-302004-02-11System and method for secure network purchasing

Country Status (1)

CountryLink
US (3)US7885899B1 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030236872A1 (en)*2002-05-092003-12-25Kestrel Wireless. Inc.Method and system for enabling electronic transactions via a personal device
US20050080728A1 (en)*2002-01-302005-04-14Sobek Michael F.Methods and systems for processing, accounting, and administration of stored value cards
US20050177438A1 (en)*2002-03-202005-08-11Koninklijke Philips Electronics N.V.Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services
US20050251441A1 (en)*2001-03-142005-11-10Centro Della Comunicazione Interattiva S.P.A.Method of managing portable payment/charging modules usable in sales services
US20060010072A1 (en)*2004-03-022006-01-12Ori EisenMethod and system for identifying users and detecting fraud by use of the Internet
US6986461B1 (en)*2003-05-012006-01-17American Express Travel Related Services Company, Inc.Online enrollment tool
DE102004034702A1 (en)*2004-07-172006-02-23Deutsche Telekom AgElectronic transaction procedure for high value goods and services uses ISP based billing
US20060131385A1 (en)*2004-12-162006-06-22Kim Mike IConditional transaction notification and implied approval system
US20060131390A1 (en)*2004-12-162006-06-22Kim Mike IMethod and system for providing transaction notification and mobile reply authorization
US20060143188A1 (en)*2001-01-022006-06-29Bright Walter GMethod and apparatus for simplified access to online services
US20060149580A1 (en)*2004-09-172006-07-06David HelsperFraud risk advisor
US20070038568A1 (en)*2004-09-172007-02-15Todd GreeneFraud analyst smart cookie
US20070234409A1 (en)*2006-03-312007-10-04Ori EisenSystems and methods for detection of session tampering and fraud prevention
US20070239606A1 (en)*2004-03-022007-10-11Ori EisenMethod and system for identifying users and detecting fraud by use of the internet
WO2007044596A3 (en)*2005-10-072008-06-12Kemesa LlcIdentity theft and fraud protection system and method
US20080217400A1 (en)*2007-03-062008-09-11Portano Michael DSystem for preventing fraudulent purchases and identity theft
US20090083397A1 (en)*2007-09-252009-03-26Infineon Technologies AgMethod for Loading a Program Module into a Network Device and Network with Network Devices
US20090083184A1 (en)*2007-09-262009-03-26Ori EisenMethods and Apparatus for Detecting Fraud with Time Based Computer Tags
US20090259560A1 (en)*2005-10-072009-10-15Kemesa LlcIdentity Theft and Fraud Protection System and Method
US20100004965A1 (en)*2008-07-012010-01-07Ori EisenSystems and methods of sharing information through a tagless device consortium
US20100146609A1 (en)*2006-10-042010-06-10Rob BartlettMethod and system of securing accounts
US20100325704A1 (en)*2009-06-192010-12-23Craig Stephen EtchegoyenIdentification of Embedded System Devices
US20100325710A1 (en)*2009-06-192010-12-23Etchegoyen Craig SNetwork Access Protection
US20100332400A1 (en)*2009-06-242010-12-30Craig Stephen EtchegoyenUse of Fingerprint with an On-Line or Networked Payment Authorization System
US20100333213A1 (en)*2009-06-242010-12-30Craig Stephen EtchegoyenSystems and Methods for Determining Authorization to Operate Licensed Software Based on a Client Device Fingerprint
US20110082768A1 (en)*2004-03-022011-04-07The 41St Parameter, Inc.Method and System for Identifying Users and Detecting Fraud by Use of the Internet
US20110093703A1 (en)*2009-10-162011-04-21Etchegoyen Craig SAuthentication of Computing and Communications Hardware
US8213907B2 (en)2009-07-082012-07-03Uniloc Luxembourg S. A.System and method for secured mobile communication
US8438394B2 (en)2011-01-142013-05-07Netauthority, Inc.Device-bound certificate authentication
US20140250003A1 (en)*1999-04-302014-09-04Max R. LevchinEstablishing an account limit for a digital wallet account
US8898450B2 (en)2011-06-132014-11-25Deviceauthority, Inc.Hardware identity in multi-factor authentication at the application layer
US9112850B1 (en)2009-03-252015-08-18The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9143496B2 (en)2013-03-132015-09-22Uniloc Luxembourg S.A.Device authentication using device environment information
US9286466B2 (en)2013-03-152016-03-15Uniloc Luxembourg S.A.Registration and authentication of computing devices using a digital skeleton key
US9521551B2 (en)2012-03-222016-12-13The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US9633201B1 (en)2012-03-012017-04-25The 41St Parameter, Inc.Methods and systems for fraud containment
US9703983B2 (en)2005-12-162017-07-11The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US9756133B2 (en)2011-08-152017-09-05Uniloc Luxembourg S.A.Remote recognition of an association between remote devices
US9754256B2 (en)2010-10-192017-09-05The 41St Parameter, Inc.Variable risk engine
US9990631B2 (en)2012-11-142018-06-05The 41St Parameter, Inc.Systems and methods of global identification
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10417637B2 (en)2012-08-022019-09-17The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10453066B2 (en)2003-07-012019-10-22The 41St Parameter, Inc.Keystroke analysis
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
US11164206B2 (en)*2018-11-162021-11-02Comenity LlcAutomatically aggregating, evaluating, and providing a contextually relevant offer
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US11314838B2 (en)2011-11-152022-04-26Tapad, Inc.System and method for analyzing user device information

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7366702B2 (en)*1999-07-302008-04-29Ipass Inc.System and method for secure network purchasing
US7885899B1 (en)2000-02-082011-02-08Ipass Inc.System and method for secure network purchasing
US7412422B2 (en)*2000-03-232008-08-12Dekel ShilohMethod and system for securing user identities and creating virtual users to enhance privacy on a communication network
US7844670B2 (en)2000-04-032010-11-30Paltalk Holdings, Inc.Method and computer program product for establishing real-time communications between networked computers
US20020023134A1 (en)*2000-04-032002-02-21Roskowski Steven G.Method and computer program product for establishing real-time communications between networked computers
US7269160B1 (en)*2000-05-262007-09-11Buffalo International, Inc.Voice over internet call center integration
CA2411034C (en)2000-06-072017-05-02Telecheck Services, Inc.Online machine data collection and archiving process
US7006986B1 (en)*2000-09-252006-02-28Ecardless Bancorp, Ltd.Order file processes for purchasing on the internet using verified order information
US7957514B2 (en)2000-12-182011-06-07Paltalk Holdings, Inc.System, method and computer program product for conveying presence information via voice mail
IES20010524A2 (en)*2001-06-012002-12-11Mainline Corporate HoldingsA secure on-line payment system
US7389275B2 (en)*2002-03-052008-06-17Visa U.S.A. Inc.System for personal authorization control for card transactions
US20040254890A1 (en)*2002-05-242004-12-16Sancho Enrique DavidSystem method and apparatus for preventing fraudulent transactions
KR100601706B1 (en)2004-10-152006-07-18삼성전자주식회사 Method and apparatus for sharing and generating system key in a DRM system
US7818264B2 (en)2006-06-192010-10-19Visa U.S.A. Inc.Track data encryption
WO2008144772A1 (en)*2007-05-242008-11-27Arpu, Inc.Subscription promotion and management system and method
CA2689479A1 (en)2007-06-042008-12-11Bce Inc.Methods and systems for validating online transactions using location information
US20100174660A1 (en)*2007-12-052010-07-08Bce Inc.Methods and computer-readable media for facilitating forensic investigations of online transactions
US20090172033A1 (en)*2007-12-282009-07-02Bce Inc.Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US20090182675A1 (en)*2008-01-042009-07-16Brody EdwardMethod and system for conducting electronic commerce over a network using a shadow credit card number
US9483783B1 (en)*2008-04-162016-11-01Intuit Inc.Purchase system using a computing device
US8245030B2 (en)*2008-12-192012-08-14Nai-Yu PaiMethod for authenticating online transactions using a browser
US9075958B2 (en)*2009-06-242015-07-07Uniloc Luxembourg S.A.Use of fingerprint with an on-line or networked auction
US10068282B2 (en)2009-06-242018-09-04Uniloc 2017 LlcSystem and method for preventing multiple online purchases
US20150073998A1 (en)2013-09-092015-03-12Apple Inc.Use of a Biometric Image in Online Commerce
JP6324094B2 (en)*2014-02-032018-05-16キヤノン株式会社 Information processing terminal, information processing terminal control method, and program
US20160192194A1 (en)*2014-12-292016-06-30Gongming YangSecure way to build internet credit system and protect private information
US11068953B2 (en)2018-05-232021-07-20International Business Machines CorporationFingerprint based address entry

Citations (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4688169A (en)*1985-05-301987-08-18Joshi Bhagirath SComputer software security system
US4736422A (en)*1983-06-301988-04-05Independent Broadcasting AuthorityEncrypted broadcast television system
US4796220A (en)*1986-12-151989-01-03Pride Software Development Corp.Method of controlling the copying of software
US4885777A (en)*1985-09-041989-12-05Hitachi, Ltd.Electronic transaction system
US4926480A (en)*1983-08-221990-05-15David ChaumCard-computer moderated systems
US4991210A (en)*1989-05-041991-02-05David ChaumUnpredictable blind signature systems
US5005200A (en)*1988-02-121991-04-02Fischer Addison MPublic key/signature cryptosystem with enhanced digital signature certification
US5018196A (en)*1985-09-041991-05-21Hitachi, Ltd.Method for electronic transaction with digital signature
US5023907A (en)*1988-09-301991-06-11Apollo Computer, Inc.Network license server
US5131039A (en)*1990-01-291992-07-14David ChaumOptionally moderated transaction systems
US5189784A (en)*1989-11-131993-03-02Iowa Precision Industries, Inc.Apparatus for forming seams in box-shaped members
US5196840A (en)*1990-11-051993-03-23International Business Machines CorporationSecure communications system for remotely located computers
US5214701A (en)*1989-07-251993-05-25U.S. Philips CorporationMethod of processing data by compression and permutation for microcircuit cards
US5218637A (en)*1987-09-071993-06-08L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espaceMethod of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization
US5243750A (en)*1989-11-131993-09-14Iowa Precision Industries, Inc.Method for forming seams in box-shaped members
US5311595A (en)*1989-06-071994-05-10Kommunedata I/SMethod of transferring data, between computer systems using electronic cards
US5335278A (en)*1991-12-311994-08-02Wireless Security, Inc.Fraud prevention system and process for cellular mobile telephone networks
US5351293A (en)*1993-02-011994-09-27Wave Systems Corp.System method and apparatus for authenticating an encrypted signal
US5416840A (en)*1993-07-061995-05-16Phoenix Technologies, Ltd.Software catalog encoding method and system
US5442707A (en)*1992-09-281995-08-15Matsushita Electric Industrial Co., Ltd.Method for generating and verifying electronic signatures and privacy communication using elliptic curves
US5450489A (en)*1993-10-291995-09-12Time Warner Entertainment Co., L.P.System and method for authenticating software carriers
US5450879A (en)*1994-06-141995-09-19Met-Coil Systems CorporationCornerless slip-on flange system for duct connections
US5502765A (en)*1992-09-181996-03-26Nippon Telegraph And Telephone CorporationMethod and apparatus for settlement of accounts by IC cards
US5513260A (en)*1994-06-291996-04-30Macrovision CorporationMethod and apparatus for copy protection for various recording media
US5513272A (en)*1994-12-051996-04-30Wizards, LlcSystem for verifying use of a credit/identification card including recording of physical attributes of unauthorized users
US5515441A (en)*1994-05-121996-05-07At&T Corp.Secure communication method and apparatus
US5548106A (en)*1994-08-301996-08-20Angstrom Technologies, Inc.Methods and apparatus for authenticating data storage articles
US5559887A (en)*1994-09-301996-09-24Electronic Payment ServiceCollection of value from stored value systems
US5648648A (en)*1996-02-051997-07-15Finger Power, Inc.Personal identification system for use with fingerprint data in secured transactions
US5657389A (en)*1995-05-081997-08-12Image Data, LlcPositive identification system and method
US5745568A (en)*1995-09-151998-04-28Dell Usa, L.P.Method of securing CD-ROM data for retrieval by one machine
US5794221A (en)*1995-07-071998-08-11Egendorf; AndrewInternet billing method
US5809143A (en)*1995-12-121998-09-15Hughes; Thomas S.Secure keyboard
US5825883A (en)*1995-10-311998-10-20Interval Systems, Inc.Method and apparatus that accounts for usage of digital applications
US5845070A (en)*1996-12-181998-12-01Auric Web Systems, Inc.Security system for internet provider transaction
US5845267A (en)*1996-09-061998-12-01At&T CorpSystem and method for billing for transactions conducted over the internet from within an intranet
US5852812A (en)*1995-08-231998-12-22Microsoft CorporationBilling system for a network
US5899980A (en)*1997-08-111999-05-04Trivnet Ltd.Retail method over a wide area network
US5903721A (en)*1997-03-131999-05-11cha|Technologies Services, Inc.Method and system for secure online transaction processing
US5905736A (en)*1996-04-221999-05-18At&T CorpMethod for the billing of transactions over the internet
US5907617A (en)*1995-06-071999-05-25Digital River, Inc.Try before you buy software distribution and marketing system
US5920628A (en)*1997-01-091999-07-06Washington UniversityMethod and apparatus for fingerprinting and authenticating various magnetic media
US5926624A (en)*1996-09-121999-07-20Audible, Inc.Digital information library and delivery system with logic for generating files targeted to the playback device
US5933497A (en)*1990-12-141999-08-03International Business Machines CorporationApparatus and method for controlling access to software
US5949877A (en)*1997-01-301999-09-07Intel CorporationContent protection for transmission systems
US6026166A (en)*1997-10-202000-02-15Cryptoworx CorporationDigitally certifying a user identity and a computer system in combination
US6029151A (en)*1996-12-132000-02-22Telefonaktiebolaget L M EricssonMethod and system for performing electronic money transactions
US6041411A (en)*1997-03-282000-03-21Wyatt; Stuart AlanMethod for defining and verifying user access rights to a computer information
US6056021A (en)*1996-05-142000-05-02Jam Kabushiki KaishaDuct joint structure, assembly tool, duct assembly method and hanger
US6072875A (en)*1994-10-272000-06-06International Business Machines CorporationMethod and apparatus for secure identification of a mobile user in a communication network
US6105227A (en)*1998-01-192000-08-22Bota; VictorApparatus and methods for manufacturing ducts
US6138239A (en)*1998-11-132000-10-24N★Able Technologies, Inc.Method and system for authenticating and utilizing secure resources in a computer system
US6167518A (en)*1998-07-282000-12-26Commercial Electronics, LlcDigital signature providing non-repudiation based on biological indicia
US6195447B1 (en)*1998-01-162001-02-27Lucent Technologies Inc.System and method for fingerprint data verification
US20010000535A1 (en)*1994-11-282001-04-26Lapsley Philip D.Tokenless biometric electronic financial transactions via a third party identicator
US6269348B1 (en)*1994-11-282001-07-31Veristar CorporationTokenless biometric electronic debit and credit transactions
US6270011B1 (en)*1998-05-282001-08-07Benenson TalRemote credit card authentication system
US6272631B1 (en)*1997-06-302001-08-07Microsoft CorporationProtected storage of core data secrets
US6332193B1 (en)*1999-01-182001-12-18Sensar, Inc.Method and apparatus for securely transmitting and authenticating biometric data over a network
US20010056539A1 (en)*1996-12-042001-12-27Dominique Vincent PavlinSoftware protection device and method
US6367012B1 (en)*1996-12-062002-04-02Microsoft CorporationEmbedding certifications in executable files for network transmission
US6378184B1 (en)*1998-01-192002-04-30Cleveland Tool & MachineApparatus and method for manufacturing ducts
US6466671B1 (en)*1997-03-212002-10-15Michel MaillardSmartcard for use with a receiver of encrypted broadcast signals, and receiver
US20020174067A1 (en)*1994-11-282002-11-21Indivos Corporation, A Delaware CorporationTokenless electronic transaction system
US6606707B1 (en)*1999-04-272003-08-12Matsushita Electric Industrial Co., Ltd.Semiconductor memory card
US6671805B1 (en)*1999-06-172003-12-30Ilumin CorporationSystem and method for document-driven processing of digitally-signed electronic documents
US20040128249A1 (en)*1994-11-282004-07-01Indivos Corporation, A Delaware CorporationSystem and method for tokenless biometric electronic scrip
US6857076B1 (en)*1999-03-262005-02-15Micron Technology, Inc.Data security for digital data storage
US20050106177A1 (en)*1999-09-172005-05-19Dana-Farber Cancer Institute, Inc.Stabilized soluble glycoprotein trimers
US6920561B1 (en)*2000-03-312005-07-19International Business Machines CorporationMethod and system for enabling free seating using biometrics through a centralized authentication

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5214702A (en)1988-02-121993-05-25Fischer Addison MPublic key/signature cryptosystem with enhanced digital signature certification
JPH10229980A (en)1997-02-201998-09-02Toshiba Corp Intelligent key device
US6868391B1 (en)1997-04-152005-03-15Telefonaktiebolaget Lm Ericsson (Publ)Tele/datacommunications payment method and apparatus
IT1294497B1 (en)1997-06-231999-04-12Giulio Peretti SYSTEM FOR THE MANAGEMENT OF TRANSACTIONS ON TELEMATIC NETWORKS.
WO1999031610A1 (en)1997-12-151999-06-24British Telecommunications Public Limited CompanyData communications
JP2003530618A (en)1999-07-302003-10-14セーフダブリュダブリュダブリュ インコーポレイテッド System and method for secure network purchase
US7366702B2 (en)1999-07-302008-04-29Ipass Inc.System and method for secure network purchasing
US7885899B1 (en)2000-02-082011-02-08Ipass Inc.System and method for secure network purchasing
US20040254890A1 (en)2002-05-242004-12-16Sancho Enrique DavidSystem method and apparatus for preventing fraudulent transactions

Patent Citations (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4736422A (en)*1983-06-301988-04-05Independent Broadcasting AuthorityEncrypted broadcast television system
US4926480A (en)*1983-08-221990-05-15David ChaumCard-computer moderated systems
US4688169A (en)*1985-05-301987-08-18Joshi Bhagirath SComputer software security system
US4885777A (en)*1985-09-041989-12-05Hitachi, Ltd.Electronic transaction system
US5018196A (en)*1985-09-041991-05-21Hitachi, Ltd.Method for electronic transaction with digital signature
US4796220A (en)*1986-12-151989-01-03Pride Software Development Corp.Method of controlling the copying of software
US5218637A (en)*1987-09-071993-06-08L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espaceMethod of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization
US5005200A (en)*1988-02-121991-04-02Fischer Addison MPublic key/signature cryptosystem with enhanced digital signature certification
US5023907A (en)*1988-09-301991-06-11Apollo Computer, Inc.Network license server
US4991210A (en)*1989-05-041991-02-05David ChaumUnpredictable blind signature systems
US5311595A (en)*1989-06-071994-05-10Kommunedata I/SMethod of transferring data, between computer systems using electronic cards
US5214701A (en)*1989-07-251993-05-25U.S. Philips CorporationMethod of processing data by compression and permutation for microcircuit cards
US5189784A (en)*1989-11-131993-03-02Iowa Precision Industries, Inc.Apparatus for forming seams in box-shaped members
US5243750A (en)*1989-11-131993-09-14Iowa Precision Industries, Inc.Method for forming seams in box-shaped members
US5131039A (en)*1990-01-291992-07-14David ChaumOptionally moderated transaction systems
US5196840A (en)*1990-11-051993-03-23International Business Machines CorporationSecure communications system for remotely located computers
US5933497A (en)*1990-12-141999-08-03International Business Machines CorporationApparatus and method for controlling access to software
US5335278A (en)*1991-12-311994-08-02Wireless Security, Inc.Fraud prevention system and process for cellular mobile telephone networks
US5502765A (en)*1992-09-181996-03-26Nippon Telegraph And Telephone CorporationMethod and apparatus for settlement of accounts by IC cards
US5442707A (en)*1992-09-281995-08-15Matsushita Electric Industrial Co., Ltd.Method for generating and verifying electronic signatures and privacy communication using elliptic curves
US5351293A (en)*1993-02-011994-09-27Wave Systems Corp.System method and apparatus for authenticating an encrypted signal
US5416840A (en)*1993-07-061995-05-16Phoenix Technologies, Ltd.Software catalog encoding method and system
US5450489A (en)*1993-10-291995-09-12Time Warner Entertainment Co., L.P.System and method for authenticating software carriers
US5515441A (en)*1994-05-121996-05-07At&T Corp.Secure communication method and apparatus
US5450879A (en)*1994-06-141995-09-19Met-Coil Systems CorporationCornerless slip-on flange system for duct connections
US5513260A (en)*1994-06-291996-04-30Macrovision CorporationMethod and apparatus for copy protection for various recording media
US5548106A (en)*1994-08-301996-08-20Angstrom Technologies, Inc.Methods and apparatus for authenticating data storage articles
US5559887A (en)*1994-09-301996-09-24Electronic Payment ServiceCollection of value from stored value systems
US6072875A (en)*1994-10-272000-06-06International Business Machines CorporationMethod and apparatus for secure identification of a mobile user in a communication network
US20020174067A1 (en)*1994-11-282002-11-21Indivos Corporation, A Delaware CorporationTokenless electronic transaction system
US20040128249A1 (en)*1994-11-282004-07-01Indivos Corporation, A Delaware CorporationSystem and method for tokenless biometric electronic scrip
US20010000535A1 (en)*1994-11-282001-04-26Lapsley Philip D.Tokenless biometric electronic financial transactions via a third party identicator
US6269348B1 (en)*1994-11-282001-07-31Veristar CorporationTokenless biometric electronic debit and credit transactions
US5513272A (en)*1994-12-051996-04-30Wizards, LlcSystem for verifying use of a credit/identification card including recording of physical attributes of unauthorized users
US5657389A (en)*1995-05-081997-08-12Image Data, LlcPositive identification system and method
US5907617A (en)*1995-06-071999-05-25Digital River, Inc.Try before you buy software distribution and marketing system
US5794221A (en)*1995-07-071998-08-11Egendorf; AndrewInternet billing method
US5852812A (en)*1995-08-231998-12-22Microsoft CorporationBilling system for a network
US5745568A (en)*1995-09-151998-04-28Dell Usa, L.P.Method of securing CD-ROM data for retrieval by one machine
US5825883A (en)*1995-10-311998-10-20Interval Systems, Inc.Method and apparatus that accounts for usage of digital applications
US5809143A (en)*1995-12-121998-09-15Hughes; Thomas S.Secure keyboard
US5648648A (en)*1996-02-051997-07-15Finger Power, Inc.Personal identification system for use with fingerprint data in secured transactions
US5905736A (en)*1996-04-221999-05-18At&T CorpMethod for the billing of transactions over the internet
US6056021A (en)*1996-05-142000-05-02Jam Kabushiki KaishaDuct joint structure, assembly tool, duct assembly method and hanger
US5845267A (en)*1996-09-061998-12-01At&T CorpSystem and method for billing for transactions conducted over the internet from within an intranet
US5926624A (en)*1996-09-121999-07-20Audible, Inc.Digital information library and delivery system with logic for generating files targeted to the playback device
US20010056539A1 (en)*1996-12-042001-12-27Dominique Vincent PavlinSoftware protection device and method
US6367012B1 (en)*1996-12-062002-04-02Microsoft CorporationEmbedding certifications in executable files for network transmission
US6029151A (en)*1996-12-132000-02-22Telefonaktiebolaget L M EricssonMethod and system for performing electronic money transactions
US5845070A (en)*1996-12-181998-12-01Auric Web Systems, Inc.Security system for internet provider transaction
US5920628A (en)*1997-01-091999-07-06Washington UniversityMethod and apparatus for fingerprinting and authenticating various magnetic media
US5949877A (en)*1997-01-301999-09-07Intel CorporationContent protection for transmission systems
US5903721A (en)*1997-03-131999-05-11cha|Technologies Services, Inc.Method and system for secure online transaction processing
US6466671B1 (en)*1997-03-212002-10-15Michel MaillardSmartcard for use with a receiver of encrypted broadcast signals, and receiver
US6041411A (en)*1997-03-282000-03-21Wyatt; Stuart AlanMethod for defining and verifying user access rights to a computer information
US6272631B1 (en)*1997-06-302001-08-07Microsoft CorporationProtected storage of core data secrets
US5899980A (en)*1997-08-111999-05-04Trivnet Ltd.Retail method over a wide area network
US6026166A (en)*1997-10-202000-02-15Cryptoworx CorporationDigitally certifying a user identity and a computer system in combination
US6195447B1 (en)*1998-01-162001-02-27Lucent Technologies Inc.System and method for fingerprint data verification
US6105227A (en)*1998-01-192000-08-22Bota; VictorApparatus and methods for manufacturing ducts
US6378184B1 (en)*1998-01-192002-04-30Cleveland Tool & MachineApparatus and method for manufacturing ducts
US6270011B1 (en)*1998-05-282001-08-07Benenson TalRemote credit card authentication system
US6167518A (en)*1998-07-282000-12-26Commercial Electronics, LlcDigital signature providing non-repudiation based on biological indicia
US6138239A (en)*1998-11-132000-10-24N★Able Technologies, Inc.Method and system for authenticating and utilizing secure resources in a computer system
US6332193B1 (en)*1999-01-182001-12-18Sensar, Inc.Method and apparatus for securely transmitting and authenticating biometric data over a network
US6857076B1 (en)*1999-03-262005-02-15Micron Technology, Inc.Data security for digital data storage
US6606707B1 (en)*1999-04-272003-08-12Matsushita Electric Industrial Co., Ltd.Semiconductor memory card
US6671805B1 (en)*1999-06-172003-12-30Ilumin CorporationSystem and method for document-driven processing of digitally-signed electronic documents
US20050106177A1 (en)*1999-09-172005-05-19Dana-Farber Cancer Institute, Inc.Stabilized soluble glycoprotein trimers
US6920561B1 (en)*2000-03-312005-07-19International Business Machines CorporationMethod and system for enabling free seating using biometrics through a centralized authentication

Cited By (117)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9996826B2 (en)1999-04-302018-06-12Paypal, Inc.System and methods for facilitating value exchanges using mobile devices
US20140250003A1 (en)*1999-04-302014-09-04Max R. LevchinEstablishing an account limit for a digital wallet account
US20060143188A1 (en)*2001-01-022006-06-29Bright Walter GMethod and apparatus for simplified access to online services
US7711748B2 (en)*2001-01-022010-05-04Bright Walter GMethod and apparatus for simplified access to online services
US20050251441A1 (en)*2001-03-142005-11-10Centro Della Comunicazione Interattiva S.P.A.Method of managing portable payment/charging modules usable in sales services
US20050080728A1 (en)*2002-01-302005-04-14Sobek Michael F.Methods and systems for processing, accounting, and administration of stored value cards
US7797233B2 (en)*2002-01-302010-09-14Store Financial Services, LlcMethods and systems for processing, accounting, and administration of stored value cards
US10026111B2 (en)*2002-03-202018-07-17Koninklijke Philips N.V.Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services
US10007939B2 (en)*2002-03-202018-06-26Koninklijke Philips N.V.Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services
US20050177438A1 (en)*2002-03-202005-08-11Koninklijke Philips Electronics N.V.Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services
US20140046797A1 (en)*2002-03-202014-02-13Koninklijke Philips N.V.Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services
US20030236872A1 (en)*2002-05-092003-12-25Kestrel Wireless. Inc.Method and system for enabling electronic transactions via a personal device
US6986461B1 (en)*2003-05-012006-01-17American Express Travel Related Services Company, Inc.Online enrollment tool
US10453066B2 (en)2003-07-012019-10-22The 41St Parameter, Inc.Keystroke analysis
US11238456B2 (en)2003-07-012022-02-01The 41St Parameter, Inc.Keystroke analysis
US8862514B2 (en)2004-03-022014-10-14The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US20060010072A1 (en)*2004-03-022006-01-12Ori EisenMethod and system for identifying users and detecting fraud by use of the Internet
US10999298B2 (en)2004-03-022021-05-04The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US20070239606A1 (en)*2004-03-022007-10-11Ori EisenMethod and system for identifying users and detecting fraud by use of the internet
US7853533B2 (en)2004-03-022010-12-14The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US20110082768A1 (en)*2004-03-022011-04-07The 41St Parameter, Inc.Method and System for Identifying Users and Detecting Fraud by Use of the Internet
US20090037213A1 (en)*2004-03-022009-02-05Ori EisenMethod and system for identifying users and detecting fraud by use of the internet
US11683326B2 (en)2004-03-022023-06-20The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
DE102004034702A1 (en)*2004-07-172006-02-23Deutsche Telekom AgElectronic transaction procedure for high value goods and services uses ISP based billing
DE102004034702B4 (en)*2004-07-172012-12-27Deutsche Telekom Ag Method for the technical processing of electronic transactions via a packet-oriented data network
US7708200B2 (en)2004-09-172010-05-04Digital Envoy, Inc.Fraud risk advisor
US20060282285A1 (en)*2004-09-172006-12-14David HelsperFraud risk advisor
US20070073630A1 (en)*2004-09-172007-03-29Todd GreeneFraud analyst smart cookie
US7673793B2 (en)2004-09-172010-03-09Digital Envoy, Inc.Fraud analyst smart cookie
US7543740B2 (en)2004-09-172009-06-09Digital Envoy, Inc.Fraud analyst smart cookie
US7438226B2 (en)2004-09-172008-10-21Digital Envoy, Inc.Fraud risk advisor
US20060149580A1 (en)*2004-09-172006-07-06David HelsperFraud risk advisor
US20070061273A1 (en)*2004-09-172007-03-15Todd GreeneFraud analyst smart cookie
US20060287902A1 (en)*2004-09-172006-12-21David HelsperFraud risk advisor
US7497374B2 (en)2004-09-172009-03-03Digital Envoy, Inc.Fraud risk advisor
US20070038568A1 (en)*2004-09-172007-02-15Todd GreeneFraud analyst smart cookie
US20060131390A1 (en)*2004-12-162006-06-22Kim Mike IMethod and system for providing transaction notification and mobile reply authorization
US20060131385A1 (en)*2004-12-162006-06-22Kim Mike IConditional transaction notification and implied approval system
US20090259560A1 (en)*2005-10-072009-10-15Kemesa LlcIdentity Theft and Fraud Protection System and Method
WO2007044596A3 (en)*2005-10-072008-06-12Kemesa LlcIdentity theft and fraud protection system and method
US8719106B2 (en)2005-10-072014-05-06Kemesa Inc.Identity theft and fraud protection system and method
US12079368B2 (en)2005-12-162024-09-03The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US10726151B2 (en)2005-12-162020-07-28The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US9703983B2 (en)2005-12-162017-07-11The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US10535093B2 (en)2006-03-312020-01-14The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US10089679B2 (en)2006-03-312018-10-02The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US8826393B2 (en)2006-03-312014-09-02The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US8151327B2 (en)2006-03-312012-04-03The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US11727471B2 (en)2006-03-312023-08-15The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US11195225B2 (en)2006-03-312021-12-07The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US9754311B2 (en)2006-03-312017-09-05The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US12093992B2 (en)2006-03-312024-09-17The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US20070234409A1 (en)*2006-03-312007-10-04Ori EisenSystems and methods for detection of session tampering and fraud prevention
US9196004B2 (en)2006-03-312015-11-24The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US20100146609A1 (en)*2006-10-042010-06-10Rob BartlettMethod and system of securing accounts
US20080217400A1 (en)*2007-03-062008-09-11Portano Michael DSystem for preventing fraudulent purchases and identity theft
US9258385B2 (en)*2007-09-252016-02-09Infineon Technologies AgMethod for loading a program module into a network device and network with network devices
US20090083397A1 (en)*2007-09-252009-03-26Infineon Technologies AgMethod for Loading a Program Module into a Network Device and Network with Network Devices
US20090083184A1 (en)*2007-09-262009-03-26Ori EisenMethods and Apparatus for Detecting Fraud with Time Based Computer Tags
US9060012B2 (en)2007-09-262015-06-16The 41St Parameter, Inc.Methods and apparatus for detecting fraud with time based computer tags
US9390384B2 (en)2008-07-012016-07-12The 41 St Parameter, Inc.Systems and methods of sharing information through a tagless device consortium
US20100004965A1 (en)*2008-07-012010-01-07Ori EisenSystems and methods of sharing information through a tagless device consortium
US9112850B1 (en)2009-03-252015-08-18The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US10616201B2 (en)2009-03-252020-04-07The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US12132719B2 (en)2009-03-252024-10-29The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US9948629B2 (en)2009-03-252018-04-17The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US11750584B2 (en)2009-03-252023-09-05The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US20100325704A1 (en)*2009-06-192010-12-23Craig Stephen EtchegoyenIdentification of Embedded System Devices
US20100325710A1 (en)*2009-06-192010-12-23Etchegoyen Craig SNetwork Access Protection
US9047450B2 (en)2009-06-192015-06-02Deviceauthority, Inc.Identification of embedded system devices
US9047458B2 (en)2009-06-192015-06-02Deviceauthority, Inc.Network access protection
US20100332400A1 (en)*2009-06-242010-12-30Craig Stephen EtchegoyenUse of Fingerprint with an On-Line or Networked Payment Authorization System
US20100333213A1 (en)*2009-06-242010-12-30Craig Stephen EtchegoyenSystems and Methods for Determining Authorization to Operate Licensed Software Based on a Client Device Fingerprint
US8213907B2 (en)2009-07-082012-07-03Uniloc Luxembourg S. A.System and method for secured mobile communication
US20110093703A1 (en)*2009-10-162011-04-21Etchegoyen Craig SAuthentication of Computing and Communications Hardware
US8726407B2 (en)2009-10-162014-05-13Deviceauthority, Inc.Authentication of computing and communications hardware
US9754256B2 (en)2010-10-192017-09-05The 41St Parameter, Inc.Variable risk engine
US10432609B2 (en)2011-01-142019-10-01Device Authority Ltd.Device-bound certificate authentication
US8438394B2 (en)2011-01-142013-05-07Netauthority, Inc.Device-bound certificate authentication
US8898450B2 (en)2011-06-132014-11-25Deviceauthority, Inc.Hardware identity in multi-factor authentication at the application layer
US9756133B2 (en)2011-08-152017-09-05Uniloc Luxembourg S.A.Remote recognition of an association between remote devices
US11314838B2 (en)2011-11-152022-04-26Tapad, Inc.System and method for analyzing user device information
US11010468B1 (en)2012-03-012021-05-18The 41St Parameter, Inc.Methods and systems for fraud containment
US11886575B1 (en)2012-03-012024-01-30The 41St Parameter, Inc.Methods and systems for fraud containment
US9633201B1 (en)2012-03-012017-04-25The 41St Parameter, Inc.Methods and systems for fraud containment
US12153666B1 (en)2012-03-012024-11-26The 41St Parameter, Inc.Methods and systems for fraud containment
US10862889B2 (en)2012-03-222020-12-08The 41St Parameter, Inc.Methods and systems for persistent cross application mobile device identification
US9521551B2 (en)2012-03-222016-12-13The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US12058131B2 (en)2012-03-222024-08-06The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US11683306B2 (en)2012-03-222023-06-20The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US10341344B2 (en)2012-03-222019-07-02The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
US10021099B2 (en)2012-03-222018-07-10The 41st Paramter, Inc.Methods and systems for persistent cross-application mobile device identification
US12430651B2 (en)2012-08-022025-09-30The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10417637B2 (en)2012-08-022019-09-17The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US12002053B2 (en)2012-08-022024-06-04The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US11301860B2 (en)2012-08-022022-04-12The 41St Parameter, Inc.Systems and methods for accessing records via derivative locators
US10395252B2 (en)2012-11-142019-08-27The 41St Parameter, Inc.Systems and methods of global identification
US9990631B2 (en)2012-11-142018-06-05The 41St Parameter, Inc.Systems and methods of global identification
US11410179B2 (en)2012-11-142022-08-09The 41St Parameter, Inc.Systems and methods of global identification
US10853813B2 (en)2012-11-142020-12-01The 41St Parameter, Inc.Systems and methods of global identification
US11922423B2 (en)2012-11-142024-03-05The 41St Parameter, Inc.Systems and methods of global identification
US9143496B2 (en)2013-03-132015-09-22Uniloc Luxembourg S.A.Device authentication using device environment information
US9286466B2 (en)2013-03-152016-03-15Uniloc Luxembourg S.A.Registration and authentication of computing devices using a digital skeleton key
US9740849B2 (en)2013-03-152017-08-22Uniloc Luxembourg S.A.Registration and authentication of computing devices using a digital skeleton key
US11657299B1 (en)2013-08-302023-05-23The 41St Parameter, Inc.System and method for device identification and uniqueness
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
US12380341B1 (en)2013-08-302025-08-05The 41St Parameter, Inc.System and method for device identification and uniqueness
US12045736B1 (en)2013-08-302024-07-23The 41St Parameter, Inc.System and method for device identification and uniqueness
US11895204B1 (en)2014-10-142024-02-06The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10728350B1 (en)2014-10-142020-07-28The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US12301685B1 (en)2014-10-142025-05-13The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11240326B1 (en)2014-10-142022-02-01The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US20220027934A1 (en)*2018-11-162022-01-27Comenity LlcAutomatically aggregating, evaluating, and providing a contextually relevant offer
US11164206B2 (en)*2018-11-162021-11-02Comenity LlcAutomatically aggregating, evaluating, and providing a contextually relevant offer
US11847668B2 (en)*2018-11-162023-12-19Bread Financial Payments, Inc.Automatically aggregating, evaluating, and providing a contextually relevant offer

Also Published As

Publication numberPublication date
US7885899B1 (en)2011-02-08
US20050108177A1 (en)2005-05-19

Similar Documents

PublicationPublication DateTitle
US7885899B1 (en)System and method for secure network purchasing
US7366702B2 (en)System and method for secure network purchasing
US9779436B2 (en)Payment service capable of being integrated with merchant sites
AU776493B2 (en)A system and method for secure network purchasing
JP5638046B2 (en) Method and system for authorizing purchases made on a computer network
US7693283B2 (en)Methods and apparatus for providing user anonymity in online transactions
US20190347701A1 (en)Secure transaction protocol
US20060089906A1 (en)Method for securing a payment transaction over a public network
WO2001035304A9 (en)On-line payment system
CA2291920A1 (en)Technique for conducting secure transactions over a network
CZ2002744A3 (en)Methods and apparatus for conducting electronic transactions
WO2001052127A1 (en)Secure private agent for electronic transactions
JP2004511028A (en) Method and system for securely collecting, storing and transmitting information
US20090228816A1 (en)Method and system for realising on-line electronic purchase transaction between a buyer and a merchant
WO2000075843A1 (en)Internet payment system
WO2001029637A2 (en)System and method for secure electronic transactions
US20040093277A1 (en)Method and system for secure electronic purchase transactions
TW575826B (en)Software payment and download system and method thereof
WO2010089615A1 (en)Method and system for realising on-line electronic purchase transaction between a buyer and a merchant

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:LEMLE, ROBERT S., NEW YORK

Free format text:SECURITY AGREEMENT;ASSIGNOR:SAFE3W, R&D, LTD;REEL/FRAME:015425/0044

Effective date:20040329

Owner name:C&C INTERNET SECURITY, NEW YORK

Free format text:SECURITY AGREEMENT;ASSIGNOR:SAFE3W, R&D, LTD;REEL/FRAME:015425/0044

Effective date:20040329

ASAssignment

Owner name:SAFE3W, INC.,NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SANCHO, ENRIQUE DAVID;REEL/FRAME:024464/0338

Effective date:20040910

Owner name:IPASS INC.,CALIFORNIA

Free format text:MERGER;ASSIGNOR:SAFE3W, INC.;REEL/FRAME:024464/0705

Effective date:20040915

Owner name:SAFE3W, INC., NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SANCHO, ENRIQUE DAVID;REEL/FRAME:024464/0338

Effective date:20040910

Owner name:IPASS INC., CALIFORNIA

Free format text:MERGER;ASSIGNOR:SAFE3W, INC.;REEL/FRAME:024464/0705

Effective date:20040915

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp