$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Transaction execution system with secure data storage and communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04Q-009/00
  • G06K-007/00
출원번호 US-0483084 (1974-06-25)
발명자 / 주소
  • Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA)
출원인 / 주소
  • IBM Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 401  인용 특허 : 0

초록

A transaction execution system includes a host data processing system having a multiple account data base and a plurality of transaction terminals in communication with the host. The terminals each include a keyboard, a display, document handling subsystems, a hardware control subsystem, a communica

대표청구항

A transaction terminal which is connectable to a host and which is dependent upon a host for approval and recordation of transactions indicated by a user, the transaction terminal comprising: a data input device for entering a user determined block of identification information; an encoder connected

이 특허를 인용한 특허 (401)

  1. Guthrie,Scott D.; Robsman,Dmitry, ASP.NET HTTP runtime.
  2. Baump Paul A. (Canoga Park CA) Lyu Don (Los Angeles CA) Sain Jerry T. (Thousand Oaks CA) Zbriger Richard A. (Canoga Park CA), Access control system.
  3. Croney, Joseph Keith; Schechter, Greg David, Adaptive image formatting control.
  4. Mann Bruce L. (Flat Rock IN) Batti Steve A. (Martinsville IN), Addressable electronic switch.
  5. Micali Silvio, Anonymous information retrieval system (ARS).
  6. Pinder Howard George (Atlanta GA) Palgon Michael Steven (Atlanta GA), Apparatus and method for cipher stealing when encrypting MPEG transport packets.
  7. Nolte Michael,DEX ; Weigold Richard,DEX, Apparatus and method for the secure dispensing of bank papers.
  8. Rahtgen Preben (V rlose DKX), Apparatus for communicating with data systems and a method of communicating with data systems.
  9. Schieltz Steven W. (Kettering OH), Apparatus using a decision table for routing data among terminals and a host system.
  10. Shore, Jon, Apparatus, systems and methods for wirelessly transacting financial transfers, electronically recordable authorization transfers, and other information transfers.
  11. Kevin M. Messina, Authentication system for identification documents.
  12. Messina, Kevin M., Authentication system for identification documents.
  13. Trelawney,George Neville; Handoo,Sharad; Paramasivam,Sathiya Moorthy; Varadarajan,Udhaya Kumar; Moorthy,Madhusudhanan; Ara,Arjumand; Ramamoorthy,Suresh; Vijayakumar,Rajesh Kumar; Subramanian,Siva Kum, Automated banking machine diagnostic system and method.
  14. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  15. Lockwood Lawrence B. (5935 Folsom Dr. La Jolla CA 92037), Automated sales and services system.
  16. Harman Robert R. (Seaford DE) Joslyn Bruce. C. (Madison CT), Automated videocassette dispensing terminal coupled to store\s computerized rental system.
  17. Maurer Thomas (Munich DEX) Groettrup Helmut (Munich DEX) Helmrich Harald (Munich DEX), Automatic money dispenser and method.
  18. Ishizaki Masayuki (Kawasaki JPX) Satoh Kazuo (Kawasaki JPX) Kadooka Yoshimasa (Kawasaki JPX) Hayakawa Mariko (Kawasaki JPX) Urushihara Tetsuo (Kawasaki JPX), Automatic vending machine for vending information transmitted from satellite.
  19. Hamilton Scott B. (Kirkland WA) Rosenow Michael J. (Issaquah WA), Backup/restore technique in a microcomputer-based encryption system.
  20. Zhu, Xuewen; Ji, Kai; Yang, Aili; Xu, Congwei, Bar code symbol reading device having intelligent data communication interface to a host system.
  21. Zhu,Xuewen; Ji,Kai; Yang,Aili; Xu,Congwei, Bar code symbol reading device having intelligent data communication interface to a host system.
  22. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  23. Congdon Bradford B., Bus management card for use in a system for bus monitoring.
  24. Schisselbauer John C. (Southampton PA), Card reader with improved data processing timing control.
  25. Aizaki Yoshihiko (Kawasaki JPX), Cash processing system.
  26. Hayashida Shoji,JPX, Cashless medium for an electronic cashless system.
  27. Nakamura ; Yasushi ; Terada ; Hirotomo, Checkout system.
  28. Mitsuo Chihara JP, Circulation management system for issuing a circulation medium.
  29. Millington, Bradley D.; Lin, Andrew Cheng-Min; Kothari, Nikhil, Client-side callbacks to server events.
  30. Chamoff Martin E. (Austin TX) Piller Don W. (Austin TX), Clustered terminals with writable microcode memories & removable media for applications code & transactions data.
  31. Check ; Jr. Frank T. (Orange CT), Computer accessing system.
  32. Smith James G. (Laurel CAX), Computer communications control.
  33. Auer, Carol M.; Castagno, Daniel L.; Haley, Jr., Allen W.; Moore, IV, Harry J.; O'Leary, Sean E.; Paley, Steven J.; Rutt, Thomas E., Computer interface device.
  34. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Content security layer providing long-term renewable security.
  35. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Content security layer providing long-term renewable security.
  36. Elander Robert C. (Saugerties NY) Lennon Richard E. (Saugerties NY) Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY) Shuck Robert E. (West Hurley NY) Tuchman Walter L. (Boulder CO), Cryptographic application for interbank verification.
  37. Konheim Alan G. (Yorktown Heights NY) Tuckerman ; III Louis B. (Briarcliff Manor NY), Cryptographic architecture for use with a high security personal identification system.
  38. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication and file security using terminals.
  39. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
  40. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication security for single domain networks.
  41. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
  42. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  43. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  44. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split binding process and apparatus.
  45. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  46. Nishimura, Takeshi, Data access right management apparatus in a data-independent computer system.
  47. Stockburger Hermann (Kirnachweg 7 D-7742 St. Georgen DEX) Winderlich Hans-Georg (Niedere Str. 36 D-7730 Villingen DEX), Data card and data strip measuring means.
  48. Millington,Brad; Kothari,Nikhil; Lipton,Eilon; Huff,Polita, Data controls architecture.
  49. Boone Charles A. (Mesa AZ) Pfeifer Robert F. (Phoenix AZ), Data security module.
  50. Kawabe, Shigeru, Data transmission method and electronic device using the same.
  51. Siemens,John; Scotland,Nigel, Deposit taking system and method.
  52. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  53. Zhu, Xuewen; Ji, Kai; Yang, Aili; Xu, Congwei, Digital imaging-based system having intelligent data communication interface to a host system.
  54. Yu Che-Fn (Chelmsford MA), Distributed security procedure for intelligent networks.
  55. Nappi, Bruce, Effecting financial transactions.
  56. Zoltai John T. (P.O. Box 5463 Santa Fe NM 87502), Electronic authentication system.
  57. Hayashida Shoji,JPX, Electronic cashless system.
  58. Hayashida Shoji,JPX, Electronic cashless system.
  59. Hayashida, Shoji, Electronic cashless system.
  60. Hayashida, Shoji, Electronic cashless system.
  61. Shoji Hayashida JP, Electronic cashless system.
  62. Clark Barry Alan ; D'Onofrio John, Electronic delivery system and method for integrating global financial services.
  63. Yeates, Anthony James; Dournov, Pavel Anatolievich; Balasubramanian, Balaji; Arunachalam, Vaidyanathan; Whitlock, Donna Lynn; Belvin, Timothy, Electronic draft capture.
  64. Stein Theodore (New Rochelle NY), Electronic funds transfer system with means for verifying a personal identification number without pre-established secre.
  65. Turner, Christopher Gordon Gervase; Kruger, Johan Dawid, Electronic identification system and method with source authenticity.
  66. Boesch Brian Paul ; Crocker Stephen David ; Eastlake ; III Donald Eggleston ; Hart ; Jr. Alden Sherburne ; Lindenberg Robert A. ; Paredes Denise Marie, Electronic transfer system and method.
  67. Arsenault Robert G. (Stratford CT) Bailey William F. (Guilford CT) French Dale A. (Clinton CT), Encoded screen records for international postage meters.
  68. Roth Richard W. (Scottsdale AZ) Gregor William T. (Phoenix AZ) Sherwood Michael D. (Tempe AZ) Pokrajac Ned (Phoenix AZ), End of transaction control system.
  69. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  70. Latham Daren Wayne ; Gooderum Mark P. ; Andreas Glenn, Enhanced security network time synchronization device and method.
  71. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  72. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  73. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  74. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  75. Aono,Hiroshi; Ishii,Kazuhiko; Mori,Kensaku; Hongo,Sadayuki, IC card, portable terminal, and access control method.
  76. Erlin Dan, IR Transmitter with integral magnetic-stripe ATM type credit card reader & method therefor.
  77. Erlin Dan, IR transmitter with integral magnetic-stripe ATM type credit card reader and method therefor.
  78. Erlin Dan, IR transmitter with integral magnetic-stripe credit card reader.
  79. Lancto ; Donald C. ; Shuck ; Robert E., Identity verification method and apparatus.
  80. Enari Masahiko,JPX, Information signal transmission system.
  81. Enari Masahiko,JPX, Information signal transmission system.
  82. Tune, Andrew Dominic, Information storage system.
  83. Tune, Andrew Dominic, Information storage system.
  84. Niyogi,Shanku S.; Schechter,Greg D.; Brid,Regis L. F.; Kurlander,David J.; Lehenbauer,Daniel R., Inserting devices specific content.
  85. Clark Barry Alan ; D'Onofrio John, Interface device for electronically integrating global financial services.
  86. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Interpreter using cryptographic values of a playback device's keys to authorize the playback device.
  87. Masafumi Nishioka JP, METHOD AND APPARATUS FOR PREVENTING EXTRACTION OF CARD-SHAPED FUNCTIONAL DEVICE FOR INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM STORING PROGRAM FOR REALIZING EXTRACTION PREVENTING OPERATIO.
  88. Murphree David L. ; Speck Leslie A., Merchant specific debit card verification system.
  89. Katznelson Ron D. (San Diego CA), Metering retrieval of encrypted data stored in customer data retrieval terminal.
  90. Hohberger, Clive P.; Tsirline, Boris Y., Method and apparatus for article authentication.
  91. Hohberger, Clive P.; Tsirline, Boris Y., Method and apparatus for article authentication.
  92. Wesinger, Jr., Ralph E.; Coley, Christopher D., Method and apparatus for electronically publishing information on a computer network.
  93. Johnson Donald Byron ; Matyas ; Jr. Stephen Michael, Method and apparatus for encrypting long blocks using a short-block encryption procedure.
  94. Hann J. David (Vienna VA) Holdahl Theodore S. (Bethesda MD) Lum James C. P. (Herndon VA), Method and apparatus for enhancing security of communications in a packet-switched data communications system.
  95. Rushby Robert J. (Waterloo CAX) Damms Anthony B. (Kitchener CAX), Method and apparatus for improving bank operation productivity.
  96. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a dynamically-updating pay-for-service web site.
  97. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a pay-for-service web site.
  98. Atalla Martin M. (Atherton CA), Method and apparatus for securing data transmissions.
  99. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  100. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  101. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  102. Eckert Alton B. (Norwalk CT), Method and apparatus for verifying postage.
  103. Atalla Martin M. (Menlo Park CA), Method and means for securing the distribution of encoding keys.
  104. Riordan John ; Morehouse Bruce, Method and system for collecting and processing marketing data.
  105. Riordan, John; Morehouse, Bruce, Method and system for collecting and processing marketing data.
  106. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  107. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  108. Schechter,Greg D.; Niyogi,Shanku S.; Kurlander,David J.; Nye,Kris N., Method and system for interacting with devices having different capabilities.
  109. Strole, Norman C., Method and system for monitoring and control of complex systems based on a programmable network processor.
  110. Strole,Norman C., Method and system for monitoring and control of complex systems based on a programmable network processor.
  111. Gibbs,Matthew E.; Lehenbauer,Daniel R.; Niyogi,Shanku S.; Schechter,Greg D., Method and system for predicting optimal HTML structure without look-ahead.
  112. Lawlor Matthew P. ; Carmody Timothy E., Method and system for remote delivery of retail banking services.
  113. Lawlor, Matthew P.; Carmody, Timothy E., Method and system for remote delivery of retail banking services.
  114. Lawlor,Matthew P.; Carmody,Timothy E., Method and system for remote delivery of retail banking services.
  115. Yu, Chris S., Method and system for remote operator interface with a self-service financial transactions terminal.
  116. Guthrie, Scott D.; Gutierrez, David; Millington, Bradley D., Method and system for tracing.
  117. Schull,Jonathan, Method for adapting a software product to an environment.
  118. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  119. Chesarek Donald J. (Los Gatos CA), Method for operating a transaction execution system having improved verification of personal identification.
  120. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  121. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  122. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method for updating personal financial information on a web site.
  123. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  124. Zhu,Xuewen; Ji,Kai; Yang,Aili; Xu,Congwei, Method of automatically establishing a data communication link between an optical code reading device and a host system having a data communication interface.
  125. Felger, David, Method of billing a purchase made over a computer network.
  126. Felger, David, Method of billing a purchase made over a computer network.
  127. Felger, David, Method of billing a purchase made over a computer network.
  128. Smith, Taylor; Kotlarsky, Anatoly; Wilz, Sr., David M.; Mandal, Sudhin; De Foney, Shawn; Allen, Christopher; Murashka, Pavel, Method of programming the system configuration parameters of a digital image capture and processing system during the implementation of its communication interface with a host system without reading programming-type bar code symbols.
  129. Yuen, Pak Kay, Method of secure encryption.
  130. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  131. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  132. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  133. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  134. Shepherd, Ian Kenneth, Methods of exchanging an obligation.
  135. Atalla Martin M. (18 Monte Vista Ave. Atherton CA 94025) Hopkins Webster D. (2425 Rick Dr. Morgan Hill CA 95020), Multilevel security apparatus and method with personal key.
  136. Ebbo, David S.; Niyogi, Shanku Shivabrata; Sanabria, Andres M., Non-compile pages.
  137. Clausing ; Martin B., Off-line, one-level/on-line, two-level timeshared automated banking system.
  138. Slater ; Charles E. ; Dunn ; Paul E. ; Mustain ; Lewis B., On-line/off-line automated banking system.
  139. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  140. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  141. Nguyen, Luan K.; Strand, William A.; Bliss, Jason A.; Endresen, Geoffrey E.; McMillan, Bethel S., Partial file encryption.
  142. Ebbo, David S.; Guthrie, Scott D.; Smith, Adam W., Partial page output caching.
  143. Johnson William C. (Los Angeles CA) Marx Donald L. (Redondo Beach CA), Personal access management system.
  144. Johnson William Cedric (Los Angeles CA) Marx Donald L. (Redondo Beach CA), Personal access management system.
  145. Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Personal access management system.
  146. Fak Viiveke (Ryttaregngen 24 S-58266 Linkping SEX) Ingemarsson Ingemar B. (Hedborns gata 2 Linkping SEX S-58249) Blom Rolf (Rydsvgen 318C Linkping SEX) Forchheimer Robert (Braxstigen 5 S-13500 TyresS, Personal identification system.
  147. Templeton, Randy J.; Mollett, Cassandra J.; Smith, David Wayne, Point of sale payment terminal.
  148. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  149. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  150. Storace Anthony (Norwalk CT), Postage meter recharging system.
  151. Burd,Gary S.; Cooper,Kenneth B.; Guthrie,Scott D.; Ebbo,David S.; Anders,Mark T.; Peters,Ted A.; Millet,Stephen J., Postback input handling by server-side control objects.
  152. Burd,Gary S.; Cooper,Kenneth B.; Guthrie,Scott D.; Ebbo,David S.; Anders,Mark T.; Peters,Ted A.; Millet,Stephen J., Postback input handling by server-side control objects.
  153. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  154. Lamb James A. (Hoffman Estates IL) Blankenship Johnny E. (Schaumburg IL) Dykas George E. (Vernon Hills IL) Milleker William (Chicago IL) Hamilton Kenneth W. (Rolling Meadows IL), Programmable digital data terminal for mobile radio transceivers.
  155. Atalla Martin M. (Portola Valley CA), Programmable security system and method.
  156. Pailen William (Derwood MD) Harper Jim L. (Olney MD), Protected software access control apparatus and method.
  157. Guthrie, Scott D; Christensen, Erik B; Christensen, Yann E, Providing remote processing services over a distributed communications network.
  158. Guthrie,Scott D.; Christensen,Erik B; Christensen,Yann E., Providing remote processing services over a distributed communications network.
  159. Morgan Barrie O. (Dallas TX) Abmayr David W. (Carrollton TX), Recipient and message authentication method and system.
  160. Soenen Eric G. (Plano TX) Davis Gregory B. (Allen TX) Dycus Angie (Plano TX), Rolling code identification scheme for remote control applications.
  161. Constant James N. (1603 Danbury Dr. Claremont CA 91711), Secure computer.
  162. Boerbert William E. (Minneapolis MN), Secure computer interface.
  163. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  164. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  165. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  166. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  167. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  168. Morikawa, Shigenori; Iguchi, Toshiyuki; Otsuka, Motoi, Security managing system, data distribution apparatus and portable terminal apparatus.
  169. Trenkamp Robert H. (Cleveland Heights OH), Security means for transaction terminal system.
  170. Reilly Chris,AUX, Security system for EFT using magnetic strip cards.
  171. Campbell Carl M. (Newtown Square PA), Security system for electronic funds transfer system.
  172. Gilhousen Klein S. (San Diego CA) Heller Jerrold A. (San Diego CA) Harding Michael V. (San Diego CA) Blakeney ; II Robert D. (Del Mar CA), Selective enablement of descramblers.
  173. Gilhousen Klein S. (San Diego CA) Heller Jerrold A. (San Diego CA) Van Harding Michael (San Diego CA) Blakeney ; II Robert D. (Del Mar CA), Selective-subscription descrambling.
  174. Hashimoto,Naotaka; Hoshino,Yutaka; Ikeda,Shuji, Semiconductor integrated circuit device having capacitor element.
  175. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and method.
  176. Harvey John Christopher ; Cuddihy James William, Signal processing apparatus and methods.
  177. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  178. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  179. Harvey, John Christopher; Ciddihy, James William, Signal processing apparatus and methods.
  180. Harvey, John Christopher; Cuddihy, James Willam, Signal processing apparatus and methods.
  181. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  182. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  183. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  184. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  185. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  186. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  187. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  188. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  189. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  190. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  191. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  192. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  193. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  194. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  195. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  196. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  197. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  198. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  199. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  200. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  201. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  202. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  203. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  204. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  205. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  206. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  207. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  208. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  209. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  210. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  211. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  212. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  213. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  214. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  215. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  216. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  217. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  218. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  219. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  220. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  221. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  222. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  223. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  224. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  225. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  226. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  227. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  228. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  229. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  230. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  231. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  232. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  233. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  234. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  235. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  236. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  237. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  238. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  239. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  240. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  241. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  242. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  243. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  244. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  245. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  246. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  247. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  248. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  249. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  250. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  251. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  252. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  253. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  254. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  255. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  256. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  257. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  258. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  259. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  260. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  261. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  262. Adhikari, Akshay; Garg, Sachin; Krishnakumar, Anjur Sundaresan; Singh, Navjot, Signal watermarking in the presence of encryption.
  263. Niyogi, Shanku Shivabrata; Yang, Ting-Hao; Croney, Joseph K.; Gibbs, Matthew E.; Schackow, Stefan, Site navigation and site navigation data source.
  264. Ebbo, David S.; Yang, Ting Hao, Software build extensibility.
  265. Bussey, Mark G.; Zimmerman, Fred C., Software key control for mobile devices.
  266. Bussey, Mark G.; Zimmerman, Fred C., Software key control for mobile devices.
  267. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  268. Burd,Gary S.; Cooper,Kenneth B.; Anders,Mark T.; Guthrie,Scott D.; Ebbo,David S.; Peters,Ted A.; Millet,Stephen J., State management of server-side control objects.
  269. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  270. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  271. Gray James P. ; Onvural Raif O. ; Peyravian Mohammad, Synchronization of encryption/decryption keys in a data communication network.
  272. Hurry, Simon; Aabye, Christian, System and method for account identifier obfuscation.
  273. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  274. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  275. Patterson Peter Theodore (Cinnaminson NJ), System and method for authenticating an electronically transmitted document.
  276. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  277. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  278. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  279. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  280. Schull,Jonathan, System and method for controlling access to protected information.
  281. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  282. Schull,Jonathan, System and method for creating and running protected information.
  283. Schull, Jonathan, System and method for distributing protected information.
  284. Mangtani, Komal; Blevins, Michael, System and method for electronic business transaction reliability.
  285. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  286. Schull,Jonathan, System and method for operating a licensing server.
  287. Schull,Jonathan, System and method for processing protected audio information.
  288. Schull, Jonathan, System and method for processing protected text information.
  289. Schull,Jonathan, System and method for processing protected video information.
  290. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  291. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  292. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  293. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  294. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  295. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  296. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  297. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  298. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  299. Schull,Jonathan, System and method for selling protected information in an oem context.
  300. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  301. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  302. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  303. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  304. Sendrow Marvin (4609 Logsdon Dr. Annandale VA 22003), System for authenticating users and devices in on-line transaction networks.
  305. Sharpe Murem S. (Stamford CT) Bryson Eugene (Redding CT) Manduley Flavio (Woodbury CT) Riordan ; II Eben M. (Southport CT) Flesser Brian D. (Norwalk CT), System for centralized processing of accounting and payment functions.
  306. Clark Barry Alan ; D'Onofrio John, System for communicating with an electronic delivery system that integrates global financial services.
  307. Matsumoto Hiromichi (Kyoto JPX) Hashimoto Ritsuo (Kyoto JPX), System for controlling communication between a main control assembly and programmable terminal units.
  308. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  309. McFiggans Robert B. (Stamford CT), System for securing postage printing transactions.
  310. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  311. Nguyen Trong ; Haller Daniel R. ; Kramer Glenn A., System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture.
  312. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser.
  313. Kramer Glenn A., System, method and article of manufacture for a modular gateway server architecture.
  314. Rowney Kevin T. B., System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible.
  315. Bahreman Ali Reza, System, method and article of manufacture for dynamic negotiation of a network payment framework.
  316. Weber Jay C. ; Rowney Kevin T. B. ; Kramer Glenn A., System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture.
  317. Haller Daniel R. ; Nguyen Trong, System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing.
  318. Williams Humphrey, System, method and article of manufacture for initiation of software distribution from a point of certificate creation utilizing an extensible, flexible architecture.
  319. Haller Daniel R. ; Nguyen Trong ; Rowney Kevin T. B. ; Berger David A. ; Kramer Glenn A., System, method and article of manufacture for managing transactions in a high availability system.
  320. Weber Jay C. ; Berger David A. ; Arora Atul, System, method and article of manufacture for multiple-entry point virtual point of sale architecture.
  321. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment.
  322. Berger David A. ; Weber Jay C. ; Kramer Glenn A., System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a.
  323. Weber Jay C., System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensi.
  324. Rowney Kevin Thomas Bartholomew ; Nadig Deepak S., System, method and article of manufacture for secure network electronic payment and credit collection.
  325. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for the use of payment instrument holders and payment instruments in network.
  326. Kevin T. B. Rowney, System, method and article of manufacture for transmitting messages within messages utilizing an extensible, flexible architecture.
  327. Weber Jay C., System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing.
  328. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  329. Shepherd, Ian Kenneth, Systems and computer program products for exchanging an obligation.
  330. Stoutenburg,Earney; Mollett,Cassandra J.; Price,James; Fillinger,Charles A.; Nelson,Eric M.; Seifert,Dean A.; Singleton,Jeffrey, Systems and methods for configuring a point-of-sale system.
  331. Chory, Susan; Gibbs, Matthew E.; Guthrie, Scott D.; Harder, Michael; Howard, Robert M.; Imig, Scott Kirk; Kothari, Nikhil; Niyogi, Shanku Shivabrata; Yang, Ting-Hao; Sanabria, Andres M., Systems and methods for defining web content navigation.
  332. West, Billie J., Systems and methods for displaying current consumer card status on a wireless device.
  333. West, Billie Jean, Systems and methods for displaying current consumer card status on a wireless device.
  334. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  335. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  336. Chory, Susan; Ebbo, David S.; Howard, Robert M.; Yang, Ting-Hao, Systems and methods for persisting data between web pages.
  337. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  338. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  339. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  340. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  341. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  342. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  343. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  344. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  345. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  346. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  347. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  348. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  349. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  350. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  351. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  352. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  353. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  354. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  355. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  356. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  357. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  358. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  359. Shepherd, Ian Kenneth, Systems and methods relating to the formulation of a multi-party contract.
  360. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  361. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  362. Shepherd,Ian K., Systems for exchanging an obligation.
  363. Shepherd, Ian K, Systems relating to the establishment of a contractual obligation.
  364. Shepherd, Ian Kenneth, Systems relating to the formulation of risk management contracts.
  365. Lawlor Matthew P. ; Carmody Timothy E., Targeting advertising in a home retail banking delivery service.
  366. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  367. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  368. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  369. Watson Gary E., Telephone tone security device.
  370. Shimada Takashi,JPX ; Akita Kiyofumi,JPX ; Idei Shigeru,JPX ; Fujita Hisashi,JPX, Telephone transaction support system.
  371. Sechet Claude (14 ; rue Theodore Botrel Rennes FRX) Babonneau Gerard (14 ; rue Theodore Botrel 35830 Betton FRX) Guillou Louis C. (Saint Erblon FRX), Television system with access control.
  372. Hammad, Ayman; Faith, Patrick, Terminal data encryption.
  373. Hammad, Ayman; Faith, Patrick, Terminal data encryption.
  374. Guillou Louis C. (Bourgbarre-Saint Erblon FRX), Text video-transmission system provided with means for controlling access to the information.
  375. Hammad, Ayman, Track data encryption.
  376. Hammad, Ayman, Track data encryption.
  377. Hammad, Ayman, Track data encryption.
  378. Anderson Robert W. (Morgan Hill CA) Gee May L. (San Jose CA) McMullen Alice K. (Campbell CA), Transaction execution system with improved key function versatility.
  379. Anderson Robert W. (Morgan Hill CA) Brock Steven F. (San Jose CA) Gee May L. (San Jose CA), Transaction execution system with secure encryption key storage and communications.
  380. Aizawa Kuniomi (Seto JPX) Ohyama Yasuyoshi (Owariasahi JPX) Okuma Yasuo (Seto JPX) Okano Yoshio (Seto JPX) Kitamura Youichirou (Kashiwa JPX), Transaction handling system.
  381. Hayashida Shoji,JPX, Transaction terminal for an electronic cashless system.
  382. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  383. Bhimani, Anish; Marlow, William; Weiss, Errol; Schugar, Francis W., Trusted and anonymous system and method for sharing threat data to industry assets.
  384. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  385. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  386. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  387. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  388. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  389. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  390. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  391. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  392. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  393. Morris C. Carson (Broad Run VA) Bielsker Barry H. (Vienna VA) Cole Donald A. (Rockville MD), Two-tiered communication security employing asymmetric session keys.
  394. Priddy Dennis G., Unalterable self-verifying articles.
  395. Zurko,Mary Ellen; Casey, Jr.,Thomas Andrew; Gasser,Morrie; Hall,Judith Shelhorse; Kahn,Clifford Earl; Mason,Andrew Halstead; Sawyer,Paul Douglas; Kendall,Leslie Richard; Lipner,Steven B., Verification of trusted-path commands.
  396. Inoyama Tadao (Yokohama JPX) Aomori Kokichi (Tokyo JPX) Terai Hidekazu (Kodaira JPX), Versatile automatic transaction equipment.
  397. Moore, Anthony J.; Warren, Susan M.; Guthrie, Scott D.; Isaac, Steven A., Web controls validation.
  398. Moore,Anthony J.; Warren,Susan M.; Guthrie,Scott D.; Isaac,Steven A., Web controls validation.
  399. Joseph C. Kawan, Wireless transaction and information system.
  400. Kawan Joseph C., Wireless transaction and information system.
  401. Kolouch, James L., XML encryption scheme.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로