$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Electronic funds transfer system with means for verifying a personal identification number without pre-established secre 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G07D-007/00
출원번호 US-0044887 (1987-05-01)
발명자 / 주소
  • Stein Theodore (New Rochelle NY)
출원인 / 주소
  • MasterCard International, Inc. (New York NY 02)
인용정보 피인용 횟수 : 135  인용 특허 : 11

초록

An electronic funds transfer system employs a means to verify a personal identification number PE entered by the user with the correct PIN (PT) stored at the host terminal. The remote and host terminals each generate an encryption key, and encrypt PE and PT at the respective terminals. These values

대표청구항

A method of operating an electronic funds transfer of the type having at least one remote terminal and at least one issuer host terminal, comprising the steps of: (a) accepting at the remote terminal account identification data and a personal identification number PE from a user; (b) providing a fir

이 특허에 인용된 특허 (11)

  1. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  2. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  3. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  4. Bouricius Willard G. (Katonah NY) Stuckert Paul E. (Katonah NY), Method and apparatus for secure message transmission for use in electronic funds transfer systems.
  5. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  6. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  7. Atalla Martin M. (Menlo Park CA), Method and means for securing the distribution of encoding keys.
  8. Chesarek Donald J. (Los Gatos CA), Method for operating a transaction execution system having improved verification of personal identification.
  9. Campbell Carl M. (Newtown Square PA), Security system for electronic funds transfer system.
  10. Sendrow Marvin (4609 Logsdon Dr. Annandale VA 22003), System for authenticating users and devices in on-line transaction networks.
  11. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.

이 특허를 인용한 특허 (135)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  3. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  4. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  5. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  6. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  7. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  9. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  10. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  11. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  12. Bishop, Fred A.; Sharma, Bansi L.; Thomas, Tracey R., Allocating partial payment of a transaction amount using an allocation rule.
  13. Hogg, Jason J.; Graf, Patrick, Anonymous transaction card.
  14. Hogg, Jason J.; Graf, Patrick, Anonymous transaction card.
  15. Catherman, Ryan Charles; Challener, Dave Carroll; Hino, Akira; Hoff, James Patrick; Ward, James Peter, Apparatus, system, and method for secure communications from a human interface device.
  16. Counterman, Raymond C., Application-based credential management for multifactor authentication.
  17. Welner Stephen (Martinsville NJ), Automated system for identifying authorized system users.
  18. Flitcroft, Daniel Ian; O'Donnell, Graham; Langford, Conor; Carroll, James, Business-to-business commerce using financial transaction numbers.
  19. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  20. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  21. Peacham, Anthony David, Codelets.
  22. Peachman, Anthony David; Simmons, Ian Stephen, Configuration of IC card.
  23. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  24. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  25. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  26. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  27. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  28. Flitcroft, Daniel I; O'Donnell, Graham, Credit card system and method.
  29. Flitcroft, Daniel Ian; O'Donnell, Graham, Credit card system and method.
  30. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  31. Flitcroft, Daniel Ian; Lyons, Garry, Credit cards system and method having additional features.
  32. Carapelli, Giovanni; Welch, Bruce, Cryptographic watermarking of content in fuel dispensing environments.
  33. Aikawa, Makoto; Takaragi, Kazuo; Koreeda, Hiroyuki; Sasamoto, Manabu; Okamoto, Hiroo; Noguchi, Takaharu; Furuya, Soichi; Hirahata, Shigeru, Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same.
  34. Clayton, Ray; Mendoza, Eliel J.; Cochran, Ronn Warren, Data encryption system and method.
  35. Flitcroft,Daniel I.; O'Donnell,Graham, Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions.
  36. Hoffberg, Steven M., Detection and alert of automobile braking event.
  37. Dawson Gerald L. ; Thompson Daniel L., Electronic combination lock utilizing a one time use combination.
  38. Dawson, Gerald L.; Thompson, Daniel L., Electronic combination lock utilizing a one-time use combination.
  39. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  40. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  41. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  42. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Flexibly loading a tamper resistant module.
  43. Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  44. Williams, Rodger K.; Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  45. Williams, Rodger K.; Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  46. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  47. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  48. Walsh Joseph F. ; Boydston David H., Handheld remote computer control and methods for secured interactive real-time telecommunications.
  49. Richards Timothy Philip,GBX, IC card with shell feature.
  50. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  51. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Integrated circuit card with application history list.
  52. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  53. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  54. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  55. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  56. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  57. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  58. Timothy Philip Richards GB, Key transformation unit for an IC card.
  59. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  60. Walsh Joseph F. ; Boydston David H., Low power telecommunication controller for a host computer server.
  61. Walsh Joseph F. ; Boydston David H., Low-power hand-held transaction device.
  62. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  63. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  64. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  65. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  66. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  67. Bates, Daniel; Geaga, Jorge, Method and apparatus for associating the color of an object with an event.
  68. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  69. Daugaard, Kim, Method and system for ensuring connection of a module to an electronic apparatus.
  70. Kim Daugaard DK, Method and system for ensuring connection of a module to an electronic apparatus.
  71. Richey, David; King, Marie; Bernhard, Lisa; Van Horn, David, Method and system for facilitating electronic dispute resolution.
  72. Richey,David; King,Marie; Bernhard,Lisa; Van Horn,David, Method and system for facilitating electronic dispute resolution.
  73. Redmond, Eric; Huang, Jean; Heisinger, Pete, Method and system for providing multiple services via a point-of-sale portal architecture.
  74. Redmond, Eric; Huang, Jean; Heisinger, Pete, Method and system for providing multiple services via a point-of-sale portal architecture.
  75. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  76. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  77. Stambler Leon, Method for securing information relevant to a transaction.
  78. Stambler Leon, Method for securing information relevant to a transaction.
  79. Stambler Leon, Method for securing information relevant to a transaction.
  80. Kerner, Robert; Tang, Weidong, Method, medium, and system for facilitating online transactions.
  81. Johnson, Alan E., Methods and systems for IC card application loading.
  82. Hoffberg, Steven M., Mobile communication device.
  83. Hoffberg, Steven M., Mobile communication device for delivering targeted advertisements.
  84. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  85. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  86. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  87. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  88. Austin Jeffrey R. (Hindhead GB2), Public key diversification method.
  89. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  90. Long, Joseph D.; Carapelli, Giovanni, Remote display tamper detection using data integrity operations.
  91. Long, Joseph D.; Carapelli, Giovanni, Remote display tamper detection using data integrity operations.
  92. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  93. Hogg, Jason J.; Ng, Winter P., Secure exchange of indicia of value and associated information.
  94. Hogg, Jason J.; Ng, Winter P., Secure exchange of indicia of value and associated information.
  95. Hogg, Jason J.; Ng, Winter P., Secure exchange of indicia of value and associated information.
  96. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  97. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephens; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  98. Everett,David Barrington; Miller,Stuart James; Peacham,Anthony David; Simmons,Ian Stephen; Richards,Timothy Philip; Viner,John Charles, Secure multiple application card system and process.
  99. Stambler Leon (7803 Boulder La. Parkland FL 33067), Secure transaction system and method utilized therein.
  100. Hsiao Alaric S., Secured personal identification number.
  101. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  102. Serbetciouglu Bekir ; Ozulkulu Esref ; Bagoren Ilhan, Short message transaction handling system.
  103. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  104. Preist, Christopher William; Cuadrado, Javier Esplugas; Kudla, Caroline; Trastour, David, System and method for constraint resolution.
  105. Markakis, Dimitrios; Hochfield, Barry; Beric, John; Roberts, David Anthony, System and method for controlling access to computer code in an IC card.
  106. Hogg, Jason J.; Graf, Patrick, System and method for disputing individual items that are the subject of a transaction.
  107. Hogg, Jason J.; Graf, Patrick, System and method for disputing individual items that are the subject of a transaction.
  108. Hogg, Jason J.; Graf, Patrick, System and method for disputing individual items that are the subject of a transaction.
  109. Hogg, Jason J.; Graf, Patrick, System and method for disputing individual items that are the subject of a transaction.
  110. Hogg, Jason J.; Graf, Patrick, System and method for disputing individual items that are the subject of a transaction.
  111. Kerner, Robert; Tang, Weidong, System and method for facilitating online transactions.
  112. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, System and method for flexibly loading an IC card.
  113. David Barrington Everett GB; Stuart James Miller GB; Anthony David Peacham GB; Ian Stephen Simmons GB; Timothy Philip Richards GB; John Charles Viner GB, System and method for flexibly loading in IC card.
  114. Hogg, Jason J.; Graf, Patrick, System and method for immediate issuance of transaction cards.
  115. Hogg, Jason J.; Graf, Patrick, System and method for immediate issuance of transaction cards.
  116. Hogg, Jason J.; Graf, Patrick, System and method for immediate issuance of transaction cards.
  117. Hogg, Jason J.; Graf, Patrick, System and method for immediate issuance of transaction cards.
  118. Hogg, Jason J.; Graf, Patrick, System and method for new execution and management of financial and data transactions.
  119. Hogg, Jason J.; Graf, Patrick, System and method for new execution and management of financial and data transactions.
  120. D'Agostino, John, System and method for performing secure credit card purchases.
  121. D'Agostino, John, System and method for performing secure credit card transactions.
  122. Robertson, Philip A.; Williams, Rodger K.; Weston, Timothy M., System and method for selective encryption of input data during a retail transaction.
  123. Bates, Daniel Louis; Geaga, Jorge; Arnold, Glenn Christopher; Le, Thach Cam; Kaesman, Ann Marie; Jaroszewicz, Thomas, System and method for tracking an object in a video and linking information thereto.
  124. Bates, Daniel Louis; Geaga, Jorge; Arnold, Glenn Christopher; Le, Thach Cam; Kaesman, Ann Marie; Jaroszewicz, Thomas, System and method for tracking an object in a video and linking information thereto.
  125. Hogg, Jason J.; Graf, Patrick, System and method for user selection of fraud detection rules.
  126. Bishop, Fred A.; Sharma, Bansi L.; Thomas, Tracey R., Systems and methods for authorizing an allocation of an amount between transaction accounts.
  127. Bishop, Fred A.; Sharma, Bansi L.; Thomas, Tracey R., Systems and methods for authorizing an allocation of an amount between transaction accounts.
  128. Bishop, Fred; Sharma, Bansi; Thomas, Tracey R., Systems and methods for facilitating transactions with interest.
  129. Bishop, Fred A.; Sharma, Bansi L.; Thomas, Tracey R., Systems and methods for suggesting an allocation.
  130. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  131. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  132. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  133. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  134. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  135. Elliott, John C.; O'Connell, James A.; Ladouceur, Lawrence; Altman, William; Jarett, Keith, Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로