$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/02
  • H04L-009/20
  • G07F-007/08
출원번호 US-0298039 (1989-01-18)
발명자 / 주소
  • Weiss Kenneth P. (7 Park Ave. Newton MA 02150)
인용정보 피인용 횟수 : 191  인용 특허 : 31

초록

A personal verification system comprising a user device which is adapted to generate a time varying, multi-character, nonpredictable code; a verification device; a mechanism for permitting the user to communicate the nonpredictable code generated by the user device at a given time to the verificatio

대표청구항

A user verification system comprising: a user device which is adapted to generate a time varying, multi-character, nonpredictable code; a verification device; and means for permitting the user to communicate the nonpredictable code generated by the user device at a given time to the verification dev

이 특허에 인용된 특허 (31)

  1. Hargrove ; Daniel J., Asynchronous digital locking system.
  2. Schwartz Jay W. (Potomac MD), Balanced system for ranging and synchronization between satellite pairs.
  3. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Data carrier.
  4. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  5. Lam Jack F. (Endwell NY) Schmid Hermann (Binghamton NY), Fault tolerant, frame synchronization for multiple processor systems.
  6. Bouricius Willard G. (Katonah NY) Feistel Horst (Lexington MA), High security system for electronic signature verification.
  7. Powell William S. (Rte. 2 ; Box 203A Thornville OH 43076), Information communicating apparatus and method.
  8. Sibley ; Jr. H. C. (7418-D Fair Oaks Dallas TX 75231), International commodity trade exchange.
  9. Stuckert Paul E. (Katonah NY), Method and apparatus for achieving secure password verification.
  10. Ehrat Kurt (Zurich CHX), Method and apparatus for ciphering and deciphering messages.
  11. Kohnen Hubert (1928-B Sparrow Dr. Point Mugu CA 93041), Method and apparatus for position determination.
  12. Bouricius Willard G. (Katonah NY) Stuckert Paul E. (Katonah NY), Method and apparatus for secure message transmission for use in electronic funds transfer systems.
  13. Ehrat Kurt (Zurich CHX), Method and apparatus for synchronizing the ciphering and deciphering of binary-coded messages.
  14. Thomas Richard B. (1902 E. Hope St. Mesa AZ 85203), Method and system for controlling use of protected software.
  15. Graupe ; Daniel ; Cohn ; David L. ; Causey ; G. Donald, Method of and means for processing an audio frequency signal to conceal intelligility.
  16. Kinch ; Jr. Frederick A. (Richardson TX) Morgan Barrie O. (Dallas TX), Multi-mode digital enciphering system.
  17. Stuckert Paul E. (Katonah NY), Personal portable terminal for financial transactions.
  18. Atalla, Martin M.; Bestock, Ralph R., Pocket banking terminal, method and system.
  19. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  20. O\Connor Roger J. (Garden Grove CA) Lane Keith A. (Huntington Beach CA), Rapid frequency-hopping time synchronization.
  21. Griffith John B. (Plantation FL) Linton Donald F. (Pompano Beach FL), Security transaction system for financial data.
  22. Cargile William P. (Half Moon Bay CA), Solid state key for controlling access to computer software.
  23. Cargile William P. (Half Moon Bay CA), Solid state key for controlling access to computer software.
  24. Sakoe Hiroaki (Tokyo JPX), Speaker recognizer in which a significant part of a preselected one of input and reference patterns is pattern matched t.
  25. Bidell Frederick W. (Grand Island NY) Kluever Harold C. (Williamsville NY) Reed Roger R. (Arlington MA), Synchronization of long codes of bounded time uncertainty.
  26. Wilkinson, Robert G., Synchronizing of clocks.
  27. Herve Robert J. L. (Versailles FRX), System and process for identification of persons requesting access to particular facilities.
  28. Hasegawa Satoshi (Tokyo JPX), System for carrying out spread spectrum communication through an electric power line.
  29. Jesurum Robert (Stamford CT), Telephone line monitoring system.
  30. Plangger David (Stevensville MI) Wilson Wayne K. (St. Joseph MI), Time corrected, continuously updated clock.
  31. Tsuji Yoshikazu (Kawasaki JA) Tada Yoshiro (Kawasaki JA), Transmit phase control system of synchronization burst for SDMA/TDMA satellite communication system.

이 특허를 인용한 특허 (191)

  1. Regelski, Michael; Prokupets, Rudy; Yuan, John, Access control system having automatic download and distribution of security information.
  2. Tumey,David M.; Xu,Tianning, Animated toy utilizing artificial intelligence and facial image recognition.
  3. Palmer,Glennard D.; Doughty,Ralph O.; Antaki,Patrick R., Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation.
  4. Weiss, Kenneth P., Apparatus, system and method employing a wireless user-device.
  5. Weiss, Kenneth P., Apparatus, system and method for secure payment.
  6. Kisters, Friedrich, Authentication and/or identification method in a communication network.
  7. Mark Andrew R., Auto-dialer housing.
  8. Chang, Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  9. Chang, Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  10. Chang, Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  11. Chang,Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  12. Stern, Benjamin J.; Wilpon, Jay, Biometric authentication.
  13. Stern, Benjamin J.; Wilpon, Jay Gordon, Biometric authentication.
  14. Stern, Benjamin J; Wilpon, Jay, Biometric authentication.
  15. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  16. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  17. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  18. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  19. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  20. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Biometric tokenless electronic rewards system and method.
  21. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  22. Flitcroft, Daniel Ian; O'Donnell, Graham; Langford, Conor; Carroll, James, Business-to-business commerce using financial transaction numbers.
  23. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  24. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  25. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  26. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  27. Flitcroft, Daniel I; O'Donnell, Graham, Credit card system and method.
  28. Flitcroft, Daniel Ian; O'Donnell, Graham, Credit card system and method.
  29. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  30. Flitcroft, Daniel Ian; Lyons, Garry, Credit cards system and method having additional features.
  31. Flitcroft,Daniel I.; O'Donnell,Graham, Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions.
  32. Duane, William; Hamel, Jeffrey, Derivative seeds.
  33. York Dennis Cary, Detachable card for capturing graphics.
  34. Aley-Raz, Almog; Krause, Nir Moshe; Salmon, Michael Itzhak; Gazit, Ran Yehoshua, Device, system, and method of liveness detection utilizing voice biometrics.
  35. Aley-Raz, Almog; Krause, Nir Moshe; Salmon, Michael Itzhak; Gazit, Ran Yehoshua, Device, system, and method of liveness detection utilizing voice biometrics.
  36. Aley-Raz, Almog; Krause, Nir Moshe; Salmon, Michael Itzhak; Gazit, Ran Yehoshua, Device, system, and method of liveness detection utilizing voice biometrics.
  37. Bansal, Pradeep K.; Begeja, Lee; Creswell, Carroll W.; Farah, Jeffrey; Stern, Benjamin J.; Wilpon, Jay, Digital communication biometric authentication.
  38. Bansal, Pradeep K.; Begeja, Lee; Creswell, Carroll W.; Farah, Jeffrey; Stern, Benjamin J.; Wilpon, Jay, Digital communication biometric authentication.
  39. Bansal, Pradeep K.; Begeja, Lee; Creswell, Carroll W.; Farah, Jeffrey; Stern, Benjamin J.; Wilpon, Jay, Identity challenges.
  40. Fujimoto, Jun, Individual identification card system.
  41. Mark Andrew R., Information storage device for storing personal identification information.
  42. Tsutsui Kyoya,JPX, Information transmitting apparatus and information transmitting system.
  43. Kim, Jin-soo, Memory card, digital device, and method of data interfacing between memory card and digital device.
  44. Fu, Yan; Asokan, Nadarajah; Aarni, Ville, Method and apparatus for accelerated authentication.
  45. Fu, Yan; Asokan, Nadarajah; Aarni, Ville, Method and apparatus for accelerated authentication.
  46. Brainard,John G.; Kaliski, Jr.,Burton S.; Rivest,Ronald L., Method and apparatus for performing enhanced time-based authentication.
  47. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  48. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  49. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  50. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  51. Weiss, Kenneth P., Method and apparatus for secure access, payment and identification.
  52. Duane, William M., Method and apparatus for secure validation of tokens.
  53. Alexander, Bruce; Grose, Karen; Schebel, Christoph; Antal, David, Method and process for configuring a premises for monitoring.
  54. Alexander, Bruce; Grose, Karen; Schebel, Christoph; Antal, David, Method and process for configuring a premises for monitoring.
  55. Alexander, Bruce; Grose, Karen; Schebel, Christoph; Antal, David, Method and process for configuring a premises for monitoring.
  56. Alexander,Bruce; Grose,Karen; Schebel,Christoph; Antal,David, Method and process for configuring a premises for monitoring.
  57. Mark Andrew R., Method and system for compensating for signal deviations in tone signals over a transmission channel.
  58. Rosset, Franck; Gayet, Alain; Moulin, Jean, Method and system for ensuring the securing of computer servers of games.
  59. Rosset, Franck; Gayet, Alain; Moulin, Jean, Method and system for ensuring the security of fax transmission using an identifying card.
  60. Rosset,Franck; Gayet,Alain; Moulin,Jean, Method and system for ensuring the security of service supplies broadcast on a computer network of the internet type.
  61. Franck Rosset FR; Alain Gayet FR; Jean Moulin FR, Method and system for ensuring the security of telephone call management centers.
  62. Rosset, Franck; Gayet, Alain; Moulin, Jean, Method and system for ensuring the security of the remote supply of services of financial institutions.
  63. Franck Rosset FR; Alain Gayet FR; Jean Moulin FR, Method and system for ensuring the security of the supply of services of telecommunication operators.
  64. Mark Andrew R., Method and system for generation of tone signals over a transmission channel.
  65. Dildy Robert, Method and system for providing security using voice recognition.
  66. Vogler, Dean H.; Kuhlman, Douglas A.; Li, Yi Q., Method and system for securely authenticating user identity information.
  67. Mark Andrew R., Method and system for the secure communication of data.
  68. Goreta Lucas,FRX ; Duroux Christian,FRX, Method and system for the transfer of information between two populations of persons, one nomadic and the other sedenta.
  69. Taratine, Boris; Johnson, Matthew; Rust, Simon Peter; Rounds, Andrew Warren, Method and system for verifying an access request.
  70. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  71. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  72. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  73. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  74. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  75. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  76. Checco,John C., Method for providing computer-based authentication utilizing biometrics.
  77. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  78. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  79. Grajewski,Joseph; Jaeger,Douglas, Method of authenticating proper access to secured site and device for implementation thereof.
  80. Miller Joel F. (65 Oriental Blvd. Manhattan Beach NY 11235), Method of personnel verification using voice recognition.
  81. Borza Stephen J.,CAX, Method of protecting a computer system from record-playback breaches of security.
  82. Weiss, Kenneth P., Method, system and apparatus for secure access, payment and identification.
  83. Testardi, Richard Paul, Microcontroller-resident software development environment supporting application-level asynchronous event handling, interactive debugging and pin variables for embedded systems.
  84. Selker Edwin Joseph, Personal area network security lock and recharger combination apparatus for equipment access and utilization.
  85. Ozolins, Helmars E., Portable access device.
  86. Ozolins, Helmars E., Portable access device.
  87. Lewis William H., Portable system for personal identification based upon distinctive characteristics of the user.
  88. Deng, Robert Huijie; Bao, Feng; Wu, Yongdong, Remote authentication based on exchanging signals representing biometrics information.
  89. Epstein, III, Edwin A.; Souvannavong, Souk; Lu, Chia-Sheng, Resistance cell architecture.
  90. Williams,Matthew, Saw blade case.
  91. Boerbert William E. (Minneapolis MN), Secure computer interface.
  92. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  93. Duane, William M.; Silva, Eric A.; Ciaffi, Marco, Secure seed provisioning.
  94. Bailey, Kenneth S., Secure system using images of only part of a body as the key where the part has continuously-changing features.
  95. Herder, Thomas J., Secure transaction card using biometrical validation.
  96. Herder, Thomas J., Secure transaction card using biometrical validation.
  97. Anderson ; Jr. Victor C., Security arrangement and method for controlling access to a protected system.
  98. Kisters, Friedrich, Security method.
  99. Edwin A. Epstein, III ; Souk Souvannavong ; Chia-Sheng Lu, Security system and enclosure to protect data contained therein.
  100. Mori,Nobuyuki; Miyasaka,Michihiro; Yamaguchi,Takayuki, Signature system presenting user signature information.
  101. Brennan, Sean, System and method for accomplishing two-factor user authentication using the internet.
  102. Brennan, Sean, System and method for accomplishing two-factor user authentication using the internet.
  103. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr철m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  104. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr��m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  105. Schull,Jonathan, System and method for controlling access to protected information.
  106. Schull,Jonathan, System and method for creating and running protected information.
  107. Alexander, Bruce; Antal, David, System and method for customizing the storage and management of device data in a networked environment.
  108. Alexander, Bruce; Antal, David, System and method for customizing the storage and management of device data in a networked environment.
  109. Schull, Jonathan, System and method for distributing protected information.
  110. Alexander, Bruce; Bahneman, Liem, System and method for implementing open-control remote device control.
  111. Alexander,Bruce; Bahneman,Liem, System and method for implementing open-protocol remote device control.
  112. Coppersmith Don ; Raghavan Prabhakar ; Zimmerman Thomas G., System and method for near-field human-body coupling for encrypted communication with identification cards.
  113. Schull,Jonathan, System and method for operating a licensing server.
  114. Barker,Geoffrey T.; Alexander,Bruce, System and method for performing a predictive threat assessment based on risk factors.
  115. D'Agostino, John, System and method for performing secure credit card transactions.
  116. Alexander, Bruce, System and method for processing monitoring data using data profiles.
  117. Schull,Jonathan, System and method for processing protected audio information.
  118. Schull, Jonathan, System and method for processing protected text information.
  119. Schull,Jonathan, System and method for processing protected video information.
  120. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  121. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  122. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  123. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  124. Barker, Geoffrey T.; Alexander, Bruce; Talley, Paul, System and method for providing configurable security monitoring utilizing an integrated information portal.
  125. Alexander, Bruce; Talley, Paul; Hicks, Jeffrey, System and method for providing configurable security monitoring utilizing an integrated information system.
  126. Alexander, Bruce; Talley, Paul; Hicks, Jeffrey, System and method for providing configurable security monitoring utilizing an integrated information system.
  127. Barker, Geoffrey T.; Andersen, Claire; Alexander, Bruce; Bahneman, Liem, System and method for providing configurable security monitoring utilizing an integrated information system.
  128. Alexander, Bruce; Antal, David; Litke, Matthew; Schebel, Christoph; Thompson, Paul, System and method for providing data communication in a device network.
  129. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  130. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  131. Mark Andrew R., System and method for selecting and generating telephone access numbers for limiting access to a telephone service.
  132. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  133. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  134. Schull,Jonathan, System and method for selling protected information in an oem context.
  135. Ellingson,Robert E., System and method for thwarting identity theft and other identity misrepresentations.
  136. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  137. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  138. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  139. Kawan,Joseph C.; Smushkovich,Yosif; Chu,Ronald King Hang, System and method for user authentication.
  140. Audebert Yves, System and method for user authentication employing dynamic encryption variables.
  141. Audebert Yves, System and method for user authentication having clock synchronization.
  142. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  143. Audebert Yves,FRX, System for controlling access to a function having clock synchronization.
  144. Audebert Yves,FRX, System for controlling access to a function, using a plurality of dynamic encryption variables.
  145. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  146. Alexander, Julie D., System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure.
  147. Alexander,Bruce, System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure.
  148. Hagale, Anthony Richard; Rozich, Ryan, System for securing card payment transactions using a mobile communication device.
  149. Marchoili John ; Neilsen John ; Regelski Michael ; Prokupets Rudy ; Zientara David ; Rozwod Robert, System for security access control in multiple regions.
  150. Doughty, Ralph O.; Antaki, Patrick R.; Palmer, Glennard D.; Gilliom, Robert M., System, method and apparatus for electronic ticketing.
  151. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  152. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  153. Doughty, Ralph O.; Antaki, Patrick R.; Weiss, Kenneth P., System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe.
  154. Hackett Ann ; Arnold Lisa ; Jordan Vickie, Systems and methods for authorizing a transaction card.
  155. Keech,Winston Donald, Systems and methods for identity verification for secure transactions.
  156. Duane, William M., Techniques for carrying out seed or key derivation.
  157. Watson Gary E., Telephone tone security device.
  158. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  159. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  160. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric electric check transaction.
  161. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic check transactions.
  162. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  163. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  164. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  165. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  166. Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  167. Hoffman Ned ; Pare ; Jr. David Ferrin ; Lee Jonathan Alexander, Tokenless biometric electronic rewards system.
  168. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  169. Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee ; Philip Dean Lapsley, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  170. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  171. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  172. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  173. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  174. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  175. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  176. Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee, Tokenless electronic transaction system.
  177. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  178. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  179. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  180. Hoffman,Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  181. McMahan Michael L. ; Deffner Gerhard P. H. ; Hensley Billy W., Transparent telephone access system using voice authorization.
  182. Weiss, Kenneth P., Universal secure registry.
  183. Weiss, Kenneth P., Universal secure registry.
  184. Weiss, Kenneth P., Universal secure registry.
  185. Weiss, Kenneth P., Universal secure registry.
  186. Weiss, Kenneth P., Universal secure registry.
  187. Weiss, Kenneth P., Universal secure registry.
  188. Weiss, Kenneth P., Universal secure registry.
  189. Weiss, Kenneth P., Universal secure registry.
  190. Weiss, Kenneth P., Universal secure registry.
  191. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로