$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Transaction system security method and apparatus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0418068 (1989-10-06)
발명자 / 주소
  • Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 229  인용 특허 : 0

초록

An improved security system is disclosed which uses an IC card to enchance the security functions involving component authentication, user verification, user authorization and access control, protection of message secrecy and integrity, management of cryptographic keys, and auditablity. Both the sec

대표청구항

A security device comprising: a data processor: memory connected to said processor; data input and output means connected to said processor; secure session establishing means programmed into said security device for controlling said processor to establish a secure session with another device: an aut

이 특허를 인용한 특허 (229)

  1. Abellan Sevilla, Jorge; Muller Pareja, Ricardo, Access to data stored in an embedded database.
  2. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  3. Ogg, Craig L.; Chow, William W., Auditing method and system for an on-line value-bearing item printing system.
  4. Epstein, William C.; Miller, Lawrence R., Binding a digital certificate to multiple trust domains.
  5. Ahlers, Rebecca; Miller, Eric; Galit, Scott; Sorbe, Trent; Larson, Troy, Computer-implemented methods, program product, and system for micro-loan product management.
  6. Galit, Scott; Sorbe, Trent, Computer-implemented methods, program product, and system to enhance banking terms over time.
  7. Galit, Scott H.; Sorbe, Trent, Computerized extension of credit to existing demand deposit accounts, prepaid cards and lines of credit based on expected tax refund proceeds, associated systems and computer program products.
  8. Galit, Scott H.; Sorbe, Trent, Computerized extension of credit to existing demand deposit accounts, prepaid cards and lines of credit based on expected tax refund proceeds, associated systems and computer program products.
  9. Galit, Scott H.; Sorbe, Trent, Computerized extension of credit to existing demand deposit accounts, prepaid cards and lines of credit based on expected tax refund proceeds, associated systems and computer program products.
  10. Galit, Scott H.; Sorbe, Trent, Computerized extension of credit to existing demand deposit accounts, prepaid cards and lines of credit based on expected tax refund proceeds, associated systems and computer program products.
  11. Feil, Stephan, Control of access to a secondary system.
  12. Feil, Stephan, Control of access to a secondary system.
  13. Feil, Stephan, Control of access to a secondary system.
  14. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  15. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  16. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  17. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  18. Ogg,Craig L.; Chow,William W., Cryptographic module for secure processing of value-bearing items.
  19. Ogg,Craig L.; Chow,William W.; Venkat,Girish; Lingle,Piers C., Cryptographic module for secure processing of value-bearing items.
  20. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  21. Abe,Miki; Hosoi,Takafumi; Matsuda,Hiromi; Tanaka,Masao, Data recording apparatus, data recording method, and data transfer system.
  22. Saito Kazuo,JPX ; Shin Kilho,JPX ; Takeda Koji,JPX, Data verifying method apparatus for creating data to be verified and data verifying apparatus.
  23. Etchegoyen, Craig S., Device-specific content delivery.
  24. Etchegoyen, Craig S., Device-specific content delivery.
  25. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  26. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  27. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  28. Nelson, Chester G.; Stauffer, Ronald A.; Stomberg, Charles R., Dynamic bandwidth monitor and adjuster for remote communications with a medical device.
  29. Lerner Daniel M. ; MacLagan Charles Wesley ; Geiselman John M. ; Bobola Robert E. ; Sucilla Gregory A., Encryption key management system and method.
  30. Muntz, Daniel A.; Zhang, Zheng; Ndiaye, Baila, Enforcing file authorization access.
  31. Wallmark,Magnus; Jonsson,Mattias, Exchangeable module for additional functionality.
  32. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  33. Van Der Valk, Robert Willem, Identity card, information carrier and housing designed for its application.
  34. Van Der Valk, Robert Willem, Identity card, information carrier and housing designed for its application.
  35. Guthery, Scott B., Integrated circuit card with identity authentication table and authorization tables defining access rights based on Boolean expressions of authenticated identities.
  36. Guthery,Scott B., Integrated circuit devices with steganographic authentication and steganographic authentication methods.
  37. Guthery, Scott B., Integrated circuit devices with steganographic authentication, and steganographic authentication methods.
  38. Guthery, Scott B., Integrated circuit devices with steganographic authentication, and steganographic authentication methods.
  39. Brooks, Jason; Wells, Mike, Machine, methods, and program product for electronic inventory tracking.
  40. Brooks, Jason; Wells, Mike, Machine, methods, and program product for electronic inventory tracking.
  41. Brooks, Jason; Wells, Mike, Machine, methods, and program product for electronic inventory tracking.
  42. Brooks, Jason; Wells, Mike, Machine, methods, and program product for electronic inventory tracking.
  43. Miller, Eric D., Machine, methods, and program product for electronic order entry.
  44. Miller, Eric D., Machine, methods, and program product for electronic order entry.
  45. Miller, Eric D., Machine, methods, and program product for electronic order entry.
  46. Strongin, Geoffrey S.; Barnes, Brian C.; Schmidt, Rodney W., Memory management system and method providing increased memory access security.
  47. Hind, John R.; Peters, Marcia L., Method and an apparatus for detecting a need for security and invoking a secured presentation of data.
  48. Weidner Al ; Gorman Steve, Method and apparatus employing a dynamic encryption interface between a processor and a memory.
  49. Bilich James ; Brown Alan E., Method and apparatus for automatically implementing computer power on and logon functions using encoded ID card.
  50. Bussell,Keith David, Method and apparatus for digitally signing an advertisement area next to a value-bearing item.
  51. Dolan Donald T. ; French Dale A. ; Lawton Kathryn V., Method and apparatus for ensuring debiting in a postage meter prior to its printing a postal indicia.
  52. Engelberg, Ari; Venkat, Girish; Ananda, Mohan; McDermott, James, Method and apparatus for on-line value-bearing item system.
  53. Ogg, Craig Leonard; Bussell, Keith, Method and apparatus for printing indicia, logos and graphics onto print media.
  54. Arnold Todd Weston, Method and apparatus for protecting application data in secure storage areas.
  55. Geiselman, John Milton; Bobola, Robert E.; Lerner, Daniel M., Method and apparatus for securing communications.
  56. J. Milton Geiselman ; Robert E. Bobola ; Daniel M. Lerner, Method and apparatus for securing digital communications.
  57. Dong, Blake MingQi; Ogg, Craig Leonard, Method and apparatus for the control and distribution of value bearing items in a PC postage system.
  58. Feil, Stephan, Method and system for controlling access to a secondary system.
  59. Glasser Daniel S. ; McCurdy Ann Elizabeth ; Price Robert M., Method and system for controlling user access to a resource in a networked computing environment.
  60. Glasser Daniel S. ; McCurdy Ann Elizabeth ; Price Robert M., Method and system for controlling user access to a resource in a networked computing environment.
  61. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  62. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  63. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  64. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  65. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  66. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  67. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  68. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  69. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  70. Takizawa Hiroshi (Tokyo JPX), Method and system for rewriting data in a non-volatile memory a predetermined large number of times.
  71. Fraser, Neil R., Method and system for securely displaying and confirming request to perform operation on host computer.
  72. Korenshtein Roni (Los Gatos CA), Method for controlling access to a computer resource based on a timing policy.
  73. Howard Shelton Lambert GB; James Ronald Lewis Orchard GB, Method for controlling access to electronically provided services and system for implementing such method.
  74. Larsson Jeffrey Eric ; Downer Joel Wayne, Method for creating and maintaining user data.
  75. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  76. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  77. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  78. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  79. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  80. Rix,Simon Paul Ashley; Glasspool,Andrew; Davies,Donald Watts, Method for providing a secure communication between two devices and application of this method.
  81. Simon Paul Ashley Rix ZA; Andrew Glasspool GB; Donald Watts Davies GB, Method for providing a secure communication between two devices and application of this method.
  82. Montemayor, Oscar; Wei, Joe T.; Siegel, Ellen H., Method for secure communication from chip card and system for performing the same.
  83. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  84. Scherabon, Christian; Gruber, Bernhard, Method of operating a RFID system.
  85. Shackelford,David Michael, Method, system, and program for distributing software between computer systems.
  86. Shackelford,David Michael, Method, system, and program for distributing software between computer systems.
  87. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  88. Glasser Daniel S. ; McCurdy Ann Elizabeth ; Price Robert M., Methods and arrangements for controlling resource access in a networked computing environment.
  89. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  90. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  91. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  92. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  93. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  94. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,IEX, Networked personal customized information and facility services.
  95. Bussell, Keith, On-line system for printing postal indicia on custom sized envelopes.
  96. Weisberg,Seth; Ogg,Craig Leonard, On-line value-bearing indicium printing using DSA.
  97. Lingle,Piers Christian; Ogg,Craig Leonard; Venkat,Girish; Winslow,Richard; Kiyohara,Keith Shoji, Online value bearing item printing.
  98. Lingle,Piers Christian; Kiyohara,Keith Shoji; Hwang,Kenneth Kay Yih; Venkat,Girish, Postal system intranet and commerce processing for on-line value bearing system.
  99. Galit, Scott H.; Sorbe, Trent, Pre-paid card transaction computer to load a loan on a pre-paid card.
  100. Galit, Scott H.; Sorbe, Trent, Pre-paid card transaction computer to load a loan on a pre-paid card.
  101. Mooney David M. (Eden Prairie MN) Kimlinger Joseph A. (Willernie MN) Wood David E. (Minnetonka MN), Preboot protection for a data security system with anti-intrusion capability.
  102. Galit, Scott, Private label promotion card system, program product, and associated computer-implemented methods.
  103. Galit, Scott, Private label promotion card system, program product, and associated computer-implemented methods.
  104. Tallent, Jr., Guy S.; Donfried, Paul A.; Hicks, George M. (Mack); Lee, Elizabeth, Provision of authorization and other services.
  105. Jacobs Dwayne Charles (Boca Raton FL) Ibanez Jesus Gerardo (Austin TX), Remote user profile management administration in a computer network.
  106. Ogg,Craig L.; Chow,William W., Role assignments in a cryptographic module for secure processing of value-bearing items.
  107. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  108. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  109. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  110. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  111. Seki,Yuji; Kawasaki,Yusuke; Hashimoto,Shigeru; Yanagi,Ryoichi, Secure encryption processor with tamper protection.
  112. Goodwin,Jonathan David, Secure on-line ticketing.
  113. Ogg,Craig L.; Chow,William W., Secured centralized public key infrastructure.
  114. Bouthillier Stephen W. ; Seybold Ross E. ; Blowers Sydney R. ; Sulkowski ; Jr. Robert V. ; Morse Randall P., Secured network system.
  115. Hearn, Michael Alfred; Kabzinski, Richard, Security system and method for computers.
  116. Brown, Michael K.; Brown, Michael S.; Little, Herbert A.; Totzke, Scott W., Selectively wiping a remote device.
  117. Brown, Michael Kenneth; Brown, Michael Stephen; Little, Herbert Anthony; Totzke, Scott William, Selectively wiping a remote device.
  118. Kaneko, Tetsuya; Wake, Hiroaki; Endo, Youichi, Semiconductor memory device.
  119. Salem, Malek Ben; Bhatti, Rafae; Solderitsch, James, Sensors for a resource.
  120. Galit, Scott H.; Crowe, Andrew B., Shopping center gift card offer fulfillment machine, program product, and associated methods.
  121. Beatson Rodney ; Kelty Mark A. ; Riley Marc J., Signature capture/verification systems and methods.
  122. Fang Yi ; Kao I-Lung ; Wilson George Conerly, Single sign-on (SSO) mechanism having master key synchronization.
  123. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  124. Guthery,Scott B., Steganographic authentication.
  125. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  126. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  127. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  128. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  129. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  130. Yonebayashi, Toru, Substrate processing apparatus.
  131. Brooks, Jason, System and computer program product to issue a retail prepaid card including a user-designed external face using a chit and related computer implemented methods.
  132. Brooks, Jason, System and computer program product to issue a retail prepaid card including a user-designed external face using a chit and related computer implemented methods.
  133. Brooks, Jason, System and computer program product to issue a retail prepaid card including a user-designed external face using a chit and related computer implemented methods.
  134. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  135. Riggins,Mark D., System and method for encrypting and decrypting files.
  136. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  137. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  138. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  139. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  140. Thobhani, Akbar A.; Huebner, Kyle; Spring, Steve, System and method for identifying and preventing on-line fraud.
  141. Riggins Mark D., System and method for installing and using a temporary certificate at a remote site.
  142. Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
  143. Faggionato, Anne Marina, System and method for providing a permanent data record for a creative work.
  144. Hicks, Mack; Seiler, Regina; Tallent, Guy; Kupres, Kristin; Freudenstein, Allen, System and method for providing certification-related and other services.
  145. McKenney, Mary Keenan; Walch, Markus; Baker, III, Walter; Storch, Oliver; Landsmann, Peter Josef Eduard; Jetter, William John; Wong, Margaret Miu-Ling; Cameron, William Isaac, System and method for providing payment services in electronic commerce.
  146. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  147. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  148. Mousseau,Gary P.; Ferguson,Tabitha K.; Linkert,Barry; Vander Veen,Raymond P.; Castell,William D.; Lazaridis,Mihal, System and method for pushing information from a host system to a mobile data communication device.
  149. Mousseau,Gary P.; Lazaridis,Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  150. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  151. Miller, Lawrence R.; Tallent, Jr., Guy S.; Ahmed, Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  152. Riggins, Mark D., System and method for using an authentication applet to identify and authenticate a user in a computer network.
  153. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  154. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  155. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  156. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  157. Lee Philip S., System for securely exchanging data with smart cards.
  158. Galit, Scott, System, method, and program product for foreign currency travel account.
  159. Galit, Scott, System, method, and program product for foreign currency travel account.
  160. Galit, Scott, System, method, and program product for foreign currency travel account.
  161. Galit, Scott, System, method, and program product for foreign currency travel account.
  162. Ahlers, Rebecca; Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, non-transitory memory with computer program, and associated methods for micro-credit to prepaid cards.
  163. Brooks, Jason; Wells, Mike, System, program product and methods for retail activation and reload associated with partial authorization transactions.
  164. Brooks, Jason; Wells, Mike, System, program product and methods for retail activation and reload associated with partial authorization transactions.
  165. Ahlers, Rebecca; Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and associated methods to autodraw for micro-credit attached to a prepaid card.
  166. Ahlers, Rebecca; Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and associated methods to autodraw for micro-credit attached to a prepaid card.
  167. Ahlers, Rebecca; Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and associated methods to autodraw for micro-credit attached to prepaid card.
  168. Ahlers, Rebecca; Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and associated methods to autodraw for micro-credit attached to prepaid card.
  169. Galit, Scott H.; Sorbe, Trent, System, program product, and computer-implemented method for loading a loan on a pre-paid card.
  170. Galit, Scott H.; Sorbe, Trent, System, program product, and computer-implemented method for loading a loan on an existing pre-paid card.
  171. Ahlers, Rebecca; Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and method for debit card and checking account autodraw.
  172. Ahlers, Rebecca; Crowe, Andrew B; Galit, Scott H; Sorbe, Trent, System, program product, and method for debit card and checking account autodraw.
  173. Ahlers, Rebecca; Crowe, Andrew B; Galit, Scott H; Sorbe, Trent, System, program product, and method for debit card and checking account autodraw.
  174. Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and method to authorize draw for retailer optimization.
  175. Crowe, Andrew B.; Galit, Scott H.; Sorbe, Trent, System, program product, and method to authorized draw for retailer optimization.
  176. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  177. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  178. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  179. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  180. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  181. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  182. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  183. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  184. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  185. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  187. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  188. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  189. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  190. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  191. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  192. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  193. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  194. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  196. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  197. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  198. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  199. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  200. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  201. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  202. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  203. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  204. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  205. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  206. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  207. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  208. Dulin, Charles; Solo, David; Hicks, Mack; Nepomuceno, Larry; Stirland, Mark, Transaction coordinator for digital certificate validation and other services.
  209. Davis Terry L. ; Hart James A. ; Imperia Vincent A. ; Love Michael ; O'Malley Michael F. ; Russell James F. ; Sears John W. ; Trice Philip H., Transaction system comprising a first transportable integrated circuit device, a terminal, and a security device.
  210. Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Imperia Vincent A. (Tempe AZ) Love Michael (Wilmington DE) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Pe, Transaction system for integrated circuit cards.
  211. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and associated computer-implemented methods.
  212. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and associated computer-implemented methods.
  213. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and associated computer-implemented methods.
  214. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and associated computer-implemented methods.
  215. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and associated computer-implemented methods.
  216. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and associated computer-implemented methods.
  217. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and computer-implemented methods to prioritize payments from preselected bank account.
  218. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and computer-implemented methods to prioritize payments from preselected bank account.
  219. Sorbe, Trent; Larson, Troy, Transfer account systems, computer program products, and computer-implemented methods to prioritize payments from preselected bank account.
  220. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  221. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  222. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  223. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  224. Michener,John R.; Ryan,Paul F., Trusted authorization device.
  225. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  226. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  227. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  228. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  229. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로