$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Biometric token for authorizing access to a host system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0868167 (1992-04-14)
발명자 / 주소
  • Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA)
출원인 / 주소
  • Kamahira Safe Co., Inc. (Hiroshima JPX 03)
인용정보 피인용 횟수 : 460  인용 특허 : 0

초록

A security apparatus receives a biometric input from a user, which then is compared to a template to determine a correlation factor. The correlation factor, a fixed code and either a time-varying code or a challenge code then are combined to generate a token. The token is displayed to the user, who

대표청구항

A user verification apparatus for use in verifying the identify of a user of a remote host system as that of an authorized user, comprising: (a) means for receiving biometric information from the user; (b) memory means for storing acceptance threshold level data along with previously obtained biomet

이 특허를 인용한 특허 (460)

  1. Schmitt John C. ; Setlak Dale R., Access control system including fingerprint sensor enrollment and associated methods.
  2. Scheidt,Edward M.; Domanque,Ersin; Butler,Roger; Tsang,Wai, Access system utilizing multiple factor identification and authentication.
  3. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  4. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  5. Baird, III, Leemon C.; Harmon, Mance E.; Young, R. Reed; Armstrong, Jr., James E., Apparatus and method for authenticating access to a network resource.
  6. Baird, III, Leemon C.; Harmon, Mance E.; Young, R. Reed; Armstrong, Jr., James E., Apparatus and method for authenticating access to a network resource.
  7. Palmer,Glennard D.; Doughty,Ralph O.; Antaki,Patrick R., Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation.
  8. Lindemann, Rolf; Baghdasaryan, Davit, Apparatus and method for implementing composite authenticators.
  9. Arteaga-King, Alonso; Fitzgibbon, James J., Apparatus and method pertaining to the communication of information regarding appliances that utilize differing communications protocol.
  10. Weiss, Kenneth P., Apparatus, system and method for secure payment.
  11. Davis Derek L. ; Smith Lionel, Authentication system based on periodic challenge/response protocol.
  12. Nagisetty, Ramune; Cowan, Melissa A; Martin, Jason; Forand, Richard A; Huang, Wen-Ling M; Cahill, Conor P, Authentication system using wearable device.
  13. Khan Shabbir A. ; Hussain Basit ; Rajput Saeed A., Automated software metering of digital payloads.
  14. Barcelou, David M., Automated transaction machine.
  15. Barcelou, David M., Automated transaction machine.
  16. Barcelou, David M., Automated transaction machine.
  17. Barcelou, David M., Automated transaction machine.
  18. Barcelou, David M., Automated transaction machine.
  19. Barcelou, David M., Automated transaction machine.
  20. Barcelou, David M., Automated transaction machine.
  21. Barcelou, David M., Automated transaction machine.
  22. Barcelou, David M., Automated transaction machine.
  23. Barcelou, David M., Automated transaction machine.
  24. Barcelou, David M., Automated transaction machine.
  25. Barcelou, David M., Automated transaction machine.
  26. Barcelou, David M., Automated transaction machine.
  27. Barcelou, David M., Automated transaction machine.
  28. Barcelou, David M., Automated transaction machine.
  29. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  30. Fitzgibbon, James J.; Laird, Edward, Barrier movement system including a combined keypad and voice responsive transmitter.
  31. Fitzgibbon, James J.; Laird, Edward, Barrier movement system including a combined keypad and voice responsive transmitter.
  32. Cate, Casparus; Fitzgibbon, James J.; Keller, Jr., Robert R.; Murray, James Scott; Sorice, Cory; Stanek, Gregory John, Barrier operator feature enhancement.
  33. Fitzgibbon, James J.; Keller, Jr., Robert R., Barrier operator feature enhancement.
  34. Fitzgibbon, James J.; Keller, Jr., Robert R., Barrier operator feature enhancement.
  35. Fitzgibbon, James J.; Keller, Robert R.; Murray, James Scott; Sorice, Cory; Stanek, Greg John; Willmott, Colin, Barrier operator feature enhancement.
  36. Fitzgibbon, James J., Barrier operator system and method using wireless transmission devices.
  37. Khan, Shabbir; Cohen, Alexander, Bidding network.
  38. Chang, Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  39. Chang, Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  40. Chang, Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  41. Chang,Hisao M., Bio-phonetic multi-phrase speaker identity verification.
  42. Miller,Eric E., Biometric authentication of a client network connection.
  43. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Biometric controlled key generation.
  44. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  45. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  46. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  47. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  48. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  49. Russell, David C.; Johnson, Barry W.; Petka, David M., Biometric identification device.
  50. Russell, David C.; Johnson, Barry W.; Petka, David M., Biometric identification device and methods for secure transactions.
  51. Cannon, Charles; Reigle, Thomas, Biometric identification device with removable card capabilities.
  52. Cannon, Charles; Reigle, Thomas, Biometric identification device with smartcard capabilities.
  53. Cannon, Charles; Reigle, Thomas, Biometric identification device with smartcard capabilities.
  54. Cannon, Charles; Reigle, Thomas, Biometric identification device with smartcard capabilities.
  55. Cannon,Charles; Reigle,Thomas, Biometric identification device with smartcard capabilities.
  56. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Biometric tokenless electronic rewards system and method.
  57. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  58. Karthik, Kaleedhass, Biometric verification for electronic transactions over the web.
  59. Talmor, Eli; Talmor, Rita; Talmor, Alon, Biometric-based system and method for enabling authentication of electronic messages sent over a network.
  60. Mehew, Evans; Paintin, Scott; Lyons, Dianna; Robbins, Julene M., Biometrically secured user input for forms.
  61. Mehew, Evans; Paintin, Scott; Lyons, Dianna; Robbins, Julene M., Biometrically secured user input for forms.
  62. Antebi, Amit; Atsmon, Alon; Lev, Zvi; Cohen, Moshe, Card for interaction with a computer.
  63. Antebi, Amit; Atsmon, Alon; Lev, Zvi; Cohen, Moshe, Card for interaction with a computer.
  64. Antebi,Amit; Atsmon,Alon; Lev,Zvi; Cohen,Moshe, Card for interaction with a computer.
  65. Chou,Bruce C. S., Card-type biometric identification device and method therefor.
  66. Hammad, Ayman, Cloud-based virtual wallet NFC apparatuses, methods and systems.
  67. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  68. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  69. Yamazaki, Shunpei; Koyama, Jun, Communication system.
  70. Teng, Harry H.; Jo, Sung-Chan, Compact optical fingerprint capturing and recognition system.
  71. Atsmon,Alon; Antebi,Amit; Altman,Nathan; Lev,Zvi; Cohen,Moshe, Computer communications using acoustic signals.
  72. Sullivan, Edward, Control device access method and apparatus.
  73. Antebi,Amit; Atsmon,Alon, Control of toys and devices by sounds.
  74. Taveau, Sebastien Ludovic Jean; Hattery, Larry E.; Schwab, Frank, Credential quality assessment engine systems and methods.
  75. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  76. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  77. Lee, Charles C.; Yu, I-Kang; Lee, Edward W.; Ma, Abraham C.; Shen, Ming-Shiang, Data security for electronic data flash card.
  78. Duane, William; Hamel, Jeffrey, Derivative seeds.
  79. Moran, Dov, Device, system and method for data access control.
  80. Khan, Shabbir; Cohen, Alexander, Digital object routing based on a service request.
  81. Khan, Shabbir; Cohen, Alexander, Digital object title and transmission information.
  82. Ryan, Andrew Edward, Distributed client/server computer network.
  83. Smithies Christopher Paul Kenneth,GBX ; Newman Jeremy Mark,GBX, Document and signature data capture system and method.
  84. Smithies Christopher Paul Kenneth,GB2 ; Newman Jeremy Mark,GB2, Document and signature verification system and method.
  85. Nguyen, David; Nan, Nan; Ni, Jim Chin-Nan; Yu, Frank I-Kang; Ma, Abraham C.; Shen, Ming-Shiang, Dual-personality extended USB plugs and receptacles using with PCBA and cable assembly.
  86. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  87. Zimman, Christopher William; Hook, James William, Dynamically programmable RFID transponder.
  88. Kashima, Kazunori, ELECTRONIC INFORMATION MANAGEMENT SYSTEM, IC CARD, TERMINAL APPARATUS AND ELECTRONIC INFORMATION MANAGEMENT METHOD, AND RECORDING MEDIUM ON WHICH IS RECORDED AN ELECTRONIC INFORMATION MANAGEMENT PROG.
  89. Setlak Dale R. ; Van Vonno Nicolaas W. ; Lowther Rex ; Gebauer Dave, Electric field fingerprint sensor having enhanced features and related methods.
  90. Denison, William D.; Brownfield, Lawrence C.; Silvers, Bradley S., Electronic access control device.
  91. Denison, William D.; Silvers, Bradley S.; Brownfield, Lawrence, Electronic access control device.
  92. Gelbman, Alexander, Electronic admission pass system employing a plurality of updateable electronic-ink admission passes and one or more activator modules.
  93. Harkin Gerard F.,GBX, Electronic apparatus comprising fingerprint sensing devices.
  94. Atsmon, Alon; Antebi, Amit; Altman, Nathan; Lev, Zvi; Cohen, Moshe, Electronic device and method of configuring thereof.
  95. Roatis, Calin V.; Denison, William D.; Myers, Gary L., Electronic security system for monitoring mechanical keys and other items.
  96. Zank Anthony E. ; Stevens David R., Electronic signature management system.
  97. Zank, Anthony E., Electronic signature security system.
  98. Davis, Derek L., Electronic system and method for controlling access through user authentication.
  99. Gelbman, Alexander, Electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture.
  100. Zhu, Xiaoxun; Essinger, Steven; Schnee, Michael; Liu, Yong, Electronic-ink display device employing a power switching mechanism automatically responsive to predefined states of device configuration.
  101. Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Doroguskar, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
  102. Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
  103. Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
  104. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Doroguskar, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  105. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  106. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  107. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  108. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  109. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  110. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  111. Fadell, Anthony; Hodge, Andrew; Schell, Stephan; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen; Sanford, Emery, Embedded authentication systems in an electronic device.
  112. Kazuomi Oishi JP, Encrypting method, deciphering method and certifying method.
  113. Lindemann, Rolf, Enhanced security for registration of authentication devices.
  114. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  115. Sogo,Koji; Takahashi,Mihoko; Kuroda,Takuya, Face collation apparatus and biometrics data collation apparatus.
  116. Tumey,David M.; Xu,Tianning; Arndt,Craig M., Facial image verification utilizing smart-card with integrated video camera.
  117. Karamchetty, Somayajulu, Fingerprint and signature identification and authorization card and pen.
  118. Tomko George J.,CAX ; Soutar Colin,CAX ; Schmidt Gregory J.,CAX, Fingerprint controlled public key cryptographic system.
  119. Salatino Matthew M. ; Setlak Dale R. ; Newton Mike ; Adkins Cal ; Van Vanno Nicolaas W., Fingerprint sensor and token reader and associated methods.
  120. Salatino Matthew M. ; Setlak Dale R. ; Newton Mike ; Adkins Cal ; Van Vanno Nicolaas W., Fingerprint sensor and token reader and associated methods.
  121. Setlak Dale ; Gebauer Dave, Fingerprint sensor having filtering and power conserving features and related methods.
  122. Setlak Dale R., Fingerprint sensor having spoof reduction features and related methods.
  123. Setlak Dale R. ; Van Vonno Nicolass W. ; Newton Mike ; Salatino Matthew M., Fingerprint sensor including an anisotropic dielectric coating and associated methods.
  124. Setlak Dale R. ; Cornett John ; Kilgore Brian ; Williams Daryl ; Gebauer Dave, Fingerprint sensor with gain control features and associated methods.
  125. Ma, Abraham C.; Ni, Jim Chin-Nan; Nan, Nan, Flash drive with spring-loaded retractable connector.
  126. Ni, Jim Chin-Nan; Ma, Abraham C., Flash drive with spring-loaded swivel connector.
  127. Ma, Abraham C.; Lee, Charles C.; Yu, I-Kang; Lee, Edward W.; Shen, Ming-Shiang, Flash memory controller for electronic data flash card.
  128. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  129. Fitzgibbon, James J.; Karasek, Mark L., Garage door operator having thumbprint identification system.
  130. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  131. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  132. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  133. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  134. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  135. Teng, Harry H.; Jo, Sung-Chan, High contrast, low distortion optical acquisition system for image capturing.
  136. Lee, Charles C.; Yu, I-Kang; Lee, Edward W.; Ma, Abraham C.; Shen, Ming-Shiang, High volume testing for USB electronic data flash cards.
  137. Tomko George J.,CAX ; Stoianov Alexei,CAX, Holographic method for encrypting and decrypting information using a fingerprint.
  138. Pearson Peter Kelley ; Rowley Thomas Edward ; Upton Jimmy Ray, Identification and security using biometric measurements.
  139. Ohashi Masayoshi,JPX ; Sakai Seiichiro,JPX ; Suzuki Toshinori,JPX, Identity confidentiality method in radio communication system.
  140. Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  141. Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  142. Johnson, Barry W.; Riemenschneider, Kristen R. O.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  143. Johnson, Barry W.; Riemenschneider, Kristen R. O.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  144. Shen, Ming-Shiang, Integrated circuit card with fingerprint verification capability.
  145. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  146. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  147. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  148. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  149. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  150. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  151. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  152. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  153. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  154. Cohen, Moshe; Sege, Alan, Interactive toys.
  155. Cohen, Moshe; Sege, Alan, Interactive toys.
  156. Cohen, Moshe; Sege, Alan, Interactive toys.
  157. Challener, David Carroll; Manson, Peter Alexander; Trent, Douglas Morgan, Internet appliance integrating telephone function security and guidance features.
  158. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., LIfestyle multimedia security system.
  159. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  160. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  161. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  162. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  163. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  164. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  165. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  166. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  167. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  168. Ni, Jim Chin-Nan; Ma, Abraham C., Lipstick-type USB device.
  169. Ni, Jim Chin-Nan; Ma, Abraham C., Lipstick-type USB device with tubular housing.
  170. Saito, Yoshihiro; Tamori, Teruhiko; Fujimoto, Yoshinari, Lock and switch using pressure-type fingerprint sensor.
  171. Schmitt John C. ; Setlak Dale R., Machine including vibration and shock resistant fingerprint sensor and related methods.
  172. Abdallah, David S.; Johnson, Barry W., Man-machine interface for controlling access to electronic devices.
  173. Abdallah, David S.; Johnson, Barry W.; Olvera, Kristen R., Man-machine interface for controlling access to electronic devices.
  174. Abdallah, David S.; Johnson, Barry W.; Olvera, Kristen R., Man-machine interface for controlling access to electronic devices.
  175. Abdallah, David S.; Johnson, Barry W.; Riemenschneider, Kristen R. O., Man-machine interface for controlling access to electronic devices.
  176. Abdallah,David S.; Johnson,Barry W.; Olvera,Kristen R., Man-machine interface for controlling access to electronic devices.
  177. Hiew, Siew S.; Nan, Nan; Hsueh, Paul; Ma, Abraham C.; Shen, Ming-Shiang, Manufacturing method for micro-SD flash memory card.
  178. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  179. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  180. Mazzone,Thomas, Medical information system, method and article of manufacture.
  181. Shabbir A. Khan ; Saeed A. Rajput ; Basit Hussain, Method and apparatus for binding electronic impressions made by digital identities to documents.
  182. Sayag Michel, Method and apparatus for generating a control signal.
  183. Sayag Michel, Method and apparatus for generating a control signal.
  184. Sayag Michel, Method and apparatus for generating a control signal.
  185. Sayag Michel, Method and apparatus for generating a control signal.
  186. Casaccia, Lorenzo; Rezaiifar, Ramin; Tiedemann, Jr., Edward G., Method and apparatus for message segmentation in a wireless communication system.
  187. Brainard,John G.; Kaliski, Jr.,Burton S.; Rivest,Ronald L., Method and apparatus for performing enhanced time-based authentication.
  188. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  189. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  190. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  191. Glass Randal ; Salganicoff Marcos ; von Seelen Ulf Cahn, Method and apparatus for securely transmitting and authenticating biometric data over a network.
  192. Labaton, Isaac J., Method and apparatus for the secure authentication of a web-site.
  193. Casaccia, Lorenzo; Sinnarajah, Ragulan, Method and apparatus for time-based reception of transmissions in a wireless communication system.
  194. Schwesig, G?nter, Method and device for reliably switching an operating mode of an industrial controller for machine tools or production machines.
  195. Joosten, Hendrikus Johannes; Hut, Derk Hiddo; Kleinhuis, Geert; van Buuren, René, Method and system for a service process to provide a service to a client.
  196. Hillhouse,Robert; Boyer,John, Method and system for adaptively varying templates to accommodate changes in biometric information.
  197. Hillhouse,Robert; Boyer,John, Method and system for adaptively varying templates to accommodate changes in biometric information.
  198. Szrek, Walter; Oram, Thomas K., Method and system for authentication.
  199. Wankmueller, John, Method and system for authorizing a transaction using a dynamic authorization code.
  200. Russo, Anthony P., Method and system for fingerprint template matching.
  201. Russo,Anthony P., Method and system for fingerprint template matching.
  202. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  203. Fisher, Douglas; Dominguez, Benedicto H.; Lee, Timothy Mu-Chu, Method and system for performing two factor authentication in mail order and telephone order transactions.
  204. Zucker, Elad; Werner, Eran, Method and system for policy based monitoring and blocking of printing activities on local and network printers.
  205. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  206. Anati, Ram; Glukhov, Maxim; Atsmon, Dan; Speyer, Gavriel, Method and system for remotely authenticating identification devices.
  207. Siegel, Brian; Abram, Philip Michael; Beckwitt, Marc; Gudorf, Gregory D.; Iso, Kazuaki; Raymond, Brian; Tobin, Christopher M., Method and system for restricted biometric access to content of packaged media.
  208. Christopher Paul Kenneth Smithies GB; Jeremy Mark Newman GB, Method and system for the capture, storage, transport and authentication of handwritten signatures.
  209. McGowan,Tim, Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication.
  210. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  211. Nochta, Zoltan; Haller, Stephan, Method for fast decision-making in highly distributed systems.
  212. Soutar Colin,CAX ; Roberge Danny B.,CAX ; Stoianov Alexei,CAX ; Gilroy Rene M.,CAX ; Bhagavatula Vijayakumar, Method for secure key management using a biometric.
  213. Dunn, Christopher S., Method of detecting authorised biometric information sensor.
  214. Dunn, Christopher S., Method of detecting authorised biometric information sensor.
  215. Lee David K., Method of mapping destination addresses for use in calculating digital tokens.
  216. Borza Stephen J.,CAX, Method of protecting a computer system from record-playback breaches of security.
  217. Scheerhorn,Alfred; Huber,Klaus, Method of transmitting signals.
  218. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  219. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  220. Ludtke,Harold Aaron; Maritzen,L. Michael, Method or system for executing deferred transactions.
  221. Atsmon,Alon; Antebi,Amit; Altman,Nathan; Lev,Zvi; Cohen,Moshe, Method to use acoustic signals for computer communications.
  222. Wells, William R.; Mattice, Harold E.; Griswold, Chauncey W.; Wilder, Richard L., Methods and apparatus for limiting access to games using biometric data.
  223. Wells, William R.; Mattice, Harold E.; Griswold, Chauncey W.; Wilder, Richard L., Methods and apparatus for limiting access to games using biometric data.
  224. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  225. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  226. Fisher, Douglas; Dominguez, Benedicto H.; Lee, Timothy Mu-chu, Methods and systems for performing authentication in consumer transactions.
  227. Fisher, Douglas; Dominguez, Benedicto H.; Lee, Timothy Mu-chu, Methods and systems for performing authentication in consumer transactions.
  228. Chu, Ronald King-Hang; Kogen, Mark; Tan, Warren; Ma, Simon; Smushkovich, Yosif; Glindro, Gerry; Nicholas, Jeffrey William Coyte, Methods and systems for secure user authentication.
  229. Chu, Ronald King-Hang; Kogen, Mark; Tan, Warren; Ma, Simon; Smushkovich, Yosif; Glindro, Gerry; Nicholas, Jeffrey William Coyte, Methods and systems for secure user authentication.
  230. Grandcolas, Michael; Koryakovtseva, Irina; Vos, Jennifer; Herrig, Robert A., Methods and systems for secure user authentication.
  231. Venkatanna, Kumar Balepur; Moona, Rajat; Subrahmanya, S V, Methods and systems for secured access to devices and systems.
  232. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  233. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  234. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  235. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  236. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  237. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  238. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  239. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  240. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  241. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  242. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  243. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  244. David Chaum ; Niels Ferguson NL; Jelte Van Der Hoek NL, Multi-purpose transaction card system.
  245. Mehew, Evans; Paintin, Scott; Lyons, Dianna; Robbins, Julene M., Multi-user device with information capture capabilities.
  246. Hoffberg, Steven M., Multifactorial optimization system and method.
  247. Scheidt, Edward M.; Domangue, Ersin, Multiple factor-based user identification and authentication.
  248. Scheidt,Edward M.; Domangue,Ersin, Multiple factor-based user identification and authentication.
  249. Scheidt, Edward M.; Domangue, Ersin, Multiple level access system.
  250. Scheidt,Edward M.; Domangue,Ersin, Multiple level access system.
  251. Fitzgibbon, James J., Network ID activated transmitter.
  252. Andersson, Stefan, Network authentication.
  253. Shigematsu,Satoshi; Nakanishi,Mamoru; Suto,Hiroki, Network authentication system, method, and program, service providing apparatus, certificate authority, and user terminal.
  254. Bird, David Glenn; Janky, James M., On-board apparatus for avoiding restricted air space in non-overriding mode.
  255. Lee, Jong Ik; Shin, Sung Hyu; Lee, Dong Won, Optical fingerprint acquisition apparatus.
  256. Burke, Christopher John; Murray, David Victor, Password generator.
  257. Makhotin, Oleg; Purves, Tom; Gardner, Chris, Payment channel returning limited use proxy dynamic value.
  258. Atsmon,Alon, Personal communicator authentication.
  259. Tanada, Yoshifumi; Yamazaki, Shunpei; Arai, Yasuyuki; Moriya, Yoshitaka, Personal data management system and nonvolatile memory card.
  260. Mehew, Evans; Paintin, Scott; Lyons, Dianna; Robbins, Julene M., Personal writing device with user recognition capabilities and personal information storage.
  261. Atsmon, Alon; Antebi, Amit; Lev, Tsvi; Cohen, Moshe; Spcyer, Gavriel; Sege, Alan; Altman, Nathan; Anati, Rami, Physical presence digital authentication system.
  262. Atsmon, Alon; Antebi, Amit; Lev, Tsvi; Cohen, Moshe; Speyer, Gavriel; Sege, Alan; Altman, Nathan; Anati, Rami, Physical presence digital authentication system.
  263. Atsmon, Alon; Antebi, Amit; Lev, Tsvi; Cohen, Moshe; Speyer, Gavriel; Sege, Alan; Altman, Nathan; Anati, Rami, Physical presence digital authentication system.
  264. Atsmon, Alon; Antebi, Amit; Lev, Zvi; Cohen, Moshe; Speyer, Gabriel; Sege, Alan; Altman, Nathan; Anati, Ram, Physical presence digital authentication system.
  265. Atsmon, Alon; Antebi, Amit; Lev, Zvi; Cohen, Moshe; Speyer, Gabriel; Sege, Alan; Altman, Nathan; Anati, Ram, Physical presence digital authentication system.
  266. Nguyen, Binh T.; Paulsen, Craig A., Player verification method and system for remote gaming terminals.
  267. Ozolins, Helmars E., Portable access device.
  268. Ozolins, Helmars E., Portable access device.
  269. Schmitt John C. ; Setlak Dale R., Portable telecommunication device including a fingerprint sensor and related methods.
  270. Anderson, Roy E.; Perner, Horst; Furmanek, Eric, Provisioning and use of security tokens to enable automated test equipment.
  271. Baghdasaryan, Davit; Lourie, Matthew; Lindemann, Rolf; Wilson, Brendon J.; Briceno, Marc, Query system and method to determine authentication capabilities.
  272. Baghdasaryan, Davit; Lourie, Matthew; Lindemann, Rolf; Wilson, Brendon J.; Briceno, Marc, Query system and method to determine authentication capabilities.
  273. Glavan, Michael J.; Gvalani, Girish; Olson, John A., Remote biometric verification.
  274. Daniel-Wayman, Robert; Murray, James Scott; Sorice, Cory Jon, Remote guest access to a secured premises.
  275. Daniel-Wayman, Robert; Murray, James Scott; Sorice, Cory Jon, Remote guest access to a secured premises.
  276. Guglani, Abhishek; Sharma, Sanjeev; Chitalia, Jalpesh; Destremps, Gerald; Mardikar, Upendra; Xu, Minghua; Trevino, Jose Luis Rios; Singh, Brijendra, Remote server encrypted data provisioning system and methods.
  277. Gelbman, Alexander, Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture.
  278. Moran, Dov; Elazar, Gidi; Harkabi, Dan; Dan, Raz, Removable, active, personal storage device, system and method.
  279. Moran, Dov; Elazar, Gidi; Harkabi, Dan; Dan, Raz, Removable, active, personal storage device, system and method.
  280. Epstein, III, Edwin A.; Souvannavong, Souk; Lu, Chia-Sheng, Resistance cell architecture.
  281. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  282. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  283. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  284. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  285. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  286. Farris,Bradford L.; Fitzgibbon,James J., Rolling code security system.
  287. Farris,Bradford L.; Fitzgibbon,James J., Rolling code security system.
  288. Fitzgibbon,James J., Rolling code security system.
  289. Novoa, Manuel; Crisan, Adrian, Secure and dynamic biometrics-based token generation for access control and authentication.
  290. Saito, Tamio; Drizin, Wayne; Aida, Takashi, Secure biometric verification of identity.
  291. Saito,Tamio; Drizin,Wayne; Aida,Takashi, Secure biometric verification of identity.
  292. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT), Secure computer communication method and system.
  293. Bauchot, Frederic; Marmigere, Gerard; Truntschka, Carole; Tressols, Florence, Secure method and apparatus to verify personal identity over a network.
  294. Bailey Kenneth S., Secure system using images of only part of a body as the key where the part has continuously-changing features.
  295. Bailey, Kenneth S., Secure system using images of only part of a body as the key where the part has continuously-changing features.
  296. Kenneth S. Bailey, Secure system using images of only part of a body as the key where the part has continuously-changing features.
  297. Baghdasaryan, Davit; Kesanupalli, Ramesh; Schwab, Frank; Chan, Philip Yiu Kwong; Hattery, Larry, Secure transaction systems and methods.
  298. Zucker, Elad; Werner, Eran; Weidhagen, Mattias, Securing data using integrated host-based data loss agent with encryption detection.
  299. Zucker, Elad; Werner, Eran; Weidhagen, Mattias, Securing data using integrated host-based data loss agent with encryption detection.
  300. Ll, Gong Ling, Security device and method incorporating multiple varying password generator.
  301. Krulce, Darrell, Security method and apparatus.
  302. Krulce, Darrell L., Security method and apparatus.
  303. Naidoo, Surendra N.; Glasgow, William P., Security system.
  304. Dawes, Paul J., Security system with networked touchscreen and gateway.
  305. McAllister Alex (Wheaton MD) Cheston Frank (Potomac MD) Young David E. (Silver Spring MD) Hanle John P. (Silver Spring MD), Selection of a voice recognition data base responsive to video data.
  306. Lane,William F., Self-authenticating identification substrate with encoded packet output.
  307. Guntupalli, Vishwam; Joy, Ian M.; Behara, Ashalatha, Self-service terminal.
  308. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  309. Hiew,Siew S.; Ni,Jim Chin Nan; Ma,Abraham C.; Shen,Ming Shiang, Single chip USB packages by various assembly methods.
  310. Hiew, Siew S.; Kim, Jin Kyu; Ma, Abraham C.; Shen, Ming Shiang, Single chip USB packages with contact-pins cover.
  311. Hiew,Siew S.; Kim,Jin Kyu; Ma,Abraham C.; Shen,Ming Shiang, Single chip USB packages with swivel cover.
  312. Saito, Tamio, Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport.
  313. Hendrick, Chaya Coleena, Smart card with a fingerprint sensor.
  314. Tamir,Asaf; Sege,Alan; Dvash,Nir; Altman,Nathan; Atsmon,Alon, Sonic/ultrasonic authentication device.
  315. Tamir, Asaf; Sege, Alan; Dvash, Nir; Altman, Nathan; Atsmon, Alon, Sonic/ultrasonic authentication method.
  316. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  317. Brennan, Sean, System and method for accomplishing two-factor user authentication using the internet.
  318. Brennan, Sean, System and method for accomplishing two-factor user authentication using the internet.
  319. Mann Stewart ; Mann L. Maribel, System and method for aircraft passenger check-in and boarding using iris recognition.
  320. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  321. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  322. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  323. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr철m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  324. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr��m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  325. Lindemann, Rolf, System and method for biometric authentication with device attestation.
  326. Robinson,Timothy, System and method for biometric authorization for financial transactions.
  327. Seifert,Mark K., System and method for biometric-based fraud protection.
  328. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for biometrically-initiated refund transactions.
  329. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J., System and method for biometrically-initiated refund transactions.
  330. Lindemann, Rolf, System and method for bootstrapping a user binding.
  331. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  332. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  333. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for categorizing transactions.
  334. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  335. Ludtke, Harold Aaron; Maritzen, L. Michael, System and method for conducting secure transactions over a network.
  336. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  337. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  338. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  339. Hoffberg, Steven M., System and method for determining contingent relevance.
  340. Baghdasaryan, Davit; Lourie, Matt; Wilson, Brendon J.; Dholakia, Rajiv, System and method for efficiently enrolling, registering, and authenticating with multiple authentication devices.
  341. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  342. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  343. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  344. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Robinson,Mark B., System and method for enrolling in a biometric system.
  345. Lindemann, Rolf, System and method for eye tracking during authentication.
  346. Maritzen, L. Michael; Ludtke, Harold Aaron, System and method for facilitating real time transactions between a user and multiple entities.
  347. Tamir, Asaf; Sege, Alan; Dvash, Nir; Altman, Nathan; Atsmon, Alon, System and method for identifying and/or authenticating a source of received electronic data by digital signal processing and/or voice authentication.
  348. Tamir, Asaf; Sege, Alan; Dvash, Nir; Altman, Nathan; Atsmon, Alon, System and method for identifying and/or authenticating a source of received electronic data by digital signal processing and/or voice authentication.
  349. Baghdasaryan, Davit, System and method for implementing a hosted authentication service.
  350. Baghdasaryan, Davit, System and method for implementing a one-time-password using asymmetric cryptography.
  351. Lindemann, Rolf; Baghdasaryan, Davit, System and method for implementing privacy classes within an authentication framework.
  352. Baghdasaryan, Davit; Lourie, Matthew, System and method for implementing transaction signing within an authentication framework.
  353. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  354. Wilson, Brendon J.; Baghdasaryan, Davit, System and method for integrating an authentication service within a network architecture.
  355. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  356. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for offering in-lane periodical subscriptions.
  357. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for operating a parking facility.
  358. Baghdasaryan, Davit, System and method for performing authentication using data analytics.
  359. Baghdasaryan, Davit, System and method for privacy-enhanced data synchronization.
  360. Baghdasaryan, Davit; Lourie, Matthew; Wilson, Brendon J.; Nagarajan, Naga, System and method for processing random challenges within an authentication framework.
  361. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  362. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  363. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  364. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  365. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  366. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for purchase benefits at a point of sale.
  367. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for purchase benefits at a point of sale.
  368. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  369. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  370. Lindemann, Rolf, System and method for sharing keys across authenticators.
  371. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  372. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  373. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  374. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  375. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for verifying identity.
  376. Maritzen,Michael; Niwa,Kiyo, System and method of selecting consumer profile and account information via biometric identifiers.
  377. Martinez, Michael Anthony, System and method to authenticate a user utilizing a time-varying auxiliary code.
  378. Russell, David C.; Johnson, Barry W.; Olvera, Kristen R., System and methods for assignation and use of media content subscription service privileges.
  379. Russell, David C.; Johnson, Barry W.; Olvera, Kristen R., System and methods for assignation and use of media content subscription service privileges.
  380. Russell, David C.; Johnson, Barry W.; Olvera, Kristen R., System and methods for assignation and use of media content subscription service privileges.
  381. Khan, Shabbir; Cohen, Alexander, System and/or method for downstream bidding.
  382. Yamazaki, Shunpei; Koyama, Jun, System for identifying an individual, a method for identifying an individual or a business method.
  383. Ohmori,Motoji; Ueda,Kenichi; Ueda,Eiji, System for preventing unauthorized use of recording media.
  384. Fitzgibbon, James J., System interaction with a movable barrier operator method and apparatus.
  385. Fitzgibbon, James J., System interaction with a movable barrier operator method and apparatus.
  386. Doughty, Ralph O.; Antaki, Patrick R.; Palmer, Glennard D.; Gilliom, Robert M., System, method and apparatus for electronic ticketing.
  387. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  388. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  389. Doughty, Ralph O.; Antaki, Patrick R.; Weiss, Kenneth P., System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe.
  390. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  391. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  392. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  393. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  394. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  395. Chebiyyam, Gopi Krishna; Basavapatna, Prasanna Ganapathi, System, method and computer program product for maintaining a confidentiality of data on a network.
  396. Chebiyyam, Gopi Krishna, System, method and computer program product for performing an action based on an aspect of an electronic mail message thread.
  397. Chebiyyam, Gopi Krishna, System, method and computer program product for performing an action based on an aspect of an electronic mail message thread.
  398. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  399. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  400. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  401. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  402. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  403. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  404. Chebiyyam, Gopi Krishna; Basavapatna, Prasanna, System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session.
  405. Basavapatna, Prasanna Ganapathi; Chebiyyam, Gopi Krishna, System, method, and computer program product for preventing image-related data loss.
  406. Basavapatna, Prasanna Ganapathi; Chebiyyam, Gopi Krishna, System, method, and computer program product for preventing image-related data loss.
  407. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  408. Roskind, James, Time-varying security code for enabling authorizations and other uses of financial accounts.
  409. Roskind, James A., Time-varying security code for enabling authorizations and other uses of financial accounts.
  410. Roskind, James A., Time-varying security code for enabling authorizations and other uses of financial accounts.
  411. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  412. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  413. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric electric check transaction.
  414. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic check transactions.
  415. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  416. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  417. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  418. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  419. Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  420. Hoffman Ned ; Pare ; Jr. David Ferrin ; Lee Jonathan Alexander, Tokenless biometric electronic rewards system.
  421. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  422. Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee ; Philip Dean Lapsley, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  423. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  424. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  425. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  426. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  427. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  428. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  429. Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee, Tokenless electronic transaction system.
  430. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  431. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  432. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  433. Hoffman,Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  434. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  435. Gilchrist Gary ; Viavant Steven D., Trusted biometric client authentication.
  436. Benson, Greg; Fistonich, Matthew Anthony, Trusted decision support system and method.
  437. Benson, Greg; Fistonich, Matthew Anthony, Trusted decision support system and method.
  438. Benson,Greg; Fistonich,Matthew Anthony, Trusted decision support system and method.
  439. Benson, Greg; Fistonich, Matthew Anthony, Trusted monitoring system and method.
  440. Benson, Greg; Fistonich, Matthew Anthony, Trusted monitoring system and method.
  441. Benson, Greg; Fistonich, Matthew Anthony, Trusted monitoring system and method.
  442. Ni, Jim Chin-Nan; Ma, Abraham C., USB flash drive with deploying and retracting functionalities using retractable cover/cap.
  443. Weiss, Kenneth P., Universal secure registry.
  444. Weiss, Kenneth P., Universal secure registry.
  445. Weiss, Kenneth P., Universal secure registry.
  446. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
  447. Baltatu, Madalina; D'Alessandro, Rosalia; D'Amico, Roberta, User authentication method based on the utilization of biometric identification techniques and related architecture.
  448. Gupta, Vikas, User authentication of applications on third-party devices via user devices.
  449. Yamazaki,Shunpei; Koyama,Jun; Arai,Yasuyuki; Suzawa,Hideomi; Ono,Koji; Takayama,Toru, User identity authentication system and user identity authentication method and mobile telephonic device.
  450. Yamazaki,Shunpei; Koyama,Jun; Arai,Yasuyuki; Suzawa,Hideomi; Ono,Koji; Takayama,Toru, User identity authentication system and user identity authentication method and mobile telephonic device.
  451. Odom, Gary, User selectable signature.
  452. Shinzaki, Takashi, User verification system, and portable electronic device with user verification function utilizing biometric information.
  453. Murphy Michael D., Vehicle use control.
  454. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security system.
  455. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security systems and methods.
  456. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.
  457. Yang, Ka, Web-based user authentication techniques and applications.
  458. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
  459. Essinger, Steven; Zhu, Xiaoxun; Schnee, Michael; Liu, JiBin; Shen, Xin; Chen, LiangLiang; Lu, Jun, Wireless dual-function network device dynamically switching and reconfiguring from a wireless network router state of operation into a wireless network coordinator state of operation in a wireless communication network.
  460. Kramer, Mark; Tucker, Wilfred; Sample, John; Bermel, Christopher, Wireless personal tracking device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로