$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Anti-fraud verification system using a data card 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0181697 (1994-01-14)
발명자 / 주소
  • Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA)
출원인 / 주소
  • Drexler Technology Corporation (Mountain View CA 02)
인용정보 피인용 횟수 : 179  인용 특허 : 0

초록

A system for deterring fraudulent use of wallet-size cards in local benefit dispensing terminals has a permanent data storage medium and a temporary data storage medium disposed on each card. A first card writing device has means for acquiring biometric information from a person and for writing a te

대표청구항

A personal benefit card system comprising, a personal identification card having a first and a second data storage medium, said first medium capable of being written with data indelibly, said second medium capable of being written repeatedly, a verification terminal having means for acquiring biomet

이 특허를 인용한 특허 (179)

  1. Drexler Jerome, Anti-counterfeit validation method for electronic cash cards employing an optical memory stripe.
  2. Weiss, Kenneth P., Apparatus, system and method employing a wireless user-device.
  3. Weiss, Kenneth P., Apparatus, system and method for secure payment.
  4. Yasukura,Yutaka, Authentication card system.
  5. Niinuma, Koichiro, Authentication method and apparatus.
  6. Chaudhury, Krish; Markovic, Dejan, Automatic image feature embedding.
  7. Pugliese ; III Anthony V., Baggage check-in and security system and method.
  8. Rose, Edward M., Billing management package for internet access and web page utilization.
  9. Davis, Mark Charles; Robinson, Douglas Warren, Biometric account card.
  10. Davis, Mark Charles; Robinson, Douglas Warren, Biometric authentication display.
  11. Davis, Mark Charles; Robinson, Douglas Warren, Biometric authentication stripe.
  12. Jeronimus, Michael; Algiene, Ken; Paintin, Scott R., Biometric based authorization systems for electronic fund transfers.
  13. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  14. Musgrave Clyde, Biometric certifying authorities.
  15. Musgrave,Clyde, Biometric certifying authorities.
  16. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  17. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  18. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  19. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  20. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  21. Kowalick,Gregory, Biometric gaming access system.
  22. Russell, David C.; Johnson, Barry W.; Petka, David M., Biometric identification device.
  23. Russell, David C.; Johnson, Barry W.; Petka, David M., Biometric identification device and methods for secure transactions.
  24. Borza Michael Andrew,CAX, Biometric input with encryption.
  25. McCoy Mike ; Chu Kim-Ying ; Annulis James M., Biometric personnel identification system.
  26. Gressel Carmi David,ILX, Biometric system and techniques suitable therefor.
  27. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  28. Musgrave Clyde, Biometric watermarks.
  29. Ballard, Claudio R.; Pathak, Amarish; Imbruce, Michael T.; Currie, Edward H.; Cassata, James; Freedman, Maurice N., Biometrically enabled private secure information repository.
  30. Burke, Christopher John, Card device security using biometrics.
  31. Stinson Michael C. ; Templer ; Jr. John W. ; Clower Dyron, Cardless automated teller transactions.
  32. M철dl,Albert; Stephan,Elmar; M체ller,Robert, Devices and methods for biometric authentication.
  33. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  34. Diehl Jeffrey W. ; Glaze Mary L. ; Braceland Joseph M., Distributed mobile biometric identification system with a centralized server and mobile workstations.
  35. Dunn, John P.; Ledford, Stephen; Jackson, Steve H.; Wood, Albert G., Electronic payment clearing and check image exchange systems and methods.
  36. Dunn, John P.; Ledford, Stephen; Jackson, Steve H.; Wood, Albert G., Electronic payment clearing and check image exchange systems and methods.
  37. Kazuomi Oishi JP, Encrypting method, deciphering method and certifying method.
  38. Butler,Scott T.; Karbach,Dennis B.; Wilson,Michael J.; Boudreau,Mark; Brown,Paul M.; Fotheringham,John; Steinke,Richard W.; Cuddihey,Alden; Mahal,Ramneek; Aleksa,Sinisa; Shantz,Jane R.; English,Ann K, Entitlements administration.
  39. Tumey,David M.; Xu,Tianning; Arndt,Craig M., Facial image verification utilizing smart-card with integrated video camera.
  40. Ikefuji, Yoshihiro; Okada, Hiroharu, IC card and IC chip module.
  41. Ikefuji,Yoshihiro; Okada,Hiroharu, IC card and IC chip module.
  42. Ilan Gabriel,ILX ; Kadosh Arie,ILX, Instruction and/or identification input unit.
  43. Lee, Seung Yop, Integrated identification data capture system.
  44. Bhatt, Ashwinkumar; Hills, Michael; McNamara, Jr., James J.; Tiberia, Candido, Item identification control method.
  45. Stinson, Michael C.; Templer, Jr., John W.; Clower, Dyron, Method and apparatus for automatic cashing of a negotiable instrument.
  46. Stinson, Michael C.; Templer, Jr., John W.; Clower, Dyron, Method and apparatus for automatic check cashing.
  47. Stinson, Michael C.; Templer, Jr., John W.; Clower, Dyron, Method and apparatus for automatic check cashing.
  48. Walker Jay S. ; Jindal Sanjay K. ; Jorasch James A., Method and apparatus for funds and credit line transfers.
  49. Walker Jay S. ; Jindal Sanjay K. ; Jorasch James A., Method and apparatus for funds and credit line transfers.
  50. Lane,Diana L.; Lane,Fred P., Method and apparatus for locating a missing individual.
  51. Lee,Bradley; Wilson,James Charles, Method and apparatus for performing benefit transactions using a portable integrated circuit device.
  52. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  53. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  54. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  55. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  56. Walker Jay S. ; Schneier Bruce ; Jindal Sanjay K. ; Tedesco Daniel E., Method and device for generating a single-use financial account number.
  57. Walker, Jay S.; Schneier, Bruce; Jindal, Sanjay K.; Tedesco, Daniel E., Method and device for generating a single-use financial account number.
  58. Walker, Jay S.; Schneier, Bruce; Jindal, Sanjay K.; Tedesco, Daniel E., Method and device for generating a single-use financial account number.
  59. Walker, Jay S.; Schneier, Bruce; Jindal, Sanjay K.; Tedesco, Daniel E., Method and device for generating a single-use financial account number.
  60. Walker,Jay S.; Schneier,Bruce; Jindal,Sanjay K.; Tedesco,Daniel E., Method and device for generating a single-use financial account number.
  61. Zou, Kevin; Wiles, Josh A.; Solitro, Pasquale; Zhu, Zheng, Method and system for managing a distributed transaction process.
  62. Zou, Kevin; Wiles, Josh A.; Solitro, Pasquale; Zhu, Zheng, Method and system for managing a distributed transaction process.
  63. Dangott, Tracy L.; Mastrino, Andrew J.; Miller, Keith L.; Radeni, Jaclyn, Method and system for monitoring and detecting fraud in targeted benefits.
  64. Dangott, Tracy L.; Mastrino, Andrew J.; Miller, Keith L.; Radeni, Jaclyn, Method and system for monitoring and detecting fraud in targeted benefits.
  65. Siegel, Brian; Abram, Philip Michael; Beckwitt, Marc; Gudorf, Gregory D.; Iso, Kazuaki; Raymond, Brian; Tobin, Christopher M., Method and system for restricted biometric access to content of packaged media.
  66. Wood, Richard Glee; White, Jr., Wesley Jack, Method for accelerated provision of funds for social services directly to an individual using a smart card.
  67. Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
  68. Bove, John M., Method for creating a fingerprint image on an optical memory card.
  69. Marshall, John; Usher, David, Method for generating a unique and consistent signal pattern for identification of an individual.
  70. Marshall,John; Usher,David, Method for generating a unique and consistent signal pattern for identification of an individual.
  71. John Marshall GB; David Usher GB, Method for generating a unique consistent signal pattern for identification of an individual.
  72. Wood, Richard Glee; White, Jr., Wesley Jack, Method for reducing fraud in government benefit programs using a smart card.
  73. Kumhyr, David Bruce, Method for suspect identification using scanning of surveillance media.
  74. Horiguchi,Akiko; Usami,Mitsuo; Ohki,Masaru, Method for the determination of soundness of a sheet-shaped medium, and method for the verification of data of a sheet-shaped medium.
  75. Yap Chas Hock Eng,MYX ; Chua Foong Mei,MYX, Method of making an improved security identification document including contactless communication insert unit.
  76. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  77. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  78. Ludtke,Harold Aaron; Maritzen,L. Michael, Method or system for executing deferred transactions.
  79. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  80. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  81. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  82. Barron,Gary, Multi-functional data card.
  83. Hoffberg, Steven M., Multifactorial optimization system and method.
  84. Haala, Catherine A., National identification card system and biometric identity verification method for negotiating transactions.
  85. Haala, Catherine A., National identification card system and biometric identity verification method for negotiating transactions.
  86. Haala,Catherine A., National identification card system and biometric identity verification method for negotiating transactions.
  87. Harper,W. Jack, Optical immunization card.
  88. Thomas, George F.; Wood, Albert G.; Pawelczyk, Joseph S.; Friedman, Kenneth H.; Palmese, Paul, Payment identification code and payment system using the same.
  89. Kinsella David J., Pointing device with biometric sensor.
  90. Robert C. Houvener, Positive identity verification system and method including biometric user authentication.
  91. Kennedy Paul Roy ; Hall Timothy Gerard ; Yip William Chunhung, Radio telecommunication device and method of authenticating a user with a voice authentication token.
  92. Ballard Claudio R., Remote image capture with centralized processing and storage.
  93. Ballard Claudio R., Remote image capture with centralized processing and storage.
  94. Ballard, Claudio R., Remote image capture with centralized processing and storage.
  95. Ballard, Claudio R., Remote image capture with centralized processing and storage.
  96. Golden, Bruce L.; Rollin, Bernard E.; Switzer, Jr., Ralph v.; Comstock, Jr., Carlton R., Retinal vasculature image acquisition apparatus and method.
  97. Sparks, John T., Secure commercial transactions system.
  98. Sparks,John T., Secure commercial transactions system.
  99. Kennedy Paul Roy ; Hall Timothy Gerard ; Hardy Douglas Allen, Security token and method for wireless applications.
  100. Buffam William J., Self-authentication apparatus and method.
  101. Horiguchi,Akiko; Usami,Mitsuo; Ohki,Masaru, Service system, information processing system and interrogator.
  102. Horiguchi,Akiko; Usami,Mitsuo; Ohki,Masaru, Sheet-shaped medium, method and apparatus for determination of genuineness or counterfeitness of the same, and apparatus for issuing certificate.
  103. Carta,David R.; Kelly,Guy M.; Ravenis, II,Joseph V J, Smart card access control system.
  104. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  105. Glaze Mary L. ; Braceland Joseph M., Stand-alone biometric identification system.
  106. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  107. Musgrave Clyde ; Dulude Robert S., System and method for authenticating electronic transactions using biometric certificates.
  108. Ludtke, Harold Aaron; Maritzen, L. Michael, System and method for conducting secure transactions over a network.
  109. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A; Arkel, Hans Van; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terrill J; Wagner, James J, System and method for detecting and managing fraud.
  110. Hoffberg, Steven M., System and method for determining contingent relevance.
  111. Kimmel,Scott T., System and method for implementing healthcare fraud countermeasures.
  112. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  113. Walker Jay S. ; Jindal Sanjay K. ; Tedesco Daniel E., System and method for issuing security deposit guarantees based on credit card accounts.
  114. D'Agostino, John, System and method for performing secure credit card transactions.
  115. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  116. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  117. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  118. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  119. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  120. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  121. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  122. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  123. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  124. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  125. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  126. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  127. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  128. Heacock,Gregory L., System for capturing an image of the retina for identification.
  129. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  130. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  131. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  132. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  133. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  134. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  135. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  136. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  137. Zou, Kevin; Wiles, Josh A.; Solitro, Pasquale; Zhu, Zheng, Systems and methods for electronically processing government sponsored benefits.
  138. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  139. Neal, Irma Jean; Schneider, David, Systems and methods for processing benefits.
  140. Neal, Irma Jean; Schneider, David, Systems and methods for processing benefits.
  141. Neal, Irma Jean; Schneider, David, Systems and methods for processing benefits.
  142. Neal, Irma Jean; Schneider, David, Systems and methods for processing benefits.
  143. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  144. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  145. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  146. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  147. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  148. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  149. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  150. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  151. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  152. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  153. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  154. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  155. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  156. Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  157. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  158. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  159. Hoffman,Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  160. Burchette, Jr., Robert L., Transaction card system having security against unauthorized usage.
  161. Burchette, Jr.,Robert L., Transaction card system having security against unauthorized usage.
  162. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  163. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  164. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  165. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  166. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  167. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  168. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  169. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  170. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  171. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  172. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  173. Weiss, Kenneth P., Universal secure registry.
  174. Weiss, Kenneth P., Universal secure registry.
  175. Weiss, Kenneth P., Universal secure registry.
  176. Weiss, Kenneth P., Universal secure registry.
  177. Weiss, Kenneth P., Universal secure registry.
  178. Hansen, Joseph A., Using speaker identification and verification speech processing technologies to activate and deactivate a payment card.
  179. Drexler Jerome, Validation method for electronic cash cards and digital identity cards utilizing optical data storage.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로