$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Counterfeit-proof identification card 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/30
출원번호 US-0285134 (1994-08-03)
발명자 / 주소
  • Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD)
출원인 / 주소
  • V-ONE Corporation (Rockville MD 02)
인용정보 피인용 횟수 : 210  인용 특허 : 8

초록

A system and method for preventing counterfeiting of an identification or transaction card, and for verifying that the user of the card is an authorized user, involves the use of a unique, unalterable serial number and an exclusive OR function to generate a private key protected digital signature. T

대표청구항

A system for enciphering information onto cards, each card having permanently stored thereon a serial number unique to the card, and for authenticating the cards and users of the cards, comprising: a card initialization terminal, means for combining two out of the three members of a set consisting o

이 특허에 인용된 특허 (8)

  1. Ishiguro Ginya (Yokosuka JPX) Muta Toshiyasu (Yokosuka JPX) Sakita Kazutaka (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Okamoto Tatsuaki (Yokosuka JPX) Fujioka Atsushi (Yokohama JPX), Method and apparatus for settlement of accounts by IC cards.
  2. Ishiguro Ginya (Yokosuka JPX) Muta Toshiyasu (Yokosuka JPX) Sakita Kazutaka (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Okamoto Tatsuaki (Yokosuka JPX) Fujioka Atsushi (Yokohama JPX), Method and apparatus for settlement of accounts by IC cards.
  3. Ishiguro Ginya (Yokosuka JPX) Muta Toshiyasu (Yokosuka JPX) Sakita Kazutaka (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Okamoto Tatsuaki (Yokosuka JPX) Fujioka Atsushi (Yokohama JPX), Method and apparatus for settlement of accounts by IC cards.
  4. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
  5. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification using proofs of legitimacy.
  6. Barakat Simon (Andresy FRX), Method and system for suthenticating electronic memory cards.
  7. Weinstein Stephen B. (Summit NJ), Protection system for intelligent cards.
  8. Naccache David (Maison-Alfort FRX) Fremanteau Patrice (Strasbourg FRX), Unforgeable identification device, identification device reader and method of identification.

이 특허를 인용한 특허 (210)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  6. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  11. Johnson,Anders, Apparatus and method for secure filed upgradability with hard wired public key.
  12. Reber William L. ; Perttunen Cary D., Apparatus for reading an electronic network navigation device and a peripheral for use therewith.
  13. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  14. Guenter, Erich; Maresh, Mark Edmund; Mazzeo, Thomas S., Authenticating serialized commodities.
  15. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  16. Rhoads,Geoffrey B., Authentication of identification documents.
  17. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  18. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  19. Kevin M. Messina, Authentication system for identification documents.
  20. Messina, Kevin M., Authentication system for identification documents.
  21. Kawamoto, Yohei; Tanaka, Yu, Authentication using electronic signature.
  22. Epstein, William C.; Miller, Lawrence R., Binding a digital certificate to multiple trust domains.
  23. Brandenburg Barbara B., Broadcast software distribution.
  24. Flitcroft, Daniel Ian; O'Donnell, Graham; Langford, Conor; Carroll, James, Business-to-business commerce using financial transaction numbers.
  25. Michael Saunders, Cashless method for a gaming system.
  26. Saunders, Michael, Cashless method for a gaming system.
  27. Saunders, Michael, Cashless method for a gaming system using player information.
  28. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  29. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  30. Gnanasundram, Baheerathan; Bruzzese, Vincent Carmelo, Computer implemented frameworks and methodologies for enabling software authentication at an electronic gaming machine.
  31. O'Brien, William G.; Yeap, Tet Hin; Murray, Sean MacLean, Contact-less tag with signature, and applications thereof.
  32. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  33. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  34. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  35. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  36. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  37. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  38. Flitcroft, Daniel I; O'Donnell, Graham, Credit card system and method.
  39. Flitcroft, Daniel Ian; O'Donnell, Graham, Credit card system and method.
  40. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  41. Flitcroft, Daniel Ian; Lyons, Garry, Credit cards system and method having additional features.
  42. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  43. Lovell William S., Data authentication circuit.
  44. Flitcroft,Daniel I.; O'Donnell,Graham, Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions.
  45. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  46. Reber William L. ; Knighton Mark S., Device having a diskette-like housing and a wireless transceiver and methods therefor.
  47. Rhoads, Geoffrey B., Digital authentication with analog documents.
  48. Rhoads, Geoffrey B., Digital authentication with analog documents.
  49. Rhoads,Geoffrey B., Digital authentication with analog documents.
  50. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  51. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  52. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  53. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  54. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  55. Reber William L. ; Perttunen Cary D., Electronic network navigation device and method for linking to an electronic address therewith.
  56. Terao, Taro; Kamei, Mitsuhisa; Nakatsuyama, Hisashi, Electronic ticket system.
  57. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  58. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  59. Poitier, Emmanuel James; Bates, Richard Eliot, Entertainment device.
  60. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  61. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  62. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  63. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  64. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  65. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  66. Yeap, Tet Hin; O'Brien, William G.; Murray, Sean Maclean, Generation of communication device signatures for use in securing nomadic electronic transactions.
  67. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based detection keys.
  68. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based signal detection.
  69. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based signal detection.
  70. William L. Reber ; Daryl R. Harris ; Cary D. Perttunen, Handheld device having an optical data reader.
  71. William L. Reber ; Daryl R. Harris ; Cary D. Perttunen, Handheld device having an optical data reader.
  72. Kitamura,Shigehiro; Ishii,Nobuyuki; Takahashi,Hideki; Hattori,Ryoji, IC card and card certification method.
  73. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  74. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  75. Jones, Robert L., Identification document with three dimensional image of bearer.
  76. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  77. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  78. Blancas,Irma; Krimmel,Karl F., Identification of an individual using a multiple purpose card.
  79. Kuribara, Nobuhiro, Image forming apparatus and image forming system.
  80. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  81. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  82. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  83. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  84. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  85. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  86. Wright Steven R. ; Brook Christopher T., Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network.
  87. Hopkins,W. Dale, Key management technique for establishing a secure channel.
  88. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  89. Hawes, Jonathan L., Linking documents through digital watermarking.
  90. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  91. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  92. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  93. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  94. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  95. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  96. Johnson, Richard C., Many-to-many correspondence: methods and systems for replacing interbank funds transfers.
  97. Johnson, Richard C., Many-to-many correspondence: methods and systems for replacing interbank funds transfers.
  98. Brindze Paul L. ; Tully Geoffrey A., Mass storage element and drive unit therefor.
  99. Cormack,Christopher J.; Jackson,Jeff R.; White,Jeremy A., Method and apparatus for authenticating registry information.
  100. Rajasekaran, Sanguthevar; Hird, Geoffrey R.; Kausik, Balas Natarajan, Method and apparatus for camouflaging of data, information and functional transformations.
  101. Jain Vipin Kumar ; Nessett Danny M. ; Sherer William Paul, Method and apparatus for providing security in a star network connection using public key cryptography.
  102. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  103. Hird, Geoffrey R., Method and apparatus for secure cryptographic key generation, certification and use.
  104. Völkening, Stephan; Jüngermann, Hardy; Hupe, Torsten, Method and apparatus for the secure processing of sensitive information.
  105. Ray Lawrence A. ; Honsinger Chris W., Method and apparatus for transaction card security utilizing embedded image data.
  106. Kopchik, Kurt, Method and apparatus for wirelessly establishing user preference settings on a computer.
  107. Kopchik,Kurt, Method and apparatus for wirelessly establishing user preference settings on a computer.
  108. Blom, Rolf; Nerbrant, Per-Olof; Näslund, Mats, Method and arrangement for user friendly device authentication.
  109. Sj철blom,Hans, Method and device for performing electronic transactions.
  110. Lorie Raymond Amand ; Mao Jianchang ; Mohiuddin Kottappuram Mohamedali, Method and means for extracting fixed-pitch characters on noisy images with complex background prior to character recog.
  111. Straumann, Hugo, Method and system for authenticating a user by means of an application.
  112. Straumann, Hugo, Method and system for authenticating a user by means of an application.
  113. Straumann, Hugo, Method and system for authenticating a user by means of an application.
  114. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  115. Yeap, Tet Hin; O'Brien, William G., Method and system for validating a device that uses a dynamic identifier.
  116. Yeap, Tet Hin; O'Brien, William G., Method and system for validating a device that uses a dynamic identifier.
  117. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  118. Angelo Michael F., Method for controlling access to a computer system by utilizing an external device containing a hash value representati.
  119. Rajamadam C. Venkatram ; Ravi Viswanath ; Unmesh Sahasrabuddhe ; Ashish Warty ; Rahul Khandkar, Method for generating secure symmetric encryption and decryption.
  120. Ippolito Giovanni,ITX ; Fortina Marco Giovanni Emilio,ITX ; Colombo Gianluca,ITX, Method for obtaining authenticity identification devices for using services in general, and device obtained thereby.
  121. Pere,Paul, Method for secured access to data in a network.
  122. Webster, Michael; Pohja, Seppo; Palo, Timo, Method for server assisted keystore protection.
  123. Hennebert, Christine, Method for setting up a secure end-to-end communication between a user terminal and a connected object.
  124. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  125. Challener,David Carroll; Goodman,Steven Dale, Method of creating password list for remote authentication to services.
  126. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  127. Chasko, Stephen John; Junghans, David; Shields, Adrian, Methods and apparatus for secure personal identification number and data encryption.
  128. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  129. Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
  130. Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
  131. Johnson,Richard C., Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts.
  132. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  133. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  134. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  135. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  136. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  137. Rhoads, Geoffrey B., Methods for encoding security documents.
  138. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  139. Resseguie, Donald, Multi-pass merge process for the check processing control system.
  140. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  141. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  142. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  143. Lundström, Magnus, Network authentication method for secure electronic transactions.
  144. Reber William L. ; Perttunen Cary D. ; Toler Jeffrey G., Network navigation method for printed articles by using embedded codes for article-associated links.
  145. Reber William L. ; Perttunen Cary D., Network navigation methods and systems using an article of mail.
  146. Biggar, Lynne; Tobin, Justin D.; Bishop, Fred; Greiner, Hans-Jurgen, Online card activation system and method.
  147. Wagner, Richard Hiers, Open network system and method for I/O operations with non-standard I/O devices using an extended open network protocol.
  148. Agabra David S. ; Knighton Mark S. ; Logan Douglas, Optical code reader and methods and articles therefor.
  149. Knighton Mark S. ; Logan Douglas, Optical code reader and methods and articles therefor.
  150. Knighton Mark S. ; Logan Douglas, Optical code reader including circuitry for processing the symbology.
  151. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  152. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  153. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  154. Jiang, Fan; Okonkwo, Aneto Pablo; Springer, Michael William; Bakir, Gökhan Hasan, Pending deposit for payment processing system.
  155. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  156. Okada,Souichi; Hasebe,Takayuki; Kamada,Jun; Hayashi,Takehiko, Personal identification terminal and method having selectable identification means or identification levels.
  157. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  158. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  159. Lisimaque,Gilles, Process to manage data in a chip card.
  160. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  161. O'Brien, William G.; Murray, Sean MacLean; Yeap, Tet Hin, Processing of communication device signatures for use in securing nomadic electronic transactions.
  162. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  163. Tallent, Jr., Guy S.; Donfried, Paul A.; Hicks, George M. (Mack); Lee, Elizabeth, Provision of authorization and other services.
  164. Cecil, Kenneth B.; Walton, Charles A., Proximity card with incorporated PIN code protection.
  165. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  166. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  167. Johns, Martin, Safe script templating to provide reliable protection against attacks.
  168. Buhler, Peter; Dykeman, Harold D.; Eirich, Thomas; Kaiserswerth, Matthias; Kramp, Thorsten, Secure PIN management of a user trusted device.
  169. Estakhri, Petro; Le, Ngon, Secure compact flash.
  170. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  171. Sciupac, Louis H., Secure transactions with passive storage media.
  172. Sciupac, Louis H., Secure transactions with passive storage media.
  173. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  174. Haddock, Richard M., Security feature RFID card.
  175. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  176. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  177. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  178. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  179. Bussey, Mark G.; Zimmerman, Fred C., Software key control for mobile devices.
  180. Bussey, Mark G.; Zimmerman, Fred C., Software key control for mobile devices.
  181. D'Agnolo, Carlo Antonio Giovanni, System and method for automatic verification of the holder of an authorization document and automatic establishment of the authenticity and validity of the authorization document.
  182. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  183. Wagner, Richard Hiers, System and method for enabling transactions between a web server and a smart card, telephone, or personal digital assistant over the internet.
  184. Wagner, Richard Hiers, System and method for enabling transactions between a web server and an automated teller machine over the internet.
  185. Barkan Yuval,ILX ; Barkan Moromay,ILX, System and method for handling permits.
  186. Ng, Yvonne, System and method for managing a plurality of local lists of a single user.
  187. D'Agostino, John, System and method for performing secure credit card purchases.
  188. D'Agostino, John, System and method for performing secure credit card transactions.
  189. Hicks, Mack; Seiler, Regina; Tallent, Guy; Kupres, Kristin; Freudenstein, Allen, System and method for providing certification-related and other services.
  190. McKenney, Mary Keenan; Walch, Markus; Baker, III, Walter; Storch, Oliver; Landsmann, Peter Josef Eduard; Jetter, William John; Wong, Margaret Miu-Ling; Cameron, William Isaac, System and method for providing payment services in electronic commerce.
  191. Irwin, Jr., Kenneth E., System and method for securing on-line documents using authentication codes.
  192. Wagner, Richard Hiers, System and method for transacting communication over an open network.
  193. Miller, Lawrence R.; Tallent, Jr., Guy S.; Ahmed, Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  194. Urien, Pascal, System for accessing an object using a “web” browser co-operating with a smart card.
  195. Piliouras, Teresa A., Systems and methods for controlling data access by use of a universal anonymous identifier.
  196. Eskin, Erdal; Gnanasundram, Baheerathan; Manchanayake, Waruna, Systems and methods for data protection.
  197. Eskin, Erdal; Gnanasundram, Baheerathan; Manchanayake, Waruna, Systems and methods for data protection.
  198. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  199. Piliouras, Teresa C., Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation.
  200. Piliouras, Teresa C., Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation.
  201. Piliouras, Teresa C., Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation.
  202. Piliouras, Teresa C., Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation.
  203. Piliouras, Teresa C., Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation.
  204. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  205. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  206. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  207. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  208. Dulin, Charles; Solo, David; Hicks, Mack; Nepomuceno, Larry; Stirland, Mark, Transaction coordinator for digital certificate validation and other services.
  209. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  210. Yeap, Tet Hin; O'Brien, William G.; Murray, Sean MacLean, Validation method and system for use in securing nomadic electronic transactions.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로