$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Authentication system and method for smart card transactions 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0531567 (1995-09-13)
발명자 / 주소
  • Deo Vinay
  • Seidensticker Robert B.
  • Simon Daniel R.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee & Hayes, PLLC
인용정보 피인용 횟수 : 700  인용 특허 : 0

초록

An authentication system includes a portable information device, such as a smart card, that is configured to store and process multiple different applications. The smart card is assigned its own digital certificate which contains a digital signature from a trusted certifying authority and a unique p

대표청구항

[ We claim:] [1.] A method for authenticating a transaction between a portable information device and a terminal, the portable information device storing a device-related certificate unique to the device and the terminal storing a terminal-related certificate unique to the terminal which includes in

이 특허를 인용한 특허 (700)

  1. Sadighi, Babak; Cao, Ling; Seitz, Ludwig, Access control system and method for operating said system.
  2. Sadighi, Babak; Cao, Ling; Seitz, Ludwig, Access control system and method for operating said system.
  3. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  4. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  5. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  6. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  7. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  8. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  9. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  10. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  11. Crews, Tim; Edwards, Judith; Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert; Crallie, Charles E., Apparatus and method for verifying components of an ATM.
  12. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  13. Dadashev, Oleg; Betser, Yoram; Maayan, Eduardo, Apparatus and methods for multi-level sensing in a memory array.
  14. Roberts, William Peyton, Apparatus for dispensing activated monitoring devices.
  15. de Jong,Eduard, Apparatus for private personal identification number management.
  16. Nakamura, Masakazu; Tamai, Hironobu; Hori, Miyuki; Murakami, Seiki, Apparatus, system and method for electronic ticket management and electronic ticket distribution authentication.
  17. Nakamura, Masakazu; Tamai, Hironobu; Hori, Miyuki; Murakami, Seiki, Apparatus, system and method for electronic ticket management and electronic ticket distribution authentication.
  18. Minemura,Atsushi, Application authentication system, secure device, and terminal device.
  19. Ie, William; Agrawal, Sunil C., Application identification.
  20. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  21. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  22. De Jong, Eduard Karel; Bos, Jurjen Norbert Eelco, Arrangement storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory.
  23. De Jong,Eduard Karel; Bos,Jurjen Norbert Eelco, Arrangements storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory.
  24. Adams, Neil Patrick, Assignment and distribution of access credentials to mobile communication devices.
  25. Aull,Kenneth W.; Kerr,Thomas C.; Freeman,William E.; Bellmore,Mark A., Assignment of user certificates/private keys in token enabled public key infrastructure system.
  26. Ray, Kenneth D.; Lewis, Nathan T.; Setzer, Matthew C.; Wooten, David R., Attested content protection.
  27. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  28. Bishop, Fred; Saunders, Peter D, Authenticating an RF transaction using a transaction counter.
  29. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  30. Wilson, Stephen, Authenticating electronic financial transactions.
  31. Wilson, Stephen, Authenticating electronic financial transactions.
  32. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Authenticating fingerprints for radio frequency payment transactions.
  33. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  34. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  35. McFarland, Keith A., Authentication via motion of wireless device movement.
  36. McFarland, Keith A., Authentication via motion of wireless device movement.
  37. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Authorizing radio frequency transactions using a keystroke scan.
  38. Crews, Tim; Edwards, Judith; Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert J.; Crallie, Charles E., Automated banking machine that operates responsive to data bearing records.
  39. Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert J.; Crallie, Charles E.; Edwards, Judith; Crews, Tim, Automated banking machine that operates responsive to data bearing records.
  40. Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert J.; Crallie, Charles E.; Edwards, Judith; Crews, Tim, Automated banking machine that operates responsive to data bearing records.
  41. Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert J.; Crallie, Charles E.; Edwards, Judith; Crews, Tim, Automated banking machine that operates responsive to data bearing records.
  42. Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert J.; Crallie, Charles E.; Edwards, Judith; Crews, Tim, Automated banking machine that operates responsive to data bearing records.
  43. McGinley, Joseph A.; Doland, Anne E.; Konecny, Robert J.; Crallie, Charles E.; Edwards, Judith; Crews, Tim, Automated banking machine that operates responsive to data bearing records.
  44. Aull,Kenneth W.; McCullough,Vincent J., Automated tracking of certificate pedigree.
  45. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  46. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  47. Epstein, William C.; Miller, Lawrence R., Binding a digital certificate to multiple trust domains.
  48. Gardiner, Michael; Canzi, Adriano, Biometric device utilizing finger sequence for authentication.
  49. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric registration for facilitating an RF transaction.
  50. Bonalle,David S.; Salow,Glen, Biometric safeguard method for use with a smartcard.
  51. Beenau,Blayn W.; Bonalle,David S.; Fields,Seth W.; Gray,William J.; Larkin,Carl; Montgomery,Joshua L.; Saunders,Peter D., Biometric safeguard method with a fob.
  52. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Biometrics for radio frequency payment transactions.
  53. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  54. Barkan, Elad; Barkan, Nir, CA in a card.
  55. Muschellack, Erich; Soares de Castro, Marcelo; Lopez de Oliveira, Luiz Alexandre, Card activated cash dispensing automated banking machine firmware authentication system.
  56. Dickson, Timothy E., Card reader module with pin decryption.
  57. Muschellack,Erich; Soares de Casto,Marcelo; Lopez de Oliveira,Alexandre, Cash dispensing automated banking machine firmware authentication system and method.
  58. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  59. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  60. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  61. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  62. Deindl Michael,DEX ; Hanel Walter,DEX ; Schaal Albert,DEX, Certification of cryptographic keys for chipcards.
  63. Hamann, Ernst-Michael; Kreyss, Jutta; Vasudevan, Narayanan, Certification of multiple keys with new base and supplementary certificate types.
  64. Kowalski, Jacek; Charrat, Bruno, Chip card reader having contact and contactless operating modes.
  65. Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Eyk,Becky Vander; Hood,Matthew C.; Isenberg,Susan E.; Malnati,Leigh; Mayers,Alexandra; Mueller,Sue; Norcross,Zarita; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Skilling Belmond,Lisa; Williamson,John R., Clear contactless card.
  66. England, Paul, Client-side boot domains and boot rules.
  67. England, Paul, Client-side boot domains and boot rules.
  68. England,Paul, Client-side boot domains and boot rules.
  69. De Jong,Eduard Karel, Computer arrangement using non-refreshed DRAM.
  70. De Jong,Eduard Karel, Computer arrangement using non-refreshed DRAM.
  71. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database.
  72. Spalka, Adrian; Lenhardt, Jan, Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device.
  73. Spalka, Adrian; Lehnhardt, Jan; Gotthardt, Frank, Computer implemented method for performing cloud computing on data being stored pseudonymously in a database.
  74. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system.
  75. Xia, Sharon; Muñoz, Eduardo; Brombaugh, Dan, Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys.
  76. De Jong,Eduard Karel, Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium.
  77. Sullivan, Kevin, Computerized funding of a second financial account by a first financial card.
  78. Chen,Liqun; Lo,Hoi Kwong; Chan,David, Computing apparatus and methods using secure authentication arrangements.
  79. Campinos Arnaldo,FRX ; Fischer Jean-Bernard,FRX, Conditional access system using messages with multiple encryption keys.
  80. Magne, John, Configurable smartcard.
  81. Ong, Peng T., Consolidation of user directories.
  82. Bi, Daoshen; Jones, Robert, Contact smart cards having a document core, contactless smart cards including multi-layered structure, PET-based identification document, and methods of making same.
  83. Jones, Robert; Anderson, Joseph; Bi, Daoshen; Regan, Thomas; Mailloux, Dennis, Contact smart cards having a document core, contactless smart cards including multi-layered structure, pet-based identification document, and methods of making same.
  84. Hansmann,Uwe; Merk,Lothar; Stober,Thomas, Controlled use of devices.
  85. England, Paul; DeTreville, John D.; Lampson, Butler W., Controlling access to content based on certificates and access predicates.
  86. Saunders, Peter D, Converting account data associated with a radio frequency device.
  87. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  88. Boyle, Kevin; Maistre, Marty, Credit instrument and system providing multiple services including access to credit services and access to a service provider club.
  89. Boyle, Kevin; Maistre, Marty, Credit instrument and system with automated payment of club, merchant, and service provider fees.
  90. Meister, Gisela, Cryptographic method.
  91. Baessler,Felix, Cryptographic security method and electronic devices suitable therefor.
  92. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  93. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  94. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  95. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  96. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  97. Brake, Jr., Francis B.; Schwartz, Deborah; Zimmerman, Jennifer, Customer activated multi-value (CAM) card.
  98. Brake, Jr., Francis B.; Schwartz, Deborah; Zimmerman, Jennifer, Customer activated multi-value (CAM) card.
  99. Brake, Jr., Francis B.; Schwartz, Deborah; Zimmerman, Jennifer, Customer activated multi-value (CAM) card.
  100. Brake, Jr.,Francis B.; Schwartz,Deborah; Zimmerman,Jennifer, Customer activated multi-value (CAM) card.
  101. Brake, Jr.,Francis B.; Schwartz,Deborah; Zimmerman,Jennifer, Customer activated multi-value (CAM) card.
  102. Vanstone Scott A,CAX, Data card verification system.
  103. Vanstone, Scott A., Data card verification system.
  104. Vanstone, Scott A., Data card verification system.
  105. Vanstone, Scott A., Data card verification system.
  106. Vanstone, Scott Alexander, Data card verification system.
  107. Vanstone,Scott A, Data card verification system.
  108. De Jong,Eduard Karel, Data exchange system comprising portable data processing units.
  109. de Jong,Eduard Karel, Data exchange system comprising portable data processing units.
  110. Okaue, Takumi, Data processing system, data processing method, data processing apparatus, license system, and program providing medium.
  111. Moskowitz, Scott A., Data protection method and device.
  112. Moskowitz, Scott A., Data protection method and device.
  113. Moskowitz, Scott A., Data protection method and device.
  114. Moskowitz, Scott A., Data protection method and device.
  115. Gotthardt, Frank, Data structure, method, and system for predicting medical conditions.
  116. Spalka, Adrian; Lehnhardt, Jan, Database system, computer system, and computer-readable storage medium for decrypting a data record.
  117. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffrey; Joines,Penny, Debit purchasing of stored value card for use by and/or deliveries to others.
  118. Phillips, Gregory Joseph; Deporte, Rebecca; Norwine, Jeffery A.; Joines, Penny B., Debit purchasing of stored value card for use by and/or delivery to others.
  119. Phillips, Gregory Joseph; Deporte, Rebecca; Norwine, Jeffery A.; Jones, Penny B., Debit purchasing of stored value card for use by and/or delivery to others.
  120. Phillips, Gregory Joseph; Deporte, Rebecca; Norwine, Jeffrey; Joines, Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  121. Phillips, Gregory Joseph; Deporte, Rebecca; Norwine, Jeffrey; Joines, Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  122. Phillips, Gregory Joseph; Deporte, Rebecca; Norwine, Jeffrey; Joines, Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  123. Phillips, Gregory Joseph; Deporte, Rebecca; Norwine, Jeffrey; Joines, Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  124. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffery A.; Joines,Penny B., Debit purchasing of stored value card for use by and/or delivery to others.
  125. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffrey; Joines,Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  126. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffrey; Joines,Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  127. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffrey; Joines,Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  128. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffrey; Joines,Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  129. Phillips,Gregory Joseph; Deporte,Rebecca; Norwine,Jeffrey; Joines,Penny, Debit purchasing of stored value card for use by and/or delivery to others.
  130. Guest, John David; Tagg, Brian Roger; Lowin, Leslie George, Delivery of value identifiers using short message service (SMS).
  131. Bloom, Ilan; Eitan, Boaz; Irani, Rustom, Dense non-volatile memory array and method of fabrication.
  132. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  133. Woo, Sang Rea; Shin, Chang Ho, Digital broadcasting system and method of processing data in digital broadcasting system.
  134. Nayshtut, Alex; Pogorelik, Oleg; Sharaga, Avishay; Smith, Ned M.; Muttik, Igor, Digital heritage notary.
  135. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  136. Lofgren, Neil; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermaking holograms for use with smart cards.
  137. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  138. Lofgren, Neil E.; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermarking holograms for identity documents.
  139. Sikkannan Govinda Rajan, Saravanan; Georgian, Pranesh Morris; Seshadri Renganathan, Lavanyaa, Distributed smart card reader for multifunction printer.
  140. Irani, Rustom; Eitan, Boaz; Bloom, Ilan; Shappir, Assaf, Double density NROM with nitride strips (DDNS).
  141. Sofer,Yair; Maayan,Eduardo; Betser,Yoram, Dynamic matching of signal path and reference path for sensing.
  142. Lyons, Martin; Muir, Robert Linley, Electronic casino gaming with authentication and improved security.
  143. McCaughan Daniel Vincent,GBX ; Unitt Brian Michael,GBX ; Dean Robert John,GBX ; Kanabar Yashvant,GBX, Electronic sealed envelope.
  144. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  145. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  146. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  147. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  148. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  149. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  150. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  151. Brown, Michael K.; Adams, Neil; Little, Herbert, Enabling use of a certificate stored in a smart card.
  152. Brown, Michael Kenneth; Adams, Neil Patrick; Little, Herbert Anthony, Enabling use of a certificate stored in a smart card.
  153. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  154. Baranowski, James A., Enhanced RFID instrument security.
  155. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced privacy protection in identification in a data communications network.
  156. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced quality of identification in a data communications network.
  157. Lam, Alister, Enhanced smart card usage.
  158. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Facial scan biometrics on a payment device.
  159. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley, Financial services device.
  160. Granite, Anthony; Lentz, Carol, Financial system for isolated economic environment.
  161. Lentz, Carol; Granite, Anthony, Financial system for isolated economic environment.
  162. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Dill, Katherine; Maiorano, Alison; Koehler, William; Meredith, Anthony; Rowel, Jonathan; Nuk, Howard; Scott, David; Khakbaz, Tanya; Ambler, Charles; Wickholm, Hanna, Financial transaction machine.
  163. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Dill, Katherine; Maiorano, Alison; Koehler, William; Meredith, Anthony; Rowell, Jonathan; Nuk, Howard; Scott, David; Khakbaz, Tanya; Ambler, Charles; Wickholm, Hanna, Financial transaction machine.
  164. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Dill, Katherine; Maiorano, Alison; Koehler, William; Meredith, Anthony; Rowell, Jonathan; Nuk, Howard; Scott, David; Khakbaz, Tanya; Ambler, Charles; Wickholm, Hanna, Financial transaction machine.
  165. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Dill, Katherine; Maiorano, Alison; Koehler, William; Meredith, Anthony; Rowell, Jonathan; Nuk, Howard; Scott, David; Khakbaz, Tanya; Ambler, Charles; Wickholm, Hanna, Financial transaction machine.
  166. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Dill, Katherine; Maiorano, Alison; Koehler, William; Meredith, Anthony; Rowell, Jonathan; Nuk, Howard; Scott, David; Khakbaz, Tanya; Ambler, Charles; Wickholm, Hanna, Financial transaction machine.
  167. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Dill, Katherine; Maiorano, Alison; Koehler, William; Meredith, Anthony; Rowell, Jonathan; Nuk, Howard; Scott, David; Khakbaz, Tanya; Ambler, Charles; Wickholm, Hanna, Financial transaction machine.
  168. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Kweon, Sanghwan; Lee, Heeyoun; Cha, Jaemin; Militello, Joe; Williams, Matt, Financial transaction machine.
  169. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Kweon, Sanghwan; Lee, Heeyoun; Cha, Jaemin; Militello, Joe; Williams, Matt, Financial transaction machine.
  170. Budde, William; Miranda, Giancarlo; Nolan, Joseph Bradley; Kweon, Sanghwan; Lee, Heeyoun; Cha, Jaemin; Militello, Joe; Williams, Matt, Financial transaction machine.
  171. Bonalle,David S; Lasch,Ellen; Thomas,Tracey R.; Webb,Lisa, Foldable non-traditionally-sized RF transaction card system and method.
  172. Haney, Richard D., Formation of wireless device location sharing group.
  173. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  174. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  175. Pitt, Lance Douglas, GeoNexus proximity detector network.
  176. Kwan, Nang Kon; Magne, John, Guided enrollment and login for token users.
  177. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Hand geometry biometrics on a payment device.
  178. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry biometrics on a payment device.
  179. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry recognition biometrics on a fob.
  180. Angel, Albert J., Hierarchical authentication process and system for financial transactions.
  181. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  182. Jones,Robert L.; Moore,Hannah J., Identification document with integrated circuit and antenna in a layered document structure.
  183. Blancas,Irma; Krimmel,Karl F., Identification of an individual using a multiple purpose card.
  184. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  185. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  186. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  187. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  188. Kon,Masashi; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Watanabe,Hideaki, Information processing apparatus, information processing method, and program providing medium.
  189. Nishio, Masahiro, Information processing apparatus, information processing method, and program therefor.
  190. Sekiya, Shuichi; Hanaki, Naofumi; Watanabe, Keitarou; Kato, Shinichi; Kamino, Itsuki, Information processing apparatus, program, storage medium and information processing system.
  191. Sekiya, Shuichi; Hanaki, Naofumi; Watanabe, Keitarou; Kato, Shinichi; Kamino, Itsuki, Information processing apparatus, program, storage medium and information processing system.
  192. Ishiguro,Ryuji; Osawa,Yoshitomo; Oishi,Tateo; Asano,Tomoyuki; Mitsuzawa,Atsushi, Information processing system and method for distributing encrypted message data.
  193. Guthery, Scott B., Integrated circuit card with identity authentication table and authorization tables defining access rights based on Boolean expressions of authenticated identities.
  194. Guthery,Scott B., Integrated circuit devices with steganographic authentication and steganographic authentication methods.
  195. Guthery, Scott B., Integrated circuit devices with steganographic authentication, and steganographic authentication methods.
  196. Guthery, Scott B., Integrated circuit devices with steganographic authentication, and steganographic authentication methods.
  197. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  198. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  199. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Iris scan biometrics on a payment device.
  200. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  201. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  202. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  203. Fletcher,Christopher John, Limited use PIN system and method.
  204. Fletcher,Christopher John, Limited use pin system and method.
  205. Fletcher,Christopher John, Limited use pin system and method.
  206. Bonalle, David S; Isenberg, Susan E; Saunders, Peter D, Limiting access to account information during a radio frequency transaction.
  207. de Jong,Eduard, Linking of virtual methods.
  208. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  209. Robertson, Philip A.; Whitley, Chris; Siew, Simon Huang Seng; Weston, Timothy M.; Turner, Victor C.; Ringeman, Ken; Hampson, Greg K.; Aiken, Tyrone; Carapelli, Giovanni; Carozzini, Giorgio, Local zone security architecture for retail environments.
  210. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  211. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  212. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  213. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  214. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  215. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  216. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  217. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  218. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  219. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  220. Haney, Richard D., Location sharing group for services provision.
  221. Haney, Richard D., Location sharing group map management.
  222. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  223. Chen, Ann-Pin, Loyalty file structure for smart card.
  224. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  225. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  226. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  227. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  228. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  229. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  230. Betser, Yoram; Kushnarenko, Alexander; Dadashev, Oleg, Measuring and controlling current consumption and output current of charge pumps.
  231. Polansky, Yan; Lavan, Avi, Memory array programming circuit and a method for using the circuit.
  232. Skelding, Dori K.; Porter, David, Metal transaction device.
  233. Skelding, Dori K.; Porter, David, Metal transaction device.
  234. Skelding, Dori K.; Reinhard, Walter Brent, Metal transaction device with gem-like surface.
  235. Skelding, Dori K.; Reinhard, Walter Brent, Metal transaction device with gem-like surface.
  236. Lee Alson ; Sloan Jerry F. ; Wentzein Irwin H., Method and apparatus for acquiring access using a fast smart card transaction.
  237. Lee Alson A ; Sloan Jerry ; Wentzein Irv H., Method and apparatus for acquiring access using a smart card.
  238. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  239. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  240. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  241. O'Malley, Anne; Ray, Pragnesh; Reiter, Eve; Saunders, Peter; Teodosic, Stefan; Tze, Dennis, Method and apparatus for enrolling with multiple transaction environments.
  242. Cihula, Joseph F., Method and apparatus for establishing trust in smart card readers.
  243. de Jong,Eduard K., Method and apparatus for installing an application onto a smart card.
  244. de Jong,Eduard K., Method and apparatus for processing an application identifier from a smart card.
  245. de Jong, Eduard, Method and apparatus for protecting against side channel attacks against personal identification numbers.
  246. de Jong,Eduard K., Method and apparatus for providing an application on a smart card.
  247. Okaue,Takumi, Method and apparatus for recording/playing back information.
  248. de Jong,Eduard K., Method and apparatus for selecting a desired application on a smart card.
  249. Chen, Liqun; Proudler, Graeme John, Method and apparatus for using a secret in a distributed computing system.
  250. O'Donoghue, Niall, Method and device for authenticating a user in a variety of contexts.
  251. Sj철blom,Hans, Method and device for performing electronic transactions.
  252. Beenau,Blayn W.; Bonalle,David S.; Fields,Seth W.; Gray,William J.; Larkin,Carl; Montgomery,Joshua L.; Saunders,Peter D., Method and system for DNA recognition biometrics on a fob.
  253. Bonalle, David S.; Larkin, Carl; Saunders, Peter D., Method and system for a travel-related multi-function fob.
  254. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  255. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  256. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  257. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Method and system for auditory recognition biometrics on a FOB.
  258. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  259. Kawan, Joseph C.; Chu, Ronald King-Hang; Golvin, Charles; Tompkins, Peter, Method and system for controlling certificate based open payment transactions.
  260. Kawan, Joseph C.; Chu, Ronald King-Hang; Golvin, Charles; Tompkins, Peter, Method and system for controlling certificate based open payment transactions.
  261. Kawan, Joseph C.; King-Hang Chu, Ronald; Golvin, Charles; Tompkins, Peter, Method and system for controlling certificate based open payment transactions.
  262. Cleary, Michael J.; Clifton, David A.; Ilijasic, Dean; Cohen, David C.; Rodgers, Kristine K., Method and system for distribution of unactivated bank account cards.
  263. Cleary, Michael; Clifton, David; Ilijasic, Dean; Cohen, David; Rodgers, Kristine, Method and system for distribution of unactivated bank account cards.
  264. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  265. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  266. Pletz, Tracy M.; Seidel, Howard C.; Rochford, Joseph, Method and system for implementing a card product with multiple customized relationships.
  267. Pletz, Tracy M.; Seidel, Howard C.; Rochford, Joseph, Method and system for implementing a card product with multiple customized relationships.
  268. Pletz, Tracy M.; Seidel, Howard C.; Rochford, Joseph, Method and system for implementing a card product with multiple customized relationships.
  269. Pletz, Tracy M.; Seidel, Howard C.; Rochford, Joseph, Method and system for implementing a card product with multiple customized relationships.
  270. Pletz,Tracy M.; Seidel,Howard C.; Rochford,Joseph, Method and system for implementing a card product with multiple customized relationships.
  271. Parkinson, Steven William; Kwan, Nang Kon, Method and system for issuing a kill sequence for a token.
  272. Bonalle,David S.; Salow,Glen, Method and system for keystroke scan recognition biometrics on a smartcard.
  273. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  274. Spielmann, Craig; Hutter, Maria; Klein, Joel; Singhani, Naresh, Method and system for managing risk.
  275. Spielmann,Craig; Hutter,Maria; Klein,Joel; Singhani,Naresh, Method and system for managing risk.
  276. Spielmann,Craig; Hutter,Maria; Klein,Joel; Singhani,Naresh, Method and system for managing risks.
  277. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Method and system for proffering multiple biometrics for use with a FOB.
  278. Noles, Michael K., Method and system for providing flexible financing.
  279. Noles, Michael K., Method and system for providing flexible financing.
  280. Perlman, Radia J.; Hanna, Stephen R., Method and system for providing limited access privileges with an untrusted terminal.
  281. Ahmad, Farhan, Method and system for providing pre-approved targeted products.
  282. Lee, Byung-rae; Chang, Kyung-ah, Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains.
  283. Barnes, Brian T.; Bonalle, David S.; Saunders, Peter D., Method and system for resource management and evaluation.
  284. Goldstein Gary Allan ; Sumner Terence Edward, Method and system for securely transferring a data set in a data communications system.
  285. Beenau,Blayn W.; Bonalle,David S.; Fields,Seth W.; Gray,William J.; Larkin,Carl; Montgomery,Joshua L.; Saunders,Peter D., Method and system for smellprint recognition biometrics on a fob.
  286. Bonalle,David S.; Salow,Glen, Method and system for smellprint recognition biometrics on a smartcard.
  287. Kawan, Joseph C., Method and system for tracking smart card loyalty points.
  288. Barnes, Brian; Bonalle, David S.; Saunders, Peter D., Method and system for tracking user performance.
  289. Barnes,Brian; Bonalle,David S.; Saunders,Peter D., Method and system for tracking user performance.
  290. Bonalle, David S.; Salow, Glen, Method and system for vascular scan recognition with a smartcard.
  291. De Jong, Eduard Karel, Method and system of communicating devices, and devices therefor, with protected data transfer.
  292. Eichholz, Jan; Meister, Gisela, Method for authenticating a portable data carrier.
  293. Bonalle,David S.; Salow,Glen, Method for biometric security using a smartcard.
  294. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  295. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  296. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  297. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  298. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  299. Cataldo, Christophe; Gabriele, Sophie; Mani, Christophe; Romain, Fabrice, Method for managing the dialogue between an item of equipment and at least one multi-application object.
  300. de Jong,Eduard, Method for private personal identification number management.
  301. Maayan, Eduardo; Eitan, Boaz; Lann, Ameet, Method for programming a reference cell.
  302. Kiiveri, Antti, Method for protecting electronic device, and electronic device.
  303. Pathmasuntharan,Jaya Shankar; Tan,Cheng Lin, Method for recovering information stored in a smart card.
  304. Raff, Christopher; Comstock, Ken, Method for reducing purchase time.
  305. Bonalle,David S.; Salow,Glen, Method for registering a biometric for use with a smartcard.
  306. Pailles, Jean-Claude; Venries, Fabien; Bruyere, Guillaume; Frey, Alexandre, Method for securing a telecommunications terminal which is connected to a terminal user identification module.
  307. Horiguchi,Akiko; Usami,Mitsuo; Ohki,Masaru, Method for the determination of soundness of a sheet-shaped medium, and method for the verification of data of a sheet-shaped medium.
  308. Burgard Francine,FRX, Method for the identification of an integrated circuit and associated device.
  309. Korst, Uwe K. H.; Wanko, Clemens, Method for the secure handling of monetary or value units using prepaid data carriers.
  310. Lauper,Karin Busch; Etique,Pierre Alain; Cantini,Renato, Method for verifying in a mobile device the authenticity of electronic certificates issued by a certification authority and corresponding identification module.
  311. Tarik Slassi FR, Method of authenticating a personal code of a user of an integrated circuit card.
  312. Pieterse Rob,NLX ; Rombaut Willem,NLX, Method of debiting an electronic payment means.
  313. Eitan, Boaz; Shainsky, Natalie, Method, circuit and device for disturb-control of programming nonvolatile memory cells by hot-hole injection (HHI) and by channel hot-electron (CHE) injection.
  314. Shappir,Assaf; Eisen,Shai, Method, circuit and systems for erasing one or more non-volatile memory cells.
  315. M철dl,Albert; Stephan,Elmar; M체ller,Robert, Method, data carrier and system for authentication of a user and a terminal.
  316. Cohen, Guy; Polansky, Yan, Method, system and circuit for programming a non-volatile memory array.
  317. Peart, Lee J.; Saunders, Peter D., Methods and apparatus for a secure proximity integrated circuit card transactions.
  318. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  319. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  320. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  321. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  322. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  323. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  324. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  325. Bishop,Fred Alan; Glazer,Elliot Harold; Gorgol,Zygmunt Steven; Hohle,William G.; Johnson,Michael G.; Johnstone,David E; Lake,Walter Donald; Royer,Coby; Simkin,Marvin; Swift,Nick; White,Dirk B; Bennett,Russell, Methods and apparatus for conducting electronic transactions.
  326. Bishop,Fred; Bonalle,David S; Salow,Glen, Methods and apparatus for conducting electronic transactions using biometrics.
  327. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  328. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  329. Douglas C. Barlow, Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment.
  330. Ho, Shuk Yee; Fu, Christina; Kannan, Chandrasekar; Kwan, Nang Kon, Methods and system for a key recovery plan.
  331. Haney, Richard D., Methods and systems for annotating target locations.
  332. Lord, Robert; Parkinson, Steven W.; Relyea, Robert, Methods and systems for assigning roles on a token.
  333. Parkinson, Steven William; Lord, Robert B., Methods and systems for entropy collection for server-side key generation.
  334. Fu, Christina; Kwan, Nang Kon; Parkinson, Steven William; Relyea, Robert, Methods and systems for key recovery for a token.
  335. Kwan, Nang Kon; Kannan, Chandrasekar; Ho, Shuk Yee; Parkinson, Steven William, Methods and systems for managing identity management security domains.
  336. Relyea, Robert, Methods and systems for nonce generation in a token.
  337. Relyea, Robert, Methods and systems for providing data objects on a token.
  338. Relyea, Robert, Methods and systems for providing data objects on a token.
  339. Parkinson, Steven William, Methods and systems for remote password reset using an authentication credential managed by a third party.
  340. Fu, Christina; Parkinson, Steven William; Kwan, Nang Kon, Methods and systems for secure key delivery.
  341. Relyea, Robert, Methods and systems for secure shared smartcard access.
  342. Fu, Christina; Parkinson, Steven William; Kwan, Nang Kon, Methods and systems for server-side key generation.
  343. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  344. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  345. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  346. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  347. Davis,Bruce L.; Rhoads,Geoffrey B., Methods and tangible objects employing machine readable data.
  348. Skelding, Dori K.; Reinhard, Walter Brent; Mann, III, William Frederick, Methods for personalizing multi-layer transaction cards.
  349. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  350. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  351. Phelan, III,Frank; Phelan,Patricia, Money card system, method and apparatus.
  352. Phelan,Patricia, Money order device with identity verification and method.
  353. Goldstein Theodore Charles ; Ziegler Jonathan B., Multi-venue ticketing using smart cards.
  354. Hefner, Stephen P.; Fujita, Kazuhiro, Multifunction, direct thermal recording material.
  355. Hirka, Jeffrey L.; Fellner, Debra C.; Fox, Steven; Knackstedt, Lee, Multiple account advanced payment card and method of routing card transactions.
  356. Hirka, Jeffrey L.; Fellner, Debra C.; Fox, Steven; Knackstedt, Lee, Multiple account advanced payment card and method of routing card transactions.
  357. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  358. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  359. Zhu, Yinjun, Multiple location retrieval function (LRF) network having location continuity.
  360. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  361. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  362. Sullivan, Kevin, Mutual fund card method and system.
  363. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  364. Eitan, Boaz; Shainsky, Natalie, NROM non-volatile memory and mode of operation.
  365. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  366. Jakobsson, Bjorn Markus; Schnorr, Claus Peter, Non malleable encryption method and apparatus using key-encryption keys and digital signature.
  367. Eitan,Boaz, Non-volatile memory cell and non-volatile memory devices.
  368. Lusky,Eli; Eitan,Boaz; Cohen,Guy; Maayan,Eduardo, Operating array cells with matched reference cells.
  369. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  370. Blossom, George, Optically encoded card and system and method for using.
  371. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  372. de Jong,Eduard, Optimized representation of data type information in program verification.
  373. de Jong,Eduard, Ordering program data for loading on a device.
  374. Relyea, Robert, Organizing an extensible table for storing cryptographic objects.
  375. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination.
  376. Field,Manning R.; Reinhard,Walter Brent, Overlapping transaction device.
  377. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, and program providing medium.
  378. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  379. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  380. Kung, Hsiang-Tsung, Personal authentication device and system and method thereof.
  381. Okada,Souichi; Hasebe,Takayuki; Kamada,Jun; Hayashi,Takehiko, Personal identification terminal and method having selectable identification means or identification levels.
  382. Kwok, Thomas Y.; Mok, Lawrence S., Personal website for electronic commerce on a smart Java card with multiple security check points.
  383. Patel, Ameet; Holme, Jennifer; Caiazzo, Anthony, Personalized interactive network architecture.
  384. Patel,Ameet; Holme,Jennifer; Caiazzo,Anthony, Personalized interactive network architecture.
  385. Patel, Ameet; Holme, Jennifer; Caiazzo, Anthony, Personalized interactive network with multiple channels coupled to integrated knowledge management system.
  386. Field,Manning R.; Reinhard,Walter Brent, Pivoting transaction device.
  387. Brown, Michael Kenneth; Adams, Neil Patrick; Little, Herbert Anthony, Policy proxy.
  388. Brown, Michael Kenneth; Adams, Neil Patrick; Little, Herbert Anthony, Policy proxy.
  389. Davis Walter Lee ; LaVell Jeff ; Gutman Jose, Portable 1-way wireless financial messaging unit.
  390. Davis Walter Lee ; LaVell Jeff ; Leonardo Victoria A. ; Herold Barry W., Portable 2-way wireless financial messaging unit.
  391. Hammad, Ayman; Faith, Patrick, Portable consumer device configured to generate dynamic authentication data.
  392. Hammad, Ayman; Faith, Patrick, Portable consumer device configured to generate dynamic authentication data.
  393. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  394. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  395. Wang, Ynjiun Paul, Portable electronic charge and authorization devices and methods therefor.
  396. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  397. Ritter, Rudolf, Portable radio receiver with an identification module.
  398. Phillips, Simon, Pre-authenticated identification token.
  399. Phillips, Simon, Pre-authenticated identification token.
  400. Phillips, Simon, Pre-authenticated identification token.
  401. Vollmer, Nicole Milne; Lewis, Lance; Webb, Elizabeth Gwen, Prepaid transaction card activation system and method.
  402. Vollmer, Nicole Milne; Lewis, Lance; Webb, Elizabeth Gwen, Prepaid transaction card activation system and method.
  403. Vollmer, Nicole Milne; Lewis, Lance; Webb, Elizabeth Gwen, Prepaid transaction card activation system and method.
  404. Vollmer, Nicole Milne; Lewis, Lance; Webb, Elizabeth Gwen, Prepaid transaction card activation system and method.
  405. Campinos Arnaldo,FRX ; Gregoire Louis,FRX ; Vigneron Jean-Marie,FRX, Process for data certification by scrambling and certification system using such a process.
  406. Campinos Arnaldo,FRX ; Fischer Jean-Bernard,FRX, Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process.
  407. Bhattacharya, Ashmit; Bower, Bruce; Briggs, Gary; Gendron, Marc; Grove, Steve; Henson, Tina; Thomas, Parker, Processing value-ascertainable items.
  408. Kwan, Nang Kon; Kannan, Chandrasekar; Ho, Shuk Yee; Parkinson, Steven William; Fu, Christina, Profile framework for token processing system.
  409. Lusky,Eli; Bloom,Ilan; Shappir,Assaf; Eitan,Boaz, Protection of NROM devices from charge damage.
  410. Tallent, Jr., Guy S.; Donfried, Paul A.; Hicks, George M. (Mack); Lee, Elizabeth, Provision of authorization and other services.
  411. Wong, Shek Duncan; Poon, Jack Sik Ching; Yum, Tak Shing Peter, Proximity based biometric identification systems and methods.
  412. Xia, Sharon (Hong); Brombaugh, Dan, Proxy server security token authorization.
  413. Rhodes, Jeffrey C.; Luo, Tong; Burton, Victor; Conner, Christine, Public safety access point (PSAP) selection for E911 wireless callers in a GSM type system.
  414. Bonalle, David S.; Freud, Aliza; Nanton, Jason; Fitzmaurice Reilly, Mary Ann; Sharp, Ray, Public/private dual card system and method.
  415. Bonalle,David S.; Freud,Aliza; Nanton,Jason E.; Reilly,Mary Ann Fitzmaurice; Sharp,Ray, Public/private dual card system and method.
  416. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  417. Biship,Fred; Saunders,Peter D, RF payment via a mobile device.
  418. Bishop, Fred; Saunders, Peter D., RF payment via a mobile device.
  419. Bonalle, David S.; Fehlhaber, Jeff; Saunders, Peter D., RF transaction device.
  420. Saunders, Peter D, RF transaction system and method for storing user personal data.
  421. Bishop, Fred, RF transactions using a wireless reader grid.
  422. Kawamura, Harumi; Shima, Hisato, Radio communication system, radio communication control apparatus, radio communication control method, recording medium, and computer program.
  423. Bishop, Fred; Saunders, Peter D, Recurrent billing maintenance with radio frequency payment devices.
  424. Parkinson, Steven William, Reducing a size of a security-related data object stored on a token.
  425. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  426. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  427. Berardi, Michael J.; Bliman, Michal; Bonalle, David; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Reload protocol at a transaction processing entity.
  428. Holtzman, Michael; Pinto, Yosi, Removable computer with mass storage.
  429. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  430. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  431. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  432. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  433. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  434. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  435. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  436. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  437. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  438. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  439. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  440. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  441. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  442. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  443. Eitan, Boaz, Secondary injection for NROM.
  444. Saito, Tamio; Drizin, Wayne; Aida, Takashi, Secure biometric verification of identity.
  445. Saito,Tamio; Drizin,Wayne; Aida,Takashi, Secure biometric verification of identity.
  446. Aikawa,Makoto; Takami,Yutaka; Fukushima,Shinichiro, Secure data transfer method of using a smart card.
  447. Yin, Fenglin, Secure delivery of trust credentials.
  448. Takekawa, Hiroshi; Takayama, Hisashi; Naka, Ken, Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method.
  449. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  450. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  451. Dischamp, Paul; Giraud, Christophe, Secure electronic entity for time certification.
  452. Seki,Yuji; Kawasaki,Yusuke; Hashimoto,Shigeru; Yanagi,Ryoichi, Secure encryption processor with tamper protection.
  453. England,Paul; Lampson,Butler W., Secure execution of program code.
  454. Tran Robin T. ; Simonich Christopher E., Secure general purpose input/output pins for protecting computer system resources.
  455. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  456. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  457. De Jong, Eduard Karel, Secure photo carrying identification device, as well as means and method for authenticating such an identification device.
  458. De Jong,Eduard Karel, Secure photo carrying identification device, as well as means and method for authenticating such an identification device.
  459. Doljack, Frank A., Secure system for printing authenticating digital signatures.
  460. Sciupac, Louis H., Secure transactions with passive storage media.
  461. Sciupac, Louis H., Secure transactions with passive storage media.
  462. Bonalle, David S; Isenberg, Susan E; Saunders, Peter D; Williamson, John R, Securing RF transactions using a transactions counter.
  463. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; Williamson, John R., Securing a transaction between a transponder and a reader.
  464. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; Williamson, John R.; Mayers, Alexandra, Securing a transaction between a transponder and a reader.
  465. Blossom, George, Selectable multi-purpose card.
  466. Blossom,George, Selectable multi-purpose card.
  467. Blossom,George, Selectable multi-purpose card.
  468. Blossom,George, Selectable multi-purpose card.
  469. Novak, Mark F.; Thom, Stefan; Tor, Yair; Efron, Alexey; Ortal, Amos, Self regulation of the subject of attestation.
  470. Ebara, Hiromi; Kawano, Shinji; Nakabe, Futoshi, Semiconductor memory card, and program for controlling the same.
  471. Fu, Christina; Parkinson, Steven W.; Kwan, Nang Kon, Server-side key generation.
  472. Horiguchi,Akiko; Usami,Mitsuo; Ohki,Masaru, Service system, information processing system and interrogator.
  473. Horiguchi,Akiko; Usami,Mitsuo; Ohki,Masaru, Sheet-shaped medium, method and apparatus for determination of genuineness or counterfeitness of the same, and apparatus for issuing certificate.
  474. de Jong, Eduard, Signing program data payload sequence in program loading.
  475. de Jong, Eduard, Signing program data payload sequence in program loading.
  476. Girard, Pierre; Choukri, Hamid, Simplified smartcard personalization method, and corresponding device.
  477. Kuo, Chih Jen; Li, Miao; Luo, Wei, Smart card enabled secure computing environment system.
  478. Saito, Tamio, Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport.
  479. Beals, William Michael; Goupil, Hervé, Smart card interface.
  480. Teicher Mordechai,ILX ; Townend Robin,GBX, Smart card pin system, card, and reader.
  481. Shahindoust, Amir, Smart card printing.
  482. Gardiner, Michael; Canzi, Adriano, Smart card system comprising a card and a carrier.
  483. Sarat Jean-Marc, Smart card system for use with peripheral devices.
  484. Gardiner, Michael; Canzi, Adriano, Smart card systems and methods utilizing multiple ATR messages.
  485. Gardiner, Michael; Canzi, Adriano, Smart card systems comprising a card and a carrier.
  486. Sarat, Jean-Marc, Smart card which operates with the USB protocol.
  487. Sarat,Jean Marc, Smart card which operates with the USB protocol.
  488. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  489. Lord, Robert B.; Parkinson, Steven William, Smartcard formation with authentication.
  490. Parkinson, Steven William; Lord, Robert B., Smartcard formation with authentication keys.
  491. Gray, William J; Hohle, William G; Larkin, Carl; Peart, Lee J, Smartcard internet authorization system.
  492. Gray,William J.; Hohle,William G.; Larkin,Carl; Peart,Lee J., Smartcard internet authorization system.
  493. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using auditory scan recognition.
  494. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using facial scan recognition.
  495. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using fingerprint recognition.
  496. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using iris scan recognition.
  497. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using retinal scan recognition.
  498. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using signature recognition.
  499. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using smellprint recognition.
  500. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using voiceprint recognition.
  501. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  502. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  503. Poremba, Todd, Special emergency call treatment based on the caller.
  504. Slater,Kim Michele, Sponsor funded stored value card.
  505. Guthery,Scott B., Steganographic authentication.
  506. Chou, Chi-Yang; Chou, Pei-Yen; Lin, Yeu-Chung, Storage device management systems and methods.
  507. Knackstedt, Lee; Rau, Scott, Stored value card provided with merchandise as rebate.
  508. Relyea, Robert, Strong encryption.
  509. Rager, Kent D.; Debates, Scott P.; Voss, Joel D., Subsidy lock enabled handset device with asymmetric verification unlocking control and method thereof.
  510. De Jong,Eduard Karel, Superposition of data over voice.
  511. De Jong,Eduard Karel, Superposition of data over voice.
  512. Sullivan,Kevin, System and method for a card benefit program providing benefits to program members based on program performance.
  513. Sullivan,Kevin, System and method for a card payment program providing mutual benefits to card issuers and cardholders based on financial performance.
  514. Hurry, Simon; Aabye, Christian, System and method for account identifier obfuscation.
  515. Sullivan, Kevin M., System and method for administering a brokerage rebate card program.
  516. Berardi,Michael J.; Bliman,Michal; Bonalle,David; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Perry,Trevor J.; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit;, System and method for assigning a funding source for a radio frequency identification device.
  517. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  518. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  519. Davida, George I.; Frankel, Yair, System and method for authenticated and privacy preserving biometric identification systems.
  520. Bishop,Fred; Saunders,Peter D, System and method for authenticating a RF transaction using a transaction account routing number.
  521. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  522. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  523. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  524. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  525. Decime,Jerry, System and method for authenticating digital content.
  526. Matthews, Bradley Owen; Bishop, Fred, System and method for automatic reconciliation of transaction account spend.
  527. Boyle, Kevin; Maistre, Marty, System and method for card processing with automated payment of club, merchant, and service provider fees.
  528. Boyle,Kevin; Maistre,Marty, System and method for card processing with automated payment of club, merchant, and service provider fees.
  529. Davis, Kim C., System and method for carrying out secure transactions.
  530. Butler, Sheila S.; Schwarz, Jr., Charles E., System and method for crediting loyalty program points and providing loyalty rewards by use of an electronic tag.
  531. Alarcon-Luther, Melissa; Fellner, Debra C.; Sabloff, Barry M.; Schell, III, Frank Charles; Mesrobian, Peter Mark; Griffin, Ginger; Dorion, Michelle; Karris, Gus, System and method for currency selectable stored value instrument.
  532. Gougeon,Dominique; Le Crom,Serge; Sheets,John F., System and method for downloading of files to a secure terminal.
  533. Bonalle, David S.; Larkin, Carl; Saunders, Peter D., System and method for dynamic fob synchronization and personalization.
  534. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Saunders, Peter D., System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions.
  535. Brown, Michael K.; Adams, Neil P.; Little, Herbert A., System and method for encrypted smart card PIN entry.
  536. Brown, Michael K.; Adams, Neil P.; Little, Herbert A., System and method for encrypted smart card pin entry.
  537. Brown, Michael Kenneth; Adams, Neil Patrick; Little, Herbert Anthony, System and method for encrypted smart card pin entry.
  538. Baranowski, James A., System and method for enhanced RFID instrument security.
  539. Baranowski, James A., System and method for enhanced RFID instrument security.
  540. Saunders, Peter D, System and method for facilitating a transaction using a revolving use account associated with a primary account.
  541. Sanders, Shelley F.; Bowers, Theodore, System and method for funding a collective account.
  542. Schwarz, Jr., Charles E., System and method for funding a collective account by use of an electronic tag.
  543. Schwarz, Jr., Charles E., System and method for funding a collective account by use of an electronic tag.
  544. Schwarz, Jr.,Charles E., System and method for funding a collective account by use of an electronic tag.
  545. Schwarz, Jr.,Charles E., System and method for funding a collective account by use of an electronic tag.
  546. Schwarz, Jr.,Charles E., System and method for funding a collective account by use of an electronic tag.
  547. Schwarz, Jr.,Charles E., System and method for funding a collective account by use of an electronic tag.
  548. Peart, Lee J; Saunders, Peter D, System and method for generating an unpredictable number using a seeded algorithm.
  549. Taylor, Robert Cameron; Pilarcik, Jeffrey J., System and method for granting promotional rewards to both customers and non-customers.
  550. Taylor, Robert Cameron; Pilarcik, Jeffrey J., System and method for granting promotional rewards to both customers and non-customers.
  551. Taylor, Robert Cameron; Pilarcik, Jeffrey J., System and method for granting promotional rewards to both customers and non-customers.
  552. Taylor, Robert Cameron; Pilarcik, Jeffrey J.; Ley, Paula M., System and method for granting promotional rewards to both customers and non-customers.
  553. Strock, Bradley R.; Hooper, Lynn; Glavin, Eugene M.; Bressler, Beth L., System and method for granting promotional rewards to credit account holders.
  554. Strock, Bradley R.; Hooper, Lynn; Glavin, Eugene M.; Bressler, Beth L., System and method for granting promotional rewards to credit account holders.
  555. Sheley, William S., System and method for granting promotional rewards to financial account holders.
  556. Alve,Jukka; Kangas,Mauri, System and method for key distribution and network connectivity.
  557. Gasparini, Louis A; Harris, William H, System and method for making accessible a set of services to users.
  558. Saunders, Peter D, System and method for managing a transaction protocol.
  559. Borgia,Evelyn; Miller,Jodi; De Gottal,Graham; O'Connor,Christine, System and method for managing global risk.
  560. Breslin, Jodi; Borgia, Evelyn; de Gottal, Graham, System and method for managing risks associated with outside service providers.
  561. Faenza, Jr.,William J.; Lasch,Ellen; Saunders,Peter D.; Webb,Lisa, System and method for manufacturing a punch-out RFID transaction device.
  562. Saunders, Peter D., System and method for manufacturing a punch-out RFID transaction device.
  563. Saunders, Peter D., System and method for manufacturing a punch-out RFID transaction device.
  564. Webb, Russ; Blight, David, System and method for monitoring a security state of an electronic device.
  565. Feingold, Vincent, System and method for multi-dimensional risk analysis.
  566. Das, Jayanta, System and method for offering risk-based interest rates in a credit instrument.
  567. Das, Jayanta, System and method for offering risk-based interest rates in a credit instutment.
  568. Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
  569. Giordano, Joseph A.; Travis, Tory N.; Garbarino, Louis C., System and method for processing financial transactions.
  570. Giordano, Joseph; Murray, Jack, System and method for processing financial transactions.
  571. Sorem, Steve, System and method for processing transactions.
  572. Bonalle,David S; Francolini,Gail A; Ing,Samantha S; Kunian,Danielle; Nulle,Danielle R, System and method for providing and RFID transaction device.
  573. Hicks, Mack; Seiler, Regina; Tallent, Guy; Kupres, Kristin; Freudenstein, Allen, System and method for providing certification-related and other services.
  574. McKenney, Mary Keenan; Walch, Markus; Baker, III, Walter; Storch, Oliver; Landsmann, Peter Josef Eduard; Jetter, William John; Wong, Margaret Miu-Ling; Cameron, William Isaac, System and method for providing payment services in electronic commerce.
  575. Hamilton, Stacy M.; Rossiter, Janet L., System and method for providing promotional pricing.
  576. Blight, David C.; Wong, Yoon Kean, System and method for providing secured access to mobile devices.
  577. Hawkins, Jeffrey C.; Cousineau, Bernard Paul; Blight, David C.; Wong, Yoon Kean, System and method for providing secured access to mobile devices.
  578. Bishop, Fred; Neemann, Trey; Armes, David, System and method for reassociating an account number to another transaction account.
  579. Saunders,Peter D., System and method for remotely initializing a RF transaction.
  580. Husain, Mohammad; Desai, Manish, System and method for secure authentication of a subscriber of network services.
  581. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  582. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  583. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  584. Saunders, Peter D; Barnes, Brian T, System and method for secure transactions manageable by a transaction account provider.
  585. Graves, Phillip Craig; Smith, Merrill Brooks, System and method for securely authorizing and distributing stored-value card data.
  586. Saunders, Peter, System and method for securing a recurrent billing transaction.
  587. Peart, Lee J.; Saunders, Peter D., System and method for securing sensitive information during completion of a transaction.
  588. Gardiner, Michael; Canzi, Adriano, System and method for selectively initiating biometric authentication for enhanced security of access control transactions.
  589. Tushie, David R.; Haeuser, William W., System and method for smart card personalization.
  590. Zeltzer, Paul M.; Kletter, Richard; Donovan, Mark C.; Stafford, Jed; Feinleib, David; Kramer, legal representative, Scott, System and method for storing information on a wireless device.
  591. Miller, Lawrence R.; Tallent, Jr., Guy S.; Ahmed, Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  592. Rau, Scott W.; Bertetti, Scott Philip; Beechum, Jr., Gerald A., System and method for transponder-enabled account transactions.
  593. Rau, Scott W.; Bertetti, Scott Philp; Beechum, Jr., Gerald A., System and method for transponder-enabled account transactions.
  594. Rau, Scott W.; Bertetti, Scott Philp; Beechum, Jr., Gerald A., System and method for transponder-enabled account transactions.
  595. Pathmasuntharan, Jaya Shankar; Tan, Cheng Lin, System and method for using a smart card.
  596. Fellner,Debra C., System and method for using a stored value account having subaccount feature.
  597. Musgrave, Clyde; Cambier, James L., System and method of fast biometric database searching using digital certificates.
  598. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  599. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  600. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  601. Beenau,Blayn W.; Bonalle,David S.; Fields,Seth W.; Gray,William J.; Larkin,Carl; Montgomery,Joshua L.; Saunders,Peter D., System for biometric security using a FOB.
  602. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  603. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  604. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  605. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  606. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  607. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  608. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  609. de Jong,Eduard, System for communicating program data between a first device and a second device.
  610. Breck, Lydia; Zoob, Jessica; Salow, Glen; Bishop, Fred; Schwarz, William; Glazer, Elliot; Johnstone, David; Cunningham, Katie; Nambiar, Anant; Belt, Jan Nunney; Wittwer, Martin; Armes, David; Chow, Christina, System for facilitating a transaction.
  611. Breck, Lydia; Zoob, Jessica; Salow, Glen; Bishop, Fred; Schwarz, William; Glazer, Elliot; Johnstone, David; Cunningham, Katie; Nambiar, Anant; Belt, Jan Nunney; Wittwer, Martin; Armes, David; Chow, Christina, System for facilitating a transaction.
  612. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  613. Coppersmith,Don; Greengard,Claude A.; Tresser,Charles P.; Wu,Chai Wah, System for protection of goods against counterfeiting.
  614. Weigel, Douglas, System for remote signature writing.
  615. Nelsen, David A., Systems and methods for electronic delivery of stored value.
  616. Smith, Merrill Brooks; Graves, Phillip Craig; Chakiris, Phil M, Systems and methods for electronic device point-of-sale activation.
  617. Bonalle, David; Bliman, Michal; Saunders, Peter D.; Williamson, John Robert, Systems and methods for managing account information lifecycles.
  618. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  619. Bishop, Fred; Saunders, Peter D., Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia.
  620. Beenau,Blayn W.; Bliman,Michal; Bonalle,David S.; Montgomery,Joshua L.; Saunders,Peter D.; Williamson,John R., Systems and methods for managing multiple accounts on a RF transaction instrument.
  621. Bishop, Fred; Saunders, Peter D, Systems and methods for non-traditional payment using biometric data.
  622. Beals, William Michael; Fischer, Nicolas; Ellis, Benjamin Brian; Duval, Gregory, Systems and methods for performing transport I/O.
  623. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  624. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  625. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  626. Bonalle,David S; Fehlhaber,Jeff; Saunders,Peter D, Systems and methods for providing a RF transaction device for use in a private label transaction.
  627. Beenau,Blayn W.; Bliman,Michal; Bonalle,David S.; Montgomery,Joshua L.; Saunders,Peter D.; Williamson,John R., Systems and methods for providing a RF transaction device operable to store multiple distinct accounts.
  628. Bonalle,David S.; Fehlhaber,Jeff; Saunders,Peter D., Systems and methods for providing a RF transaction device operable to store multiple distinct calling card accounts.
  629. Skelding, Dori K., Systems and methods for providing an adaptable transponder device.
  630. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  631. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  632. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  633. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  634. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  635. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  636. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  637. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  638. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  639. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  640. Dewan, Prashant; Sengupta, Uttam; Savagaonkar, Uday R.; Chhabra, Siddhartha; Durham, David; Kang, Xiaozhu, Techniques for enforcing a depth order policy for graphics in a display scene.
  641. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for implementing security on a small footprint device using a context barrier.
  642. Susser,Joshua; Butler,Mitchel B.; Streich,Andy, Techniques for implementing security on a small footprint device using a context barrier.
  643. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier in a small footprint device using global data structures.
  644. Susser,Joshua; Butler,Mitchel B.; Streich,Andy, Techniques for permitting access across a context barrier in a small footprint device using global data structures.
  645. Susser,Joshua; Butler,Mitchel B.; Streich,Andy, Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces.
  646. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier on a small footprint device using an entry point object.
  647. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier on a small footprint device using an entry point object.
  648. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges.
  649. Haney, Richard D., Techniques for sharing position data between first and second devices.
  650. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  651. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  652. Yamamoto, Masaaki; Hiramatsu, Yoshiaki; Washio, Satoshi, Terminal communication system.
  653. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  654. Relyea, Robert; Lord, Robert B.; Parkinson, Steven William, Time-based function back-off.
  655. Lord, Robert B.; Relyea, Robert; Kwan, Nang Kon, Token Registration.
  656. Lord, Robert, Token recycling.
  657. Hammad, Ayman, Track data encryption.
  658. Hammad, Ayman, Track data encryption.
  659. Hammad, Ayman, Track data encryption.
  660. Haney, Richard D., Tracking proximity of services provider to services consumer.
  661. Morrill Webb, Lisa Ann; Faenza, Jr., William J., Transaction card.
  662. Morrill-Webb, Lisa Ann; Faenza, Jr., William J., Transaction card.
  663. Dulin, Charles; Solo, David; Hicks, Mack; Nepomuceno, Larry; Stirland, Mark, Transaction coordinator for digital certificate validation and other services.
  664. Field, Manning R.; Reinhard, Walter Brent, Transaction device.
  665. Field,Manning R.; Reinhard,Walter Brent, Transaction device.
  666. Skelding, Dori K.; Reinhard, Walter Brent, Transaction device.
  667. Skelding, Dori K.; Reinhard, Walter Brent, Transaction device.
  668. Skelding, Dori K.; Reinhard, Walter Brent, Transaction device with a gem-like surface appearance.
  669. Skelding, Dori K.; Reinhard, Walter Brent, Transaction device with a gem-like surface appearance.
  670. Skelding, Dori K.; Reinhard, Walter Brent, Transaction device with a gem-like surface appearance.
  671. Vanstone, Scott A., Transaction verification protocol for smart cards.
  672. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  673. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  674. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  675. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  676. Beenau,Blayn W.; Bonalle,David S.; Vander Eyk,Becky; Isenberg,Susan E.; Malnati,Leigh; Mueller,Sue; Norcross,Zarita; Peart,Lee J.; Saunders,Peter D.; Skilling Belmond,Lisa; Webb,Lisa; Williamson,John, Transparent transaction device.
  677. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  678. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  679. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  680. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  681. Le Saint, Eric F., Trusted and unsupervised digital certificate generation using a security token.
  682. Pearson,Siani Lynne; Chen,Liqun, Trusted system.
  683. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  684. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  685. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  686. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  687. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  688. Zhu,Yinjun, User plane location based service using message tunneling to support roaming.
  689. de Jong,Eduard, Using a digital fingerprint to commit loaded data in a device.
  690. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  691. Simons, Paul, Variable rate payment card.
  692. Simons, Paul, Variable rate payment card.
  693. Doljack,Frank A., Verification of authenticity of goods by use of random numbers.
  694. Sarat Jean-Marc, Versatile interface smart card.
  695. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  696. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Voiceprint biometrics on a payment device.
  697. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B., Watermark holograms.
  698. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  699. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  700. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로