$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Web-based biometric authentication system and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/00
출원번호 US-0871035 (1997-06-09)
발명자 / 주소
  • Yu Yuan-Pin
  • Wong Stephen
  • Hoffberg Mark B.
출원인 / 주소
  • Philips Electronics North America Corporation
인용정보 피인용 횟수 : 269  인용 특허 : 7

초록

A Web-based authentication system and method, the system comprising at least one Web client station, at least one Web server station and an authentication center. The Web client station is linked to a Web cloud, and provides selected biometric data of an individual who is using the Web client statio

대표청구항

[ What is claimed is:] [1.] A method for Web-based, biometric authentication of individuals who are using a Web Client station, the individuals seeking access of a Web server station, the method comprising the steps of:establishing parameters associated with selected biometric characteristics to be

이 특허에 인용된 특허 (7)

  1. Tabuki Takaaki,JPX, Authentication method for networks.
  2. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  3. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  4. Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
  5. Loosmore N. Bert (New York NY) Ehrman Kenneth (New York NY) Jagid Bruce (New York NY), Electronic control system/network.
  6. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  7. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.

이 특허를 인용한 특허 (269)

  1. Khidekel, Yuri; Balashov, Alex; Kisurin, Sergey, Accessing a secure resource using certificates bound with authentication information.
  2. de Jong,Eduard K., Accessing in a rights locker system for digital content access control.
  3. Pitt, Alan M.; Partovi, Shahram, Anonymous association system utilizing biometrics.
  4. Mages, Kenneth G.; Lo, Chi Wah; Mages, Kent H.; Tang, Tai Kwan, Apparatus and method for conducting securing financial transactions.
  5. Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley; Davis, III, Tom; Bloomfield, Marc, Apparatus and method for determining a program neighborhood for a client node in a client-server network.
  6. Duursma, Martin; Panasyuk, Anatoliy; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network.
  7. Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley Jay; Davis, III, Tom C.; Bloomfield, Marc A., Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques.
  8. Wilson Steven D. ; Virani Amirali ; Momchev Orlin ; Setlak Dale R., Apparatus and method for expandable biometric searching.
  9. Reiner, Bruce, Apparatus and method for utilizing biometrics in medical applications.
  10. Bergl Vladimir,CZX ; Davies Kenneth ; Ittycheriah Abraham Poovakunnel ; Maes Stephane Herman, Apparatus and methods for user identification to deny access or service to unauthorized users.
  11. Mekata,Tsuyoshi; Uomori,Kenya; Yamada,Shin, Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network.
  12. Ahlberg, Axel H.; Becar, Allyn P.; Brand, Gregory L.; Fenley, Douglas B.; Jones, Chester L.; Wyrick, Robert E., Authentication and entitlement for users of web based data management programs.
  13. Watanabe,Isao, Authentication method, apparatus, and system.
  14. Sciuk, David, Automated system and method for managing a process for the shopping and selection of human entities.
  15. Ting, David M. T., Biometric authentication for remote initiation of actions and services.
  16. Ting,David M. T., Biometric authentication for remote initiation of actions and services.
  17. Ting,David M. T., Biometric authentication with security against eavesdropping.
  18. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  19. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  20. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  21. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  22. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  23. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  24. Rozenberg Roman ; Rozenberg Tatyana, Biometric scanning aperture for a computer input device.
  25. Jurij Jakovlevich Kharon RU; Roman Rozenberg, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  26. Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  27. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  28. Karthik, Kaleedhass, Biometric verification for electronic transactions over the web.
  29. Mathew, Prakash Parayil, Biometrically enabled imaging system.
  30. Ballard, Claudio R.; Pathak, Amarish; Imbruce, Michael T.; Currie, Edward H.; Cassata, James; Freedman, Maurice N., Biometrically enabled private secure information repository.
  31. Bolle,Rudolf Maarten; Connell,Jonathan H.; Ratha,Nalini K.; Percello,Louis J., Business system and method using a distorted biometrics.
  32. Morris, Max G.; Kaler, Christopher G., Challenge-based authentication without requiring knowledge of secret authentication data.
  33. Kilian-Kehr, Roger; Haller, Jochen; Gomez, Laurent; Hebert, Cedric, Client authentication using a challenge provider.
  34. Yamazaki, Shunpei; Koyama, Jun, Communication system.
  35. Olarig Sompong P. ; Fridel Derace M. ; Angelo Michael F., Computer architecture with automatic disabling of hardware/software features using satellite positioning data.
  36. Ozolins, Helmars E., Computer keyboard with processor for audio and telephony functions.
  37. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Configurable personal digital identity card with motion sensor responsive to user interaction.
  38. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav, Configurable personal digital identity device with authentication using image received over radio link.
  39. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Configurable personal digital identity device with motion sensor responsive to user interaction.
  40. Woehl, Roger, Creating, translating and publishing large information plans to a network.
  41. Bjorn, Vance C.; Lopez, Daniel, Crypto-proxy server and method of using the same.
  42. Devine,Carol Y.; Shoulberg,Richard W.; Shifrin,Gerald A.; Pfister,Robert A.; Fenley,Douglas B.; Suscheck,Charles A.; Delano,P. Alex; Kennington,W. Russell; Brandt,Andre R.; Pillai,Sajan J.; Schwarz,Edward; Shamash,Arieh, Customer interface system for managing communications services including toll free services.
  43. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  44. Glenn, Christopher J., Devices, systems, and methods for producing and distributing multiple variations of an instance of a media presentation.
  45. Hastings Jeffrey S., Diagnostic medical ultrasound imaging system and ultrasound review station with a biophysical input device.
  46. Diehl Jeffrey W. ; Glaze Mary L. ; Braceland Joseph M., Distributed mobile biometric identification system with a centralized server and mobile workstations.
  47. Haileselassie, Welela; LaTouche, Lerone W.; Malone, Kelly; Mbogo, Lesley W.; Nkoku-charles, Ugochukwu; Williams, Devon Glenford, Dynamic webcast content viewer method and system.
  48. Brown, Stephen J., Electronic data capture in clinical and pharmaceutical trials.
  49. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  50. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  51. Rappoport, Rinat; Yehezkel, Raanan; Fishtein, Roman; Goffman, Sergei; Jacob, Guy; Gershon, Oren; Sloutsman, Andrey; Lapidot, Ido; Givoli, Ofer, Emotion-related query processing.
  52. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced privacy protection in identification in a data communications network.
  53. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced quality of identification in a data communications network.
  54. Campbell,William; Gardner,Robert; Broun,Charles, Identification apparatus and method for receiving and processing audible commands.
  55. Craig, Robert M.; Tankovich, Vladimir; Peeper, Craig; Dalal, Ketan; Dedhia, Bhaven; Meekhof, Casey, Identification using depth-based head-detection data.
  56. Ross, Gordon A., Identifying and protecting composed and transmitted messages utilizing keystroke dynamics.
  57. Nanavati, Samir H.; Nanavati, Rajkumar H., Identity verification method using a central biometric authority.
  58. Nanavati,Samir H.; Nanavati,Rajkumar, Identity verification method using a central biometric authority.
  59. Rozenberg Roman, Index finger biometric aperture for a mouse.
  60. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Devine, Carol Y.; Studness, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated business system for web based telecommunications management.
  61. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  62. Devine, Carol Y.; Shoulberg, Richard W.; Shifrin, Gerald A.; Pfister, Robert A.; Fenley, Douglas B.; Suscheck, Charles A.; Delano, P. Alex; Kennington, W. Russell; Brandt, Andre R.; Pillai, Sajan J.;, Integrated customer interface system for communications network management.
  63. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  64. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  65. Baker,Thomas E.; Chaffee,Susan L.; Chen,Yuchien; Gruber,Charles J.; Fishman,Howard P., Integrated customer web station for web based call management.
  66. Combar, Curtis T.; Devine, Carol Y.; Pfister, Robert A., Integrated interface for real time web based viewing of telecommunications network call traffic.
  67. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  68. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  69. Andre R. Brandt ; Sajan J. Pillai, Integrated proxy interface for web based data management reports.
  70. Devine, Carol Y.; Dollar, Tammy E.; Munguia, Wayne J.; Schwarz, Edward, Integrated proxy interface for web based report requester tool set.
  71. Delano, P. Alex; Devine, Carol Y.; Hall, Robert W.; Pfister, Robert A.; Venn, Garrison M., Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client.
  72. Curtis T. Combar ; Robert A. Pfister, Integrated proxy interface for web based telecommunications management tools.
  73. Wayne J. Munguia ; Robert A. Pfister ; Charles A. Suscheck, Integrated proxy interface for web based telecommunications network management.
  74. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  75. Bloomfield, Marc; Muir, Jeff; Panasyuk, Anatoly; Behrakis, Elias C., Interacting with software applications displayed in a web page.
  76. Brown, Stephen James, Interactive video based remote health monitoring system.
  77. Kellas-Dicks, Mechthild R.; Stark, Yvonne J., Keystroke dynamics authentication techniques.
  78. Salinca, Andreea; Pricochi, Ana M.; Ivascu, Bogdan N.; Rusu, Mircea S., Load balancing in handwritten signature authentication systems.
  79. Forbes, Ronald; Dedhia, Bhaven; Keosababian, Tim; Leyvand, Tommer; Li, Jinyu; Gerken, Timothy, Managed biometric identity.
  80. Forbes, Ronald; Dedhia, Bhaven; Keosababian, Tim; Leyvand, Tommer; Li, Jinyu; Gerken, Timothy, Managed biometric identity.
  81. McNelley, Julie; Sgambati, Glen; Anickode, Sathish, Management of biometric information.
  82. McNelley, Julie; Sgambati, Glen; Anickode, Sathish, Management of biometric information.
  83. Hamilton, Michael; Boland, Walter E.; Ricart, Glenn, Message routing.
  84. Hamilton, Michael; Ricart, Glenn; Boland, Walter E., Message routing.
  85. Hamilton, Michael; Ricart, Glenn; Boland, Walter E., Message routing.
  86. Reiner, Bruce, Method and apparatus for adapting computer-based systems to end-user profiles.
  87. Reiner, Bruce, Method and apparatus for adapting computer-based systems to end-user profiles.
  88. Foladare Mark Jeffrey ; Goldman Shelley B. ; Kapsales Peter, Method and apparatus for building subscriber service profile based on subscriber related data.
  89. Wilson Steven D. ; Virani Amirali ; Momchev Orlin ; Setlak Dale R., Method and apparatus for expandable biometric searching.
  90. Wilson Steven D. ; Virani Amirali ; Momchev Orlin ; Setlak Dale R., Method and apparatus for expandable biometric searching.
  91. Mani, Seshadri; Kellas Dicks, Mechthild, Method and apparatus for multi-distant weighted scoring system.
  92. Mani, Seshadri; D'Andrea, David M., Method and apparatus for multi-model hybrid comparison system.
  93. Brown, Stephen J., Method and apparatus for remote health monitoring and providing health related information.
  94. Brown, Stephen J., Method and apparatus for remote health monitoring and providing health related information.
  95. Brown, Stephen J., Method and apparatus for remote health monitoring and providing health related information.
  96. Bjorn,Vance C., Method and apparatus for using a third party authentication server.
  97. Rickman, Dale M., Method and system for generating a biometric query plan.
  98. Brown, Stephen James, Method and system for improving adherence with a diet program or other medical regimen.
  99. Vishik, Claire Svetlana; Gorti, Sreenivasa Rao; Van Vleck, Paul, Method and system for intelligent routing based on presence detection.
  100. Vishik,Claire Svetlana; Gorti,Sreenivasa Rao; Vleck,Paul Van, Method and system for intelligent routing based on presence detection.
  101. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  102. Vishik, Claire Svetlana; Gorti, Sreenivasa Rao; Vleck, Paul Van, Method and system for multimodal presence detection.
  103. Vishik, Claire Svetlana; Gorti, Sreenivasa Rao; Vleck, Paul Van, Method and system for multimodal presence detection.
  104. Vishik,Claire Svetlana; Gorti,Sreenivasa Rao; Vleck,Paul Van, Method and system for multimodal presence detection.
  105. Siegal, Jon; Rowell, Simon; Hintz, Thomas, Method and system for providing online authentication utilizing biometric data.
  106. Siegal,Jon; Rowell,Simon; Hintz,Thomas, Method and system for providing online authentication utilizing biometric data.
  107. Barrett, Michael, Method and system for transmitting authentication context information.
  108. Barrett, Michael, Method and system for transmitting authentication context information.
  109. Barrett, Michael, Method and system for transmitting authentication context information.
  110. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  111. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  112. Barrett,Michael Richard, Method and system for transmitting authentication context information.
  113. Malville, Eric; Guerin, Didier; Thorigne, Yves, Method for authentication between a portable telecommunication object and a public access terminal.
  114. McKeeth, James, Method for controlling user access to an electronic device.
  115. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  116. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  117. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  118. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  119. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  120. M철dl,Albert; Stephan,Elmar; M체ller,Robert, Method, data carrier and system for authentication of a user and a terminal.
  121. Muir, Jeff; Stergiades, Andrew, Methods and apparatus for making a hypermedium interactive.
  122. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  123. Taveau, Sebastien Ludovic Jean; Tsuchiya, Marcia, Methods and systems for fingerprint template enrollment and distribution process.
  124. Wong,Leon; Aggarwal,Sudhanshu; Beebee,Peter; Vincent,Jesse, Methods and systems for selecting methodology for authenticating computer systems on a per computer system or per user basis.
  125. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  126. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  127. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  128. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  129. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  130. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  131. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  132. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  133. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  134. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  135. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  136. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  137. Carol Y. Devine ; Tammy E. Dollar ; Wayne J. Munguia, Multi-threaded web based user inbox for report management.
  138. Brown, Stephen J., Multi-user remote health monitoring system with biometrics support.
  139. Hoffberg, Steven M., Multifactorial optimization system and method.
  140. Brown, Stephen J., Networked system for interactive communication and remote monitoring of individuals.
  141. Brown, Stephen J., Networked system for interactive communication and remote monitoring of individuals.
  142. Brown, Stephen J., Networked system for interactive communication and remote monitoring of individuals.
  143. Brown, Stephen J., Networked system for interactive communication and remote monitoring of individuals.
  144. Brown, Stephen J., Optimizing oxygen tank deliver or refills for COPD patients through measurement of blood oxygen levels.
  145. Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method and program providing medium.
  146. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, and program providing medium.
  147. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  148. Kondo, Kenji; Uomori, Kenya, Personal authentication method and device.
  149. Shinzaki, Takashi; Fujii, Yusaku, Personal authentication system using biometrics information.
  150. Shinzaki,Takashi; Fujii,Yusaku, Personal authentication system using biometrics information.
  151. Tanada, Yoshifumi; Yamazaki, Shunpei; Arai, Yasuyuki; Moriya, Yoshitaka, Personal data management system and nonvolatile memory card.
  152. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity card device for fingerprint bound asymmetric crypto to access merchant cloud services.
  153. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity card with motion sensor responsive to user interaction.
  154. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity device with fingerprint sensor.
  155. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity device with fingerprint sensor and challenge-response key.
  156. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity device with fingerprint sensor responsive to user interaction.
  157. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity device with motion sensor responsive to user interaction.
  158. Narendra, Siva G.; Tadepalli, Prabhakar; Chakraborty, Saurav; Bloodworth, Donald Allen, Personal digital identity device with near field and non near field radios for access control.
  159. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Privacy and identification in a data communications network.
  160. Brown, Stephen J., Remote health monitoring and maintenance system.
  161. Brown, Stephen J., Remote health monitoring and maintenance system.
  162. Brown, Stephen James, Remote health monitoring and maintenance system.
  163. de Jong, Eduard; Cooley, Aaron; Bostrom, Jon, Repositing for digital content access control.
  164. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Repositing for digital content access control.
  165. Uesaka, Hiroyuki, Retrieval processing method and apparatus and memory medium storing program for same.
  166. de Jong,Eduard K., Rights locker for digital content access control.
  167. Novoa, Manuel; Crisan, Adrian, Secure and dynamic biometrics-based token generation for access control and authentication.
  168. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  169. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  170. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  171. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  172. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  173. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  174. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for Web based data management.
  175. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  176. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  177. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  178. Morris, Max G.; Kaler, Christopher G., Secure electronic transfer without requiring knowledge of secret data.
  179. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  180. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  181. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  182. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  183. Baghdasaryan, Davit; Kesanupalli, Ramesh; Schwab, Frank; Chan, Philip Yiu Kwong; Hattery, Larry, Secure transaction systems and methods.
  184. Kesanupalli, Ramesh; Baghdasaryan, Davit; Schwab, Frank; Chan, Philip Yiu Kwong; Hattery, Larry, Secure user authentication using biometric information.
  185. Dan Linh Nguyen, Security between client and server in a computer network.
  186. Seeley, E. Addison, Software licensing and distribution systems and methods employing biometric sample authentication.
  187. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Synchronizing for digital content access control.
  188. Cooper, Brian; Hilmes, Ron, System and architecture for merchant integration of a biometric payment system.
  189. Ting, David M. T.; Ho, Chen; Shah, Parind; Byragani, Bushan Yadav, System and method for automated login.
  190. Cable, Laurence, System and method for automatically partitioning an application between a web server and an application server.
  191. Robinson,Timothy, System and method for biometric authorization for financial transactions.
  192. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for biometrically-initiated refund transactions.
  193. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J., System and method for biometrically-initiated refund transactions.
  194. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  195. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  196. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for categorizing transactions.
  197. Phoha, Vir V.; Babu, Sunil; Ray, Asok; Phoba, Shashi P., System and method for classifying regions of keystroke density with a neural network.
  198. McKeeth, James, System and method for controlling user access to an electronic device.
  199. McKeeth, James, System and method for controlling user access to an electronic device.
  200. McKeeth, James, System and method for controlling user access to an electronic device.
  201. McKeeth, James, System and method for controlling user access to an electronic device.
  202. McKeeth, James, System and method for controlling user access to an electronic device.
  203. McKeeth, James, System and method for controlling user access to an electronic device.
  204. Hoffberg, Steven M., System and method for determining contingent relevance.
  205. Bolle, Rudolf Maarten; Connell, Jonathan H.; Ratha, Nalini K., System and method for distorting a biometric for transactions with enhanced security and privacy.
  206. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  207. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  208. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  209. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Robinson,Mark B., System and method for enrolling in a biometric system.
  210. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  211. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  212. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  213. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  214. Kimmel,Scott T., System and method for implementing healthcare fraud countermeasures.
  215. Kimmel,Scott T., System and method for implementing healthcare fraud countermeasures.
  216. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  217. Bolle,Rudolf M.; Dorai,Chitra; Noronha,Sunil J.; Ratha,Nalini K., System and method for multi-party validation, authentication and/or authorization via biometrics.
  218. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for offering in-lane periodical subscriptions.
  219. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for operating a parking facility.
  220. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  221. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  222. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  223. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  224. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  225. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for purchase benefits at a point of sale.
  226. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for purchase benefits at a point of sale.
  227. Bolle, Rudolf M.; Pankanti, Sharathchandra U.; Ratha, Nalini K.; Senior, Andrew W., System and method for remote self-enrollment in biometric databases.
  228. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  229. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  230. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  231. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  232. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  233. Montgomery, Jr., William S.; Cooley, II, Leland H.; Lunday, Robert A., System and method for using biometric data for providing identification, security, access and access records.
  234. Ellingson, John F., System and method for verification of identity.
  235. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for verifying identity.
  236. Kumar, Saurabh, System and method for voice authentication over a computer network.
  237. Kumar, Saurabh, System and method for voice authentication over a computer network.
  238. Kumar, Saurabh, System and method for voice authentication over a computer network.
  239. Kumar, Saurabh, System and method for voice authentication over a computer network.
  240. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, System for digital content access control.
  241. Yamazaki, Shunpei; Koyama, Jun, System for identifying an individual, a method for identifying an individual or a business method.
  242. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  243. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  244. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  245. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  246. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  247. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  248. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  249. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  250. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  251. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  252. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  253. Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  254. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  255. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  256. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  257. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  258. Hoffman,Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  259. Zoka, Ron, Touch scan internet credit card verification purchase process.
  260. Lee,Jong ha; Hwang,Eui hyeon, User authentication method and apparatus.
  261. Hayakawa,Shoji, User authentication system using biometric information.
  262. Brown, Stephen J., User-based health monitoring.
  263. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based biometric authentication.
  264. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based biometric authentication.
  265. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based biometric authentication.
  266. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based biometric authentication.
  267. Novack,Brian M.; Madsen,Daniel Larry; Thompson,Timothy R., Voice over IP based biometric authentication.
  268. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based voice biometric authentication.
  269. Gobin, Parmeshwar; Hall, Henry Huntington; Hauryluck, Carla Reale; Kanze, Daniel Robert; Liburd, Steven William; Sandt, Kirk Van; Swei, Jia Huei, Web based integrated customer interface for invoice reporting.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로