$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System, method and computer program product for allowing access to enterprise resources using biometric devices 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0264726 (1999-03-09)
발명자 / 주소
  • Bianco Peter Garrett
  • Boon William Taylor
  • Sterling Robert Brewster
  • Ware Karl Roger
출원인 / 주소
  • BioNetrix Systems Corporation
대리인 / 주소
    Sterne, Kessler, Goldstein & Fox P.L.L.C.
인용정보 피인용 횟수 : 346  인용 특허 : 91

초록

A system, method and computer program product that utilizes biometric measurements for the authentication of users to enterprise resources. The system includes a biometric server that stores the engine and collections of data required by the system to authenticate users. In the present invention, it

대표청구항

[ What is claimed is:] [1.]1. A method for providing user authentication to enterprise resources, comprising the steps of:(a) setting up a biometric server including placing the user within a biometric group, wherein said biometric group defines one or more users having a specified characteristic, s

이 특허에 인용된 특허 (91)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  3. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud verification system using a data card.
  4. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud voter registration and voting system using a data card.
  5. Cheng Jane (Spring Valley Rockland NY) Martinez Edgar (East White Plains NY) Naik Jayant (Stamford Fairfield CT), Apparatus and accompanying methods for preventing toll fraud through use of centralized caller voice verification.
  6. Kapp Michael A. (New Philadelphia) Protheroe Robert L. (Cambridge) Onega Albert (Lore City OH), Apparatus and method for producing a digitized transaction record including an encrypted signature.
  7. Gray Robert J., Apparatus and method for providing an authentication system.
  8. Hara Tsutomu,JPX ; Kobayashi Yuji,JPX ; Toyoda Haruyoshi,JPX, Apparatus for identifying an individual based on a fingerprint image.
  9. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  10. Benzler Hartwig,DEX, Authentication method.
  11. Price-Francis Stephen, Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives.
  12. DiMaria Peter C., Biometric interface device for upgrading existing access control units.
  13. Daugman John G. (Huntingdon GB2), Biometric personal identification system based on iris analysis.
  14. Brady Mark J., Biometric recognition using a classification neural network.
  15. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  16. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  17. Itsumi Kazuhiro,JPX ; Uchida Satoshi,JPX ; Nukui Harumi,JPX, Computer network system and personal identification system adapted for use in the same.
  18. Veneklase Brian J., Computer security system.
  19. Gainsboro Jay L. (5 Bancroft Cir. Framingham MA 01701), Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  20. Sehr Richard P. (2276 Creek Bed Ct. Santa Clara CA 95054), Computerized theme park information management system utilizing partitioned smart cards and biometric verification.
  21. Hampton Thomas H. (Lyme NH) Litle ; IV Thomas J. (Nashua NH) Searle Nigel H. (Keene NH), Confirming identity of telephone caller.
  22. Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
  23. Mathurin ; Jr. Trevor R. (865 Planders Ave. Uniondale NY 11553), Credit card with digitized finger print and reading apparatus.
  24. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  25. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  26. Bennett Michael Joseph (Las Vegas NV), Digital image capture system for photo identification cards.
  27. Rosen Sholom S. (New York NY), Electronic-monetary system.
  28. Taylor Bradley (Palo Alto CA), Flexible distributed network database containing configuration information for a network divided into domains.
  29. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  30. Schneider John K. (Snyder NY) Keeney Frank W. (Williamsville NY) Drakes Russell J. (Cheektowaga NY) Gojevic Stephen M. (Buffalo NY) Leszczynski Nicholas G. (Amherst NY) Schneider Mark C. (East Amhers, High resolution ultrasonic imaging apparatus and method.
  31. Lu Daozheng (1903 Dunloe Cir. Dunedin FL 34698) Lu Simon W. (525 S. Berendo St. #303 Los Angeles CA 90020), Identification card verification system.
  32. Kristol David M. (Summit NJ) O\Gorman Lawrence P. (Madison NJ), Identification card verification system and method.
  33. Colbert Charles (Yellow Springs OH), Knuckle profile indentity verification system.
  34. Chen Tsuhan ; Civanlar Mehmet Reha, Method and apparatus employing audio and video data from an individual for authentication purposes.
  35. Abtahi Nooral S. (4924 Carmel Rd. Charlotte NC 28226) Shumate ; Sr. Grady C. (Charlotte NC) Heyward Waddie (Charlotte NC) Yang Hedong (Charlotte NC), Method and apparatus for confirming the identity of an individual presenting an identification card.
  36. Hujink Hendrik W. (Aalten NLX), Method and apparatus for producing admission tickets.
  37. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  38. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  39. Penzias Arno A. (Chatham NJ), Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transactio.
  40. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  41. Ray Lawrence A. (Rochester NY) Ellson Richard N. (Rochester NY), Method and apparatus for transaction card verification.
  42. Tal Peter (53 Driftwood Dr. Port Washington NY 11050), Method and apparatus for uniquely identifying individuals by particular physical characteristics and security system uti.
  43. Costello, Brendan D., Method and apparatus for verifying identity.
  44. Kingdon Kevin (Orem UT) Childers Randal Earl (Orem UT) Higley DeeAnne (Provo UT) Olds Dale R. (Sandy UT), Method and apparatus to secure digital directory object changes.
  45. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  46. Thomas Richard B. (1902 E. Hope St. Mesa AZ 85203), Method and system for controlling use of protected software.
  47. Nevarez Carlos A. ; White Kenneth Paul, Method and system for integrating additional functionality into a login system.
  48. Smithies Christopher Paul Kenneth (Corfe Mullen ; Wimborne GB2) Newman Jeremy Mark (Frome ; Somerset GB2), Method and system for the verification of handwritten signatures.
  49. Ugon Michel (Maurepas FRX) Oisel Andr (Elancourt FRX), Method for checking the integrity of a program or data, and apparatus for implementing this method.
  50. Holmquist Kurt E. (Largo FL) Smith Richard K. (Seminole FL), Method for dial-in access security using a multimedia modem.
  51. Prokoski Francine J. (1510 Inlet Ct. Reston VA 22090) Coffin Jeffrey S. (Sterling VA) Riedel Robert B. (Great Falls VA), Method for identifying individuals from analysis of elemental shapes derived from biosensor data.
  52. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  53. Fan Jason Chia-Sun (Adelphi MD) Hastie Trevor J. (Berkeley Heights NJ) Kishon Eyal (New York NY), Method for signature verification.
  54. Behnke Alfons,DEX, Method of encoding identification cards and verifying such encoded identification cards, and apparatus for carrying out.
  55. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), Method of verifying fake-proof video identification data.
  56. O'Connor Clint ; Scholder Erica, Mouse with security feature.
  57. Feix Wolfgang H. (Mt. Laurel NJ) Ruell Hartwig E. (Fuerstenfeldbruck DEX), Personal access control system using speech and face recognition.
  58. Bonneau ; Jr. Walter C. (Missouri City TX), Personal identification.
  59. Davies John H. E. (4A Cowper Road Berkhamsted ; Hertfordshire ; HP4 3DA GB2), Personal identification devices and access control systems.
  60. Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
  61. Houvener Robert C. (Nashua NH), Positive identification system and method.
  62. Herbault Patrick (Paris FRX), Process and device for hierarchized access to a network for transmission of information.
  63. Villa Pierre (Fresnes FRX), Process of identifying and authenticating data characterizing an individual.
  64. Turner Stephen J. (Saffron Walden GB2) Lilley John B. (Brentwood GB2), Recognition procedure and an apparatus for carrying out the recognition procedure.
  65. Brunelli Roberto (Trento ITX) Falavigna Daniele (Buttapietra MA ITX) Poggio Tomaso (Wellesley MA) Stringa Luigi (Villazzano ITX), Recognition system, particularly for recognising people.
  66. Aoyama Mitsunobu (Oome JPX), Security administrator for automatically updating security levels associated with operator personal identification data.
  67. Cockburn John B. (16A Bywater Street London ; SW3 GB3), Security system employing digitized personal physical characteristics.
  68. McAllister Alex (Wheaton MD) Cheston Frank (Potomac MD) Young David E. (Silver Spring MD) Hanle John P. (Silver Spring MD), Selection of a voice recognition data base responsive to video data.
  69. Lane William F. (Wilson NC), Self-authenticating identification card with fingerprint identification.
  70. Nappi Bruce ; Schroeder William ; Miller James E., Sensory integrated data interface.
  71. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  72. Schwalm Robert C. (Plano TX) Deffner Gerhard P. H. (Dallas TX), System and method for authenticating transmission and receipt of electronic information.
  73. Sime Iain R. F. (Tayside GB6), System and method for detecting user fraud in automated teller machine transactions.
  74. Bahler Lawrence G. (San Diego CA) Higgins Alan L. (San Diego CA), System and method for passive voice verification in a telephone network.
  75. Houvener Robert C. ; Hoenisch Ian P., System and method of providing system integrity and positive audit capabilities to a positive identification system.
  76. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for encoding personalized identification for storage on memory storage devices.
  77. Belluci Barry P. (Ann Arbor MI) Charlip Eliot (West Bloomfield MI), System for producing a personal ID card.
  78. Bergholz Ralf,DEX ; Weisser Hubert,DEX ; Zielke Thomas,DEX, System for recognizing authorization to use a vehicle.
  79. Bogosian ; Jr. Charles A. (Warwick RI), System for verifying use of a credit/identification card including recording of physical attributes of unauthorized user.
  80. McAllister Alex (Wheaton MD), Telephone based credit card protection.
  81. Teitelbaum Neil,CAX, Telephone with biometric sensing device.
  82. Katz Penina (Flushing NY), Telephone-based personnel tracking system.
  83. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  84. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  85. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  86. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  87. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  88. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  89. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
  90. Washington Valdemar L. (Flint MI), Vehicle security system including fingerprint and eyeball part identification.
  91. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.

이 특허를 인용한 특허 (346)

  1. Frempong, Derek K.; Paek, Gi-Young; Silverman, Andrew M., Academic integrity protection.
  2. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  3. Bodin, William Kress; Burkhart, Michael John; Eisenhauer, Daniel Gene; Schumacher, Daniel Mark; Watson, Thomas James, Administering devices in dependence upon user metric vectors.
  4. Bodin, William Kress; Burkhart, Michael John; Eisenhauer, Daniel Gene; Schumacher, Daniel Mark; Watson, Thomas James, Administering devices in dependence upon user metric vectors.
  5. Bodin, William K.; Burkhart, Michael J.; Eisenhauer, Daniel G; Schumacher, Daniel M.; Watson, Thomas J., Administering devices with domain state objects.
  6. Bodin, William Kress; Burkhart, Michael John; Eisenhauer, Daniel G.; Schumacher, Daniel Mark; Watson, Thomas J., Administering devices with domain state objects.
  7. Sunstein,Bruce D.; Shapiro,Eileen C., Apparatus and method for authenticated multi-user personal information database.
  8. Crucilla, Christopher, Apparatus and method for passive testing of alcohol and drug abuse.
  9. Balfanz,Dirk; Smetters,Diana K.; Stewart,Paul S.; Swinehart,Daniel C., Apparatus and methods for providing secured communication.
  10. Balfanz,Dirk; Smetters,Diana; Stewart,Paul; Swinehart,Daniel C., Apparatus and methods for providing secured communication.
  11. Mekata,Tsuyoshi; Uomori,Kenya; Yamada,Shin, Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network.
  12. McLaughlin, Brian Smith; Gil, Leonardo B.; Tracy, Marshall Joseph; Mitchell, Erik Vaughn; Dixon, Jeffrey Todd; Nagalla, Durgaprasad; Mohanraj, Venkatesh, Application security system and method.
  13. McLaughlin, Brian Smith; Gill, Leonardo B.; Tracy, Marshall Joseph; Mitchell, Erik Vaughn; Dixon, Jeffrey Todd, Application security system and method.
  14. Mohan, Sudhir; Patil, Umesh R.; Jordan, Daniel S., Applications and services supported by a client-server independent intermediary mechanism.
  15. Do, Lydia M.; Nesbitt, Pamela A.; DeLuca, Lisa Seacat, Arrangements for identifying users in a multi-touch surface environment.
  16. Do, Lydia M.; Nesbitt, Pamela A.; Seacat, Lisa A., Arrangements for identifying users in a multi-touch surface environment.
  17. Griffin, Phillip H., Associating a biometric reference template with an identification tag.
  18. Gibart, Anthony G.; Dogul, James E.; Galera, Richard; Rollins, George E.; Jones, Derek W.; Schuster, George K.; Nair, Suresh R.; Delcher, Ray C., Audit trail in a programmable safety instrumented system via biometric signature(s).
  19. Schneider, John K.; Kiefer, Fred; Kitchens, Jack, Augmented biometric authorization system and method.
  20. Thomas,Edward V.; Draelos,Timothy J., Authenticating concealed private data while maintaining concealment.
  21. Durney, Stephen; Pletz, Tracy M.; Webb, Timothy A., Authentication and interaction tracking system and method.
  22. Durney, Stephen; Pletz, Tracy M.; Webb, Timothy A., Authentication and interaction tracking system and method.
  23. Frempong, Derek K.; Paek, Geanie; Silverman, Andrew, Authentication integrity protection.
  24. Watanabe,Isao, Authentication method, apparatus, and system.
  25. Johansson, Jesper Mikael; Roth, Gregory Branchek; Platz, David Matthew; Vippagunta, Rajendra Kumar, Authentication objects with attestation.
  26. Webb, Timothy A.; Pletz, Tracy M., Authentication system and method.
  27. Webb, Timothy A.; Pletz, Tracy M., Authentication system and method.
  28. Webb, Timothy A.; Pletz, Tracy M., Authentication system and method.
  29. Webb, Timothy A.; Pletz, Tracy M., Authentication system and method.
  30. Han, Byron B.; Marciniak, Craig A.; Wright, John A., Automatic association of authentication credentials with biometrics.
  31. Han, Byron B.; Marciniak, Craig A.; Wright, John A., Automatic association of authentication credentials with biometrics.
  32. Todaka,Chiaki; Ohashi,Mitsuo; Simpson,Ron; Furukawa,Toshihiko, Biomedical recognizing system comprising image diagnosis workstation and method therefor.
  33. Vemireddy, Nagarjuna R., Biometric authentication.
  34. Ortiz, Luis M.; Lopez, Kermit D., Biometric authentication utilizing unique biometric signatures and portable electronic devices.
  35. Ting,David M. T., Biometric authentication with security against eavesdropping.
  36. Han, Byron B.; Marciniak, Craig A.; Wright, John A., Biometric capture for unauthorized user identification.
  37. Smith, Gaylan S., Biometric control system and method for machinery.
  38. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  39. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  40. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  41. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  42. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  43. LaCous, Mira, Biometric identification network security.
  44. LaCous,Mira, Biometric identification network security.
  45. Giobbi, John J., Biometric personal data key (PDK) authentication.
  46. Giobbi, John J., Biometric personal data key (PDK) authentication.
  47. Giobbi, John J., Biometric personal data key (PDK) authentication.
  48. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  49. Karthik, Kaleedhass, Biometric verification for electronic transactions over the web.
  50. Errico, Stephen; Pfrenzinger, Steven, Certified email messages and attachments.
  51. Griffin, Phillip H., Checking revocation status of a biometric reference template.
  52. Yach, David P.; Brown, Michael S.; Little, Herbert A., Code signing system and method.
  53. Yach, David P.; Brown, Michael S.; Little, Herbert A., Code signing system and method.
  54. Baar, David J. P., Compound lenses for multi-source data presentation.
  55. Bloomberg, Michael R.; Waanders, John D.; Ozolins, Helmars E., Computer terminals biometrically enabled for network functions and voice communication.
  56. Bloomberg, Michael R.; Waanders, John D.; Ozolins, Helmars Ericks, Computer terminals biometrically enabled for network functions and voice communication.
  57. Bloomberg,Michael R.; Waanders,John D.; Ozolins,Helmars E., Computer terminals biometrically enabled for network functions and voice communication.
  58. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  59. Han, Byron B.; Patience, Simon, Continual authorization for secured functions.
  60. O'Connor, Michael; Girard, Luke; Schiffer, Jeff, Continuous verification system.
  61. Yach, David P.; Brown, Michael Steven; Little, Herbert Anthony, Controlling access by code.
  62. Yach, David Paul; Little, Herbert Anthony; Brown, Michael Stephen, Controlling access by code.
  63. Yach, David Paul; Little, Herbert Anthony; Brown, Michael Stephen, Controlling access by code.
  64. Chari, Suresh N.; Cheng, Pau-Chen; Koved, Lawrence; Molloy, Ian M.; Park, Youngja, Correlating cognitive biometrics for continuous identify verification.
  65. Perry, Sr., Daniel D., Credit card security system and method.
  66. Perry, Sr., Daniel D., Credit card security system and method.
  67. Bjorn, Vance C.; Lopez, Daniel, Crypto-proxy server and method of using the same.
  68. Black, Gerald R, Data security system.
  69. Black, Gerald R., Data security system.
  70. Black, Gerald R., Data security system.
  71. Black, Gerald R., Data security system.
  72. Nasserbakht, Gitty N.; Nasserbakht, Mitra, Data system with temporal user interface.
  73. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  74. Frey,Bridget J.; Young,Michael Wei Chin, Delegated authentication using a generic application-layer network protocol.
  75. Jetha, Zeenat; Carlisle, Andrew; Skiers, Andrew; Baar, David J. P., Detail-in-context lenses for digital image cropping and measurement.
  76. Jetha, Zeenat; Carlisle, Andrew; Skiers, Andrew; Baar, David J. P.; Shoemaker, Garth B. D., Detail-in-context lenses for digital image cropping, measurement and online maps.
  77. Jetha, Zeenat; Carlisle, Andrew; Skiers, Andrew; Baar, David J. P.; Shoemaker, Garth B. D., Detail-in-context lenses for digital image cropping, measurement and online maps.
  78. Baar, David J. P.; Solehdin, Ali, Detail-in-context lenses for interacting with objects in digital image presentations.
  79. Baar, David; Solehdin, Ali, Detail-in-context lenses for interacting with objects in digital image presentations.
  80. Fraser, Douglas, Detail-in-context lenses for navigation.
  81. Montagnese, Catherine; Tigges, Mark H. A., Detail-in-context terrain displacement algorithm with optimizations.
  82. Montagnese, Catherine; Tigges, Mark H. A., Detail-in-context terrain displacement algorithm with optimizations.
  83. M철dl,Albert; Stephan,Elmar; M체ller,Robert, Devices and methods for biometric authentication.
  84. Buffum, Chuck; Levy, Jared; Calvin, Nathaniel; Gould, Craig; King, Jeff; Lipin, David, Dialog-based voiceprint security for business transactions.
  85. Bhaskaran, Sajit, Digital voice signature of transactions.
  86. Gustave, Christophe; Marquet, Bertrand; Le Moigne, Olivier, Distributed authentication framework stack.
  87. Carlisle, Andrew; Chong, Jamie; Doyle, Michael; Ippel, Keith; Jetha, Zeenat; Komar, Robert; Montagnese, Catherine; Morrow, Chloe; Ting, Vincent; Baar, David J. P., Dynamic detail-in-context user interface for application access and content access on electronic displays.
  88. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  89. Tattan, Oliver; Loughman, Stephen; Murphy, Michael; Peirce, Michael; White, Conor, Electronic data vault providing biometrically protected electronic signatures.
  90. Tattan, Oliver; Loughman, Stephen; Murphy, Michael; Peirce, Michael; White, Conor, Electronic data vault providing biometrically protected electronic signatures.
  91. Sinn, Richard; Yuen, Stan; Lee, Chi-Cheng, Employing wrapper profiles.
  92. Lamberton,Marc; Levy Abegnoli,Eric; Thubert,Pascal, Enabling surveillance of network connected device.
  93. Duane, William; Silva, Eric A.; Hamel, Jeffrey, Encoding token commands/data within data streams for standard interfaces.
  94. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  95. Komar, Robert; Shoemaker, Garth B. D.; Tigges, Mark, Fast rendering of pyramid lens distorted raster images.
  96. Shoemaker, Garth B. D., Fisheye lens graphical user interfaces.
  97. Hamid, Laurence, Flexible method of user authentication.
  98. Hamid, Laurence; Hillhouse, Robert D., Flexible method of user authentication.
  99. Hamid, Laurence; Hillhouse, Robert D., Flexible method of user authentication.
  100. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  101. Doyle, Michael; Rupp, Richard; Shoemaker, Garth; Ostler, Collette, Graphical user interface for detail-in-context presentations.
  102. Jetha, Zeenat; Baar, David J. P.; Carlisle, Andrew; Lantin, Maria, Graphical user interface having an attached toolbar for drag and drop editing in detail-in-context lens presentations.
  103. Jetha, Zeenat; Baar, David; Carlisle, Andrew; Lantin, Maria, Graphical user interface having an attached toolbar for drag and drop editing in detail-in-context lens presentations.
  104. Baar, David; Lochner, Timothy; Shoemaker, Garth, Graphical user interface with zoom for detail-in-context presentations.
  105. Shoemaker, Garth B. D.; Tigges, Mark H. A., Graphical user interfaces and occlusion prevention for fisheye lenses with line segment foci.
  106. Shoemaker, Garth B. D.; Tigges, Mark H. A., Graphical user interfaces and occlusion prevention for fisheye lenses with line segment foci.
  107. Shoemaker, Garth B. D.; Tigges, Mark H. A., Graphical user interfaces and occlusion prevention for fisheye lenses with line segment foci.
  108. Takatori, Sunao; Kiyomatsu, Hisanori, Host computer, mobile communication device, program, and recording medium.
  109. Ikegami, Jun, Identification information integrated management system, identification information integrated management server, and computer readable recording medium recording identification information integrated management program thereon.
  110. Delaney, Shawn P.; Summers, Robert, Identifying dynamic groups.
  111. Ford, James Caldwell, Identity management system.
  112. Kondo,Tetsujiro; Ohta,Koji; Tanaka,Kenji; Nakamura,Yukihiro, Individual authentication apparatus, individual authentication method, and computer program.
  113. Irie, Atsushi; Fukuda, Kenji, Individual identification device, and identification threshold setting method.
  114. Kon,Masashi; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Watanabe,Hideaki, Information processing apparatus, information processing method, and program providing medium.
  115. Nasserbakht, Gitty N.; Nasserbakht, Mitra, Information security and privacy system and method.
  116. Bhaskaran, Sajit, Integrated voice biometrics cloud security gateway.
  117. Shoemaker, Garth B. D.; Doyle, Michael; Rupp, Richard; Ostler, Collette, Interacting with detail-in-context presentations.
  118. Baar, David J. P.; Lochner, Timothy; Shoemaker, Garth B. D.; Carlisle, Andrew; Skiers, Andrew; Jetha, Zeenat, Lens-defined adjustment of displays.
  119. Guo, Yinyi; Jin, Minho; Cho, JunCheol; Cho, Yongwoo; Kim, Lae-Hoon; Visser, Erik; Zhang, Shuhua, Liveness determination based on sensor signals.
  120. Goldberg, Jason, Medical monitoring/consumables tracking device.
  121. Nakagawa,Yoshihiro, Medical system with a management software, database, and a network interface to protect patient information from unauthorized personnel.
  122. Sands,Justin M.; Sands,Christopher A.; Sands, Jr.,Arthur J., Method and apparatus for biometric authentication.
  123. Murakami,Rick V.; Hinton,Clark; Pettit,Matthew W., Method and apparatus for calibration over time of histological and physiological biometric markers for authentication.
  124. Arbour, Jr., Richard C.; Fleming, Damon K., Method and apparatus for hand imaging device.
  125. Montgomery, Gregory, Method and apparatus for location-based authorization to access online user groups.
  126. Sengupta,Uttam K.; Deshpande,Nikhil M., Method and apparatus for providing proximity based authentication, security, and notification in a wireless system.
  127. Bjorn,Vance C., Method and apparatus for using a third party authentication server.
  128. Taylor,Wayne, Method and device for verifying a person's identity by signature analysis.
  129. Bodin, William Kress; Burkhart, Michael John; Eisenhauer, Daniel Gene; Schumacher, Daniel Mark; Watson, Thomas James, Method and system for administering devices with multiple user metric spaces.
  130. Bodin, William Kress; Burkhart, Michael John; Eisenhauer, Daniel Gene; Schumacher, Daniel Mark; Watson, Thomas James, Method and system for administering devices with multiple user metric spaces.
  131. White, Conor Robert; Peirce, Michael; Gupta, Gaurav, Method and system for biometric authentication.
  132. Russo, Anthony P., Method and system for biometric image assembly from multiple partial biometric frame scans.
  133. Russo,Anthony P., Method and system for biometric image assembly from multiple partial biometric frame scans.
  134. Baar, David J. P., Method and system for controlling access in detail-in-context presentations.
  135. Lantin, Maria, Method and system for displaying stereoscopic detail-in-context presentations.
  136. Lantin, Maria, Method and system for displaying stereoscopic detail-in-context presentations.
  137. Crosbie,David B., Method and system for enabling seamless roaming in a wireless network.
  138. Baar, David J. P.; Cowperthwaite, David J.; Tigges, Mark H. A., Method and system for enhanced detail-in-context viewing.
  139. Hair, Arthur R.; Gorski, Christopher; Greiner, Charles A., Method and system for establishing a trusted and decentralized peer-to-peer network.
  140. Shoemaker, Garth B. D., Method and system for generating pyramid fisheye lens detail-in-context presentations.
  141. Shoemaker, Garth B. D., Method and system for generating pyramid fisheye lens detail-in-context presentations.
  142. Juitt,David; Bates,Philip; Christoffel,Thomas; Crawshaw,Geoffrey; Crosbie,David, Method and system for managing data traffic in wireless networks.
  143. Cromer,Daryl Carvis; Jankowsky,Joshua James; Locker,Howard Jeffrey; Trotte,Andy Lloyd; Ward,James Peter, Method and system for preboot user authentication.
  144. Tredoux, Gavan Leonard; Harrington, Steven J., Method and system for providing authentication through aggregate analysis of behavioral and time patterns.
  145. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for recording and using a traveler's travel preferences.
  146. Maletsky, Kerry D.; Bohlmann, Nathanael J., Method and system for secure external TPM password generation and use.
  147. Maletsky, Kerry D.; Bohlmann, Nathanael J., Method and system for secure external TPM password generation and use.
  148. Tigges, Mark H. A., Method and system for transparency adjustment and occlusion resolution for urban landscape visualization.
  149. Tigges, Mark H. A., Method and system for transparency adjustment and occlusion resolution for urban landscape visualization.
  150. Tigges, Mark H. A., Method and system for transparency adjustment and occlusion resolution for urban landscape visualization.
  151. Kaleedhass, Karthik; Kaleedhass, Lalitha; Narayanaswamy, Srikanthan, Method and system to electronically identify and verify an individual presenting himself for such identification and verification.
  152. McKeeth, James, Method for controlling user access to an electronic device.
  153. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  154. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  155. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  156. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  157. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  158. Baffes, Paul T.; Garrison, John Michael; Gilfix, Michael; Hsu, Allan; Stading, Tyron Jerrod, Method for providing access control to single sign-on computer networks.
  159. Baffes,Paul T.; Garrison,John Michael; Gilfix,Michael; Hsu,Allan; Stading,Tyron Jerrod, Method for providing access control to single sign-on computer networks.
  160. Cecere, Christopher, Method for secure use of identification cards.
  161. Ackerman,David M., Method for user verification and authentication and multimedia processing for interactive database management and method for viewing the multimedia.
  162. Hillhouse,Robert D., Method of providing an access request to a same server based on a unique identifier.
  163. Royer, Coby, Methods and apparatus for credential validation.
  164. Royer, Coby, Methods and apparatus for credential validation.
  165. Ramaswamy, Ganesh N.; Zilca, Ran; Alecksandrovich, Oleg, Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects.
  166. Ramaswamy, Ganesh N.; Zilca, Ran; Alecksandrovich, Oleg, Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects.
  167. Barbir, Abdulkader; Marian, Radu; Nguyen, Dominique, Methods and processes for storing and utilizing state information for service providers.
  168. Patefield-Smith, Martin; Ahern, James, Methods and systems for conducting smart card transactions.
  169. Ortiz, Luis M.; Lopez, Kermit D., Methods and systems for providing enhanced security over, while also facilitating access through, secured points of entry.
  170. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  171. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  172. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  173. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  174. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  175. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  176. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  177. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  178. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  179. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  180. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  181. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  182. McLaughlin, Brian Smith; Gil, Leonardo B; Tracy, Marshall Joseph; Mitchell, Erik Vaughn; Dixon, Jeffrey Todd, Mobile application security system and method.
  183. Clark, Garrett, Mobile electronic security apparatus and method.
  184. Takatori, Sunao; Kiyomatsu, Hisanori, Modifiable authentication levels in authentication systems for transactions.
  185. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  186. Nasserbakht, Gitty N; Nasserbakht, Mitra, Multi-platform storage and user interface environment.
  187. Junqua,Jean Claude; Morin,Philippe, Multimodal concierge for secure and convenient access to a home or building.
  188. Doyle, Michael; Jetha, Zeenat; Shoemaker, Garth, Navigating digital images using detail-in-context lenses.
  189. Doyle, Michael; Jetha, Zeenat; Shoemaker, Garth B. D., Navigating digital images using detail-in-context lenses.
  190. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  191. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  192. Shoemaker, Garth B. D.; Baar, David J. P.; Solehdin, Ali, Occlusion reduction and magnification for multidimensional data presentations.
  193. Shoemaker, Garth B. D.; Baar, David J. P.; Solehdin, Ali, Occlusion reduction and magnification for multidimensional data presentations.
  194. Shoemaker, Garth B. D.; Baar, David J. P.; Solehdin, Ali, Occlusion reduction and magnification for multidimensional data presentations.
  195. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online electronic health record.
  196. Adams, Neil Patrick; Littlo, Herbert A., Optimized biometric authentication method and system.
  197. Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method and program providing medium.
  198. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  199. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  200. Scheurich,Christoph E., Personal authentication method and apparatus sensing user vicinity.
  201. Ikegami,Jun; Shinzaki,Takashi; Fujii,Yusaku, Personal authentication system and method using biometrics information, and registering apparatus, authenticating apparatus and pattern information input medium for the system.
  202. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  203. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  204. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  205. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  206. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  207. Goldberg, Jason, Personal health management device, method and system.
  208. Arunachalam, Annamalai, Phalangeal authentication device.
  209. Kita, Kazunori, Portable information equipment, authentication device, authentication system and authentication method.
  210. Mathiassen, Svein; Mathiassen, Ivar, Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks.
  211. Ortiz, Luis Melisendro, Random biometric authentication apparatus.
  212. Challener, David C.; Locker, Howard J.; Davis, Mark C.; Cromer, Daryl C.; Springfield, Randall S., Remote registration of biometric data into a computer.
  213. Sinn,Richard P.; Remahl,Thomas B.; Tsang,Andy M., Rule based data management.
  214. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  215. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  216. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  217. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  218. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  219. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  220. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  221. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  222. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  223. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  224. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  225. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  226. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  227. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  228. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  229. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  230. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  231. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  232. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  233. Chemla, Yves; Richard, Christophe, Security device, method and system for financial transactions, based on the identification of an individual using a biometric profile and a smart card.
  234. Nasserbakht, Gitty N; Nasserbakht, Mitra, Security for mobile system.
  235. Dickinson,Alexander G.; Davenport,Roger S.; Ohare,Mark S.; Clough,Philip W.; Rohrbach,Mark D.; Clayton,Richard F.; Zoccoli,James G.; Stark,Gregory H.; Orsini,Rick L.; Ferrante,Michelle; Brooks,Aaron , Server-side implementation of a cryptographic system.
  236. Creamer, Thomas; Jaiswal, Peeyush; Moore, Victor S., Service for providing speaker voice metrics.
  237. Creamer,Thomas E.; Jaiswal,Peeyush; Moore,Victor S., Service for providing speaker voice metrics.
  238. Andreev,Dmitry; Vilshansky,Gregory, Single sign-on method for web-based applications.
  239. Stanko,Joseph A., Single sign-on over the internet using public-key cryptography.
  240. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Single step transaction authentication using proximity and biometric input.
  241. Yach, David P.; Brown, Michael S.; Little, Herbert A., Software code signing system and method.
  242. Fujino, Akio; Takano, Kosei, Software-usage management system, software-usage management method, and computer product.
  243. Arslan, Mustafa Levent, Speaker verification based on acoustic behavioral characteristics of the speaker.
  244. Johansson, Jesper Mikael; Roth, Gregory Branchek; Platz, David Matthew; Vippagunta, Rajendra Kumar, Strong authentication using authentication objects.
  245. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  246. Agarwal,Sachin; Thiyagarajan,Lakshmi V., Support for multiple mechanisms for accessing data stores.
  247. Jain,Vikas; Lee,Michele C., Supporting multiple application program interfaces.
  248. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  249. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  250. Davida, George I.; Frankel, Yair, System and method for authenticated and privacy preserving biometric identification systems.
  251. Leeper,Kim, System and method for authenticating electronic documents.
  252. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  253. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  254. Buer, Mark; Frank, Ed, System and method for authentication via a proximate device.
  255. Ting, David M. T.; Ho, Chen; Shah, Parind; Byragani, Bushan Yadav, System and method for automated login.
  256. Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant; Tapuska, David Francis, System and method for code signing.
  257. McKeeth, James, System and method for controlling user access to an electronic device.
  258. McKeeth, James, System and method for controlling user access to an electronic device.
  259. McKeeth, James, System and method for controlling user access to an electronic device.
  260. McKeeth, James, System and method for controlling user access to an electronic device.
  261. McKeeth, James, System and method for controlling user access to an electronic device.
  262. McKeeth, James, System and method for controlling user access to an electronic device.
  263. Pratt, James; Pearson, Larry; Sullivan, Marc, System and method for device security with a plurality of authentication modes.
  264. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  265. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  266. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  267. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  268. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  269. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  270. Schultz,Paul T.; Sartini,Robert A., System and method for multi-modal authentication using speaker verification.
  271. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  272. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  273. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  274. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  275. White, Conor; Peirce, Michael, System and method for protecting the privacy and security of stored biometric data.
  276. Adams, Neil Patrick; Little, Herbert Anthony; Rybak, Michal Andrzej; Kirkup, Michael Grant; Tapuska, David Francis, System and method for providing an indication of randomness quality of random number data generated by a random data service.
  277. Bolle, Rudolf M.; Pankanti, Sharathchandra U.; Ratha, Nalini K.; Senior, Andrew W., System and method for remote self-enrollment in biometric databases.
  278. Caspi, Rami; Tiruthani, Saravanakumar V., System and method for secure bio-print and access methods.
  279. Buer, Mark; Frank, Ed, System and method for securing data from a remote input device.
  280. Buer, Mark; Frank, Ed, System and method for securing data from a remote input device.
  281. Fedronic, Dominique Louis Joseph; Le Saint, Eric F., System and method for sequentially processing a biometric sample.
  282. Fedronic, Dominique Louis Joseph; Le Saint, Eric F., System and method for sequentially processing a biometric sample.
  283. Fedronic, Dominique Louis Joseph; Le Saint, Eric F., System and method for sequentially processing a biometric sample.
  284. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  285. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  286. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  287. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for upgrading biometric data.
  288. Musgrave, Clyde; Cambier, James L., System and method of fast biometric database searching using digital certificates.
  289. Algazi,Allan Stuart, System and methods for mail security.
  290. Algazi,Allan Stuart, System and methods for transportation and delivery using bar codes.
  291. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  292. Khan,Sal; Levine,Martin, System for transmitting secure data between a sender and a recipient over a computer network using a virtual envelope and method for using the same.
  293. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  294. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  295. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  296. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  297. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  298. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  299. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  300. Griffin, Phillip H., System, method and program product for associating a biometric reference template with a radio frequency identification tag.
  301. Griffin, Phillip H., System, method and program product for checking revocation status of a biometric reference template.
  302. Griffin, Phillip H., System, method and program product for communicating a privacy policy associated with a biometric reference template.
  303. Griffin, Phillip H., System, method and program product for communicating a privacy policy associated with a radio frequency identification tag and associated object.
  304. Griffin, Phillip H., System, method and program product for generating a cancelable biometric reference template on demand.
  305. Griffin, Phillip H., System, method and program product for recording creation of a cancelable biometric reference template in a biometric event journal record.
  306. Jun, Moon-Seog, System, terminal, and method for digital electrocardiogram authentication.
  307. Oakes, III, Charles Lee, Systems and methods for biometric e-signature.
  308. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  309. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  310. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  311. LaCous,Mira K., Systems and methods for secure biometric authentication.
  312. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  313. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  314. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  315. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  316. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  317. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  318. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  319. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  320. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  321. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  322. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  323. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  324. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  325. Abraham, Magid; Carnes, Jeffrey; Disch, Jason; Larrison, James, Systems for and methods of user demographic reporting usable for identifying users and collecting usage data.
  326. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  327. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  328. Smith, Ned M., Technologies for synchronizing and restoring reference templates.
  329. Smith, Ned M., Technologies for synchronizing and restoring reference templates.
  330. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  331. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  332. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  333. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  334. Hoffman,Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  335. Takaragi,Yoichi, Transmission of information to a reproduction device having user identification by organism information of a specified type.
  336. Tigges, Mark H. A., Transparency adjustment of a presentation.
  337. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  338. LaCous,Mira, Trusted biometric device.
  339. Giobbi, John J., Two-level authentication for secure transactions.
  340. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Two-level authentication for secure transactions.
  341. Ha,Tai Dong; Jun,Jae Hyun; Chang,Woo Seok; Kang,Young Mi; Lee,Dong Won, User authenticating system and method using one-time fingerprint template.
  342. Holz, Christian; Knaust, Marius; Ayyangar, Rajiv; Buthpitiya, Senaka; Jin, Haojian, User authentication and data encryption.
  343. Lee,Jong ha; Hwang,Eui hyeon, User authentication method and apparatus.
  344. Zhang, Xiang; Lu, Li; Wang, Eryu; Yue, Shuai; Rao, Feng; Liu, Haibo; Li, Lou; Lu, Duling; Chen, Bo, User authentication method and apparatus based on audio and video data.
  345. Moh'd Abdel-Hamid Hasan, Voice enabled system for remote access of information.
  346. Grover, Noel, Voice print identification portal.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로