$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • H04L-029/08
  • G06F-017/18
  • G06F-017/30
출원번호 US-0882340 (2015-10-13)
등록번호 US-10091312 (2018-10-02)
발명자 / 주소
  • Khanwalkar, Manoj
  • Camacho, Adler
  • Van Lare, Stephen
  • Winkler, Omer
  • Tuttle, Luke David
  • Patel, Surag I.
출원인 / 주소
  • THE 41ST PARAMETER, INC.
대리인 / 주소
    Knobbe, Martens, Olson & Bear, LLP
인용정보 피인용 횟수 : 0  인용 특허 : 332

초록

An electronic device identifier mapping and resolution system are disclosed which may be used to analyze various device identifiers associated with an online event initiated by a particular device in applying a matching algorithm to determine a unique device identifier and/or device profile for the

대표청구항

1. A computing system, comprising: one or more hardware computer processors;a network interface providing data communication with(1) a first electronic data store configured to store a plurality of matching algorithms associated with a corresponding plurality of online requesting entities, the plura

이 특허에 인용된 특허 (332)

  1. Eisen, Ori; Pandich, Steve; Yalov, Raz, 2D web trilateration.
  2. Kroll Mark William, ATM signature security system.
  3. Yang, Linyu; Milana, Joseph P., Account-level fraud detector and associated methods.
  4. Pritchard,James B.; Calcote,Clyde R., Apparatus and method for protecting a computer system.
  5. Cho Sung-Zoon,KRX ; Han Dae-Hee,KRX, Apparatus for authenticating an individual based on a typing pattern by using a neural network system.
  6. Nyström, Magnus; Rundgren, Anders; Duane, William M., Authentication method and apparatus utilizing proof-of-authentication module.
  7. Ohmori, Motoji; Ohara, Shunji; Katayama, Takashi, Authentication server, method and system for detecting unauthorized terminal.
  8. Labrou, Yannis; Agre, Jonathan Russell, Authentication services using mobile device.
  9. Sakakihara, Hironori; Honda, Fumio; Iwamatsu, Noboru; Ishikawa, Kiyohiko; Sunasaki, Shunji; Fujii, Arisa, Authentication system, authentication device and recording medium.
  10. Vaiciulis, Anthony; Peranich, Larry; Mayer, Uwe; Zoldi, Scott; De Zilwa, Shane, Automated entity identification for efficient profiling in an event probability prediction system.
  11. Vaiciulis, Anthony; Peranich, Larry; Mayer, Uwe; Zoldi, Scott; De Zilwa, Shane, Automated entity identification for efficient profiling in an event probability prediction system.
  12. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated fraud management in transaction-based networks.
  13. Ryman-Tubb, Nick F.; Chartier, Bernard, Automatic rule discovery from large-scale datasets to detect payment card fraud using classifiers.
  14. Heaven,John; Steinman,Shane; Staples,David; Hunt,Cliff, Biometric rights management system.
  15. Blume, Matthias; Harris, Bruce D., Cardholder localization based on transaction data.
  16. Hirao Kouichirou,JPX ; Yamada Keiji,JPX ; Hongu Takahiro,JPX ; Mochizuki Takashi,JPX ; Arai Mitsutoshi,JPX, Character recognition apparatus and method for recognizing characters.
  17. Tyler, Michael; Saifee, Moiz; Basant, Nitin; Rahman, Shafi, Characterizing relationships among procedures using similarity metrics.
  18. Hills Robert R. ; Nichols Henry R., Check writing point of sale system.
  19. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Classifying a message based on fraud indicators.
  20. Zwicky, Richard Kazimierz, Click fraud detection.
  21. Barber, Timothy P., Collecting information regarding consumer click-through traffic.
  22. Crooks, Theodore J.; Mayer, Uwe F.; Lazarus, Michael A., Comprehensive identity protection system.
  23. Crooks, Theodore J.; Mayer, Uwe F.; Lazarus, Michael A., Comprehensive identity protection system.
  24. Crooks, Theodore J.; Mayer, Uwe F.; Lazarus, Michael A., Comprehensive identity protection system.
  25. Crooks, Theodore J., Comprehensive online fraud detection system and method.
  26. Ma, Jianjie; Boding, Benjamin Scott; Bushart, Shawna, Computer-based collective intelligence recommendations for transaction review.
  27. Jeppesen John C. (82209 Edison Ventura CA 93001), Computerized court reporting system.
  28. Osbourn, Gordon C.; Bouchard, Ann M., Computing environment logbook.
  29. Pathria, Anu K; Allmon, Andrea L; de Traversay, Jean; Ianakiev, Krassimir G; Suresh, Nallan C; Tyler, Michael K, Consistency modeling of healthcare claims to detect fraud and abuse.
  30. Crichton, Mark A.; Townsend, James J., Consumer internet authentication device.
  31. Baird,Roger T.; Baird,Jeffrey C.; Blair,Timothy P., Controlling the distribution of information.
  32. Lunde, Ron; Lulich, Daniel; Pierson, Greg, Creating and verifying globally unique device-specific identifiers.
  33. Miller, Paul Timothy; Tuvell, George Allen, Cryptographic security functions based on anticipated changes in dynamic minutiae.
  34. Miller, Paul Timothy; Tuvell, George Allen, Cryptographic security functions based on anticipated changes in dynamic minutiae.
  35. Miller, Paul Timothy; Tuvell, George Allen, Cryptographic security functions based on anticipated changes in dynamic minutiae.
  36. Pauley, Jr., Wayne A.; Todd, Stephen; Baldwin, Rhonda; Dietrich, David, Data analytics lifecycle automation.
  37. Khambete, Prasad M.; Tenneti, Sanjeev, Data collection and targeted advertising systems and methods.
  38. Milana, Joseph P., Data transaction profile compression.
  39. Anderson Douglas D. ; Anderson Mary E. ; Urban Carol Oman ; Urban Richard H., Debit card fraud detection and control system.
  40. Tollinger, Preston; Dusing, Brent, Delivering targeted advertising to mobile devices.
  41. Tollinger, Preston; Dusing, Brent, Delivering targeted advertising to mobile devices.
  42. Duane, William; Hamel, Jeffrey, Derivative seeds.
  43. Anderson, Russell; Peranich, Larry S.; Dungca, Ricardo M.; Milana, Joseph P.; Shao, Xuhui; Dulany, Paul C.; Hassibi, Khosrow M.; Baker, James C., Detecting and measuring risk with predictive models using content mining.
  44. Anderson,Russell; Peranich,Larry S; Dungca,Ricardo; Milana,Joseph P; Shao,Xuhui; Dulany,Paul C; Hassibi,Khosrow M; Baker,James C, Detecting and measuring risk with predictive models using content mining.
  45. Rothstein, Jesse Abraham; Mukerji, Arindum, Detecting anomalous network application behavior.
  46. Kulkarni, Rajandra Laxman; Bhatt, Vijay C.; Singh, Stephen; Tonelli, Dan; Greenberg, Adam, Detecting fraudulent activity on a network.
  47. Barber, Timothy P., Detecting online fraud by proxy piercing to identify address of a user device involved in an online transaction.
  48. Luk, Ho Ming; Coates, Pamela E.; Deo, Arati S.; Downs, Sean M.; Friesen, Benjamin A.; Nies, Craig A.; Pathria, Anu K., Detection of insurance premium fraud or abuse using a predictive software system.
  49. Sheynblat, Leonid; Oliva, Elio J.; Rose, Gregory G., Device and process for unique internet access identification.
  50. Williams, Charles, Device with GPS to manage risk for financial transactions.
  51. Gifford David K., Digital active advertising.
  52. Kloor, Harry Thomas, Dual transaction authorization system and method.
  53. Fields, Helen, Dynamic aggregation of payment transactions.
  54. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  55. Leppanen, Jarmo; Oosthuizen, Ockert, Electronic blasting capsule.
  56. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  57. Eisen,Bruce; Padayao,Roger; Kassis,Wasef; Lucas, IV,James E., Electronically distributing promotional and advertising material based upon consumer internet usage.
  58. Barber, Timothy P., Establishing unique sessions for DNS subscribers.
  59. Barber, Timothy P., Establishing unique sessions for DNS subscribers.
  60. Barber, Timothy P., Establishing unique sessions for DNS subscribers.
  61. Barber, Timothy P., Establishing unique sessions for DNS subscribers.
  62. Barber, Timothy P., Establishing unique sessions for DNS subscribers.
  63. Utin, Daniil, Fixed client identification system for positive identification of client to server.
  64. Utin, Daniil, Fixed client identification system for positive identification of client to server.
  65. Utin,Daniil, Fixed client identification system for positive identification of client to server.
  66. Greene, Todd; Helsper, David, Fraud analyst smart cookie.
  67. Greene, Todd; Helsper, David, Fraud analyst smart cookie.
  68. Crooks, Theodore J., Fraud clearinghouse.
  69. Miltonberger, Tom, Fraud detection and analysis.
  70. Miltonberger, Tom, Fraud detection and analysis.
  71. Zoldi, Scott M.; Li, Hua; Xue, Xinwei, Fraud detection based on efficient frequent-behavior sorted lists.
  72. Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
  73. Helsper, David; Maicon, Dennis, Fraud risk advisor.
  74. Helsper,David; Maicon,Dennis, Fraud risk advisor.
  75. Helsper,David; Maicon,Dennis, Fraud risk advisor.
  76. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Fraudulent message detection.
  77. Oliver,Jonathan; Eikenberry,Scott D.; Budman,Gleb; Kim,Bryan, Fraudulent message detection.
  78. Rowland,Craig; Sandford,Adam; Balakrishnan,Shobana; McCasey,Mark, Generating globally unique device identification.
  79. Zoldi, Scott M.; Wu, Steven; Chen, Fei, Generic fraud detection model.
  80. Wong, Bernard; Goel, Samir; Jain, Ravi, Geographically localizing mobile communciation devices.
  81. Tyler, Michael; Basant, Nitan; P, Robin; Rahman, Shafi, Healthcare insurance claim fraud detection using datasets derived from multiple insurers.
  82. Lee, Walter W.; Milana, Joseph P.; Wilhelm, Wesley K.; Shao, Min, Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites.
  83. Lee,Walter W.; Milana,Joseph P.; Wilhelm,Wesley K.; Shao,Min, Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites.
  84. Barber, Timothy P., Identifying and marketing to a user device involved in an online transaction.
  85. Brown, Andrew Millard; Henley, Mathew Gene; Lalonde, Chris, Identifying fraudulent activities and the perpetrators thereof.
  86. Yan, Weipeng; Tokusei, Kentaro, Identifying spurious requests for information.
  87. Jakobsson,Markus; Juels,Ari; Kaliski, Jr.,Burton S., Identity authentication system and method.
  88. Hsieh Jiang (Waukesha WI), Image reconstruction apparatus and method for helical scanning.
  89. Brian T. Berkowitz ; Sreenivas Simhadri ; Peter A. Christofferson ; Gunnar Mein, In-memory database system.
  90. Johannsen, Eric A, Incremental browser-based device fingerprinting.
  91. Johannsen, Eric A., Incremental browser-based device fingerprinting.
  92. Diev, Vesselin; Kumar, Shailesh; Zoldi, Scott M., Incremental factorization-based smoothing of sparse multi-dimensional risk tables.
  93. Thakur, Aman; Hughes, Jeffrey A.; Suri, Sanjay, Indicating irregularities in online financial transactions.
  94. Owaki Hidetaka,JPX ; Nagashima Takeshi,JPX ; Kageyama Yukitoshi,JPX, Information processing apparatus with security checking function.
  95. Abe, Makoto; Sekiya, Shuichi; Fukuzawa, Yuji, Information processing system, information communication terminal and method, information processing apparatus and method, recording medium, and program for internet transaction.
  96. Kawai, Takao; Doi, Shinichi; Ando, Shinichi; Sadamasa, Kunihiko; Matsukawa, Yoshiko, Information providing system, method of providing information and program for providing information.
  97. Matsuzaki, Natsume; Yokota, Kaoru; Nonaka, Masao, Information security device.
  98. Lappington John P. ; Marshall Susan K. ; Yamamoto Wayne Y. ; Wilson Cameron A. ; Berkobin Eric C. ; Simons Richard S., Interactive television security through transaction time stamping.
  99. Mark W. Kroll, Keyboard signature security system.
  100. Schweig,Marc E., Keyboard, mouse, and video (KVM) session capture system that stores and can playback portions of live KVM session via forensic capture module.
  101. Eisen, Ori, Keystroke analysis.
  102. Torres,Jose, Knowledge management system.
  103. Roese, John J.; Graham, Richard W.; Frattura, David; Durand, Roger P.; Gorsky, John-Paul; Harrington, David, Locating devices in a data network.
  104. Ashfield, James; Shroyer, David; Brown, Douglas, Location based authentication of mobile device transactions.
  105. Stevens, Gilman R., Location based authorization of financial card transactions systems and methods.
  106. Bolon, Brian R.; Bull, Jeffrey F.; Ward, Matthew L., Location intelligence management system.
  107. Foltak,Richard; Cheng,Lio, Maintaining a common AAA session id for a call over a network.
  108. Zoldi, Scott M.; Wang, Liang; Sun, Li; Wu, Steven G., Mass compromise/point of compromise analytic detection and compromised card portfolio management system.
  109. Zoldi, Scott M.; Wang, Liang; Sun, Li; Wu, Steven G., Mass compromise/point of compromise analytic detection and compromised card portfolio management system.
  110. Morea,Dominic John; Zirkel,George S.; Duncan,John; Citarella,Steven, Merchant account activation system.
  111. Griegel, David; Yang, Linyu; Li, Danfeng; Zhang, Bo; Milana, Joseph; Zhang, Zuohua; Gancarz, Gregory, Method and apparatus for a merchant profile builder.
  112. Kermani, Bahram Gaffarzadeh, Method and apparatus for achieving secure password access.
  113. Mullen, Paul; Stratton, Gregory C., Method and apparatus for acquisition and analysis of non-imaging data collected during ultrasound exam.
  114. Stephens,Spencer; Cookson,Christopher; Dages,Chuck, Method and apparatus for approximating location of node attached to a network.
  115. Gasparini,Louis A; Gotlieb,Charles E, Method and apparatus for authentication of users and web sites.
  116. Mizushima Hiroshi (Yokohama JPX), Method and apparatus for changing screen image data based on cursor movement relative to a preset mark on the screen.
  117. Grossman, David Daniel; Lamka, F. Neil; Seaburn, Matthew L., Method and apparatus for credit brokering for point-of-sale leasing.
  118. Jimenez, Michael Pe; King, Jeffrey Leroy; Strout, Theodore Arthur; Harding, Timothy Robert, Method and apparatus for custom strategy specification in a hosted electronic transaction service system.
  119. Jimenez, Michael Pe; King, Jeffrey Leroy; Strout, Theodore Arthur; Harding, Timothy Robert, Method and apparatus for custom strategy specification in a hosted electronic transaction service system.
  120. Jimenez, Michael Pe; King, Jeffrey Leroy; Strout, Theodore Arthur; Harding, Timothy Robert, Method and apparatus for custom strategy specification in a hosted electronic transaction service system.
  121. Pe Jimenez,Michael; King,Jeffrey Leroy; Strout,Theodore Arthur; Harding,Timothy Robert, Method and apparatus for custom strategy specification in a hosted electronic transaction service system.
  122. Reumann, John; Verma, Dinesh C., Method and apparatus for detecting computer fraud.
  123. Reumann, John; Verma, Dinesh C., Method and apparatus for detecting computer fraud.
  124. Gossett, Phil; Ratner, Edward, Method and apparatus for digital image segmentation using an iterative method.
  125. Lewis, Michael; King, Frank; Arnold, Thomas; Wright, William; Pettit, John, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  126. Lewis,Michael; King,Frank; Arnold,Thomas; Wright,William; Pettit,John, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  127. Wright, William; Hu, Hung-Tzaw, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  128. Wright, William; Hu, Hung-Tzaw, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  129. Stolfo Salvatore J., Method and apparatus for imaging, image processing and data compression.
  130. Hawkes, Michael, Method and apparatus for internet web site accreditation.
  131. Dockter Michael Jon ; Farber Joel Frank ; Lynn Ronald William ; Richardt Randal James, Method and apparatus for multi-level security evaluation.
  132. Ennis ; Jr. James D. (Gaithersburg MD) Hasselkus John E. (Germantown MD) Nisbet Thomas R. (Ellicott City MD) Troutman Robert (Gaithersburg MD), Method and apparatus for non-intrusive measurement of round trip delay in communications networks.
  133. Aucsmith David, Method and apparatus for producing computer platform fingerprints.
  134. Keene,Catherine M.; Lin,Raymond; Sadhureddly,Rao, Method and apparatus for providing controlled access to software objects and associated documents.
  135. Wall Gerard A. ; Ruberg Alan T. ; Hanko James G. ; Northcutt J. Duane ; Butcher Lawrence L., Method and apparatus for session management and user authentication.
  136. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  137. Brown Marcus E. (Tuscaloosa AL) Rogers Samuel J. (Breckenridge TX), Method and apparatus for verification of a computer user\s identification, based on keystroke characteristics.
  138. Young James R. (Palo Alto CA) Hammon Robert W. (San Jose CA), Method and apparatus for verifying an individual\s identity.
  139. Walker Jay S. ; Schneier Bruce ; Jindal Sanjay K. ; Tedesco Daniel E., Method and device for generating a single-use financial account number.
  140. Kowalchyk, Eric F.; Mo, See Yew; Lu, Jimmy M.; Buddhavarapu, Satish; Power, Michael J.; Mako, Janos Z., Method and system for assessing merchant risk during payment transaction.
  141. Yellin, Eric; Moon, Susan; Etuk, Ntiedo, Method and system for associating consumers with purchase transactions.
  142. Dharmarajan,Baskaran, Method and system for authorizing a client computer to access a server computer.
  143. Kanojia,Chaitanya; Kamenstky,Lee; Hall,Peter; Copeman,Ian, Method and system for content profiling and activation.
  144. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  145. Barber, Timothy P.; De Payne, Lewis, Method and system for creation and validation of anonymous digital credentials.
  146. Barber, Timothy P.; De Payne, Lewis, Method and system for creation and verification of anonymous digital credentials.
  147. Pettitt,John Philip, Method and system for detecting fraud in a credit card transaction over a computer network.
  148. Pettitt John Philip, Method and system for detecting fraud in a credit card transaction over the internet.
  149. Pettitt, John Philip, Method and system for detecting fraud in a credit card transaction over the internet.
  150. Sarkar, Shantanu; Fry, Steven G.; Chan, Johnny C., Method and system for determining a relative position of a device on a network.
  151. Teppler, Steven W., Method and system for determining and maintaining trust in digital data files with certifiable time.
  152. Eisen,Ori, Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements.
  153. Dawson, Thomas Patrick, Method and system for dynamically allocating a frame buffer for efficient anti-aliasing.
  154. Lamm David, Method and system for electronically presenting and paying bills.
  155. Clough,Ian, Method and system for enhanced security using location-based wireless authentication.
  156. Eisen, Ori, Method and system for identifying users and detecting fraud by use of the internet.
  157. Eisen, Ori, Method and system for identifying users and detecting fraud by use of the internet.
  158. Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
  159. Thomas, Scott; Jones, David G., Method and system for processing a stream of information from a computer network using node based reputation characteristics.
  160. Dominguez, Benedicto, Method and system for processing and authenticating internet purchase transactions.
  161. Osbourn, Gordon Cecil; Bouchard, Ann Marie, Method and system for rendering and interacting with an adaptable computing environment.
  162. Sixtus Timothy, Method and system for secure online transaction processing.
  163. Kuang, Randy; Xavier, Stanislus Kisito; Mann, David Michael, Method and system for securing electronic transactions.
  164. Thomas, Scott; Jones, David G., Method and system for tracking machines on a network using fuzzy GUID technology.
  165. Thomas, Scott; Jones, David G., Method and system for tracking machines on a network using fuzzy guid technology.
  166. Dujari,Rajeev; Wang,Biao; Hawkins,John M.; Rouskov,Yordan; Erdogan,Samim, Method and system of integrating third party authentication into internet browser code.
  167. Haumont,Serge; Kari,Hannu; Kanerva,Mikko, Method and system of providing a service to a subscriber.
  168. Zuili, Patrick, Method and system to detect invalid and fraudulent impressions and clicks in web-based advertisement systems.
  169. Felger David, Method for billing and controlling fraud in providing pay information services.
  170. Felger David, Method for billing and controlling fraud in providing pay information services.
  171. Barber, Timothy P., Method for billing for services delivered over a computer network.
  172. Thomsen, Brant D., Method for detecting unauthorized network access by having a NIC monitor for packets purporting to be from itself.
  173. Southard,David A.; Bell,Lowell F.; Aucoin,Michael A.; Gouin,Fr챕d챕ric; Cannaday, Jr.,Theodore H., Method for digital transmission and display of weather imagery.
  174. Mu, Ruicao; Hu, Tie, Method for fingerprinting and identifying internet users.
  175. Mu, Ruicao; Hu, Tie, Method for fingerprinting and identifying internet users.
  176. Huffman, Stephen Mark; Reifer, Michael Henry, Method for geolocating logical network addresses.
  177. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  178. Linden, John; Teeter, Tobias, Method for performing real-time click fraud detection, prevention and reporting for online advertising.
  179. Sengupta, Arijit, Method for processing documents containing restricted information.
  180. Barber, Timothy P., Method for secure, closed-loop money transfer via electronic mail.
  181. Thomas, Scott; Jones, David G.; Faulkner, Alisdair, Method for tracking machines on a network using multivariable fingerprinting of passively available information.
  182. Thomas, Scott; Jones, David G; Faulkner, Alisdair, Method for tracking machines on a network using multivariable fingerprinting of passively available information.
  183. King,Douglas W., Method of and system for making purchases over a computer network.
  184. Korb,Joseph; Odom,Jesse; Rein,David, Method of and system for transferring data over a wireless communications network.
  185. Felger, David, Method of billing a communication session conducted over a computer network.
  186. Felger,David, Method of billing a communication session conducted over a computer network.
  187. Felger,David, Method of billing a communication session conducted over a computer network.
  188. Felger David, Method of billing a multiple service representative conference call.
  189. Felger, David, Method of billing a purchase made over a computer network.
  190. Felger, David, Method of billing a purchase made over a computer network.
  191. Felger, David, Method of billing a purchase made over a computer network.
  192. Felger David, Method of billing a value-added call.
  193. Boulware, Van W., Method of conducting anti-fraud electronic bank security transactions having price-date-time variables and calculating apparatus thereof.
  194. Curry Stephen M. ; Loomis Donald W. ; Fox Christopher W., Method, apparatus, system and firmware for secure transactions.
  195. Rosenoer, Jonathan M. C., Method, system and program product for authenticating a user seeking to perform an electronic service request.
  196. Baldev Krishan ; Leo Chien Chang ; Ronald G. Lambert, Methods and apparatus for delivering targeted information and advertising over the internet.
  197. Eisen, Ori, Methods and apparatus for detecting fraud with time based computer tags.
  198. Eisen, Ori; Yalov, Raz, Methods and apparatus for securely displaying digital images.
  199. Eisen, Ori; Yalov, Raz, Methods and apparatus for securely displaying digital images.
  200. Eisen, Ori; Yalov, Raz, Methods and apparatus for securely displaying digital images.
  201. Lulich, Daniel P.; Pierson, Greg; Lunde, Ron, Methods and apparatus for securely signing on to a website via a security website.
  202. Shraim,Ihab; Shull,Mark, Methods and systems for analyzing data related to possible online fraud.
  203. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  204. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  205. Katz, Elazar, Methods and systems for fraud containment.
  206. Eisen, Ori; Yalov, Raz, Methods and systems for persistent cross-application mobile device identification.
  207. Eisen, Ori; Yalov, Raz, Methods and systems for persistent cross-application mobile device identification.
  208. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Methods used in a mass storage device with automated credentials loading.
  209. Zhu, Bin; Feng, Min; Yin, Xu; Yang, Yang; Zhang, Yao; Shao, Jun, Mobile device assisted secure computer network communication.
  210. Ryu, Gung-seon; Shin, Jung-wook; Lim, Su-jin, Multi-step authentication-based electronic payment method using mobile terminal.
  211. Gerber, Gary E.; Lee, Timothy Mu-Chu, Multiple party benefit from an online authentication service.
  212. Felger David, Multiple service representative conferencing apparatus and method.
  213. Zoldi, Scott M.; Balon, Michael P., Network assurance analytic system.
  214. Zoldi, Scott M.; Balon, Michael P., Network assurance analytic system.
  215. Beyda, Gil; Balasubramanian, Krishna; Locker, Donald J.; McDonald, Kevin M.; Wilson, Joseph G.; Morgan, David R.; Lowry, Alison P.; Smith, Charles C., Network for matching an audience with deliverable content.
  216. Katzir, Ziv, Network identity clustering.
  217. Pierson, Greg; DeHaan, Jason, Network security and fraud detection system and method.
  218. Pierson, Greg; DeHaan, Jason, Network security and fraud detection system and method.
  219. Pierson, Greg; DeHaan, Jason, Network security and fraud detection system and method.
  220. Pierson,Greg; DeHaan,Jason, Network security and fraud detection system and method.
  221. Vortriede Eric Gordon, Non-extensible thin server that generates user interfaces via browser.
  222. Rajasekaran, Sanguthevar; Varadarajan, Rammohan, One-time credit card number generator and single round-trip authentication.
  223. Barber, Timothy P., Online machine data collection and archiving process.
  224. Barber,Timothy P., Online machine data collection and archiving process.
  225. Ponte, Jay Michael, Page aggregation for web sites.
  226. Teppler, Steven W., Personal computer system and methods for proving dates in digital data files.
  227. Smith David B., Personal identification number security system incorporating a time dimension.
  228. Ott, IV, Edward Stanley; Hayashi, Nathanael Joe; Fukuda, Matt, Podcast search engine.
  229. Anderson, Glen J., Pressure password input device and method.
  230. Borthwick, Andrew E., Probabilistic record linkage model derived from training data.
  231. Iyengar, Arun K; Srivatsa, Mudhakar; Yin, Jian, Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages.
  232. Barber, Timothy P., Proxy piercing for identifying address of and marketing to a user device involved in an online transaction.
  233. Hu, Hung-Tzaw; Eaton, Jason; Boding, Scott; Ma, Jianji, Real time adaptive control of transaction review rate score curve.
  234. Hu, Hung-Tzaw; Eaton, Jason; Boding, Scott; Ma, Jianji, Real time adaptive control of transaction review rate score curve.
  235. Wilf Saar,ILX ; Ruvio Guy,ILX, Retail method over a wide area network.
  236. Gopinathan Krishna M. ; Jost Allen ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K., Risk determination and management using predictive modeling and transaction profiles for individual transacting entities.
  237. Amin, Umesh J.; Redden, Michael, Roaming authorization system.
  238. Lee, Walter W.; Shoham, Daniel; Wilhelm, Wesley K.; Milana, Joseph P.; Jost, Allen P., Score based decisioning.
  239. Lee,Walter W.; Shoham,Daniel; Wilhelm,Wesley K.; Milana,Joseph P.; Jost,Alan P., Score based decisioning.
  240. Jalili Reza, Secure data entry and visual authentication system and method.
  241. Rao,Raman; Rao,Rekha; Rao,Sunil, Secure system for electronic voting.
  242. Barber, Timothy P., Secure transfer of value via electronic stamp.
  243. Law,Simon; Hapuarachchi,Pasan; Tse,Daniel Man; Law,Jimmy, Secure wireless authorization system.
  244. Barber, Timothy P., Secure, closed-loop electronic transfer of money.
  245. Tan Jeanette C. (21600 Cleardale St. Santa Clarita CA) Iggulden Jerry R. (21600 Cleardale St. Santa Clarita CA 91321) Streck Donald A. (832 Country Dr. Ojai CA 93023), Security facsimile systems.
  246. Arkady G. Zilberman, Security method and apparatus employing authentication by keystroke dynamics.
  247. Chang Sheueling ; Marks Stuart, Security system and method for financial institution server and client web browser.
  248. Taylor Geoffrey L. (211 Oak Street Winnipeg ; Manitoba CAX R3M 3P7), Security system method and article for photocopiers and telefax machines.
  249. Barker, John C.; McGraw, Montomgery C.; Sturgeon, Derrill L., Selective document scanning method and apparatus.
  250. Barker,John C.; McGraw,Montomgery C.; Sturgeon,Derrill L., Selective document scanning method and apparatus.
  251. Handley, John C.; Buckley, Robert R., Selective encryption of mixed raster content layers.
  252. Zoldi, Scott M.; Wu, Steven; Chen, Fei, Self-calibrating fraud detection.
  253. Li, Xiang; Zoldi, Scott M.; Athwal, Jehangir, Self-calibrating outlier model and adaptive cascade model for fraud detection.
  254. Lawyer,Justin; Barclay,Alex; Englund,Dirk; Holmes,Robert; Pathria,Dimpy; Roach,Tim; Zoldi,Scott, Self-learning real-time prioritization of fraud control actions.
  255. Lawyer, Justin; Barclay, Alex; Englund, Dirk; Holmes, Robert; Pathria, Dimpy; Roach, Tim; Zoldi, Scott, Self-learning real-time prioritization of telecommunication fraud control actions.
  256. Lawyer, Justin; Barclay, Alex; Englund, Dirk; Holmes, Robert; Pathria, Dimpy; Roach, Tim; Zoldi, Scott, Self-learning real-time prioritization of telecommunication fraud control actions.
  257. Lawyer,Justin; Barclay,Alex; Englund,Dirk; Holmes,Robert; Pathria,Dimpy; Roach,Tim; Zoldi,Scott, Self-learning real-time prioritization of telecommunication fraud control actions.
  258. Suresh, Nallan; de Traversay, Jean; Gollamudi, Hyma; Ianakiev, Krassimir G.; Pathria, Anu Kumar; Tyler, Michael K., Sequencing models of healthcare related states.
  259. Suresh,Nallan C; de Traversay,Jean; Gollamudi,Hyma; Ianakiev,Krassimir G; Pathria,Anu K; Tyler,Michael K, Sequencing models of healthcare related states.
  260. Yamauchi,Tadashi, Service providing system with automatic transaction apparatus.
  261. Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
  262. Maher,Philip, System and method for application management through threshold events.
  263. Gasparinl,Louis A; Gotlieb,Charles E, System and method for authentication of users and web sites.
  264. Klein, Amit; Heled, Ronen, System and method for conducting secure transactions.
  265. Yamaguchi,Keisuke; Komaki,Kenjiro; Masuda,Masaru; Shimada,Muneki; Kazuhiro,Kanee; Kimoto,Yousuke; Kannari,Shingo, System and method for controlling communication using device ID.
  266. Klein, Amit, System and method for detecting a proxy between a client and a server.
  267. Klein, Amit; Golan, Zohar, System and method for detecting and mitigating DNS spoofing trojans.
  268. Bowman William B. (Herndon VA), System and method for detecting fraudulent network usage patterns using real-time network monitoring.
  269. Klein, Amit; Heled, Ronen; Golan, Lior, System and method for detecting fraudulent transactions.
  270. Padmanabhan, Venkata N.; Subramanian, Lakshminarayanan, System and method for determining the geographic location of internet hosts.
  271. Padmanabhan,Venkata N.; Subramanian,Lakshminarayanan, System and method for determining the geographic location of internet hosts.
  272. Silverman, Robert M., System and method for determining the location of remote devices.
  273. Wheeler,David B.; Ripley,John R.; Leury,Paul; Wotring,Steven C., System and method for determining user identity fraud using similarity searching.
  274. Ciaramitaro,Barbara L.; Gruskin,Michael A.; Wolfe,Edward C., System and method for electronically managing privileged and non-privileged documents.
  275. Roskind, James A., System and method for establishing historical usage-based hardware trust.
  276. Roskind, James A., System and method for establishing historical usage-based hardware trust.
  277. Roskind,James A., System and method for establishing historical usage-based hardware trust.
  278. Barber, Timothy P., System and method for fast component enumeration in graphs with implicit edges.
  279. Varghese, Thomas Emmanual; Fisher, Jon Bryan; Harris, Steven Lucas; Durai, Don Bosco, System and method for fraud monitoring, detection, and tiered user authentication.
  280. Bernard Thomas Laybourn GB; Theodore W. Watler, System and method for managing prepaid wireless service.
  281. Boesch Brian ; Farrell Patrick ; Light Elliott ; Eisenberg R. Scott, System and method for merchant invoked electronic commerce.
  282. Fritz,Adam T.; Wang,Yiqing, System and method for preventing automated programs in a network.
  283. Teunen,Remco, System and method for providing improved claimant authentication.
  284. Link, II, Charles M.; Cardina, Donald M.; Meadows, Vernon, System and method for providing short message targeted advertisements over a wireless communications network.
  285. Donner, Irah H., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  286. Donner,Irah H.; Donner,Zachary J.; Donner,Jason J., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  287. Bennett, Naftali; Golan, Lior; Rivner, Nira, System and method of fraud reduction.
  288. Hughes, Scott T.; Milne, Matthew W., System and method of receiving advertisement content from advertisers and distributing the advertising content to a network of personal computers.
  289. Nanopoulos, Andrew; Ackerman, Karl; Bowness, Piers; Duane, William; Jakobsson, Markus; Kaliski, Burt; Pal, Dmitri; Rice, Shane D.; Rivest, Ronald L., System and method providing disconnected authentication.
  290. Avni, Yossi; Suchard, Eytan, System for and method of web signature recognition system based on object map.
  291. Anderson Douglas D. ; Urban Michael J. ; Deterding Eric L. ; Urban Richard H., System for detecting counterfeit financial card fraud.
  292. Tedesco,Daniel E.; Jorasch,James A.; Gelman,Geoffrey M.; Walker,Jay S.; Tulley,Stephen C.; O'Neil,Vincent M.; Alderucci,Dean P., System for image analysis in a network that is structured with multiple layers and differentially weighted neurons.
  293. Choti, Joseph Francis; Shaffer, Justin Alexander; Sun, Christopher; Willis, Shadeed S., System for verifying access based on a determined geographic location of a subscriber of a service provided via a computer network.
  294. Guan, Devin; Li, Xiang; Cotta, Randy; Bafna, Rahul; Venkatesan, Obuli, System to group internet devices based upon device usage.
  295. Zorba Alexander ; Rosenfeld Eren Tolga ; Bertrand Benoit Patrick,CAX ; Lannert Eric Jeffrey ; Wills Kerry Russell, System, method and article of manufacture for a simulation enabled accounting tutorial system.
  296. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., System, method and computer program product for risk assessment scanning based on detected anomalous events.
  297. Jones, D. Mark; Garry, Eamonn, Systems and methods for authenticating users accessing unsecured wifi access points.
  298. Smith, Ben; Lester, Chad; Karrels, Edward Lyle, Systems and methods for detecting click spam.
  299. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  300. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  301. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  302. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  303. D'Entremont William ; Mesher Mark ; O'Dea Michael ; Waite Myron, Systems and methods for recording data.
  304. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  305. Eisen, Ori; Pandich, Stephen George, Systems and methods for security management based on cursor events.
  306. Collins, Bruce, Systems and methods for targeted advertising on wireless devices based on device location and current user interests.
  307. Abraham,Magid; Brown,Michael; Heyman,Steve, Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics.
  308. Eisen, Ori, Systems and methods of global identification.
  309. Eisen, Ori, Systems and methods of sharing information through a tag-based consortium.
  310. Eisen, Ori, Systems and methods of sharing information through a tag-based consortium.
  311. Eisen, Ori, Systems and methods of sharing information through a tagless device consortium.
  312. Abraham, Magid; Carnes, Jeffrey; Larrison, James; Disch, Jason, Systems for and methods of user demographic reporting usable for identifying users and collecting usage data.
  313. Kretz, Martin; Gajdos, Rudolf George Tom, Targeted advertising in mobile devices.
  314. Shkedi, Roy, Targeted television advertisements based on online behavior.
  315. Ullah, Shah, Targeting content to internet enabled radio devices.
  316. Hammad, Ayman, Token validation for advanced authorization.
  317. Narin,Attila; Kegley,Keith A.; Sobeski,David A., Tracking usage behavior in computer systems.
  318. Walter, Greg, Transaction authorisation system and method.
  319. Templeton Randy Joe (Bellaire TX) Gulden Gerald (Houston TX), Transaction system with on/off line risk assessment.
  320. Seul,Michael; Danegy,Robert James, Transfusion registry network providing real-time interaction between users and providers of genetically characterized blood products.
  321. Rosen Sholom S., Trusted agents for open electronic commerce where the transfer of electronic merchandise or electronic money is provisional until the transaction is finalized.
  322. Mills, Andrew Jesse; Sims, Shaun, Uniquely identifying a mobile electronic device.
  323. Guo, Hui; Srinivasan, Venkatachary; Rajam, Surendra Sadanand; Jiang, Zhaowei Charlie; Zhou, Min, Universal device identifier for globally identifying and binding disparate device identifiers to the same mobile device.
  324. Shinzaki, Takashi, User verification system, and portable electronic device with user verification function utilizing biometric information.
  325. Lundy, Michael T.; Whitney, Jason K., Utilizing a mobile device to operate an electronic locking mechanism.
  326. Britton, David; Eisen, Ori; Yalov, Raz, Variable risk engine.
  327. Britton, David; Eisen, Ori; Yalov, Raz, Variable risk engine.
  328. Hammad, Ayman, Verification of portable consumer devices.
  329. Brass, Alasdair P.; Swick, Corvin F.; Lulich, Daniel, Visualizing object relationships.
  330. Sasamura, Naoki; Suzuki, Masahiro; Miyamoto, Kouki; Aoyagi, Yuuji; Nishio, Takuya; Mase, Go; Sugimori, Takayuki, Web page safety judgment system.
  331. Pogue Michael Alan ; Werner Laura Allison ; Pfeiffer Ralf I. ; Gupta Pratima ; Zhang Yong ; Clark James Andrew, Web site client information tracker.
  332. Ellerman,E. Castedo; Fubini,Ross B.; Kunins,Jeff C.; Luong,Daphne H.; Partovi,Ali; Partovi,Hadi; Porter,Brandon W., Web-to-phone account linking using a linking code for account identification.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로