+

US20020091945A1 - Verification engine for user authentication - Google Patents

Verification engine for user authentication Download PDF

Info

Publication number
US20020091945A1
US20020091945A1 US10/003,719 US371901A US2002091945A1 US 20020091945 A1 US20020091945 A1 US 20020091945A1 US 371901 A US371901 A US 371901A US 2002091945 A1 US2002091945 A1 US 2002091945A1
Authority
US
United States
Prior art keywords
authentication
subject
information
queries
databases
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/003,719
Other languages
English (en)
Inventor
David Ross
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TDK Micronas GmbH
Matthews International Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/003,719 priority Critical patent/US20020091945A1/en
Assigned to MICRONAS GMBH reassignment MICRONAS GMBH ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOCK, CHRISTIAN
Publication of US20020091945A1 publication Critical patent/US20020091945A1/en
Assigned to RAF TECHNOLOGY, INC. reassignment RAF TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ROSS, DAVID JUSTIN
Priority to US12/613,410 priority patent/US8032927B2/en
Priority to US13/230,471 priority patent/US8316418B2/en
Assigned to MATTHEWS INTERNATIONAL CORPORATION reassignment MATTHEWS INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAF TECHNOLOGY, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063112Skill-based matching of a person or a group to a task
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response

Definitions

  • the present invention relates to the field of remote user authentication and, in particular, user authentication employing information stored in multiple, independently controlled databases.
  • in-wallet data is information you know about yourself or can readily put your hand to. It includes your name, address, telephone number, drivers license number, social security number, checking account number, credit card numbers, mother's maiden name, and the like. This data forms the basis for some of the simpler authentication systems of the prior art.
  • Out-of-wallet data is information about you that would take you a little effort to find out, but that you probably have in your filing system or somewhere equally accessible with some effort. It includes information such as the amount of the last transaction with your checkbook or credit card, the holder and amount of your mortgage, your credit rating, your bank balance, and the like. Incorporating out-of-wallet information into an authentication system is more complicated, and thus, it is found less frequently in typical systems.
  • Passwords are a form of both shared knowledge and of tokens. For a password to work properly, both sides must know it, and only both sides must know it. Shared knowledge includes some nonobvious information as well. The billing address on your credit card, for example, is known to you, of course, but is accessible from the card issuer by any merchant who takes that credit card.
  • Data authentication consists of applying business rules to the forms at the time of capture. This is done at the point of recognition for paper forms, and while the subject is online, in the case of Web forms. Data authentication can be as simple as ensuring a column of numbers adds up, or as complicated as verifying several associated tax forms to be sure a particular number was both correctly calculated and correctly copied.
  • the present invention provides a method and system for authentication that are more secure, less intrusive, more flexible, and easier to keep current than the prior art. This is accomplished through strategically employing a verification engine for authentication procedures.
  • the engine accepts personal data from a subject being authenticated.
  • the data can be collected from the subject as part of a financial transaction with an agency of the federal government, financial institution, or commerce entity, or incident to some security procedure, etc.
  • the entity requesting authentication of the subject is termed the “authentication client” or “client.”
  • the data collected from the subject can then be compared to information contained in independent databases. Each database queried returns a confidence rating indicating how well the data matches.
  • the verification engine combines these rating and returns them to the client, which can apply business rules of its own to decide whether to accept the subject as a valid user. Fuzzy logic algorithms can be used to determine the various confidence levels.
  • the first component controls access to the overall system by users. It provides a single interface, with a single set of commands, to all system clients. While the interface is standardized, it can still be customized based on the particular needs of each client.
  • the second component interfaces with each remote database, speaking the language required by that database, both for querying and for receiving back the answers to queries.
  • the third component, the verification core operates in connection with the other two main components. It recognizes the queries sent to it by clients, because the queries are predefined based on the needs of the individual client.
  • the verification core also possesses the protocols to translate those queries into queries to the individual databases, and it can assemble their responses into a coordinated response to the client.
  • the verification engine tightly controls the questions it asks of each independent database. This enables it to meet the stringent privacy requirements of many database holders, thus encouraging the use of their information in legitimate ways not previously allowed by the database operators.
  • the verification engine also ties into a broad range of information providers. Because the verification engine has access to multiple databases that were previously unconnected, it can answer questions that cannot be answered by any single database. Because the verification engine controls access to those databases in ways established through agreement with the database owners, it overcomes the reluctance of many database owners to allow access to their information. Thus, it can include various databases previously unavailable for general use.
  • Information is stored where it has a legitimate reason to be stored: with the database owners that acquired the information as part of their ordinary businesses or affairs with the subject.
  • the verification engine allows legitimate access to personal data concerning a subject being authenticated, but it keeps others from browsing. Authentication clients are only licensed for specific predefined queries. Queries designed to browse database records or “read-out” information are not enabled by the verification engine.
  • FIG. 1 is a schematic representation of an authentication system employing a verification engine consistent with the present invention.
  • FIG. 2 depicts a specific embodiment of the present invention in the context of online authentication for an e-commerce transaction.
  • Embodiments consistent with the present invention provide the ability to authenticate a subject even if the subject has had no prior contact with the system and has had no access to digital signatures, certificates, or passwords.
  • a subject would be a person who is ready to retire and wants to set up his Social Security payments.
  • Such a subject would possess or have the ability to access a computer and a network connection, such as through the Internet, but he is presumed to be an otherwise unsophisticated user.
  • Another example of a user requiring authentication would be a subject trying to effect an online payment at an online store, or a subject trying to effect a transaction with his financial institution. The problem is to authenticate these subjects without requiring undue effort on the part of the subjects.
  • references to the subject herein will assume a remote individual or entity that is accessing the authentication system through a network, such as the Internet. It is equally within the scope of the present invention to conduct live, real-time authentication of the subject in-person.
  • a preferred embodiment of the present invention implements a verification engine for authenticating a subject using predefined queries requesting personal identifying information from the subject.
  • the identifying information comes from multiple third-party databases that have gathered that information in the ordinary course of their business or other relationships and dealings with the subject.
  • the engine itself can adopt a client-server architecture and can be modeled after systems such as those used with market success in the postal and form recognition fields.
  • the flexible design can enable processing of queries at rates up to 850 per minute and is scalable as demand on the system increases.
  • the first part controls access to the overall system by authentication clients. It provides a single user interface, with a single set of commands, to all system users.
  • the second part interfaces with each remote database, speaking the language required by that database, both for querying and for receiving back the answers to queries.
  • the third part functions in the middle, connecting the other two main parts. This part is termed the “verification core.” It understands the queries sent to it by users. It knows how to translate those queries into queries for the individual databases. The verification core knows what questions each connected database can answer, how likely it is to provide an answer, how long it generally takes to do so, and it possesses functioning protocols for querying each database. The verification core can also assemble the responses from the various independent databases into a coordinated response to the authentication client. The verification core obtains this information through collaboration with the independent database operators to develop the specific queries that will be allowed for use in the authentication procedure.
  • FIG. 1 illustrates an authentication system incorporating a verification engine consistent with the present invention.
  • the verification engine 100 includes various components which include a client interface 102 , a database interface 104 , and the verification core 106 .
  • a subject 108 that either gives or requires authentication communicates with an authentication client 110 .
  • the subject 108 can provide identifying information to the authentication client 110 , and the subject 108 can also answer queries posed by the authentication client 110 .
  • the authentication client 110 gives and receives information to and from the verification core 106 through the client interface 102 .
  • the verification core can then provide the information identifying the subject 108 to one or more independent, third-party databases 112 a through 112 d for authentication.
  • Database “n” 112 d illustrates that a potentially unlimited number of independent databases can be provided for authentication with the verification engine.
  • the authentication client 110 can present a predefined query 114 to the subject. This predefined query has been licensed for a specific use by this authentication client 110 . The actual question and scope of the query depend on the authentication services being provided by the authentication client 110 .
  • the subject 108 then returns a response to the query 116 .
  • the authentication client 110 then forwards 118 the response to the verification engine 100 for authenticating the subject 108 .
  • the verification engine 100 then transmits 120 a through 120 d the response from the subject 108 to multiple of the databases 112 a through 112 d .
  • Each database 112 a through 112 d that receives the information checks it against the identifying information it stores for the subject 108 and returns a confidence indication 122 a through 122 d to the verification engine.
  • the verification engine 100 combines the individual confidence indications 122 a through 122 d into a combined confidence indication 124 that is provided to the authentication client 110 for authenticating the subject 108 .
  • the verification engine can establishes the identity of its authentication client with standard digital certificates, passwords, and user names.
  • Each authentication client has a specified list of questions it can ask the system. For example, an airport security guard (in possession of a passenger's driver's license) may only ask such a system “Does John Smith live at 123 Main Street, Jackson, Miss., and have Mississippi Driver's License number 549-34-2218 ?” The only response he can receive back is either a yes or a no, the confidence the system has in that answer, and possibly a picture of the legitimate holder of the license. He cannot, for example, ask: “who lives at 123 Main Street?”
  • an FBI investigator is the authentication client, on the other hand, he may be authorized for considerably greater access to the system. He may, for example, be able to ask “Give me the passport numbers of all males ofoane residency who entered the United States through New York or Boston between May 6 and Jun. 7, 2001 on British Air or United Airlines flights from Paris or Zurich.” The scope of permissible questioning would depend on the permissions the operator of the databases being asked to authenticate the responses would be willing to authorize. Because the system controls access by limiting the kinds of questions each type of user can ask, and because there is no central repository of the data, the system is much more protective of privacy.
  • the system also has tight controls for the questions it asks of each database. This enables it to meet the stringent privacy requirements of many database holders.
  • the ability to control the types of queries being made against the database provides many database providers the incentive, or at least comfort level to make their database available to the verification engine.
  • the independent database operator can authorize a query to access whatever level of information they are comfortable with. This makes available the use of their information in legitimate ways that were not previously possible.
  • the verification engine system is designed to be both secure and unobtrusive.
  • the only data the verification engine will have direct access to is certain low-sensitivity in-wallet data.
  • This information can come from several commercial sources.
  • the data includes name, address, telephone number, and other personal information that most people do not consider particularly sensitive, but that help the engine authenticate a subject at the simplest level.
  • the information can be obtained from the subject as part of a Web form when a person first uses the system. Asking for it as part of a Web form takes advantage of the habit of filling such information into forms. If done skillfully, most subjects will not even know we are using that information for authentication.
  • the user information and the specific databases being used for authentication can vary widely. This affords the present system a significant amount of flexibility.
  • One perfectly suitable commercial database available to the verification engine is the Crystal Database offered by RAF Technology, Inc. of Redmond, Wash. Compiled from a wide range of reliable sources including the US Postal Service, this database is condensed into data crystals that take a fraction of the memory of the original and can be rapidly accessed. Crystallizing the data also obscures the information so that it cannot be read. As a result, the Crystal Database data crystals can be installed on the verification engine hardware without actually making the data visible to anyone. Access to the Crystal Database is strictly via predefined queries. In effect, the Crystal Database is lent, not given.
  • FIG. 2 illustrates the operation of the verification engine in an authentication system provided for authenticating a subject in an electronic commerce transaction.
  • the subject is labeled the “Customer”
  • the authentication client is the “e-commerce site”
  • the independent databases are the “trusted Validator”
  • the verification engine is being operated by the “Authentex” entity.
  • the queries and response paths are illustrated as going directly to the verification engine, rather than through the authentication client.
  • the Customer logs onto an e-commerce site (box 15 ) for which Authentex (box 10 ) provides authentication.
  • the system will ask the Customer a series of appropriate questions (box 8 ) to authenticate his identity.
  • These questions center on in-wallet data that Authentex itself possesses, and out-of-wallet data possessed by a trusted Validator (box 3 ) such as a bank or credit bureau.
  • Authentex holds in-wallet data and provides the gateway to Validators who hold out-of-wallet data.
  • Authentex and the Validator establish a set of allowed queries (box 5 ) which is a subset of all the queries permitted by the Validator's database, chosen to provide proper authentication while being as unobtrusive as possible. Effectively, the Validator is digitally vouching for the Customer.
  • the verification engine can simultaneously serve multiple authentication clients. Similar, each authentication client employ the verification engine to authenticate multiple subjects.
  • the present invention also provides a suitable solution to the “national identity card” debate.
  • the verification engine fulfills the legitimate needs of a national identity system and information bank, while meeting the privacy concerns of individual citizens. It meets the needs of citizens by leaving their personal data in the possession of those whom they perceive as having legitimate need for open access to it.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Educational Administration (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
US10/003,719 2000-10-30 2001-10-30 Verification engine for user authentication Abandoned US20020091945A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/003,719 US20020091945A1 (en) 2000-10-30 2001-10-30 Verification engine for user authentication
US12/613,410 US8032927B2 (en) 2000-10-30 2009-11-05 Verification engine for user authentication
US13/230,471 US8316418B2 (en) 2000-10-30 2011-09-12 Verification engine for user authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US24442200P 2000-10-30 2000-10-30
US10/003,719 US20020091945A1 (en) 2000-10-30 2001-10-30 Verification engine for user authentication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/613,410 Continuation US8032927B2 (en) 2000-10-30 2009-11-05 Verification engine for user authentication

Publications (1)

Publication Number Publication Date
US20020091945A1 true US20020091945A1 (en) 2002-07-11

Family

ID=22922698

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/003,719 Abandoned US20020091945A1 (en) 2000-10-30 2001-10-30 Verification engine for user authentication
US12/613,410 Expired - Fee Related US8032927B2 (en) 2000-10-30 2009-11-05 Verification engine for user authentication
US13/230,471 Expired - Fee Related US8316418B2 (en) 2000-10-30 2011-09-12 Verification engine for user authentication

Family Applications After (2)

Application Number Title Priority Date Filing Date
US12/613,410 Expired - Fee Related US8032927B2 (en) 2000-10-30 2009-11-05 Verification engine for user authentication
US13/230,471 Expired - Fee Related US8316418B2 (en) 2000-10-30 2011-09-12 Verification engine for user authentication

Country Status (4)

Country Link
US (3) US20020091945A1 (fr)
EP (1) EP1340149A4 (fr)
AU (1) AU2002239481A1 (fr)
WO (1) WO2002041114A2 (fr)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030056113A1 (en) * 2001-09-19 2003-03-20 Korosec Jason A. System and method for identity validation for a regulated transaction
US20030120614A1 (en) * 2001-12-20 2003-06-26 Dun & Bradstreet, Inc. Automated e-commerce authentication method and system
US20030154138A1 (en) * 2001-12-21 2003-08-14 John Phillips Identification verification system and method
US20030196097A1 (en) * 2001-09-19 2003-10-16 Korosec Jason A. System and method for airport security employing identity validation
US20050165667A1 (en) * 2004-01-27 2005-07-28 Cox George C. System and method for customer video authentication to prevent identity theft
WO2006039742A1 (fr) * 2004-10-11 2006-04-20 Edentiti Pty Ltd Systeme d'authentification
US20060259440A1 (en) * 2005-05-13 2006-11-16 Keycorp Method and system for electronically signing a document
US20060292539A1 (en) * 2005-06-28 2006-12-28 Jung Edward K Adaptively user-centric authentication/security
US20070214364A1 (en) * 2006-03-07 2007-09-13 Roberts Nicole A Dual layer authentication system for securing user access to remote systems and associated methods
US20080127305A1 (en) * 2002-05-29 2008-05-29 Raf Technology, Inc. Authentication query strategizer and results compiler
US20090182654A1 (en) * 2008-01-15 2009-07-16 Matthew Mullen System and method for data completion including push identifier
US20100050233A1 (en) * 2000-10-30 2010-02-25 Raf Technology, Inc. Verification engine for user authentication
US7676433B1 (en) 2005-03-24 2010-03-09 Raf Technology, Inc. Secure, confidential authentication with private data
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US20110320329A1 (en) * 2008-07-31 2011-12-29 Arjun Shetty process and system for providing real-time processing service
US8396455B2 (en) 2008-09-25 2013-03-12 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US8478692B2 (en) 2008-06-26 2013-07-02 Visa International Service Association Systems and methods for geographic location notifications of payment transactions
US20140298471A1 (en) * 2013-03-27 2014-10-02 International Business Machines Corporation Evaluating Security of Data Access Statements
US20150120548A1 (en) * 2013-10-29 2015-04-30 Bank Of America Corporation Data lifting for stop payment requests
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US9384393B2 (en) 2013-10-29 2016-07-05 Bank Of America Corporation Check data lift for error detection
US9412135B2 (en) 2013-10-29 2016-08-09 Bank Of America Corporation Check data lift for online accounts
US9542687B2 (en) 2008-06-26 2017-01-10 Visa International Service Association Systems and methods for visual representation of offers
US9639750B2 (en) 2013-10-29 2017-05-02 Bank Of America Corporation Data lifting for exception processing
CN109740773A (zh) * 2019-01-22 2019-05-10 吉林省民航机场集团公司 信息化民用航空器维修信息系统
US10528951B2 (en) 2003-08-18 2020-01-07 Visa International Service Association Payment service authentication for a transaction using a generated dynamic verification value
US10565392B2 (en) * 2017-11-28 2020-02-18 International Business Machines Corporation Secure and verifiable update operations
US12041048B2 (en) 2022-04-08 2024-07-16 Bank Of America Corporation System and method for authenticating interactions with dynamically varying digital resources linked to resource distribution devices

Families Citing this family (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0322876D0 (en) * 2003-09-30 2003-10-29 British Telecomm Method and system for authenticating a user
GB2425373B (en) * 2005-04-21 2010-03-24 Palm Tree Technology Ip Ltd Network security system
US20060288225A1 (en) * 2005-06-03 2006-12-21 Jung Edward K User-centric question and answer for authentication and security
US8359278B2 (en) 2006-10-25 2013-01-22 IndentityTruth, Inc. Identity protection
US8892474B1 (en) 2010-03-11 2014-11-18 Bank Of America Corporation Virtual purchasing card transaction
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
EP2676197B1 (fr) 2011-02-18 2018-11-28 CSidentity Corporation Système et procédés permettant d'identifier des informations d'identification personnelle compromises sur internet
US8774455B2 (en) 2011-03-02 2014-07-08 Raf Technology, Inc. Document fingerprinting
US9443298B2 (en) 2012-03-02 2016-09-13 Authentect, Inc. Digital fingerprinting object authentication and anti-counterfeiting system
US9064238B2 (en) 2011-03-04 2015-06-23 Factify Method and apparatus for certification of facts
US12020178B2 (en) 2011-03-04 2024-06-25 Digital Consolidation, Inc. Method and apparatus for information representation, exchange, validation, and utilization through digital consolidation
US8346672B1 (en) * 2012-04-10 2013-01-01 Accells Technologies (2009), Ltd. System and method for secure transaction process via mobile device
US8813190B2 (en) 2011-05-18 2014-08-19 International Business Machines Corporation Resource upload
US8819793B2 (en) 2011-09-20 2014-08-26 Csidentity Corporation Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
US9237145B2 (en) 2011-09-29 2016-01-12 Oracle International Corporation Single sign-on (SSO) for mobile applications
US9043886B2 (en) * 2011-09-29 2015-05-26 Oracle International Corporation Relying party platform/framework for access management infrastructures
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US9077538B1 (en) * 2011-12-15 2015-07-07 Symantec Corporation Systems and methods for verifying user identities
US9390243B2 (en) * 2012-02-28 2016-07-12 Disney Enterprises, Inc. Dynamic trust score for evaluating ongoing online relationships
US9053329B2 (en) * 2012-05-24 2015-06-09 Lockbox Llc Systems and methods for validated secure data access
WO2014028510A2 (fr) 2012-08-16 2014-02-20 Kumar Himalesh Cherukuvada Système et procédé de sécurisation de transactions
US10460270B2 (en) * 2012-09-12 2019-10-29 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing cross-organizational processing of business intelligence metrics
US8935769B2 (en) 2012-09-28 2015-01-13 Liveensure, Inc. Method for mobile security via multi-factor context authentication
US9043887B2 (en) * 2012-12-31 2015-05-26 Apple Inc. Adaptive secondary authentication criteria based on account data
US9300644B1 (en) 2013-02-22 2016-03-29 Symantec Corporation Knowledge-based authentication based on tracked credential usage
US9424616B2 (en) 2013-03-11 2016-08-23 Google Inc. Customer identity verification
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9659057B2 (en) * 2013-04-15 2017-05-23 Vmware, Inc. Fault tolerant distributed query processing using query operator motion
US9690829B2 (en) 2013-04-15 2017-06-27 Vmware, Inc. Dynamic load balancing during distributed query processing using query operator motion
US20150047003A1 (en) * 2013-08-07 2015-02-12 Sal Khan Verification authority and method therefor
JP6033990B2 (ja) * 2013-09-20 2016-11-30 オラクル・インターナショナル・コーポレイション 単一のフレキシブルかつプラガブルOAuthサーバを備える複数のリソースサーバ、OAuth保護したREST式OAuth許諾管理サービス、およびモバイルアプリケーションシングルサインオンするOAuthサービス
US9569634B1 (en) * 2013-12-16 2017-02-14 Amazon Technologies, Inc. Fine-grained structured data store access using federated identity management
US9218468B1 (en) 2013-12-16 2015-12-22 Matthew B. Rappaport Systems and methods for verifying attributes of users of online systems
CN104811428B (zh) * 2014-01-28 2019-04-12 阿里巴巴集团控股有限公司 利用社交关系数据验证客户端身份的方法、装置及系统
US9202031B2 (en) 2014-02-10 2015-12-01 Level 3 Communications, Llc Authentication system and method
US9754097B2 (en) 2014-02-21 2017-09-05 Liveensure, Inc. Method for peer to peer mobile context authentication
US9690926B2 (en) * 2014-03-25 2017-06-27 Verizon Patent And Licensing Inc. User authentication based on established network activity
US10375063B2 (en) 2014-07-29 2019-08-06 Lexisnexis Risk Solutions Inc. Systems and methods for combined OTP and KBA identity authentication utilizing academic publication data
US9380057B2 (en) 2014-07-29 2016-06-28 Lexisnexis Risk Solutions Inc. Systems and methods for combined OTP and KBA identity authentication
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US9781105B2 (en) 2015-05-04 2017-10-03 Ping Identity Corporation Fallback identity authentication techniques
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US11423177B2 (en) * 2016-02-11 2022-08-23 Evident ID, Inc. Systems and methods for establishing trust online
US10037537B2 (en) 2016-02-19 2018-07-31 Alitheon, Inc. Personal history in track and trace system
US10867301B2 (en) 2016-04-18 2020-12-15 Alitheon, Inc. Authentication-triggered processes
US10740767B2 (en) 2016-06-28 2020-08-11 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US10915612B2 (en) 2016-07-05 2021-02-09 Alitheon, Inc. Authenticated production
TWI599971B (zh) * 2016-07-29 2017-09-21 Digital wallet in the virtual card management
CN106340089B (zh) * 2016-08-08 2018-08-24 杭州指安科技股份有限公司 一种智能电子锁上多验证数据融合拆分存储和合并还原方法
US10902540B2 (en) 2016-08-12 2021-01-26 Alitheon, Inc. Event-driven authentication of physical objects
US10839528B2 (en) 2016-08-19 2020-11-17 Alitheon, Inc. Authentication-based tracking
US10411907B2 (en) 2017-01-25 2019-09-10 Salesforce.Com, Inc. Secure remote user authentication leveraging public key cryptography and key splitting
US11190344B2 (en) 2017-01-25 2021-11-30 Salesforce.Com, Inc. Secure user authentication based on multiple asymmetric cryptography key pairs
US10637658B2 (en) 2017-01-25 2020-04-28 Salesforce.Com, Inc. Secure internal user authentication leveraging public key cryptography and key splitting
US10356088B1 (en) 2017-01-25 2019-07-16 Salesforce.Com, Inc. User authentication based on multiple asymmetric cryptography key pairs
US11062118B2 (en) 2017-07-25 2021-07-13 Alitheon, Inc. Model-based digital fingerprinting
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US11087013B2 (en) 2018-01-22 2021-08-10 Alitheon, Inc. Secure digital fingerprint key object database
US11303627B2 (en) 2018-05-31 2022-04-12 Oracle International Corporation Single Sign-On enabled OAuth token
US10963670B2 (en) 2019-02-06 2021-03-30 Alitheon, Inc. Object change detection and measurement using digital fingerprints
EP3734506A1 (fr) 2019-05-02 2020-11-04 Alitheon, Inc. Localisation et capture automatiques d'une région d'authentification
EP3736717A1 (fr) 2019-05-10 2020-11-11 Alitheon, Inc. Procédé et système d'empreinte digitale numérique à chaîne de boucle
US11238146B2 (en) 2019-10-17 2022-02-01 Alitheon, Inc. Securing composite objects using digital fingerprints
EP3859603A1 (fr) 2020-01-28 2021-08-04 Alitheon, Inc. Prise d'empreintes digitales numériques basée sur la profondeur
US11568683B2 (en) 2020-03-23 2023-01-31 Alitheon, Inc. Facial biometrics system and method using digital fingerprints
EP3885982A3 (fr) 2020-03-23 2021-12-22 Alitheon, Inc. Système et procédé de biométrie de la main utilisant des empreintes digitales numériques
US11948377B2 (en) 2020-04-06 2024-04-02 Alitheon, Inc. Local encoding of intrinsic authentication data
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
US11983957B2 (en) 2020-05-28 2024-05-14 Alitheon, Inc. Irreversible digital fingerprints for preserving object security
EP3926496A1 (fr) 2020-06-17 2021-12-22 Alitheon, Inc. Jetons de sécurité numériques adossés à des actifs
US11677736B2 (en) 2021-03-25 2023-06-13 International Business Machines Corporation Transient identification generation
US20230191821A1 (en) * 2021-12-20 2023-06-22 International Business Machines Corporation Identifying alternative set of digital id documents used to verify user meets id requirements for an associated activity or event
US12277617B2 (en) 2022-02-14 2025-04-15 Evernorth Strategic Development, Inc. Methods and systems for verifying an individual's identity

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5832497A (en) * 1995-08-10 1998-11-03 Tmp Worldwide Inc. Electronic automated information exchange and management system
US5884270A (en) * 1996-09-06 1999-03-16 Walker Asset Management Limited Partnership Method and system for facilitating an employment search incorporating user-controlled anonymous communications
US6073242A (en) * 1998-03-19 2000-06-06 Agorics, Inc. Electronic authority server
US6363376B1 (en) * 1999-08-02 2002-03-26 Individual Software, Inc. Method and system for querying and posting to multiple career websites on the internet from a single interface
US6385620B1 (en) * 1999-08-16 2002-05-07 Psisearch,Llc System and method for the management of candidate recruiting information
US6714944B1 (en) * 1999-11-30 2004-03-30 Verivita Llc System and method for authenticating and registering personal background data
US6836845B1 (en) * 2000-06-30 2004-12-28 Palm Source, Inc. Method and apparatus for generating queries for secure authentication and authorization of transactions
US6904407B2 (en) * 2000-10-19 2005-06-07 William D. Ritzel Repository for jobseekers' references on the internet

Family Cites Families (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0246823A3 (en) 1986-05-22 1989-10-04 Racal-Guardata Limited Data communication systems and methods
US5375244A (en) * 1992-05-29 1994-12-20 At&T Corp. System and method for granting access to a resource
US5259025A (en) 1992-06-12 1993-11-02 Audio Digitalimaging, Inc. Method of verifying fake-proof video identification data
US5265159A (en) 1992-06-23 1993-11-23 Hughes Aircraft Company Secure file erasure
US5436970A (en) 1993-02-18 1995-07-25 Eastman Kodak Company Method and apparatus for transaction card verification
US5841886A (en) 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US5822436A (en) 1996-04-25 1998-10-13 Digimarc Corporation Photographic products and methods employing embedded information
US5973731A (en) 1994-03-03 1999-10-26 Schwab; Barry H. Secure identification system
US6230148B1 (en) 1994-11-28 2001-05-08 Veristar Corporation Tokenless biometric electric check transaction
US5870723A (en) 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5774525A (en) 1995-01-23 1998-06-30 International Business Machines Corporation Method and apparatus utilizing dynamic questioning to provide secure access control
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US5774551A (en) 1995-08-07 1998-06-30 Sun Microsystems, Inc. Pluggable account management interface with unified login and logout and multiple user authentication services
JP3582169B2 (ja) * 1995-08-15 2004-10-27 Kddi株式会社 異種移動通信網間中継装置
US5844817A (en) 1995-09-08 1998-12-01 Arlington Software Corporation Decision support system, method and article of manufacture
US5742685A (en) 1995-10-11 1998-04-21 Pitney Bowes Inc. Method for verifying an identification card and recording verification of same
US5838814A (en) 1996-01-02 1998-11-17 Moore; Steven Jerome Security check method and apparatus
US5841888A (en) * 1996-01-23 1998-11-24 Harris Corporation Method for fingerprint indexing and searching
US5689587A (en) 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images
US5850442A (en) 1996-03-26 1998-12-15 Entegrity Solutions Corporation Secure world wide electronic commerce over an open network
SE9602834L (sv) * 1996-07-22 1998-01-23 Analysity Ab Anordning och förfarande för multidimensionell mönsteranalys
CN100371914C (zh) 1996-07-22 2008-02-27 Cyva研究公司 个人信息安全与交换的工具
US5893090A (en) * 1997-01-31 1999-04-06 Informix Software, Inc. Method and apparatus for performing an aggregate query in a database system
US5940507A (en) 1997-02-11 1999-08-17 Connected Corporation Secure file archive through encryption key management
US5872848A (en) 1997-02-18 1999-02-16 Arcanvs Method and apparatus for witnessed authentication of electronic documents
US6202151B1 (en) 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
US5991408A (en) 1997-05-16 1999-11-23 Veridicom, Inc. Identification and security using biometric measurements
US6014650A (en) 1997-08-19 2000-01-11 Zampese; David Purchase management system and method
US5910988A (en) 1997-08-27 1999-06-08 Csp Holdings, Inc. Remote image capture with centralized processing and storage
JP3781874B2 (ja) 1997-09-05 2006-05-31 富士通株式会社 画像指示による電子情報管理装置、秘密鍵管理装置及び方法、並びに、秘密鍵管理プログラムを記録した記録媒体
US5883810A (en) 1997-09-24 1999-03-16 Microsoft Corporation Electronic online commerce card with transactionproxy number for online transactions
US6026491A (en) * 1997-09-30 2000-02-15 Compaq Computer Corporation Challenge/response security architecture with fuzzy recognition of long passwords
US6125349A (en) 1997-10-01 2000-09-26 At&T Corp. Method and apparatus using digital credentials and other electronic certificates for electronic transactions
US6026166A (en) 1997-10-20 2000-02-15 Cryptoworx Corporation Digitally certifying a user identity and a computer system in combination
KR100241350B1 (ko) 1997-10-27 2000-02-01 정선종 전자 거래에서 안전한 전자 공증문서 생성방법
US6915265B1 (en) 1997-10-29 2005-07-05 Janice Johnson Method and system for consolidating and distributing information
US6845453B2 (en) 1998-02-13 2005-01-18 Tecsec, Inc. Multiple factor-based user identification and authentication
US6618806B1 (en) 1998-04-01 2003-09-09 Saflink Corporation System and method for authenticating users in a computer network
AU4091199A (en) * 1998-05-21 1999-12-06 Equifax, Inc. System and method for authentication of network users
EP1095336A1 (fr) 1998-05-21 2001-05-02 Equifax Inc. Systeme et procede permettant d'authentifier des utilisateurs de reseau et comportant une etape de pretraitement
US6363485B1 (en) 1998-09-09 2002-03-26 Entrust Technologies Limited Multi-factor biometric authenticating device and method
US6175923B1 (en) 1998-12-08 2001-01-16 Senetas Corporation Limited Secure system using images of only part of a body as the key where the part has continuously-changing features
US6532459B1 (en) * 1998-12-15 2003-03-11 Berson Research Corp. System for finding, identifying, tracking, and correcting personal information in diverse databases
US6985887B1 (en) * 1999-03-19 2006-01-10 Suncrest Llc Apparatus and method for authenticated multi-user personal information database
AU5782900A (en) 1999-06-30 2001-01-31 Stephen Billester Secure, limited-access database system and method
US7330826B1 (en) * 1999-07-09 2008-02-12 Perfect.Com, Inc. Method, system and business model for a buyer's auction with near perfect information using the internet
US7249093B1 (en) * 1999-09-07 2007-07-24 Rysix Holdings, Llc Method of and system for making purchases over a computer network
US6581059B1 (en) * 2000-01-24 2003-06-17 International Business Machines Corporation Digital persona for providing access to personal information
US7412462B2 (en) 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
US7086085B1 (en) 2000-04-11 2006-08-01 Bruce E Brown Variable trust levels for authentication
US7039951B1 (en) 2000-06-06 2006-05-02 International Business Machines Corporation System and method for confidence based incremental access authentication
US6959394B1 (en) 2000-09-29 2005-10-25 Intel Corporation Splitting knowledge of a password
WO2002041114A2 (fr) * 2000-10-30 2002-05-23 Raf Technology, Inc. Moteur de verification pour authentification d'utilisateur
US7185205B2 (en) 2001-03-26 2007-02-27 Galois Connections, Inc. Crypto-pointers for secure data storage
US7225156B2 (en) * 2001-07-11 2007-05-29 Fisher Douglas C Persistent dynamic payment service
US7433826B2 (en) * 2001-09-19 2008-10-07 Eleytheria, Ltd System and method for identity validation for a regulated transaction
US7080403B2 (en) 2001-11-19 2006-07-18 Daimlerchrysler Corporation Method and system for person data authentication and management
US7231657B2 (en) * 2002-02-14 2007-06-12 American Management Systems, Inc. User authentication system and methods thereof
WO2003103215A1 (fr) 2002-05-29 2003-12-11 Raf Technology, Inc. Unite de definition de strategie d'interrogation d'authentification et de compilation de resultats
US7822688B2 (en) 2002-08-08 2010-10-26 Fujitsu Limited Wireless wallet
US7740168B2 (en) * 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US7761374B2 (en) * 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US20050055231A1 (en) * 2003-09-08 2005-03-10 Lee Geoffrey C. Candidate-initiated background check and verification
US20060106636A1 (en) * 2004-04-08 2006-05-18 Hillel Segal Internet-based job placement system for creating proposals for screened and pre-qualified participants
US7356168B2 (en) 2004-04-23 2008-04-08 Hitachi, Ltd. Biometric verification system and method utilizing a data classifier and fusion model
US7467401B2 (en) * 2004-08-12 2008-12-16 Avatier Corporation User authentication without prior user enrollment
US7676433B1 (en) * 2005-03-24 2010-03-09 Raf Technology, Inc. Secure, confidential authentication with private data
US7979894B2 (en) * 2008-01-08 2011-07-12 First Data Corporation Electronic verification service systems and methods
CA2711936A1 (fr) * 2008-01-15 2009-07-23 Matthew Mullen Systeme et procede de completement de donnees comprenant un identifiant du pousser

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5832497A (en) * 1995-08-10 1998-11-03 Tmp Worldwide Inc. Electronic automated information exchange and management system
US5884270A (en) * 1996-09-06 1999-03-16 Walker Asset Management Limited Partnership Method and system for facilitating an employment search incorporating user-controlled anonymous communications
US6073242A (en) * 1998-03-19 2000-06-06 Agorics, Inc. Electronic authority server
US6363376B1 (en) * 1999-08-02 2002-03-26 Individual Software, Inc. Method and system for querying and posting to multiple career websites on the internet from a single interface
US6385620B1 (en) * 1999-08-16 2002-05-07 Psisearch,Llc System and method for the management of candidate recruiting information
US6714944B1 (en) * 1999-11-30 2004-03-30 Verivita Llc System and method for authenticating and registering personal background data
US6836845B1 (en) * 2000-06-30 2004-12-28 Palm Source, Inc. Method and apparatus for generating queries for secure authentication and authorization of transactions
US6904407B2 (en) * 2000-10-19 2005-06-07 William D. Ritzel Repository for jobseekers' references on the internet

Cited By (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8316418B2 (en) 2000-10-30 2012-11-20 Raf Technology, Inc. Verification engine for user authentication
US20100050233A1 (en) * 2000-10-30 2010-02-25 Raf Technology, Inc. Verification engine for user authentication
US8032927B2 (en) 2000-10-30 2011-10-04 Raf Technology, Inc. Verification engine for user authentication
US20030196097A1 (en) * 2001-09-19 2003-10-16 Korosec Jason A. System and method for airport security employing identity validation
US20030056113A1 (en) * 2001-09-19 2003-03-20 Korosec Jason A. System and method for identity validation for a regulated transaction
US7827410B2 (en) 2001-09-19 2010-11-02 Eleytheria, Ltd System and method for identity validation for a regulated transaction
US7433826B2 (en) 2001-09-19 2008-10-07 Eleytheria, Ltd System and method for identity validation for a regulated transaction
US20090008446A1 (en) * 2001-09-19 2009-01-08 Eleytheria, Ltd System and method for identity validation for a regulated transaction
US20030120614A1 (en) * 2001-12-20 2003-06-26 Dun & Bradstreet, Inc. Automated e-commerce authentication method and system
US20030154138A1 (en) * 2001-12-21 2003-08-14 John Phillips Identification verification system and method
US20080127305A1 (en) * 2002-05-29 2008-05-29 Raf Technology, Inc. Authentication query strategizer and results compiler
US7748029B2 (en) 2002-05-29 2010-06-29 Raf Technology, Inc. Authentication query strategizer and results compiler
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US8636205B2 (en) 2003-08-18 2014-01-28 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US10528951B2 (en) 2003-08-18 2020-01-07 Visa International Service Association Payment service authentication for a transaction using a generated dynamic verification value
US9530132B2 (en) * 2004-01-27 2016-12-27 George Chester Cox System and method for customer video authentication to prevent identity theft
US9792608B2 (en) 2004-01-27 2017-10-17 George Chester Cox System and method for customer video authentication to prevent identity theft
US20050165667A1 (en) * 2004-01-27 2005-07-28 Cox George C. System and method for customer video authentication to prevent identity theft
WO2006039742A1 (fr) * 2004-10-11 2006-04-20 Edentiti Pty Ltd Systeme d'authentification
US7676433B1 (en) 2005-03-24 2010-03-09 Raf Technology, Inc. Secure, confidential authentication with private data
US20060259440A1 (en) * 2005-05-13 2006-11-16 Keycorp Method and system for electronically signing a document
US20060292539A1 (en) * 2005-06-28 2006-12-28 Jung Edward K Adaptively user-centric authentication/security
US20070214364A1 (en) * 2006-03-07 2007-09-13 Roberts Nicole A Dual layer authentication system for securing user access to remote systems and associated methods
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US8843417B2 (en) 2006-06-19 2014-09-23 Visa U.S.A. Inc. Track data encryption
US8972303B2 (en) 2006-06-19 2015-03-03 Visa U.S.A. Inc. Track data encryption
US8489506B2 (en) 2006-06-19 2013-07-16 Visa U.S.A. Inc. Portable consumer device verification system
US11783326B2 (en) 2006-06-19 2023-10-10 Visa U.S.A. Inc. Transaction authentication using network
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US7819322B2 (en) 2006-06-19 2010-10-26 Visa U.S.A. Inc. Portable consumer device verification system
US11107069B2 (en) 2006-06-19 2021-08-31 Visa U.S.A. Inc. Transaction authentication using network
US20090182654A1 (en) * 2008-01-15 2009-07-16 Matthew Mullen System and method for data completion including push identifier
US8249957B2 (en) * 2008-01-15 2012-08-21 Visa U.S.A. System and method for data completion including push identifier
TWI490798B (zh) * 2008-01-15 2015-07-01 Visa Usa Inc 用於包括推送識別符之資料完成的系統及方法
US10943248B2 (en) 2008-06-26 2021-03-09 Visa International Service Association Systems and methods for providing offers
US8478692B2 (en) 2008-06-26 2013-07-02 Visa International Service Association Systems and methods for geographic location notifications of payment transactions
US10430818B2 (en) 2008-06-26 2019-10-01 Visa International Service Association Systems and methods for visual representation of offers
US8682793B2 (en) 2008-06-26 2014-03-25 Visa International Service Association Mobile alert transaction system and method
US9542687B2 (en) 2008-06-26 2017-01-10 Visa International Service Association Systems and methods for visual representation of offers
US20110320329A1 (en) * 2008-07-31 2011-12-29 Arjun Shetty process and system for providing real-time processing service
US9325833B2 (en) 2008-09-25 2016-04-26 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US8396455B2 (en) 2008-09-25 2013-03-12 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US9071463B2 (en) 2008-09-25 2015-06-30 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US11228595B2 (en) 2013-03-27 2022-01-18 International Business Machines Corporation Evaluating security of data access statements
US9680830B2 (en) * 2013-03-27 2017-06-13 International Business Machines Corporation Evaluating security of data access statements
US20140298471A1 (en) * 2013-03-27 2014-10-02 International Business Machines Corporation Evaluating Security of Data Access Statements
US10693877B2 (en) 2013-03-27 2020-06-23 International Business Machines Corporation Evaluating security of data access statements
US9384393B2 (en) 2013-10-29 2016-07-05 Bank Of America Corporation Check data lift for error detection
US10108941B2 (en) 2013-10-29 2018-10-23 Bank Of America Corporation Check data lift for online accounts
US10108942B2 (en) 2013-10-29 2018-10-23 Bank Of America Corporation Check data lift for online accounts
US20150120548A1 (en) * 2013-10-29 2015-04-30 Bank Of America Corporation Data lifting for stop payment requests
US9412135B2 (en) 2013-10-29 2016-08-09 Bank Of America Corporation Check data lift for online accounts
US9652671B2 (en) 2013-10-29 2017-05-16 Bank Of America Corporation Data lifting for exception processing
US9639750B2 (en) 2013-10-29 2017-05-02 Bank Of America Corporation Data lifting for exception processing
US10565392B2 (en) * 2017-11-28 2020-02-18 International Business Machines Corporation Secure and verifiable update operations
CN109740773A (zh) * 2019-01-22 2019-05-10 吉林省民航机场集团公司 信息化民用航空器维修信息系统
US12041048B2 (en) 2022-04-08 2024-07-16 Bank Of America Corporation System and method for authenticating interactions with dynamically varying digital resources linked to resource distribution devices

Also Published As

Publication number Publication date
US20100050233A1 (en) 2010-02-25
US8032927B2 (en) 2011-10-04
WO2002041114A3 (fr) 2002-09-12
EP1340149A2 (fr) 2003-09-03
WO2002041114A2 (fr) 2002-05-23
EP1340149A4 (fr) 2005-10-19
US20120005733A1 (en) 2012-01-05
US8316418B2 (en) 2012-11-20
AU2002239481A1 (en) 2002-05-27

Similar Documents

Publication Publication Date Title
US8032927B2 (en) Verification engine for user authentication
US10223695B2 (en) Centralized identity authentication for electronic communication networks
US11750617B2 (en) Identity authentication and information exchange system and method
US7523489B2 (en) Smart card application system and method
US6715672B1 (en) System and method for enhanced fraud detection in automated electronic credit card processing
US20070093234A1 (en) Identify theft protection and notification system
US20030070101A1 (en) Method and apparatus for protecting personal information and for verifying identities
US20070294403A1 (en) Third party database security
US11301943B2 (en) Systems and methods for authentication of database transactions with an authentication server
AU2005274636A1 (en) Identity theft protection and notification system
CA2507346A1 (fr) Compte de securite pour transactions en ligne et hors ligne
AU2005294107A1 (en) Authentication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICRONAS GMBH, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOCK, CHRISTIAN;REEL/FRAME:012627/0632

Effective date: 20020201

AS Assignment

Owner name: RAF TECHNOLOGY, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROSS, DAVID JUSTIN;REEL/FRAME:013756/0100

Effective date: 20020924

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MATTHEWS INTERNATIONAL CORPORATION, PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RAF TECHNOLOGY, INC.;REEL/FRAME:043976/0297

Effective date: 20170228

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载