| Generating cryptographic proof of a series of transactions |
2022-8-17 |
2023-5-25 |
|
| System, method, and computer program for funding a payment card account from an … |
2022-4-11 |
2023-4-25 |
2023-4-25 |
| Performing card lifecycle actions for card accounts utilizing encryption and … |
2021-11-18 |
2023-5-18 |
|
| Computer transaction security with delegated decisions |
2021-11-12 |
2022-6-23 |
|
| Cached balance inspection in real-time card transactions |
2021-10-19 |
2022-6-16 |
|
| Rerouting card-originated payment transactions from a default payment card … |
2021-9-28 |
2023-3-30 |
|
| Parallel processing in idle states of a transaction processing protocol |
2021-7-28 |
2022-12-21 |
|
| Machine identification of original transaction in large transaction datasets |
2021-1-14 |
2022-7-05 |
|
| Secure payment service and system for interactive voice response (ivr) systems |
2019-3-11 |
2019-7-04 |
|
| System, method, and computer program for securely transmitting and presenting … |
2017-11-17 |
2019-1-03 |
|
| System, method, and computer program for dynamically identifying a merchant … |
2017-8-17 |
2017-11-30 |
|
| Point of sale device leveraging a payment unification service |
2013-8-20 |
2019-1-08 |
2019-1-08 |
| System, method, and computer program for capturing a unique identifier for a … |
2013-8-19 |
2017-4-04 |
2017-4-04 |
| Mitigating risks during a high availibility and disaster recovery (HA/DR) … |
2013-1-25 |
2015-7-07 |
2015-7-07 |
| Digital Signature Method and System |
2012-4-10 |
2012-11-01 |
|
| System and method for providing a user with a single payment card on which … |
2012-2-21 |
2014-1-01 |
|
| Method and system for analyzing an environment |
2010-10-29 |
2012-5-03 |
|
| Encryption key management using distributed storage of encryption-key fragments |
2010-8-17 |
2015-10-20 |
2015-10-20 |
| Risk-premium-based database-query optimization |
2009-1-29 |
2010-7-29 |
|
| Systems and methods for handling point-of-sale transactions using a mobile … |
2008-12-19 |
2015-6-09 |
2015-6-09 |
| Device, method, and program product for determining an overall business service … |
2008-10-13 |
2013-9-10 |
2013-9-10 |
| Trusted compliance operations inside secure computing boundaries |
2006-10-23 |
2014-9-02 |
2014-9-02 |
| Determining that a change has occured in response to detecting a burst of … |
2006-3-10 |
2010-8-24 |
2010-8-24 |
| System, Method and Apparatus for Decrypting Data Stored on Remobable Media |
2005-8-05 |
2008-9-04 |
|
| Identifier-based signcryption with two trusted authorities |
2005-7-14 |
2013-11-19 |
2013-11-19 |
| Cryptographic method and apparatus |
2005-6-23 |
2011-7-26 |
2011-7-26 |
| Cryptographic method and apparatus |
2005-6-10 |
2010-9-21 |
2010-9-21 |
| Access control in a web application using event filtering |
2005-5-06 |
2005-11-24 |
|
| System and method for providing HTML authentication using an access controller |
2005-4-14 |
2011-10-25 |
2011-10-25 |
| Establishing new service as conversation by replacing variables in generic … |
2004-5-20 |
2014-8-05 |
2014-8-05 |
| Cryptographic method and apparatus |
2004-4-22 |
2009-8-11 |
2009-8-11 |
| Method and system for preventing identity theft in electronic communications |
2003-12-05 |
2012-11-27 |
2012-11-27 |
| Method and system for content downloads via an insecure communications channel … |
2003-10-03 |
2013-6-11 |
2013-6-11 |
| Distributed computing system and method |
2003-1-17 |
2007-11-13 |
2007-11-13 |
| Network demonstration techniques |
2002-12-23 |
2009-7-21 |
2009-7-21 |
| Instrumenting a software application that includes distributed object … |
2002-11-12 |
2007-10-23 |
2007-10-23 |
| Method and apparatus for encrypting data |
2002-10-11 |
2007-5-15 |
2007-5-15 |
| Software application domain and storage domain risk analysis process and method |
2002-9-16 |
2004-3-18 |
|
| Method and apparatus for optimized battery life and authentication in … |
2002-6-07 |
2006-12-12 |
2006-12-12 |