Patent application number | Description | Published |
20150359326 | FILAMENT HAVING UNIQUE TIP AND SURFACE CHARACTERISTICS - A filament for use in a brush implement comprises an external material and at least a first internal material. The filament includes an elongated flexible body having a length, a longitudinal axis, and a longitudinal outer surface comprising the external material, the elongated body terminating with a tip having a tip surface comprising the external material, wherein the tip surface has therein a plurality of craters distributed throughout the tip surface in a predetermined pattern, each of the craters having a surface edge of a predetermined size and a predetermined shape, walls extending longitudinally from the surface edge and comprising the external material, and a bottom comprising the at least first internal material and situated at a depth from the surface edge, the surface edge being formed by the walls and the tip surface. | 12-17-2015 |
20150361590 | PROCESS FOR MAKING FILAMENT HAVING UNIQUE TIP AND SURFACE CHARACTERISTICS - A process for making a filament for use in a brush implement comprises providing a composite filament comprising an external material and at least one internal material, wherein the tip surface comprises the internal material surrounded by the external material, the internal material having longitudinal shrinkage characteristics that differ from those of the external material; and causing the internal material to shrink inside the external material, whereby the internal material comprising the tip surface sinks relative to the external material comprising the tip surface so that at least one crater is formed at the tip surface of the filament, the at least one crater comprising a bottom formed by the internal material and walls formed by the external material, the at least one crater having a surface edge of a predetermined size and a predetermined shape. | 12-17-2015 |
Patent application number | Description | Published |
20090094157 | Account Protection With One Sided Access - A first account number and a second account number are created for an account. The first and second account numbers are associated with the account and can be used for transactions with the account. A first subset of operations is associated with the first account number and a second subset of operations is associated with the second account number. A subset of operations includes operations that are restricted to a party that has access to the account number. Accordingly, the first party that has access to the first account number is restricted to the operations found in the first subset of operations when transacting with the account. Also, a second party that has access to the second account number is restricted to the second subset of operations when transacting with the account. | 04-09-2009 |
20110185051 | CLIENT DEVICE IDENTIFICATION THROUGH CACHE MANIPULATION - A method of identifying a networked client device of a host machine or server includes generating an encoded modified date during a first access attempt by the client device of a server-based object, storing the encoded modified date in a local cache of the device, and processing the encoded modified date during a second access attempt by the client device. A system includes the server and a memory device on which is recorded a server-based object. The server generates and stores the encoded modified date in the local cache, e.g., via HTTP, during the first access attempt of the object by the client device, and processes the encoded modified date during a second access attempt by the same client device to uniquely identify the client device. Restricted information may be provided to the client device upon successful identification. | 07-28-2011 |
20110202984 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 08-18-2011 |
20140068271 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 03-06-2014 |
20150213449 | RISK-BASED CONTROL OF APPLICATION INTERFACE TRANSACTIONS - An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed. | 07-30-2015 |
20150350174 | CONTROLLING APPLICATION PROGRAMMING INTERFACE TRANSACTIONS BASED ON CONTENT OF EARLIER TRANSACTIONS - Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score. | 12-03-2015 |
20150350234 | MANIPULATING API REQUESTS TO INDICATE SOURCE COMPUTER APPLICATION TRUSTWORTHINESS - Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed. | 12-03-2015 |
20150350249 | DETERMINING TRUSTWORTHINESS OF API REQUESTS BASED ON SOURCE COMPUTER APPLICATIONS' RESPONSES TO ATTACK MESSAGES - A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed. | 12-03-2015 |
Patent application number | Description | Published |
20100057619 | ACCOUNT AUTHENTICATION SERVICE WITH CHIP CARD - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 03-04-2010 |
20100063895 | MOBILE ACCOUNT AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as with the use of tokens. Authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requesting a password from the cardholder, verifying the password, and notifying a merchant whether the cardholder's authenticity has been verified. Systems for implementing the authentication service in which a cardholder uses a mobile device capable of transmitting messages via the Internet are described. Systems for implementing the authentication service in which a cardholder uses a mobile device capable of transmitting messages through voice and messaging channels is also described. | 03-11-2010 |
20100332393 | ONLINE PAYER AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 12-30-2010 |
20110295753 | PIN PROTECTION FOR PORTABLE PAYMENT DEVICES - A method and system of encrypting a Personal Identification Number (PIN) using a portable payment device includes a portable payment device in communication with a network and a payment processor, and may be configured to receive a first encryption key from the payment processor, to receive a PIN, to encrypt the PIN using the first key, and to provide the encrypted PIN to the payment processor in a form useable to process a payment authorization message or transaction request. The first key may be protected by cryptographic camouflaging using a password. The password may be received by the device and used to decamouflage the first key, and the decamouflaged first key may be used to encrypt the PIN. In one configuration, the first key may be a symmetric key, such that a PIN encrypted by the first key may be of a standard format usable in existing payment systems. | 12-01-2011 |
20120017078 | PERIMETER ENCRYPTION METHOD AND SYSTEM - A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain. | 01-19-2012 |
20140059340 | PERIMETER ENCRYPTION METHOD AND SYSTEM - A method and system for consistent format preserving encryption (C-FPE) are provided to protect data while the data is in a domain while allowing encrypted data to be treated inside the domain as if it were the unencrypted data. The method includes inserting a coupling into a data flow at a perimeter of the domain, and translating a data element from an unprotected data element to a protected data element using the coupling such that the data element is a protected data element within the domain. | 02-27-2014 |
20150264023 | IDENTITY VERIFICATION SERVICES USING PRIVATE DATA - A method includes receiving a request, from a client, to verify that an operator of the client is a purported individual. The request includes a personal identifier associated with the purported individual. The personal identifier corresponds to an account established by the purported individual. The account is provided by a cloud service provider. The method also includes transmitting the personal identifier to the cloud service provider. The method further includes, in response to transmitting the personal identifier, receiving private data indicative of the purported individual's usage of the account. The method still further includes creating an identity assessment based on the private data; The method even further includes receiving an evaluation of the identity assessment from the operator of the client. The method additionally includes determining, based on the evaluation of the identity assessment, whether the operator of the client is the purported individual. | 09-17-2015 |
20150271163 | SECURE DATA TRANSMISSION USING MULTI-CHANNEL COMMUNICATION - A method includes receiving a request to initiate secure communications from a first client and authenticating the first client. The authenticating includes communicating with a second client using a second communication channel, and receiving a response from the first client, the response being transmitted over a first communication channel. The method also includes receiving a first set of message data from the first client, the first set of message data being transmitted over the first communication channel, and receiving a second set of message data from the second client, the second set of message data being transmitted over the second communication channel. The method additionally includes constructing the message using the first set of message data and the second set of message data. | 09-24-2015 |
Patent application number | Description | Published |
20100268558 | METHOD AND SYSTEM FOR VENDOR MANAGMENT - A method and system for managing business transactions, such as mortgages or other financial transactions. A business transaction between an end user and a financial institution includes sub-transactions between the end user and a vendor. A software system performs functions to complete the business transaction. Automated ordering allows an end user to quickly and easily order a sub-transaction without input from the financial institution or the vendor, and also automatically orders sub-transactions upon satisfaction of a trigger event. Vendor management functionality allows a financial institution to manage the transactions of a vendor. Qualitative performance analysis functionality allows an end user to monitor and evaluate a vendor's price, turn-around time, quality score, and overall score. Vendor distribution functionality distributes sub-transactions among vendors. Vendor management company functionality allows a vendor management company—a vendor that outsources some or all of its sub-transactions to independent service providers—to effectively use the system. | 10-21-2010 |
20130290126 | METHOD AND SYSTEM FOR VENDOR MANAGEMENT - A system and method for defining a custom business process associated with a financial transaction. Defining a business process includes creating one or more forms for exchanging information among a customer, a financial institution, and, optionally, a vendor or other third-party who performs one or more sub-transactions related to the financial transaction. The system and method of the present invention provide for customizing each form to include one or more data elements associated with the financial transaction. The selected data elements are subsequently used to define logical relationships for automating order placement of sub-transactions. The logical relationships are triggered by one or more predetermined events. Once triggered, the logical relationships are applied, and the result or outcome is used to perform other tasks associated with the financial transaction automatically. | 10-31-2013 |
Patent application number | Description | Published |
20110283484 | RIGGING, RIGGING TERMINALS, AND METHODS OF ASSEMBLING RIGGING AND RIGGING TERMINALS FOR A SAILBOAT - Composite rigging, rigging terminals, methods of forming composite rigging, and methods of assembling the rigging terminals in a rigging system of a sailboat incorporate a sling of composite fibers having an equivalent cross-sectional profile and stretch resistance, but greater strength and less weight as compared to steel rigging. The rigging terminal includes a terminal fitting having a first opening, a second opening, and an interior space, and a terminal insert disposed inside the interior space. The terminal insert is formed with a first end disposed toward the first opening of the fitting, first and second posts disposed on the first end, and a second end having a shape tapered and disposed toward the second opening of the fitting. One or more composite fibers can be wound around the first end of the insert and held in a space between wall of the terminal fitting interior space and the terminal insert. | 11-24-2011 |
20110283928 | SAILBOAT HALYARD LOCK - A sailboat halyard lock includes a latch that interacts with a stop to maintain tension on a halyard, and a spring-loaded trigger that contacts the latch. The stop can be a ball that moves along a path through the halyard lock, or alternatively, a wall of a sail track. The latch rotates to engage the stop in the locked position, and is released to return to a neutral position. A spring-loaded trigger contacts the latch so as to position the latch to receive the ball or wall in the locked position. In this way, the halyard can be maintained under tension in the halyard lock, and the tension is adjustable over time. | 11-24-2011 |