Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

186results about How to "Prevent fraudulent use" patented technology

Method and system for enhancing security of network transactions

The invention discloses a method and a system for enhancing the security of network transactions, belonging to the field of information security. The method comprises the following steps: a client sends a service request to a first server, the first server sends first information to a second server, the second server generates second information, and the second information is returned to the client by the first server so as to be supplied to a user; a security device receives the first information and the second information input by the user and generates third information for the user; the client receives the third information input by the user, the first server sends the third information to the second server, when the second server receives the third information, the second server generates an authentication code by utilizing the same method that the security device generates the third information, the second server compares the authentication code with the third information for authentication and returns results to the first server, and the first server executes transactions when the authentication is success and returns the transaction result to the client. The system comprises the client, the security device, the first server and the second server. The invention greatly enhances the security in the transaction process.
Owner:FEITIAN TECHNOLOGIES

Authenticator and authentication method

An authenticator authenticates a person at a cellular telephone according to a registered given user biometrically, in which a predetermined threshold is used in comparison with degree of matching between face images. A location information retriever retrieves information of a first location of the cellular telephone upon retrieval of the person's face image, and a second location of the cellular telephone after detecting the first location at a predetermined time. A movement detector detects whether travel of the cellular telephone occurs upon retrieval of the person's face image according to the first and second locations. A log database unit stores information of the travel from the movement detector. A threshold determining unit determines the threshold according to the information of the travel in relation to one or more earlier event logs of authentication.
Owner:FUJIFILM CORP

Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority

A low-cost, network based, secure printer that can provide multiple vendors with independent protected access, as authorized by a secure printer authority, is provided. The secure printer authority issues certificates for each secure printer and authorized vendor. Each certificate includes a public key and identification for the respective secure printer or vendor. The certificates are utilized during generation of a secret session key that preferably can be utilized only once to print the requested document. The secret session key is used by the vendor to encrypt the document, and used by the printer to decrypt the document. Since the secret session key is preferably valid for only a single document, printing of the document can only occur once, thereby preventing any fraudulent printing of the document. Additionally, only vendors authorized by the secure printer authority will have the ability to establish session keys with the printer.
Owner:PITNEY BOWES INC

System and Method for Location-Based Transaction

A system and method for using at least location information to facilitate a transaction is provided. In one embodiment of the present invention, a mobile application operating on a mobile device is used to determine a location of the mobile device. Location information is then provided to a host device, where it is used to identify a second party. Information on the second party, including transactions offered, is then provided to the first party (e.g., via the mobile device, an intermediate device, and / or a device operated and / or owned by the second party). The first party can then interact with the mobile application to select or confirm at least one of the offered transactions. If the transaction is a purchase of goods / services, then a linked payment method may be charged. If the transaction is financial, then the first party may have to further provide authentication data (e.g., a PIN).
Owner:KEY 2 MOBILE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products