WO2005098630A1 - Means and method of using cryptographic devices to combat online institution identity theft - Google Patents
Means and method of using cryptographic devices to combat online institution identity theft Download PDFInfo
- Publication number
- WO2005098630A1 WO2005098630A1 PCT/AU2005/000522 AU2005000522W WO2005098630A1 WO 2005098630 A1 WO2005098630 A1 WO 2005098630A1 AU 2005000522 W AU2005000522 W AU 2005000522W WO 2005098630 A1 WO2005098630 A1 WO 2005098630A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- storage device
- party
- tamper resistant
- resistant storage
- public key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/578,217 US20080288790A1 (en) | 2004-04-09 | 2005-04-11 | Means and Method of Using Cryptographic Device to Combat Online Institution Identity Theft |
AU2005230646A AU2005230646C1 (en) | 2004-04-09 | 2005-04-11 | Means and method of using cryptographic devices to combat online institution identity theft |
EP05729512A EP1763760A1 (en) | 2004-04-09 | 2005-04-11 | Means and method of using cryptographic devices to combat online institution identity theft |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2004100268A AU2004100268B9 (en) | 2004-04-09 | 2004-04-09 | Means and method of using cryptographic devices to combat online institution identity theft |
AU2004100268 | 2004-04-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005098630A1 true WO2005098630A1 (en) | 2005-10-20 |
Family
ID=34230219
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2005/000522 WO2005098630A1 (en) | 2004-04-09 | 2005-04-11 | Means and method of using cryptographic devices to combat online institution identity theft |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080288790A1 (en) |
EP (1) | EP1763760A1 (en) |
AU (1) | AU2004100268B9 (en) |
WO (1) | WO2005098630A1 (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1699205A1 (en) * | 2005-03-04 | 2006-09-06 | Microsoft Corporation | Method and system for safely disclosing identity over the Internet |
US7457823B2 (en) * | 2004-05-02 | 2008-11-25 | Markmonitor Inc. | Methods and systems for analyzing data related to possible online fraud |
WO2009065154A2 (en) * | 2007-11-12 | 2009-05-22 | Mark Currie | Method of and apparatus for protecting private data entry within secure web sessions |
WO2009126994A1 (en) * | 2008-04-14 | 2009-10-22 | Lockstep Technologies Pty Ltd | Authenticating electronic financial transactions |
US7739500B2 (en) | 2005-03-07 | 2010-06-15 | Microsoft Corporation | Method and system for consistent recognition of ongoing digital relationships |
US7822200B2 (en) | 2005-03-07 | 2010-10-26 | Microsoft Corporation | Method and system for asymmetric key security |
US8041769B2 (en) | 2004-05-02 | 2011-10-18 | Markmonitor Inc. | Generating phish messages |
EP1983682A3 (en) * | 2007-04-18 | 2011-12-07 | Memory Experts International Inc. | Authentication system and method |
US8132243B2 (en) | 2005-08-11 | 2012-03-06 | Sandisk Il Ltd. | Extended one-time password method and apparatus |
US9203648B2 (en) | 2004-05-02 | 2015-12-01 | Thomson Reuters Global Resources | Online fraud solution |
US10423301B2 (en) | 2008-08-11 | 2019-09-24 | Microsoft Technology Licensing, Llc | Sections of a presentation having user-definable properties |
US11113759B1 (en) * | 2013-03-14 | 2021-09-07 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US11157872B2 (en) | 2008-06-26 | 2021-10-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US11200620B2 (en) | 2011-10-13 | 2021-12-14 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US11308551B1 (en) | 2012-11-30 | 2022-04-19 | Consumerinfo.Com, Inc. | Credit data analysis |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11356430B1 (en) | 2012-05-07 | 2022-06-07 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US11379916B1 (en) | 2007-12-14 | 2022-07-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US11461364B1 (en) | 2013-11-20 | 2022-10-04 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US11514519B1 (en) | 2013-03-14 | 2022-11-29 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US11790112B1 (en) | 2011-09-16 | 2023-10-17 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11863310B1 (en) | 2012-11-12 | 2024-01-02 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7366703B2 (en) * | 2000-01-05 | 2008-04-29 | American Express Travel Related Services Company, Inc. | Smartcard internet authorization system |
US7870608B2 (en) | 2004-05-02 | 2011-01-11 | Markmonitor, Inc. | Early detection and monitoring of online fraud |
US7913302B2 (en) * | 2004-05-02 | 2011-03-22 | Markmonitor, Inc. | Advanced responses to online fraud |
US8769671B2 (en) | 2004-05-02 | 2014-07-01 | Markmonitor Inc. | Online fraud solution |
US7617390B2 (en) * | 2004-06-25 | 2009-11-10 | Sun Microsystems, Inc. | Server authentication in non-secure channel card pin reset methods and computer implemented processes |
US8359278B2 (en) | 2006-10-25 | 2013-01-22 | IndentityTruth, Inc. | Identity protection |
IL180020A (en) * | 2006-12-12 | 2013-03-24 | Waterfall Security Solutions Ltd | Encryption -and decryption-enabled interfaces |
IL180748A (en) | 2007-01-16 | 2013-03-24 | Waterfall Security Solutions Ltd | Secure archive |
US8291227B2 (en) * | 2007-02-02 | 2012-10-16 | Red Hat, Inc. | Method and apparatus for secure communication |
IL187492A0 (en) * | 2007-09-06 | 2008-02-09 | Human Interface Security Ltd | Information protection device |
IL194943A0 (en) * | 2008-10-27 | 2009-09-22 | Human Interface Security Ltd | Verification of data transmitted by computer |
US20110258690A1 (en) * | 2009-01-13 | 2011-10-20 | Human Interface Security Ltd. | Secure handling of identification tokens |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US20120173874A1 (en) * | 2011-01-04 | 2012-07-05 | Qualcomm Incorporated | Method And Apparatus For Protecting Against A Rogue Certificate |
EP2676197B1 (en) | 2011-02-18 | 2018-11-28 | CSidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US8819793B2 (en) | 2011-09-20 | 2014-08-26 | Csidentity Corporation | Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
IL235175A (en) | 2014-10-19 | 2017-08-31 | Frenkel Lior | Secure remote desktop |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10963881B2 (en) * | 2015-05-21 | 2021-03-30 | Mastercard International Incorporated | Method and system for fraud control of blockchain-based transactions |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
WO2017058186A1 (en) * | 2015-09-30 | 2017-04-06 | Hewlett-Packard Development Company, L.P. | Certificate analysis |
IL250010B (en) | 2016-02-14 | 2020-04-30 | Waterfall Security Solutions Ltd | Secure connection with protected facilities |
US10642988B2 (en) * | 2016-08-04 | 2020-05-05 | Honeywell International Inc. | Removable media protected data transfer in a cyber-protected system |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6141752A (en) * | 1998-05-05 | 2000-10-31 | Liberate Technologies | Mechanism for facilitating secure storage and retrieval of information on a smart card by an internet service provider using various network computer client devices |
US20040015694A1 (en) * | 1998-10-26 | 2004-01-22 | Detreville John | Method and apparatus for authenticating an open system application to a portable IC device |
WO2004075505A1 (en) * | 2003-02-21 | 2004-09-02 | Telecom Italia S.P.A. | Method and system for controlling the distribution of a programming code to a network access device |
WO2004082201A1 (en) * | 2003-03-14 | 2004-09-23 | Koninklijke Philips Electronics N.V. | Protected return path from digital rights management dongle |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6385729B1 (en) * | 1998-05-26 | 2002-05-07 | Sun Microsystems, Inc. | Secure token device access to services provided by an internet service provider (ISP) |
US6779113B1 (en) * | 1999-11-05 | 2004-08-17 | Microsoft Corporation | Integrated circuit card with situation dependent identity authentication |
CN100334583C (en) * | 2000-02-28 | 2007-08-29 | 360度网络股份有限公司 | Smart card enabled mobile personal computing environment system |
JP2004015665A (en) * | 2002-06-10 | 2004-01-15 | Takeshi Sakamura | Authentication method and ic card in electronic ticket distribution system |
US20050138387A1 (en) * | 2003-12-19 | 2005-06-23 | Lam Wai T. | System and method for authorizing software use |
-
2004
- 2004-04-09 AU AU2004100268A patent/AU2004100268B9/en not_active Ceased
-
2005
- 2005-04-11 WO PCT/AU2005/000522 patent/WO2005098630A1/en active Application Filing
- 2005-04-11 US US11/578,217 patent/US20080288790A1/en not_active Abandoned
- 2005-04-11 EP EP05729512A patent/EP1763760A1/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6141752A (en) * | 1998-05-05 | 2000-10-31 | Liberate Technologies | Mechanism for facilitating secure storage and retrieval of information on a smart card by an internet service provider using various network computer client devices |
US20040015694A1 (en) * | 1998-10-26 | 2004-01-22 | Detreville John | Method and apparatus for authenticating an open system application to a portable IC device |
WO2004075505A1 (en) * | 2003-02-21 | 2004-09-02 | Telecom Italia S.P.A. | Method and system for controlling the distribution of a programming code to a network access device |
WO2004082201A1 (en) * | 2003-03-14 | 2004-09-23 | Koninklijke Philips Electronics N.V. | Protected return path from digital rights management dongle |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9026507B2 (en) | 2004-05-02 | 2015-05-05 | Thomson Reuters Global Resources | Methods and systems for analyzing data related to possible online fraud |
US7457823B2 (en) * | 2004-05-02 | 2008-11-25 | Markmonitor Inc. | Methods and systems for analyzing data related to possible online fraud |
US9684888B2 (en) | 2004-05-02 | 2017-06-20 | Camelot Uk Bidco Limited | Online fraud solution |
US9356947B2 (en) | 2004-05-02 | 2016-05-31 | Thomson Reuters Global Resources | Methods and systems for analyzing data related to possible online fraud |
US8041769B2 (en) | 2004-05-02 | 2011-10-18 | Markmonitor Inc. | Generating phish messages |
US9203648B2 (en) | 2004-05-02 | 2015-12-01 | Thomson Reuters Global Resources | Online fraud solution |
EP1699205A1 (en) * | 2005-03-04 | 2006-09-06 | Microsoft Corporation | Method and system for safely disclosing identity over the Internet |
US7555784B2 (en) | 2005-03-04 | 2009-06-30 | Microsoft Corporation | Method and system for safely disclosing identity over the internet |
US7739500B2 (en) | 2005-03-07 | 2010-06-15 | Microsoft Corporation | Method and system for consistent recognition of ongoing digital relationships |
US7822200B2 (en) | 2005-03-07 | 2010-10-26 | Microsoft Corporation | Method and system for asymmetric key security |
US8132243B2 (en) | 2005-08-11 | 2012-03-06 | Sandisk Il Ltd. | Extended one-time password method and apparatus |
US9118665B2 (en) | 2007-04-18 | 2015-08-25 | Imation Corp. | Authentication system and method |
EP1983682A3 (en) * | 2007-04-18 | 2011-12-07 | Memory Experts International Inc. | Authentication system and method |
US9736150B2 (en) | 2007-04-18 | 2017-08-15 | Datalocker Inc. | Authentication system and method |
WO2009065154A3 (en) * | 2007-11-12 | 2009-07-09 | Mark Currie | Method of and apparatus for protecting private data entry within secure web sessions |
WO2009065154A2 (en) * | 2007-11-12 | 2009-05-22 | Mark Currie | Method of and apparatus for protecting private data entry within secure web sessions |
US11379916B1 (en) | 2007-12-14 | 2022-07-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8608065B2 (en) | 2008-04-14 | 2013-12-17 | Lockstep Technologies Pty Ltd | Authenticating electronic financial transactions |
AU2009238204B2 (en) * | 2008-04-14 | 2015-01-29 | Lockstep Technologies Pty Ltd | Authenticating electronic financial transactions |
US8286865B2 (en) | 2008-04-14 | 2012-10-16 | Lockstep Technologies Pty Ltd | Authenticating electronic financial transactions |
WO2009126994A1 (en) * | 2008-04-14 | 2009-10-22 | Lockstep Technologies Pty Ltd | Authenticating electronic financial transactions |
US11769112B2 (en) | 2008-06-26 | 2023-09-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US11157872B2 (en) | 2008-06-26 | 2021-10-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US10423301B2 (en) | 2008-08-11 | 2019-09-24 | Microsoft Technology Licensing, Llc | Sections of a presentation having user-definable properties |
US11790112B1 (en) | 2011-09-16 | 2023-10-17 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11200620B2 (en) | 2011-10-13 | 2021-12-14 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11356430B1 (en) | 2012-05-07 | 2022-06-07 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US11863310B1 (en) | 2012-11-12 | 2024-01-02 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US11308551B1 (en) | 2012-11-30 | 2022-04-19 | Consumerinfo.Com, Inc. | Credit data analysis |
US11651426B1 (en) | 2012-11-30 | 2023-05-16 | Consumerlnfo.com, Inc. | Credit score goals and alerts systems and methods |
US11769200B1 (en) | 2013-03-14 | 2023-09-26 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US11113759B1 (en) * | 2013-03-14 | 2021-09-07 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US11514519B1 (en) | 2013-03-14 | 2022-11-29 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US11461364B1 (en) | 2013-11-20 | 2022-10-04 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US11399029B2 (en) | 2018-09-05 | 2022-07-26 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11842454B1 (en) | 2019-02-22 | 2023-12-12 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
Also Published As
Publication number | Publication date |
---|---|
AU2004100268B4 (en) | 2004-07-08 |
AU2004100268B9 (en) | 2004-07-15 |
EP1763760A1 (en) | 2007-03-21 |
US20080288790A1 (en) | 2008-11-20 |
AU2004100268A4 (en) | 2004-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080288790A1 (en) | Means and Method of Using Cryptographic Device to Combat Online Institution Identity Theft | |
Ramzan | Phishing attacks and countermeasures | |
US8608065B2 (en) | Authenticating electronic financial transactions | |
US7962742B2 (en) | Internet secure terminal for personal computers | |
CN109039652B (en) | Digital certificate generation and application method | |
JP2000222362A (en) | Method and device for realizing multiple security check point | |
WO2012167352A1 (en) | Credential authentication methods and systems | |
AU2009295193A1 (en) | Method and system for user authentication | |
Tally et al. | Anti-phishing: Best practices for institutions and consumers | |
AU2006200653A1 (en) | A digital wallet | |
Hayes | The problem with multiple roots in web browsers-certificate masquerading | |
Hussain | A study of information security in e-commerce applications | |
Weber | See what you sign secure implementations of digital signatures | |
WO2007016869A2 (en) | Systems and methods of enhanced e-commerce,virus detection and antiphishing | |
AU2005230646C1 (en) | Means and method of using cryptographic devices to combat online institution identity theft | |
Uusitalo et al. | Phishing and countermeasures in spanish online banking | |
US20100215176A1 (en) | Means and method for controlling the distribution of unsolicited electronic communications | |
Tsuji et al. | Cryptanalysis on one-time password authentication schemes using counter value | |
Khan et al. | A tamper-resistant digital token-based rights management system | |
Pricope | Hardware and Software Technologies used in the Financial Industry | |
Furnell | E-commerce security | |
Gupta et al. | Security of alternative delivery channels in banking: Issues and countermeasures | |
Ranum | Eletronic Commerce and Security | |
Zipfel et al. | Secure E-Business applications based on the European Citizen Card | |
Zhang et al. | A COMPREHENSIVE ANALYSIS OF ATTACKS ON ONLINE PAYMENT SCHEMES. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005230646 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005729512 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2005230646 Country of ref document: AU Date of ref document: 20050411 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005230646 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2005729512 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11578217 Country of ref document: US |