Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

95results about How to "Ensuring privacy" patented technology

System for secure internet access for children

A system and method for secure internet access by children that assigns each child a Safe Card Scanner with integral fingerprint scanner and a Caddy-Pilot for Kids (intelligent card reader and docking station) into which the Safe Card Scanner docks for biometric-secure internet access for children. Both the Safe Card Scanner and Caddy-Pilot for Kids have internal memory and device ID numbers stored therein. At registration each child is assigned a user ID corresponding with card ID number and a registration record is compiled including the assigned user ID and photo data plus the Safe Card Scanner and Caddy-Pilot for Kids ID numbers. Parents author a parental ruleset for their child and the ruleset is stored by a host ASP. The child then activates their Safe Card scanner by an initial fingerprint scan, a portion of which is stored locally on the Safe Card scanner (along with the assigned device ID number). Given a registered / activated Safe Card scanner, the child can access the internet from any web-enabled computer simply by plugging the Caddy-Pilot for Kids into the computer's USB port. The Caddy-Pilot for Kids automatically opens a browser program and loads the URL of the sponsoring ASP. The child than inserts their Safe Card scanner into the Caddy-Pilot for Kids, which automatically initiates a scan of their fingerprint, which instantaneously captures a portion of their fingerprint minutia and compares it to the minutia stored previously at enrollment activation, thereby authenticating that child as the authorized user of that Safe Card Scanner. Once a local authentication has taken place the Safe Card scanner checks the assigned user ID plus the Safe Card Scanner and Caddy-Pilot for Kids ID numbers to the registration record, authenticates the child user, and pre-loads the parental control ruleset. The child-users then have a restricted safe and secure but full internet experience including online shopping malls, Chat Rooms, Libraries, games, sports, etc.
Owner:COLELLA BRIAN A

System for secure online selling, buying and bill pay in an electronic commerce setting

A method and system for biometric-secure online selling, buying and bill paying in electronic commerce and retail point-of-sale settings that also simplifies the checkout process and eliminates fraudulent transactions. The system relies on an exchange service provider (ESP) that hosts multiple servers: one implementing a web portal for secure online banking, auctions and other exchange opportunities, another being a biometric fingerprint device authenticating database, and yet another being a transaction traffic manager. Participating banks and supporting institutions distribute and activate Secure Individual Identity Devices (SIIDs) to registered users, each SIID being a portable biometric activated identification device that locally stores a fraction of the enrolled users fingerprint (minutia) along with an encrypted code that is used to verify and authenticate the user, eliminating the use of personal or financial information for this purpose. The SiiD becomes the user's own personal key for completing secure online transactions. The user simply plugs their SiiD into any USB-equipped device and scans their own fingerprint for each transaction. The encrypted codes are authenticated in the ESP database and the transaction is processed to the appropriate financial institutions.
Owner:COLELLA BRIAN

Biometrically secured identification authentication and card reader device

An intelligent Caddy-Pilot for facilitating biometric verification. The device works as a single sign-on device for an internal VPN or network or in conjunction with a central data network and may act as a card reader for various Safe Card and traditional credit cards to perform secure transactions and other objective functions, or as an; instantaneous standalone biometric authentication and identification device. The Caddy-Pilot generally comprises a Credit Card-sized housing defining an end-wise card insertion port, a USB connection port, a magnetic card strip reader head, an internal infrared receiver / transmitter, a fingerprint scanner, LCD display screen, LED indicator lights, and a programmable microprocessor and memory. At issuance, an initial scan of the user's fingerprint is completed and a portion of the digitized fingerprints scan is stored locally on Caddy Pilot along with an image of the user for later authentication. The user may then employ the Caddy-Pilot by connection to any available USB port on a web enabled device to initiate both a local biometric-secure authentication sequence as well as a network biometric authentication single sign-on sequence to fully authenticate the user. Once authenticated the user is permitted access to requested resource or data.
Owner:COLELLA BRIAN A

Mobile device with an obfuscated mobile device user identity

A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator (or an entity authorized thereby). When the mobile device user roams into a foreign network, that network receives the enriched identifier in lieu of an MSISDN. The foreign network uses the first part to identify the mobile device user's home network, e.g., to determine whether to permit the requested access (or to provide some other value-added service). The foreign network, however, cannot decode the second part; thus, the mobile device's identity (as well as the identity of the mobile device user) remains obscured. This ensures that the user's privacy is maintained, while preventing third parties from building a profile of the device based on the requests that include the MSISDN or similar identifier.
Owner:IBM CORP

Exchanging and converting document versions

Document version interoperability is provided by allowing members of a community to maintain independent migration by permitting the members to continue to run native application software on their respective systems. A community may define a community version by establishing certain rules for documents. When electronically transmitting a document, a member of the community may provide in the transmitted message containing the document his native version of the document, the community version of the document, as well as any or all versions of the document which are closer to the community version of the document than his native version of the document. This may be accomplished by performing document transformations when creating the message. Upon receipt of the documents, the recipient may choose the document version contained in the message that is most easily read by the recipient's native application program and transform it so that it may be opened by the recipients native application program if necessary. Regardless of what rules are established to define the community version, data loss in any document exchange is minimized. Entities that follow these rules can migrate their native support without requiring coordination with other entities. Members do not have to know the native version supported by other members. This ensures privacy for the members and also lessens the need for direct communications between the members.
Owner:COMMERCE ONE OPERATIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products