Zum Hauptinhalt springen

Account authority digital signature (AADS) accounts

Wheeler, Anne Mcafee ; Wheeler, Lynn Henry
2005
Online Patent

Titel:
Account authority digital signature (AADS) accounts
Autor/in / Beteiligte Person: Wheeler, Anne Mcafee ; Wheeler, Lynn Henry
Link:
Veröffentlichung: 2005
Medientyp: Patent
Sonstiges:
  • Nachgewiesen in: USPTO Patent Grants
  • Sprachen: English
  • Patent Number: 6,981,154
  • Publication Date: December 27, 2005
  • Appl. No: 10/011496
  • Application Filed: December 05, 2001
  • Assignees: First Data Corporation (Greenwood Village, CO, US)
  • Claim: 1. A method of managing a plurality of different accounts by an account authority for a single account holder, comprising the steps of: (a) associating respective identity information with each one of the plurality of different accounts, each account comprising transactional account information, and (b) associating by the account authority the same public key of a public-private key pair with each one of the plurality of different accounts of step (a) by associating in a computer database the same public key with the respective identity information for the respective account, whereby the same public key is retrievable based on any said associated, respective identity information of any one of the plurality of different accounts.
  • Claim: 2. The method of claim 1 , wherein the respective identity information for each account comprises a unique account number.
  • Claim: 3. The method of claim 1 , wherein the respective identity information for each account comprises other than an account number.
  • Claim: 4. The method of claim 1 , wherein the account authority is a financial institution and the transactional account information for each said associated account in step (a) comprises financial information.
  • Claim: 5. A method for establishing a plurality of new accounts for an account holder, each of the plurality of new accounts being opened with a respective one of a plurality of account authorities, comprising the steps of: (a) associating respective identity information with each new account, each new account comprising transactional account information, and (b) associating by each of the respective account authorities the same public key of a public-private key pair with the new account for that respective account authority by associating in a computer database of the respective account authority the public key with the identity information for the respective new account, whereby the same public key is retrievable from the computer database of the respective account authority based on the associated identity information for the respective new account of that respective account authority.
  • Claim: 6. The method of claim 5 , wherein the public key is provided to each of the respective account authorities by the account holder.
  • Claim: 7. The method of claim 5 , wherein the public key is provided by one of the account authorities to the account holder, and the public key then is provided to each one of the other account authorities by the account holder.
  • Claim: 8. The method of claim 5 , wherein the identity information for the respective new account comprises an account number.
  • Claim: 9. The method of claim 5 , wherein the identity information for the respective new account comprises other than an account number.
  • Claim: 10. The method of claim 5 , wherein each account authority is a financial institution and the transactional account information for each said associated account in step (a) comprises financial information.
  • Claim: 11. The method of claim 5 , wherein the identity information associated with each respective account in step (a) is the same.
  • Claim: 12. The method of claim 5 , wherein the identity information associated with each respective account in step (a) is different for each account.
  • Claim: 13. A method of setting up an account of an account holder with each one of a plurality of different account authorities for the later process of validating an identity of a sender of electronic communications representing requests for performance of actions regarding the accounts, wherein each electronic communication has a digital signature and sender identity information, the method for each different account authority of setting up the account comprising the steps of: (a) associating sender identity information with the respective account of the account authority in a computer database, the account comprising transactional account information; and (b) associating by the account authority a public key of a public-private key pair with the respective account of the account authority in the computer database such that the public key later is retrievable from the computer database based on said associated sender identity information in step (a) wherein the same public key is associated by each of the different account authorities with each of the respective accounts.
  • Claim: 14. The method of claim 13 , wherein the public key is provided to each account authority by the account holder.
  • Claim: 15. The method of claim 13 , wherein the public key is provided by one of the account authorities to the account holder, and the public key then is provided to each one of the other account authorities by the account holder.
  • Claim: 16. The method of claim 13 , wherein sender identity information that is associated with a respective account by an account authority comprises an account number.
  • Claim: 17. The method of claim 13 , wherein sender identity information that is associated with a respective account by an account authority comprises other than an account number.
  • Claim: 18. The method of claim 13 , wherein each account authority is a financial institution and the transactional account information for each said associated account comprises financial information.
  • Claim: 19. The method of claim 13 , wherein each account authority is a financial institution and the action on the account comprises a financial transaction on the account.
  • Claim: 20. The method of claim 13 , wherein the action regarding the account is financial.
  • Claim: 21. The method of claim 13 , wherein an action regarding the account is not financial.
  • Claim: 22. The method of claim 13 , wherein following said steps (a) and (b), the identity of the sender of an electronic communication representing a request for performance of an action regarding the account is validated without validating a certificate of a public key.
  • Claim: 23. The method of claims 1 , 5 , or 13 , wherein the identity information is not associated with a certificate of public key in accomplishing either said step (a) or step (b).
  • Claim: 24. The method of claims 1 , 5 , or 13 , wherein the public key is unique to the account holder.
  • Claim: 25. The method of claims 1 , 5 , or 13 , wherein the public key is a public key of a public key pair of the account holder.
  • Claim: 26. The method of claims 1 , 5 , or 13 , wherein the public key is not of an account authority.
  • Claim: 27. The method of claims 5 or 13 , wherein said step (a) is performed by the respective account authority for the account that is associated.
  • Claim: 28. The method of claims 1 or 13 , wherein the identity information is the same for each account.
  • Claim: 29. The method of claims 1 , 5 , or 13 , wherein transactional account information comprises information required to process the action.
  • Claim: 30. The method of claims 1 , 5 , or 13 , wherein transactional account information comprises a personal identification number (PIN).
  • Claim: 31. The method of claims 1 , 5 , or 13 , wherein transactional account information comprises an account balance representing funds in the account.
  • Claim: 32. The method of claims 1 , 5 , or 13 , wherein transactional account information comprises information validated when the account was established.
  • Claim: 33. The method of claims 1 or 13 , wherein transactional account information comprises information that was validated in a face-to-face acknowledgement between the account holder and the account authority.
  • Claim: 34. The method of claims 1 , 5 , or 13 , wherein an account comprises a checking account.
  • Claim: 35. The method of claims 1 , 5 , or 13 , wherein transactional account information comprises a history of ledger transactions in the account.
  • Claim: 36. The method of claim 13 , wherein transactional account information comprises the social security number of the sender.
  • Claim: 37. The method of claim 13 , wherein transactional account information comprises the address of the sender.
  • Claim: 38. The method of claim 13 , wherein transactional account information comprises the mother's maiden name of the sender.
  • Claim: 39. The method of claim 13 , wherein transactional account information comprises entity information of the sender.
  • Claim: 40. The method of claim 13 , wherein transactional account information only includes entity information of the sender.
  • Claim: 41. The method of claims 1 , 5 , or 13 , wherein transactional account information comprises business process information.
  • Claim: 42. The method of claims 1 , 5 , or 13 , wherein transactional account information is stored in fields in records in the computer database.
  • Claim: 43. The method of claim 42 , wherein the records comprise an account file.
  • Claim: 44. The method of claim 43 , wherein the records further comprise a transactions file.
  • Current U.S. Class: 713/200
  • Patent References Cited: 3962539 June 1976 Ehrsam et al. ; 4200770 April 1980 Hellman et al. ; 4218582 August 1980 Hellman et al. ; 4405829 September 1983 Rivest et al. ; 4408203 October 1983 Campbell ; 4424414 January 1984 Hellman et al. ; 4734564 March 1988 Boston et al. ; 4748668 May 1988 Shamir et al. ; 4797920 January 1989 Stein ; 4823388 April 1989 Mizutani et al. ; 4825050 April 1989 Griffith et al. ; 4850017 July 1989 Matyas, Jr. et al. ; 4868877 September 1989 Fischer ; 4885788 December 1989 Takaragi et al. ; 5018196 May 1991 Takaragi et al. ; 5029208 July 1991 Tanaka ; 5097504 March 1992 Camion et al. ; 5140634 August 1992 Guillou et al. ; 5214703 May 1993 Massey et al. ; 5225978 July 1993 Petersen et al. ; 5231668 July 1993 Kravitz ; 5422953 June 1995 Fischer ; 5453601 September 1995 Rosen ; 5455865 October 1995 Perlman ; 5477120 December 1995 Yoshimura et al. ; 5502766 March 1996 Boebert et al. ; 5509071 April 1996 Petrie, Jr. et al. ; 5534855 July 1996 Shockley et al. ; 5539828 July 1996 Davis ; 5557518 September 1996 Rosen ; 5563946 October 1996 Cooper et al. ; 5577120 November 1996 Penzias ; 5586036 December 1996 Pintsov ; 5590197 December 1996 Chen et al. ; 5604801 February 1997 Donlan et al. ; 5606609 February 1997 Houser et al. ; 5615266 March 1997 Altschuler et al. ; 5619574 April 1997 Johnson et al. ; 5623637 April 1997 Jones et al. ; 5625690 April 1997 Michel et al. ; 5636280 June 1997 Kelly ; 5659616 August 1997 Sudia ; 5671279 September 1997 Elgamal ; 5671285 September 1997 Newman ; 5677953 October 1997 Dophin ; 5677955 October 1997 Doggett et al. ; 5694471 December 1997 Chen et al. ; 5708780 January 1998 Levergood et al. ; 5715314 February 1998 Payne et al. ; 5721779 February 1998 Funk ; 5724424 March 1998 Gifford ; 5745886 April 1998 Rosen ; 5751813 May 1998 Dorenbos ; 5778072 July 1998 Samar ; 5781723 July 1998 Yee et al. ; 5788953 August 1998 Somlyai ; 5790677 August 1998 Fox et al. ; 5796840 August 1998 Davis ; 5812666 September 1998 Baker et al. ; 5825884 October 1998 Zdepski et al. ; 5848161 December 1998 Luneau et al. ; 5862327 January 1999 Kwang et al. ; 5870475 February 1999 Allan et al. ; 5878142 March 1999 Caputo et al. ; 5878172 March 1999 Go ; 5883810 March 1999 Franklin et al. ; 5887131 March 1999 Angelo ; 5903882 May 1999 Asay et al. ; 5910988 June 1999 Ballard ; 5910989 June 1999 Naccache ; 5928298 July 1999 Matsuoka et al. ; 5943423 August 1999 Muftic ; 5949881 September 1999 Davis ; 5956404 September 1999 Schneier et al. ; 5963648 October 1999 Rosen ; 5970147 October 1999 Davis ; 6000522 December 1999 Johnson ; 6009177 December 1999 Sudia ; 6021202 February 2000 Anderson et al. ; 6023509 February 2000 Herbert et al. ; 6029125 February 2000 Hagen et al. ; 6029150 February 2000 Kravitz ; 6044154 March 2000 Kelly ; 6047051 April 2000 Ginzboorg et al. ; 6061799 May 2000 Eldridge et al. ; 6070154 May 2000 Tavor et al. ; 6084969 July 2000 Wright et al. ; 6092202 July 2000 Veil et al. ; 6102287 August 2000 Matyas ; 6104815 August 2000 Alcorn et al. ; 6105012 August 2000 Chang et al. ; 6108644 August 2000 Goldschlag et al. ; 6111956 August 2000 Field et al. ; 6134325 October 2000 Vanstone et al. ; 6144949 November 2000 Harris ; 6154543 November 2000 Baltzley ; 6161180 December 2000 Matyas ; 6161181 December 2000 Haynes, III et al. ; 6167518 December 2000 Padgett et al. ; 6189096 February 2001 Haverty ; 6192130 February 2001 Otway ; 6199052 March 2001 Mitty et al. ; 6202151 March 2001 Musgrave et al. ; 6205437 March 2001 Gifford ; 6230269 May 2001 Spies et al. ; 6233565 May 2001 Lewis et al. ; 6240091 May 2001 Ginzboorg et al. ; 6243812 June 2001 Matyas et al. ; 6263447 July 2001 French et al. ; 6282522 August 2001 Davis et al. ; 6285991 September 2001 Powar ; 6299062 October 2001 Hwang ; 6314519 November 2001 Davis et al. ; 6324525 November 2001 Kramer et al. ; 2001/0000535 April 2001 Lapsley et al. ; 2002/0120846 August 2002 Stewart et al. ; 2271178 May 1999
  • Other References: Donald O'Mahony; Electronic payment systems 1961; Artech House Inc; pp. 51 and 77-80. cited by examiner ; Burton S. Kaliski, Jr., Some Examples of the PKCS Standards, An RSA Laboratories Technical Note, Nov. 1, 1993, RSA Laboratories, Redwood City, CA, pp. 1-15. cited by other ; Burton S. Kaliski, Jr., A Layman's Guide to a Subset of ASN.1, BER, and DER, An RSA Laboratories Technical Note, Nov. 1, 1993, RSA Laboratories, Redwood City, CA, pp. 1-36. cited by other ; PKCS Editor, PKCS #1 v2.1: RSA Cryptography Standard, RSA Laboratories, Draft 2, Jan. 5, 2001, RSA Laboratories, Bedford, MA, pp. 1-60. cited by other ; PKCS #3: Diffie-Hellman Key-Agreement Standard, An RSA Laboratories Technical Note, Version 1.4, Nov. 1, 1993, RSA Laboratories, Redwood City, CA, pp. 1-8. cited by other ; PKCS #6: Extended-Certificate Syntax Standard, An RSA Laboratories Technical Note, Nov. 1, 1993, Version 1.5, RSA Laboratories, Redwood City, CA, pp. 1-11. cited by other ; PKCS #8: Private-Key Information Syntax Standard, An RSA Laboratories Technical Note, Nov. 1, 1993, Version 1.2, RSA Laboratories, Redwood City, CA, pp. 1-5. cited by other ; Michael J. Wiener, Performance Comparison of Public-Key Cryptosystems, The Technical Newsletter of RSA Laboratories, a division of RSA Data Security, Inc., Summer 1998, vol. 4, No. 1, RSA Laboratories, San Mateo, CA, pp. 1-23. cited by other ; George Apostolopoulos, et al., Securing Electronic Commerce: Reducing the SSL Overhead, IEEE Network, Jul./Aug. 2000, vol. 14, Issue 4, pp. 1-16. cited by other ; Ueli Maurer, Modelling a Public-Key Infrastructure, Sep. 1996, Proc. 1996 European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Berlin: Springer-Verlag, Rome, Italy, Department of Computer Science, Swiss Federal Institute of Technology, Zürich, Switzerland, pp. 1-26. cited by other ; Security Requirements for Cryptographic Modules, Federal Information-Processing Standards Publication 140-1, Jan. 11, 1994, pp. 1-45, CSL Bulletin For FIPS 140-1 pp. 1-6, Validated FIPS 140-1 Cryptographic Modules 2001, 2000, 1999, 1998, 1997-95, pp. 1-14. cited by other ; Mark Heroux, A Private Key Storage Server for DCE—Functional Specification, Open Software Foundation Request for Comments: 94.1, Nov. 1996, (web site at http://www.opengroup.org/rfc/mirror-rfc/rfc94.1.txt), date of capture Jun. 13, 2001, pp. 1-73. cited by other ; Peter Cox, Bench-Marking SmarGate, Establishing the Scaleability of V-ONE's SmartGate Security System, Internet SmartWare Ltd., Jul. 24, 1997, pp. 1-7. cited by other ; Answers to Frequently Asked Questions about Today's Cryptography, RSA Data Security, Inc., Oct. 5, 1993, Revision 2.0, pp. 1-44. cited by other ; Announcing the Standard for Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186, May 19, 1994, pp. 1-18. cited by other ; Sharon Boeyen, Certificate Policies and Certification Practice Statements, Entrust Technologies White Paper, Feb. 1997, Version 1.0, pp. 1-7. cited by other ; Public-Key Infrastructure (PKI)—The VeriSign Difference, Feb. 3, 2001, Copyright 1999, VeriSign, Inc., pp. 1-21. cited by other ; Thierry Moreau, Thirteen Reasons to Say ‘No’ to Public Key Cryptography, Draft paper, Mar. 4, 1998, CONNOTECH Experts-Conseils, Inc., Montréal, Québec, Canada, pp. 1-5. cited by other ; “X9 Overview,” American Bankers Association web page (web site at http://www.x9.org/aboutX9.htm), 1998, date of capture Jan. 11, 1999, 3 pp. cited by other ; Jul. 1997 Meeting Report, Electronic Payments Forum (web site at http://www.epf.net/PrevMtngs/July97Mtng/July97Report.htm), date of capture Jan. 11, 1999, 2 pp. cited by other ; Hettinga's Best of the Month, Journal of Internet Banking and Commerce, Jan. 5, 1998, (web site at wysiwyg://10/http://www.arraydev.com/commerce/JIBC/9801-20.htm), date of capture Jan. 11, 1999, 6 pp. cited by other ; Burton S. Kaliski Jr., An Overview of the PKCS Standards, An RSA Laboratories Technical Note, Nov. 1, 1993, RSA Data Security, Inc. Public-Key Cryptography Standards (PKCS), pp. 1-27. cited by other ; Public Key Cryptography, NIST Special Publiation 800-2, Apr. 1991, reprinted at http://csrc.nist.gov/publications/nistpubs/800-2/800-2.txt, pp. 1-138. cited by other ; Guideline for Implementing Cryptography in the Federal Government, NIST Special Publication 800-21, Nov. 1999, pp. 1-138. cited by other ; Guideline for the Use of Advanced Authentication Technology Alternatives, FIPS Publication 190, Sep. 28, 1994, reprinted at http://csrc.nist.gov/publications/fips/fips190/fip190.txt, pp. 1-55. cited by other ; Building A Foundation of Trust in the PC, The Trusted Computing Platform Alliance, Jan. 2000 (web site at http://www.trustedpc.org), pp 1-9. cited by other ; Trusted Platform Module (TPM) Security Policy (A Part of the “TCPA Security Policy”), Version 0.45, Oct. 2, 2000, pp. 1-13. cited by other ; Trusted Platform Module Protection Profile (TPMPP) (A Part of the “TCPA Security Policy”), Version 0.45, Sep. 14, 2000, pp. 1-151. cited by other ; TCPA PC Specific Implementation Specification, Version 0.95, Jul. 4, 2001, pp. 1-70. cited by other ; Common Criteria for Information Technology Security Evaluation, Smart Card Security User Group, Smart Card Protection Profile, draft Version 2.1d, Mar. 21, 2001, pp. 1-194. cited by other ; X9.84-2000, Biometric Information Management and Security for the Financial Services Industry, draft version, Dec. 2000, pp. 1-141. cited by other ; Security Requirements for Cryptography Modules, FIPS Publication 140-2, May 25, 2001, pp. 1-62. cited by other ; Secure Hash Standard, FIPS Publication 180-1, Apr. 17, 1995, pp. 1-24. cited by other ; Digital Signature Standard (DSS), FIPS Publication 186-2, Jan. 27, 2000, pp. 1-72. cited by other ; Entity Authentication Using Public Key Cryptography, FIPS Publication 196, Feb. 18, 1997, pp. 1-52. cited by other ; Computer Data Authentication, FIPS Publication 113, May 30, 1985, (web site at www.itl.nist.gov/fipspubs/fip113.htm), date of capture Jan.16, 2001, pp. 1-7. cited by other ; Hettinga's Best of the Month, Journal of Internet Banking and Commerce, Mar. 31, 1999, (web site at http://www.arraydev.com/commerce/JIBC/9801-20.htm), pp. 1-4. cited by other ; The Electronic Commerce Challenge, Journal of Internet Banking and Commerce, Mar. 31, 1999, (web site at http://www.arraydev.com/commerce/JIBC/9811-06.htm), pp. 1-2. cited by other ; Sales Brochure for APPROVEIT, electronic approval management software, by SilanisTechnology, Inc., Jul. 18, 2000, pp. 1-12. cited by other ; Public Key Infrastructure, An NSS Group White Paper, by Bob Walder, undated, reprinted from website http://www.nss.co.uk/WhitePapers/PublicKeyInfrastructure.htm on Jan. 25, 2001, pp. 1-18. cited by other ; Smart Card & Security Basics, Cardlogix, Inc. brochure, Ref. date: Q1-Q2 2000, pp. 3-36. cited by other ; Understanding Public Key Infrastructure (PKI), Technology White Paper, by RSA Security, Inc., 1999, pp. 1-10. cited by other ; An Overview of Smart Card Security, Chan, Siu-cheung Charles, Aug. 17, 1997, reprinted from website http://home.hkstar.com/˜alanchan/papers/smartCardSecurity/ on Jan. 27, 2001, pp. 1-7. cited by other ; Technical Introduction to CIP 3.0, Taschler, Scott, Sep. 30, 1997, reprinted from website http://www.datakey.com/cardpage/cip.htm on Jan. 25, 2001, pp. 1-6. cited by other ; Smart Cards: Enabling Smart Commerce in the Digital Age, CREC/KPMG White Paper (Draft), May 1998, pp. 1-22. cited by other ; Hettinga, Bob, Hettiga's Best of the Month, Journal of Internet Banking and Commerce; Array Development, Mar. 31, 1999, web site at http://www.arraydev.com/commerce/JIBC/9801-20.htm, pp. 1-4. cited by other ; Denny, Stephanie, The Electric Commerce Challenge, Journal of Internet Banking and Commerce; Array Development, Mar. 31, 1999, web site at http://www.arraydev.com/commerce/JIBC/9811-06.htm, pp 1-2. cited by other ; PKCS #9, Selected Object Classes and Attribute Types Version 2.0, RSA Laboratories, Redwood City, CA, pp 1-42. cited by other ; Digital Signature Guidelines Tutorial ; ABA Network, (web site at http://www.abanet.org/scietech/ec/isc/dsg-tutorial.html), date of capture Feb. 18, 2003, pp 1-7. cited by other ; Gerck, Ed, Overview of Certication Ssytems: x.509, PKIX, CA, PGP & SKIP—Do you understand digital certificates? Do you know what they warrant? Jul. 18, 2000; pp. 1-18. cited by other ; Linn, John, Trust Models and Management in Public-Key Infrastructures; RSA Laboratories, Nov. 6, 2000, pp 1-13. cited by other ; PKCS #5, v2.0: Password-Based Cryptography Standard, RSA Laboratories, Redwood City, CA; Mar. 25, 1999; pp 1-30. cited by other ; PKCS #9, v2.0: Selected Object Classes and Attribute Types, RSA Laboratories, Redwood City, CA; Feb. 25, 2000; pp. 1-34. cited by other ; PKCS #10, v1.7: Certificate Request Syntax Standard, RSA Laboratories, Redwood City, CA; May 26, 2000; pp. 1-10. cited by other ; PCKS #12, v1.0: Personal Information Excahnge Syntax, RSA Laboratories, Redwood City, CA; Jun. 24, 1999; pp. 1-23. cited by other ; PCKS #15: Conformance Profile Specification; RSA Laboratories, Redwood City, CA; Aug. 1, 2000; pp 1-8. cited by other ; Pepe, Michel; Smart Cards Gaining Traction; CRN.com—Point of Sale: Trends, Markets and Technologies; Dec. 31, 2002, (web site at http://crn.channelsupersearch.com/news.crn/39163.asp) captured on Feb. 18, 2003; pp. 1-2. cited by other ; Guide to Internet Security; Public Key Cryptography (web site at http://www.e-certify.com/library/pkc_guide.htm) captured on Feb. 18, 2003. cited by other ; Private Server Product Description; (web site at http://www.bnn.com.tr/assets/cserver_prodesc.html), date of capture Feb. 18, 2003, pp 1-11. cited by other ; Cylink atm encryptor (web site at http//securitytools.hypermart.net/security_1/cylink_atm_encryptor.html), date of capture Feb. 18, 2003, p1. cited by other ; BAL s PGP Public Key Server; The Computer Law Resource 1996; (web site at http://www.complaw.com/pgp/webkeyserver.html) date of capture Feb. 18, 2003; pp 1-2. cited by other ; Baltimore; Solutions; A New Era in Secure and Trusted E-Business; (web site at http://www.baltimore.com/solutions/index.asp) date of capture Feb. 18, 2003; p 1. cited by other ; (PGP) Pretty Good Privacy; What's? com; Dec. 27, 2000; (web site at http://whatis.techtarget.com/WhatIs_Definition_Page/0,4152,214292,00.html) date of capture Dec. 27, 2000; pp 1-3. cited by other ; An Introduction to Cryptography; Network Associates, Inc. PGP, Version 6.5.1; Jun. 1999; pp. 1-88. cited by other ; Turnbill, Jim; “Cross-Certification and PKI Policy Networking”; Entrust, Inc; Aug. 2000; pp 1-10. cited by other ; Some Suggestions for Automatic Encryption and Identity Verification in the IBM Internal Computing Network; Dec. 28, 1985; pp 1-13. cited by other ; Arthur, Dwight; AADS Option for Buyer Authentication; Response to NACHA/IC ANT 2 RFI; Sep. 14, 1998; pp 1-3. cited by other ; Internet Counsel; Consumer Internet Purchases Using ATM Cards Successfully Processed by NACHA Pilot Participants; Feb. 23, 2003; pp 1-4. cited by other ; Internet Counsel; NACHA to Test ATM Card Payments for Consumer Internet PUrchases; Feb. 23, 2003; pp 1-3. cited by other ; News Release: Digital Signatures Can Secure ATM Card Payments on the Internet, NACHA Pilot Concludes; Jul. 23, 2001; pp 1-2. cited by other ; Kutler, Jeffrey; Privacy Broker: Likely Internet Role for Banks? Digital Frontiers; Oct. 8, 1998; pp 1-6. cited by other
  • Primary Examiner: Zand, Kambiz
  • Attorney, Agent or Firm: Morris, Manning & Martin, LLP

Klicken Sie ein Format an und speichern Sie dann die Daten oder geben Sie eine Empfänger-Adresse ein und lassen Sie sich per Email zusenden.

oder
oder

Wählen Sie das für Sie passende Zitationsformat und kopieren Sie es dann in die Zwischenablage, lassen es sich per Mail zusenden oder speichern es als PDF-Datei.

oder
oder

Bitte prüfen Sie, ob die Zitation formal korrekt ist, bevor Sie sie in einer Arbeit verwenden. Benutzen Sie gegebenenfalls den "Exportieren"-Dialog, wenn Sie ein Literaturverwaltungsprogramm verwenden und die Zitat-Angaben selbst formatieren wollen.

xs 0 - 576
sm 576 - 768
md 768 - 992
lg 992 - 1200
xl 1200 - 1366
xxl 1366 -