Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …
information, resulting in financial loss of individuals as well as organisations. Nowadays …
Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
W Hockey, M Kelly - US Patent 10,104,059, 2018 - Google Patents
(57) ABSTRACT A permissions management system is disclosed for enabling a user to
securely authorize a third-party system to access user account data and initiate transactions …
securely authorize a third-party system to access user account data and initiate transactions …
Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
W Hockey, M Kelly - US Patent 10,003,591, 2018 - Google Patents
(57) ABSTRACT A permissions management system is disclosed for enabling a user to
securely authorize a third-party system to access user account data and initiate transactions …
securely authorize a third-party system to access user account data and initiate transactions …
Parameter-based computer evaluation of user accounts based on user account data stored in one or more databases
W Hockey, S Rapoport - US Patent 10,726,491, 2020 - Google Patents
US10726491B1 - Parameter-based computer evaluation of user accounts based on user
account data stored in one or more databases - Google Patents US10726491B1 …
account data stored in one or more databases - Google Patents US10726491B1 …
Authenticating application legitimacy
V Ekambaram, SK Rakshit - US Patent 9,946,874, 2018 - Google Patents
Facilities are provided herein to address application phishing by determining whether an
application is a legitimate appli cation it purports to be. Optical code (s) are displayed on a …
application is a legitimate appli cation it purports to be. Optical code (s) are displayed on a …
Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
W Hockey, M Kelly - US Patent 10,530,761, 2020 - Google Patents
(57) ABSTRACT A permissions management system is disclosed for enabling a user to
securely authorize a third-party system to access user account data and initiate transactions …
securely authorize a third-party system to access user account data and initiate transactions …
System and method for programmatically accessing financial data
W Hockey, C Li, Z Perret - US Patent 10,319,029, 2019 - Google Patents
Systems and methods for programmatic access of external financial service systems. An
application proxy instance is created that simulates an application of an external financial …
application proxy instance is created that simulates an application of an external financial …
Data verified deposits
WL Putnam - US Patent 10,878,421, 2020 - Google Patents
(57) ABSTRACT A system and method for verifying account ownership using verified
deposits. An ACH verification platform may recog nize or detect a verification process …
deposits. An ACH verification platform may recog nize or detect a verification process …
Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
W Hockey, M Kelly - US Patent 10,904,239, 2021 - Google Patents
(57) ABSTRACT A permissions management system is disclosed for enabling a user to
securely authorize a third-party system to access user account data and initiate transactions …
securely authorize a third-party system to access user account data and initiate transactions …
Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
W Hockey, M Kelly - US Patent 10,523,653, 2019 - Google Patents
(57) ABSTRACT A permissions management system is disclosed for enabling a user to
securely authorize a third-party system to access user account data and initiate transactions …
securely authorize a third-party system to access user account data and initiate transactions …