Dr. Wallis graduated from the University of Texas Medical School at San Antonio in 1988. He works in Tyler, TX and 2 other locations and specializes in Dermatology. Dr. Wallis is affiliated with Good Shepherd Medical Center, Longview Regional Medical Center and Mother Francis Hospital.
Name / Title
Company / Classification
Phones & Addresses
Mark Wallis
Spa Shoppe, The Swimming Pool Equipment & Supplies
5515 Thickson Rd N, Whitby, ON L1M 1X1 (905)6559252, (905)6551029
Mark Wallis Staff Member
North Carolina Restaurant And Lodging Association Eating Places
6036 Six Forks Road, Raleigh, NC 27609
Mark Wallis
Spa Shoppe, The Swimming Pool Equipment & Supplies
William L. Ferguson - Walnut Creek CA Mark H. Wallis - Long Beach CA
Assignee:
Comark Technologies, Inc. - Elk Grove Village IL
International Classification:
G06K 1500 G07G 112
US Classification:
235383
Abstract:
The present invention relates to a system for automating data acquisition and processing at a checkstand point-of-sale in a retail outlet. Preferred embodiments include a first local area network of POS terminals for initiating merchandise purchase transactions. All of the purchase transactions in the first local area network are passively monitored to acquire primary purchase data. A second local area network of lane terminal devices inputs secondary data, including discount coupon information, check information and bank card information to a universal system controller. The universal system controller mirrors the primary information, processes the primary and the secondary information, and generates output information to the POS terminals of the first local area network via the lane terminal devices of the second local area network, the output information including coupon verification data, coupon amount data, check verification data and bank card verification data.
Use Of Aka Methods And Procedures For Authentication Of Subscribers Without Access To Sim Credentials
- Westford MA, US Satish Agrawal - San Jose CA, US Mark Wallis - Woodland Hills CA, US
International Classification:
G06F 21/62 H04W 12/06 G06F 21/12 G06F 21/44
Abstract:
Systems and methods which enable an authentication procedure to be used within the standard network security architecture to authenticate third party applications that are forbidden access to a particular secret key are disclosed. Third party smartphone applications that are unable to use SIM-based authentication due to being forbidden access to a SIM-based key are provided an alternate secret key for use in an EAP-AKA or EAP-SIM type procedure according to embodiments. An authentication server or other backend authentication infrastructure of embodiments requests authentication vectors from a backend system sharing the alternative secret key. Accordingly, the backend authentication platform of embodiments is adapted to know or detect that an application is using an alternative secret key (e.g., a secret key other than the SIM-based secret key) and to perform the appropriate procedure for the key type.
Use Of Aka Methods And Procedures For Authentication Of Subscribers Without Access To Sim Credentials
Systems and methods which enable an authentication procedure to be used within the standard network security architecture to authenticate third party applications that are forbidden access to a particular secret key are disclosed. Third party smartphone applications that are unable to use SIM-based authentication due to being forbidden access to a SIM-based key are provided an alternate secret key for use in an EAP-AKA or EAP-SIM type procedure according to embodiments. An authentication server or other backend authentication infrastructure of embodiments requests authentication vectors from a backend system sharing the alternative secret key. Accordingly, the backend authentication platform of embodiments is adapted to know or detect that an application is using an alternative secret key (e.g., a secret key other than the SIM-based secret key) and to perform the appropriate procedure for the key type.