Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 451 - 500 out of 5,466

Document Document Title
WO/2008/033843A2
A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the assumption that the information exchanged duri...  
WO/2008/033284A3
Systems and methods for performing QKD using one or more high-altitude platforms (HAPs). The system includes a second QKD station (Alice) supported by the HAP so as to be in free-space communication with the first QKD station (Bob) over ...  
WO/2008/033951A2
A mobile terminated call is delivered to a mobile device during an inter- VLR location update by first routing the mobile terminated call to the old mobile switching center/visitor location register (MSC/VLR), determining that the mobile...  
WO/2008/033111A2
In the present sampling technique of a transmitted data stream, a data stream is divided (318, 504) into a predefined number of sample streams to provide a plurality of sample streams, and for at least two of these sample streams, a metr...  
WO/2008/033551A3
A method and a system conducts payment transactions via instant messaging. The system includes a messaging interface to receive a payment transaction request at a payment application from a network-based device via a network. The messagi...  
WO/2008/030679A2
The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for transporting security association messages. The secure link can allow the mesh key distribut...  
WO2007137283A9
One inventive step includes facilitating obtaining a payment file associated with a buyer (for example, directly from the buyer, or from a third party partner). The file includes data specifying a first form of payment from the buyer to ...  
WO/2008/029059A3
A system secures a personal code for a user of a personal entity (EP) containing data (SIG) and associated with a code processing entity (ETC). The personal entity establishes a (REP_CLn) graphical representation of characters that may b...  
WO/2008/030704A2
A method and system for secure processing of authentication key material in an ad hoc wireless network enables secure distribution of the authentication key material between a mesh authenticator (110) and a mesh key distributor (115), wh...  
WO/2008/030750A3
A controlled content distribution system (CCDS) employs a peer-level application into which a content producer can import digital content (e.g., video, audio, graphic, image, text, code files, etc.) The content producer identifies distri...  
WO/2008/030993A3
In a computing environment, including an educational management system having a server, a method for administering a high-stakes exam includes securing at least one computing device having a processor and memory on which the high-stakes ...  
WO/2008/027626A3
A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management. An exemplary aspect of the invention also ...  
WO/2008/027877A3
Methods and systems permit monitoring behavior of a holder of a multifunction presentation instrument that is suitable for presentation by the holder in support of payment transactions and access transactions. A payment transaction invol...  
WO/2008/027998A3
A method for minimizing risk of a consumer performing a fraudulent Internet purchase transactions using a transaction card is disclosed herein, the method comprising receiving an enrollment verification request for a transaction from a m...  
WO/2008/027957A3
Transmission systems and methods for reducing interference by wideband communication systems with narrowband communications systems are disclosed. In some embodiments an ultrawideband system employing orthogonal frequency division multip...  
WO/2008/027324A3
A system and method is provided to accept and settle transaction payments for an unbanked consumer. A consumer initiates a transaction with a merchant, and the merchant may transmit transaction information to a central processing unit (C...  
WO/2008/027998A4
A method for minimizing risk of a consumer performing a fraudulent Internet purchase transactions using a transaction card is disclosed herein, the method comprising receiving an enrollment verification request for a transaction from a m...  
WO/2008/027324A2
A system and method is provided to accept and settle transaction payments for an unbanked consumer. A consumer initiates a transaction with a merchant, and the merchant may transmit transaction information to a central processing unit (C...  
WO/2008/027887A3
A system for obtaining lease proposals from multiple landlords for a tenant includes a tenant workstation, a number of landlord workstations and a server in communication with the tenant and landlord workstations. The server features sof...  
WO/2008/025037A3
A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are as...  
WO/2008/024967A3
The system and method for off-diagonal MIMO precoders for generating precoded signals to increasing system performance for plurality of users in an xDSL system (130), comprising, an initialization module (170) configured to learn charact...  
WO/2008/024119A1
Systems and methods are provided for distributing graphic assets among users of personal communication devices. The graphic assets may include, for example, an avatar and/or avatar accessories used to exchange messages over cellular tele...  
WO/2008/024135A2
A client platform can be verified prior to being granted access to a resource or service on a network by validating individual hardware and software components of the client platform. Digests are generated for the components of the clien...  
WO/2008/024870A3
Methods and apparatus, including computer program products, for gift card services. In general, data characterizing a request to provide a merchant credit service to an intended recipient is received and a message to be sent to the inten...  
WO/2008/020991A3
The exemplary embodiments of this invention provides notarized federated identity management that may have application like supporting efficient user authentication when providers are unknown to each other and/or for avoiding direct comm...  
WO/2008/021454A3
A federated credentialing system, and a correspond method, includes credential issuers that interact with relying parties to provide system users with access to protected resources within the system. The system includes a relying party f...  
WO/2008/022158A3
Systems and methods for generating non-interactive zero-knowledge (NIZK) proofs. A homomorphic commitment scheme provides a NIZK proof that a commitment contains 0 or 1. A NIZK proof that a triple of wire assignments satisfies a NAND-gat...  
WO/2008/021887A3
A fraud-prevention system having user security parameters based on user instruction. A user specifies the security parameter for a transaction. The security parameter may include, but is not limited to a geographic location, a monetary v...  
WO/2008/022031A3
A radio frequency identification (RFID) module for an identification token includes a module body and an RFID integrated circuit (IC) mounted on or in the module body. The RFID module also includes a pressure-sensitive switching device m...  
WO/2008/021887A2
A fraud-prevention system having user security parameters based on user instruction. A user specifies the security parameter for a transaction. The security parameter may include, but is not limited to a geographic location, a monetary v...  
WO/2008/019246A2
RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their...  
WO2007084935B1
Various embodiments are described which can serve to mitigate interference between the control channel signaling of adjacent sectors/cells. Potentially, these techniques may have the benefit of reducing the system resource drain caused b...  
WO/2008/019176A3
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository, wherein the program automatically encry...  
WO/2008/019178A2
A processor (301) for encrypting a signal to be communicated from a first location to a second location or for decrypting a signal which has been communicated from a first location to a second location, the processor being operable to se...  
WO/2008/018032A3
A method and system are provided for verifying an image transmitted over a communications network. The method includes receiving via a first communications network image data at a server. The image data is stored in a memory. Verificatio...  
WO2007149796A8
A telecommunication system includes a processor, interfaces in communication with the public telephone network and a data network, respectively, and a memory. The memory comprises executable instructions that when executed by the process...  
WO/2008/019194A2
A communication system and method are configured for mutual authentication and secure channel establishment between two parties. In one embodiment a first party (110) generates a first one-time password and sends it to a second party (12...  
WO/2008/019353A3
Methods and systems (100) for securing communications between networked computer agents (170, 180) in a positively identifiable manner, using a centralized arbitration computer agent (190) that acts as a trusted third party to store and ...  
WO/2008/016752A3
A method is disclosed. The method includes a) receiving a dynamic data element and a first verification value derived from the dynamic data element, wherein the first verification value is generated in response to a transaction conducted...  
WO/2008/016819A3
Techniques and technologies are provided for managing establishment, maintenance and removal of security associations (SAs) between nodes in an ad hoc network, such as a wireless mesh network.  
WO/2008/017068A3
A proactive repository stores authenticated information regarding Entities and their properties. A set of conditions and policies is associated with the information in the repository. These conditions govern the release of information to...  
WO/2008/016567A2
A method and a system for access authentication. A shared services resource includes a second factor authentication module. At least one network resource each include a first factor authentication module. A trusted computing base communi...  
WO/2008/013525A1
What is disclosed is a system and method that allows a secondary certificate authority to rely on one or more existing primary certificate authorities to establish identity of a user and provide identity certificates. The secondary certi...  
WO/2008/012793A2
A device adapted to send content to a mobile media player, the device includes: an identifying unit adapted to identify a predefined physical manipulation applied on the mobile media player; and a transmitter, adapted to send content to ...  
WO/2008/012794A2
A device (100) that includes a receiver (120), adapted to receive a request to utilize media content by a mobile media player (110).  
WO/2008/014402A3
A system including a device having a screen and a memory to hold card data necessary to complete POS/ ATM transactions. The device has an authorization, signature, PIN button and scroll wheel. Branding areas allow distributors to leverag...  
WO/2008/013920A3
It is one aspect of the present invention to provide a method of digital content delivery including the steps of: (a) providing a client device for displaying digital content and a server device for storing digital content; (b) transmitt...  
WO/2008/012800A2
A method for communication includes accepting a request from a transmitter (48) to transmit data to a receiver (56) in a multiple-access communication system that uses multiple subcarriers. A maximum number of the subcarriers on which th...  
WO/2008/012800A3
A method for communication includes accepting a request from a transmitter (48) to transmit data to a receiver (56) in a multiple-access communication system that uses multiple subcarriers. A maximum number of the subcarriers on which th...  
WO/2008/012795A2
A method for sharing media content, the method includes: (i) transmitting, by a first mobile media player, an invitation to share the media content; (ii) receiving, by the first mobile media player, an acceptance indication from a second...  

Matches 451 - 500 out of 5,466