Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 451 - 500 out of 5,929

Document Document Title
WO/2006/101710A3
A transceiver comprising a data processing module, a security processing module, a medium access control (MAC) module, a dirty-paper-coding (DPC) module, and a smart antenna processor. The data processing module provides user data stream...  
WO/2009/070724A1
The present invention provides a system for purchasing music in integrated songs or devided into manipulatable components and then create new works with these components in unique productions and then release and distribute such music in...  
WO/2006/069082A3
In an embodiment, secure module (102) provides access keys (e.g., encryption keys 122) to unsecured system (126). In an embodiment, secure module (102) may generate passcodes and supply passcodes to unsecured system (126). In an embodime...  
WO/2007/129308A9
The present invention relates to devices and methods for planning and supervising minimally invasive surgery. Included are enhancements to systems for planning, monitoring, and controlling cryosurgery.  
WO/2009/045586A3
A system for encrypting and decrypting data is provided. The system includes a client for receiving a data packet, setting a value of a crypto bit, and transmitting the data packet over a system bus. A crypto module receives the data pac...  
WO/2007/046982A3
Media devices are connected to a network. Restrictive rights restrict how the media device can process restricted media content on the network. Information indicative of the restrictive rights associated with the network is stored on the...  
WO/2007/107976A3
A method for securing encryption keys is described, the method including providing a first device and a second device (110 and 120), the devices include secure and insecure hardware, generating in the secure hardware at least two period ...  
WO/2009/064409A1
A wireless mesh network provides secure communication by encrypting data using one or more encryption keys. A configuration device in communication with a security manager of the network provides a temporary secure communication path bet...  
WO/2006/078556A3
Techniques for authentication are provided. A first authentication request transformed with a private portion of a first type split private key is received. A first user is authenticated for a first level of network access based upon the...  
WO/2007/113787A3
A certificate for use in a secure communication system that employs a public-key infrastructure (PKI) scheme is disclosed. The certificate includes: a certificate field including an indication of identity of a secure device to which the ...  
WO/2006/045123A3
A promotional method and apparatus are provided to facilitate a promotional campaign in which databases of terminals are populated with a prize allocation algorithm and game identification data. Users who qualify to participate in the ca...  
WO/2007/058952A3
A policy component comprises policy configuration information. The policy configuration information contains one or more rules. Each rule and group of rules can be associated with a set of response actions (25). As the nodes on the monit...  
WO/2009/058526A1
Financial transaction data comprising payment on any one of multiple financial transaction types are processed with an adapter layer that receives an incoming data message relating to a financial transaction initiated by a payer and oper...  
WO/2009/059029A1
A financial transaction processing system and network that supports multiple types of financial and other transactions which may be initiated or confirmed using a mobile device, internet or telephone. The system employs one or more centr...  
WO/2006/115804A3
A method of autocalibrating a single-photon detector (SPD) unit in a quantum key distribution (QKD) system (200). The method includes exchanging photon signals (P1, P2) to establish a bit-error rate (BER). The method also includes perfor...  
WO/2008/047356A3
system for providing global biometric identification services to a plurality of remote partfes, the system comprising: a template receiver (110), which comprises: a registration input configured to receive from at least one remote regist...  
WO/2007/100311A3
An ultra wideband (UWB) jamming system comprises a processor (120), a memory (125), a pulse generator (115), one or more UWB transmitters (110), and one or more UWB antennas (160). In an exemplary embodiment of the present invention, the...  
WO/2008/072234A3
Decryption apparatus includes an input memory (48), which is coupled to receive encrypted data, and an output transducer (28), for presenting decrypted data to a user. A decryption processor (50) is coupled to read and decrypt the encryp...  
WO/2009/055040A1
A software tagging application is configured to measure software application usage within an enterprise deployment. The software tagging application using the concepts of tags, and extends the use of tags to convey monitored software usa...  
WO/2006/135741A3
Systems, methods and computer program products for enabling a holder of a transaction account linked to a financial transaction instrument to delegate management of the transaction account to an assistant. Information relating to the tra...  
WO/2008/018032A3
A method and system are provided for verifying an image transmitted over a communications network. The method includes receiving via a first communications network image data at a server. The image data is stored in a memory. Verificatio...  
WO/2008/001382A3
A method and system for ensuring the secure authentication of transactions over a communication network using a validation code 40, wherein the user submits information over a communication terminal and submitting validation code 40 for ...  
WO/2008/039167A3
A user activates the transaction facilitation system from an online banking homepage. Thereafter, communication is performed over a secure communication network. User and transaction type information are received and a unique transaction...  
WO/2008/001364A3
Some demonstrative embodiments of the invention include devices, systems and/or methods of Multiple-Input-Multiple-Output wireless transmission. Some demonstrative embodiments of the invention include a wireless transmitter having a plur...  
WO/2007/015229A3
The present invention is directed to an OTP client, comprising: a plurality of tickets, each having an impression of a subsequent OTP value of an OTP sequence; and a ticket dispenser, for storing the tickets and for dispensing the ticket...  
WO/2006/084025A3
A method and system for performing pre-authentication across inter-subnets. A pre-authentication request is received by a first access point associated with a first subnet from a mobile node requesting that is requesting pre-authenticati...  
WO/2006/101943A3
An embodiment of the present invention is a system for identifying a user by observing irregularities on the surface of an eyeball of the user includes a topography system and a gaze tracking system. The topography system obtains one or ...  
WO/2009/055462A1
A business to media (B2M) transaction standard provides for the visualization and transactions of wares, simultaneously, in real time over multiple media in multiple marketplaces. An exemplary method for facilitating such transactions be...  
WO/2008/030993A3
In a computing environment, including an educational management system having a server, a method for administering a high-stakes exam includes securing at least one computing device having a processor and memory on which the high-stakes ...  
WO/2009/055460A1
A computer network based universal transaction system architecture that enables transaction between one or more offer providers and one or more customers relating to offers of wares by the offer providers The architecture of the CNBUTS i...  
WO/2006/001012A3
A method and device for encryption and decryption of an input data. The encryption method comprises producing carrier for the data in the form of a space-variant subwavelength grating element, with local gratings having angles of orienta...  
WO/2005/114883A3
A system for downloading discrete media content to a mobile telephone, the discrete media content being broadcast by a broadcasting system to a media device, the discrete media content being at least one of shown on, and heard from the m...  
WO/2009/051623A2
The invention discloses a small token device, ideally about the size of a key, which can plug into the USB interface of a host computer, which need not be fully trusted, and handle a variety of different security functions. The device is...  
WO/2009/051937A1
Methods, systems, and machine-readable media are disclosed for financial transfers utilizing a unique identifier to facility flexible payment options for the transaction. According to one embodiment, a method for supporting a money trans...  
WO/2007/078329A3
A Radio Frequency Identification (RFID) security system having a client, that includes a computerized system, at least one RFID tag, and a RFID reader. The computerized system and RFID reader employ a first security protocol and the RFID...  
WO/2006/115616A3
To communicate requirements for a digital license from a receiver of corresponding digital content to a computing device upon which the digital content is to be rendered, the receiver tunes the content and locates within the content info...  
WO/2007/126853A8
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2009/052531A1
Systems and methods are disclosed for tracking user access to an advertisement and user transactions with an electronic commerce computer associated with the advertisement. In accordance with one aspect of the disclosed technology, a tra...  
WO/2007/055745A3
A facial biometric recognition system and method (100) for providing security for an electronic device (101) includes a digital camera (105) having a field of view for providing facial biometric images at a predetermined interval from a ...  
WO/2007/035469A3
This invention discloses a multi-factor remote user authentication card- device (12) in the form factor of a prior art one-factor of "what you have" security card. The multi-factor card-device has innovative features that enable this one...  
WO/2007/002841A3
A revenue management system and method for telecommunication network use is disclosed. The revenue management system can be integrated with the internet protocol multimedia subsystem (IMS). The revenue management system and method can ha...  
WO/2008/086599A8
Systems and methods for generating OFDM signals are provided in which sub-carrier usage is selected and/or remapped in various manners. For example, in some embodiments remapping using a security sequence is employed; in other embodiment...  
WO/2008/008053A3
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a function of a predetermined parameters and private tables as a function of the pr...  
WO/2006/031356A3
Data such as high definition (HD) video may be sent from a transmitter (12a) such as a laptop computer (12) to a receiver (20a) such as a video projector (20) using a 60 GHz (and, hence, inherently directional, short range, and thus secu...  
WO/2009/050830A1
An authentication system includes a measuring section for measuring a spectrum by irradiating a terahertz authentication card incorporating a substance having a proper vibration frequency in a terahertz frequency band with a terahertz wa...  
WO/2007/135672A3
Protecting the integrity and the effectiveness of a security agent that is installed in a user's device while the user's device operates online or offline. The security agent may be used for enforcing a security policy required by an org...  
WO/2007/138603A3
A method and system for transforming a logical data object in a storage device Transforming the logical data object comprises creating in the storage device a transformed logical data object (fig 2b, 213LU) comprising a header (fig 2b, 2...  
WO/2007/021418A3
A first device 104 receives a message over a wired connection 108 from a second device 102 seeking to establish a secure wireless connection with the first device. In response to the received message 302, the first device exchanges infor...  
WO/2008/050343A3
An expendable, stand-alone, off-board Electronic Counter-Measure system, airborne RF decoy aimed to provide airborne platforms with protection against multiple radar-based threats including Air-to-Air and Surface-to-Air missiles both act...  
WO/2007/116398A3
Disclosed are a method, device and system for enhancing reception of a communication signal in a wireless communication network. According to some embodiments of the present invention, a supplemental receiver transmits a communication au...  

Matches 451 - 500 out of 5,929