Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 451 - 500 out of 3,724

Document Document Title
WO/2008/022158A3
Systems and methods for generating non-interactive zero-knowledge (NIZK) proofs. A homomorphic commitment scheme provides a NIZK proof that a commitment contains 0 or 1. A NIZK proof that a triple of wire assignments satisfies a NAND-gat...  
WO/2008/021887A3
A fraud-prevention system having user security parameters based on user instruction. A user specifies the security parameter for a transaction. The security parameter may include, but is not limited to a geographic location, a monetary v...  
WO/2008/022031A3
A radio frequency identification (RFID) module for an identification token includes a module body and an RFID integrated circuit (IC) mounted on or in the module body. The RFID module also includes a pressure-sensitive switching device m...  
WO/2008/021887A2
A fraud-prevention system having user security parameters based on user instruction. A user specifies the security parameter for a transaction. The security parameter may include, but is not limited to a geographic location, a monetary v...  
WO/2008/019246A2
RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their...  
WO/2008/019176A3
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository, wherein the program automatically encry...  
WO/2008/019178A2
A processor (301) for encrypting a signal to be communicated from a first location to a second location or for decrypting a signal which has been communicated from a first location to a second location, the processor being operable to se...  
WO/2008/018032A3
A method and system are provided for verifying an image transmitted over a communications network. The method includes receiving via a first communications network image data at a server. The image data is stored in a memory. Verificatio...  
WO/2008/019194A2
A communication system and method are configured for mutual authentication and secure channel establishment between two parties. In one embodiment a first party (110) generates a first one-time password and sends it to a second party (12...  
WO/2008/019353A3
Methods and systems (100) for securing communications between networked computer agents (170, 180) in a positively identifiable manner, using a centralized arbitration computer agent (190) that acts as a trusted third party to store and ...  
WO/2008/016752A3
A method is disclosed. The method includes a) receiving a dynamic data element and a first verification value derived from the dynamic data element, wherein the first verification value is generated in response to a transaction conducted...  
WO/2008/016819A3
Techniques and technologies are provided for managing establishment, maintenance and removal of security associations (SAs) between nodes in an ad hoc network, such as a wireless mesh network.  
WO/2008/017068A3
A proactive repository stores authenticated information regarding Entities and their properties. A set of conditions and policies is associated with the information in the repository. These conditions govern the release of information to...  
WO/2008/016567A2
A method and a system for access authentication. A shared services resource includes a second factor authentication module. At least one network resource each include a first factor authentication module. A trusted computing base communi...  
WO/2008/013525A1
What is disclosed is a system and method that allows a secondary certificate authority to rely on one or more existing primary certificate authorities to establish identity of a user and provide identity certificates. The secondary certi...  
WO/2008/012793A2
A device adapted to send content to a mobile media player, the device includes: an identifying unit adapted to identify a predefined physical manipulation applied on the mobile media player; and a transmitter, adapted to send content to ...  
WO/2008/012794A2
A device (100) that includes a receiver (120), adapted to receive a request to utilize media content by a mobile media player (110).  
WO/2008/014402A3
A system including a device having a screen and a memory to hold card data necessary to complete POS/ ATM transactions. The device has an authorization, signature, PIN button and scroll wheel. Branding areas allow distributors to leverag...  
WO/2008/013920A3
It is one aspect of the present invention to provide a method of digital content delivery including the steps of: (a) providing a client device for displaying digital content and a server device for storing digital content; (b) transmitt...  
WO/2008/012800A2
A method for communication includes accepting a request from a transmitter (48) to transmit data to a receiver (56) in a multiple-access communication system that uses multiple subcarriers. A maximum number of the subcarriers on which th...  
WO/2008/012800A3
A method for communication includes accepting a request from a transmitter (48) to transmit data to a receiver (56) in a multiple-access communication system that uses multiple subcarriers. A maximum number of the subcarriers on which th...  
WO/2008/012795A2
A method for sharing media content, the method includes: (i) transmitting, by a first mobile media player, an invitation to share the media content; (ii) receiving, by the first mobile media player, an acceptance indication from a second...  
WO/2008/009743A2
Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a ran dom mark; and an electronic memory element containing data about the random ...  
WO/2008/011205A3
Systems and methods of authorizing an activity, such as a financial transaction, are disclosed. Authorizing the activity may be accomplished by comparing a biometric sample to a biometric specimen. The sample is stored in a database and ...  
WO/2008/009743A3
Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a ran dom mark; and an electronic memory element containing data about the random ...  
WO/2008/011318A3
A system and method of wireless communication power control is provided which allows for adjusting power levels without requiring high bandwidth for control. Embodiments allocate subcarriers into unequal power groups, each group having a...  
WO/2008/011451A2
A method and system for reduced feedback transmit beamforming are provided. Some embodiments comprise computing a matrix of channel transfer function coefficients (406). The matrix of channel transfer function coefficients is compressed ...  
WO/2008/011504A3
Methods of determining whether a jamming signal strength is adequate, comprising receiving a signal, determining first and second noise power levels of the signal in first and second ranges of frequencies, the first range being broader t...  
WO/2008/008473A3
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other identifiers such as PIN's, passwords, codes and the like. Probability profiles or p...  
WO/2008/006537A1
The invention relates to a method of identifying an individual comprising: - a step of identification (1201) in the course of which the identity of the individual to be identified is determined, a step of obtaining (1203) in the course o...  
WO/2008/008825A3
A method and a system for an anonymous communication system. The system includes a user identifier, a first user is identified, an authenticator to verify the user, a communicator, the first user enters a message on the communicator to a...  
WO/2008/008101A2
The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices, and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communicat...  
WO/2008/008621A3
The present invention discloses an apparatus and method for transferring digital content data. In one example, original digital content data stored on a first device in an encrypted state is transcoded (after being decrypted) to create a...  
WO/2008/008053A3
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a function of a predetermined parameters and private tables as a function of the pr...  
WO/2008/008938A3
A remote service system capable of providing service also in environment of a dynamic IP address is realized. A service demanding apparatus (100) has a demand- side rooter (106) connected to the Internet (300) by using a dynamic IP addre...  
WO/2008/008619A3
A web enabled game analyzes businesses by categorizing companies by markets then drilling down to data charts including interactive assessment of private and public company values within those markets.  
WO/2008/008473A2
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other identifiers such as PIN's, passwords, codes and the like. Probability profiles or p...  
WO/2008/007362A2
A potentially interfering node updatable database associated with the MAC, in each node, contains a limited number of unique identification numbers (UNIDs) referring to nodes likely to interfere with the transmission of the node. Typical...  
WO/2008/005875A2
Systems and methods for verifying the identity of a person operating a device are shown. In some representative embodiments, a method comprises authorizing a person to operate a device, continuously monitoring a biometric trait of a devi...  
WO/2008/005741A2
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting t...  
WO/2008/005597A3
A method is provided for identifying and verifying a person using hand biometrics with an anti-spoofing measure. The method comprises acquiring (51) a first image (10) of a hand in a first configuration, acquiring (52) a second image (30...  
WO/2008/005876A3
A transaction account verification system and method are provided. A user computing device transmits an account registration request that includes a selection of an account verification technique. A service provider obtains the request a...  
WO/2008/005600A2
A system (100) and method (400) for peak limiting suitable for use in a communication system is provided. The method can include modulating (402) a symbol vector to produce a modulated waveform (500), wherein the symbol vector contains a...  
WO/2008/005884A2
Embodiments are provided for managing notification of residents of a controlled- environment facility of pending messages awaiting retrieval by such residents. In one embodiment, a messaging system is provided in which a party external t...  
WO/2008/005650A3
A method and apparatus is provided for allowing communication of a secondary communication device (105) over non-licensed spectrum. During operation a replica transmission (114) will be periodically transmitted by a base station (111) wi...  
WO/2008/005184A3
To copy protect an optical disc, such as a DVD, program chains additional to the main program chain are provided. These program chains may lead to the genuine data but in an incomplete or incorrect order or to false data. Sufficient addi...  
WO/2008/005406A2
A new watermark (4901, 4902, 4903) for motion pictures utilizes the fact that defects of isolated still images that are clearly identifiable as such can be tuned so that the effect on the motion picture is invisible (we say that they are...  
WO/2008/003086A3
Disclosed are systems and methods which provide techniques providing account setup, management and transaction authorization determinations in real-time using transaction interrupt messaging. Embodiments preferably take into consideratio...  
WO/2008/001382A3
A method and system for ensuring the secure authentication of transactions over a communication network using a validation code 40, wherein the user submits information over a communication terminal and submitting validation code 40 for ...  
WO/2008/001365A3
Some demonstrative embodiments of the invention include devices, systems and/or methods of encrypted wireless communication. Some demonstrative embodiments of the invention include a wireless transmitter to generate an encrypted wireless...  

Matches 451 - 500 out of 3,724