Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 551 - 600 out of 5,467

Document Document Title
WO/2007/142913A3
An embodiment of the present invention is a technique to process signals in a communication system. A channel impulse response (CIR) generator generates a time-domain windowed CIR from a received signal using a window function. A thresho...  
WO/2007/143252A3
A system and method for returning a rights management object (103) to a rights issuer (102) is provided. The system and method allows a rights issuer (102) to ensure that the rights management object (103) is removed from an electronic d...  
WO/2007/142913A2
An embodiment of the present invention is a technique to process signals in a communication system. A channel impulse response (CIR) generator generates a time-domain windowed CIR from a received signal using a window function. A thresho...  
WO/2007/143178A3
Method and apparatus for performing a background check, including collecting, organizing, and transmitting electronic data, including biometric and other demographic data.  
WO/2007/143588A2
A receiver including a channel estimation function in which an initial channel estimate is filtered to increase receiver operation, particularly when the receiver may only have a limited number of channel estimation symbols with which to...  
WO/2007/143441A3
A system and method for performing authentication are disclosed. The system may include a shared central processing server, a plurality of software components each residing in a corresponding point-of-sale (POS) workstation and an identi...  
WO/2007/143588A3
A receiver including a channel estimation function in which an initial channel estimate is filtered to increase receiver operation, particularly when the receiver may only have a limited number of channel estimation symbols with which to...  
WO/2007/140387A3
This patent discloses a media distribution and marketing system to create a plurality of virtual distribution networks (VDNs) to provide media content to a plurality of subscribers of the VDNs, and provides a method of enhancing the subs...  
WO/2007/138603A3
A method and system for transforming a logical data object in a storage device Transforming the logical data object comprises creating in the storage device a transformed logical data object (fig 2b, 213LU) comprising a header (fig 2b, 2...  
WO/2007/136986A3
A method of providing remittance users with an inexpensive and easily accessible service system that directly interfaces merchants with their payment source worldwide. Embodiments of the present invention allow individuals in any country...  
WO/2007/136931A3
Reference sequences are constructed from distinct "classes" of GCL sequences that have an optimal cyclic cross correlation property. The fast cell search method disclosed detects the "class indices" with simple processing. In a system de...  
WO/2007/136311A9
The invention concerns a temporary radio base station, temporary RBS (140), which can gain and maintain control of the traffic to and from a targeted radio base station (120) in a wireless cellular telecommunications system (100), and a ...  
WO/2007/136311A1
The invention concerns a temporary radio base station, temporary RBS (140), which can gain and maintain control of the traffic to and from a targeted radio base station (120) in a wireless cellular telecommunications system (100), and a ...  
WO/2007/136309A1
A method for letting a temporary radio base station (RBS, 140) gain and maintain control of the traffic of a targeted RBS (120) in a system (100), where RBS's transmit an identity signal and a list of candidate frequencies for use by use...  
WO/2007/137283A3
One inventive step includes facilitating obtaining a payment file associated with a buyer (for example, directly from the buyer, or from a third party partner). The file includes data specifying a first form of payment from the buyer to ...  
WO/2007/135664A2
A system (100) and a method for real-time authentication and notification of a user of a Web site for inter-personal communications through the user's (110) cellular telephone (112).  
WO/2007/135672A3
Protecting the integrity and the effectiveness of a security agent that is installed in a user's device while the user's device operates online or offline. The security agent may be used for enforcing a security policy required by an org...  
WO/2007/133178A2
In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of the present invention, input from an input source, such as traffic from a com...  
WO/2007/133697A3
Methods and apparatus are disclosed for facilitating online storage of files (e.g., audio tracks, video, etc.) for playback/access or sale/exchange by the owners of the files without violating copyrights that copyright holders have in th...  
WO/2007/134082A3
A security-preserving proxy tunnel (500) is disposed between a client computer (100) and a trusted secure server (90). The proxy tunnel (500) operates over an insecure network, in which the connection is as secure as if it were direct, b...  
WO/2007/133182A2
A modular aerospace plane. In one embodiment the plane can include a forward fuselage section, a main wing section, a tail section and wing attachments. Various sections can be integrated to offer a variety of aircraft characteristics, p...  
WO/2007/134083A3
The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one identity verification system, utilizing a platform- independent architecture...  
WO/2007/134058A3
Automatically determining pricing for at least one unit of content that can be selected and purchased over a network for one or more of a plurality of predetermined categories of use and in one or more formats. Also, one or more sources ...  
WO/2007/133541A3
A system and method provide efficient, secure and highly reliable authentication for transaction processing and/or access control applications in which only biometric input is required from the user. A Personal Digital Key stores a biome...  
WO/2007/133484A3
A method of searching a specific computer IP address of Internet networks using several specific telephone numbers in series which are arranged and assenbled in sequnce and coded with identification codes, having a specific website, a se...  
WO/2007/129306A3
A system for approving transaction card transactions in which a card reader associated with a transaction approving authority (TAA). A source for complementary security data is linkable to the TAA can send data to the TAA, and a database...  
WO/2007/130554A2
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/130687A3
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications A Personal Digital Key stores one or more profiles(e g, a biometric profile) in a tamper-proo...  
WO/2007/129308A3
The present invention relates to devices and methods for planning and supervising minimally invasive surgery. Included are enhancements to systems for planning, monitoring, and controlling cryosurgery.  
WO/2007/130681A3
A system and method for delivering content over a network is provided. Content may be primary content (e.g., music or a movie) or ancillary (104) content (e.g., an advertisement). The ancillary (104) content may further be classified as ...  
WO/2007/131131A3
The disclosure details a nested security access system that manages access points/verification requests to create a series of layered security applications for securing access/user identification data. The NSA system works in coordinatio...  
WO/2007/131174A3
A system and method are described that provide television content broadcast system subscribers with convenient access to aggregated web feed content. In one embodiment, a television content broadcast system (20) maintains a database (21 ...  
WO/2007/130554A3
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/130861A2
Methods and systems consistent with the present invention provide a method for dynamically controlling power consumption in a digital demodulator circuit by varying clock rates and bit widths of demodulator components including an analog...  
WO/2007/129308A9
The present invention relates to devices and methods for planning and supervising minimally invasive surgery. Included are enhancements to systems for planning, monitoring, and controlling cryosurgery.  
WO/2007/130356A2
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for...  
WO/2007/130416A2
Methods and apparatus are provided for processing packets in a network. A received packet includes title materials which include one or more of a title object, a component of the title object, or a reference to the title object. The titl...  
WO/2007/130502A2
Methods, apparatus, and data structures embodied in computer-readable media are provided for facilitating access to a service in a network. Title materials are received which include one or more of a first title object, a component of th...  
WO/2007/126853A3
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2007/127547A4
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutuall...  
WO/2007/127576A3
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve ...  
WO/2007/127782A3
A signal processing system according to various aspects of the present invention includes an excursion signal generator, a scaling system and a filter system. The excursion signal generator identifies a peak portion of a signal that exce...  
WO2007106694A9
Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies tha...  
WO/2007/126853A8
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2007/126434A2
A method for determining a bandwidth of a complex valued sample stream may include correlating a first portion of a preamble symbol of the complex valued sample stream with a second portion of the preamble symbol to generate a time autoc...  
WO/2007/127547A3
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutuall...  
WO/2007/127157A3
Retinal blood vessels are detected for biometric identification by: receiving at least one image with retinal data; detecting, an area in the image corresponding to a spatial variation in the image; and determining a blood vessel pattern...  
WO/2007/123513A1
An information management system includes a computer server. The computer server includes an interface module. The information management system also includes a plurality of card processors in communication with the computer server via t...  
WO/2007/123869A2
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized qu...  
WO/2007/124379A3
An input random access memory (RAM) module of a fast Fourier transform (FFT) engine of a DVB receiver is used to store, during a first time period, delayed versions of an input signal that includes a first orthogonal frequency divisional...  

Matches 551 - 600 out of 5,467