Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 551 - 600 out of 5,632

Document Document Title
WO/2008/013525A1
What is disclosed is a system and method that allows a secondary certificate authority to rely on one or more existing primary certificate authorities to establish identity of a user and provide identity certificates. The secondary certi...  
WO/2008/012800A3
A method for communication includes accepting a request from a transmitter (48) to transmit data to a receiver (56) in a multiple-access communication system that uses multiple subcarriers. A maximum number of the subcarriers on which th...  
WO/2008/012793A2
A device adapted to send content to a mobile media player, the device includes: an identifying unit adapted to identify a predefined physical manipulation applied on the mobile media player; and a transmitter, adapted to send content to ...  
WO/2008/014402A3
A system including a device having a screen and a memory to hold card data necessary to complete POS/ ATM transactions. The device has an authorization, signature, PIN button and scroll wheel. Branding areas allow distributors to leverag...  
WO/2008/011205A3
Systems and methods of authorizing an activity, such as a financial transaction, are disclosed. Authorizing the activity may be accomplished by comparing a biometric sample to a biometric specimen. The sample is stored in a database and ...  
WO/2008/011504A3
Methods of determining whether a jamming signal strength is adequate, comprising receiving a signal, determining first and second noise power levels of the signal in first and second ranges of frequencies, the first range being broader t...  
WO2006127229A8
A server (120) uses a password (p) to construct a multiplicative group (ZN*) with a (hidden) smooth order subgroup (), where the group order (Pp) depends on the password. The client (110) uses its knowledge of the password to genera...  
WO/2008/011451A2
A method and system for reduced feedback transmit beamforming are provided. Some embodiments comprise computing a matrix of channel transfer function coefficients (406). The matrix of channel transfer function coefficients is compressed ...  
WO/2008/009743A2
Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a ran dom mark; and an electronic memory element containing data about the random ...  
WO/2008/009743A3
Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a ran dom mark; and an electronic memory element containing data about the random ...  
WO/2008/011318A3
A system and method of wireless communication power control is provided which allows for adjusting power levels without requiring high bandwidth for control. Embodiments allocate subcarriers into unequal power groups, each group having a...  
WO/2008/006537A1
The invention relates to a method of identifying an individual comprising: - a step of identification (1201) in the course of which the identity of the individual to be identified is determined, a step of obtaining (1203) in the course o...  
WO/2008/008621A3
The present invention discloses an apparatus and method for transferring digital content data. In one example, original digital content data stored on a first device in an encrypted state is transcoded (after being decrypted) to create a...  
WO/2008/008825A3
A method and a system for an anonymous communication system. The system includes a user identifier, a first user is identified, an authenticator to verify the user, a communicator, the first user enters a message on the communicator to a...  
WO/2008/008938A3
A remote service system capable of providing service also in environment of a dynamic IP address is realized. A service demanding apparatus (100) has a demand- side rooter (106) connected to the Internet (300) by using a dynamic IP addre...  
WO/2008/008473A3
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other identifiers such as PIN's, passwords, codes and the like. Probability profiles or p...  
WO/2008/008053A3
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a function of a predetermined parameters and private tables as a function of the pr...  
WO/2008/008473A2
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other identifiers such as PIN's, passwords, codes and the like. Probability profiles or p...  
WO/2008/007362A2
A potentially interfering node updatable database associated with the MAC, in each node, contains a limited number of unique identification numbers (UNIDs) referring to nodes likely to interfere with the transmission of the node. Typical...  
WO/2008/008619A3
A web enabled game analyzes businesses by categorizing companies by markets then drilling down to data charts including interactive assessment of private and public company values within those markets.  
WO/2008/008101A2
The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices, and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communicat...  
WO/2008/005876A3
A transaction account verification system and method are provided. A user computing device transmits an account registration request that includes a selection of an account verification technique. A service provider obtains the request a...  
WO/2008/005600A2
A system (100) and method (400) for peak limiting suitable for use in a communication system is provided. The method can include modulating (402) a symbol vector to produce a modulated waveform (500), wherein the symbol vector contains a...  
WO/2008/005650A3
A method and apparatus is provided for allowing communication of a secondary communication device (105) over non-licensed spectrum. During operation a replica transmission (114) will be periodically transmitted by a base station (111) wi...  
WO/2008/005184A3
To copy protect an optical disc, such as a DVD, program chains additional to the main program chain are provided. These program chains may lead to the genuine data but in an incomplete or incorrect order or to false data. Sufficient addi...  
WO/2008/005875A2
Systems and methods for verifying the identity of a person operating a device are shown. In some representative embodiments, a method comprises authorizing a person to operate a device, continuously monitoring a biometric trait of a devi...  
WO/2008/005741A2
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting t...  
WO/2008/005597A3
A method is provided for identifying and verifying a person using hand biometrics with an anti-spoofing measure. The method comprises acquiring (51) a first image (10) of a hand in a first configuration, acquiring (52) a second image (30...  
WO/2008/005406A2
A new watermark (4901, 4902, 4903) for motion pictures utilizes the fact that defects of isolated still images that are clearly identifiable as such can be tuned so that the effect on the motion picture is invisible (we say that they are...  
WO/2008/005884A2
Embodiments are provided for managing notification of residents of a controlled- environment facility of pending messages awaiting retrieval by such residents. In one embodiment, a messaging system is provided in which a party external t...  
WO/2008/001382A3
A method and system for ensuring the secure authentication of transactions over a communication network using a validation code 40, wherein the user submits information over a communication terminal and submitting validation code 40 for ...  
WO/2008/003086A3
Disclosed are systems and methods which provide techniques providing account setup, management and transaction authorization determinations in real-time using transaction interrupt messaging. Embodiments preferably take into consideratio...  
WO/2008/001364A3
Some demonstrative embodiments of the invention include devices, systems and/or methods of Multiple-Input-Multiple-Output wireless transmission. Some demonstrative embodiments of the invention include a wireless transmitter having a plur...  
WO/2008/002859A3
A method and system for enforcing seat-based licensing is disclosed. According to one embodiment, a license server stores a license count, a value which indicates how many licenses are available for a particular software application. At ...  
WO/2008/001365A3
Some demonstrative embodiments of the invention include devices, systems and/or methods of encrypted wireless communication. Some demonstrative embodiments of the invention include a wireless transmitter to generate an encrypted wireless...  
WO/2007/149219A3
Methods, systems, and apparatuses for quadrature amplitude modulation (QAM) based radio frequency identification (RFID) systems are described. In an aspect, a tag transmitter performs QAM signal mapping and quadrature modulation of a car...  
WO/2007/149762A3
A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle port...  
WO/2007/149123A3
A method and system of providing user profiling for an electrical device is disclosed. Face representation data is captured with an imaging device. The imaging device focuses on the face of the user to capture the face representation dat...  
WO/2007/149329A3
There is provided a method and system to enforce delay of access to encrypted digital content. The system includes a receiving module to receive a request for digital content and register a request time responsive to the receiving the re...  
WO/2007/149331A2
A method (200) for service level management comprises identifying (202) connected enterprise application components and, under control of an automated system (204), relating (206) historical performance for the connected enterprise appli...  
WO/2007/149787A3
A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sendi...  
WO2007123513A9
An information management system includes a computer server. The computer server includes an interface module. The information management system also includes a plurality of card processors in communication with the computer server via t...  
WO/2007/149892A2
Disclosed is a method for encrypted communications. A first IPsec endpoint selects a security association (SA) from a security association database (SAD) by using a selector and then extracts an indexing parameter from SA. The indexing p...  
WO/2007/149331A3
A method (200) for service level management comprises identifying (202) connected enterprise application components and, under control of an automated system (204), relating (206) historical performance for the connected enterprise appli...  
WO/2007/149625A3
A method for managing a communication session between a first communication device and a second device in a communication network (100) is disclosed. The communication session is conveyed between a service-provider server and the first c...  
WO/2007/149625A2
A method for managing a communication session between a first communication device and a second device in a communication network (100) is disclosed. The communication session is conveyed between a service-provider server and the first c...  
WO/2007/149785A3
A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable ...  
WO/2007/149796A2
A telecommunication system includes a processor, interfaces in communication with the public telephone network and a data network, respectively, and a memory. The memory comprises executable instructions that when executed by the process...  
WO2006086628A8
A negotiation system according to various aspects of the present invention comprises an information system configured to store negotiation information relating to a negotiation, and an assessment system responsive to the negotiation info...  
WO/2007/146751A3
The present invention generally relates to transaction instruments with enhanced expiration date (112) and/or security personal identification number (PlN) generation (110). The enhanced security PIN generation (110) may be usefully in c...  

Matches 551 - 600 out of 5,632