Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 551 - 600 out of 5,171

Document Document Title
WO/2007/130554A3
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/130861A2
Methods and systems consistent with the present invention provide a method for dynamically controlling power consumption in a digital demodulator circuit by varying clock rates and bit widths of demodulator components including an analog...  
WO/2007/129308A9
The present invention relates to devices and methods for planning and supervising minimally invasive surgery. Included are enhancements to systems for planning, monitoring, and controlling cryosurgery.  
WO/2007/130356A2
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for...  
WO/2007/130416A2
Methods and apparatus are provided for processing packets in a network. A received packet includes title materials which include one or more of a title object, a component of the title object, or a reference to the title object. The titl...  
WO/2007/130502A2
Methods, apparatus, and data structures embodied in computer-readable media are provided for facilitating access to a service in a network. Title materials are received which include one or more of a first title object, a component of th...  
WO/2007/126853A3
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2007/127547A4
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutuall...  
WO/2007/127576A3
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve ...  
WO/2007/127782A3
A signal processing system according to various aspects of the present invention includes an excursion signal generator, a scaling system and a filter system. The excursion signal generator identifies a peak portion of a signal that exce...  
WO/2007/126853A8
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2007/126434A2
A method for determining a bandwidth of a complex valued sample stream may include correlating a first portion of a preamble symbol of the complex valued sample stream with a second portion of the preamble symbol to generate a time autoc...  
WO/2007/127547A3
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutuall...  
WO/2007/127157A3
Retinal blood vessels are detected for biometric identification by: receiving at least one image with retinal data; detecting, an area in the image corresponding to a spatial variation in the image; and determining a blood vessel pattern...  
WO/2007/123513A1
An information management system includes a computer server. The computer server includes an interface module. The information management system also includes a plurality of card processors in communication with the computer server via t...  
WO/2007/123869A2
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized qu...  
WO/2007/124379A3
An input random access memory (RAM) module of a fast Fourier transform (FFT) engine of a DVB receiver is used to store, during a first time period, delayed versions of an input signal that includes a first orthogonal frequency divisional...  
WO/2007/124379A2
An input random access memory (RAM) module of a fast Fourier transform (FFT) engine of a DVB receiver is used to store, during a first time period, delayed versions of an input signal that includes a first orthogonal frequency divisional...  
WO/2007/124347A3
A system and method of refreshing a user's pre-selected content automatically every time a playback device is connected to a provider system. The user selects what order and time the electronic content is provided and played back and ele...  
WO/2007/123856A2
Methods and systems for conducting transactions using an electronic device are provided. For example, a mobile electronic device such as a mobile phone or the like can be used to purchase goods from a merchant. An exemplary method compri...  
WO/2007/124054A3
A wireless transmit/receive unit (WTRU) and a Node B, respectively, perform joint randomness not shared by others (JRNSO) measurement to generate JRNSO bits based on a channel estimate between the WTRU and the Node B. The WTRU and the No...  
WO/2007/120772A3
A method and corresponding apparatus and computer-readable medium to effect maintenance and/or purging of a document file in a multi-user document of file management system operating over a network. The document management system stores ...  
WO/2007/121035A3
An encryption technique is disclosed for encrypting a data segment comprising a plurality of data blocks, wherein the security and throughput of the encryption is enhanced by using blockwise independent bit vectors for reversible combina...  
WO/2007/121034A2
In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and a storage engine adapted to retrieve an e...  
WO/2007/121034A3
In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and a storage engine adapted to retrieve an e...  
WO/2007/121243A3
Systems and methods are disclosed for transporting multiport protocol traffic using a single-port protocol. Multiport protocol traffic from a first endpoint is converted into a single-port protocol for transport across a network. The tra...  
WO/2007/120169A3
A method of symmetric key encryption involves using a composition of transformations leading to an enhanced homophonic substitution, wherein the mapping of characters varies depending on the sequence of characters in the message text. In...  
WO/2007/121289A3
A system and method for providing previews, such as song and video previews, to a portable media player are provided. In general, a play history for the portable media player is generated as media files are played by the portable media p...  
WO/2007/121178A2
A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device. At least one key is generated based on the obtained...  
WO/2007/120754A3
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for authorization to a computer-based resource is received, and the authorization may be p...  
WO/2007/121035A2
An encryption technique is disclosed for encrypting a data segment comprising a plurality of data blocks, wherein the security and throughput of the encryption is enhanced by using blockwise independent bit vectors for reversible combina...  
WO/2007/120215A3
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator dev...  
WO/2007/120169A2
A method of symmetric key encryption involves using a composition of transformations leading to an enhanced homophonic substitution, wherein the mapping of characters varies depending on the sequence of characters in the message text. In...  
WO/2007/121024A2
A method for selecting an MCS for a carrier channel is provided. The method includes obtaining (202) a set of characteristic parameters for a first function representing a variation of an effective SINR of the carrier channel with a cali...  
WO/2007/117914A2
In a method of facilitating an encrypted communication for use in communication between a local device, operated by a user, and a remote device, a data representation of a biometric feature of the user is received (412) from a biometric ...  
WO/2007/117679A3
Techniques for communication that enable a low latency communication system to accommodate high latency communication transactions without substantial changes to its communication infrastructure. Communication according to the present te...  
WO/2007/118154A2
A system (100) includes a processor having a trace port, a memory coupled to the processor (104), and a software integrity checking ("SIC") logic coupled to the memory and the trace port. The trace port provides data regarding an executi...  
WO/2007/118236A2
A method and system for interfacing between a portable media device and one or more media content providers. The method may be practiced, for example, in a system including the portable media device that receives content from one or more...  
WO/2007/117914A3
In a method of facilitating an encrypted communication for use in communication between a local device, operated by a user, and a remote device, a data representation of a biometric feature of the user is received (412) from a biometric ...  
WO/2007/117336A3
A license for a first component of a protectable content is verified and a license for a second component of the protectable content is verified. A license for the protectable content is then verified based at least in part on the verifi...  
WO/2007/117277A2
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or decryption algorithm are performed during ...  
WO/2007/117454A3
A system for charging one ore learning session to one or more student accounts comprises an online learning system having one or more nodes that creates one or more online learning sessions over one or more communications channels betwee...  
WO/2007/116398A3
Disclosed are a method, device and system for enhancing reception of a communication signal in a wireless communication network. According to some embodiments of the present invention, a supplemental receiver transmits a communication au...  
WO/2007/117336A2
A license for a first component of a protectable content is verified and a license for a second component of the protectable content is verified. A license for the protectable content is then verified based at least in part on the verifi...  
WO/2007/117733A3
An online network based e-commerce and investment system for online selling and investing in non-physical goods includes a listing management module, a distribution management module, a trading management module, an account management mo...  
WO/2007/117277A3
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or decryption algorithm are performed during ...  
WO/2007/113786A2
The present invention provides an article tracking and control system that records articles when they are entered into or removed from a case. Each article is tagged with an RFID tag and is identified individually by the system. The syst...  
WO/2007/113787A3
A certificate for use in a secure communication system that employs a public-key infrastructure (PKI) scheme is disclosed. The certificate includes: a certificate field including an indication of identity of a secure device to which the ...  
WO/2007/115131A2
The invention enables management of mammalian disease related to decreased energy production in the mitochondria, the powerhouse of the cell. The invention uses the combination of liposomal reduced glutathione and 1-arginine to increase ...  
WO/2007/113796A3
In an iterated block cipher, a method for round key encryption and key generation, the method including providing a first function Fi and a second function Fj, providing a round key generation function, the round key generation function ...  

Matches 551 - 600 out of 5,171