Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 551 - 600 out of 5,600

Document Document Title
WO/2008/008053A3
Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a function of a predetermined parameters and private tables as a function of the pr...  
WO/2008/008473A2
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other identifiers such as PIN's, passwords, codes and the like. Probability profiles or p...  
WO/2008/007362A2
A potentially interfering node updatable database associated with the MAC, in each node, contains a limited number of unique identification numbers (UNIDs) referring to nodes likely to interfere with the transmission of the node. Typical...  
WO/2008/008619A3
A web enabled game analyzes businesses by categorizing companies by markets then drilling down to data charts including interactive assessment of private and public company values within those markets.  
WO/2008/008101A2
The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices, and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communicat...  
WO/2008/005876A3
A transaction account verification system and method are provided. A user computing device transmits an account registration request that includes a selection of an account verification technique. A service provider obtains the request a...  
WO/2008/005600A2
A system (100) and method (400) for peak limiting suitable for use in a communication system is provided. The method can include modulating (402) a symbol vector to produce a modulated waveform (500), wherein the symbol vector contains a...  
WO/2008/005650A3
A method and apparatus is provided for allowing communication of a secondary communication device (105) over non-licensed spectrum. During operation a replica transmission (114) will be periodically transmitted by a base station (111) wi...  
WO/2008/005184A3
To copy protect an optical disc, such as a DVD, program chains additional to the main program chain are provided. These program chains may lead to the genuine data but in an incomplete or incorrect order or to false data. Sufficient addi...  
WO/2008/005875A2
Systems and methods for verifying the identity of a person operating a device are shown. In some representative embodiments, a method comprises authorizing a person to operate a device, continuously monitoring a biometric trait of a devi...  
WO/2008/005741A2
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting t...  
WO/2008/005597A3
A method is provided for identifying and verifying a person using hand biometrics with an anti-spoofing measure. The method comprises acquiring (51) a first image (10) of a hand in a first configuration, acquiring (52) a second image (30...  
WO/2008/005406A2
A new watermark (4901, 4902, 4903) for motion pictures utilizes the fact that defects of isolated still images that are clearly identifiable as such can be tuned so that the effect on the motion picture is invisible (we say that they are...  
WO/2008/005884A2
Embodiments are provided for managing notification of residents of a controlled- environment facility of pending messages awaiting retrieval by such residents. In one embodiment, a messaging system is provided in which a party external t...  
WO/2008/001382A3
A method and system for ensuring the secure authentication of transactions over a communication network using a validation code 40, wherein the user submits information over a communication terminal and submitting validation code 40 for ...  
WO/2008/003086A3
Disclosed are systems and methods which provide techniques providing account setup, management and transaction authorization determinations in real-time using transaction interrupt messaging. Embodiments preferably take into consideratio...  
WO/2008/001364A3
Some demonstrative embodiments of the invention include devices, systems and/or methods of Multiple-Input-Multiple-Output wireless transmission. Some demonstrative embodiments of the invention include a wireless transmitter having a plur...  
WO/2008/002859A3
A method and system for enforcing seat-based licensing is disclosed. According to one embodiment, a license server stores a license count, a value which indicates how many licenses are available for a particular software application. At ...  
WO/2008/001365A3
Some demonstrative embodiments of the invention include devices, systems and/or methods of encrypted wireless communication. Some demonstrative embodiments of the invention include a wireless transmitter to generate an encrypted wireless...  
WO/2007/149219A3
Methods, systems, and apparatuses for quadrature amplitude modulation (QAM) based radio frequency identification (RFID) systems are described. In an aspect, a tag transmitter performs QAM signal mapping and quadrature modulation of a car...  
WO/2007/149762A3
A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle port...  
WO/2007/149123A3
A method and system of providing user profiling for an electrical device is disclosed. Face representation data is captured with an imaging device. The imaging device focuses on the face of the user to capture the face representation dat...  
WO/2007/149329A3
There is provided a method and system to enforce delay of access to encrypted digital content. The system includes a receiving module to receive a request for digital content and register a request time responsive to the receiving the re...  
WO/2007/149331A2
A method (200) for service level management comprises identifying (202) connected enterprise application components and, under control of an automated system (204), relating (206) historical performance for the connected enterprise appli...  
WO/2007/149787A3
A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sendi...  
WO2007123513A9
An information management system includes a computer server. The computer server includes an interface module. The information management system also includes a plurality of card processors in communication with the computer server via t...  
WO/2007/149892A2
Disclosed is a method for encrypted communications. A first IPsec endpoint selects a security association (SA) from a security association database (SAD) by using a selector and then extracts an indexing parameter from SA. The indexing p...  
WO/2007/149331A3
A method (200) for service level management comprises identifying (202) connected enterprise application components and, under control of an automated system (204), relating (206) historical performance for the connected enterprise appli...  
WO/2007/149625A3
A method for managing a communication session between a first communication device and a second device in a communication network (100) is disclosed. The communication session is conveyed between a service-provider server and the first c...  
WO/2007/149625A2
A method for managing a communication session between a first communication device and a second device in a communication network (100) is disclosed. The communication session is conveyed between a service-provider server and the first c...  
WO/2007/149785A3
A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable ...  
WO/2007/149796A2
A telecommunication system includes a processor, interfaces in communication with the public telephone network and a data network, respectively, and a memory. The memory comprises executable instructions that when executed by the process...  
WO2006086628A8
A negotiation system according to various aspects of the present invention comprises an information system configured to store negotiation information relating to a negotiation, and an assessment system responsive to the negotiation info...  
WO/2007/146751A3
The present invention generally relates to transaction instruments with enhanced expiration date (112) and/or security personal identification number (PlN) generation (110). The enhanced security PIN generation (110) may be usefully in c...  
WO/2007/146437A3
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a real-time basis against probability distribution representations including an aut...  
WO2006089160B1
A method for transmitting a multimedia content file encrypted with a multimedia content key to a rendering device, the rendering device further including a private license key, I is disclosed. The method includes configuring a license se...  
WO/2007/143588A2
A receiver including a channel estimation function in which an initial channel estimate is filtered to increase receiver operation, particularly when the receiver may only have a limited number of channel estimation symbols with which to...  
WO/2007/143178A3
Method and apparatus for performing a background check, including collecting, organizing, and transmitting electronic data, including biometric and other demographic data.  
WO/2007/142913A2
An embodiment of the present invention is a technique to process signals in a communication system. A channel impulse response (CIR) generator generates a time-domain windowed CIR from a received signal using a window function. A thresho...  
WO/2007/143441A3
A system and method for performing authentication are disclosed. The system may include a shared central processing server, a plurality of software components each residing in a corresponding point-of-sale (POS) workstation and an identi...  
WO/2007/143397A3
A user may select or create a PIN at a non-secure input device, such as a web- enabled personal computer. PINs are stored at a financial host in encrypted form, as PIN offsets. The user selected PIN and a corresponding account number are...  
WO/2007/143252A3
A system and method for returning a rights management object (103) to a rights issuer (102) is provided. The system and method allows a rights issuer (102) to ensure that the rights management object (103) is removed from an electronic d...  
WO/2007/143588A3
A receiver including a channel estimation function in which an initial channel estimate is filtered to increase receiver operation, particularly when the receiver may only have a limited number of channel estimation symbols with which to...  
WO/2007/142913A3
An embodiment of the present invention is a technique to process signals in a communication system. A channel impulse response (CIR) generator generates a time-domain windowed CIR from a received signal using a window function. A thresho...  
WO/2007/140387A3
This patent discloses a media distribution and marketing system to create a plurality of virtual distribution networks (VDNs) to provide media content to a plurality of subscribers of the VDNs, and provides a method of enhancing the subs...  
WO/2007/138603A3
A method and system for transforming a logical data object in a storage device Transforming the logical data object comprises creating in the storage device a transformed logical data object (fig 2b, 213LU) comprising a header (fig 2b, 2...  
WO/2007/136311A1
The invention concerns a temporary radio base station, temporary RBS (140), which can gain and maintain control of the traffic to and from a targeted radio base station (120) in a wireless cellular telecommunications system (100), and a ...  
WO/2007/135664A2
A system (100) and a method for real-time authentication and notification of a user of a Web site for inter-personal communications through the user's (110) cellular telephone (112).  
WO/2007/137283A3
One inventive step includes facilitating obtaining a payment file associated with a buyer (for example, directly from the buyer, or from a third party partner). The file includes data specifying a first form of payment from the buyer to ...  
WO/2007/136931A3
Reference sequences are constructed from distinct "classes" of GCL sequences that have an optimal cyclic cross correlation property. The fast cell search method disclosed detects the "class indices" with simple processing. In a system de...  

Matches 551 - 600 out of 5,600