Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 651 - 700 out of 5,685

Document Document Title
WO/2007/133484A3
A method of searching a specific computer IP address of Internet networks using several specific telephone numbers in series which are arranged and assenbled in sequnce and coded with identification codes, having a specific website, a se...  
WO/2007/129308A3
The present invention relates to devices and methods for planning and supervising minimally invasive surgery. Included are enhancements to systems for planning, monitoring, and controlling cryosurgery.  
WO/2007/130502A2
Methods, apparatus, and data structures embodied in computer-readable media are provided for facilitating access to a service in a network. Title materials are received which include one or more of a first title object, a component of th...  
WO/2007/131131A3
The disclosure details a nested security access system that manages access points/verification requests to create a series of layered security applications for securing access/user identification data. The NSA system works in coordinatio...  
WO/2007/130554A3
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/130554A2
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/130687A3
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications A Personal Digital Key stores one or more profiles(e g, a biometric profile) in a tamper-proo...  
WO/2007/130681A3
A system and method for delivering content over a network is provided. Content may be primary content (e.g., music or a movie) or ancillary (104) content (e.g., an advertisement). The ancillary (104) content may further be classified as ...  
WO/2007/129308A9
The present invention relates to devices and methods for planning and supervising minimally invasive surgery. Included are enhancements to systems for planning, monitoring, and controlling cryosurgery.  
WO/2007/130356A2
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for...  
WO/2007/130861A2
Methods and systems consistent with the present invention provide a method for dynamically controlling power consumption in a digital demodulator circuit by varying clock rates and bit widths of demodulator components including an analog...  
WO/2007/131174A3
A system and method are described that provide television content broadcast system subscribers with convenient access to aggregated web feed content. In one embodiment, a television content broadcast system (20) maintains a database (21 ...  
WO/2007/130416A2
Methods and apparatus are provided for processing packets in a network. A received packet includes title materials which include one or more of a title object, a component of the title object, or a reference to the title object. The titl...  
WO/2007/129306A3
A system for approving transaction card transactions in which a card reader associated with a transaction approving authority (TAA). A source for complementary security data is linkable to the TAA can send data to the TAA, and a database...  
WO/2007/127547A4
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutuall...  
WO/2007/127782A3
A signal processing system according to various aspects of the present invention includes an excursion signal generator, a scaling system and a filter system. The excursion signal generator identifies a peak portion of a signal that exce...  
WO/2007/126853A3
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2007/126434A2
A method for determining a bandwidth of a complex valued sample stream may include correlating a first portion of a preamble symbol of the complex valued sample stream with a second portion of the preamble symbol to generate a time autoc...  
WO/2007/126853A8
A server computer system outputs a down loader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system coop...  
WO/2007/127576A3
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve ...  
WO/2007/127547A3
A method and system for propagating mutual authentication data in both a first wireless communication network and a second wireless communication network is useful for unifying wireless communication networks. The method includes mutuall...  
WO2007106694A9
Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies tha...  
WO/2007/127157A3
Retinal blood vessels are detected for biometric identification by: receiving at least one image with retinal data; detecting, an area in the image corresponding to a spatial variation in the image; and determining a blood vessel pattern...  
WO/2007/123513A1
An information management system includes a computer server. The computer server includes an interface module. The information management system also includes a plurality of card processors in communication with the computer server via t...  
WO/2007/123869A2
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized qu...  
WO/2007/124054A3
A wireless transmit/receive unit (WTRU) and a Node B, respectively, perform joint randomness not shared by others (JRNSO) measurement to generate JRNSO bits based on a channel estimate between the WTRU and the Node B. The WTRU and the No...  
WO/2007/124379A2
An input random access memory (RAM) module of a fast Fourier transform (FFT) engine of a DVB receiver is used to store, during a first time period, delayed versions of an input signal that includes a first orthogonal frequency divisional...  
WO/2007/123856A2
Methods and systems for conducting transactions using an electronic device are provided. For example, a mobile electronic device such as a mobile phone or the like can be used to purchase goods from a merchant. An exemplary method compri...  
WO/2007/124347A3
A system and method of refreshing a user's pre-selected content automatically every time a playback device is connected to a provider system. The user selects what order and time the electronic content is provided and played back and ele...  
WO/2007/124379A3
An input random access memory (RAM) module of a fast Fourier transform (FFT) engine of a DVB receiver is used to store, during a first time period, delayed versions of an input signal that includes a first orthogonal frequency divisional...  
WO/2007/121243A3
Systems and methods are disclosed for transporting multiport protocol traffic using a single-port protocol. Multiport protocol traffic from a first endpoint is converted into a single-port protocol for transport across a network. The tra...  
WO/2007/120754A3
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for authorization to a computer-based resource is received, and the authorization may be p...  
WO/2007/120215A3
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator dev...  
WO/2007/120169A3
A method of symmetric key encryption involves using a composition of transformations leading to an enhanced homophonic substitution, wherein the mapping of characters varies depending on the sequence of characters in the message text. In...  
WO/2007/120169A2
A method of symmetric key encryption involves using a composition of transformations leading to an enhanced homophonic substitution, wherein the mapping of characters varies depending on the sequence of characters in the message text. In...  
WO/2007/121035A3
An encryption technique is disclosed for encrypting a data segment comprising a plurality of data blocks, wherein the security and throughput of the encryption is enhanced by using blockwise independent bit vectors for reversible combina...  
WO/2007/121289A3
A system and method for providing previews, such as song and video previews, to a portable media player are provided. In general, a play history for the portable media player is generated as media files are played by the portable media p...  
WO/2007/121034A2
In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and a storage engine adapted to retrieve an e...  
WO/2007/121178A2
A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device. At least one key is generated based on the obtained...  
WO/2007/121024A2
A method for selecting an MCS for a carrier channel is provided. The method includes obtaining (202) a set of characteristic parameters for a first function representing a variation of an effective SINR of the carrier channel with a cali...  
WO/2007/121035A2
An encryption technique is disclosed for encrypting a data segment comprising a plurality of data blocks, wherein the security and throughput of the encryption is enhanced by using blockwise independent bit vectors for reversible combina...  
WO2006116497B1
A production information reporting/recording system is disclosed herein including a number of features to ensure efficient, flexible and reliable recording of production data in a manufacturing system. Such features include validating th...  
WO/2007/120772A3
A method and corresponding apparatus and computer-readable medium to effect maintenance and/or purging of a document file in a multi-user document of file management system operating over a network. The document management system stores ...  
WO/2007/121034A3
In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and a storage engine adapted to retrieve an e...  
WO/2007/117277A2
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or decryption algorithm are performed during ...  
WO/2007/118154A2
A system (100) includes a processor having a trace port, a memory coupled to the processor (104), and a software integrity checking ("SIC") logic coupled to the memory and the trace port. The trace port provides data regarding an executi...  
WO/2007/117336A2
A license for a first component of a protectable content is verified and a license for a second component of the protectable content is verified. A license for the protectable content is then verified based at least in part on the verifi...  
WO/2007/118236A2
A method and system for interfacing between a portable media device and one or more media content providers. The method may be practiced, for example, in a system including the portable media device that receives content from one or more...  
WO/2007/117914A3
In a method of facilitating an encrypted communication for use in communication between a local device, operated by a user, and a remote device, a data representation of a biometric feature of the user is received (412) from a biometric ...  
WO/2007/117277A3
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or decryption algorithm are performed during ...  

Matches 651 - 700 out of 5,685