Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 701 - 750 out of 4,391

Document Document Title
WO/2008/057082A1
A preset credit media includes: a document part, and availability information and credit for the document part. The document part is all or less than all of an audio file, a visual file, a text file, or a data file. The availability info...  
WO/2008/054920A2
A channel estimator (150) Is provided that comprises an extension circuit (410) configured to receive a pilot signal (510), and add front and back extension signals (620, 630) to a front and back of the pilot signal, respectively, creati...  
WO/2008/055181A2
A system and method for passenger identity verification. The system has at least one check in system with a barcode reader and a biometric data collection device. When a passenger checks in, a barcode is placed on the passenger's boardin...  
WO/2008/052146A2
A method is provided to compensate for environmental factors experienced by a wireless signal during transmission between a transmitter and a receiver. The method begins by receiving a wireless signal that includes a data frame having a ...  
WO/2008/051658A1
The present invention discloses a method for improving channel estimation in a communications network. The method comprises estimating first channel characteristics of first sub-carriers carrying pilot signals; obtaining second channel c...  
WO/2008/051365A2
Mail, electronic or physical, bears either a permission stamp containing a permission code, for senders selected by the intended recipient, or a value stamp containing a value code, for all other senders. Both permission and value codes ...  
WO/2008/052084A2
Exemplary embodiments provide a method and system for self-service resource provisioning having collaborative compliance enforcement. Method and system aspects of the exemplary embodiments include displaying a hierarchical list of resour...  
WO/2008/048433A1
A media player is presented that is capable of playing time-limited media files such as those made available through subscription-type digital rights management schemes. Upon accessing a protected media file, the present invention analyz...  
WO/2008/045667A2
Embodiments of the present invention provide verification and/or authentication service engines that provide a customizable solution that can be "dialed" based on the risk level assigned to individual or grouped applications. The systems...  
WO/2008/045793A1
Transaction management for financial institution-based transactions is facilitated. According to an example embodiment of the present invention, a transaction management approach involves the processing of financial aspects of transactio...  
WO/2008/046016A2
An efficient channel estimation system and method provides good performance under high Doppler conditions and is suitable for OFDM systems such as DVB-T. A number of different pilot interpolations techniques enable the estimation of chan...  
WO/2008/045880A2
A gateway (e.g., a web site) connects content (e.g., pirated content) playing on a host device to a variety of informational, advertising, merchandising and DRM resources. Links, icons and other elements for connecting with the resources...  
WO/2008/039558A2
A method for providing a package of digital items to a user is described. The digital items are packaged into a package, and the package is encrypted and wrapped in a digital rights management system. A purchase request is received from ...  
WO/2008/039167A2
A user activates the transaction facilitation system from an online banking homepage. Thereafter, communication is performed over a secure communication network. User and transaction type information are received and a unique transaction...  
WO/2008/034384A1
A method, system and device for analyzing the abnormity of the uplink channel in the wireless communication system are disclosed, the invention better realizes the status detection of the uplink channel and improves the analyzable and ma...  
WO/2008/036633A2
Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device whe...  
WO/2008/033111A2
In the present sampling technique of a transmitted data stream, a data stream is divided (318, 504) into a predefined number of sample streams to provide a plurality of sample streams, and for at least two of these sample streams, a metr...  
WO/2008/033951A2
A mobile terminated call is delivered to a mobile device during an inter- VLR location update by first routing the mobile terminated call to the old mobile switching center/visitor location register (MSC/VLR), determining that the mobile...  
WO/2008/033590A2
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple dev...  
WO/2008/030704A2
A method and system for secure processing of authentication key material in an ad hoc wireless network enables secure distribution of the authentication key material between a mesh authenticator (110) and a mesh key distributor (115), wh...  
WO2007137283A9
One inventive step includes facilitating obtaining a payment file associated with a buyer (for example, directly from the buyer, or from a third party partner). The file includes data specifying a first form of payment from the buyer to ...  
WO/2008/027324A2
A system and method is provided to accept and settle transaction payments for an unbanked consumer. A consumer initiates a transaction with a merchant, and the merchant may transmit transaction information to a central processing unit (C...  
WO/2008/024119A1
Systems and methods are provided for distributing graphic assets among users of personal communication devices. The graphic assets may include, for example, an avatar and/or avatar accessories used to exchange messages over cellular tele...  
WO/2008/024135A2
A client platform can be verified prior to being granted access to a resource or service on a network by validating individual hardware and software components of the client platform. Digests are generated for the components of the clien...  
WO/2008/021887A2
A fraud-prevention system having user security parameters based on user instruction. A user specifies the security parameter for a transaction. The security parameter may include, but is not limited to a geographic location, a monetary v...  
WO/2008/019246A2
RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their...  
WO/2008/019194A2
A communication system and method are configured for mutual authentication and secure channel establishment between two parties. In one embodiment a first party (110) generates a first one-time password and sends it to a second party (12...  
WO2007084935B1
Various embodiments are described which can serve to mitigate interference between the control channel signaling of adjacent sectors/cells. Potentially, these techniques may have the benefit of reducing the system resource drain caused b...  
WO/2008/019178A2
A processor (301) for encrypting a signal to be communicated from a first location to a second location or for decrypting a signal which has been communicated from a first location to a second location, the processor being operable to se...  
WO/2008/016567A2
A method and a system for access authentication. A shared services resource includes a second factor authentication module. At least one network resource each include a first factor authentication module. A trusted computing base communi...  
WO/2008/012794A2
A device (100) that includes a receiver (120), adapted to receive a request to utilize media content by a mobile media player (110).  
WO/2008/012795A2
A method for sharing media content, the method includes: (i) transmitting, by a first mobile media player, an invitation to share the media content; (ii) receiving, by the first mobile media player, an acceptance indication from a second...  
WO/2008/012800A2
A method for communication includes accepting a request from a transmitter (48) to transmit data to a receiver (56) in a multiple-access communication system that uses multiple subcarriers. A maximum number of the subcarriers on which th...  
WO/2008/013525A1
What is disclosed is a system and method that allows a secondary certificate authority to rely on one or more existing primary certificate authorities to establish identity of a user and provide identity certificates. The secondary certi...  
WO/2008/012793A2
A device adapted to send content to a mobile media player, the device includes: an identifying unit adapted to identify a predefined physical manipulation applied on the mobile media player; and a transmitter, adapted to send content to ...  
WO/2008/011451A2
A method and system for reduced feedback transmit beamforming are provided. Some embodiments comprise computing a matrix of channel transfer function coefficients (406). The matrix of channel transfer function coefficients is compressed ...  
WO/2008/009743A2
Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a ran dom mark; and an electronic memory element containing data about the random ...  
WO/2008/006537A1
The invention relates to a method of identifying an individual comprising: - a step of identification (1201) in the course of which the identity of the individual to be identified is determined, a step of obtaining (1203) in the course o...  
WO/2008/008473A2
This invention discloses a system wherein behaviormetrics are utilized to authenticate electronic transactions, either alone or in combination with other identifiers such as PIN's, passwords, codes and the like. Probability profiles or p...  
WO/2008/007362A2
A potentially interfering node updatable database associated with the MAC, in each node, contains a limited number of unique identification numbers (UNIDs) referring to nodes likely to interfere with the transmission of the node. Typical...  
WO/2008/008101A2
The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices, and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communicat...  
WO/2008/005600A2
A system (100) and method (400) for peak limiting suitable for use in a communication system is provided. The method can include modulating (402) a symbol vector to produce a modulated waveform (500), wherein the symbol vector contains a...  
WO/2008/005875A2
Systems and methods for verifying the identity of a person operating a device are shown. In some representative embodiments, a method comprises authorizing a person to operate a device, continuously monitoring a biometric trait of a devi...  
WO/2008/005741A2
Systems and methods are disclosed for providing secure, captured data in a customer center. In one embodiment, the method comprises: capturing data with a recording system; receiving a request to retrieve electronic keys for encrypting t...  
WO/2008/005406A2
A new watermark (4901, 4902, 4903) for motion pictures utilizes the fact that defects of isolated still images that are clearly identifiable as such can be tuned so that the effect on the motion picture is invisible (we say that they are...  
WO/2008/005884A2
Embodiments are provided for managing notification of residents of a controlled- environment facility of pending messages awaiting retrieval by such residents. In one embodiment, a messaging system is provided in which a party external t...  
WO/2007/149331A2
A method (200) for service level management comprises identifying (202) connected enterprise application components and, under control of an automated system (204), relating (206) historical performance for the connected enterprise appli...  
WO2007123513A9
An information management system includes a computer server. The computer server includes an interface module. The information management system also includes a plurality of card processors in communication with the computer server via t...  
WO/2007/149892A2
Disclosed is a method for encrypted communications. A first IPsec endpoint selects a security association (SA) from a security association database (SAD) by using a selector and then extracts an indexing parameter from SA. The indexing p...  
WO/2007/149625A2
A method for managing a communication session between a first communication device and a second device in a communication network (100) is disclosed. The communication session is conveyed between a service-provider server and the first c...  

Matches 701 - 750 out of 4,391