Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 701 - 750 out of 5,929

Document Document Title
WO/2007/117679A3
Techniques for communication that enable a low latency communication system to accommodate high latency communication transactions without substantial changes to its communication infrastructure. Communication according to the present te...  
WO/2007/134082A3
A security-preserving proxy tunnel (500) is disposed between a client computer (100) and a trusted secure server (90). The proxy tunnel (500) operates over an insecure network, in which the connection is as secure as if it were direct, b...  
WO2008100813B1
A Java 2 Enterprise Edition (J2EE) enabled server executing Java software provides a financial transaction Web service to a client each of which communicates wirelessly with the J2EE enabled server and executes Java software to conduct f...  
WO2007103612B1
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the crypto...  
WO/2008/124732A1
Methods, systems, and machine-readable media are disclosed for handling unfunded financial transactions. According to one embodiment, information related to a transaction can be received. One or more rules can be applied to the informati...  
WO/2008/123841A1
Method and system for extracting soft estimates of DCM or 16-QAM modulated symbols that are received from a noisy channel. Optimal soft demapping rules are approximated using equations that are division-free and eliminate the need for im...  
WO/2007/149329A3
There is provided a method and system to enforce delay of access to encrypted digital content. The system includes a receiving module to receive a request for digital content and register a request time responsive to the receiving the re...  
WO/2008/124517A1
There is disclosed in embodiments herein a digital media content duplication system and method that allows digital media data to be duplicated to one or more destinations and verified. In one embodiment, the system may comprise multiple ...  
WO/2008/106560A3
Transaction processing involves receiving data from an access transaction application of a portable consumer device, wherein the received data comprises data from an access transaction data string that includes a transit verification val...  
WO/2007/117733A3
An online network based e-commerce and investment system for online selling and investing in non-physical goods includes a listing management module, a distribution management module, a trading management module, an account management mo...  
WO/2008/005650A3
A method and apparatus is provided for allowing communication of a secondary communication device (105) over non-licensed spectrum. During operation a replica transmission (114) will be periodically transmitted by a base station (111) wi...  
WO/2007/131131A3
The disclosure details a nested security access system that manages access points/verification requests to create a series of layered security applications for securing access/user identification data. The NSA system works in coordinatio...  
WO/2007/130554A3
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/041140A3
A NICAM processor (82) comprises a first memory (100) for temporarily storing a current frame of A-channel and B-channel input data, wherein the current frame data is stored into the first memory at a first clock rate. A second memory (1...  
WO/2008/098004A3
Methods and systems for delivering advertising content to selected users in combination with out-of-band passwords or access code information delivered over a selected communication medium.  
WO/2008/121743A1
In one embodiment, a licensing authority receives a rehost ticket indicating proof of removal of a license from a first device. The licensing authority receives a request for a license for a second device. The licensing authority validat...  
WO/2008/121730A1
A method and/or system for identity management and authentication of examination candidates by, for example, capturing biometric data and identification information from an examination candidate and storing the data and information in a ...  
WO/2008/121413A1
Methods and apparatus are presented to allow one receiver architecture to be used for the reception of two different SDARS signals, such as, for example, one signal from XM Satellite Radio, the other signal from Sirius Satellite Radio. T...  
WO/2008/061218A3
A device, such as a cell phone, uses an image sensor to capture image data. The phone can respond to detection of particular imagery feature (e.g., watermarked imagery, barcodes, image fingerprints, etc.) by presenting distinctive graphi...  
WO/2007/133484A3
A method of searching a specific computer IP address of Internet networks using several specific telephone numbers in series which are arranged and assenbled in sequnce and coded with identification codes, having a specific website, a se...  
WO/2007/092098A3
A device and method of encrypting a sequence. The method (300) encrypts data (Di) over a sequence of encryption periods (Ti) by generating (315) a sequence of forward encryption keys (GKFi) each associated with a respective encryption pe...  
WO/2008/118650A1
A system includes a line-based receiver for receiving protected content from a source and a line-based transmitter for providing the protected content to a destination. The protected content is secure, such as by using a High-bandwidth D...  
WO/2008/042524A3
A method and system for displaying trust level on a wireless communication device (100) is provided. The method includes receiving (204) a list of trusted root authority certificates. The method further includes calculating the trust lev...  
WO/2008/033111A3
In the present sampling technique of a transmitted data stream, a data stream is divided (318, 504) into a predefined number of sample streams to provide a plurality of sample streams, and for at least two of these sample streams, a metr...  
WO2007104802A8
The present invention describes a highly efficient method and system for the secure, auditable generation of random numbers. For this purpose, it makes use of an MAC cryptographic function, digital information received externally and/or ...  
WO/2007/121289A3
A system and method for providing previews, such as song and video previews, to a portable media player are provided. In general, a play history for the portable media player is generated as media files are played by the portable media p...  
WO/2008/118358A2
A system, method, and computer program for for text-based encryption, comprising accessing a text file with a plurality of lines of text characters; re- sequencing each of said text characters; translating a decimal representation for ea...  
WO/2007/146437A3
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a real-time basis against probability distribution representations including an aut...  
WO/2007/120772A3
A method and corresponding apparatus and computer-readable medium to effect maintenance and/or purging of a document file in a multi-user document of file management system operating over a network. The document management system stores ...  
WO/2008/027957A3
Transmission systems and methods for reducing interference by wideband communication systems with narrowband communications systems are disclosed. In some embodiments an ultrawideband system employing orthogonal frequency division multip...  
WO2008020991B1
The exemplary embodiments of this invention provides notarized federated identity management that may have application like supporting efficient user authentication when providers are unknown to each other and/or for avoiding direct comm...  
WO/2007/149123A3
A method and system of providing user profiling for an electrical device is disclosed. Face representation data is captured with an imaging device. The imaging device focuses on the face of the user to capture the face representation dat...  
WO/2008/113110A1
A method of performing a transaction process using a verification station (127) is disclosed. The method compares a first biometric signature, inputted to a biometric reader (102) incorporated into the verification station (127), to one ...  
WO/2008/115718A1
Methods and systems provide power to a mobile recipient and allow the recipient to pay for the power obtained by having it charged to an account other than the account for the location at which the power is provided.  
WO/2008/054406A3
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communica...  
WO/2008/115476A1
The present invention provides encryption schemes and apparatus, which are more efficient than the existing single pass authenticated encryption schemes, while providing the same level of security. The initial vectors, which are an essen...  
WO/2008/073555A3
The client creates a nonce at (106) and, at (108), sends the nonce, together with its telephone number and a username to the business server using a secure transfer process, such as HTTPS. At (110), the business will process the message ...  
WO/2008/110595A2
The invention relates to a telecommunication method comprising the following steps: establishing a speech channel for voice communication between a first and a second subscriber between a first telecommunication device (118) of the first...  
WO/2007/121035A3
An encryption technique is disclosed for encrypting a data segment comprising a plurality of data blocks, wherein the security and throughput of the encryption is enhanced by using blockwise independent bit vectors for reversible combina...  
WO/2008/108868A1
A virtual security platform residing in a virtualization layer on a host data processing machine is provided. The virtual security platform comprises at least one virtual security appliance, each of which is configured for receiving, via...  
WO/2005/082121A3
A CableCARD device for manipulation of a stream of data has an inband data input for receiving a stream of video data from a host, the stream of video data being encrypted and encoded according to a first coding. A decrypter decrypts the...  
WO/2008/108861A1
A method is provided for processing electronic documents, such as electronic invoices, specifications, or contracts, to ensure authenticity, integrity, confidentiality, and non-repudiation of the document. A third party service provider ...  
WO/2008/022158A3
Systems and methods for generating non-interactive zero-knowledge (NIZK) proofs. A homomorphic commitment scheme provides a NIZK proof that a commitment contains 0 or 1. A NIZK proof that a triple of wire assignments satisfies a NAND-gat...  
WO/2008/039252A3
A multimodal biometric identification system captures and processes images of both the iris and the retina for biometric identification. Another multimodal ocular system captures and processes images of the iris and/or the from both eyes...  
WO/2008/109578A1
The method is providing an energy saving service. Customers (11) of a household (12) participate in an energy saving service (30) provided by a service provider (26). The household prepays an amount for energy consumption in a subsequent...  
WO/2008/105946A2
In an SNMP network including a Manager Station having a first digital certificate and an Agent Station having a second digital certificate, the MS generates a simple network management protocol (SNMP) configuration file which includes SN...  
WO/2007/124347A3
A system and method of refreshing a user's pre-selected content automatically every time a playback device is connected to a provider system. The user selects what order and time the electronic content is provided and played back and ele...  
WO/2008/105945A2
Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted tunnel. The first tunnel endpoint associa...  
WO/2007/120754A3
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for authorization to a computer-based resource is received, and the authorization may be p...  
WO/2007/120215A3
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator dev...  

Matches 701 - 750 out of 5,929