Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 951 - 1,000 out of 4,393

Document Document Title
WO/2006/093583A2
Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to th...  
WO/2006/091373A2
An OFDMA communication system includes a plurality of terminals, with at least one of the terminals including at least one type of multi-user decoder adapted to decode a signal intended for the at least one terminal received on a subchan...  
WO/2006/091501A2
An electronic content exchange system according to various embodiments of the invention is configured for super distribution of digital media data such as music, movies, games, software, and other copyrighted materials from content owner...  
WO/2006/091683A2
Transmitting information is disclosed. Interference mitigation information associated with mitigating interference with a victim wireless device is obtained. The interference mitigation information is transmitted.  
WO/2006/088685A2
A receiver or an integrated circuit (IC) incorporated therein includes a fast Fourier transform (FFT)-based (or hybrid FFT-based) sliding window block level equalizer (BLE) for generating equalized samples. The BLE includes a noise power...  
WO/2006/089034A2
Method and system of auditing databases for security compliance. The method and system relating to querying databases for security parameters and auditing the queried parameters against authorized security parameters to determine securit...  
WO/2006/086628A2
A negotiation system according to various aspects of the present invention comprises an information system configured to store negotiation information relating to a negotiation, and an assessment system responsive to the negotiation info...  
WO/2006/086099A2
Usage rights for a digital work are established prior to creation of the corresponding content. The rights can be associated with the content after the content is created. A content creation, such as a video recorder or a still camera, d...  
WO/2006/086214A2
In accordance with the present invention, the system and method removes interfering signals from a communications signal and includes a Fast Fourier Transform (FFT) circuit (104) for taking the FFT of a received signal and segmenting the...  
WO2005125080B1
A method for deterring or detecting the unauthorized dissemination or copying of a work is presented. Personal identification data is embedded into a work before the work is sent over a communication link (160) to a receiver (180). The w...  
WO2006036769A9
A system and method for reordering tones of a DMT signal within a communication system is described. Cross tone correlated noise in a received signal is identified and rearranged such that tones with correlated noise are spread out throu...  
WO/2006/078556A2
Techniques for authentication are provided. A first authentication request transformed with a private portion of a first type split private key is received. A first user is authenticated for a first level of network access based upon the...  
WO/2006/078430A2
A credential provisioning technique is provided that is secure yet easy to administer. A credential provisioner such as a network AP is configured to leave a secure mode of operation and allow open authentication with a wireless supplica...  
WO/2006/076696A2
Limiting access to the Internet, intranets, computers, appliances, websites, individuals and/or other venues, for example, by providing an access account, to an 'in person' and/or otherwise verified 'adult' who assumes responsibility for...  
WO/2006/076536A2
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated w...  
WO/2006/076157A2
An extremely fast data encryption, decryption and secure hash scheme encrypts or hashes data of any size, and can be implemented in a variety of software or hardware based data processing devices. A key and data are prepared for processi...  
WO/2006/076648A2
A communication system has a first device HOA that transmits an information symbol with a zero-padded suffix (ZPS) and a second device HOB that receives the information symbol with the zero-padded suffix. The second device HOB performs a...  
WO/2006/074113A2
The present invention provides for a method and system to implement time-domain equalizer (TEQ) training to shorten the channel impulse response of twisted copper lines for DMT-based VDSL systems. The coefficients of TEQ are trained when...  
WO/2006/074153A2
A single-particle quantum-enhanced secret sharing (QESS) system (10) and protocol (method) are disclosed. The system includes a distributor (D) that prepares single-particle qubits, such as photons (Y), in one of a number of possible ini...  
WO/2006/073821A2
Improved techniques for concurrent channel equalization and far-end crosstalk channel compensation (e.g., estimation and/or cancellation) in a multicarrier data transmission system are disclosed. The improved techniques can produce coeff...  
WO/2006/067688A1
The invention relates to a display device for visually reconstructing an image (330) from an encoded image (320), such a device being particularly useful in the field of visual cryptography. The display device has two stacked liquid crys...  
WO/2006/069158A2
A method for authentication of an individual based upon biometric mode and biometric instance data comprising the steps of: storing at least a first biometric data (306) having at least one biometric data mode and at least two biometric ...  
WO/2006/066482A1
The present invention discloses an apparatus of realizing user switching between IP network and PSTN network, includes: user terminal, user line interface circuit, detecting circuit, PSTN port, IP network interface circuit and action uni...  
WO/2006/062528A1
A signal scrambling method is provided for peak-to-average power ratio (PAPR) reduction of STBC MIMO-OFDM signals in a MIMO-OFDM system having Y transmit antenna. In general terms the OFDM sequence of symbols in said signal (X1 and X2)fo...  
WO/2006/060471A1
An apparatus includes a voltage generator and a superstructure. The voltage generator includes a conductive base, an insulating spacer and a conductive top. The superstructure includes a platform and an antenna system. The voltage genera...  
WO/2006/060362A2
A method and apparatus for preventing the transfer of unauthorized data among a wireless transmit/receive unit (figure 3, 110), an external network (210), and at least one access point (120) in a wireless communication system includes th...  
WO/2006/060410A2
A method, and deterministic random bit generator system operating in accordance with the method, for generating cryptographic keys and similar secret cryptographic inputs which are hard to guess. A seed is input from an entropy source; a...  
WO/2006/060637A2
A communication system (100) provides a clear channel link for transport of encrypted payload across a network (140) of the communication system. When a source access network (106) receives, via an air interface (104), a frame that is fo...  
WO/2006/057683A2
An economic low-complexity system and method for echo cancellation are disclosed. The system and method are particularly suited for multi-carrier VDSL using the U0 band. The techniques taught herein may be implemented in VDSL and VDSL2 s...  
WO/2006/057639A1
A method, system, and device for handling creation of derivative works and for assigning usage rights to the derivative works for enforcing usage rights associated with digital works, including detecting computer-related events that are ...  
WO/2006/058039A2
An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. The system pr...  
WO/2006/056990A2
The present invention relates to a method for the authentication of a website, the method comprises: (a) establishing an agreement between a user and a website owner where the user receives at least one personal client key and the websit...  
WO/2006/055249A2
Apparatus and methods of ultra-wideband (UWB) communication are provided. In one embodiment, an ultra-wideband transmitter includes a processor configured to generate data for transmission in the form of a plurality of ultra-wideband pul...  
WO/2006/055046A2
Methods and systems are provided for maintaining a chain of custody record for the handling of an item transferred among a plurality of custodians. A system in accordance with one or more embodiments can include a plurality of computers ...  
WO/2006/055827A2
A method and system for enhancing reach-performance of a multi-carrier VDSL System estimates loop length, estimates maximum available bandwidth that can be utilized at that particular loop length, optimally selects an FFT size and sampli...  
WO/2006/053280A2
A method for assuring the authorized nature of encrypted transmissions between a plurality of communicators using a plurality of stand-alone communication processing devices, said method comprising the steps of: a) determining unique cha...  
WO/2006/053191A2
A method and apparatus for conducting a transaction involving transmission of a dynamic authentication code (201) in place of a sta PIN block using currently existing messaging standards or PIN acceptance devices (203). Minimal changes t...  
WO/2006/051741A1
A time required for a wiretapper to decrypt an encrypted text is significantly increased to provide a data transmitting apparatus having a high concealing characteristic. In a data transmitting apparatus (17105), a multilevel encoding pa...  
WO2006033977A9
A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local...  
WO/2006/047643A2
A system and method for providing secure communication between nodes (102, 106, 107) in a wireless multihopping communication network (100). The system and method achieve secure communication in a multihopping wireless network (100) by, ...  
WO/2006/044239A2
Systems and methods of ultra-wideband communication are provided. In one ultra-wideband communication system, a portion of a plurality of non-overlapping communication sub-channels are assigned to a first ultra-wideband communication dev...  
WO/2006/044151A2
Systems, computer program products and methods for authentication using a one-time password. In system that includes a client, a service provider, and an authentication service, the authentication service generates an authentication serv...  
WO/2006/044036A2
A method for automated topology discovery and management of meter nodes (15, 16) in power grid is described. In the discovery mode any of the meter nodes is able to act as proxy for data concentrator (21) to sort out topology, and to det...  
WO/2006/045038A2
A block cipher mode of operation implements a block cipher with an arbitrary block length and provides output ciphertext that is always the same size as the input plaintext. The mode can provide the best possible security in systems that...  
WO/2006/044287A2
Apparatus and methods of ultra-wideband communication are provided. In one embodiment, an ultra-wideband receiver comprises an envelope detector that detects the amplitude of a received ultra-wideband signal and generates a waveform repr...  
WO/2006/045123A2
A promotional method and apparatus are provided to facilitate a promotional campaign in which databases of terminals are populated with a prize allocation algorithm and game identification data. Users who qualify to participate in the ca...  
WO/2006/039936A1
The procedure is used to jam calls in a predefined geographic area included in a cell of a cellular mobile radio system. A jamming signal (B) is sent by means of controlled transmission means, in such a way as to jam at least partially a...  
WO/2006/039244A2
Access control is mediated by a set of 2-tuple labels or attributes which are associated with subject and object entities, respectively. Subject entitles, such as processes, have separate read and write attributes, while object entities,...  
WO/2006/038998A1
Described is a method and system for fast roaming of a mobile unit (11) in a wireless network (22). An access point (22) receives a packet (210) from a wireless computing unit (11) which includes unit identifying data and an association ...  
WO/2006/038674A1
An optical beam output part (10) modifies an output light from a light source with a signal and outputs the modified output light as an optical beam signal. A spatial light modulating part (13) modulates the optical beam signal from the ...  

Matches 951 - 1,000 out of 4,393