Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 101 - 150 out of 5,619

Document Document Title
WO/2013/024463A3
Disclosed are wireless communication systems and methods for calibrating same. The communication systems may include first wireless transceivers having: (a) a modem, and (b) one or more Radio Frequency (RF) chain pairs. There may also be...  
WO/2013/022719A1
Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The ...  
WO/2013/020054A1
In one example, a method may include a telecommunication service provider detecting that a cellular device is located within a transmission-receiving distance of an Internet router, determining that the cellular device is associated with...  
WO/2013/013934A1
The invention relates to a method for transferring informational data (ID) in a passenger transportation device (PB). Said passenger transportation device (PB), such as an aircraft, a ship, et cetera, comprises an informational system (I...  
WO/2013/011500A1
A method for providing spectral and temporal stealthy information transmitted over an optical communication channel, according to which, at the transmitting side, the power spectral density of a pulse sequence bearing the information is ...  
WO/2013/002833A3
Systems and methods for binding of cryptographic content using unique device characteristics with server heuristics in accordance with embodiments of the invention are disclosed. One embodiment includes a processor and memory includes co...  
WO/2012/177364A1
Security in inductively coupled communications systems, such as near field communications (NFC), may be improved by restricting signals carrying user data to an authorized data transmission region. Thus, eavesdroppers outside the authori...  
WO/2012/170128A1
An electronic device for generating a masking signal is described. The electronic device includes a plurality of microphones and a speaker. The electronic device also includes a processor and executable instructions stored in memory that...  
WO/2012/167231A1
Methods and systems are provided for a programmable parallel computation and data manipulation accelerator that may be used, for example, in cryptographic calculations. They allow acceleration of a broad variety of cryptographic algorith...  
WO/2012/162128A1
Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an administrator header. The administrator ...  
WO/2012/150601A1
Apparatus and methods for authenticated and automated digital certificate production which may for example employ a computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a docum...  
WO/2012/148257A1
The present invention relates to a method for use in a wireless sensor network comprising at least one gateway and at least two nodes; said method comprising the steps of: performing a bi-directional authentication between nodes and betw...  
WO/2012/148593A1
A system and method for self-detecting vehicle theft is provided that includes a first antenna (114) and a second antenna (170), both located on a vehicle (130). The first antenna transmits the signal (116) and the second antenna receive...  
WO/2012/133601A1
Parameters of a hidden Markov model (HMM) are determined by a server based on an observation sequence stored at a client, wherein the client has a decryption key and an encryption key of an additively homomorphic cryptosystem, and the se...  
WO/2012/121634A1
In some embodiments of the invention, a method is provided in a wireless communication device (110) for transmitting an alarm signal to a radio access node (120). According to this method, the wireless communication device (110) detects ...  
WO/2012/114233A2
A method for communication includes generating one or more data streams for transmission to respective target receivers (28), and one or more jamming streams. At least one parameter, selected from a group of parameters consisting of powe...  
WO/2012/112693A1
Systems and methods in accordance with embodiments of the invention convert satellite signals to an intermediate frequency signal and selecting modulated digital data within the satellite signals for content decoding. One embodiment incl...  
WO/2012/103816A1
An apparatus comprising a plurality of stages that are coupled in series and configured to implement a hash function, wherein the stages comprise a plurality of XOR arrays and one or more Substitution-Boxes (S-Boxes) that comprise a plur...  
WO/2012/095080A1
The invention relates to a method for operating an electronic reconnaissance system (2) in surroundings that are protected by a jammer (1). Jamming phases (TJ2) for transmitting a jamming signal and monitoring phases (TB) for receiving a...  
WO/2012/095026A1
Systems and methods which provide identification of a user in combination with mutual authentication between a user and identification host are shown. Embodiments further provide mutual authentication between the identification host and ...  
WO/2012/094662A1
Peak-to-average ratio reduction is achieved by detecting peaks in an original analog signal that exceed a given threshold. Segments of the original analog signal containing such peaks are treated (e.g., by attenuation) and a composite an...  
WO/2012/092072A3
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who...  
WO/2012/080507A2
The invention relates to a device for jamming the transmissions of at least one enemy telecommunications network, said device comprising a means for receiving and storing signals in a reception band Br in a reception time window of a pre...  
WO/2012/080507A3
The invention relates to a device for jamming the transmissions of at least one enemy telecommunications network, said device comprising a means for receiving and storing signals in a reception band Br in a reception time window of a pre...  
WO/2012/075029A1
A mobile-communication signal-jamming assembly includes a first portion shaped to fit within a power port of a vehicle and a second portion that at least partially extends from the power port. The assembly includes at least one engagemen...  
WO/2012/066053A1
The invention relates to a method of detecting a jamming transmitter affecting a communication user equipment, wherein said communication user equipment (UE) and a number of base node stations (BNS) are components of a cellular code divi...  
WO/2012/066739A1
Provided is a communication system that can have increased secrecy abilities and can reduce the audio level of leaked audio output from a reception device in a broadband system. The communication system (1) is configured from a wireless ...  
WO/2012/066052A1
The invention relates to a method of detecting a jamming transmitter affecting a communication user equipment, wherein said communication user equipment (UE) and a number of base node stations (BNS) are components of a cellular code divi...  
WO/2012/059911A1
A method and apparatus for long range private broadband wireless communication system is provided. The communication system provides bi-directional Point-to-Multipoint (PtMP) data communication between a Network Operating Center (NOC) an...  
WO/2012/051172A1
A mechanism for processing beamforming steering matrices in a transceiver system. A plurality of beamforming steering matrices associated with a plurality of subcarriers of an RF signal received at the transceiver system are generated. T...  
WO/2012/050982A1
Various embodiments provide for systems and methods for wireless communications that implement transmitter protection schemes using spatial combining. The protection scheme implemented by some embodiments provides for a number of benefit...  
WO/2012/048076A1
A method begins by a first device obtaining data for transmission to a second device and partitioning the data to produce a plurality of data portions. The method continues with the first device dispersed storage error encoding the plura...  
WO/2012/047086A1
The present invention relates to an apparatus (100) and method for auto compensating Quantum Key Distribution (QKD) network. The apparatus (100) comprises an Alice setup (1) for receiving a transmitted signal from a Bob setup (2). The Al...  
WO/2012/044856A1
Systems and methods for combining signals from multiple active wireless transmitters are discussed herein. An exemplary system comprises a radio enclosure, a first transmitting RFU, a second transmitting RFU, and a combiner. The first tr...  
WO/2012/042461A2
A Point-to-Point communication system includes (i) a millimeter-wave channel having a substantially flat channel transfer function between a first frequency of millimeter-waves and a second frequency of millimeter-waves, the two frequenc...  
WO/2012/023944A1
Examples are generally described that include transmission methods including inserting at least a portion of data from a first data stream into a second data stream to be transmitted over a communications channel. On receipt of the two d...  
WO/2012/022992A3
The subject of the invention is encryption system for protecting phone calls, which serves to encrypt telephone calls, primarily for encryption of mobile telephone calls. The system according to the invention uses the telephone network b...  
WO/2012/016187A3
A hybrid cellular and non-cellular multi-hop communication device, including a hand-held wireless device having one or more antennas, a cellular wireless interface connected to at least some of the one or more antennas, and a non-cellula...  
WO/2012/009757A1
The present invention relates to a device for the location of passive intermodulation faults in a coaxial cable network. The test apparatus (100) according to one embodiment of the present invention utilises a pair of high-power, frequen...  
WO/2011/156026A2
A system and methods are provided for transmitting an encrypted data word of two or more bits. This involves Identifying a random key word comprising two or more bits for encrypting the data word and identifying a set of unique orthogona...  
WO/2011/153414A1
Methods, devices and systems for sensor-based wireless communication systems using compressive sampling are provided. In one embodiment, the method for sampling signals comprises receiving, over a wireless channel, a user equipment trans...  
WO/2011/144418A1
When establishing communication connections in an ad-hoc network, the identity of a subscriber is typically checked in accordance with a predefined communications protocol and a common session key is established for the subsequent commun...  
WO/2011/143257A1
Methods and systems are described for format-preserving encryption. Format-preserving encryption on an entire format F may be achieved by performing format-preserving encryption on one or more subsets of F and then applying one or more p...  
WO/2011/141879A3
An orthogonal frequency division multiplexing (OFDM) modulation method, which includes phase modulating both the real and imaginary components of an OFDM signal.  
WO/2011/143107A1
In some embodiments, a method including steps of analyzing speech in a first language to generate first data indicative of a sequence of snippets of the speech, and generating speech data indicative of speech in a second language (scramb...  
WO/2011/137499A1
Disclosed is the implementation of a secure communication method based on the ISO 18000-6C protocol, using secure data encryption mechanisms to provide means of mutual authentication by challenge-response between interrogator and transpo...  
WO/2011/139304A3
The present invention provides a quantum-enabled security (QES) protocol which creates a revolutionary new cybersecurity capability: quantum (single-photon) communications are integrated with optical communications to provide a strong, i...  
WO/2011/139304A2
The present invention provides a quantum-enabled security (QES) protocol which creates a revolutionary new cybersecurity capability: quantum (single-photon) communications are integrated with optical communications to provide a strong, i...  
WO/2011/126425A1
A method for encrypting information that is transferred between two communication units such as mobile telephones, personal computers, palm-top computers, etc., where a security module is present in each mobile telephone and where a secu...  
WO/2011/123462A1
A method of generating an encryption key during the manufacturing process of a device includes randomly generating a seed, encrypting a unique identifier disposed in the device to obtain a first encryption key, encrypting the first encry...  

Matches 101 - 150 out of 5,619