Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 101 - 150 out of 5,463

Document Document Title
WO/2011/137499A1
Disclosed is the implementation of a secure communication method based on the ISO 18000-6C protocol, using secure data encryption mechanisms to provide means of mutual authentication by challenge-response between interrogator and transpo...  
WO/2011/126425A1
A method for encrypting information that is transferred between two communication units such as mobile telephones, personal computers, palm-top computers, etc., where a security module is present in each mobile telephone and where a secu...  
WO/2011/123787A1
An efficient hybrid encryption-coding algorithm is disclosed that requires using traditional encryption only for the first small amount of data. This amount of data, the first block, is determined by the traditional encryption algorithm ...  
WO/2011/123462A1
A method of generating an encryption key during the manufacturing process of a device includes randomly generating a seed, encrypting a unique identifier disposed in the device to obtain a first encryption key, encrypting the first encry...  
WO/2011/103711A1
A radio wave monitoring system includes at least one signal detector, at least one interceptor, at least one image acquisition device and at least one server. Wherein the signal detector can detect whether an electrical signal according ...  
WO/2011/106045A1
Methods and apparatus are provided for secure distribution and storage of data using N channels. An input data sequence, X, is distributed using a plurality, N, of channels. In one embodiment, the input data sequence, X, is split into N ...  
WO/2011/100542A1
Searching for a pairing PMI including estimating a MIMO wireless propagation channel from an access point transmitter to a receiver at a UE is provided; including quantizing the estimated channel with a codebook consisting of multiple co...  
WO/2011/084493A1
Location determination signals are received and a location of interest is determined from the location determination signals. A communication service with a known, valid base station via a first communication channel is established and s...  
WO/2011/084617A1
An indication that jamming is occurring with vehicular communications is received. When activated by a control signal from a vehicle recovery service, a vehicle location signal is transmitted over a channel in the communication network t...  
WO/2011/076670A1
The present invention relates to a method for electronically forming an electromagnetic wave beam that is to be pointed on an object (108) from a plurality of omnidirectional emitting antennas (112, 114, 116), each antenna being attached...  
WO/2011/079022A1
Jamming is detected as occurring to communications associated with at least one electronic device disposed at a vehicle. Responsive to detecting the jamming, an indication is transmitted from the vehicle to a base station informing the b...  
WO/2011/066094A1
Memory design techniques are disclosed that provide a high compression ratio at no loss in speed. The techniques can be embodied, for instance, in heterojunction bipolar transistor (HBT) based ROMs. By embedding compression logic (e.g.. ...  
WO/2011/066093A1
An electronic countermeasure (ECM) transceiver including a receiver for sequentially receiving a plurality of signals in respective frequency sub-bands. A processor sequentially receives the plurality of signals a nd identifies the recei...  
WO/2011/059905A1
Systems and methods for authenticating and validating a device are disclosed herein. In one method, a manifest file is created for a gaming component, wherein the manifest file includes contents of each file from the gaming component. A ...  
WO/2011/053608A1
To compensate for roll-off while estimating a communication channel, an estimate of the channel is provided using a signal transmitted via the communication channel. The pilot tones positioned along the edges of the estimated channel are...  
WO/2011/048269A1
A system for controlling and synchronizing wireless sensors and actuators quickly and reliable with a short response time and low power consumption in sensor nodes. The system comprises chaotic signals transmitter (102) and a receiver co...  
WO/2011/044695A1
An inductively coupled power and data transmission system include a main power source, apparel having an electrical conductor in electrical communication with the main power source, the apparel having a first inductively couplable power ...  
WO/2011/044349A1
Systems, methods, and processor readable media are disclosed for encoding and transmitting first media content, second media content and triggering instructions to a digital radio broadcast receiver such that the triggering instructions ...  
WO/2011/034507A1
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible watermarking process, generating a code for tamper detection and localization f...  
WO/2011/027623A1
A spread spectrum modulation unit (12) subjects a basic clock signal (BC) synchronized with the carrier frequency or the harmonic frequency thereof of image information leaked with unnecessary electromagnetic waves to a spread spectrum c...  
WO/2011/024323A1
Provided is a mobile telephone communication function disabling apparatus that can disable the communication function of a mobile telephone with reliability and that can readily cause the mobile telephone to comply with a standard specif...  
WO/2011/022237A1
A system, device, and method for generating and transmitting secure reports or documents in a retail environment or payment system comprising both secure and unsecure portions, where users of the unsecure portions may require access to s...  
WO/2011/002499A1
This disclosure describes a dynamic pattern elimination compression method to eliminate redundant patterns, the content of which is not known a priori, by identifying the candidate dynamic patterns and marking them, then checking to see ...  
WO/2011/002499A8
This disclosure describes a dynamic pattern elimination compression method to eliminate redundant patterns, the content of which is not known a priori, by identifying the candidate dynamic patterns and marking them, then checking to see ...  
WO/2010/151105A1
A method for use in quantum cryptography system, particularly for enhancing the security level of obtaining the cryptographic key to encode the information communicated between to legitimate parties. A plurality of reference signals (RS)...  
WO/2010/139830A1
The invention proposes a system for communicating with smart cards provided with storage and/or processing functions, which comprises a smart card reader, said system including at least one intermediate program which is configured to act...  
WO/2010/138615A1
Systems and methods provide for a device to engage in zero-knowledge proof with an entity requiring authentication either of secret material or of the device itself. The device may provide protection of the secret material or its private...  
WO/2010/127389A1
The present invention provides an electronic locking system and method that includes a lock with a locking member and at least one antenna. A remote power source remotely powers the lock to actuate the locking member, using induction tec...  
WO/2010/123597A1
Particle circuits ( 200 ) for disrupting signals associated with a communication system or for marking a position of a device are provided. In one embodiment, the invention relates to a composite for generating radio frequency (RF) signa...  
WO/2010/112038A1
A detector (100) for detecting a possible transmission of data according to an embodiment of the present invention comprises a receiver (110) adapted to determine a spectral density in the frequency range of an electromagnetic spectrum a...  
WO/2010/108363A1
A signal jamming terminal, system and method. The signal jamming terminal includes a radio frequency module which produces jamming signals to block radio communication signals; a control module which communicates with an external device ...  
WO/2010/110809A1
Systems and methodologies are described that facilitate secure interference management in a wireless communication system. Techniques are described herein to enable a terminal jammed by a nearby base station to submit a request to the ne...  
WO/2010/107920A2
Systems and methods for effectuating a signal carrier configuration are disclosed. In one embodiment, the method comprises receiving an order, determining a signal carrier on which the order was received, determining a signal carrier con...  
WO/2010/104810A1
Systems, methods and apparatuses are disclosed for protecting encoded media data. A minimum set of information needed to encode a single message for an encoded audio signal is loaded separately from the media data into an encoder. A medi...  
WO/2010/089723A1
Disclosed is a circuit, system, device and method for authentication and/or encryption, which is based on the characteristics and/or management of One Time Programming (OTP) Non Volatile Memory (NVM) that may prevent the ability to alter...  
WO/2010/086017A1
A method for securing a data transmission between a memory tag and a reader/writer device, the device operable to inductively power the tag in the near-field for data transmission using a near-field antenna of the device, comprising, gen...  
WO/2010/065759A2
A method for reporting power headroom is disclosed. Power headroom may be reported across all carriers (wideband), for a specific carrier, or for a carrier group. The formula used to calculate the power headroom depends on whether the ca...  
WO/2010/065008A1
A wireless station prepares to roam by pre-authenticating itself with a neighboring access point. The wireless station sends a rekey request, which can include an incremented rekey number. The wireless station receives a rekey response. ...  
WO/2010/047685A1
The present invention includes a method of deciding whether a data set is acceptable for making a decision. A first probability partition array and a second probability partition array may be provided. One or both of the probability part...  
WO/2010/045672A1
A method for securing an MPLS frame for transmission over a network, the MPLS frame including an MPLS header and an MPLS payload. The method includes receiving the MPLS frame from a source and determining whether the MPLS frame meets sec...  
WO/2010/044709A3
The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection...  
WO/2010/043974A1
The present invention is directed to a system that includes a transaction unit that includes a microchip having a computer readable medium configured to store a unit identifier (UI) and at least one one-time-password (OTP) therein. The U...  
WO/2010/044709A2
The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection...  
WO/2010/039309A2
A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encode...  
WO/2010/039309A3
A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encode...  
WO/2010/038375A1
It is possible to prevent wire tapping of information via a leak of an electromagnetic wave when transmitting information by using an image display device. When an image I is transmitted/received together with synchronization informatio...  
WO/2010/036433A2
A circuit assembly (34) resistant to high-temperature and high g centrifugal force is disclosed. A printed circuit board (42) is first fabricated from alumina and has conductive traces of said circuit formed thereon by the use of a thick...  
WO/2010/032237A1
A jammer for jamming undesired transmissions includes a jamming signal generator and a data modulator. The jamming signal generator generates a jamming signal, and the data modulator modulates the jamming signal with a data stream.  
WO/2010/030731A1
A method for conducting secure communications with credential cards using existing reader/writer hardware that enhances the security of the provisioning process is provided. The method moves the sensitive data contained in these communic...  
WO/2010/026561A3
Disclosed is an appliance, system, method and corresponding software application for encrypting and processing data. A symbol based encryption module may be adapted to encrypt data on a symbol basis such that some or all of the encrypted...  

Matches 101 - 150 out of 5,463