Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 201 - 250 out of 5,651

Document Document Title
WO/2010/056736A3
A digital pre-distortion system which can provide the flexibility to model the highly non-linear distortion associated with High Efficiency RF Power Amplifiers while through a novel implementation of a least squares estimation process al...  
WO/2010/045672A1
A method for securing an MPLS frame for transmission over a network, the MPLS frame including an MPLS header and an MPLS payload. The method includes receiving the MPLS frame from a source and determining whether the MPLS frame meets sec...  
WO/2010/047685A1
The present invention includes a method of deciding whether a data set is acceptable for making a decision. A first probability partition array and a second probability partition array may be provided. One or both of the probability part...  
WO/2010/043974A1
The present invention is directed to a system that includes a transaction unit that includes a microchip having a computer readable medium configured to store a unit identifier (UI) and at least one one-time-password (OTP) therein. The U...  
WO/2010/044709A3
The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection...  
WO/2010/044709A2
The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection...  
WO/2010/039309A2
A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encode...  
WO/2010/038375A1
It is possible to prevent wire tapping of information via a leak of an electromagnetic wave when transmitting information by using an image display device. When an image I is transmitted/received together with synchronization informatio...  
WO/2010/039309A3
A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encode...  
WO/2010/036433A2
A circuit assembly (34) resistant to high-temperature and high g centrifugal force is disclosed. A printed circuit board (42) is first fabricated from alumina and has conductive traces of said circuit formed thereon by the use of a thick...  
WO/2010/032237A1
A jammer for jamming undesired transmissions includes a jamming signal generator and a data modulator. The jamming signal generator generates a jamming signal, and the data modulator modulates the jamming signal with a data stream.  
WO/2010/030731A1
A method for conducting secure communications with credential cards using existing reader/writer hardware that enhances the security of the provisioning process is provided. The method moves the sensitive data contained in these communic...  
WO/2010/026561A3
Disclosed is an appliance, system, method and corresponding software application for encrypting and processing data. A symbol based encryption module may be adapted to encrypt data on a symbol basis such that some or all of the encrypted...  
WO/2010/024822A1
Methods and systems for providing electronic storage and online accessibility to images of deposited items, deposit correction notices and returned items are disclosed. The system allows for electronic access to items and information tha...  
WO/2010/019593A1
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protoc...  
WO/2010/006754A1
In various areas of application, it is desirable to have a jamming apparatus for jamming radio signals which has a high level of geographical limitation and ensures safe jamming of the radio signals. The present application solves this p...  
WO/2010/008845A2
Methods and apparatus are provided for increasing throughput in a wireless communication system by reducing the amount of overhead transmitted to certain user terminals. Overhead due to control information may be reduced for these certai...  
WO/2010/006754A4
In various areas of application, it is desirable to have a jamming apparatus for jamming radio signals which has a high level of geographical limitation and ensures safe jamming of the radio signals. The present application solves this p...  
WO/2010/006248A2
A system for Service Oriented Architecture (SOA) communication includes a plurality of SOA nodes having a standardized hardware configuration, wherein the standardized hardware configuration includes an operating engine, an encryption mo...  
WO/2010/005228A2
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message are provided. One of the methods includes placing a place marker signature record in the NDEF message. The place marker signature ...  
WO/2010/005228A3
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message are provided. One of the methods includes placing a place marker signature record in the NDEF message. The place marker signature ...  
WO/2010/002731A1
Encrypted data on mobile devices is protected by remotely storing a decryption key. In order to decrypt the encrypted data on the mobile device, the mobile device obtains the decryption key from an access control system that is remote fr...  
WO/2010/002740A1
[0078] Systems and methods for estimating IQ imbalance in a communication system are provided. In various embodiments, a device is configured to perform a self-characterization. The self-characterization is performed over an RF loopback ...  
WO/2009/155570A2
Systems and methods for wireless communications are provided. These include data deciphering components, interrupt processing components, adaptive aggregations methods, optimized data path processing, buffer pool processing, application ...  
WO/2009/148641A1
In an OCDM-based photonic encryption system by applying random noise on unused channels and varying the inter-code phases on realistic framing repetition, an OCDM-based encryption system with provable security guarantees results.  
WO/2009/147493A1
A method and system of disabling a remote improvised explosive device (IED) that is triggered by a cell phone. A portable wideband network system, installed in a vehicle, is used to determine operator frequency or frequencies active on a...  
WO/2009/142804A2
Within a receiver, a channel estimation mechanism involves a hardware interpolator. In a first mode, narrowband pilot values are analyzed to generate channel parameters that are supplied to the interpolator such that the interpolator gen...  
WO/2009/139777A1
The embodiments of the invention provide a novel financial instrument and system and method for creating, listing, purchase and sale, and trading said financial instrument wherein the instrument comprises a security futures contract with...  
WO/2009/140654A2
Methods, apparatus, and computer program products are herein described that provide for an identity-based cryptosystem using a highly secure biometric model through which both access and data transmission are effectively made very secure...  
WO/2009/136786A1
The invention relates to a method of covertly transmitting information. The method comprises the step of providing biological sound data. Further, the method comprises the step of processing the biological sound data with the information...  
WO/2009/136404A3
This invention relates to implementing secure electronic transactions through mobile communicating devices thereby providing for a secure and convenient platform for the merchant and the customer to transact through mobile communicating ...  
WO/2009/131549A1
The present invention provides a mobile communication device having an application processor, and a communication module, wherein a communication with another mobile communication device is executed by the application processor and commu...  
WO/2009/117384A3
Aspects of a method and system for protected MAC sequence numbers, as well as secure block acknowledgment (block ACK) with protected MAC sequence number are presented. In one aspect of the system a communicating station (STA) may protect...  
WO/2009/117010A1
A computer-implemented method (100) for facilitating a negotiation for at least one item or service for at least one user. The method includes dynamically adjusting the duration of at least one phase of the negotiation and/or the offer p...  
WO/2009/117171A1
Systems and methods for authenticating a user are disclosed. In some embodiments, information regarding multiple biometric parameters is gathered from a test subject and compared with a validation template. The validation template can be...  
WO/2009/114280A3
The embodiments described provide for systems and methods that alert a merchant of increased interchange fees. An increased interchange fee occurs when an electronic transaction, such as a credit card transaction, deviates from a standar...  
WO/2009/114020A1
An embodiment relates generally to a method of authenticating a monetary fund transfer. The method includes receiving a monetary fund transfer request that includes a declared identity of a sender and an identity of a recipient, retrievi...  
WO/2009/111348A3
A method and apparatus is provided for secure terminals that facilitate secure data transmission and are compliant with the payment card industry (PCI) data security requirements. A security processor is combined with an application proc...  
WO/2009/111231A3
The specification and drawing figures describe and illustrate a point-of-sale payment system. The point-of-sale payment system includes a mobile wireless communications instrument having at least one data processor. The data processor is...  
WO/2009/108444A1
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory conne...  
WO/2009/104234A1
A wireless device which prevents communication contents between a transmitter station and a receiver station from being eavesdropped. The transmitter station (10) embeds a confidential signal (embedded signal) containing confidential inf...  
WO/2009/104827A1
The present invention discloses a method and an apparatus for generating a key stream for a stream cipher, an S-box for a block cipher and a method for substituting an input vector using the S-box. According to the present invention, the...  
WO/2009/105653A1
Embodiments of the present invention include systems, computer program products, and associated computer-implemented methods of advancing loan proceeds on prepaid cards. Example embodiments include generating a common interface for loan ...  
WO/2009/105769A1
A system and method for securely controlling access to a designated location with a single card (18) having a permanent data storage medium (23) and a temporary data storage medium (30) disposed on the card (18) Biometric information is ...  
WO/2009/102657A1
The VoIP Management System is capable of identifying voice-based wireless devices and denying wireless communication services to these devices. The VoIP Management System also identifies VoIP packet data traffic, and this communication c...  
WO/2009/102523A1
A computing system comprising a pocket personal computer and a reader are disclosed. The pocket PC is credit card-sized and comprises flash memory, and optionally a processor and a GPS chip. In some embodiments, the pocket PC also includ...  
WO/2009/100220A2
Systems and methodologies are described that facilitate signaling and detecting discontinuous transmission (DTX) in a wireless communication environment. A DTX indicator and Channel Quality Indicator (CQI) feedback can be multiplexed wit...  
WO/2009/096963A1
A method for biometric authorization of an electronic payment between a consumer and a merchant comprising the steps of: (1) a consumer enrollment step for enrollment of a consumer biometric sample, identification information and shippin...  
WO/2009/097178A1
Systems and methods for providing connectivity to a wireless network may include a point of sale device at a merchant location that is used to receive an account identifier that in turn is associated with a stored value account of a cust...  
WO/2009/088761A1
Content delivered to client device over an Internet Protocol Multimedia Subsystem (IMS)-based network is protected through a digital rights management (DRM) scheme that leverages IMS service and access infrastructure, such as the IMS cor...  

Matches 201 - 250 out of 5,651