Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 351 - 400 out of 5,929

Document Document Title
WO/2010/151105A1
A method for use in quantum cryptography system, particularly for enhancing the security level of obtaining the cryptographic key to encode the information communicated between to legitimate parties. A plurality of reference signals (RS)...  
WO/2010/139830A1
The invention proposes a system for communicating with smart cards provided with storage and/or processing functions, which comprises a smart card reader, said system including at least one intermediate program which is configured to act...  
WO/2010/138615A1
Systems and methods provide for a device to engage in zero-knowledge proof with an entity requiring authentication either of secret material or of the device itself. The device may provide protection of the secret material or its private...  
WO/2010/127389A1
The present invention provides an electronic locking system and method that includes a lock with a locking member and at least one antenna. A remote power source remotely powers the lock to actuate the locking member, using induction tec...  
WO/2010/123597A1
Particle circuits ( 200 ) for disrupting signals associated with a communication system or for marking a position of a device are provided. In one embodiment, the invention relates to a composite for generating radio frequency (RF) signa...  
WO/2010/026561A3
Disclosed is an appliance, system, method and corresponding software application for encrypting and processing data. A symbol based encryption module may be adapted to encrypt data on a symbol basis such that some or all of the encrypted...  
WO/2010/112038A1
A detector (100) for detecting a possible transmission of data according to an embodiment of the present invention comprises a receiver (110) adapted to determine a spectral density in the frequency range of an electromagnetic spectrum a...  
WO/2010/108363A1
A signal jamming terminal, system and method. The signal jamming terminal includes a radio frequency module which produces jamming signals to block radio communication signals; a control module which communicates with an external device ...  
WO/2010/110809A1
Systems and methodologies are described that facilitate secure interference management in a wireless communication system. Techniques are described herein to enable a terminal jammed by a nearby base station to submit a request to the ne...  
WO/2010/107920A2
Systems and methods for effectuating a signal carrier configuration are disclosed. In one embodiment, the method comprises receiving an order, determining a signal carrier on which the order was received, determining a signal carrier con...  
WO/2010/104810A1
Systems, methods and apparatuses are disclosed for protecting encoded media data. A minimum set of information needed to encode a single message for an encoded audio signal is loaded separately from the media data into an encoder. A medi...  
WO/2010/089723A1
Disclosed is a circuit, system, device and method for authentication and/or encryption, which is based on the characteristics and/or management of One Time Programming (OTP) Non Volatile Memory (NVM) that may prevent the ability to alter...  
WO/2010/086017A1
A method for securing a data transmission between a memory tag and a reader/writer device, the device operable to inductively power the tag in the near-field for data transmission using a near-field antenna of the device, comprising, gen...  
WO/2010/044709A3
The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection...  
WO/2010/065759A2
A method for reporting power headroom is disclosed. Power headroom may be reported across all carriers (wideband), for a specific carrier, or for a carrier group. The formula used to calculate the power headroom depends on whether the ca...  
WO/2010/065008A1
A wireless station prepares to roam by pre-authenticating itself with a neighboring access point. The wireless station sends a rekey request, which can include an incremented rekey number. The wireless station receives a rekey response. ...  
WO/2010/039309A3
A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encode...  
WO/2010/045672A1
A method for securing an MPLS frame for transmission over a network, the MPLS frame including an MPLS header and an MPLS payload. The method includes receiving the MPLS frame from a source and determining whether the MPLS frame meets sec...  
WO/2010/047685A1
The present invention includes a method of deciding whether a data set is acceptable for making a decision. A first probability partition array and a second probability partition array may be provided. One or both of the probability part...  
WO/2010/043974A1
The present invention is directed to a system that includes a transaction unit that includes a microchip having a computer readable medium configured to store a unit identifier (UI) and at least one one-time-password (OTP) therein. The U...  
WO/2010/044709A2
The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection...  
WO/2010/039309A2
A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encode...  
WO/2010/038375A1
It is possible to prevent wire tapping of information via a leak of an electromagnetic wave when transmitting information by using an image display device. When an image I is transmitted/received together with synchronization informatio...  
WO/2010/036433A2
A circuit assembly (34) resistant to high-temperature and high g centrifugal force is disclosed. A printed circuit board (42) is first fabricated from alumina and has conductive traces of said circuit formed thereon by the use of a thick...  
WO/2010/032237A1
A jammer for jamming undesired transmissions includes a jamming signal generator and a data modulator. The jamming signal generator generates a jamming signal, and the data modulator modulates the jamming signal with a data stream.  
WO/2010/005228A3
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message are provided. One of the methods includes placing a place marker signature record in the NDEF message. The place marker signature ...  
WO/2008/086425A9
A database dispatches data to a wireless device on the particular source that powers a container during any segment of its journey.  
WO/2009/011992A8
A payment processor for providing a payment service includes a transaction processor to process a transaction request. An application programming interface links a merchant to the transaction processor based on an identifier. A merchant ...  
WO/2010/030731A1
A method for conducting secure communications with credential cards using existing reader/writer hardware that enhances the security of the provisioning process is provided. The method moves the sensitive data contained in these communic...  
WO/2009/083970A3
A system and method for storing information on a storage device is disclosed. An encrypted version of the information is stored on a storage device. The information is inspected in order to determine whether it may be stored on the stora...  
WO/2009/083971A3
A system and method of controlling access to information. An encrypted version of the information is stored. An attempt to access encrypted information may be intercepted and an access authorization rank may be computed. If computed acce...  
WO/2010/006754A4
In various areas of application, it is desirable to have a jamming apparatus for jamming radio signals which has a high level of geographical limitation and ensures safe jamming of the radio signals. The present application solves this p...  
WO/2009/024988A3
The present invention provides a system and method for managing acquisition of goods using a credit card of a client in a way whereby the details of the credit card are not exposed or revealed to the supplier or the seller throughout the...  
WO/2010/024822A1
Methods and systems for providing electronic storage and online accessibility to images of deposited items, deposit correction notices and returned items are disclosed. The system allows for electronic access to items and information tha...  
WO/2008/142687A3
A device and method for storing personal network access information and biometric data, and upon a match of received biometric information from a user with such stored biometric data, transmitting such personal network access information...  
WO/2010/019593A1
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protoc...  
WO/2009/117384A3
Aspects of a method and system for protected MAC sequence numbers, as well as secure block acknowledgment (block ACK) with protected MAC sequence number are presented. In one aspect of the system a communicating station (STA) may protect...  
WO/2009/047776A9  
WO/2008/086425A3
A database dispatches data to a wireless device on the particular source that powers a container during any segment of its journey.  
WO/2008/151290A3
License management techniques for managing and analyzing license usage among license consumers.  
WO/2010/006754A1
In various areas of application, it is desirable to have a jamming apparatus for jamming radio signals which has a high level of geographical limitation and ensures safe jamming of the radio signals. The present application solves this p...  
WO/2010/008845A2
Methods and apparatus are provided for increasing throughput in a wireless communication system by reducing the amount of overhead transmitted to certain user terminals. Overhead due to control information may be reduced for these certai...  
WO/2010/006248A2
A system for Service Oriented Architecture (SOA) communication includes a plurality of SOA nodes having a standardized hardware configuration, wherein the standardized hardware configuration includes an operating engine, an encryption mo...  
WO/2010/005228A2
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message are provided. One of the methods includes placing a place marker signature record in the NDEF message. The place marker signature ...  
WO/2010/002731A1
Encrypted data on mobile devices is protected by remotely storing a decryption key. In order to decrypt the encrypted data on the mobile device, the mobile device obtains the decryption key from an access control system that is remote fr...  
WO/2009/001355A3
Device, system, and method of protected purchasing. For example, a method for protected purchasing of items via a communication network having a server, the method including: receiving at the server a request from a user to purchase an i...  
WO/2009/068990A3
A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve encrypted code from a web site and receiving th...  
WO/2008/124517A8
There is disclosed in embodiments herein a digital media content duplication system and method that allows digital media data to be duplicated to one or more destinations and verified. In one embodiment, the system may comprise multiple ...  
WO/2010/002740A1
[0078] Systems and methods for estimating IQ imbalance in a communication system are provided. In various embodiments, a device is configured to perform a self-characterization. The self-characterization is performed over an RF loopback ...  
WO/2009/114280A3
The embodiments described provide for systems and methods that alert a merchant of increased interchange fees. An increased interchange fee occurs when an electronic transaction, such as a credit card transaction, deviates from a standar...  

Matches 351 - 400 out of 5,929