Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 401 - 450 out of 5,929

Document Document Title
WO/2008/118661A3
A modular apparatus (200) for acquiring biometric data may include circuitry (204) operative to receive an input signal indicative of a biometric condition, the circuitry (204) being configured to process the input signal according to a ...  
WO/2008/157184A3
A payment system utilizes an IC identification card to identify a user, finds and verifies a bank account of the user. The system uses an IC identification card reader to read user identity information, and sends it along with user bank ...  
WO/2009/111348A3
A method and apparatus is provided for secure terminals that facilitate secure data transmission and are compliant with the payment card industry (PCI) data security requirements. A security processor is combined with an application proc...  
WO/2009/136404A3
This invention relates to implementing secure electronic transactions through mobile communicating devices thereby providing for a secure and convenient platform for the merchant and the customer to transact through mobile communicating ...  
WO/2008/123905A3
There is provided a method for use by a computing device for determining a value of a portion of content selected by a user. The content can be, for example, a movie or a television program that includes approximately 30 frames per secon...  
WO/2008/113085A3
A secure data exchange and access system, method, and architecture for allow web-based data transfer with improved security and scalability. The system incorporates and enables serialized pedigree systems while allowing security for stor...  
WO/2009/111231A3
The specification and drawing figures describe and illustrate a point-of-sale payment system. The point-of-sale payment system includes a mobile wireless communications instrument having at least one data processor. The data processor is...  
WO/2008/136876A3
For digital rights management (DRM) of e.g. digitally delivered music or video, a technique to make the decryption keys more secure. The technique fragments a message (song or video or other) into a number of portions, and uses a differe...  
WO/2009/155570A2
Systems and methods for wireless communications are provided. These include data deciphering components, interrupt processing components, adaptive aggregations methods, optimized data path processing, buffer pool processing, application ...  
WO/2008/114144A8
A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content...  
WO/2009/148641A1
In an OCDM-based photonic encryption system by applying random noise on unused channels and varying the inter-code phases on realistic framing repetition, an OCDM-based encryption system with provable security guarantees results.  
WO/2009/147493A1
A method and system of disabling a remote improvised explosive device (IED) that is triggered by a cell phone. A portable wideband network system, installed in a vehicle, is used to determine operator frequency or frequencies active on a...  
WO/2009/142804A2
Within a receiver, a channel estimation mechanism involves a hardware interpolator. In a first mode, narrowband pilot values are analyzed to generate channel parameters that are supplied to the interpolator such that the interpolator gen...  
WO/2009/139777A1
The embodiments of the invention provide a novel financial instrument and system and method for creating, listing, purchase and sale, and trading said financial instrument wherein the instrument comprises a security futures contract with...  
WO/2009/140654A2
Methods, apparatus, and computer program products are herein described that provide for an identity-based cryptosystem using a highly secure biometric model through which both access and data transmission are effectively made very secure...  
WO/2009/136786A1
The invention relates to a method of covertly transmitting information. The method comprises the step of providing biological sound data. Further, the method comprises the step of processing the biological sound data with the information...  
WO/2009/131549A1
The present invention provides a mobile communication device having an application processor, and a communication module, wherein a communication with another mobile communication device is executed by the application processor and commu...  
WO/2009/117010A1
A computer-implemented method (100) for facilitating a negotiation for at least one item or service for at least one user. The method includes dynamically adjusting the duration of at least one phase of the negotiation and/or the offer p...  
WO/2008/114144A3
A system, method and various software tools enable a video hosting website to automatically identified unlicensed audio content in video files uploaded by users, and initiate a process by which the user can replace the unlicensed content...  
WO/2009/117171A1
Systems and methods for authenticating a user are disclosed. In some embodiments, information regarding multiple biometric parameters is gathered from a test subject and compared with a validation template. The validation template can be...  
WO/2009/114020A1
An embodiment relates generally to a method of authenticating a monetary fund transfer. The method includes receiving a monetary fund transfer request that includes a declared identity of a sender and an identity of a recipient, retrievi...  
WO/2007/103597A3
System and method for providing a syndicated media item to authorized users. In one embodiment authorization can be granted through payment, in exchange for watching advertisements and/or as part of another Internet service. A syndicatio...  
WO/2009/041957A3
Various techniques of distributing revenue and/or other money, selecting/bonding delivery agents, and performing other tasks are providing herein. Methods include distributing portions of loan payments to one or more referrers associated...  
WO/2009/108444A1
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory conne...  
WO/2009/104234A1
A wireless device which prevents communication contents between a transmitter station and a receiver station from being eavesdropped. The transmitter station (10) embeds a confidential signal (embedded signal) containing confidential inf...  
WO/2009/104827A1
The present invention discloses a method and an apparatus for generating a key stream for a stream cipher, an S-box for a block cipher and a method for substituting an input vector using the S-box. According to the present invention, the...  
WO/2009/105653A1
Embodiments of the present invention include systems, computer program products, and associated computer-implemented methods of advancing loan proceeds on prepaid cards. Example embodiments include generating a common interface for loan ...  
WO/2009/105769A1
A system and method for securely controlling access to a designated location with a single card (18) having a permanent data storage medium (23) and a temporary data storage medium (30) disposed on the card (18) Biometric information is ...  
WO/2009/102657A1
The VoIP Management System is capable of identifying voice-based wireless devices and denying wireless communication services to these devices. The VoIP Management System also identifies VoIP packet data traffic, and this communication c...  
WO/2009/102523A1
A computing system comprising a pocket personal computer and a reader are disclosed. The pocket PC is credit card-sized and comprises flash memory, and optionally a processor and a GPS chip. In some embodiments, the pocket PC also includ...  
WO/2007/011787A9
A system and method for substantially immediate issuance of transaction cards includes at least one unassigned transaction card including a storage medium having a card number encoded thereupon. The system also includes a computing syste...  
WO/2009/100220A2
Systems and methodologies are described that facilitate signaling and detecting discontinuous transmission (DTX) in a wireless communication environment. A DTX indicator and Channel Quality Indicator (CQI) feedback can be multiplexed wit...  
WO/2009/096963A1
A method for biometric authorization of an electronic payment between a consumer and a merchant comprising the steps of: (1) a consumer enrollment step for enrollment of a consumer biometric sample, identification information and shippin...  
WO/2009/097178A1
Systems and methods for providing connectivity to a wireless network may include a point of sale device at a merchant location that is used to receive an account identifier that in turn is associated with a stored value account of a cust...  
WO/2009/048480A3
A system includes a generator and at least one device. The generator includes a waveform oscillator and a blanking pulse generator. Each device includes a transmit antenna, a receive antenna, an antenna unit, a mixer and a detector. The ...  
WO/2004/038533A9
A business method to facilitate universal, secure and fully mobile e-commerce and/or i-commerce transactions, which method is based on personal, anonymous, secure, digitally-enabled Personal Identification Numbers which are used in conju...  
WO/2009/088761A1
Content delivered to client device over an Internet Protocol Multimedia Subsystem (IMS)-based network is protected through a digital rights management (DRM) scheme that leverages IMS service and access infrastructure, such as the IMS cor...  
WO/2009/088487A1
A system and method operate with a commerce processing system to determines a dynamic currency conversion markup rate for a given merchant and card number of a customer. The system and method determine the currency that is offered to the...  
WO/2009/085387A1
A cardholder-initiated financial transaction using a cardholder controlled input device in communication with a payment card network and a database is disclosed. The cardholder uses a payment card issued to the cardholder by an issuer ba...  
WO/2009/085147A1
A method of controlling wireless communications includes generating a control signal that indicates a desired transmission timing of a plurality of interference signals from a respective plurality of interference devices (46). The contro...  
WO/2009/085415A1
Transaction processing in an offline environment for a prepaid product comprising a portable consumer device includes responding to presentation of the prepaid product at a reader for offline processing by initiating operation of the pre...  
WO/2009/085225A1
A system by which a User can associate selectable Markers, Data Packets and/or Objects with Content. The Content may generally be distributed electronically, and the Markers allow for insertion and/or overlay of Objects when the Content ...  
WO/2009/082409A1
A method of operating a computer system includes storing attributes of a buying organization, vendors, invoices and/or line-item details from invoices in one or more databases. Rules are established for selecting settlement options for t...  
WO/2009/079151A1
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical source computing machine to a physically different destination machine. For exampl...  
WO/2009/075978A1
A mobile device having a user input component receiving input from a user and a biometric sensor incorporated in the user input component collecting biometric data from the user when the user input component is receiving the input, where...  
WO/2009/074711A1
The present invention relates to speech data encryption and decryption methods. As regards decryption, a speech decoder for decompressing compressed speech data is configured for speech data decryption. One or more decryption parameters ...  
WO/2009/073174A2  
WO/2009/068990A2
A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve encrypted code from a web site and receiving th...  
WO/2009/070716A1
Electronic transaction data sets are processed for a multitude of disparate transactions using a plurality autonomous payment networks. A software-programmed computer type system receives and processes point-of-sale transaction data to s...  
WO/2009/070339A1
The present invention provides a way to lock a secret in a portable package. The package contains the key needed to unlock it. The key is dispersed throughout the encrypted data so that an attacker has no way to feasibly recover it. The ...  

Matches 401 - 450 out of 5,929