Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 751 - 800 out of 4,393

Document Document Title
WO/2007/149625A2
A method for managing a communication session between a first communication device and a second device in a communication network (100) is disclosed. The communication session is conveyed between a service-provider server and the first c...  
WO/2007/149796A2
A telecommunication system includes a processor, interfaces in communication with the public telephone network and a data network, respectively, and a memory. The memory comprises executable instructions that when executed by the process...  
WO2006089160B1
A method for transmitting a multimedia content file encrypted with a multimedia content key to a rendering device, the rendering device further including a private license key, I is disclosed. The method includes configuring a license se...  
WO/2007/143588A2
A receiver including a channel estimation function in which an initial channel estimate is filtered to increase receiver operation, particularly when the receiver may only have a limited number of channel estimation symbols with which to...  
WO/2007/142913A2
An embodiment of the present invention is a technique to process signals in a communication system. A channel impulse response (CIR) generator generates a time-domain windowed CIR from a received signal using a window function. A thresho...  
WO/2007/135664A2
A system (100) and a method for real-time authentication and notification of a user of a Web site for inter-personal communications through the user's (110) cellular telephone (112).  
WO/2007/136309A1
A method for letting a temporary radio base station (RBS, 140) gain and maintain control of the traffic of a targeted RBS (120) in a system (100), where RBS's transmit an identity signal and a list of candidate frequencies for use by use...  
WO/2007/133178A2
In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of the present invention, input from an input source, such as traffic from a com...  
WO/2007/133182A2
A modular aerospace plane. In one embodiment the plane can include a forward fuselage section, a main wing section, a tail section and wing attachments. Various sections can be integrated to offer a variety of aircraft characteristics, p...  
WO/2007/130502A2
Methods, apparatus, and data structures embodied in computer-readable media are provided for facilitating access to a service in a network. Title materials are received which include one or more of a first title object, a component of th...  
WO/2007/130554A2
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides t...  
WO/2007/130356A2
A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for...  
WO/2007/130861A2
Methods and systems consistent with the present invention provide a method for dynamically controlling power consumption in a digital demodulator circuit by varying clock rates and bit widths of demodulator components including an analog...  
WO/2007/130416A2
Methods and apparatus are provided for processing packets in a network. A received packet includes title materials which include one or more of a title object, a component of the title object, or a reference to the title object. The titl...  
WO/2007/126434A2
A method for determining a bandwidth of a complex valued sample stream may include correlating a first portion of a preamble symbol of the complex valued sample stream with a second portion of the preamble symbol to generate a time autoc...  
WO2007106694A9
Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies tha...  
WO/2007/123869A2
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized qu...  
WO/2007/124379A2
An input random access memory (RAM) module of a fast Fourier transform (FFT) engine of a DVB receiver is used to store, during a first time period, delayed versions of an input signal that includes a first orthogonal frequency divisional...  
WO/2007/120169A2
A method of symmetric key encryption involves using a composition of transformations leading to an enhanced homophonic substitution, wherein the mapping of characters varies depending on the sequence of characters in the message text. In...  
WO/2007/121034A2
In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and a storage engine adapted to retrieve an e...  
WO/2007/121178A2
A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device. At least one key is generated based on the obtained...  
WO/2007/121024A2
A method for selecting an MCS for a carrier channel is provided. The method includes obtaining (202) a set of characteristic parameters for a first function representing a variation of an effective SINR of the carrier channel with a cali...  
WO/2007/121035A2
An encryption technique is disclosed for encrypting a data segment comprising a plurality of data blocks, wherein the security and throughput of the encryption is enhanced by using blockwise independent bit vectors for reversible combina...  
WO2006116497B1
A production information reporting/recording system is disclosed herein including a number of features to ensure efficient, flexible and reliable recording of production data in a manufacturing system. Such features include validating th...  
WO/2007/117277A2
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or decryption algorithm are performed during ...  
WO/2007/118154A2
A system (100) includes a processor having a trace port, a memory coupled to the processor (104), and a software integrity checking ("SIC") logic coupled to the memory and the trace port. The trace port provides data regarding an executi...  
WO/2007/117336A2
A license for a first component of a protectable content is verified and a license for a second component of the protectable content is verified. A license for the protectable content is then verified based at least in part on the verifi...  
WO/2007/118236A2
A method and system for interfacing between a portable media device and one or more media content providers. The method may be practiced, for example, in a system including the portable media device that receives content from one or more...  
WO/2007/117914A2
In a method of facilitating an encrypted communication for use in communication between a local device, operated by a user, and a remote device, a data representation of a biometric feature of the user is received (412) from a biometric ...  
WO/2007/115131A2
The invention enables management of mammalian disease related to decreased energy production in the mitochondria, the powerhouse of the cell. The invention uses the combination of liposomal reduced glutathione and 1-arginine to increase ...  
WO/2007/113418A1
Data intended to be transmitted within a plurality of sets of data packets is transmitted by first terminal (11) to a second terminal (12) in a telecommunications network (10). At the level of the first and second terminals, as a functio...  
WO/2007/113786A2
The present invention provides an article tracking and control system that records articles when they are entered into or removed from a case. Each article is tagged with an RFID tag and is identified individually by the system. The syst...  
WO/2007/110857A2
A method for jointly designing a transmitter pulse-shaping filter (36) and a receiver pulse-shaping filter (68) having respective filter coefficients includes defining one or more performance-related variables based on at least some of t...  
WO/2007/112168A2
Arrangements relating to an Orthogonal Frequency Division Multiplexing (OFDM) receiver (200) can include performing at least one Low-Density Parity Check (LDPC) decoding attempt on a received signal (725) and evaluating at least one pari...  
WO/2007/111869A2
A system, method and computer -readable medium for controlling writing of files in endpoint devices in a network are provided. In the system, a request to write a file at an endpoint of a network is intercepted and compared to predetermi...  
WO/2007/109764A2
An OFDM receiver having an analog multiplier based I-Q channelizing filter, samples and holds consecutive analog I-Q samples of an I-Q baseband, the I-Q basebands having OFDM sub-channels. A lattice of analog I-Q multipliers and analog I...  
WO/2007/104802A1
The present invention describes a highly efficient method and system for the secure, auditable generation of random numbers. For this purpose, it makes use of an MAC cryptographic function, digital information received externally and/or ...  
WO/2007/106119A2
Systems and methods are provided for improving a channel estimate in a signal communication system. The systems and methods improve the channel estimation quality and/or the delay spread of the channels that can be estimated. The combini...  
WO/2007/103479A2
An apparatus for optimizing roaming in a network environment is provided that includes a bearer manager operable to receive a registration request from a user. An identity of a visited network and access network information is included w...  
WO/2007/102898A2
A deterministic blinding method for cipher algorithms that employ key -mixing and substitution (S -box) operations uses a masking table (MASK[0] to MASK [63] ) constructed with a true mask (MASK[0] ) and a plurality of dummy masks corres...  
WO/2007/102867A2
A system and method is provided for authenticating access in a mobile wireless network. The system and method comprise exchanging an extensible authentication protocol (EAP) packet with an access terminal over a high rate packet data rad...  
WO/2007/103481A2
Establishing one or more facets of a policy includes facilitating a communication session for an access terminal at a visited network. The access terminal is associated with a home network having a home policy server. The policy is recei...  
WO/2007/103451A2
In one embodiment according to the present disclosure, a system for implementing handover of a mobile IP session in a cellular communication network generally includes a processor and a memory for storing one or more context information ...  
WO/2007/103450A2
A method for requesting policy authorization The request includes a first manager and a second manager sending first and second messages, respectively. The method includes, in response to the second message, making a policy decision base...  
WO/2007/103504A2
Communicating packets along a bearer path includes receiving a home network address and a visited network address at an access terminal. The home network address corresponds to a home anchored bearer path anchored at a home network of th...  
WO/2007/103298A2
A secure system includes a user authentication device including memory, a microCPU, an authentication factor input and a communication port. The authentication device interacts with a securely monitored device including an identification...  
WO/2007/103484A2
A method includes a network originating a QoS reservation message and communicating the network-originated QoS message through a radio access network (RAN) from an access gateway (AGW) to an access terminal (AT). The network-originated r...  
WO/2007/103449A2
A method for creating an accounting record in a policy server in a communication network. The method also includes receiving policy data from one or more application layer elements. The met'hod includes receiving accounting data from one...  
WO2006081053A9
A wireless data acquisition and recording (DAR) system includes acquisition circuitry including a video camera and/or a microphone carried by an operator for capturing video and audio events viewed and/or heard by the operator. A wireles...  
WO/2007/102823A1
The DigiPass for the Web provides security for internet communication greater than that achieved by the use of a static password without requiring the user to install any software or to possess or use dedicated hardware of any kind. The ...  

Matches 751 - 800 out of 4,393