Login| Sign Up| Help| Contact|

Patent Searching and Data


Matches 651 - 700 out of 4,396

Document Document Title
WO/2008/138105A1
A device and method for estimating the operational effectiveness, status, and protection range of an electronic countermeasures system in real time or near real time are provided. The device and method calculate a predicted ECM power at ...  
WO/2008/141292A1
Methods, systems, and machine-readable media are disclosed for processing financial transactions. According to one embodiment, a method for processing financial transactions prior to a collection of payment for the transactions can compr...  
WO/2008/137088A1
The present invention provides an improved billing and contract management method and a computerized enterprise resource management system for processing and management of rent-producing financial products, such as contracts and leases t...  
WO/2008/134737A1
Systems and methods for managing payments. One construction of the system includes a software enabled user interface accessible by a first party and a second party, at least one computer readable memory, and a processor. The processor is...  
WO/2008/131434A1
A method and computer program product for receiving a first digital content. The first digital content is processed using a content processing algorithm to generate a second digital content. A value is associated with the processing of t...  
WO/2008/131435A1
This disclosure details apparatuses, methods and systems for a Trade Business Card. The Trade Business Card and Trade Business Card Platform allows users to enter some key business profile data about their company (e.g., address, categor...  
WO/2008/131428A1
A method and computer program product for associating a value with a first digital content by a first party, thus defining a first value. The first digital content is provided to a second party. A second digital content is received from ...  
WO/2008/131028A2
A computer implemented method, apparatus, and computer usable program code for exchanging process model data between process authoring tools in a process management system. A set of information requirements for exchanging the process mod...  
WO/2008/128212A1
A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace.  
WO2008100813B1
A Java 2 Enterprise Edition (J2EE) enabled server executing Java software provides a financial transaction Web service to a client each of which communicates wirelessly with the J2EE enabled server and executes Java software to conduct f...  
WO2007103612B1
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the crypto...  
WO/2008/124732A1
Methods, systems, and machine-readable media are disclosed for handling unfunded financial transactions. According to one embodiment, information related to a transaction can be received. One or more rules can be applied to the informati...  
WO/2008/123841A1
Method and system for extracting soft estimates of DCM or 16-QAM modulated symbols that are received from a noisy channel. Optimal soft demapping rules are approximated using equations that are division-free and eliminate the need for im...  
WO/2008/124517A1
There is disclosed in embodiments herein a digital media content duplication system and method that allows digital media data to be duplicated to one or more destinations and verified. In one embodiment, the system may comprise multiple ...  
WO/2008/121743A1
In one embodiment, a licensing authority receives a rehost ticket indicating proof of removal of a license from a first device. The licensing authority receives a request for a license for a second device. The licensing authority validat...  
WO/2008/121413A1
Methods and apparatus are presented to allow one receiver architecture to be used for the reception of two different SDARS signals, such as, for example, one signal from XM Satellite Radio, the other signal from Sirius Satellite Radio. T...  
WO/2008/118650A1
A system includes a line-based receiver for receiving protected content from a source and a line-based transmitter for providing the protected content to a destination. The protected content is secure, such as by using a High-bandwidth D...  
WO/2008/118358A2
A system, method, and computer program for for text-based encryption, comprising accessing a text file with a plurality of lines of text characters; re- sequencing each of said text characters; translating a decimal representation for ea...  
WO2008020991B1
The exemplary embodiments of this invention provides notarized federated identity management that may have application like supporting efficient user authentication when providers are unknown to each other and/or for avoiding direct comm...  
WO/2008/113110A1
A method of performing a transaction process using a verification station (127) is disclosed. The method compares a first biometric signature, inputted to a biometric reader (102) incorporated into the verification station (127), to one ...  
WO/2008/115718A1
Methods and systems provide power to a mobile recipient and allow the recipient to pay for the power obtained by having it charged to an account other than the account for the location at which the power is provided.  
WO/2008/115476A1
The present invention provides encryption schemes and apparatus, which are more efficient than the existing single pass authenticated encryption schemes, while providing the same level of security. The initial vectors, which are an essen...  
WO/2008/110595A2
The invention relates to a telecommunication method comprising the following steps: establishing a speech channel for voice communication between a first and a second subscriber between a first telecommunication device (118) of the first...  
WO/2008/108868A1
A virtual security platform residing in a virtualization layer on a host data processing machine is provided. The virtual security platform comprises at least one virtual security appliance, each of which is configured for receiving, via...  
WO/2008/108861A1
A method is provided for processing electronic documents, such as electronic invoices, specifications, or contracts, to ensure authenticity, integrity, confidentiality, and non-repudiation of the document. A third party service provider ...  
WO/2008/109578A1
The method is providing an energy saving service. Customers (11) of a household (12) participate in an energy saving service (30) provided by a service provider (26). The household prepays an amount for energy consumption in a subsequent...  
WO/2008/105946A2
In an SNMP network including a Manager Station having a first digital certificate and an Agent Station having a second digital certificate, the MS generates a simple network management protocol (SNMP) configuration file which includes SN...  
WO/2008/105945A2
Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted tunnel. The first tunnel endpoint associa...  
WO/2008/103395A1
By providing user interface functionality on a banner served on a webpage hosted by a third party, it is possible to carry out a secure transaction without the user leaving the banner. This is achieved by providing content and transactio...  
WO/2008/103242A1
In an embodiment of the invention, a dongle is configured for communication with an electronic device. The dongle includes a connector, a controller, a first memory and a second memory. The connector is for interfacing with the electroni...  
WO2008057502A9
A content borrowing system and method is provided in which pieces of content can be shared by one or more borrowers using parallel sharing, serial sharing or strict serial sharing.  
WO/2008/097790A2
Gaming systems and methods for wager game license management in a network utilizing peer networking technology are in the various embodiments. A network component, such as a server computer or a gaming machine, is deputized an authorized...  
WO/2008/095198A1
Systems and methods for performing token transactions are provided. In one embodiment, the invention provides for processing token transactions, including receiving an encrypted password for a debit card transaction, wherein the password...  
WO/2008/091257A1
A new and improved apparatus for facilitating the sale, transfer, and/or assignment of intellectual property is herein disclosed.  
WO/2008/091258A1
A new and improved method for facilitating the sale, transfer, and/or assignment of intellectual property is herein disclosed.  
WO/2008/089090A2
A system for generating transaction settlement identifiers includes an arrangement configured to receive a biometric sample from a customer and an arrangement configured to use the biometric sample to select the transaction settlement id...  
WO/2008/086599A1
Systems and methods for generating OFDM signals are provided in which sub-carrier usage is selected and/or remapped in various manners. For example, in some embodiments remapping using a security sequence is employed; in other embodiment...  
WO/2008/089127A1
The invention is directed to a system and method for managing a payment system. The method generally comprises activating a payment card, associating a value with the payment card, associating at least one third party with the bill payme...  
WO/2008/089450A1
A system and method for authenticating a physical address submitted in an online communication is disclosed. An online communication comprising a physical address to be verified is received. A verification identification (VID) is request...  
WO/2008/086439A1
A method associated with a contactless phone. The method includes sending a balance inquiry response message to a mobile phone. The mobile phone includes a contactless element that is configured to communicate with a contactless reader i...  
WO2007067839B1
Methods and system for managing secure access to data by a user in a network are disclosed. The method includes receiving (402, 404) a key and a biometric sample of the user transmitted by a user device (104) at a server (102). The metho...  
WO/2008/079561A1
Communicating over a network of communication stations includes monitoring for reception of an electromagnetic wave that has a power above a threshold and a frequency in a predetermined frequency interval, and selecting carrier frequenci...  
WO/2008/072234A2
Decryption apparatus includes an input memory (48), which is coupled to receive encrypted data, and an output transducer (28), for presenting decrypted data to a user. A decryption processor (50) is coupled to read and decrypt the encryp...  
WO/2008/073667A1
A method of performing money transfer send transactions begins with receiving registration information from a customer, including customer identification and qualification information and payment source identification and performing veri...  
WO/2008/070660A2
An apparatus for providing Quality of Service (QoS) and resource management in a network edge device of a core communication network is disclosed. The apparatus has scalable modular hardware/software architecture and adapted for receivin...  
WO/2008/070259A2
A system for secure transfer of encrypted data involves a sender client (36), a recipient client (38), a main server (40), and a key server (42). The sender client (36) receives instructions from a first user identifying transfer data an...  
WO/2008/064597A1
A method and a device for testing the service type. The method comprises the following steps: receiving the send routing information message to judge the service type of this call; and returning the send routing response information with...  
WO/2008/063846A1
A method and system for adapting one or more pre-defined rights of a digital content (106) is disclosed. The method includes detecting (304) transformation of the digital content. The transformation results in a transformed digital conte...  
WO/2008/060725A2
A secure universal transaction system includes an operations and resource component, at least one communication device for enabling user interaction with the operations and resource component, and a secure token associated with each user...  
WO/2008/060290A2
A random number generating algorithm is seeded with an unpredictable number. The seed value is computed by subjecting variable data to a Secure Hashing Algorithm, and truncating the right most, or left most, 16 bytes from the message dig...  

Matches 651 - 700 out of 4,396