Document |
Document Title |
WO/2008/138105A1 |
A device and method for estimating the operational effectiveness, status, and protection range of an electronic countermeasures system in real time or near real time are provided. The device and method calculate a predicted ECM power at ...
|
WO/2008/141292A1 |
Methods, systems, and machine-readable media are disclosed for processing financial transactions. According to one embodiment, a method for processing financial transactions prior to a collection of payment for the transactions can compr...
|
WO/2008/137088A1 |
The present invention provides an improved billing and contract management method and a computerized enterprise resource management system for processing and management of rent-producing financial products, such as contracts and leases t...
|
WO/2008/134737A1 |
Systems and methods for managing payments. One construction of the system includes a software enabled user interface accessible by a first party and a second party, at least one computer readable memory, and a processor. The processor is...
|
WO/2008/131434A1 |
A method and computer program product for receiving a first digital content. The first digital content is processed using a content processing algorithm to generate a second digital content. A value is associated with the processing of t...
|
WO/2008/131435A1 |
This disclosure details apparatuses, methods and systems for a Trade Business Card. The Trade Business Card and Trade Business Card Platform allows users to enter some key business profile data about their company (e.g., address, categor...
|
WO/2008/131428A1 |
A method and computer program product for associating a value with a first digital content by a first party, thus defining a first value. The first digital content is provided to a second party. A second digital content is received from ...
|
WO/2008/131028A2 |
A computer implemented method, apparatus, and computer usable program code for exchanging process model data between process authoring tools in a process management system. A set of information requirements for exchanging the process mod...
|
WO/2008/128212A1 |
A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace.
|
WO2008100813B1 |
A Java 2 Enterprise Edition (J2EE) enabled server executing Java software provides a financial transaction Web service to a client each of which communicates wirelessly with the J2EE enabled server and executes Java software to conduct f...
|
WO2007103612B1 |
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the crypto...
|
WO/2008/124732A1 |
Methods, systems, and machine-readable media are disclosed for handling unfunded financial transactions. According to one embodiment, information related to a transaction can be received. One or more rules can be applied to the informati...
|
WO/2008/123841A1 |
Method and system for extracting soft estimates of DCM or 16-QAM modulated symbols that are received from a noisy channel. Optimal soft demapping rules are approximated using equations that are division-free and eliminate the need for im...
|
WO/2008/124517A1 |
There is disclosed in embodiments herein a digital media content duplication system and method that allows digital media data to be duplicated to one or more destinations and verified. In one embodiment, the system may comprise multiple ...
|
WO/2008/121743A1 |
In one embodiment, a licensing authority receives a rehost ticket indicating proof of removal of a license from a first device. The licensing authority receives a request for a license for a second device. The licensing authority validat...
|
WO/2008/121413A1 |
Methods and apparatus are presented to allow one receiver architecture to be used for the reception of two different SDARS signals, such as, for example, one signal from XM Satellite Radio, the other signal from Sirius Satellite Radio. T...
|
WO/2008/118650A1 |
A system includes a line-based receiver for receiving protected content from a source and a line-based transmitter for providing the protected content to a destination. The protected content is secure, such as by using a High-bandwidth D...
|
WO/2008/118358A2 |
A system, method, and computer program for for text-based encryption, comprising accessing a text file with a plurality of lines of text characters; re- sequencing each of said text characters; translating a decimal representation for ea...
|
WO2008020991B1 |
The exemplary embodiments of this invention provides notarized federated identity management that may have application like supporting efficient user authentication when providers are unknown to each other and/or for avoiding direct comm...
|
WO/2008/113110A1 |
A method of performing a transaction process using a verification station (127) is disclosed. The method compares a first biometric signature, inputted to a biometric reader (102) incorporated into the verification station (127), to one ...
|
WO/2008/115718A1 |
Methods and systems provide power to a mobile recipient and allow the recipient to pay for the power obtained by having it charged to an account other than the account for the location at which the power is provided.
|
WO/2008/115476A1 |
The present invention provides encryption schemes and apparatus, which are more efficient than the existing single pass authenticated encryption schemes, while providing the same level of security. The initial vectors, which are an essen...
|
WO/2008/110595A2 |
The invention relates to a telecommunication method comprising the following steps: establishing a speech channel for voice communication between a first and a second subscriber between a first telecommunication device (118) of the first...
|
WO/2008/108868A1 |
A virtual security platform residing in a virtualization layer on a host data processing machine is provided. The virtual security platform comprises at least one virtual security appliance, each of which is configured for receiving, via...
|
WO/2008/108861A1 |
A method is provided for processing electronic documents, such as electronic invoices, specifications, or contracts, to ensure authenticity, integrity, confidentiality, and non-repudiation of the document. A third party service provider ...
|
WO/2008/109578A1 |
The method is providing an energy saving service. Customers (11) of a household (12) participate in an energy saving service (30) provided by a service provider (26). The household prepays an amount for energy consumption in a subsequent...
|
WO/2008/105946A2 |
In an SNMP network including a Manager Station having a first digital certificate and an Agent Station having a second digital certificate, the MS generates a simple network management protocol (SNMP) configuration file which includes SN...
|
WO/2008/105945A2 |
Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted tunnel. The first tunnel endpoint associa...
|
WO/2008/103395A1 |
By providing user interface functionality on a banner served on a webpage hosted by a third party, it is possible to carry out a secure transaction without the user leaving the banner. This is achieved by providing content and transactio...
|
WO/2008/103242A1 |
In an embodiment of the invention, a dongle is configured for communication with an electronic device. The dongle includes a connector, a controller, a first memory and a second memory. The connector is for interfacing with the electroni...
|
WO2008057502A9 |
A content borrowing system and method is provided in which pieces of content can be shared by one or more borrowers using parallel sharing, serial sharing or strict serial sharing.
|
WO/2008/097790A2 |
Gaming systems and methods for wager game license management in a network utilizing peer networking technology are in the various embodiments. A network component, such as a server computer or a gaming machine, is deputized an authorized...
|
WO/2008/095198A1 |
Systems and methods for performing token transactions are provided. In one embodiment, the invention provides for processing token transactions, including receiving an encrypted password for a debit card transaction, wherein the password...
|
WO/2008/091257A1 |
A new and improved apparatus for facilitating the sale, transfer, and/or assignment of intellectual property is herein disclosed.
|
WO/2008/091258A1 |
A new and improved method for facilitating the sale, transfer, and/or assignment of intellectual property is herein disclosed.
|
WO/2008/089090A2 |
A system for generating transaction settlement identifiers includes an arrangement configured to receive a biometric sample from a customer and an arrangement configured to use the biometric sample to select the transaction settlement id...
|
WO/2008/086599A1 |
Systems and methods for generating OFDM signals are provided in which sub-carrier usage is selected and/or remapped in various manners. For example, in some embodiments remapping using a security sequence is employed; in other embodiment...
|
WO/2008/089127A1 |
The invention is directed to a system and method for managing a payment system. The method generally comprises activating a payment card, associating a value with the payment card, associating at least one third party with the bill payme...
|
WO/2008/089450A1 |
A system and method for authenticating a physical address submitted in an online communication is disclosed. An online communication comprising a physical address to be verified is received. A verification identification (VID) is request...
|
WO/2008/086439A1 |
A method associated with a contactless phone. The method includes sending a balance inquiry response message to a mobile phone. The mobile phone includes a contactless element that is configured to communicate with a contactless reader i...
|
WO2007067839B1 |
Methods and system for managing secure access to data by a user in a network are disclosed. The method includes receiving (402, 404) a key and a biometric sample of the user transmitted by a user device (104) at a server (102). The metho...
|
WO/2008/079561A1 |
Communicating over a network of communication stations includes monitoring for reception of an electromagnetic wave that has a power above a threshold and a frequency in a predetermined frequency interval, and selecting carrier frequenci...
|
WO/2008/072234A2 |
Decryption apparatus includes an input memory (48), which is coupled to receive encrypted data, and an output transducer (28), for presenting decrypted data to a user. A decryption processor (50) is coupled to read and decrypt the encryp...
|
WO/2008/073667A1 |
A method of performing money transfer send transactions begins with receiving registration information from a customer, including customer identification and qualification information and payment source identification and performing veri...
|
WO/2008/070660A2 |
An apparatus for providing Quality of Service (QoS) and resource management in a network edge device of a core communication network is disclosed. The apparatus has scalable modular hardware/software architecture and adapted for receivin...
|
WO/2008/070259A2 |
A system for secure transfer of encrypted data involves a sender client (36), a recipient client (38), a main server (40), and a key server (42). The sender client (36) receives instructions from a first user identifying transfer data an...
|
WO/2008/064597A1 |
A method and a device for testing the service type. The method comprises the following steps: receiving the send routing information message to judge the service type of this call; and returning the send routing response information with...
|
WO/2008/063846A1 |
A method and system for adapting one or more pre-defined rights of a digital content (106) is disclosed. The method includes detecting (304) transformation of the digital content. The transformation results in a transformed digital conte...
|
WO/2008/060725A2 |
A secure universal transaction system includes an operations and resource component, at least one communication device for enabling user interaction with the operations and resource component, and a secure token associated with each user...
|
WO/2008/060290A2 |
A random number generating algorithm is seeded with an unpredictable number. The seed value is computed by subjecting variable data to a Secure Hashing Algorithm, and truncating the right most, or left most, 16 bytes from the message dig...
|