Patent application number | Description | Published |
20080279112 | SYSTEM AND METHOD FOR CONFIGURING MEDIA NETWORK RESOURCES - A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed. | 11-13-2008 |
20090060182 | Apparatus and method for enhancing the protection of media content - An aspect of the current invention involves an apparatus and method for protecting media content from being read and copied by an unauthorized party. In one embodiment of the invention, this is accomplished by storing keys for decrypting encrypted media content on a secure memory device located in proximity to a computer processor. A secure memory device located in proximity to a computer processor allows for decryption keys to be sent to a user of the computer processor in advance of the user receiving an encrypted media content that will be decrypted with the decryption keys. With the secure memory device, the decryption keys can be stored indefinitely without an unauthorized party gaining access to them. Another embodiment of the invention allows for multiple media content providers to store their own decryption keys for their own encrypted media content simultaneously on a secure memory device located with a user's personal computer. A further embodiment of the invention involves using a secure memory device located with a means for displaying media content—such as a monitor or speaker—to allow for secure transfer of decrypted, decompressed media content from a computer processor used to play media content, a stand-alone media content player, or a set-top box media content player to a media content display | 03-05-2009 |
20090132467 | SYSTEM AND METHOD OF ORGANIZING IMAGES - Disclosed are a system, method and computer-readable medium for organizing images. A method aspect relates to receiving an image into a device, receiving incidental information associated with the image, organizing the image and the incidental information into a data structure such as a sparse array, classifying the received image with an image classifier and storing the classified image in an image database, receiving a search query and responding to the search query by searching for and retrieving matching images in the image database based on a comparison of the image search query to the data structure. | 05-21-2009 |
20090146812 | RFID systems - The specification describes a new architecture for RFID systems that is adapted to process large numbers of RFID tags and provide information about a large number of items. The system provides for multiple tag readers. The tag readers are active and have both transmit and receive capability. The system includes a gateway tag that receives information about individual items from the multiple readers and thus contains data on the entire inventory of items. This allows each of the multiple readers to conveniently access data for the entire inventory of items. | 06-11-2009 |
20090222660 | Method and device for end-user verification of an electronic transaction - The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication. | 09-03-2009 |
20090299899 | Impulse donation/buy without risk system and method - A method and system are disclosed for enabling a subscriber to a service provider to purchase goods or make donations to a third-party unaffiliated with the service provider. The system generates an electronic bill for a service provided to the user, where the electronic bill includes at least one selection for a purchase from or a donation to the third-party. The selection for purchase or donation from the user is received accompanied by an immediate or subsequent receipt of an indication of payment from the user. The payment indication includes payment for the service and the purchase or donation. The user has up until payment is actually made to revoke the purchase or donation selection. The transaction is completed by the service provider with the third-party to effectuate the purchase or donation. | 12-03-2009 |
20100097194 | Tracking Variable Conditions Using Radio Frequency Identification - A method and system for tracking variable conditions using radio frequency identification (RFID) are disclosed. In embodiments of the present invention, an RFID sensor tag is used to measure a condition. The condition can be any measurable condition such as location, temperature, humidity, pressure, time, date, inertial measurements, etc. Variable data representing the measured condition is read from the RFID sensor tag in order to track the measured condition. The variable data can be read from RFID sensor tags in addition to reading tag identification data from RFID tags, so that the variable data can be associated with tag identification data. | 04-22-2010 |
20100149998 | IDENTIFYING ANALOG ACCESS LINE IMPAIRMENTS USING DIGITAL MEASUREMENTS - The preferred embodiments include a method, system or computer-readable storage medium for identifying analog access line impairments in a communications network. The embodiments include determining a ping packet loss count and a ping failure count from digital packet loss data associated with at least one analog access line. The embodiments also include generating a line designation for the at least one analog access line in response to the ping packet loss count exceeding a first threshold and the ping failure count exceeding a second threshold. Also, a plurality of pings can be transmitted during a testing period, the digital packet loss data being generated in response to the plurality of pings. The first threshold can represent at least a three percent ping packet loss. The second threshold can represent the ping failure count being at least ten percent of a total number of the plurality of pings. | 06-17-2010 |
20100228983 | Third-party watermarking - A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy. | 09-09-2010 |
20110119485 | METHOD AND APPARATUS FOR PROVIDING RADIO COMMUNICATION WITH AN OBJECT IN A LOCAL ENVIRONMENT - A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate. | 05-19-2011 |
20110137775 | Passive RFID postage stamps and method of using the same - A system and method for postage payment utilizes passive RFID tags as postage “stamps”, with the amount of the postage automatically billed to a previously-established customer account. The tags are stored in a separate stamp database and are “enabled” by linking the individual tag to a customer account. The use of the RFID stamps eliminates the need for the customer to know the proper postage beforehand. The existence of a customer account with a proper return address reduces the likelihood of a dead letter. Also, a special category of stamps may be used for automatic reply mail. By virtue of using an RFID tag, the mailed item's progress through the postal delivery system may be tracked from dispatch to delivery. | 06-09-2011 |
20110153503 | Device and Method for Identity Theft Resistant Transcations - An authorization device includes an input module, a key generator, and an output module. The input module receives a request to authorize a transaction between a mobile device and a merchant terminal. The key generator generates a key used for authorizing the transaction. The key relates only to the transaction. The output module transmits an authorization for the transaction that is based on a processing of the key. | 06-23-2011 |
20110156909 | GATEWAY RADIO FREQUENCY IDENTIFICATION TAG SYSTEM - A system and method are disclosed for transporting deterministic traffic in a gigabit passive optical network. A system that incorporates teachings of the present disclosure may include, for example, an Optical Line Termination (OLT) for exchanging data traffic in a Gigabit Passive Optical Network (GPON) having a controller programmed to generate a timeslot schedule for transport of a desired bandwidth of constant bit rate (CBR) data traffic by selecting one or more timeslots from periodic frame clusters operating according to a GPON Transmission Convergence (GTC) protocol. Additional embodiments are disclosed. | 06-30-2011 |
20110185174 | System and Method for Providing a One-Time Key for Identification - A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device. | 07-28-2011 |
20120011007 | Mobile Payment Using DTMF Signaling - Systems and methods are disclosed for mobile payment using dual-tone multi-frequency (DTMF) signals. A mobile device equipped with at least a speaker and an input is used to connect to a server on the mobile network. Upon authentication of a user of the mobile device, the server generates the payment key, translates the key to DTMF signals, and plays the DTMF signals over the speaker of the mobile device. The user holds the mobile device speaker close to a microphone of a DTMF scanner at a POS terminal. The DTMF scanner includes logic that extracts the payment key from the DTMF signals, and the POS terminal uses the payment key to bill the user. The POS terminal transmits the bill with the payment key to the server on the network. The server ensures that the key is active, and debits an account for the user based on the amount presented in the bill. The key is de-activated after a specified time period or one use, whichever occurs first. | 01-12-2012 |
20120206241 | GATEWAY RADIO FREQUENCY IDENTIFICATION TAG SYSTEM - A system and method are disclosed for transporting deterministic traffic in a gigabit passive optical network. A system that incorporates teachings of the present disclosure may include, for example, an Optical Line Termination (OLT) for exchanging data traffic in a Gigabit Passive Optical Network (GPON) having a controller programmed to generate a timeslot schedule for transport of a desired bandwidth of constant bit rate (CBR) data traffic by selecting one or more timeslots from periodic frame clusters operating according to a GPON Transmission Convergence (GTC) protocol. Additional embodiments are disclosed. | 08-16-2012 |
20130143553 | FEMTOCELL USE FOR RADIO FREQUENCY NETWORK SWEEPS - Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable. | 06-06-2013 |
20130212705 | SYSTEM AND METHOD OF GENERATING A PER SALE WATERMARKING ON DIGITAL FILES - A system, method and computer readable media provided for watermarking a digital file. The method comprises altering samples of the digital file available for distribution upon request by adding a number such as +or a −1 to each sample of the digital file according to a probability value and compressing the digital file with the altered samples. Altering the sample of the digital file may be done on a per distribution or per sale basis. | 08-15-2013 |
20130276148 | Proof-of-Purchase Watermarks - A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy. | 10-17-2013 |