Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2017/0373881 SYSTEMS AND METHODS FOR CONTROLLING ISOCHRONOUS DATA STREAMS
Systems and methods for controlling isochronous data streams are disclosed. Particular aspects of the present disclosure are designed to be used with almost...
2017/0373880 METHOD FOR MANAGING CONFIGURATION OF INDUSTRIAL INTERNET FIELD BROADBAND BUS
The invention relates to a method for managing configuration of an industrial internet field broadband bus, the method being applicable to a two-wire data...
2017/0373879 METHOD FOR IMPLEMENTING AN INDUSTRY INTERNET FIELD BROADBAND BUS
The invention relates to a method for implementing an industry internet field broadband bus, and in the method according to the invention, a bus controller and...
2017/0373878 CONTROLLER AREA NETWORK (CAN) COMMUNICATION SYSTEM AND ERROR INFORMATION RECORDING DEVICE
Provided are a CAN communication system and an error information recording device that may be expected to facilitate identification of the cause of any error...
2017/0373877 DOORBELL COMMUNICATION SYSTEMS AND METHODS
Doorbell systems can include a speaker and a visitor detection system that includes at least one of a button, a camera, and a motion detector. Doorbell systems...
2017/0373876 DOORBELL COMMUNICATION SYSTEMS AND METHODS
Doorbell systems can include a speaker and a visitor detection system that includes at least one of a button, a camera, and a motion detector. Doorbell systems...
2017/0373875 POINT-TO-POINT CHECKOUT AUTOMATION
Devices, systems, and methods for point-to-point checkout automation are described herein. One device includes a controller of a building system comprising...
2017/0373874 CONTROL METHOD FOR INFORMATION APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM
A control method is provided for an information apparatus having a display and being connected to a network, one or more target devices being controlled over...
2017/0373873 INDUSTRY INTERNET FIELD BROADBAND BUS ARCHITECTURE SYSTEM
The invention relates to an industry internet field broadband bus architecture system based on the two-wire data transmission network widely used in the...
2017/0373872 METHOD FOR IMPLEMENTING A REAL-TIME INDUSTRIAL INTERNET FIELD BROADBAND BUS
The invention discloses a method for implementing a real-time industrial internet field broadband bus, the method including: determining, by a bus controller,...
2017/0373871 Healthcare Tracking
A computer-implemented method is disclosed. The method includes obtaining location-time data automatically generated by a mobile electronic device associated...
2017/0373870 Multimedia Communication System
Multimedia communication concept (system) is a new original multimedia communication application software, platform, design and solution. The system may...
2017/0373869 METHOD, APPARATUS, AND SYSTEM FOR PROVIDING SPECIFIED COMMUNICATIONS SERVICE, AND TERMINAL
The present disclosure discloses a method, an apparatus, and a system for providing a specified communications service, and a terminal, and belongs to the...
2017/0373868 MULTIPLEX LIVE GROUP COMMUNICATION
In one embodiment, a method includes receiving, from a first group member of a group, a request to initiate a multiplex live communication; receiving, from the...
2017/0373867 EXTENSION OF WI-FI SERVICES MULTICAST TO A SUBNET ACROSS A WI-FI NETWORK USING SOFTWARE-DEFINED NETWORKING...
Wi-Fi services multicast to a subnet in a software-defined network (SDN) are extended. An SDN controller centrally monitors a data plane of a Wi-Fi network....
2017/0373866 METHOD AND SERVICE CENTER FOR COMMUNICATING BROADCAST MESSAGES BETWEEN CLIENTS IN A COMMUNICATION NETWORK
A method for communicating broadcast messages between clients in a communication network having a core mobile network and a number of wireless mobile networks...
2017/0373865 UPDATING DATA OBJECTS ON A SYSTEM
A computer system includes a first server including a first data management module and a second server including a second data management module, and a first...
2017/0373864 DATA TRANSMISSION METHOD, APPARATUS, AND SYSTEM
Methods and apparatus for transmitting data is disclosed. Data to be transmitted is segmented into data packets. The segmented data packets are duplicated into...
2017/0373863 METHOD FOR MANAGING THE REPORTING OF THE PRESENCE OF A TERMINAL WITHIN A COMMUNICATIONS NETWORK
A method is disclosed of managing the reporting of the presence of a communications terminal in a communication network including a control rules application...
2017/0373862 Physical Unclonable Function Using Augmented Memory For Challenge-Response Hashing
A technique is presented for performing a physical unclonable function (PUF) using an array of SRAM cells. The technique can be viewed as an attempt to read...
2017/0373861 SHARED KEYS BASED ON MULTIPLE FEATURES
A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input;...
2017/0373860 ROUTING CLOUD MESSAGES USING DIGITAL CERTIFICATES
Provided are a system and method for routing messages in a multi-tenant cloud computing environment based on digital certificates. In one example, a server...
2017/0373859 Cryptographic Signature System and Related Systems and Methods
The disclosed devices, systems, and methods relate to a validation system which can be used to authenticate photos and videos. The system can have various...
2017/0373858 CRYPTOGRAPHIC PRIMITIVE FOR USER AUTHENTICATION
A method of biometric authentication includes receiving a biometric input from a user for authentication of the user to access a system. The method includes...
2017/0373857 METADATA TRANSCODING
The present document relates to transcoding of metadata, and in particular to a method and system for transcoding metadata with reduced computational...
2017/0373856 PREFIX FINGERPRINT
A system and method for prefix fingerprints for a first file or a first data object. A prefix fingerprint comprises a plurality of hash values. The hash values...
2017/0373855 METHOD AND DEVICE FOR SCANNING FOR DATA PROCESSING DEVICES
There is provided a method of scanning for a remote device, the method comprising: generating, at a data processing device, a search input; transforming, at...
2017/0373854 METHODS AND APPARATUS TO AUTHENTICATE AND DIFFERENTIATE VIRTUALLY IDENTICAL RESOURCES USING SESSION CHAINING
Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining are disclosed. In response to a session request...
2017/0373853 MANAGING USER PROFILES SECURELY IN A USER ENVIRONMENT
User profiles of applications installed in a user environment, which may be compromised by malware, are managed to protect against such malware gaining access...
2017/0373852 UNIQUE TOKEN AUTHENTICATION CRYPTOGRAM
Embodiments of the invention are directed to systems and methods for validating transactions using a cryptogram. One embodiment of the invention is directed to...
2017/0373851 COMPUTER SECURITY LOCKS HAVING SEPARATE KEY PAIRS
A computer security lock having separate key pairs includes an encryption board inserted between a main board and a hard disk, and an encryption board being...
2017/0373850 DATA ENCRYPTION METHOD, DECRYPTION METHOD, APPARATUS, AND SYSTEM
A data encryption method performed at a computing device includes: receiving a data encryption request, the data encryption request indicating original data...
2017/0373849 TRANSACTION AGENTS AND SYSTEMS
A hardware agent is a hardware device attached to, embedded in, or otherwise associated with a good. In particular, the hardware agent is bound to the good in...
2017/0373848 METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM
When data is encrypted and stored for a long time, encryption key(s) and/or algorithm(s) should be updated so as not to be compromised due to malicious attack....
2017/0373847 METHOD FOR UPDATING A PUBLIC KEY
A method for updating a public key is provided. The method includes: acquiring, by a transmitting-end device, a first hash value calculated based on a first...
2017/0373846 Password-Based Generation and Management of Secret Cryptographic Keys
A user computer generates a secret cryptographic key through communication with a server. A secret user value is provided at the user computer. A secret server...
2017/0373845 Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received...
2017/0373844 SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION
Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at...
2017/0373843 SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION
Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at...
2017/0373842 System and Method for Authenticating Public Artworks and Providing Associated Information
Processing artist artwork authentication and published artwork information at a user computing device comprises an artist artwork authentication and artist...
2017/0373841 KEY EXCHANGE METHOD, KEY EXCHANGE SYSTEM, KEY DEVICE, TERMINAL DEVICE, AND PROGRAM
A random number generating unit generates random numbers s.sub.1, s.sub.2, s'.sub.1, and s'.sub.2. A public keys randomizing unit generates first randomized...
2017/0373840 BROWSER SECURITY MODULE
Authenticated requests can be sent without requiring the requests to include or potentially expose secret information used for the authentication process. A...
2017/0373839 HARDWARE ACCELERATOR FOR PLATFORM FIRMWARE INTEGRITY CHECK
Encryption of a BIOS using a programmable logic device (PLD) is described. A PLD may include a static random-access memory area including programmable logic in...
2017/0373838 METHODS FOR PROTECTING SUBSTITUTION OPERATION USING SUBSTITUTION TABLE AGAINST A SIDE-CHANNEL ANALYSIS
A method for executing by a circuit a substitution operation such that an output data may be selected in a substitution table using an input data as an index....
2017/0373837 PROTECTION METHOD AND DEVICE AGAINST A SIDE-CHANNEL ANALYSIS
A method for executing an operation by a circuit, may include executing a first operation to process an input data, the circuit generating during the execution...
2017/0373836 AES Hardware Implementation
A method of performing at least one of end-to-end Advanced Encryption Standard (AES) encryption and end-to-end AES decryption in an instruction execution...
2017/0373835 KEY MANAGEMENT SYSTEM AND METHOD
A system and method for private key management in a public key encryption system are disclosed. In one embodiment, the system and method may utilize a "fake"...
2017/0373834 POLYNOMIAL-BASED HOMOMORPHIC ENCRYPTION
A method includes generating a secret key for encryption and decoding data. The method includes identifying a set of data in plaintext format. The method...
2017/0373833 ESTABLISHING ENTROPY ON A SYSTEM
Servers in datacenters, mobile devices and virtualized servers without human interaction may experience difficulties in establishing entropy in a virtualized...
2017/0373832 METHODS AND DEVICES AGAINST A SIDE-CHANNEL ANALYSIS
A method for executing by a circuit a bit permutation operation by which bits of an input data are mixed to obtain an output data including at least two words,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.