Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0198640 METHOD AND SYSTEM FOR RAPID CHANGE OF ELECTRICAL RECEPTACLE AND CREATION OF SMART-READY ENVIRONMENT
The present invention proposes a system and method for creating a hub for monitoring and controlling electrically driven devices within an existing structure,...
2018/0198639 CONTROL SYSTEM AND MANAGEMENT APPARATUS
A control system transmits, to a remote monitoring server, report data generated based on operation data. The control system includes a facility-device...
2018/0198638 ONLINE SYSTEM AND METHOD FOR USING THE SAME
The present invention relates to a home appliance which can communicate with an outside of the home appliance, an online system and a method for using the...
2018/0198637 ENVIRONMENTAL CONTROL METHOD AND APPARATUS
Described herein are techniques and systems for controlling, from a mobile device, an environmental control system including at least one appliance for...
2018/0198636 Enabling Chat Sessions
Methods, systems, computer readable media, and apparatuses for enabling chat sessions are presented. In response to detecting that a first user is viewing a...
2018/0198635 INTERCOM-NETWORK STATION, INTERCOM NETWORK, AND METHOD
The invention concerns amongst other things a user (11a, 11b, 11c, 11d, 11e, 11f, 11g) to an intercom network (10) for carrying out real-time audio...
2018/0198634 SYSTEMS AND METHODS FOR PROCESSING PACKETS IN A COMPUTER NETWORK
This disclosure provides systems and methods for processing packets. A system can include first computing device, a second computing device, and a first packet...
2018/0198633 NETWORK CARD
A network interface controller (NIC), comprising: a Gigabit Fiber Transceiver; a Gigabit Ethernet Controller; a Gigabit Ethernet Switch; and a microprocessor...
2018/0198632 METHOD FOR PROVIDING A SPACE PUZZLE
A method for providing a space puzzle includes computing, by a puzzle generating entity (PGE), a master secret key (MSK), a public key (PK), a random predicate...
2018/0198631 OBTAINING AND USING TIME INFORMATION ON A SECURE ELEMENT (SE)
A secure element (SE) with a notion of time useful for checking secure items is disclosed herein. Methods of obtaining time information by the SE include push,...
2018/0198630 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PRIVACY-PRESERVING TRANSACTION VALIDATION MECHANISMS FOR SMART...
The system, method, and computer program product described herein may provide the capability to handle a variety of types of transactions, not just payment...
2018/0198629 VERIFIED BOOT AND KEY ROTATION
Methods, systems, and apparatus, including computer-readable media, for verified boot and key rotation. In some implementations, a device extracts a public key...
2018/0198628 TECHNIQUES FOR GENUINE DEVICE ASSURANCE BY ESTABLISHING IDENTITY AND TRUST USING CERTIFICATES
A method includes verifying that firmware of a device is trusted and contains a root of trust. The method also includes verifying that a protected storage of...
2018/0198627 CRYPTOGRAPHIC OPERATIONS IN AN ISOLATED COLLECTION
Examples of the present disclosure describe systems and methods for performing cryptographic operations in an isolated collection. In an example, a user may...
2018/0198626 BLOCKCHAIN-SUPPORTED, FAIL-SAFE SYNCHRONIZATION IN A DATA AUTHENTICATION INFRASTRUCTURE
A distributed hash tree-based authentication system for digital input records has more than one upper-level core node, each of which receives at least one...
2018/0198625 METHOD AND AUTHENTICATION SYSTEM FOR AUTOMATIC RE-AUTHENTICATION
A method for automatic re-authentication is provided. The method includes: transmitting, by a client device, a challenge to a key device; signing, by the key...
2018/0198624 PRIVATE BLOCKCHAIN TRANSACTION MANAGEMENT AND TERMINATION
A blockchain of transactions may be referenced for various purposes and may be later accessed for ledger verification. One example operation may include one or...
2018/0198623 DEVICES, SYSTEMS AND METHODS FOR AUTHENTICATED INTRAVASCULAR DEVICE USE AND REUSE
Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory...
2018/0198622 METHODS AND APPARATUS TO PROVIDE ISOLATED EXECUTION ENVIRONMENTS
Methods and apparatus to provide isolated execution environments are disclosed. An example apparatus includes a machine status register to determine whether...
2018/0198621 Short-Distance Network Electronic Authentication
Methods of short-distance network electronic authentication are described. In one embodiment, a method includes storing encrypted authentication data for a...
2018/0198620 SYSTEMS AND METHODS FOR ASSURING DATA ON LEASED COMPUTING RESOURCES
Embodiments described herein disclose systems and methods for ensuring integrity of shared computing resources against potentially malicious activities....
2018/0198618 APPARATUS AND METHOD FOR PROVIDING SECURE EXECUTION ENVIRONMENT FOR MOBILE CLOUD
Disclosed herein are an apparatus and method for providing a secure execution environment for a mobile cloud. The apparatus for providing a secure execution...
2018/0198617 SYSTEM AND METHOD FOR DIGITAL TOKEN EXCHANGE AND DELIVERY
A system includes hardware processors and a token exchange module configured to create a uniquely identified first digital token including an owner ID field...
2018/0198616 HOST-STORAGE AUTHENTICATION
Example implementations may relate to a host and a storage system that communicate by a block storage protocol. For example, the host may embed host...
2018/0198615 METHOD OF AUTHENTICATING COMMUNICATION OF AN AUTHENTICATION DEVICE AND AT LEAST ONE AUTHENTICATION SERVER USING...
A method of authenticating the communication of an authentication device and at least one authentication server using a local factor with creation of secret...
2018/0198614 METHOD FOR MAPPING AT LEAST TWO AUTHENTICATION DEVICES TO A USER ACCOUNT USING AN AUTHENTICATION SERVER
The invention provides a method for mapping at least two authentication devices to a user account using an authentication server, where each authentication...
2018/0198613 HOMOMORPHIC WHITE BOX SYSTEM AND METHOD FOR USING SAME
A method for whitebox cryptography is provided for computing an algorithm (m,S) with input m and secret S, using one or more white-box encoded operations. The...
2018/0198612 STRONG RESOURCE IDENTITY IN A CLOUD HOSTED SYSTEM
Aspects of the present disclosure relate to systems and methods for providing strong resource identification. When a resource is created, saved, or re-based, a...
2018/0198611 METHOD FOR ENCRYPTING OR DECRYPTING A N-TUPLE OF DATA WITH A N-TUPLE OF PREDETERMINED SECRET KEYS
The present invention relates to a method for encrypting or decrypting a n-tuple of data with a n-tuple of secret keys , the method being characterized in...
2018/0198610 PARTIALLY ENCRYPTED CONVERSATIONS VIA KEYS ON MEMBER CHANGE
Examples of the present disclosure describe systems and methods for partially encrypting conversations using different cryptographic keys. Messages...
2018/0198609 Biometric Security for Cryptographic System
A method of storing data allowing a seed value for generating an encryption key to be retrieved is provided. The method comprises obtaining, for each of a...
2018/0198608 LONG-HAUL HIGH RATE QUANTUM KEY DISTRIBUTION
Multiple bit values can be encoded on a single photon in a quantum key distribution (QKD) system using a plurality of sidebands of an optical carrier...
2018/0198607 OPTICAL CRYPTOGRAPHY SYSTEMS AND METHODS
Systems and methods for restoring or recovering linear polarization state of an optical signal as it exits the far end of an optical fiber are disclosed. The...
2018/0198606 CONFIDENTIAL COMMUNICATION MANAGEMENT
Systems and methods are provided for confidential communication management. For example, a client computer can determine a client key pair comprising a client...
2018/0198605 Key Distribution and Receiving Method, Key Management Center, First Network Element, and Second Network Element
A key distribution and receiving method includes obtaining, by a first key management center, NAF key information of the first network element and a NAF key of...
2018/0198604 EVENT ATTESTATION FOR AN ELECTRONIC DEVICE
A method for validating an electronic device 2 comprises receiving attestation information provided by the electronic device 2 attesting that the electronic...
2018/0198603 LIGHTWEIGHT MITIGATION AGAINST FIRST-ORDER PROBING SIDE-CHANNEL ATTACKS ON BLOCK CIPHERS
Techniques for mitigating side-channel attacks on cryptographic algorithms are provided. An example method according to these techniques includes applying a...
2018/0198602 DIFFERENTIAL PRIVACY WITH CLOUD DATA
Embodiments described herein enable data associated with a large plurality of users to be analyzed without compromising the privacy of the user data. In one...
2018/0198601 String Matching in Encrypted Data
In aspects of string matching in encrypted data, a computing device stores homomorphic encrypted data as a dataset, and implements a string matching...
2018/0198600 ENCRYPTION IN WIRELESS COMMUNICATION SYSTEMS
A method for encryption in a wireless communication system includes encrypting, at a base station, data of a physical layer control channel using at least one...
2018/0198599 SYSTEMS AND METHODS OF CLOCK SYNCHRONIZATION BETWEEN DEVICES ON A NETWORK
An exemplary method of synchronizing a master clock and a slave clock comprises transmitting a plurality of packets between a master device and a slave device,...
2018/0198598 SYSTEMS AND METHODS OF CLOCK SYNCHRONIZATION BETWEEN DEVICES ON A NETWORK
An exemplary method of synchronizing a master clock and a slave clock comprises transmitting a plurality of packets between a master device and a slave device,...
2018/0198597 CLOCK AND DATA RECOVERY CIRCUIT WITH JITTER TOLERANCE ENHANCEMENT
A clock and data recovery circuit with jitter tolerance enhancement is provided. The CDR circuit includes: a bang-bang phase detector, a digital filter, a...
2018/0198596 DETERMINING CLOCK SIGNAL QUALITY USING A PLURALITY OF SENSORS
Techniques for determining the quality of a clock signal are provided. In one example, a method can comprise comparing, by a sensory circuitry of a system, a...
2018/0198595 DETERMINING CLOCK SIGNAL QUALITY USING A PLURALITY OF SENSORS
Techniques for determining the quality of a clock signal are provided. In one example, a method can comprise comparing, by a sensory circuitry of a system, a...
2018/0198594 USER DEVICE SIGNAL PROCESSING BASED ON TRIGGERED REFERENCE SIGNALS FOR WIRELESS NETWORKS
A technique is provided for receiving, by a user device from a base station, a control signal indicating that base station-triggered reference signals will be...
2018/0198593 FULL DUPLEX TRANSMISSION SETUP AND RELEASE MECHANISM
In a wireless network, full duplex communication is established using a half-duplex mechanism. During a full duplex communication opportunity, a first quantum...
2018/0198592 Method and Apparatus for Monitoring and Processing Component Carriers
A method and apparatus are described which perform bandwidth aggregation by simultaneously monitoring and processing a number of simultaneous, non-contiguous...
2018/0198591 WIRELESS DEVICE, METHOD, AND COMPUTER-READABLE MEDIA FOR TRANSMITTING AND RECEIVING HIGH-EFFICIENCY SIGNAL FIELDS
Wireless devices, methods, and computer-readable media for transmitting and receiving high-efficiency signal fields. An access point (AP) may include circuitry...
2018/0198590 METHOD FOR REPORTING CHANNEL STATE IN WIRELESS COMMUNICATION SYSTEM, AND DEVICE THEREFOR
According to one embodiment of the present invention, a method for channel-coding channel state information (CSI) in a wireless communication system is...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.