Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0212799 MULTICARRIER COMMUNICATION SYSTEM AND CHANNEL ESTIMATION METHOD THEREOF
This invention discloses a multicarrier communication system that includes a transmitter equipment and a receiver equipment. According to a timing scheme, the...
2018/0212798 Path Detection Method and Apparatus
A path detection method and apparatus, where the method includes generating M virtual extensible local area network (VXLAN) probe packets according to a source...
2018/0212797 BUS SYSTEM, SUBSCRIBER STATION THEREFOR, AND METHOD FOR CONFIGURING A STATIC BUS SYSTEM FOR A DYNAMIC COMMUNICATION
A bus system, a subscriber station, and a method for configuring a static bus system for a dynamic communication are provided. The bus system has at least two...
2018/0212796 CIRCUIT DEVICE, ELECTRONIC DEVICE, AND CABLE HARNESS
A circuit device includes: a first physical layer circuit to which a first bus compliant with a USB standard is connected; a second physical layer circuit to...
2018/0212795 DISTRIBUTED FILE SYSTEM USING TORUS NETWORK AND METHOD FOR OPERATING THE SAME
Disclosed herein is a distributed file system using a torus network. The distributed file system includes multiple servers. The location of a master server may...
2018/0212794 LAYOUT CREATION METHOD AND LIGHT POSITION REGISTRATION SYSTEM
Provided is a layout creation method for creating a layout of apparatuses disposed in a space (such as lighting devices, air conditioners, and switches). The...
2018/0212793 COMMISSIONING DEVICE FOR COMMISSIONING INSTALLED BUILDING TECHNOLOGY DEVICES
The invention provides a commissioning device for commissioning building technology devices, in particular operating devices for lighting means, the...
2018/0212792 METHOD AND SYSTEM FOR SYNCHRONIZATION AND REMOTE CONTROL OF CONTROLLING UNITS
Systems and methods for controlling devices, including controller and actuators are disclosed. Actuators may be devices where remote control of the device or...
2018/0212791 CONTEXTUAL APPLICATION INTERACTIONS WITH CONNECTED DEVICES
Systems and methods for providing contextual interaction with connected devices are described. A mobile device having a display that presents a user interface...
2018/0212790 Data Processing System with Machine Learning Engine to Provide Automated Collaboration Assistance Functions
Aspects of the disclosure relate to implementing and using a data processing system with a machine learning engine to provide automated collaboration...
2018/0212789 Communication Method and Storage Medium Storing Communication Program
A communication method includes: connecting the server with a client; receiving a participation request from the client, the participation request including a...
2018/0212788 MULTICAST HELPER TO LINK VIRTUAL EXTENSIBLE LANS
Computerized aspects monitor listening virtual local area network ports for multicast packets from hypervisor virtual machines that meet a multicast group...
2018/0212787 OPERATING METHOD OF SEMICONDUCTOR DEVICE PERFORMING INTELLIGENCE NEGOTIATION
Provided are methods of operating a gateway and a server, performing an intelligent negotiation in an Internet of Things (IoT) network. According to an example...
2018/0212786 CIRCUIT DEVICE, OSCILLATION DEVICE, PHYSICAL QUANTITY MEASURING DEVICE, ELECTRONIC APPARATUS, AND VEHICLE
A circuit device includes an oscillation circuit that generates an oscillation signal by using an oscillator, a processing unit that controls the oscillation...
2018/0212785 SECURE REMOTE USER AUTHENTICATION LEVERAGING PUBLIC KEY CRYPTOGRAPHY AND KEY SPLITTING
An ID service on an app server interacts with a corresponding identity app installed on a user device such as a smart phone. At setup, the ID service receives...
2018/0212784 METHOD TO SECURE AN APPLICATIVE FUNCTION IN A CLOUD-BASED VIRTUAL SECURE ELEMENT IMPLEMENTATION
The present invention relates to a method to secure an applicative function in a cloud-based virtual secure element implementation, said virtual secure element...
2018/0212783 METHOD AND SYSTEM BLOCKCHAIN VARIANT USING DIGITAL SIGNATURES
A method for using digital signatures for signing blockchain transactions includes: generating a domain key pair comprising a domain private key and a domain...
2018/0212782 Methods For Digitally Signing An Electronic File And Authentication Method
The invention is a method for digitally signing an electronic file (48), comprising the steps carried out by a server: generating a challenge value (50)...
2018/0212781 SECURED DAISY CHAIN COMMUNICATION
An intermediate servant device connected in a daisy chain configuration with a set of devices is described. The intermediate servant device may be configured...
2018/0212780 CONTROL INTERFACE FOR AUTONOMOUS VEHICLE
A system includes a control computer that is programmed to perform an authentication based on an encryption key, upon being connected to a vehicle...
2018/0212779 GENERATING PSEUDO RANDOM NUMBERS FOR QUANTUM COMPUTING SECURE AUTHENTICATION
A generator device being configured for generating pseudo random numbers, the generator device comprising a computing device operable for (i) calculating a...
2018/0212778 ADDRESSING A TRUSTED EXECUTION ENVIRONMENT USING CLEAN ROOM PROVISIONING
Methods, systems, and devices are described herein for delivering protected data to a trusted execution environment (TrEE) associated with an untrusted...
2018/0212777 SYSTEM AND METHOD FOR PERFORMING SECURE COMMUNICATIONS
A server and method for providing a content selection is provided. The server receives content targeting parameters and obtains content items from at least one...
2018/0212776 SYSTEM AND METHOD FOR PERFORMING SECURE COMMUNICATIONS
A server and method for providing a content selection is provided. The server receives content targeting parameters and obtains content items from at least one...
2018/0212775 Secure Analytics Using Homomorphic and Injective Format-Preserving Encryption
Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter...
2018/0212774 ALIGN SESSION SECURITY FOR CONNECTED SYSTEMS
Granting an aligned secured access to a resource for a client system. A first authentication token and a first validity time period value are received from a...
2018/0212773 CLOSE PROXIMITY INNER CIRCLE DISCOVERY
Systems, methods, and computer-readable storage media are provided for enabling discovery of a user by a member of an inner circle of the member when the user...
2018/0212772 Securely Provisioning an Application With User Information
The present disclosure describes a system, method, and non-transitory computer readable medium for provisioning multiple instances of a secure communication...
2018/0212771 Securely Transferring User Information Between Applications
The present disclosure describes a system, method, and non-transitory computer readable medium for provisioning multiple instances of a secure communication...
2018/0212770 KEY VAULT ENCLAVE
Techniques for implementing a key vault as an enclave are presented. The techniques include securely storing, in a key vault enclave, a key for an encryption...
2018/0212769 ADDRESSING A TRUSTED EXECUTION ENVIRONMENT
Methods, systems, and devices are described herein for delivering protected data to a trusted execution environment (TrEE) associated with a potentially...
2018/0212768 SECURITY SYSTEM AND METHOD FOR INTERNET OF THINGS INFRASTRUCTURE ELEMENTS
A security system and method are provided that manage the security of a plurality of internet of things (IoT) devices that are part of an enterprise...
2018/0212767 METHOD OF GENERATING CRYPTOGRAPHIC KEY PAIRS
A method is provided for performing elliptic curve cryptography that reduces the number of required computations to produce, for example, a key pair. The...
2018/0212766 ASYMMETRIC CONTENT PROTECTION OF LARGE DATASTREAMS
A content protection system includes an encrypter to encrypt fragments of a datastream, each with one of a multiplicity of related encryption keys, so as to...
2018/0212765 CONFIDENTIAL INFORMATION SETTING METHOD, CONFIDENTIAL INFORMATION SETTING SYSTEM, AND CONFIDENTIAL INFORMATION...
A confidential information setting apparatus includes: a communication unit that acquires an encryption key and condition information, which is a condition for...
2018/0212764 Secure Network Coding for Multi-Description Wireless Transmission
Described herein is a method and system for wireless data transmission with network coding which limits encryption operations to a critical set of network...
2018/0212763 REFRESH OF SHARED CRYPTOGRAPHIC KEYS
One of n.gtoreq.2 servers, connectable via a network, implements a cryptographic protocol using a secret key K which is shared between the n servers, and...
2018/0212762 SECURE INTERNAL USER AUTHENCATION LEVERAGING PUBLIC KEY CRYPTOGRAPHY AND KEY SPLITTING
In a computing system, methods for secure OS level login authentication for internal users to access servers. Some or all servers in a group each utilize a...
2018/0212761 HARDWARE CIRCUIT TO PERFORM ROUND COMPUTATIONS OF ARX-BASED STREAM CIPHERS
Systems and methods for efficient computation of stream ciphers. An example system for implementing a stream cipher, may comprise: a sub-round computation...
2018/0212760 NESTED ENCLAVE IDENTITY
A nested enclave identity is presented. A nested identity is indicative of one or more possible enclave instantiations according to one or more identity types....
2018/0212759 Secure Probabilistic Analytics Using Homomorphic Encryption
An example method for performing a secure probabilistic analytic includes acquiring, by a client, an analytic, at least one analytic parameter associated with...
2018/0212758 Secure Probabilistic Analytics Using an Encrypted Analytics Matrix
Provided are methods and systems for performing a secure probabilistic analytic using an encrypted analytics matrix. An example method includes acquiring, by a...
2018/0212757 Compression and Homomorphic Encryption in Secure Query and Analytics
Systems and methods for end-to-end encryption and compression are described herein. A query is encrypted at a client using a homomorphic encryption scheme. The...
2018/0212756 Secure Web Browsing via Homomorphic Encryption
Systems and methods for end-to-end encryption of a web browsing process are described herein. A web query is encrypted at a client using a homomorphic...
2018/0212755 Secure Analytics Using an Encrypted Analytics Matrix
Systems and methods of secure analytics using an encrypted analytics matrix are disclosed herein. An example method includes encoding an analytic parameter set...
2018/0212754 Secure Analytics Using Homomorphic Encryption
Provided are methods and systems for performing a secure analytic over a data source. An example method includes acquiring, by a client, an analytic, at least...
2018/0212753 End-To-End Secure Operations Using a Query Vector
Systems and methods for an end-to-end secure operation using query vector Q_V having size s. Exemplary methods include: extracting a set of term components {T}...
2018/0212752 End-To-End Secure Operations from a Natural Language Expression
Systems and methods for an end-to-end secure operation from an expression in natural language. Exemplary methods include: receiving a set of queries from a...
2018/0212751 End-To-End Secure Operations Using a Query Matrix
Systems and methods for an end-to-end secure operation using a query matrix Q_M having dimensions d.times.s. Exemplary methods include: extracting a set of...
2018/0212750 HOMOMORPHIC ENCRYPTION
Systems, methods, and computer-readable storage devices storing instructions for homomorphic encryption via finite ring isomorphisms are provided. An example...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.