Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0241592 DECISION FEEDBACK EQUALIZER AND INTERCONNECT CIRCUIT
There is provided a decision feedback equalizer including a comparison circuit configured to compare a value indicated as 2.sup.n of a pulse amplitude...
2018/0241591 TREE SEARCH-BASED DECODING
A method, device, and a computer program are provided to decode a signal received through a transmission channel in a communication system, the received signal...
2018/0241590 Method and Apparatus for Equalizing Signals
pa A system and apparatus are disclosed for a method and apparatus for equalizing signals. An apparatus that incorporates teachings of the present disclosure...
2018/0241589 MULTIDROP DATA TRANSFER
Multi-drop communications channels can have significantly deep notches in their frequency response causing a corresponding limitation of the effective data...
2018/0241588 RADIO BASE STATION, USER TERMINAL AND RADIO COMMUNICATION METHOD
The present invention is designed to allow co-presence with other systems, and, furthermore, achieve improved spectral efficiency in cells (for example,...
2018/0241587 INTEGRATING AND CONTROLLING MULTIPLE LOAD CONTROL SYSTEMS
Systems and methods are disclosed for using one or more gateway systems for integrating multiple load control systems running multiple versions of software...
2018/0241586 Path Detection Method in VxLAN, Controller, and Network Device
A path detection method in a virtual extensible local area network (VxLAN), a controller, and a network device, where the controller constructs a detection...
2018/0241585 COMMUNICATIONS NETWORK, METHOD FOR OPERATING SAME, AND PARTICIPANTS IN A COMMUNICATIONS NETWORK
A communications network comprises a plurality of participants. A first participant transmits a message repeating sequence of N.gtoreq.2 successive messages to...
2018/0241584 MEANS AND METHODS FOR REGULATING CAN COMMUNICATION
The present invention extends to methods, systems, devices, for manipulating operation of at least one electronic control unit (ECU) connected to a controller...
2018/0241583 ETHERNET BUS, CONTROLLER AND METHOD FOR WAKING A CONTROLLER OF AN ETHERNET BUS
An Ethernet bus having at least two controllers, wherein the controllers each have a bus driver and a microprocessor, wherein at least the first controller has...
2018/0241582 CONTROL SYSTEM, OPERATION DETERMINING APPARATUS, DEVICE, CONTROL METHOD, AND CONTROL PROGRAM
A storage unit (M12) stores correspondence information in which at least two pieces of information among environment information, person information, and the...
2018/0241581 DOG ALERT MOBILE APPLICATION
Implementations of a dog alert system are provided. In some implementations, a computer-implemented method comprises receiving information at a first computing...
2018/0241580 METHOD AND APPARATUS FOR SPONTANEOUSLY INITIATING REAL-TIME INTERACTIVE GROUPS ON NETWORK
A method and apparatus are disclosed for spontaneously initiating real-time interactive groups on the network executed on a host. In one embodiment, the method...
2018/0241579 POWER SUPPLY SYSTEM, POWER SOURCING EQUIPMENT, AND ETHERNET Y CABLE
A power sourcing equipment is provided. The power sourcing equipment is connected to an Ethernet cable. The power sourcing equipment includes a switching...
2018/0241578 SMART BYPASS DIODE BRIDGE RECTIFIERS
Example implementations relate to smart bypass diode bridge rectifiers. For example, a device can include a power over Ethernet input. In some examples, the...
2018/0241577 Proximity-Based Security
In one embodiment, a first computing device may establish a spatial gap, wherein the spatial gap is defined by a maximum distance from the first computing...
2018/0241576 PHOTON-BASED CA AUTHENTICATION METHOD AND SYSTEM
The present application provides a photon-based CA authentication method, including: receiving, by a photon-based CA authentication terminal, an optical signal...
2018/0241575 Mobile Message Source Authentication
A control circuit receives from a mobile receiver a request for a certificate for a particular sourcing entity and responsively transmits to that mobile...
2018/0241574 INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
An information processing apparatus generates a public key pair in accordance with a certificate issuance request, generates a certificate signing request...
2018/0241573 Hardware Blockchain Corrective Consensus Operating Procedure Enforcement
A system may provide hardware acceleration for corrective blockchain-based record entry. Blockchain management circuitry (BMC) may receive a correction to a...
2018/0241572 TECHNIQUES FOR REMOTE SGX ENCLAVE AUTHENTICATION
Techniques for remote SGX enclave authentication are described. An attestation service may be used to attest that an enclave was successfully established on a...
2018/0241571 SERVICE PROCESSING METHOD, DEVICE AND SYSTEM
The present disclosure relates to a service processing method, a service processing device and a service processing system, which belong to computer...
2018/0241570 SECURITY AUTHENTICATION METHOD, CONFIGURATION METHOD, AND RELATED DEVICE
The present invention provides a security authentication method, a configuration method, and a related device. A first terminal receives a public key for...
2018/0241569 STORING, MIGRATING, AND CONTROLLING ACCESS TO ELECTRONIC DOCUMENTS DURING ELECTRONIC DOCUMENT SIGNING PROCESSES
Systems and techniques are disclosed that enable an electronic document signature service to ensure that it stores electronic documents on servers within...
2018/0241568 VERIFICATION OF CODE SIGNATURE WITH FLEXIBLE CONSTRAINTS
Systems, apparatuses, and methods for signing, and verifying the signature of, code to be executed by a target device. An example method of determining a...
2018/0241567 SYSTEMS AND METHODS FOR PROTECTING DIGITAL MEDIA
Disclosed are systems, apparatus, and methods for protecting digital media. An exemplary method includes receiving digital media, encrypting the digital media...
2018/0241566 CRYPTOGRAPHIC HASH GENERATION SYSTEM
A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to...
2018/0241565 Secret Sharing via Blockchains
Confidential, secret data may be shared via one or more blockchains. Mortgage applications, medical records, financial records, and other electronic documents...
2018/0241564 PAIRING OF DEVICES FOR FAR-FIELD WIRELESS COMMUNICATION
In one example, a method includes transitioning, responsive to determining that a charging coil of wireless charger is in proximity of an implantable medical...
2018/0241563 IMAGE FINGERPRINTING
A computing system includes a memory (114) that stores instructions of an image finger printer module (116). The computing system further includes a processor...
2018/0241562 WIRELESS DEVICE AND METHOD FOR REKEYING WITH REDUCED PACKET LOSS FOR HIGH-THROUGHPUT WIRELESS COMMUNICATIONS
Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In sonic embodiments,...
2018/0241561 REPLICATED ENCRYPTED DATA MANAGEMENT
Disclosed aspects relate to local encryption of a set of replicated data in a shared pool of configurable computing resources which has a set of member nodes....
2018/0241560 DEVICE ATTESTATION
Example implementations relate to attestation. For example, in an implementation, a target device attestation request is transmitted to a target device, where...
2018/0241559 SEMICONDUCTOR DEVICE AND INFORMATION PROCESSING SYSTEM FOR ENCRYPTED COMMUNICATION
In a semiconductor device and an information processing system according to one embodiment, an external device generates external device unique information by...
2018/0241558 1:N BIOMETRIC AUTHENTICATION, ENCRYPTION, SIGNATURE SYSTEM
A biometric authentication system has a terminal which extracts and encodes feature data for authentication from acquired biometric information, and which...
2018/0241557 CRYPTOGRAPHIC DEVICE HAVING PHYSICAL UNCLONABLE FUNCTION
Some embodiments are directed to an electronic cryptographic device arranged to determine a cryptographic key. The cryptographic device can include a...
2018/0241556 SYSTEM AND METHOD FOR CONTENT PROTECTION BASED ON A COMBINATION OF A USER PIN AND A DEVICE SPECIFIC IDENTIFIER
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting...
2018/0241555 LOW POWER WIDE AREA MODULE PERFORMING ENCRYPTED COMMUNICATIONS AND METHOD THEREOF
A low power wide area (LPWA) apparatus includes an LPWA module configured to perform first encrypted communications using a gateway and a session key, generate...
2018/0241554 CONFIGURABLE CRYPTO HARDWARE ENGINE
Apparatuses and methods associated with configurable crypto hardware engine are disclosed herein. In embodiments, an apparatus for signing or verifying a...
2018/0241553 OPTICAL QUANTUM COMMUNICATION SYSTEM
A quantum communication system for distributing a key between first and second units, the system being configured to implement phase-based measurement device...
2018/0241552 BLOCK COMPUTING FOR INFORMATION SILO
Systems and method for applying security measures to data sets requiring external quantum-level processing. Specifically, segmenting a data set into a...
2018/0241551 Permission Information Management System, User Terminal, Right-Holder Terminal, Permission Information...
A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after...
2018/0241550 COLLABORATIVE COMPUTATION OF HMAC
In one embodiment, a first apparatus includes a processor and an interface, wherein the interface is operative to receive a request from a second apparatus to...
2018/0241549 KEY GENERATION METHOD AND APPARATUS USING DOUBLE ENCRYPTION
The disclosure provides a key generation method and apparatus. The key generation method comprises: encrypting a first key factor generated by a first device...
2018/0241548 METHOD AND SYSTEM FOR AUTHENTICATING AND PRESERVING THE INTEGRITY OF COMMUNICATION, SECURED BY SECRET SHARING
A system and method for providing secure communication between a source and a destination that is secured by secret sharing, during a vulnerability window in...
2018/0241547 SYSTEM, APPARATUS, AND METHOD FOR SECURING DATA USING A GRAPHICS PROCESSOR
A system, apparatus, and method are provided for securing data using a graphics processor. Included is a central processor in communication with a graphics...
2018/0241546 SPLITTING DIGITAL PROMISES RECORDED IN A BLOCKCHAIN
A method and system to securely split a digital promise that is recorded in a blockchain. A digital promise represents a promise by a promisor to pay a...
2018/0241545 Format-Preserving Cipher
A format-preserving cipher including an encryption and a decryption scheme supporting non-linear access to input data by allowing the selection of portions of...
2018/0241544 MESSAGE AUTHENTICATOR GENERATING APPARATUS, MESSAGE AUTHENTICATOR GENERATING METHOD, AND COMPUTER READABLE...
A message authenticator generating apparatus (10), for each integer i, taking as input a key K and a value m'[i] which is generated from a message M,...
2018/0241543 TEXT ENCRYPTION
In one example in accordance with the present disclosure, a method may receiving a plaintext to be encrypted. The plaintext may include a first block, a second...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.