Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,005,0811 Determining signal channel impulse response using subcarrier pilot signals
Distortion caused by spurious components in a determined channel impulse response (CIR) is reduced. In an OFDM (orthogonal frequency-division multiplexing)...
US-1,005,0810 Channel estimation method, apparatus and system
A channel estimation method includes: obtaining a self-interference channel estimation value of an ith moment and a communication channel estimation value of...
US-1,005,0809 Adaptive load balancing for single active redundancy using EVPN designated forwarder election
A provider edge (PE) device may receive an indication to perform a designated forwarder (DF) election associated with a network segment that includes the PE...
US-1,005,0808 Traffic forwarding
The present disclosure describes traffic forwarding in a network where a virtual local area network (VLAN) exists in multiple network sites that are...
US-1,005,0807 Network system, method of managing network system and gateway apparatus
A network system, having: a gateway apparatus set in a network; a physical computer coupled to the gateway apparatus; a virtualization unit that allocates...
US-1,005,0806 End-to-end (E2E) tunnel based on shortest point-to-point (P2P) path computation
A method implemented in a parent controller including receiving a request to compute a shortest end-to-end (E2E) path from source to destination through network...
US-1,005,0805 Method for transmitting messages in a computer network and computer network
The invention concerns a method for transmitting messages in a computer network, wherein the computer network comprises a first set of computing nodes...
US-1,005,0804 Loop-free fabric utilizing distributed address and port tables
Methods, systems, and computer programs are presented for managing a network in the presence of layer-2 loops. One method includes an operation for detecting,...
US-1,005,0803 Method for providing USB power over ethernet
A method for providing USB power including the steps of running a POE cable from a power source to an adapter, the adapter having a POE connector for receiving...
US-1,005,0802 Using a control panel as a wireless access point
A method for providing wireless access to one or more wireless devices using an automation system control panel is described. In one embodiment, a communication...
US-1,005,0801 Digital forward link in hybrid fiber-coax network
A hybrid fiber-coax network may replace an analog forward link with a digital optical forward link between a converged cable-access platform (CCAP) and node,...
US-1,005,0800 Electronic tool and methods for meetings for providing connection to a communications network
An electronic meeting tool and method for communicating arbitrary media content from users at a meeting comprises a node configuration means adapted to operate...
US-1,005,0799 Power control system and method, and information communication ability control system and method
It is a problem to be solved to provide Electric power control systems and methods which do not require one-to-one communications in both directions, in which...
US-1,005,0798 Cryptographic block identification apparatus, cryptographic block identification method, and non-transitory...
The present invention relates to a cryptographic block identification apparatus which, in order to analyze encryption logic used by malware to conceal...
US-1,005,0797 Inserting snapshot code into an application
A debugging system may display snapshot information that may be collected in response to an event identified while an application executes. The debugging system...
US-1,005,0796 Encoding ternary data for PUF environments
The present invention provides a method for authenticating distributed peripherals on a computer network using an array of physically unclonable functions...
US-1,005,0795 Robust restoration of passphrases from partial information
Non-transitory computer readable medium that may store instructions that once executed by a computer may cause a computer to receive or generate multiple...
US-1,005,0794 Method performed at an IP network node for IPSec establishment
The present invention relates to a method (500) performed at an IP network node for IPSec establishment with other IP network nodes in a network. The method...
US-1,005,0793 Reduction of memory requirement for cryptographic keys
For communication of a first participant with at least one additional participant in a communication system via multiple protocols, the protocols using at least...
US-1,005,0792 Providing cross site request forgery protection at an edge server
A request from a computing device for accessing a resource is received by an edge server, where the request includes a cookie containing a first token value and...
US-1,005,0791 Method for verifying the identity of a user of a communicating terminal and associated system
A method for verifying identity of a user of a communicating terminal, including: a preliminary operation including: communicating a first piece of identity...
US-1,005,0790 Method for authorizing a transaction
A method for authorizing a transaction has the following steps: inputting transaction data on a first mobile device, transmitting the transaction data from the...
US-1,005,0789 Kerberos preauthentication with J-PAKE
A method relates to receiving, by an authentication server, an authentication request from a client device via a public network, selecting a first private key...
US-1,005,0788 Method for reading an identification document in a contactless manner
The invention creates a method for the contactless readout of an electronic identification document by means of a terminal, wherein in a data reading step...
US-1,005,0787 Authentication objects with attestation
Representations of authentication objects are selectable through a user interface, such as through a drag and drop operation. When an authentication object is...
US-1,005,0786 Random sample elections
A method allows a random sample of a large population of voters to cast votes and for both the unpredictability/un-manipulability of the sample selection and...
US-1,005,0785 Secure threshold decryption protocol computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the...
US-1,005,0784 System and method for generating a cryptographic key
A system and method for generating a cryptographic key using a sequence of data segments selected by a user from one or more data resources. Raw data from the...
US-1,005,0783 Quantum random pulse generator
Provided is a quantum random pulse generator having enhanced security using a phenomenon in which a radioactive isotope naturally collapses. The quantum random...
US-1,005,0782 Decryption condition addition device, cryptographic system, and computer readable medium
A decryption condition addition device (300) acquires an original ciphertext ct.sub.s in which a secret distribution matrix M is set as information specifying a...
US-1,005,0781 Method, apparatus, terminal device and system for generating shared key
Embodiments of the present application provide apparatus and methods for generating a shared key, including setting up a key negotiation connection, and...
US-1,005,0780 Securely storing data in a data storage system
A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a...
US-1,005,0779 Checkout and payment
A key ceremony application creates bundles for custodians encrypted with their passphrases. Each bundle includes master key share. The master key shares are...
US-1,005,0778 Method and apparatus for efficiently implementing the advanced encryption standard
Implementations of Advanced Encryption Standard (AES) encryption and decryption processes are disclosed. In one embodiment of S-box processing, a block of 16...
US-1,005,0777 Method of updating a file tree stored on a storage server
One embodiment relates to a method of updating, by an electronic device of a first user of a tree of data files and/or folders of the first user stored in a...
US-1,005,0776 Method for performing a sensitive data encryption with masking, and corresponding encryption apparatus and...
Cryptographic circuitry masks sensitive data values. The masking includes extracting unique combinations of random mask values from one or more sets of random...
US-1,005,0775 Element replication device, element replication method, and program
A second set including a plurality of elements a.sub.5(1), . . . , a.sub.5(N) or a concealed text of the second set is obtained, where the second set is...
US-1,005,0774 Mitigating interaction between adaptive equalization and timing recovery
System and method of timing recovery for recovering a clock signal with reduced interference with clock phase correction by an adaptive equalizer. The equalizer...
US-1,005,0773 Bootstrapped autonegotiation clock from a referenceless clock chip
A method, system and apparatus, for bootstrapping an autonegotiation signal in an intermediate device. The intermediate device initializes using a referenceless...
US-1,005,0772 Method and apparatus for generating standard pattern for data signals
Methods and apparatus for generating a standard pattern for data signals from a set of multiple data signals are provided. The standard pattern consists of a...
US-1,005,0771 Clock and data recovery having shared clock generator
This disclosure provides a clock recovery circuit for a multi-lane communication system. Local clocks are recovered from the input signals using respective...
US-1,005,0770 Positioning system configuration with round trip time
Indoor positioning networks are faced with several challenges. The methods employed by many indoor positioning systems require highly accurate time...
US-1,005,0769 Time synchronization method and apparatus
Disclosed is a time synchronization method and apparatus. The method includes: receiving a time synchronization message sent by an upstream device through a...
US-1,005,0768 Arrangement for synchronizing access points in WLAN using direct-sequence spread spectrum signaling
A method includes receiving at a wireless communication device via a wired connection, a signal including a synchronization signal, the synchronization signal...
US-1,005,0767 System and method for multiple-input and multiple-output (MIMO) full-duplex precoding algorithms
Embodiments are provided to enable effective cancellation or reduction of the self-interference (SI) introduced when applying full-duplex transmission to MIMO...
US-1,005,0766 User terminal, base station, and radio communication method
The present invention is designed so that uplink transmission is carried out adequately even when CA is executed by applying different duplex modes between...
US-1,005,0765 Providing an interface for an avionics data transfer system
Systems and methods for providing an efficient and configurable port interface in an avionics data transfer system are provided. For instance, in one embodiment...
US-1,005,0764 Method for communicating data, communication controller and circuit arrangement
Method for communicating data between a first circuit and a second circuit, in particular a microcontroller unit and a mixed signal circuit of a motor vehicle...
US-1,005,0763 Method and apparatus for signal interference avoidance
Aspects of the subject disclosure may include, for example, detecting an interferer having a periodic time of recurrence and a periodic spectral frequency...
US-1,005,0762 Channel quality measurement and transmit power allocation in a dynamic spectrum management system
A dynamic spectrum management (DSM) engine may determine the channel quality of one or more channels associated with the DSM engine when packets are not being...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.