At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
METHOD OF PROVIDING OPERATING OPTIONS OF AN ELECTRIC APPLIANCE
A method of providing operating options of an electric appliance is applied in a wireless system, which includes a portable device, an electric appliance, and...
IMMERSIVE COMPANION DEVICE RESPONSIVE TO BEING ASSOCIATED WITH A DEFINED
SITUATION AND METHODS RELATING TO SAME
A system and method for immersive companion device responsive to being associated with a defined situation is disclosed. The system has at least one embedded...
Interchangeable Modular Home Automation System
Interchangeable modular systems for home networking are provided. The systems may contain home energy and appliance monitors controls, and/or home...
Information Processing Method and Central Control Device
An information processing method is described and includes establishing a first communication channel between a central control device and at least one smart...
METHOD AND APPARATUS FOR BINDING INTELLIGENT DEVICE
A method and an apparatus for binding an intelligent device are provided. In the method, the apparatus acquires an intelligent device list that includes...
METHOD, SYSTEM AND APPARATUS FOR ACTIVATION OF A HOME SECURITY, MONITORING
AND AUTOMATION CONTROLLER USING...
Embodiments of the present invention provide a single platform that provides controller functionality for each of security, monitoring and automation, as well...
SECURITY SYSTEM AND METHOD USING HOME GATEWAY ALLIANCE
A security system using home gateway alliance includes an alliance management server which includes a gateway registration unit which registers at least one of...
ARRANGEMENT AND METHOD FOR CONTROLLING ELECTRONICALLY CONTROLLABLE DEVICES
AND SYSTEMS IN PUBLIC AND PRIVATE...
The invention relates to an arrangement for controlling electronically controllable devices and systems in public and private buildings and a method for...
A method, system and computer readable medium for selective multicast processing. The method can include obtaining, using one or more processors, an...
FACILITATING GENERATION OF USER CONTENT FOR AGGREGATED STORY UNITS
A social networking system aggregates two or more stories having at least one common characteristic to create an aggregated story unit. Each story describes an...
DIGITAL BROADCASTING SYSTEM AND METHOD OF PROCESSING DATA
A digital broadcasting system and method of processing data are disclosed. Herein, a method of processing data in a transmitting system includes creating a...
SIMPLE MESH NETWORK FOR WIRELESS TRANSCEIVERS
A method of operating a node of a network is disclosed. The method includes receiving a data frame having a header with plural addresses. The node determines...
MEDIA CONTENT STREAMING
Technology for receiving media content is disclosed. Media content segments can be received on a broadcast channel via a multimedia broadcast multicast service...
SYSTEM AND METHOD FOR MULTI-SOURCE MULTICASTING IN CONTENT-CENTRIC
One embodiment of the present invention provides a system for updating routing information associated with a multicast group in an information-centric network...
POWER NEGOTIATION IN DAISY-CHAINED SYSTEMS
The invention relates a method and apparatus for distributing power in DC- grid systems, wherein power negotiations are done in a daisy chained system....
Carbon Nanotube Array for Cryptographic Key Generation and Protection
Techniques for use of carbon nanotubes as an anti-tampering feature and for use of randomly metallic or semiconducting carbon nanotubes in the generation of a...
AUTHENTICATION INFRASTRUCTURE FOR IP PHONES OF A PROPRIETARY TOIP SYSTEM
BY AN OPEN EAP-TLS SYSTEM
The infrastructure according to the invention includes: a proprietary TOIP system including a call server connected to the network, integrating a certification...
SYSTEMS AND METHODS OF INDUSTRIAL NETWORK CERTIFICATE RECOVERY
According to various aspects and embodiments, a programmable device configured for use within an industrial control system is provided. The programmable device...
METHOD AND DEVICE FOR GENERATING DIGITAL SIGNATURE
Disclosed are a method and device for generating a digital signature. The method comprises: a device generating a digital signature parameter r that meets an...
DEVICE FOR ARCHIVING HANDWRITTEN INFORMATION
An electronic pen device configured for use with a remote secure server for registering handwritten signatures, the secure server comprising an authentication...
Read-Modify-Write Processing of Chunks at the Storage Server Level in a
Distributed Object Storage System
The present disclosure provides systems and methods for sharding objects stored in a distributed storage system. Such sharding may be advantageously utilized...
PEER TO PEER ENTERPRISE FILE SHARING
Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer...
TECHNOLOGIES FOR SECURE PRESENCE ASSURANCE
Technologies for secure presence assurance include a computing device having a presence assertion circuitry that receives an input seed value and generates a...
CLIENT-SIDE ENCRYPTION IN A DEDUPLICATION BACKUP SYSTEM
Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for...
SYSTEM AND METHOD FOR PROVIDING GLOBAL PLATFORM COMPLIANT TRUSTED
Method of providing a Global Platform (GP) compliant Trusted Execution Environment (TEE) starts with main processor executing an application stored in memory...
Method for Offline Authenticating Time Encoded Passcode
A method is capable of offline authenticating a passcode which is generated online by encoding time related information with a shared private key. The...
METHOD AND APPARATUS FOR SECURING A MOBILE APPLICATION
Methods, apparatus, and systems for personalizing a software token using a dynamic credential (such as a one-time password or electronic signature) generated...
OUT-OF-BAND VALIDATION OF DOMAIN NAME SYSTEM RECORDS
An out-of-band Domain Name System (DNS) security technique uses a cryptographic blockchain for securing and validating DNS data in a chain of custody that...
STORAGE AND RETRIEVAL OF DISPERSED STORAGE NETWORK ACCESS INFORMATION
A method includes affiliating an authentication token with user information of a user. The method further includes generating a private/public key pairing...
DISTRIBUTED PUBLIC KEY REVOCATION
Techniques for improving the security and availability of cryptographic key systems are described herein. A graph representation of a network of cryptographic...
ELECTRONIC DEVICE AND METHOD FOR ENCRYPTING AND DECRYPTING DATA
A data encrypting and decrypting method which functions in an electronic device is activated when an application program is activated in the device. Data...
Methods and Computer Systems with Provisions for High Availability of
Shared file systems and methods ensuring high availability of cryptographic keys. The keys are encrypted with at least one shareable master key to generate...
SMS4 ACCELERATION HARDWARE
Embodiments of an invention for SMS4 acceleration hardware are disclosed. In an embodiment, an apparatus includes SMS4 hardware and key transformation...
PROBABILISTIC KEY ROTATION
Information, such as a cryptographic key, is used repeatedly in the performance of operations, such as certain cryptographic operations. To prevent repeated...
HYBRID INTEGRATION OF SOFTWARE DEVELOPMENT KIT WITH SECURE EXECUTION
A portable communication device may include a mobile application executing in an application execution environment and a secure application executing in a...
MEMORY CONTROLLERS, OPERATING METHODS THEREOF, AND MEMORY SYSTEMS
INCLUDING THE SAME
An operating method of a memory controller may include: enabling a security mode in response to a first command received from a host; generating a security key...
INFORMATION PROCESSING APPARATUS, PROGRAM, AND RECORDING MEDIUM
An information processing apparatus is provided that performs information processing for encrypting data using AES, which includes performing a process of...
MANAGED SECURE COMPUTATIONS ON ENCRYPTED DATA
The subject disclosure is directed towards secure computations of encrypted data over a network. In response to user desired security settings with respect to...
DYNAMIC MEASUREMENT OF FREQUENCY SYNTHESIZER NOISE SPURS OR PHASE NOISE
A method of measuring phase noise (PN). A PLL frequency synthesizer is provided including a first phase frequency detector (PFD) receiving a reference...
SYSTEMS AND METHODS FOR OPERATING RADIO TRANSCEIVERS
A phase lock loop monitor circuit is disclosed. The phase lock loop monitor circuit may include a coarse tuning circuit operable to generate a coarse tune...
Aligning the Upstream DMT Symbols of Multiple Lines in a TDD DSL System
Time-division duplex (TDD) transmission in a digital subscriber line (DSL) communication system including a group of DSL transceivers at a remote side (FTU-Rs)...
COMMUNICATION DEVICE AND COMMUNICATION METHOD
The present disclosure provides a communication device, including: a reception section that receives information relating to a reception timing at a reception...
USER EQUIPMENT, BASE STATION, AND DATA TRANSMISSION METHODS THEREOF
A user equipment, a base station, and data transmission methods thereof are provided. The user equipment is connected to a first base station and receives a...
HIGH RELIABILITY REMOTE RADIO HEAD COMMUNICATION DEVICE
Example embodiments relate to a communication system including an antenna and a plurality of multi-band remote radio heads operationally coupled to the...
METHOD AND APPARATUS FOR TRANSMITTING CONTROL INFORMATION IN WIRELESS
The present invention pertains to a wireless communication system, and more particularly, to a method of receiving a downlink (DL) control channel in a...
Rate Matching and Soft Channel Bits Storage for Superposition Coding
Methods for rate matching with soft buffer size setting at the transmitter and soft channel bits storage at the receiver for superposition coding are proposed....
METHOD AND USER EQUIPMENT FOR TRANSMITTING UPLINK CONTROL INFORMATION, AND
METHOD AND BASE STATION FOR...
A method for transmitting, by a user equipment, uplink control information, and a user equipment therefore are discussed. The method according to one...
SELECTING BETWEEN NORMAL AND VIRTUAL DUAL LAYER ACK/NACK
An allocation of downlink resources is received, which are monitored on l layers for data. A resource-specific bit (ACK/NACK) is generated for each of those...
METHOD FOR TRANSMITTING SOUNDING REFERENCE SIGNAL AND METHOD AND DEVICE
FOR INDICATING CONFIGURATION
A method for transmitting a sounding reference signal and a method and device for indicating a configuration are provided. A method for indicating a sounding...
USER TERMINAL, RADIO ACCESS NETWORK, AND COMMUNICATION CONTROL METHOD
A user terminal according to a first feature performs uplink communication with a radio access network by simultaneously using a plurality of carriers. The...