At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
APPARATUS AND METHOD FOR BURST SIGNAL DETECTION
An apparatus and method for detecting a burst signal. The apparatus includes circuitry that concatenates a predetermined number of samples and transmits the...
DEMODULATING FREQUENCY SHIFT KEYING MODULATED INPUT SIGNAL
A method of demodulating an FSK modulated input signal whose frequency varies between first and second frequencies. The input signal is delayed by a plurality...
ADAPTIVE PRE-EQUALIZATION IN OPTICAL COMMUNICATIONS
The filter estimate produced by post-equalization processing of an optical signal at a receiver is used to generate pre-equalizer filter coefficients that are...
METHOD AND APPARATUS FOR TRANSMITTING SIGNAL USING SLIDING-WINDOW
SUPERPOSITION CODING IN WIRELESS NETWORK
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system for supporting higher data rates beyond 4.sup.th-Generation (4G)...
Systems And Methods For Processing Errors Of A Received Signal
A receiver includes a first sampler configured to sample, according to a first clock signal, a received signal including first data and second data and output...
IMPROVED ADJACENT CHANNEL INTERFERENCE PROTECTION
A method in a fixed point-to-point radio link transceiver, the method comprising the steps of receiving a first signal from a far end transceiver in a first...
SUBSCRIBER STATION FOR A BUS SYSTEM AND METHOD FOR REDUCING WIRE-BOUND
EMISSIONS IN A BUS SYSTEM
A subscriber station for a bus system and a method for reducing wire-bound emissions in a bus system are provided. The subscriber station includes a...
CSI-RS BASED CHANNEL ESTIMATING METHOD IN A WIRELESS COMMUNICATION SYSTEM
AND DEVICE FOR SAME
A method is provided for computing a channel quality indicator (CQI) value by a user equipment in a wireless communication system. The method includes...
APPARATUS AND METHOD FOR FREQUENCY ESTIMATION AMBIGUITY REMOVAL OF A BURST
A device and method for estimating a bias in a frequency estimate of a received signal. Circuitry generates a first signal including a number of sample-blocks,...
METHODS AND APPARATUS FOR MONITORING OCCUPANCY OF WIDEBAND GHz SPECTRUM
AND SENSING AND DECODING RESPECTIVE...
Methods and apparatus for monitoring wideband GHz spectrum for wireless communication, and sensing and decoding respective frequency components of a...
DATA TRANSMISSION METHOD AND STATION
The present invention provides a data transmission method. In the method of the present invention, a station receives an indication frame sent by an access...
DATA PROCESSING METHOD AND APPARATUS, STORAGE CONTROLLER, AND CABINET
Embodiments of the present invention provide a data processing method, where, after being encapsulated according to an Ethernet protocol, a data processing...
METHODS, SYSTEMS, AND APPARATUSES FOR DYNAMICALLY TAGGING VLANS
Systems, mechanisms, apparatuses, and methods are disclosed for dynamically tagging VLANs. For example, in one embodiment such means include: means for...
Troubleshooting Method and Apparatus for Edge Routing Bridge in TRILL
A troubleshooting method and apparatus for an edge routing bridge (RB) in a Transparent Interconnection of Lots of Links (TRILL) campus, which belong to the...
SCHEME FOR SUPPORTING WIRELESS TRANSMISSION TAKING INTO ACCOUNT QOS OF USB
Provided is a method and apparatus for wirelessly transmitting Universal Serial Bus (USB) application data by using an Enhanced Distributed Channel Access...
Device and Method for Smart Home
A method and device for smart home are described and include a second device obtaining first identification information for identifying a first device with the...
SUPPORTING LOW LATENCY APPLICATIONS AT THE EDGE OF WIRELESS COMMUNICATION
Various embodiments manage data flow between at least one wireless communication device and at least one application executing at an edge of the wireless...
MANAGING ROUTER ADVERTISEMENT MESSAGES TO SUPPORT ROAMING OF WIRELESS
MOBILE CLIENT DEVICES
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment,...
LOGICAL MULTICASTING IN OVERLAY NETWORKS
For logical multicasting in overlay networks, at a data processing system, an original unicast packet is received from a first component in a first computing...
ON-DEMAND POWER MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
Methods, apparatuses, program products, and systems are disclosed for on-demand power management in a networked computing environment. A device module...
STABLE PROBING-RESILIENT PHYSICALLY UNCLONABLE FUNCTION (PUF) CIRCUIT
Embodiments include apparatuses, methods, and systems for a physically unclonable function (PUF) circuit. The PUF circuit may include an array of PUF cells to...
CHALLENGE RESPONSE AUTHENTICATION FOR SELF ENCRYPTING DRIVES
Various embodiments are directed to a system for accessing a self-encrypting drive (SED) based on a blind challenge authentication response mechanism (BCRAM)....
Apparatus And Method To Protect Digital Content
In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be...
Methods And Systems For Key Generation
Methods and systems for key generation and device management are disclosed. A root key can be stored on a component which can be integrated with a device, and...
SECURE COMMUNICATION OF DATA BETWEEN DEVICES
A capability for secure communication of data from a source device to a destination device is presented. The source device has a device identifier associated...
IC CHIP AND AUTHENTICATION METHOD FOR USER AUTHENTICATION
An IC chip for preventing an authentication key from leaking, and an authentication key setting and authentication key verifying method are provided. A part...
FACILITATION OF SERVICE LOGIN
As provided herein, a first device may be registered as authorized to authenticate a user login into a service from a second device (e.g., a smart phone may be...
INFORMATION PROCESSING APPARATUS, ENCRYPTION APPARATUS, AND CONTROL METHOD
An information processing apparatus includes a storage unit, an encryption processing unit that encrypts data to be stored in the storage unit, and a control...
TECHNIQUES FOR SECURING AND CONTROLLING ACCESS TO DATA
Various embodiments are directed to techniques for controlling access to data in a decentralized manner. An apparatus includes an apportioning component to...
PRIVATE SERVICE IDENTIFIERS IN NEIGHBORHOOD AWARE NETWORKS
A method, an apparatus, and a computer-readable medium for wireless communication are provided. In an aspect, an apparatus may be configured to generate a...
QUANTUM KEY DISTRIBUTION DEVICE, QUANTUM KEY DISTRIBUTION SYSTEM, AND
QUANTUM KEY DISTRIBUTION METHOD
According to an embodiment, a quantum key distribution device includes a sharer, a key distillation processor, a first manager, and a second manager. The...
SYSTEM AND METHOD FOR TRUSTED PROVISIONING AND AUTHENTICATION FOR
NETWORKED DEVICES IN CLOUD-BASED IOT/M2M...
Systems and methods for trusted provisioning and authentication for networked devices in a cloud-based IoT/M2M platform is disclosed. In one embodiment, a...
CONFIGURATION OF LIVENESS CHECK USING INTERNET KEY EXCHANGE MESSAGES
There is provided mechanisms for configuration of liveness check using Internet key exchange messages. A method is performed by a user equipment. The method...
IMAGING SYSTEMS WITH DATA ENCRYPTION AND EMBEDDING CAPABALITIES
An imaging system may embed encrypted data into image data. The imaging system may generate image data in response to light received at a pixel array. The...
MULTIPLE AUTHORITY DATA SECURITY AND ACCESS
A request to perform one or more operations using a second key that is inaccessible to a customer of a computing resource service provider is received from the...
PSEUDORANDOM BIT SEQUENCES IN AN INTERCONNECT
In an example, a linear feedback shift register (LFSR) provides pseudorandom bit sequences (PRBSs) to an interconnect for training, testing, and scrambling...
METHOD, SERVER AND COMPUTER PROGRAM FOR SECURITY MANAGEMENT IN DATABASE
Disclosed is a program for security management in a database, which is stored in a computer readable medium to allow a computer to perform steps including:...
POLYMORPHIC ENCRYPTION KEY ALLOCATION SCHEME
Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one...
DECOY BITS METHOD FOR DIRECT ENCRYPTION AND KEY GENERATION
A new cryptographic technique is disclosed, called decoy bits method, which can be used to obtain near ideal information theoretic security in both quantum and...
LOW-POWER ASYNCHRONOUS DATA LINKS
Systems and methods are provided for low-power asynchronous data links.
A LVDS DATA RECOVERY METHOD AND CIRCUIT
An LVDS data recovery method includes adopting three clocks to sample a received signal clock at the same time, wherein the first clock, the second clock and...
A frequency generator for providing one or more clock signals with reduced phase jitter can include a phase-locked loop (NI) configured to couple with a...
MULTI-INPUT WIRELESS RECEIVER BASED ON RF SAMPLING TECHNIQUES
In some aspects, the disclosure is directed to methods and systems of a multi-input receiver. In one or more embodiments, a receiver receives a plurality of...
COMMUNICATION SYSTEMS AND METHODS FOR DISTRIBUTED POWER SYSTEM MEASUREMENT
Described are methods, devices and systems for communicating data measurements from a sampling device to a remote master device in a distributed power...
APPARATUS AND METHOD FOR PHASE UNWRAPPING OF A BURST SIGNAL
A device and method for unwrapping phase samples of a burst signal. The device generates a set of vectors including phase samples. A first mean and a first...
CO-EXISTENCE SYSTEM SYNCHRONIZATION ON A SHARED COMMUNICATION MEDIUM
Techniques for managing co-existence on a shared communication medium are disclosed. An activation command or a deactivation command configuring an access...
WIRELESS COMMUNICATION DEVICE AND WIRELESS COMMUNICATION METHOD
A wireless communication device according to an embodiment of the present invention performs a half-duplex wireless communication through a relay station that...
UE, NETWORK NODE AND METHODS OF ASSISTING MEASUREMENTS IN MIXED SIGNAL
A method in a UE for adapting a radio procedure is provided. The UE obtains information about signal configurations indicating: whether or not a DL RS,...
RADIO WITH OOBE VICTIM DETECTION
A radar detector is used with a radio link, the radio link characterized by high duty factor operation of a radio transmitter. The radar detector is located a...
RADIO ACCESS NETWORK NODE AND MOBILE STATION WITH INCREASED ACK/NACK SPACE
FOR PACKET DOWNLINK ACK/NACK MESSAGE
A radio access network node (e.g., base station system), a mobile station, and various methods are described herein that increase the size and/or efficiency of...