Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0183608 Method for secured transmission of a data object
A method is disclosed comprising receiving identification information on an addressee, to whom an encrypted data object is sent by a transmission device or for...
2018/0183607 OBJECT SIGNING WITHIN A CLOUD-BASED ARCHITECTURE
A system and method for digitally signing an object. An object signing agent sends a signing request for an object to a remote signing server, which, in...
2018/0183606 VERIFYING AUTHENTICITY OF COMPUTER READABLE INFORMATION USING THE BLOCKCHAIN
A method for ensuring that a computer readable information is authentic, including: generating a public key associated with the computer readable information,...
2018/0183605 SOFTWARE DISTRIBUTION PROCESSING DEVICE, SOFTWARE DISTRIBUTION PROCESSING METHOD, AND VEHICLE
A software distribution processing device stores a common key for each ECU and a verification key for an electronic signature of software updating data,...
2018/0183604 CLOUD AUTHENTICATION OF LAYER 2-CONNECTED MEMBER DEVICES VIA AN IP-CONNECTED ACTIVE DEVICE
Techniques for enabling cloud authentication of Layer 2-connected member devices via an IP-connected active device are provided. In one set of embodiments, the...
2018/0183603 REMOTE ATTESTATION WITH HASH-BASED SIGNATURES
An attestation protocol between a prover device (P), a verifier device (V), and a trusted third-party device (TTP). P and TTP have a first trust relationship...
2018/0183602 SIGNATURE DELEGATION
A signature authority generates a master seed value that is used as the root of a seed tree of subordinate nodes. Each subordinate node of the seed tree is...
2018/0183601 GENERATION OF MERKLE TREES AS PROOF-OF-WORK
A proof-of-work system where a first party (e.g., a client computer system) may request access to a computing resource. A second party (e.g., a service...
2018/0183600 METHOD AND SYSTEM FOR PROVIDING VALIDATED, AUDITABLE, AND IMMUTABLE INPUTS TO A SMART CONTRACT
A method for posting of auditable, immutable data to a blockchain includes: receiving a blockchain comprised of a plurality of blocks, each block being...
2018/0183599 SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION
Systems and methods are provided for authenticating an identity of a user requesting a resource or service from an entity. In some embodiments, a system may...
2018/0183598 PERSONAL DIGITAL IDENTITY CARD DEVICE FOR FINGERPRINT BOUND ASYMMETRIC CRYPTO TO ACCESS MERCHANT CLOUD SERVICES
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may...
2018/0183597 METHOD FOR THE SECURITY OF AN ELECTRONIC OPERATION WITH A CHIP CARD
A method for assisting in improving the security of an electronic operation carried out via a chip card. The method comprises comparing a cryptographic nonce...
2018/0183596 PEER DISCOVERY, CONNECTION, AND DATA TRANSFER
Implementations relate to peer-to-peer discovery, connection, and data transfer providing privacy protection and increased security features.
2018/0183595 ZERO-KNOWLEDGE ENVIRONMENT BASED SOCIAL NETWORKING ENGINE
Methods, systems, and apparatus are described providing social networking engines. Specifically, the present specification relates to a method for implementing...
2018/0183594 TOKEN SECURITY ON A COMMUNICATION DEVICE
Techniques for enhancing the security of storing sensitive information or a token on a communication device may include sending a request for the sensitive...
2018/0183593 LOCATION AWARE CRYPTOGRAPHY
A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second...
2018/0183592 PUBLIC KEY ROLLUP FOR MERKLE TREE SIGNATURE SCHEME
An organizational signature authority delegates signature authority to one or more subordinate signature authorities by rolling up public keys from the...
2018/0183591 NETWORK NODE
A network node (110) is provided having a normal mode and a coordinator mode. The network node comprises a counter (130) and an incrementing unit (132), the...
2018/0183590 ELECTRONIC COMPONENT OF ELECTRONIC DEVICE, METHOD OF STARTING ELECTRONIC DEVICE AND ENCRYPTION METHOD
An electronic component of an electronic device, a method of starting an electronic device, and an encryption method. The electronic device includes a key...
2018/0183589 SECRET KEY GENERATION USING A HIGH RELIABILITY PHYSICALLY UNCLONABLE FUNCTION
Embodiments of the invention provide an electronic system for generating secret information comprising a Physically Unclonable Function (PUF) circuit, the PUF...
2018/0183588 Systems and methods for detecting data insertions in biometric authentication systems using encryption
Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic...
2018/0183587 Blockchain-Assisted Public Key Infrastructure for Internet of Things Applications
An approach is disclosed for registering and authenticating Internet of things (IoT) devices. In one embodiment, an installation device receives, from an IoT...
2018/0183586 ASSIGNING USER IDENTITY AWARENESS TO A CRYPTOGRAPHIC KEY
Various systems and methods for performing cryptographic operations based on an authentication policy are discussed. In an example, an authentication policy...
2018/0183585 QUANTUM TOKENS
Secure, semi-classical authentication schemes are presented. An authentication token is generated by applying a pre-determined measurement to a plurality of...
2018/0183584 IKE Negotiation Control Method, Device and System
An Internet Key Exchange (IKE) negotiation control method, device and system are provided. In the method, a receiving end receives an IKE negotiation message...
2018/0183583 KEY EXCHANGE METHOD, KEY EXCHANGE SYSTEM, KEY DISTRIBUTION DEVICE, COMMUNICATION DEVICE, AND PROGRAM
Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key...
2018/0183582 ENCRYPTION MANAGEMENT, CONTENT RECORDING MANAGEMENT, AND PLAYBACK MANAGEMENT IN A NETWORK ENVIRONMENT
Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use...
2018/0183581 ARRANGEMENTS FOR DATALINK SECURITY
Various embodiments for providing datalink security in a datalink between a first hardware device (e.g., a system-on-a-chip (SoC) device) and a second hardware...
2018/0183580 PROVISIONING KEYS FOR VIRTUAL MACHINE SECURE ENCLAVES
A secure migration enclave is provided to identify a launch of a particular virtual machine on a host computing system, where the particular virtual machine is...
2018/0183579 CRYPTOGRAPHIC SYSTEM MANAGEMENT
A method of refreshing key material is described for use in a trusted execution environment logically protected from a regular execution environment. The...
2018/0183578 PROVISIONING KEYS FOR VIRTUAL MACHINE SCALING
A secure key manager enclave is provided on a host computing system to send an attestation quote to a secure key store system identifying attributes of the key...
2018/0183577 TECHNIQUES FOR SECURE MESSAGE AUTHENTICATION WITH UNIFIED HARDWARE ACCELERATION
Techniques and computing devices for secure message authentication and, more specifically, but not exclusively, to techniques for unified hardware acceleration...
2018/0183576 MASK S-BOX, BLOCK CIPHERS ALGORITHM DEVICE AND CORRESPONDING CONSTRUCTION PROCESS
The present disclosure discloses a mask S-box, a block ciphers algorithm unit, a device and a corresponding construction method. The mask S-box includes an...
2018/0183575 METHOD, MOBILE TERMINAL, DEVICE, AND READABLE STORAGE MEDIUM FOR PREVENTING ACCESSED DATA FROM BEING TAMPERED WITH
Disclosed are a method, a mobile terminal, a device, as well as a readable storage medium for preventing accessed data from being tampered with. The mobile...
2018/0183574 EFFICIENT CRYPTOGRAPHICALLY SECURE CONTROL FLOW INTEGRITY PROTECTION
Embodiments include a computing processor control flow enforcement system including a processor, a block cipher encryption circuit, and an exclusive-OR (XOR)...
2018/0183573 ULTRA-LIGHTWEIGHT CRYPTOGRAPHY ACCELERATOR SYSTEM
A cryptography accelerator system includes a direct memory access (DMA) controller circuit to read and write data directly to and from memory circuits and an...
2018/0183572 System and Method for Private-Key Fully Homomorphic Encryption and Private Search Between Rings
A system for producing a public ring that is fully homomorphically encrypted. The system comprises a processor which generates a first presentation G of a...
2018/0183571 METHOD FOR PROVIDING ENCRYPTED DATA IN A DATABASE AND METHOD FOR SEARCHING ON ENCRYPTED DATA
A method for providing encrypted data in a database includes randomly encoding stored information. Each information part having a same part index number is...
2018/0183570 POLYNOMIAL FULLY HOMOMORPHIC ENCRYPTION SYSTEM BASED ON COEFFICIENT MAPPING TRANSFORM
A polynomial complete homomorphic encryption method based on the coefficient mapping transformation. A plaintext is expressed as a polynomial consisting of a...
2018/0183569 KEY PROCESSING METHOD AND DEVICE
An attack on an RSA encryption algorithm based on simple power analysis (SPA) is thwarted by scrambling the sliding window sequence that results from...
2018/0183568 SIGNAL DETECTION TECHNIQUES USING CLOCK DATA RECOVERY
Techniques and apparatus for detection of a signal at an I/O interface module are described. In one embodiment, for example, an apparatus to provide signal...
2018/0183567 CLOCK DATA RECOVERY CIRCUIT AND RECEIVER INCLUDING THE SAME
A clock data recovery circuit configured to generate frequency step that is uniform regardless of operational conditions of the clock data recovery circuit.
2018/0183566 LOCK DETECTOR FOR PHASE LOCK LOOP
Methods and systems are described for generating, using a voltage-controlled oscillator (VCO), a plurality of phases of a local clock signal, generating a...
2018/0183565 POWER OPTIMIZATION MECHANISMS FOR FRAMERS BY USING SERIAL COMPARISON IN FRAME ALIGNMENT PROCESS
System and method of frame alignment at a receiver with power optimization mechanisms. A framer uses one or more comparators to search for the FAW in the...
2018/0183564 POWER OPTIMIZATION MECHANISMS FOR FRAMERS BY SELECTIVELY DEACTIVATING FRAME ALIGNMENT PROCESS
System and method of frame alignment at a receiver with power optimization mechanisms. A framer is configured to perform a frame alignment process on a data...
2018/0183563 METHOD, DEVICE, AND SYSTEM FOR THE RECEIVER-SIDE DETERMINATION OF A SCANNING INSTANT
The present invention is directed to a method, an apparatus and a system for error-free detection of bit values which are transmitted using a continuous data...
2018/0183562 SYSTEMS AND METHODS FOR SIGNALING IN AN INCREASED CARRIER MONITORING WIRELESS COMMUNICATION ENVIRONMENT
Systems and methods for signaling in an increased carrier monitoring wireless communication environment are disclosed herein. A user equipment (UE) may include...
2018/0183561 WAVEGUIDE COMMUNICATION WITH INCREASED LINK DATA RATE
Embodiments of the present disclosure may relate to a transceiver to transmit and receive concurrently radio frequency (RF) signals via a dielectric waveguide....
2018/0183560 SYSTEMS, METHODS, AND DEVICES FOR COMPONENT CARRIER MANAGEMENT IN CARRIER AGGREGATION SYSTEMS
Systems and methods provide component carrier management in carrier aggregation systems. A medium access control (MAC) protocol data unit (PDU) includes an...
2018/0183559 SEARCH SPACE FOR NON-INTERLEAVED R-PDCCH
The present invention relates to providing control information within a search space for blind decoding in a multi-carrier communication system. In particular,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.