Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0375684 Segment Routing Gateway Storing Segment Routing Encapsulating Header Used in Encapsulating and Forwarding of...
In one embodiment, a Segment Routing gateway receives Segment Routing packets encapsulating native packets. The Segment Routing gateway stores the Segment...
2018/0375683 INFORMATION PROCESSING SYSTEM, METHOD, AND APPARATUS
An information processing system includes Spine switches, Leaf switches coupled to the Spine switches in a form of a Latin square fat tree, and apparatuses...
2018/0375682 Portable Acoustical Unit
A portable acoustic unit is adapted for insertion into an electrical receptacle. The portable acoustic unit has an integrated microphone and a wireless network...
2018/0375681 System and Method for Isolating Device Communications in a BACnet/IP Building Automation Network
A building automation system and method is provided for isolating device communications in a BACnet/IP building automation network. The system may comprise at...
2018/0375680 System and Method for Monitoring a Property
There are provided systems and methods for monitoring a property using a system of sensor units in one or more premises on the property that can interface with...
2018/0375679 BUILDING AUTOMATION MANAGEMENT
A method of building automation control from a computing device is provided and includes a computing device: accessing a building automation network through...
2018/0375678 BUILDING AUTOMATION MANAGEMENT
A method of building automation control from a computing device is provided and includes a computing device: accessing a building automation network through...
2018/0375677 HANDLING EXCESS TRAVEL-RELATED INFORMATION
Travel-related-information messages (TRIMS) are received from one or more information sources, and information included in the messages is placed into a first...
2018/0375676 SYSTEM AND METHOD FOR SCALABLE, INTERACTIVE VIRTUAL CONFERENCING
A scalable virtual conferencing system which implements a hub and spoke architecture. For example, one embodiment of a scalable virtual conferencing system...
2018/0375675 SYSTEM AND METHOD TO PROVIDE DEFAULT MULTICAST GROUP (MCG) FOR ANNOUNCEMENTS AND DISCOVERY AS EXTENDED PORT...
Systems and methods to provide default multicast group (MCG) for announcements and discovery as extended port information in a high performance computing...
2018/0375674 JUDGEMENT UNIT AND CONTROLLING METHOD THEREOF, POWER SUPPLY DEVICE AND CONTROLLING METHOD THEREOF
A judgement unit applied in a Power over Ethernet (PoE) device is disclosed herein. The judgement unit is configured to determine whether the PoE device is...
2018/0375673 POWER PROVIDING DEVICE AND METHOD, POWER RECEIVING DEVICE
The invention relates to a power providing device (1), a power receiving device (2) and a corresponding method of providing power from a power providing device...
2018/0375672 POWER OF ETHERNET POWER AND DATA SPLITTING SYSTEMS AND METHODS
The disclosure includes an electronic system that receives data and power from an Ethernet cable and splits the data and the power. The system can include a...
2018/0375671 DISTRIBUTED STORAGE NETWORK DATA REVISION CONTROL
Multiple revisions of an encoded data slice are generated, with each revision having the same slice name. Each of the data slices represents the same original...
2018/0375670 METHOD FOR SECURING AN INTEGRATED CIRCUIT DURING FABRICATION
The invention relates to a method of securing an integrated circuit during its fabrication on a wafer, said method including the following steps: ...
2018/0375669 METHOD FOR GENERATING A CHALLENGE WORD, ELECTRONIC DEVICE, SET VALUE PERIPHERAL, AND SYSTEM IMPLEMENTING SAID...
Method for generating a challenge word, electronic device, input peripheral, and system implementing said method. The invention relates to a system and to a...
2018/0375668 MEDIA CHANNEL MONITORING TO PROVE CONTENT PRESENTATION
Blockchain-based proof of presentation of content on a media channel, including: a blockchain; a generator configured to generate at least first, second, and...
2018/0375667 APPARATUS AND METHOD FOR CERTIFICATE ENROLLMENT
An apparatus includes a processor coupled to a memory wherein the processor and the memory are configured to provide a secure execution environment. The memory...
2018/0375666 UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICES
A secure programming system can receive a job control package having a security kernel and a target payload of content for programming into a pre-defined set...
2018/0375665 DEVICE PROVISIONING
A device is equipped with a public/private key pair. The private key is stored in a secure location on the device and the public key is utilized to track...
2018/0375664 SYSTEMS AND METHODS FOR ELECTRONIC SIGNING OF ELECTRONIC CONTENT REQUESTS
Systems and methods are disclosed for cryptographic signing of content requests. One method includes receiving, at a content network, a content request from a...
2018/0375663 SECURE COMMUNICATIONS PROVIDING FORWARD SECRECY
Embodiments of the invention can establish secure communications using a single non-traceable request message from a first computer and a single non-traceable...
2018/0375662 SECURE KEY STORAGE FOR MULTI-CORE PROCESSOR
The disclosed technology is generally directed to secure key storage. A secret device key may be mutated based on a hash of a first boot loader to derive a...
2018/0375661 DEVICE
A passive, one-time password device may include a fingerprint authentication engine and a wireless communication module. The device may be passive, and...
2018/0375660 MULTI-FACTOR AUTHENTICATION IN VIRTUAL, AUGMENTED, AND MIXED REALITY (xR) APPLICATIONS
Systems and methods for multi-factor authentication in virtual, augmented, and mixed reality (xR) applications are described. In some embodiments, an xR...
2018/0375659 SINGLE-INPUT MULTIFACTOR AUTHENTICATION
Multifactor authentication is a method to secure data and accounts and to prevent unauthorized access. A first factor can be information that the user knows,...
2018/0375658 SINGLE-INPUT MULTIFACTOR AUTHENTICATION
Multifactor authentication is a method to secure data and accounts and to prevent unauthorized access. A first factor can be information that the user knows,...
2018/0375657 SINGLE-INPUT MULTIFACTOR AUTHENTICATION
Multifactor authentication is a method to secure data and accounts and to prevent unauthorized access. A first factor can be information that the user knows,...
2018/0375656 Parental Control in a Networked Environment
Methods, systems, and products control presentation of media content within a networked environment of multiple devices. Interaction rules are used to...
2018/0375654 ENHANCING SECURITY FOR MULTIPLE STORAGE CONFIGURATIONS
A method begins by a processing module identifying, for a DSN (Dispersed Storage Network) memory using multiple IDA (Information Dispersal Algorithms)...
2018/0375653 Policy-Based Key Recovery
A device establishes a key recovery policy and generates a key that is protected based on the key recovery policy. The key recovery policy indicates which...
2018/0375652 METHOD FOR RE-KEYING AN ENCRPYTED DATA FILE
A method for re-keying an encrypted data file, the data file being stored chunkwise on a storage entity (SE), data file chunks being encrypted with a global...
2018/0375651 METHOD FOR LEVERAGING A SECURE TELECOMMUNICATION SESSION
A method for leveraging a first secure channel of communication between a first agent and a second agent to create a second secure channel of communication...
2018/0375650 APPARATUS AND METHOD FOR ADDING AN ENTROPY SOURCE TO QUANTUM KEY DISTRIBUTION SYSTEMS
The invention relates to a Quantum Key Distribution apparatus (200), for exchanging at least one quantum key with another Quantum Key Distribution apparatus,...
2018/0375649 AGREEMENT OF EXCHANGE KEYS ON THE BASIS OF TWO STATIC ASYMMETRIC KEY PAIRS
A method for setting up a subscriber identity module for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server...
2018/0375648 SYSTEMS AND METHODS FOR DATA ENCRYPTION FOR CLOUD SERVICES
Systems and methods for secure storage and transmission of sensitive information in a cloud environment. The methods comprise: receiving sensitive information...
2018/0375647 FLEXIBLE SECURITY CHANNEL ESTABLISHMENT IN D2D COMMUNICATIONS
A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one...
2018/0375646 DISTRIBUTED VPN SERVICE
For a network that includes host machines for providing computing and networking resources and a VPN gateway for providing external access to those resources,...
2018/0375645 DATABASE PASSWORD CHANGES
Systems and methods for changing database passwords are described. A first server computing system receives an indication to perform a password change process...
2018/0375644 INTRODUCING MIDDLEBOXES INTO SECURE COMMUNICATIONS BETWEEN A CLIENT AND A SERVER
A method of communicating over a network between first and second endpoints, one being and the other being a server. The method comprises: establishing a first...
2018/0375643 PROCESSOR WITH SECURE HASH ALGORITHM AND DIGITAL SIGNAL PROCESSING METHOD WITH SECURE HASH ALGORITHM
A processor using an internal memory to store constants Kt required in a secure hash algorithm (SHA). The latency due to loading the constants Kt from an...
2018/0375642 SM4 ACCELERATION PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS
A processor of an aspect includes a plurality of packed data registers, and a decode unit to decode an instruction. The instruction is to indicate one or more...
2018/0375641 TECHNIQUE TO GENERATE SYMMETRIC ENCRYPTION ALGORITHMS
An invention aimed at keeping in a secret and indecipherable form any type of information or data that can be stored, transmitted, displayed or expressed by...
2018/0375640 Variable Relinearization in Homomorphic Encryption
In aspects of variable relinearization in homomorphic encryption, a computing device stores homomorphic encrypted data as a dataset, and implements an...
2018/0375639 Multiplication Operations on Homomorphic Encrypted Data
In aspects of multiplication operations on homomorphic encrypted data, a computing device stores homomorphic encrypted data as a dataset, and implements an...
2018/0375638 SECURE MODELS FOR IOT DEVICES
A hub device of a network receives a data model that includes a secure portion that is encrypted and one or more unsecure portions. The hub device deploys the...
2018/0375637 Clock Synchronization Device
In an embodiment, a clock synchronizing circuit includes: a phase comparator including a first circuit having a first input configured to receive a data...
2018/0375636 METHOD AND USER EQUIPMENT FOR RECEIVING DOWNLINK CHANNEL, AND METHOD AND BASE STATION FOR TRANSMITTING DOWNLINK...
A method and apparatus for transmitting/receiving a downlink channel in a wireless communication system are provided. A physical downlink control channel...
2018/0375635 METHOD AND APPARATUS FOR SELECTING MULTIPLE TRANSPORT FORMATS AND TRANSMITTING MULTIPLE TRANSPORT BLOCKS...
A method and apparatus for selecting multiple transport formats and transmitting multiple transport blocks (TBs) in a transmission time interval simultaneously...
2018/0375634 OVERLAPPING CODE BLOCK GROUPS FOR MULTIPLE CODEWORDS
Methods, systems, and devices for wireless communication are described that support overlapping code block groups (CBGs) for multiple codewords. A receiving...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.