Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2019/0140864 DEVICE-TO-DEVICE (D2D) CHANNEL MEASUREMENT TECHNIQUES
Methods and apparatuses are provided which may be used in a base station and/or user equipment (UE) to help determine whether device-to-device (D2D)...
2019/0140863 DATAPLANE SIGNALED BIDIRECTIONAL/SYMMETRIC SERVICE CHAIN INSTANTIATION FOR EFFICIENT LOAD BALANCING
A method for a dataplane signaled bi-directional/symmetric service chain instantiation for efficient load balancing is provided. In one embodiment, the method...
2019/0140862 METHOD FOR EXCHANGING DATA IN CLUSTER SERVER SYSTEM
A method for exchanging data in a cluster server system is provided. In the cluster server system, data is exchanged between adjacent nodes by transmission of...
2019/0140861 Service Sending Method and Apparatus, Service Receiving Method and Apparatus, and Network System
The present disclosure relates to a service sending method and apparatus, and a service receiving method and apparatus. One example service sending method...
2019/0140860 PASSENGER TRANSPORT SYSTEM WITH CENTRAL CONTROL UNIT AND MULTIPLE FIELD DEVICES WHICH COMMUNICATE WITH DATA...
A passenger transport system includes a central control unit for controlling system functions, field devices spatially distributed within the system, and a bus...
2019/0140859 Method and Apparatus for Processing Signals from Messages on at Least Two Data Buses, Particularly Can Buses;...
Processing signals from messages on at least two data buses, particularly CAN buses in a vehicle, includes extracting at least one signal from at least one...
2019/0140858 COMPUTER VISION BASED ACTIVATION
An augmented-reality (AR) device detects a physical device located within a first predefined distance of the augmented-reality device. The AR device detects,...
2019/0140857 SMART SENSOR ADAPTIVE CONFIGURATION SYSTEMS AND METHODS USING CLOUD DATA
A cloud server associated with a plurality of home-control network, downloads sensor data, Internet data, and data from network devices outside the user's...
2019/0140856 Scalable Smart Environment Using a Gateway Thermostat
Building blocks for a smart device such as a thermostat include a user interface (UI) unit and a terminal (TML) unit. A UI unit may support one or more input...
2019/0140855 SYSTEM AND METHOD FOR EFFICIENTLY DEVELOPING AND TESTING HOME AUTOMATION SYSTEMS
A system and computer-implemented method for efficiently developing and testing home automation systems is provided. The system comprises one or more robotic...
2019/0140854 MULTICAST SERVICE TRANSLATION IN INTERNET PROTOCOL TELEVISION SYSTEMS
Techniques are described for multicast service translation. A router can provide access to a particular source for an Internet Protocol Television (IPTV)...
2019/0140853 SDN Facilitated Multicast in Data Center
A method implemented by a controller in a software defined network (SDN), the method comprising sending, to an overlay edge node, a query message comprising a...
2019/0140852 TAMPER-PROTECTED HARDWARE AND METHOD FOR USING SAME
One of the various aspects of the invention is related to suggesting various techniques for improving the tamper-resistibility of hardware. The...
2019/0140851 SECURE LOGIC SYSTEM WITH PHYSICALLY UNCLONABLE FUNCTION
A secure logic system includes a physically unclonable function, a physically unclonable function configuration register, and an encryption circuit. The...
2019/0140850 AUTOMATICALLY VERIFYING VEHICLE IDENTITY AND VALIDATING VEHICLE PRESENCE
Systems, apparatuses and methods may provide for infrastructure node technology that conducts a mutual authentication with a vehicle and verifies, if the...
2019/0140849 USING PKI FOR SECURITY AND AUTHENTICATION OF CONTROL DEVICES AND THEIR DATA
Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic...
2019/0140848 Decentralized Access Control for Cloud Services
A decentralized system for issuing digital certificates to users and authenticating such users is provided. A certificate issuer system may verify a user and...
2019/0140847 SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON BIOMETRIC AND DEVICE DATA
A data controller (DC) system including one or more data controller (DC) computing device for authenticating a user is provided. The DC system is configured to...
2019/0140846 PROVISIONING TRUSTED EXECUTION ENVIRONMENT(S) BASED ON CHAIN OF TRUST INCLUDING PLATFORM
Techniques are described herein that are capable of provisioning a trusted execution environment (TEE) based on (e.g., based at least in part on) a chain of...
2019/0140845 Method for the Secure Authentication of Control Devices in a Motor Vehicle
A method for secure authentication of control apparatuses in a motor vehicle includes sending an authentication request to a control apparatus of the motor...
2019/0140844 IDENTITY-LINKED AUTHENTICATION THROUGH A USER CERTIFICATE SYSTEM
Systems, methods, apparatuses, and computer readable media for facilitating user identity authentication to a service provider by linking, on a user...
2019/0140843 SECURE SESSION CAPABILITY USING PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE PRIVATE KEY
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a...
2019/0140842 CRYPTO INTEGRATION PLATFORM
Methods and systems described herein create a first addressed account and a second addressed account that each have a common identifier and are each associated...
2019/0140841 MULTI-USER STRONG AUTHENTICATION TOKEN
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
2019/0140840 MULTI-USER STRONG AUTHENTICATION TOKEN
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
2019/0140839 MULTI-USER STRONG AUTHENTICATION TOKEN
Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and...
2019/0140838 TECHNOLOGIES FOR PROVIDING CERTIFIED TELEMETRY DATA INDICATIVE OF RESOURCES UTILIZATIONS
Technologies for providing certified telemetry data indicative of resource utilizations include a device with circuitry configured to obtain telemetry data...
2019/0140837 Remote Management Method, and Device
A remote management method and a device, where the method includes receiving, by a subscription manager-data preparation (SM-DP+) server, a first identifier...
2019/0140836 PROVISIONING TRUSTED EXECUTION ENVIRONMENT BASED ON CHAIN OF TRUST INCLUDING PLATFORM
Techniques are described herein that are capable of provisioning a trusted execution environment (TEE) based on (e.g., based at least in part on) a chain of...
2019/0140835 Blind Hash Compression
Techniques are provided for blind hash compression, such as serving, from a computer server system and to a plurality of different computing devices remote...
2019/0140834 Advanced Crypto Token Authentication
A system and method for authenticating an application that employs cryptographic keys and functions is provided with white box cryptography employed to secure...
2019/0140833 Password-less Software System User Authentication
Data is received as part of an authentication procedure to identify a user. Such data characterizes a user-generated biometric sequence that is generated by...
2019/0140831 VIRTUAL MACHINE STRUCTURE
Aspects provide for a virtual machine structure wherein processors are configured to create an encrypted code virtualization machine for code machine...
2019/0140830 METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
An example method includes receiving a media identifier and a first impression identifier from a media device, the media identifier being indicative of media...
2019/0140829 CUSTOMIZABLE ENCRYPTION/DECRYPTION ALGORITHM
Systems (100) and methods (700) for customizing a cryptographic algorithm. The methods comprise: providing an electronic device with the cryptographic...
2019/0140828 SYSTEMS AND METHODS OF TRUSTED OWNERSHIP RE-KEY WITH ATTESTATION
The present disclosure is directed to systems and methods of providing a trusted ownership re-key with attestation in a device. The device includes processor...
2019/0140827 SECURE MESSAGING WITH DISPOSABLE KEYS
Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided....
2019/0140826 SECURE NETWORK COMMUNICATION
A method may include transmitting a first public encryption key from to a control device and encrypting a first packet for a remote network device utilizing a...
2019/0140825 MANAGING PRIVATE KEY ACCESS IN MULTIPLE NODES
Managing private key access in multiple nodes is described. A piece of data (e.g., a private key) is encrypted using identity-based broadcast encryption and...
2019/0140824 GENERATING MASTER AND WRAPPER KEYS FOR CONNECTED DEVICES IN A KEY GENERATION SCHEME
Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each...
2019/0140823 Method for Detecting Encrypted Content, and Device
A method for detecting encrypted content and a device, where the method includes receiving, by a middlebox network device using a first secure channel, key...
2019/0140822 BLOCK CHAIN PERMISSION CONTROL METHOD, DEVICE, AND NODE APPARATUS
The present disclosure discloses a method, device and node apparatus for blockchain permission control. The method comprises: receiving target information sent...
2019/0140821 A SYSTEM AND METHOD FOR EFFICIENT AND SECURE IMPLEMENTATION OF LS-DESIGNS
The invention provides implementations of the block cipher in resource-constrained ARM devices that may be applied to both 32-bit and 64-bit versions of...
2019/0140820 Method for Block Cipher Enhanced by Nonce Text Protection and Decryption Thereof
A method for block cipher enhanced by nonce text protection comprises: (a) providing a plain text data block; (b) inputting a corresponding nonce text based-on...
2019/0140819 SYSTEM AND METHOD FOR MEKLE PUZZLES SYMETERIC KEY ESTABLISHMENT AND GENERATION OF LAMPORT MERKLE SIGNATURES
A system and method for signing a message and establishing a symmetric key between two entities. A plurality of leaves are generated, each including public and...
2019/0140818 PERFORMING VECTOR COMPARISON OPERATIONS IN FULLY HOMOMORPHIC ENCRYPTION
In a fully homomorphic encryption scheme, a method is provided for performing a homomorphic operation on a data set by applying an encrypted operand supplied...
2019/0140817 SECURING AUDIO COMMUNICATIONS
Systems and methods include establishing a cryptographically secure communication between an application module and an audio module. The application module is...
2019/0140816 SPDIF CLOCK AND DATA RECOVERY WITH SAMPLE RATE CONVERTER
A system can include a digital oversampler configured to oversample an input data stream; a rate generator configured to select a frequency that is not less...
2019/0140815 Method for the time-synchronized processing of data of a field device of process automation
A method for the time-synchronized processing of data of a field device of process automation, in which the data and/or data changes are saved together with an...
2019/0140814 SYSTEM AND METHOD FOR AUTOMATICALLY SYNCHRONIZING RESPONSES TO CONDITIONS ON DEVICES
A system and method is provided that permits different devices with different applications to respond to the occurrence of a condition in a similar manner. By...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.