At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Configurable differential to single ended IO
An electronic system having a power efficient differential signal between a first and second electronic unit. A controller uses information, such as compliance...
Systems and methods for improved wireless channel estimation
Systems and methods are disclosed herein to provide improved channel estimation in a wireless data communication system, including but not limited to Multiple...
Method and apparatus for communicating symbols in a multiple input
multiple output communication system using...
A method and apparatus are provided for transmitting one or more symbols in a multiple antenna wireless communication system. Subcarriers from one or more...
Correlation ID for local IP access
The invention relates to a home cellular base station (HeNB), comprising a radio interface (RI), to communicate with a user equipment (UE), a local interface...
Management of virtual desktop infrastructure (VDI) sessions using
real-time network conditions
Devices, methods and instructions encoded on computer readable medium are provided herein for management of virtual desktop infrastructure (VDI) sessions in a...
Hybrid type telephony system
A hybrid type telephony system capable of establishing a connection between conventional type telephone sets contained in an exchange unit and LAN type...
System and method for securely performing multiple stage email processing
with embedded codes
A system and method for performing email processing at multiple stages along an email delivery chain. A first embodiment uses an email filter to receive...
Optimised bandwidth utilisation in networks
A multimedia delivery network, comprising network resource allocation means for allocating bandwidth to a network session between a UE (user equipment) device...
Mechanism for enabling layer two host addresses to be shielded from the
switches in a network
Methods and systems for shielding layer two host addresses (e.g., MAC addresses) from a network are provided. A border component interposed between a network of...
Systems and methods for VLAN tagging via cloud bridge
The present disclosure is directed to supporting multiple virtual LANs (VLANs) via a single tunnel between intermediary devices. A first intermediary device of...
Overlay network capable of supporting storage area network (SAN) traffic
In one embodiment, a method for sending FCoE traffic over an overlay network includes receiving a block of media access control (MAC) addresses for use in local...
Method, device and system for accessing wireless local area network,
wireless station, and wireless access point
Embodiments of the present invention provide a method, a device and a system for accessing a wireless local area network, a wireless station, and a wireless...
Minimizing interference between communication networks
Methods, systems, and devices are described for minimizing mutual interference between networks that implement different protocols. In one embodiment, a first...
Media sharing device
A media sharing device includes a data bridge device and two switching control modules. The data bridge device has two terminals connected to USB interface...
System and method for an asynchronous processor with scheduled token
Embodiments are provided for adding a token jump logic to an asynchronous processor with token passing. The token jump logic allows token forward jumps and...
Distributed proxy for bi-directional network connectivity over
The subject disclosure is directed towards a technology by which computing devices such as a phone and a personal computer may reliably communicate internet...
Controlling a device of a remote network from a local network
A method and apparatus are provided for controlling at least one UPnP device of a remote network from a local network by a local relay module of the local...
Device abstraction system and method for a distributed-architecture
heating, ventilation and air conditioning...
The disclosure provides an HVAC data processing and communication network and a method of manufacturing the same. In an embodiment, the method includes...
Power receptacle wireless access point devices for networked living and
Described herein are power receptacle wireless access point (AP) devices that may be used as part of a networked (smart) living and work space. These power...
Distributed CCAP cable modem termination system
Distributed CMTS device for a HFC CATV network serving multiple neighborhoods by multiple individual cables, in which at least some and often all of the QAM...
Apparatus for managing local devices
An apparatus for managing local devices, wherein the apparatus is operatively connectable with a network to manage network traffic. The apparatus can include...
Method and apparatus for hop-by-hop reliable multicast in wireless
A method and apparatus are described including performing hop-by-hop multicasting including network coding of data packets of a portion of content, wherein...
Virtual private meeting room
A conference session is established. Different unique identifications and persistent dedicated virtual private network conference rooms are assigned to...
Method and apparatus for group messaging
Methods, systems, and apparatuses for group messaging are disclosed. An exemplary method includes a group messaging system receiving a broadcast message from an...
Method and device for controlling Ad-Hoc network in CPNS enabler
A method and device for controlling an ad-hoc network using a CPNS entity having a secure element (SE) in a CPNS enabler are discussed. According to an...
Determination method for cryptographic algorithm used for signature,
validation server and program
On the basis of revocation information of a certificate, information of a certification authority and of the certificate issued by the certification authority...
Method and system for signing and authenticating electronic documents via
a signature authority which may act...
A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated...
System and method for managing mobile device using device-to-device
Provided are a system and method for managing a mobile device using device-to-device (D2D) communication in which a D2D communication-based mobile device...
Cryptographically enforcing strict separation of environments
A system and method are disclosed for enforcing site or organization localized provisioning policy using cryptography. In an exemplary method, a signing key is...
Apparatus and method for content encryption and decryption based on
storage device ID
An apparatus and method for encrypting content based on an identifier (ID) of a storage device and a decrypting apparatus and method corresponding thereto. The...
Method for secure transfer of an application from a server into a reading
A method and a system for secure transfer of an application from a server (S) into a reading device unit (2) with authentication of a user with a data carrier...
Methods and systems for user authentication
Methods and systems are provided for authenticating a user for access to restricted content. An exemplary method involves providing a plurality of selectable...
Identity management for transactional content
A method and system for managing access to transactional multimedia content based on hardware identification codes can include determining whether a user is...
Method to implement two fiber shared protection ring with extra traffic on
A method for protection of data traffic transmitted over 2-fiber shared protection ring on STM-1/OC-3 interface is provided. Also, the method involves carrying...
Providing support for multiple authentication chains
A method and system to support multiple chains of authentication modules. The method may include receiving a user login request, and identifying multiple chains...
Message encryption and decryption utilizing low-entropy keys
In one embodiment, a first message is obtained and encrypted to produce a ciphertext. The first message is encrypted such that decryption of the ciphertext...
Performing AES encryption or decryption in multiple modes with a single
A machine-readable medium may have stored thereon an instruction, which when executed by a machine causes the machine to perform a method. The method may...
Power line based theft protection of electronic devices
Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an...
Encryption key providing method, semiconductor integrated circuit, and
encryption key management device
The first device, which utilize a cipher, generates device unique data by a PUF, and the second device generates one pair of helper data and a device unique ID...
Encrypted server-less communication between devices
In some examples, a device may include an accelerometer configured to provide a measurement of vibration created by relative contact with another device, and a...
Method for generating a bit vector
A method and a circuit configuration for generating a bit vector are described. At least two configurations, each having state machines of the same design, are...
System and methods for silencing hardware backdoors
Methods for preventing activation of hardware backdoors installed in a digital circuit, the digital circuit comprising one or more hardware units to be...
Method for increasing I/O performance in systems having an encryption
A system and method for improving performance while transferring encrypted data in an input/output (I/O) operation are provided. The method includes receiving a...
Clock generation circuit with dual phase-locked loops
Embodiments provide a clock generation circuit with a first phase-locked loop (PLL) and a second PLL that are coupled in parallel with one another and receive a...
Referenceless clock and data recovery circuit
A circuit and method for referenceless CDR with improved efficiency and jitter tolerance by using an additional loop for frequency detection. Such an improved...
Data receivers and methods of implementing data receivers in an integrated
A data receiver implemented in an integrated circuit is described. The data receiver comprises an input receiving a data signal; a first equalization circuit...
Noise shaped interpolator and decimator apparatus and method
An interpolator or decimator includes an elastic storage element in the signal path between first and second clock domains. The elastic element may, for...
Systems and methods for transferring a signal from a first clock domain to
a second clock domain
Systems and methods are provided for transferring a signal from a first clock domain to a second clock domain. A system includes a pulse generator configured to...
A two-way communication device has a master transmitter connected to at least one slave transmitter by an active connection wire. The master transmitter and the...
Apparatus and method to enable device-to-device (D2D) discovery in
An apparatus and method of allowing user equipment (UE) to transmit information directly with other user equipment, using a device-to-device (D2D) mode is...