At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Delay technique in e-mail filtering system
A relay provides message filtering services to an e-mail network. The relay monitors incoming communication and intercepts e-mail messages. The relay applies a...
Communication control device, message transmission method, and message
As described above, when a communication control device receives a message transmitted from a user terminal, the communication control device specifies a...
Extended layer two tunneling protocol applications and architectures
A device, deployed at the edge of a provider network, includes logic to receive traffic from one or more customer edge devices, and to encapsulate the customer...
Site-to-site 6rd tunneling using collocated border router and customer
In one embodiment, a router gateway in a first Local Area Network (LAN) hosts both an Internet Protocol version 6 (IPv6) Rapid Deployment (6rd) Customer Edge...
Method of processing action, method of controlling controlled device,
controlled device, and control point
A method of processing an action executes an action requested by a control point for controlling a controlled device through a network, stores a result of...
Network traffic redirection in bi-planar networks
An electronic communication network includes a connectivity subsystem. The connectivity subsystem registers a control subsystem with the connectivity subsystem....
Systems and methods for integrated unicast and multicast traffic
Methods for managing network resources for multicast streams based on unicast load conditions of a base station in a communications network include monitoring...
Scalable transport method for multicast replication
Embodiments disclosed herein provide advantageous methods and systems that use multicast communications via unreliable datagrams sent on a protected traffic...
System and method for pricing communication of a telecommunication
A system and method that include receiving a communication pricing query; mapping the communication pricing query to a billable item; resolving a price of a...
Method and device for controlling transmitter
A method for controlling a transmitter, comprising: awaking and initiating the transmitter by a trigger signal generated by a timer; detecting whether the...
Method and apparatus for exchanging messages
A method and an apparatus for communicating with a second apparatus. The apparatus includes a controller and a transceiver for exchanging a predetermined number...
Real time power monitor and management system
A power monitor and management system includes an automatic modulation device, a monitoring device, multiple modules and an LAN (local area network) connected...
Network system, certificate management method, and certificate management
A network system includes a management apparatus and multiple apparatuses. The management apparatus includes a preparation instruction unit to transmit an...
Verifiable redactable audit log
A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from...
Systems and methods for identifying code signing certificate misuse
A computer-implemented method for identifying code signing certificate misuse may include (1) identifying a software file that has been signed using a code...
Document modification detection and prevention
Methods and apparatus, including computer program products, implementing and using techniques for document authentication. An electronic document is presented...
Systems, methods and apparatuses for secure time management
The systems, methods and apparatuses described herein provide a computing environment that includes secure time management. An apparatus according to the...
Method and system for preventing revocation denial of service attacks
Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure...
System and method for secure release of secret information over a network
Embodiments of the present disclosure include systems and methods for secure release of secret information over a network. The server can be configured to...
Secure delegated authentication for applications
A system for secure delegated authentication for applications may include one or more processors and a memory. The one or more processors perform operations...
Multi-channel multi-factor authentication
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and...
System for and method of remote secure backup
Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided.
Method and system for smart card chip personalization
Method and system for personalizing a chip, intended to be integrated into a smart card, comprising a tester associated to an FPGA device connected to the chip,...
Secure modules using unique identification elements
Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying...
Method and apparatus for wireless communication using an acoustic signal
Systems, apparatuses, and methods for securing wireless communication using an acoustic signal are described. In one method involving a first and second device,...
Privacy enhanced spatial analytics
Method, system, and computer program products, implementing and using techniques for processing data representing observations of entities. An anonymized key is...
Device and method for generating keys with enhanced security for fully
homomorphic encryption algorithm
There is proposed a method of generating secret and public keys vDGHV with enhanced security, implemented in a device including at least one microprocessor and...
Application usage continuum across platforms
A system for application usage continuum across client devices and platforms includes a first client device configured to execute a first instance of an...
Method for improving synchronization and information transmission in a
A method is provided for improving synchronization and information transmission in a communication system, including: generating a signal with a centrally...
Transcoding method for multi-wire signaling that embeds clock information
in transition of signal state
A method for performing multi-wire signaling encoding is provided in which a clock signal is encoded within symbol transitions. A sequence of data bits is...
Data recovery circuit
In a data recovery circuit, the position of an edge is detected from parallel data acquired by oversampling data received through serial communication, the...
GNSS reception using distributed time synchronization
A GNSS receiver communicates with any connectivity device, such as a WiFi device that is, in turn, in communication with a wired network having access to the...
Method, receiver and system for signal synchronization
In a method for time domain joint synchronization in downlink, a sequence to be analyzed is obtained from a received time domain signal; the sequence to be...
Timing recovery in a high speed link
Systems and methods for high speed communications are described herein. In certain aspects, the systems and methods include innovative transceiver architectures...
Clock and data recovery using receiver clock spread spectrum modulation
and offset compensation
A system and method for performing clock and data recovery. The system sets the phase of a recovered clock signal according to at least three estimates of the...
Wireless communication unit, radio frequency module and method therefor
A wireless communication unit includes at least one antenna port; a transmitter and a receiver operably coupled to the at least one antenna port via a duplexer;...
Front-end circuit and impedance adjustment method
A front-end circuit includes an RFIC, an antenna, N duplexers, N variable impedance adjustment circuits, a switch for selecting any two of the N variable...
Method for configuring transmission resource, related device, and
Embodiments of the present disclosure related to a method for configuring a transmission resource, a related device, and a communication system. The method for...
Method for supporting mobility of user equipment in a wireless
communication system and apparatus for the same
A method for supporting a mobility of a user equipment (UE) in a wireless communication system is provided. The method includes: performing the mobility with a...
Autonomous denial of transmission in device with coexisting communication
A method includes determining a first measure of a benefit of disallowing transmission during a time period within a time frame. The benefit of disallowing...
Scheduled clear to send (CTS) for multiple user, multiple access, and/or
MIMO wireless communications
Scheduled clear to send (CTS) for multiple user, multiple access, and/or MIMO wireless communications. Before sending transmissions, a request to send...
Method and apparatus for differential encoding of CQI in cooperative
multipoint communication systems
A method includes receiving in a mobile communication terminal signals from multiple cells that coordinate transmission of the signals with one another in a...
Method for transmitting uplink control information, user equipment, method
for receiving uplink control...
In the present invention, a physical uplink control channel (PUCCH) resource, which is used for transmitting acknowledgement/negative ACK (ACK/NACK) information...
Use of discrete portions of frequency bandwidth to distinguish between ACK
and NACK transmissions
The air interface between a first node and a second node will span a frequency bandwidth defining two distinct portions, and acknowledgement message...
Adaptive antenna management in LTE
Certain aspects of the present disclosure relate to methods and apparatus for adaptive antenna management in LTE. Devices and networks capable of transmitting...
Terminal, base station, communication system, and communication method
In a terminal that communicates with a base station, in the case where a physical downlink control channel or an enhanced physical downlink control channel,...
Method for controlling uplink transmission power and wireless device using
Provided are a method for controlling uplink transmission power and a wireless device. The wireless device decides a first transmission power of a first uplink...
Feedback capability enhancement using reference symbol radio resource
Feedback information is conveyed between a wireless device and a base station in a cellular communications network via selection and detection of radio...
Sequence derivation for reference signal patterns
A reference signal, RS, is generated in a wireless communication system based on a starting position, in the frequency domain, of the RS and a transmission...
Method and apparatus for transmitting and receiving data including a
plurality of data streams in a...
A method and apparatus for transmitting data comprising a plurality of data streams in a broadcasting system are provided. The method includes dividing a frame...