At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Low power and area bootstrapped passive mixer with shared capacitances
In a passive mixer, switches and a capacitance are shared between bootstrapped mixing transistors, reducing the number of components required as compared to...
Method and apparatus for correlation canceller for interference mitigation
with adaptive DC offset cancellation
A method and apparatus for a method and apparatus for correlation canceller for interference mitigation with adaptive DC offset cancellation for a dual mode...
Apparatus and method for power amplification
A power amplifying apparatus and a method for effectively controlling a bias voltage of a power amplifier are provided. An electronic device includes a baseband...
System and method for tree-search enhancement by metric prediction based
on incomplete paths in soft output...
A method and system for soft output multiple-input-multiple-output (MIMO) decoding may include generating a tree-graph based on: MIMO rank, number of bits per...
Phase detecting device and clock data recovery circuit embedded with
decision feedback equalizer
A phase detecting device and a clock data recovery circuit are provided. The phase detecting device includes a decision feedback equalizer having first and...
Partial response receiver
A signaling system is described. The signaling system comprises a transmit device, a receive device including a partial response receive circuit, and a...
Fast transversal multi-input system
Multiple input single output (MISO) systems and processes are presented that can adaptively equalize multiple signals to produce an output. In some examples,...
Adaptive equalizer tap coefficient correction method and optical receiver
A method of tap coefficient correction includes: obtaining a synchronization symbol difference between a first polarization and a second polarization orthogonal...
Elements to counter transmitter circuit performance limitations
Embodiments of the invention are generally directed to elements to counter transmitter circuit performance limitations. An embodiment of an apparatus for...
Driving data of multiple protocols through a single set of pins
Embodiments of the invention are generally directed driving data of multiple protocols through a single set of pins. An embodiment of an apparatus includes a...
Channel estimating apparatus, channel estimating method, base station, and
A channel estimating apparatus includes a receiver that receives reference signal groups that are respectively transmitted from wireless communications units...
Method and apparatus for transmitting and receiving information wirelessly
using intensity interferometry
As system and method to transmit information with intensity interferometry includes a digital switch configured to receive a baseline message, and, for each of...
Adaptively delivering services to client devices over a plurality of
networking technologies in a home network
Methods and apparatuses to adaptively deliver high-definition digital entertainment and telecommunications to client devices over various networking...
Soft handoff across different networks assisted by an end-to-end
A method of handoff across different networks is disclosed. A first communication link through a first network is used for communicating between a first user...
Systems and methods for an application messaging integration framework
Methods, systems, and computer-readable media are provided for an application messaging integration framework. An example method includes receiving a user input...
Systems and methods for providing a spam database and identifying spam
Systems and methods are provided for identifying unsolicited or unwanted electronic communications, such as spam. The disclosed embodiments also encompass...
System and method to facilitate communications and content sharing among
users over a network
A system and method to facilitate real-time communications and content sharing among users over a network are described. In one preferred embodiment, multiple...
Cut-through processing for slow and fast ports
In a method for processing network packets, a network packet is received at an ingress port. Before the network packet has been completely received at the...
Cut-through processing for slow and fast ports
In a method for processing network packets, a network packet is received at an ingress port. After at least a first portion of the network packet has been...
Communication apparatus, communication system, and communication method to
transmit and receive Ethernet frames
Upon receipt of an intercepted first Ethernet Frame, a communication system converts the first Ethernet Frame into a second Ethernet Frame including a second...
Method and apparatus for transmitting an asynchronous transport signal
over an optical section
An exemplary method and apparatus are provided for transmitting an asynchronous transport signal over an optical fiber section of an Optical Transport Network....
Apparatuses for a wired/wireless network architecture
In some embodiments, an apparatus comprises a core network node and a control module within an enterprise network architecture. The core network node is...
Secure access to remote resources over a network
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual...
Redundant Ethernet automatic protection switching access to virtual
private LAN services
Embodiments disclosed herein provide redundant connectivity between an Ethernet Automatic Protection Switching (EAPS) access network and a Virtual Private LAN...
Anti-starvation and bounce-reduction mechanism for a two-dimensional
A slot reservation method is disclosed. The slot reservation method generates slot reservations in two dimensions to address starvation and to reduce bounce of...
Method of medium access control type detection
A method of medium access control (MAC) type detection for a communication device compatible of a plurality of media each conformed to a communication standard...
System component installation
A computer-implemented method for installing a component within a system is described. In one embodiment, component information is identified via a component...
Integrating telephony applications and television broadcasts on a
Systems and methods for integrating telephony and multimedia content include concurrently displaying a graphical user interface and a video channel of a media...
Method and apparatus for providing tenant information for network flows
In one embodiment, a method includes generating at a network device comprising a virtual switch, a tenant record comprising tenant information for a context...
Hardware-accelerated packet multicasting
Methods and systems for hardware-accelerated packet multicasting are provided. According to one embodiment, a first packet to be multicast to a first...
Notification of audio state between endpoint devices
In one embodiment, a method includes receiving at a server in communication with a plurality of user devices, a notification of a mute state change at a first...
Multicast message replication method and device
A multicast message replication method and apparatus are provided. The method includes: step 1. storing a received message in a message cache module, and an...
Communication device, communication method, reader/writer, and
A control unit of a communication device decrypts, when receiving via an antenna from a reader/writer a cipher key encrypted with a key same as a common key...
Security system and method
A method for exchanging data according to one embodiment includes transmitting a packet of data from a first device to a second device, the packet of data...
Method for validating messages
There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a...
Component analysis of software applications on computing devices
Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era...
Tamper-evident network messaging method and system, and device configured
Described are various embodiments of a tamper-evident network messaging method and system, and device configured therefor. In some embodiments, tamper-evident...
Adding entropy to key generation on a mobile device
Methods, apparatus and articles of manufacture for adding entropy to key generation on a mobile device are provided herein. A method includes generating a...
Multiple authority data security and access
Data is encrypted such that multiple keys are needed to decrypt the data. The keys are accessible to different entities so that no single entity has access to...
Authentication system and authentication code convertor
The authentication system includes a to-be-authenticated device for generating a first authentication data; an authentication code convertor for converting the...
Cryptographic system, cryptographic method, and cryptographic program
The present invention aims to allow for addition of an attribute category without reissuing a public parameter. A cryptographic system 10 uses an indexing...
Secure initialization vector generation
A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In...
Portable device registration system and portable device registration
An immobilizer ECU generates an encryption key using key generating logic, from a SEED code included in an ID code signal sent from an electronic key, and...
Cryptographic key generation based on multiple biometrics
In an embodiment, an apparatus includes a processor including a first core. The first core includes multi-biometric logic to output first biometric data w.sub.i...
A method, system and apparatus for deriving a secondary secret from a root secret are described, the method, system and apparatus including reserving a memory...
Mechanism for implementing key-based security for nodes within a networked
virtualization environment for...
A method for providing key-based security for adding a new node to an existing networked virtualization environment for storage management includes discovering...
System and method for efficient and secure distribution of digital content
One embodiment provides a system for processing encrypted content. During operation, a client computing device determines a request for content based on the...
Systems and methods for distributing and securing data
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A...
Carrier frequency synchronization of data
An exemplary method is implemented by a radio frequency receiver for synchronizing the recovery of data carried by frames. An indication is generated from error...
Method of establishing an oscillator clock signal
A hybrid numeric-analog clock synchronizer, for establishing a clock or carrier locked to a timing reference. The clock may include a framing component. The...