At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Firewall security for computers with internet access and method
A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the...
Communication device and a control method therefor that perform
authentication using digital certificates
A communication device having time information that may not be correct can efficiently and accurately authenticate a server certificate. The communication unit...
Methods and apparatus for integrating media across a wide area network
A system for distributing media includes a wide area network (WAN), a media player coupled to the WAN at a first home, and a media server coupled to the WAN at...
Method, device and computer program for transmitting data to at least one
receiver, and method, device and...
The present invention concerns a method for transmitting data to at least one receiver, data being decomposed in a first and a second streams. The method...
Method and system for performing initial ranging in cognitive radio
Disclosed herein are a method and a system for performing initial ranging in a cognitive radio network The method for performing initial ranging in a cognitive...
Expanding a capacity of a single radio channel
A method of expanding a capacity of a single radio channel, and a radio. The method includes receiving a primary signal and a secondary signal. The method also...
Communication system, receiving device, and semiconductor device
A communication system includes a transmitting device that transmits a signal based on pluralities of symbol coordinates on a constellation and pluralities of...
Method and apparatus for detecting and classifying signals
A method and apparatus for detecting signals. According to an embodiment, energy waves are received at a first receiver system and a second receiver system. The...
Method and device for transmitting a low-frequency signal over a data
transmission link using a digital high...
Disclosed is a method for transmitting a low-frequency signal over a data transmission link using a digital high bit-rate signal including the steps of creating...
Circuit and method for performing adaptation on all receiver branches
Receiver circuitry is disclosed that can take circuit branches offline to possibly adapt an offset value. In one embodiment, a circuit in a receiver has at...
Signal modulation method, adaptive equalizer and memory storage device
A signal modulation method, an adaptive equalizer and a memory storage device are provided. The method includes: receiving a first signal; performing a first...
Continuous-time linear equalizer for high-speed receiving unit
A continuous-time linear equalizer for use in a receiving unit of a high-speed data transmission system for receiving an input signal includes a signal line...
Speed improvement for a decision feedback equalizer
Circuits, apparatus, and methods are disclosed for decision feedback equalization. In one embodiment, an apparatus includes a plurality of time-interleaved...
Method for sending and receiving signal, and corresponding device and
A method for sending and receiving a signal is disclosed, and a corresponding device and system. The method includes performing constellation mapping on a data...
Wide common-mode range receiver
A wide common-mode range receiver includes an input module, voltage level shift module, voltage level shift control module, and output module. The receiver can...
A data network comprises a master, a network distributor and a plurality of network users. The network distributor is connected to a master data path, a first...
Methods and apparatus to control synchronization in voice over internet
protocol networks after catastrophes
Example methods and apparatus to control synchronization in voice over Internet protocol (VoIP) networks after catastrophes are disclosed. An example border...
Method of tracking arrival order of packets into plural queues
In PCI-Express and alike communications systems, it is often desirable to keep track of order of arrival into different queues of packets that will later...
Switching device and relay system
A core switching device has a virtual path table and an address table, and selectively performs a PBB operation and a virtual path operation. The virtual path...
Multitenant access to multiple desktops on host machine partitions in a
service provider network
Routers and host machines can host desktops for two or more enterprises. A virtual local area network is established for each enterprise. Each virtual local...
128 gigabit fibre channel speed negotiation
The FC port state machine enhanced by determining if various lanes are configured to be operated in 128 Gbps mode by operating as parallel lanes as indicated by...
Controller area network bus transmitter with complementary source follower
A Controller Area Network (CAN) driver (a transmitter) includes a conventional main driver having an open drain first driver MOSFET, for pulling up a first...
Quality of service aware hybrid multicast networks
Methods, systems and computer readable media for quality of service aware hybrid multicast networks are described. A method can include receiving a request for...
Network interface utilization dependent charging determination
Certain embodiments may have measures that include establishing a connection between a network and a neighboring network for transiting a transmission session,...
Network device and port function setting method thereof
A network device and a method for the network device to set operation of a port are provided. The network device is connected to a set of power sourcing...
Device for and method of controlled multilevel chain of trust/revision
A device and method of controlled, multilevel chain of trust/revision by certifying of each user, device, action, and circumstance in the creation,...
Device for and method of multilevel chain of trust/revision
A device and method of multilevel chain of trust/revision by certifying each user, device, action, and circumstance in the creation, modification, and...
Industrial control system redundant communications/control modules
A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second...
Virally distributable trusted messaging
Technologies for utilizing trusted messaging include a local computing device including a message client and a local trusted message module established in a...
HNB or HeNB security access method and system, and core network element
A Home (Evolved) NodeB (H(e)NB) security access method and system, and a core network element are disclosed. The method includes a security gateway (SeGW)...
Methods and systems for storing and retrieving data
Through use of the technologies of the present invention, one is able to store and to retrieve data efficiently. One may realize these efficiencies by coding...
Generating authentication codes associated with devices
A method and system for use in generating authentication codes associated with devices is disclosed. In at least one embodiment, the method and system may...
Hardware-based zero-knowledge strong authentication (H0KSA)
Systems and methods are provided for a device to engage in a zero-knowledge proof with an entity requiring authentication either of secret material or of the...
Information processing system, information processing method, and
non-transitory computer readable medium for...
An information processing system includes a management unit that manages information of an object that determines at least one of a parent and a child of the...
Method and apparatus for providing secure streaming data transmission
facilities using unreliable protocols
The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one...
Method for obscuring a control device's network presence by dynamically
changing the device's network addresses...
A network security system comprises a first component that generates an address for identifying a communicating device on a network. A second component receives...
Encryption key destruction for secure data erasure
Techniques for encryption key destruction for secure data erasure via an external interface or physical key removal are described. Electrical destruction of key...
Enciphering apparatus and method, deciphering apparatus and method as well
as information processing apparatus...
The invention provides an enciphering apparatus and method, a deciphering apparatus and method and an information processing apparatus and method by which...
Encryption device, decryption device, encryption method, decryption
method, and program
An encryption device generates non-commutative matrices A1, A2 based on private data A and prime numbers p1, p2, and operates the non-commutative matrices A1,...
Security of a multimedia stream
A method including receiving encrypted multimedia information of a multimedia broadcast multicast service streaming session, wherein the multimedia information...
Transmitter, receiver, quantum key distribution (QKD) system and quantum
key distribution method
According to an embodiment, a transmitter transmits first transmission key data and second transmission key data as quantum information. The transmitter...
Securing method for lawful interception
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and...
Encryption scheme in a shared data store
An improved key encryption system is provided for encrypting sensitive data on a shared data store. Various embodiments contemplate a system where a plurality...
Information processing apparatus and program product
According to one embodiment, an information processing apparatus, which is connected to an external apparatus, includes a device key storage unit, a creating...
Methods and systems for personal authentication
A method for creating personal authentication keys includes the steps of determining a number of RFID tags, generating a key, partitioning the key into a number...
Instructions and logic to provide SIMD SM4 cryptographic block cipher
Instructions and logic provide for a Single Instruction Multiple Data (SIMD) SM4 round slice operation. Embodiments of an instruction specify a first and a...
Methods and apparatus for trimming of CDR clock buffer using phase shift
of transmit data
Methods and apparatus are provided for trimming one or more clock buffers in a clock and data recovery system in a receiver using a phase shift of the transmit...
Method and related communication device for handling communication between
time division duplex devices
A method of handling communication between time division duplex (TDD) devices for a network in a wireless communication system includes selecting at least two...
Communication method for performing dynamic radio dormant mechanism
A communication method for a communication station to transmit time division duplex frames includes transmitting a capability of supporting a dynamic radio...
MAC protocol for full duplex wireless communications
Disclosed in some examples are systems, methods, and machine readable mediums which allow for the deployment of advanced radios which are capable of...