At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus for increasing the number of training and data tones
in wireless communications systems
Accordingly, systems and methods for managing power when the number of training and data tones are increased in a wireless communications system are provided....
AAS direct signaling framing methodologies to support high capacity
A new frame structure applicable to the IEEE 802.16 OFDMA wireless waveform is described, for the purposes of increasing base station capacity, increasing...
Digital communication receiver using partial knowledge of the channel
The present invention proposes a demodulator device, a receiver and a demodulation method for M-ary amplitude shift keying systems (MASK) that requires partial...
In-band data communication system using wireless power
Provided is data transmission and reception that transmits and receives data using a wireless power between wireless power transmitter and a wireless power...
Communication apparatus, circuit for communication apparatus, and
In a communication apparatus which performs wireless communication over a plurality of lines, a reduction in transmission efficiency is prevented from...
Apparatus are disclosed, such as those involving a transmitter circuit that is configured to generate multi-level signals based on a plurality of data digits....
Pulse generation device
Provided is a pulse generation device capable of suitably adjusting and outputting a pulse pattern by a simple configuration. A pulse generation device (100)...
Method performed by a sphere decoder based turbo equalizer
A sphere decoder based turbo equalizer is described. A method comprises assorting in a first vector Quadrature Amplitude Modulation, QAM, symbols on a...
An information handling system (IHS) selectively performs duty-cycled equalization of data transmission on a communication link between a sending component and...
Decision feedback equalizer
A decision feedback equalizer for N-level amplitude modulated signal, includes: (N-1) level conversion circuits to add (N-1) shifting voltages to the amplitude...
Communication system and communication terminal
A transmitting circuit is connected to a communication line and configured to transmit a primary signal, being a current signal, to the communication line by...
Assured messaging system with differentiated real time traffic
A method of managing shared resources for controlling message flows in an assured message delivery system having a plurality of clients involves identifying...
Social collaborative scoring for message prioritization according to an
application interaction relationship...
Embodiments of the present invention address deficiencies of the art in respect to message prioritization and provide a novel and non-obvious method, system and...
Method and system for VXLAN encapsulation offload
A method for virtual extensible local area network (VXLAN) encapsulation. The method includes receiving a first augmented MAC frame on a first ingress port of a...
Method and apparatus for quality of service (QoS) planning for an Ethernet
A method for determining required routes through an Ether based network associated with VLANs by determining a set of spanning trees. The set of spanning trees...
Intelligent illumination device
Intelligent illumination device are disclosed that use components in an LED light to perform one or more of a wide variety of desirable lighting functions for...
System and method for service level management
The system and method described herein may provide service level management, wherein business processes may be composed of services. A state of the service may...
Method for protection switching in ethernet ring network
A method for protection switching in an Ethernet ring network is provided. According to an aspect, the protection switching method includes: at a first node on...
Forwarding multicast data packets
A gateway routing bridge of a data center, obtains nicknames of designated routers (DR) of a multicast group in each virtual local area network (VLAN);...
Contextual chat based on behavior and usage
Techniques are disclosed for providing an enhanced contextual chat feature in online environments. The contextual chat feature may be used to present users with...
Detection of repair nodes in networks
An apparatus and method for detection of repair nodes in a network. In one embodiment of the method, a first node generates a first message and a second...
Method and system for managing user location information in a
A system that incorporates the subject disclosure may include, for example, receive a subscription from an application server where the subscription identifies...
Method and apparatus for managing joining events for G.fast vectoring with
In general, the present invention provides an efficient usage of Far End Crosstalk (FEXT) coefficient memory in a G.fast vectoring system. According to certain...
Method for transmitting and receiving data
A method for transmitting and receiving data between a plurality of nodes includes: determining, by one node, whether or not a data size of transmission target...
Apparatus and method for providing digital signature
Disclosed are an apparatus and method for providing a digital signature. The apparatus includes a certificate unit, an input unit receives a selection input for...
Method and apparatus for registering devices capable of device-to-device
communication in server
A method and an apparatus for validating device-to-device (D2D) communication devices in a server via a mobile terminal are provided. A 1st device-to-device...
Deleting encoded data slices in a dispersed storage network
A method begins by a dispersed storage (DS) processing module receiving a request regarding at least a portion of corresponding encoded data slices, wherein a...
Provisioning using a generic configuration
An apparatus, method, system and computer-readable medium are provided for provisioning a user equipment device (UED). The UED may be configured to receive a...
Message digest generator
A message digester includes an append bits module that appends padding bits to a message, an append length module that appends length data to the message, the...
Identity based encryption
Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server,...
Communication device, communication method, and computer program product
According to an embodiment, a communication device includes a first manager, and a second manager, a first communication unit, a determination unit, a...
Random identifier generation for offline database
Various embodiments of the present technology involve creating a secure unique identifier for a content item to be used in a synchronized content management...
Generating a session key for authentication and secure data transfer
A key-generating apparatus is provided for generating a session key which is known to a first communication apparatus and a second communication apparatus, for...
Information distribution system using quantum entanglement in a timed
network delivery system
A method and apparatus comprising a source node. The source node is configured to transmit information using particles with quantum entanglement in a network...
Quantum key management
Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example...
Group management of authenticated entities
Exemplary embodiments provide various techniques for managing groups of authenticated entities. In one exemplary computer-implemented method, an entity accesses...
Cryptographic key manager for application servers
Embodiments relate to systems and methods for maintaining cryptographic keys for application servers. In particular, applications and/or services of the...
Encrypted boot volume access in resource-on-demand environments
In a resource-on-demand environment, dynamically created server instances are allowed to boot from encrypted boot volumes. Access keys to the boot volumes are...
Symmetric keying and chain of trust
The present application is directed to symmetric keying and chain of trust. In one embodiment a prover may communicate with a verifier to perform device or data...
Storage associated with a virtual machine or other type of device may be migrated between locations (e.g., physical devices, network locations, etc.). To...
Method and apparatus for migrating encrypted data
An approach is provided for managing the migration of large amounts of encrypted data. A migration platform processes a master key associated with the source...
Electronic key registration method and electronic key registration system
A method for registering a first electronic key, which is capable of controlling a communication subject, to a controller of the communication subject, the...
System and method for transmitting data
A method of transmitting authorization data, said authorization data for authorizing a process. The method comprises securely providing an encryption key to an...
Method for generating a random output bit sequence
A method and a random bit generator for generating a random output bit sequence. In this method, a configuration of 2.sup.n state machines is used, the state...
Electronic key registration system
An electronic key registration system includes an electronic key device that stores a key ID and a first piece of information. A controller is arranged in a...
Data protection method and apparatus
A data protection method and apparatus that can protect data through encryption using a Boolean function is provided. The data protection method includes...
Computer-implemented system and method for providing secure data
processing in a cloud using discrete...
A computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption is provided. Plaintext data items...
Information processing technique for secure pattern matching
An encrypted first polynomial that is obtained by encrypting, in a homomorphic encryption method that handles a polynomial processing, a first polynomial, is...
Authentication device, output device, verification device and input device
According to an authentication device is for authenticating the validity of a subject ciphertext generated by encrypting a plaintext using homomorphic...
Data reception apparatus and method of determining identical-value bit
length in received bit string
A data reception apparatus calculates an integrated number of bits by integrating the number of bits in a received bit string; calculates an integrated number...