At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Generating proxy automatic configuration scripts
Methods and systems for generating a proxy automatic configuration (PAC) script based on the location of a device. One example method includes receiving a...
System and method for webtier providers in a cloud platform environment
Described herein is a system and method for supporting a webtier provider in a cloud computing environment. In accordance with an embodiment, the service types...
Communication system, management device, network node, and communication
It is an object of the present invention to provide a communication system that makes it possible to designate, from among a plurality of first network nodes...
Method and equipment for configuring a software-defined network
A method for configuring a network element of a software-defined network "SDN" is presented. The network element maintains at least one look-up table defining...
Hardware based fast convergence for network failures
Certain features required for routing decisions are provided by hardware. For example, the router logic may be modified to provide multiple alternative paths...
System and method for taking sequence of dynamic recovery actions
The present disclosure relates to a system and method for enabling SNMP (Simple Network Management Protocol) based Network Management System to correlate and...
Methods and apparatus for providing content delivery instructions to a
Described are computer-based methods and apparatuses, including computer program products, for policy-based content insertion. A client device transmits to a...
Monitoring gateway systems and methods for openflow type networks
A network management gateway device, method, and software is disclosed which communicates and translates between more sophisticated digital data network...
Multiple-node communication link management
Multiple-node communication link management apparatus and methods are disclosed. Management information is exchanged between a management system and a local...
Techniques for group messaging on a mobile computing device
Techniques for group messaging on a mobile computing device are described. An apparatus may comprise a message server to communicate messages between multiple...
Accelerating USB redirection over a network
In particular embodiments, a client computing device identifies a USB device connected to the client computing device. The client computing device redirects the...
Message handling in a communications network
A method and apparatus for handling a Session Initiation Protocol message in a communications network. When a network node receives a Session Initiation...
System and method for contact merge management
In various example embodiments, a system and method for contact merge management is provided. In example embodiments, a contact management system detects that a...
Assembling a primitive having information elements with a structure
recognizable by a terminal device and...
A data structure defining two-level identification allows the integration of mobile instant messaging to Internet based instant messaging, for instance, by...
Method and device for selective decoding of beacon frame in wireless LAN
The present invention relates to a wireless communication system, and more particularly, to a method and device for performing or supporting selective decoding...
Apparatus for transmitting broadcast signals, apparatus for receiving
broadcast signals, method for...
A method and an apparatus for transmitting broadcast signals thereof are disclosed. The apparatus for transmitting broadcast signals comprises an encoder for...
Iterative normalization technique for reference sequence generation for
zero-tail discrete fourier transform...
Systems, methods, apparatuses, and computer program products for generating sequences for zero-tail discrete fourier transform (DFT)-spread-orthogonal frequency...
Signal processing apparatus and method
Reference gain values Ga1, Gb1 and Gc1 are set for respective EQ points A, B and C of a plurality of frequency bands in EQ CURVE 1 currently set in an EQ...
Zero insertion for ISI free OFDM reception
An apparatus (UEA) may generate a zero-tail signal to be transmitted in an LTE/LTE-A cell, by introducing time domain samples with zero power or very low power...
Methods and circuits for adaptive equalization
An integrated circuit equalizes a data signal expressed as a series of symbols. The symbols form data patterns with different frequency components. By...
Multiphase receiver with equalization circuitry
An integrated circuit device includes a sense amplifier with an input to receive a present signal representing a present bit. The sense amplifier is to produce...
Channel estimation device, receiving device, channel estimation method,
channel estimation program, and...
A sum of products calculation of a predetermined tap number of tap data and a prescribed tap number of coefficients is carried out and a sum of the...
Methods and apparatus for monitoring occupancy of wideband GHz spectrum
and sensing and decoding respective...
Methods and apparatus for monitoring wideband GHz spectrum for wireless communication, and sensing and decoding respective frequency components of a...
Access gateway management system
An Access Gateway Management System (AGMS) allows telephone operating companies to transition their existing wireline customers over to Voice over the Internet...
Data transmission device for remote monitoring and remote controlling in a
distributed process system
A data transmission device remotely monitors and controls a distributed process system, which exchanges data with a superordinate communication unit via an...
Computerized apparatus with a high speed data bus
A computerized apparatus configured for high-speed data transactions between components thereof. In one embodiment, the computerized apparatus includes a...
Security system and method using home gateway alliance
A security system using home gateway alliance includes an alliance management server which includes a gateway registration unit which registers at least one of...
Lightweight multicast acknowledgement technique in communication networks
In one embodiment, a message is received at a caching node in a network including an indication of the message's urgency. The message is transmitted to child...
Method and apparatus for scanning in wireless LAN
Disclosed are a method and an apparatus for scanning in a wireless Local Area Network (LAN). A method for scanning by a station (STA) comprises the steps of:...
Method for enhanced uplink transmission having low PAPR in LTE-based
mobile communication system
Provided is a communication method for downlink transmission with a low peak to average power ratio (PAPR) and compatibility with long-term evolution...
Communication processing method and base station
A base station receives channel state information corresponding to each of spare coordinated groups from each of user devices. A first group includes a...
Workspace collaboration via a wall-type computing device
Multi-user, multi-computing device collaborative work experience is provided. One or more computing devices, including wired and wireless personal computers,...
Systems and methods for conferencing enterprise and non-enterprise callers
The illustrative embodiments described herein provide improved systems and methods for conferencing enterprise and non-enterprise callers. In one embodiment, a...
Distributed antenna system using power-over-ethernet based on a resistance
of a channel
A system is provided for adjusting power provided over a channel to a device. The system can include power sourcing equipment and a sub-system. The power...
Power supply controller, relay node device, wired ad-hoc network system,
and power supply control method
A power supply controller includes a first port, a second port, and a controller. The first port is connected to a power supply device. The second port is...
Method of authenticating a device
The invention is a method for authenticating a device which comprises a chip and a body carrying the chip. The body comprises a graphical security feature. The...
Compression of cryptographic chaining certificates
A method, system and computer-readable medium for establishing secure connections using compressed cryptographic chaining certificates, the method including...
Dual layer transport security configuration
A system includes a first computer processor that receives a data transmission from a second computer processor. The data transmission includes a client...
Controlling access to clinical data analyzed by remote computing resources
A method for controlling access to data being processed by a remote computing resource includes issuing a public encryption key for a data creator from a public...
Using multiple digital identification documents to control information
A first digital identification document is transmitted from an identification authority to a mobile device of an identified individual. This first digital...
Automatic E-signatures in response to conditions and/or events
Techniques are disclosed that allow for automatic signing of a digital document in response to some event and/or when the document satisfies some predefined...
Method of sending a self-signed certificate from a communication device
A method of sending a self-signed certificate from a communication device, the self-signed certificate being signed by the communication device. The method...
Model based multi-tier authentication
Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication...
Image processing apparatus, biometric authentication apparatus, image
processing method and recording medium
Interlace noises of the image of an iris included in the image of an eye picked up through an interlaced scheme are corrected precisely within a short time. An...
Device, method, and medium for facility management verification
An equipment manager manages the operating state of equipment. A user verification processor performs user verification according to a request from a monitoring...
Public key encryption methods and apparatus are provided for encrypting secret data under a public key in a data processing system (1). The secret data is...
System and method of notifying mobile devices to complete transactions
A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform;...
Data authentication using plural electronic keys
A method for transmitting digital data to a recipient via a communications network includes providing digital data and digitally signing the digital data using...
Secure key storage using physically unclonable functions
Some implementations disclosed herein provide techniques and arrangements for provisioning keys to integrated circuits/processors. A processor may include...
Multi-level key hierarchy for securing cloud-based data sets
A hierarchy is defined that includes encryption keys associated with different first and second levels of the hierarchy, where the second level includes fewer...