At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Presentation of organized personal and public data using communication
Systems, methods and computer program products for providing information associated with an attachment (e.g., attachment received through an instant message...
Enhanced audio video bridging (AVB) methods and apparatus
A packet is received via a port of the network device, and a database lookup is performed using header information of the packet. A priority associated with the...
Modem interface using virtual local-area network tagging
An interface between an application processor device and a modem device uses virtual local-area network (VLAN) tagging of Ethernet frames. An example modem...
Data center networks
Measures for establishing connectivity in a data center network are provided. A virtual connection is created between a virtual system hosted on a server in a...
Connecting a PVLAN switch to a non-PVLAN device
A PVLAN switch for connecting a PVLAN to a non-PVLAN device is configured as a primary VLAN with secondary VLANs, the primary VLAN includes promiscuous ports,...
BUS device and BUS system with consumers, producers, and an allocation
A device, a fluidic system, a BUS system and a method of operating this BUS system are indicated. The BUS system includes a multitude of users which are...
Method and apparatus for network and service controlled hybrid access
A method for network controlled optimization of hybrid access traffic management for a residential user connected via a hybrid access home gateway, which...
Using a control panel as a wireless access point
A method for providing wireless access to one or more wireless devices using an automation system control panel is described. In one embodiment, a communication...
System and method of WiFi router based presence detection and control
A WiFi router based appliance control system and method. The router infers the presence of certain human or animal users based on the association between the...
System and method for video multicasting
A method for operating a cooperating user equipment (CUE) includes receiving a plurality of video packets that are hierarchically modulated (HM), with each...
Optimization of rules used for prevention of duplication and looping of
multicast traffic within a multi-homed...
A method, apparatus and computer program product for prevention of duplication and looping of multicast traffic within a multi-homed cluster of backbone edge...
Message processing method and device
A message processing method and device, the method comprises: allocating a node to an input message in a cache space for saving the message, and taking the...
Methods and systems for transmitting broadcast data
A method carried out by a first communication gateway for transmitting broadcast data. Broadcast data is first received through a first network interface. The...
Method for generating a real time billing information in a packet
switching based network and network element
The present invention proposes a method for generating a real time billing information in a packet switching based network and a network element for...
Physically unclonable function and helper data indicating unstable bits
Approaches for using a physically unclonable function (PUF) are described. A selector map is used to indicate stable and unstable bits in a PUF value that is...
Embedding information or information identifier in an IPv6 address
A network address includes a predefined portion that identifies a hostname, where the predefined portion is less than all of the network address. A request is...
System and method for authentication for transceivers
A method and apparatus of a network element that authenticates a transceiver and/or a field replaceable unit of the network element is described. The network...
Creating a new file for a dispersed storage network
A method begins by a dispersed storage (DS) processing module receiving a file creation request to create a new file from portions of a set of existing files....
User-configurable cryptographic interface controller
Systems and methods for scalably provisioning cryptographic devices in a distributed computing environment are described. In some embodiments, a cryptographic...
Centralized datastore password management
According to some embodiments, an application server may have a repository to facilitate a transfer of data between data storage elements. A datastore may be...
Compressing encrypted data without the encryption key
A method, system and computer program product are disclosed for compressing encrypted data, wherein the data is encrypted by using a block encryption algorithm...
System and method for hypervisor-based remediation and provisioning of a
A computer located outside of an organizational computing environment is remotely prepared and configured to work in the organizational computing environment. A...
Secure storage for shared documents
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption...
Blinding function in elliptic curve cryptography
A blinding function is generated. The blinding function is applied to a random value to generate a blinded random value. The blinded random value is utilized...
Optical receiving device in optical communication system, control method
and device of photon detector, and...
[Problem] It is to provide an optical receiving device, a control method and device of a photon detector, and a dark count evaluation method of the photon...
Perfect forward secrecy distributed denial of service attack defense
Provided are methods and systems for mitigating a DoS attack. A method for mitigating a DoS attack may commence with receiving, from a client, a request to...
Identifying security boundaries on computing devices
During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a...
Digital security bubble
A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message...
Order-preserving encryption system, encryption device, decryption device,
encryption method, decryption method,...
An encryption device comprises: a storage module for pre-storing an encryption key which is necessary for encryption processing; a pre-processing function unit...
Event-driven, asset-centric key management in a smart grid
A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event...
Streaming one time pad cipher using rotating ports for data encryption
A streaming one time pad cipher using rotating ports for data encryption uses a One Time Pad (OTP) and an Exclusive Or (XOR) (or other cipher) with a public key...
Methods and systems for storing and retrieving data
Through use of the technologies of the present invention, one is able to store and to retrieve data efficiently. One may realize these efficiencies by coding...
A device for decrypting data includes a number of devices secured by at least one security device. The secured devices include a receiver for receiving...
Protecting a white-box implementation against attacks
A method of performing a keyed cryptographic operation mapping an input message to an output message, wherein the cryptographic operation includes at least one...
Circuit for dynamically adaptive bit-leveling by incremental sampling,
jitter detection, and exception handling
A circuit and method for implementing an adaptive bit-leveling function in an integrated circuit interface is disclosed. During a calibration operation, a...
Digital system for estimating signal non-energy parameters using a digital
phase locked loop
A digital system of measuring parameters of the signal (phase, frequency and frequency derivative) received in additive mixture with Gaussian noise. The system...
A transmission apparatus includes: a plurality of logical lanes; a receiver configured to receive a signal including synchronization information of a frame; a...
Phase detection in an analog clock data recovery circuit with decision
An embodiment of the invention relates to a method of phase detection in a receiver circuit with decision feedback equalization. Partial-equalization and...
Deskew FIFO buffer with simplified initialization
A source-synchronization interface circuit includes: a sender synchronous-to-asynchronous protocol converter that receives sender data and a sender clock and...
Phase interpolator and clock and data recovery circuit
A phase interpolator including a phase interpolation circuit, a plurality of low pass filtering channels, and a multiplexing circuit is provided. The phase...
Reference-less frequency detector with high jitter tolerance
An apparatus, comprising a first sampling circuit configured to sample a clock signal according to a data signal to produce a first sampled signal, a second...
Method and apparatus for synchronization of slave clock to master clock
Existing synchronization methods can be inefficient in hardware-assisted implementations because of the effects of various jittery events. Thus, a method and an...
Periodic communication method between at least one first system and at
least one second system by means of a...
The invention relates to a periodic communication method between at least one first system (2) and at least one second system (3) by means of a full-duplex...
Configuring uplink subframes and controlling power in a carrier
aggregation system when the DCI format has...
The present invention relates to a wireless communication system. More particularly, the present invention relates to a method and an apparatus for a terminal...
Methods and devices for random access
One embodiment of the present disclosure relates to a method for random access in a UE in an out-of sync status. The method comprises: sending to a base station...
Method for transmitting control information and apparatus therefor
A method and device for transmitting uplink control information in a wireless communication system supporting carrier aggregation and operating in TDD are...
Interference management for adaptive TDD with frequency domain separations
A method of wireless communications includes adapting to downlink/uplink resource allocations. In particular, the downlink/uplink communications may be adjusted...
Method and apparatus for dynamically adjusting data transmission
parameters and controlling H-ARQ processes
A method and wireless transmit/receive unit (WTRU) for uplink data transmission is disclosed. Information indicating an allowed limit for uplink data...
User equipment, and method and system side for configuring physical
resource block of search space thereof
A method for configuring a physical resource block of a user equipment search space includes: a system side configuring a Physical Resource Block (PRB) pair of...
Method for transceiving signal in wireless communication system, and
The present invention relates to a method for transceiving a signal in a wireless communication system. A method for transceiving a signal in a wireless...