Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,026,3795 System and method for reducing the energy consumption of an interconnection device
A device for interconnecting a first communication network and a second communication network comprises a plurality of components functioning in an active mode...
US-1,026,3794 Maintain power signature controller at power interface of PoE or PoDL system
The invention pertains to systems where DC power is supplied by a PSE to a PD, such as over differential data wire pairs. IEEE standards require a minimum...
US-1,026,3793 Devices with modifiable physically unclonable functions
A device may include a physically unclonable function (PUF) source that has at least one fuse embedded in the device. The PUF source may be responsive to an...
US-1,026,3792 Cryptographic key escrow
An escrow platform is described that can be used to enable access to devices. The escrow platform can be used to sign cryptographic network protocol challenges...
US-1,026,3791 Acceleration of online certificate status checking with an internet hinting service
Examples for acceleration of online certificate status checking with an Internet hinting service are disclosed. For example, one method includes receiving, by a...
US-1,026,3790 Unified programming environment for programmable devices
A secure programming system can receive a job control package having a security kernel and a target payload of content for programming into a pre-defined set of...
US-1,026,3789 Auto-generation of security certificate
A service provider network includes a certificate manager that auto-generates and auto-renews security certificates for customers of the provider network. The...
US-1,026,3788 Systems and methods for providing a man-in-the-middle proxy
A method for operating a secure man-in-the-middle proxy includes intercepting an attempt to establish a connection between an application and a network server...
US-1,026,3787 Scalable authentication for decentralized applications
Disclosed embodiments relate to decentralized and scalable trust among a plurality of decentralized applications. Techniques include receiving, at a first...
US-1,026,3786 Intelligent sensor and controller framework for the power grid
Disclosed below are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric power grid. For example, one...
US-1,026,3785 Cryptography method and system for securing data via electronic transmission
Securing information is increasingly difficult. With technological advances and tools/information sharing between hackers it is becoming even more difficult to...
US-1,026,3784 Signature verification for data set components using probabilistic data structures
A computer system stores a probabilistic data structure generated based at least in part on a plurality of digital signatures generated based at least in part...
US-1,026,3783 Method and system for authenticating a data stream
A method for authenticating a data stream includes selecting a number of data fragments of the data stream, defining at least two granularity levels for the...
US-1,026,3782 Soft-token authentication system
A system for authenticating a user and his local device to a secured remote service with symmetrical keys, which utilizes a PIN from the user and a unique...
US-1,026,3781 IC chip and authentication method for user authentication
An IC chip for preventing an authentication key from leaking, and an authentication key setting and authentication key verifying method are provided. A part...
US-1,026,3780 Encryption and authentication method and apparatus
The invention discloses a method for encrypting and/authenticating, comprising the following steps: Sending a request for a first bit combination or character...
US-1,026,3779 Secure communications using loop-based authentication flow
A first party uses a secret key to encrypt information, which is then sent through an untrusted connection to a second party. The second party, however, cannot...
US-1,026,3778 Synchronizable hardware security module
An HSM cluster includes a set of hardware security modules that maintain a set of cryptographic keys that are synchronized across the HSM cluster. Individual...
US-1,026,3777 Systems and methods for secure communications using organically derived synchronized encryption processes
Organically Derived Synchronized Processes provide encryption parameter management in a certificate-less system. A first node generates a parameter data set...
US-1,026,3776 Multi-level encryption of tokenized protected data
A system uses a multi-level encryption and tokenization mechanism to allow for fields of a larger object to be individually tokenized and encrypted. Protected...
US-1,026,3775 Policy-based key recovery
A device establishes a key recovery policy and generates a key that is protected based on the key recovery policy. The key recovery policy indicates which...
US-1,026,3774 Ensuring authenticity in a closed content distribution system
A technique for maintaining encrypted content received over a network in a secure processor without exposing a key used to decrypt the content in the clear is...
US-1,026,3773 Method for updating a public key
A method for updating a public key is provided. The method includes: acquiring, by a transmitting-end device, a first hash value calculated based on a first...
US-1,026,3772 Smart card chip for generating private key and public key pair, and generation method therefor
The smart card chip for generating a private key and public key pair in accordance with an embodiment of the present invention comprises: a communication unit...
US-1,026,3771 Two-way key switching method and implementation device
A two-way key switching method and an implementation device. The method includes: when acquiring a new key, any end in a communication link setting a new key...
US-1,026,3770 Data protection in a storage system using external secrets
A system, method, and computer-readable storage medium for protecting a set of storage devices using a secret sharing scheme in combination with an external...
US-1,026,3769 Flexible architecture and instruction for advanced encryption standard (AES)
A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a "one round" pass for aes...
US-1,026,3768 Protection of a calculation against side-channel attacks
A method for protecting a ciphering algorithm executing looped operations on bits of a first quantity and on a first variable initialized by a second quantity,...
US-1,026,3767 System and method for power analysis resistant clock
A system and method to mitigate or complicate the use of differential power analysis (DPA) and simple power analysis (SPA) in the attack of a targeted...
US-1,026,3766 Independent pair 3-phase eye sampling circuit
Methods, apparatus, and systems for data communication over a multi-wire, multi-phase interface are disclosed. A method includes recovering a first clock signal...
US-1,026,3765 Systems and methods for low-power single-wire communication
Systems and methods for low-power single-wire communication are provided. In some embodiments, a method of operation of a transmitter to transmit a data word to...
US-1,026,3764 Auto-adaptive digital clock system and method for optimizing data communications
A method for optimizing data communications includes receiving a plurality of data and comparing a size of the plurality of data to a preset fixed data packet...
US-1,026,3763 Systems, methods, and computer-accessible media for measuring or modeling a wideband, millimeter-wave channel...
Exemplary systems and methods can be provided for measuring a parameter--e.g., channel impulse response and/or power delay profile--of a wideband,...
US-1,026,3762 Physical layer circuitry for multi-wire interface
The present invention provides pad arrangements, termination circuits, clock/data recovery circuits, and deserialization architecture for a physical layer...
US-1,026,3761 Clock and data recovery having shared clock generator
This disclosure provides a clock recovery circuit for a multi-lane communication system. Local clocks are recovered from the input signals using respective...
US-1,026,3760 Method for time synchronization
Embodiments relate to a method for time synchronization and, more particularly, to a method for time synchronization between devices and the devices using the...
US-1,026,3759 Signal presence detection circuit and method
In some embodiments, the circuits (and methods) may include a reference generator configured to generate a reference signal. The circuits (and methods) may also...
US-1,026,3758 Half duplex FDD WTRU with single oscillator
Half duplex (HD) frequency division duplexing (FDD) in a wireless transmit-receive unit (WTRU) using a single oscillator (SO) for uplink (UL) and downlink (DL),...
US-1,026,3757 Filter circuit and module
A filter circuit includes: a first transmission filter connected between a first antenna terminal and a first transmission terminal; a second transmission...
US-1,026,3756 Asymmetric TDD in flexible use spectrum
A method according to an embodiment of the invention includes receiving and transmitting signals over a time division duplex (TDD) communication path. Signals...
US-1,026,3755 Method and apparatus for sending response information and computer storage medium
A method and an apparatus for sending response information and a computer storage medium are disclosed. The method comprises: determining a Hybrid Automatic...
US-1,026,3754 Wireless device architecture to support very-high-reliability (VHR) communication
The disclosure provides for an apparatus for wireless communications using carrier aggregation comprised of multiple carrier components. The apparatus can...
US-1,026,3753 Sub-channel selection based on transmit power
In order to improve the quality of communication between electronic devices, one or more sub-channels used during communication between the electronic devices...
US-1,026,3752 Communication method and electronic device for performing the same
An electronic device includes a first communication module, a second communication module, a memory, a processor configured to be electrically connected with...
US-1,026,3751 Robust channel RC-supporting coding and modulation method and apparatus
Embodiments of the present invention provide a robust channel (RC)-supporting coding and modulation method and apparatus. The method comprises: forming, on an...
US-1,026,3750 Cross indication of queue size in a reverse direction protocol
This disclosure describes systems, methods, and computer-readable media related to cross indication of queue size in a reverse direction protocol. In some...
US-1,026,3749 Transmission and reception signal processor and method
A transmission apparatus includes a plurality of orthogonal frequency division multiplexing (OFDM) modulation signal generators, which generate a first OFDM...
US-1,026,3748 Method and apparatus for transmitting uplink data and user equipment
A method and an apparatus for transmitting an uplink data and a user equipment is provided, the method includes: inserting multiple phase noise tracking...
US-1,026,3747 Downlink signal reception method and user equipment, and downlink signal transmission method and base station
Provided are a method and an apparatus for transmitting or receiving a downlink reference signal. A cell-specific downlink reference signal (CRS) is transmitted...
US-1,026,3746 Methods and systems for CSI-RS port selection for CSI-reporting
According to certain embodiments, a method in a network node is disclosed. The method comprises selecting a subset from a predetermined set of P CSI-RS ports...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.