324 patents
Page 16 of 17
Utility
Synchronization and Training Stage Operation
12 Feb 20
A primary device implementing the subject system of link establishment for single pair Ethernet may include at least one processor.
Chung Ming TU, Peiqing WANG, Ahmad CHINI, Yencheng CHEN, Mehmet Vakif TAZEBAY, Bazhong SHEN
Filed: 18 Aug 19
Utility
Methods for Resolving Different Message Data Block Formats Between Computer Program Instances and Related Systems and Computer Program Products
12 Feb 20
A method includes performing, by a processor: receiving a message, a message identification, and a hash value of a map specifying a layout of the message, comparing the hash value with a reference hash value associated with the message identification, requesting the map responsive to a mismatch between the hash value and the reference hash value, receiving the map, and decoding the message based on the map.
Paul Hinkley, Jordan Hisey, Mark Linker, John C. Tucker
Filed: 12 Aug 18
Utility
Method and Apparatus for Integrated Battery Supply Regulation
12 Feb 20
In some aspects, the disclosure is directed to methods and systems for providing voltage regulation and transient suppression from a battery to an integrated circuit.
Kambiz Vakilian, Jan Westra, Dmitrii Loukianov, Vikrant Dhamdhere, Jingguang Wang
Filed: 1 Aug 19
Utility
Database Record Access Through Use of a Multi-value Alternate Primary Key
12 Feb 20
A method includes performing by a host system processor: receiving a record insert request for a database, the record insert request comprising a primary key value and a semi-unique key value, the database comprising a record structure comprising a first primary key field, a second primary key field, and a semi-unique key field, the first primary key field comprising a flag portion for which a first flag value is indicative of the first primary key field containing a primary key and a second flag value is indicative of the first primary key field containing an alternate primary key, generating an alternate primary key value based on the primary key value and the semi-unique key value, the alternate primary key value having a portion thereof corresponding to the flag portion of the first primary key field set to the second flag value, generating a record comprising the alternate primary key value in the first primary key field, the primary key value in the second primary key field, and the semi-unique key value in the semi-unique key field, and communicating the record to the database.
Frederic Duminy, David Pflum, Timothy Dockter, James W. Peters, John C. Pinkowski
Filed: 9 Aug 18
Utility
Transaction Risk Assessment Based on Affinity Between Combinations of Users and Devices
12 Feb 20
A method includes performing by a processor: receiving a transaction request associated with a first user from a first device where a combination of the first user and the first device lacks an authentication history, determining that the first user or the first device is associated with a second user or a second device, determining that the second user or the second device has been authenticated, generating an affinity score that is representative of the association between the first user or the first device and the second user or the second device, and selecting an authentication requirement for acceptance of the transaction request based on the affinity score.
Vikrant Nandakumar, Vijay Shashikant Kulkarni, Lyju Rappai Vadassery, Seshadri Venkataraman
Filed: 8 Aug 18
Utility
Methods of Rendering a Mobile Application Page Based on Past Usage Information and Related Wireless Devices
5 Feb 20
Some embodiments disclosed herein are directed to methods of operating a wireless device.
Subhasis Kumar KHATUA, Narendra DHULIPALLA, Manoj GUDALA
Filed: 5 Aug 18
Utility
Toll Booth Added Security to Code Scanner
5 Feb 20
Methods, server, devices and registered terminals for requiring approval of toll charges are provided.
Deepak Dhondaley Satyanarayana, Sharath Kumar, Sanjay Rai, Stephen Prasad
Filed: 2 Aug 18
Utility
Dynamically Controlling Firewall Ports Based on Server Transactions to Reduce Risks
5 Feb 20
Methods and devices for opening a firewall port for a specified time period are provided.
Krishna Kumar Yadav Nukala, Vikas Pullagura, Shamayel Mohammed Farooqui, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa, Dharanidhar Sahu, Ramana Naga Venkata Mittapalli
Filed: 30 Jul 18
Utility
Electronic Assembly and a Method of Forming Thereof
5 Feb 20
An electronic assembly includes a substrate having a first surface and a second surface opposing the first surface.
Deog Soon Choi, Ah Ron Lee
Filed: 30 Jul 18
Utility
Robust Line Coding Scheme for Communication Under Severe External Noises
5 Feb 20
A system to implement a communication line coding scheme using a non-complex bit-to-symbol mapping, a forward error correction (FEC) coding, and an additive bit scrambler after the FEC at the PHY layer is provided.
Ba-Zhong SHEN, Ahmad CHINI, Chung Ming TU, Mehmet Vakif TAZEBAY
Filed: 13 Oct 19
Utility
Dynamic Cloning of Application Infrastructures
29 Jan 20
Techniques for dynamically cloning application infrastructures are provided.
Jeffrey P. HARTLEY, Atul GOSAIN
Filed: 3 Oct 19
Utility
Protection System Against Exploitative Resource Use by Websites
29 Jan 20
A browser resource controller combines code metric values with a complexity analysis of rendered content to determine whether resource metric values are appropriate for a web application.
Michal Zasadzinski, Marc Solé Simó, Victor Muntés-Mulero
Filed: 25 Jul 18
Utility
Power Amplifier Circuit with Diverting Current Path
29 Jan 20
A power amplifier circuit includes a coil circuit, a differential amplifier and a diverting current path.
Michael Wendell Vice, Jung-Min Oh, Jung-Lin Woo, Seung-Yub Lee
Filed: 25 Jul 18
Utility
User Authentication Based on Password-specific Cryptographic Keys
29 Jan 20
Techniques are disclosed relating to user authentication based on password-specific cryptographic keys.
Dhiraj Girdhar, Dipto Chakravarty
Filed: 23 Jul 18
Utility
Protocols for Flexible Channel Utilization
29 Jan 20
In some aspects, the disclosure is directed to methods and systems for utilizing protocols to enable two 802.11 devices to exchange their dynamically-changing local channel availability table and form a mutual channel availability table with time, frequency, and transmission rate domains available.
Sundaram Vanka, Matthew J. Fischer, Rohit Gaikwad, Vinko Erceg, Ron Porat
Filed: 2 Oct 19
Utility
Protocols for Flexible Channel Utilization
29 Jan 20
In some aspects, the disclosure is directed to methods and systems for utilizing protocols to enable two 802.11 devices to exchange their dynamically-changing local channel availability table and form a mutual channel availability table with time, frequency, and transmission rate domains available.
Sundaram Vanka, Matthew J. Fischer, Rohit Gaikwad, Vinko Erceg, Ron Porat
Filed: 2 Oct 19
Utility
Integrated Wireless Resonant Power Charging and Communication Channel
22 Jan 20
A wireless powering device for providing directional wireless power to a target device.
James D. Bennett
Filed: 26 Sep 19
Utility
Authentication Procedures with Randomization of Private Input Interface
22 Jan 20
Techniques are disclosed relating to using a randomized private input interface to secure passcode information.
Rohit Pathak, Abhijeet Kumar Singh, Sanjaya Kumar Sahu, Alok Gupta
Filed: 17 Jul 18
Utility
Location-based and Time-based Photo Authentication
22 Jan 20
A method is described for receiving a first request for authentication from a user, the first request including a current location, a current location keyword, a current timestamp, and a photo representing the current location.
Lyju Rappai VADASSERY, Vijay Shashikant KULKARNI, Vikrant NANDAKUMAR
Filed: 25 Sep 18
Utility
Apparatus and Method for Timestamping of Data Packets
15 Jan 20
An apparatus and method for timestamping data packets are provided.
Eric BADEN, Ankit BANSAL, Sharath GARGESHWARI
Filed: 23 Sep 19