1
Antonio Forenza, Stephen G Perlman: System and methods to compensate for Doppler effects in multi-user (MU) multiple antenna systems (MAS). REARDEN, Nicholson De Vos Webster & Elliott, April 12, 2016: US09312929 (133 worldwide citation)

A system and methods are described which compensate for the adverse effect of Doppler on the performance of DIDO systems. One embodiment of such a system employs different selection algorithms to adaptively adjust the active BTSs to different UEs based by tracking the changing channel conditions. An ...


2
Joe Britt, Shin Matsumura, Houman Forood, Scott Zimmerman, Phillip Myles, Sean Zawicki, Daisuke Kutami: Internet of things platforms, apparatuses, and methods. AFERO, Nicholson De Vos Webster & Elliott, November 15, 2016: US09497572 (76 worldwide citation)

An Internet of Things system and method are described. For example, one embodiment of a system comprises: an IoT hub comprising a WAN interface to couple the IoT hub to an IoT service over the WAN, and a local communication interface to communicatively couple the IoT hub to a plurality of different ...


3
John Graham Cumming: Embedding information or information identifier in an IPv6 address. CLOUDFLARE, Nicholson De Vos Webster & Elliott, February 28, 2017: US09584328 (19 worldwide citation)

A network address includes a predefined portion that identifies a hostname, where the predefined portion is less than all of the network address. A request is received for a secure session at the network address. The hostname is identified from the predefined portion of the network address and a sec ...


4
Rolf Lindemann: System and method for non-intrusive, privacy-preserving authentication. NOK NOK LABS, Nicholson De Vos Webster & Elliott, July 19, 2016: US09396320 (14 worldwide citation)

A system, apparatus, method, and machine readable medium are described for non-intrusive privacy-preserving authentication. For example, one embodiment of a method comprises: entering into a legitimate user state on a client device for a time period following an explicit authentication by an end use ...


5
Anthony Francois Gauda: Cloud file system. BITCASA, Nicholson De Vos Webster & Elliott, February 2, 2016: US09253166 (14 worldwide citation)

A cloud storage system supporting user agnostic encryption and deduplication of encrypted files is described. Further the cloud storage system enables users to share a file, a group of files, or an entire file system with other users without a user sending each file to the other users. The cloud sto ...


6
Lee Hahn Holloway, Srikanth N Rao, Matthew Browning Prince, Matthieu Philippe Fran├žois Tourne, Ian Gerald Pye, Ray Raymond Bejjani, Terry Paul Rodery Jr: Identifying a denial-of-service attack in a cloud-based proxy service. CLOUDFLARE, Nicholson De Vos Webster & Elliott, April 18, 2017: US09628509 (12 worldwide citation)

A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud-based proxy service; and responsive to determining that there are a plurality of domains that resolve to that IP address, id ...


7
Davit Baghdasaryan, Matthew Lourie, Rolf Lindemann, Brendon J Wilson, Marc Briceno: Query system and method to determine authentication capabilities. NOK NOK LABS, Nicholson De Vos Webster & Elliott, October 27, 2015: US09172687 (9 worldwide citation)

A system, apparatus, method, and machine readable medium are described for determining the authentication capabilities. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabi ...


8
Oren Ben Kiki, Ilan Pardo, Robert Valentine: Apparatus and method for fast failure handling of instructions. Intel Corporation, Nicholson De Vos Webster & Elliott, June 9, 2015: US09053025 (9 worldwide citation)

A processor is described comprising: instruction failure logic to perform a plurality of operations in response to a detected instruction execution failure, the instruction failure logic to be used for instructions which have complex failure modes and which are expected to have a failure frequency a ...


9
Michael Berger: Always-available embedded theft reaction subsystem. Intel Corporation, Nicholson De Vos Webster & Elliott, July 28, 2015: US09092957 (8 worldwide citation)

A system to provide an always-on embedded anti-theft protection for a platform is described. In one embodiment, the system comprises a motion detector to detect movement of the platform, a pairing logic to pair the platform with an other device, the other device reached via a network connection, and ...


10
Neda Beheshti Zavareh, Ying Zhang: Method and system of service placement for service chaining. TELEFONAKTIEBOLAGET L M ERICSSON, Nicholson De Vos Webster & Elliott, April 19, 2016: US09319324 (8 worldwide citation)

A method for placing services at network devices is disclosed. A network contains a plurality of network devices and the network offers a set of services to subscribers. Each subscriber of the network utilizes a subset of the set of service, where an order of the services is not predefined. The meth ...