Searching in Telecom & Technology · Search everything

662 changes Telecom & Technology

Favicon for changeflow.com

Patent Assigns Tasks to Underutilized Storage Network Resources

The USPTO has published a patent application (US20260086899A1) by Pure Storage, Inc. detailing a method for assigning tasks to underutilized storage network resources. The invention groups storage units based on utilization and assigns tasks accordingly to optimize performance.

Routine Notice Intellectual Property
Favicon for changeflow.com

Patent Application for Data Retrieval in Distributed Storage Network

The USPTO has published a patent application (US20260086900A1) for a method of auditing data retrieval in a distributed storage network, assigned to Pure Storage, Inc. The application details a process for selecting, retrieving, and decoding encoded data slices to reproduce a data object and send audit information to a user device.

Routine Notice Technology
Favicon for changeflow.com

Patent: Upload digital content to CDN via signed token

The USPTO has published a patent application detailing a method for uploading digital content to a Content Delivery Network (CDN) using a digitally signed token. The application, filed by NAGRAVISION SÀRL, describes a process involving a content provider, a certificate authority, and a content transmission network.

Routine Notice Intellectual Property
Favicon for changeflow.com

Patent Application: Real-Time JavaScript Malware Detection

The USPTO has published a patent application (US20260087138A1) for a real-time JavaScript malware detection system. The application, filed on November 26, 2025, aims to improve detection speed and accuracy for malicious code encountered by computing systems.

Routine Notice Cybersecurity
Favicon for changeflow.com

Holographic Encryption System Using Environmental Data for Keys

The USPTO has published a patent application for a holographic encryption system that uses environmental data to generate encryption keys. The system aims to create adaptive and real-time encryption patterns based on monitored environmental conditions and laser light interactions.

Routine Notice Cybersecurity
Favicon for changeflow.com

USPTO Patent Application: Quantum Computing for Secure Multiregional Interactions

The USPTO has published a patent application detailing a system and method for securing multiregional interactions using quantum computing. The application, filed on September 25, 2024, outlines a process involving quantum machine-learning models to verify user identity for initiating secure interactions.

Routine Rule Cybersecurity
Favicon for changeflow.com

Patent Application: Validating Cached Inputs for Machine Learning Models

The USPTO has published a patent application (US20260087400A1) detailing a method for validating cached input data for machine learning models. The application, filed on September 20, 2024, describes a hierarchical input pipeline that ensures data integrity before processing.

Routine Notice Intellectual Property
Favicon for changeflow.com

NEC Patent for Secure Communication and Model Integration

The USPTO has published a patent application by NEC Corporation for a learning apparatus designed for secure communication and integration of local AI models across different organizations. The application details a method for establishing secure communication, acquiring local models, and integrating them.

Routine Notice Cybersecurity
Favicon for changeflow.com

Dell Patent for Cross-Domain Authentication in Cloud-Native Environment

The USPTO has published a patent application from Dell Products L.P. for a system and method for cross-domain authentication in a cloud-native environment. The application details how a control panel can manage node authentication tokens to facilitate access to compute nodes via a web browser.

Routine Notice Cybersecurity
Favicon for changeflow.com

Patent for Native-Speed Encrypted Data Processing Cryptography

The USPTO has published a patent application for a multimodal memory integrated circuit with native-speed encrypted data processing for use in unbreakable cryptography. The application details a method for processing encrypted data on-chip using one-time pad keys.

Routine Notice Cybersecurity

Showing 551–560 of 662 changes

1 54 55 56 57 58 67

Filters

Clear