04th week of 2020 patent applcation highlights part 64 |
Patent application number | Title | Published |
20200028610 | CHANNEL WIDTH AGILE COMMUNICATION METHOD - The present disclosure relates to a communication method related with channel width agile. The method uses a channel generation circuit at a signal transmitting end to generate a channel whose channel width can be changed according to a certain law, and a channel detection circuit at a signal receiving end corresponding thereto to detect the corresponding channel width by the same channel width agile law, thereby achieving the secure reception of the signal. Due to the agility of the channel width, communication security is ensured, and it does not conflict with other technologies (such as frequency hopping), and the channel width can be dynamically allocated. In this way, the advantages of high security, compatibility, and high spectrum utilization can be achieved. Meanwhile, the method realizes the maximum possible optimization of the channel and is very creative. | 2020-01-23 |
20200028611 | METHOD AND DEVICE FOR PERFORMING COMMUNICATION USING ORTHOGONAL OR NON-ORTHOGONAL CODE MULTIPLE ACCESS SCHEME IN WIRELESS COMMUNICATION SYSTEM - Provided is a method and device for transmitting uplink data by using a non-orthogonal code multiple access scheme in a wireless communication system. Specifically, a terminal supporting multiple layers receives an NoMA MCS index from a base station. The NoMA MCS index is selected from an NoMA MCS table on the basis of the quality of an uplink channel. The NoMA MCS table is defined in advance as a table including the NoMA MCS index, the number of multiple layers, and a modulation order. The number of multiple layers is determined according to the NoMA MCS index. The terminal transmits the uplink data configured on the basis of the NoMA MCS index, via the multiple layers. | 2020-01-23 |
20200028612 | BASE STATION, RADIO TERMINAL, RADIO COMMUNICATION SYSTEM, RADIO COMMUNICATION CONTROL METHOD, AND PROGRAM - A radio communication system ( | 2020-01-23 |
20200028613 | CROSS-CARRIER SOUNDING WITH APERIODIC CHANNEL STATE INFORMATION REFERENCE SIGNALS (CSI-RS) - Certain aspects of the present disclosure provide techniques for cross-carrier sounding with aperiodic channel state information reference signals (CSI-RS). | 2020-01-23 |
20200028614 | METHOD FOR POLAR CODING IN COMMUNICATION NETWORK - Embodiments of this application provide a method for processing information bits. A communication device obtains K information bits and a code length M. The code length M is a length of an output sequence resulting from processing the information bits. The communication device generates an N-bit bit sequence that includes the K information bits and one or more parity check bits, encodes the bit sequence using a polar encoding formula to obtain an N-bit encoded sequence, rate matches the encoded sequence to obtain the output sequence, modulates the rate matched sequence to obtain output sequence and outputs the output sequence. When M−K>192, in the bit sequence, one of the parity check bits is placed in a bit position that is determined according to reliabilities of the bit positions in the bit sequence for placing the K information bits and the one or more parity check bits. | 2020-01-23 |
20200028615 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING SIGNAL BY USING POLAR CODING - Disclosed are: a communication method for merging, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system; and a system thereof. The present disclosure can be applied to intelligent services (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety related services, and the like) on the basis of a 5G communication technology and an IoT-related technology. A method by which a transmitter in a communication system transmits signals, according to one embodiment of the present specification, comprises the steps of: determining depth information for generating a mother code size and a parity bit; applying a polar code sequence corresponding to an information bit; generating, on the basis of the mother code size and the depth information, a codeword including a parity bit associated with at least two bits among a plurality of bits to which the polar code sequence is applied; and transmitting the generated codeword. | 2020-01-23 |
20200028616 | APPARATUS AND METHOD FOR CONTROLLING RECEIVING DATA - An electronic device and a method of operating the electronic device in a wireless communication system are provided. The method includes determining whether to perform a partial decoding or a normal decoding based on a channel quality; if partial decoding is performed, decoding partial data received by a transceiver from a second electronic device during a part one TTI; when the decoding of the partial data succeeds, performing at least one complementary decoding until a decoding success count reaches a decoding threshold; and when the decoding success count reaches the decoding threshold, outputting a decoding result for the at least one complementary decoding; and if normal decoding is performed, decoding all data of the one TTI and outputting a result. One of the at least one complementary decoding comprises decoding previous data, and additional data received by the transceiver during an additional part of the one TTI, after the previous data. | 2020-01-23 |
20200028617 | USING LATTICE REDUCTION FOR REDUCED DECODER COMPLEXITY - Methods, systems, and devices for wireless communications are described. Some wireless communications systems may utilize beamforming techniques to process wireless communications transmitted in millimeter wave (mmW) frequency ranges. In such cases, a user equipment (UE) may perform lattice reduction (LR)-based preprocessing for a received resource element (RE), which allows the UE to utilize demapping techniques (e.g., minimum mean square error (MMSE)-based demapping techniques or successive interference cancellation (SIC) demapping techniques) that are less computationally-complex than conventional demapping techniques (e.g., maximum likelihood (ML)-based demapping techniques) while providing a similar performance as conventional techniques. Further, due to mmW systems' robustness to time-dispersion, the UE may apply the same LR to multiple REs across multiple symbols in the time domain and across multiple sub-carriers in the frequency domain. The computational cost of performing the LR calculation may be spread across multiple REs and further increase the efficiency of utilizing low-complexity demapping techniques. | 2020-01-23 |
20200028618 | DATA COMMUNICATION METHOD, DEVICE, AND SYSTEM - Various embodiments provide a data communication method. Under the method, a transmit end maps each code block group CBG in N CBGs to each layer in a corresponding layer group based on a correspondence between the N CBGs and N layer groups. Each layer group includes at least one layer, and N is a positive integer. The transmit end then sends data to a receive end. T transport block corresponding to the data includes the N CBGs. In this way, a mapping relationship between a CBG and a layer group is established by grouping layers, so as to improve data reception quality, through interference cancellation, for transmission among different layer groups, and ensure adaptivity to a CBG-based retransmission feedback, thereby optimizing transmission performance of an entire communications system. | 2020-01-23 |
20200028619 | ENCODING METHOD, DECODING METHOD, APPARATUS, AND DEVICE - A polar code encoding/decoding method in a communications system is provided, including: determining an information bit location set or a frozen bit location set of a polar code based on an interleaving operation or a corresponding de-interleaving operation; and encoding or decoding the polar code based on the determined information bit location set or frozen bit location set. | 2020-01-23 |
20200028620 | DEVICE FOR VERIFYING DATA TRANSMISSIONS AND METHOD USING THE SAME - A device using parity for verification of data transmitted from a first device through a data line to a second device includes a processor and a memory. The data line includes first to fourth pins for transmitting data and fifth to eighth pins for transmitting parity information. The processor receives values of first to eighth pins, calculates sum of the values of combinations of the first to fourth pins for data and applies modular operations on results of the four combinations. Equality or non-equality with the parity values of the fifth to eighth pins is determined, and the second device is permitted to receive the data when the results correspond, the modular operation being a (mod 2) operation. A method applied to such device is also disclosed. | 2020-01-23 |
20200028621 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING DATA IN COMMUNICATION SYSTEM - An apparatus and a method for transmitting and receiving a signal in a communication system are provided. The method includes checking a type of the signal to be transmitted; determining a number of puncture bits according to the type of the signal; and puncturing an encoded signal to be transmitted according to the number of puncture bits. | 2020-01-23 |
20200028622 | TRANSMITTER, RECEIVER AND METHODS - A transmitter for transmitting data to communications devices via a wireless access. The transmitter including modulator circuitry configured to receive modulation symbols of a segment and to rotate each modulation symbol by an angle dependent on a choice of modulation scheme, and receive each of the segments of rotated modulation symbols and for each segment to separate real and imaginary components of the rotated modulation symbols for the segment and to interleave the real components of the rotated modulation symbols of the segment differently to the imaginary components of the rotated modulation symbols of the segment. The circuitry also is configured to re-combine the real and imaginary interleaved components of the rotated modulation symbols of each segment and to form from the real and imaginary components modulation cells. | 2020-01-23 |
20200028623 | BLOCK BASED PREAMBLE DESIGN FOR AUTONOMOUS UPLINK TRANSMISSIONS - Methods, systems, and devices for wireless communications are described. A base station may assign a set of preamble blocks for autonomous uplink transmissions from a preamble block pool. A user equipment (UE) may identify indices for each of a set of indexed sequences to be transmitted over the set of preamble blocks. The UE may select or identify the indices by performing an encoding procedure on a set of parameters. The indices may be applied to the pool of indexed sequences, and the resulting set of sequences may be transmitted over the set of assigned preamble blocks. The base station may recognize composite sequences transmitted from UEs on respective sets of preamble blocks based on the set of sequences. Thus, the base station may identify a data transmission from the UE based on monitoring for and identifying the set of sequences transmitted on the preamble blocks. | 2020-01-23 |
20200028624 | SYSTEM AND TECHNIQUE FOR SLIDING WINDOW NETWORK CODING-BASED PACKET GENERATION - A method and apparatus decode packetized data in the presence of packet erasures using a finite sliding window technique. A decoder receives packets containing uncoded and coded symbols. When a packet with a coded symbol is received, the decoder determines whether a packet sequence number is within a sliding window of w consecutive sequence numbers that are no greater than a decoder sequence number, where the number w is fixed prior to encoding. When this is the case, the decoder decodes the coded symbol into one or more of the w input symbols using the coefficient vector. Decoding may use a forward error correcting (FEC) window within the finite sliding window. Decoding also may use a technique of Gaussian elimination to produce a “shifted” row echelon coefficient matrix. | 2020-01-23 |
20200028625 | DYNAMIC MANAGEMENT OF PACKET LOSS - Exemplary methods, apparatuses, and systems include duplicating a packet within a plurality of packets to be transmitted to a destination computing node as a sequence of packets. The plurality of packets including the duplicate of the packet are transmitted to the destination computing node. Upon receiving a first acknowledgement of the packet from the destination computing node, it is determined that the first acknowledgment is directed to a duplicated packet. In response to determining that the first acknowledgment is directed to a duplicated packet, it is determined that a second acknowledgement has yet to be received for each of one or more packets within the plurality of packets transmitted prior to the packet. In response to determining that the second acknowledgement has yet to be received, the one or more packets are retransmitted to the destination computing node. | 2020-01-23 |
20200028626 | Data Processing Method And Device - The present disclosure relates to data processing methods and devices. One example method includes obtaining N correctly received radio link control (RLC) protocol data units (PDUs) in a packet data convergence protocol (PDCP) PDU, and generating the PDCP PDU based on the N correctly received RLC PDUs, where the PDCP PDU includes M RLC PDUs, N and M are positive integers, and N2020-01-23 | |
20200028627 | Code Block Groups for Retransmissions in a Wireless Communication System - A transmit radio node ( | 2020-01-23 |
20200028628 | RETRANSMISSION INDICATION - Apparatuses, methods, and systems are disclosed for retransmission indication. One apparatus includes a receiver that receives a first reference signal transmitted on a first set of resource elements from a device. The first reference signal is associated with a first data. The apparatus also includes the receiver receiving a second reference signal transmitted on a second set of resource elements from the device. The second reference signal is associated with a second data, and the first data and the second data may be | 2020-01-23 |
20200028629 | Method For Feeding Back Ack/Nack Information For Downlink Data And Related Device - Example methods and apparatus for transmitting ACK/NACK information for data are disclosed. One method includes sending a data packet from a base station to a user equipment. A control signaling is transmitted from the base station to the user equipment and is used to indicate a subframe to be used by the user equipment to send ACK/NACK information corresponding to the data packet. | 2020-01-23 |
20200028630 | COMMUNICATION DEVICE, INFRASTRUCTURE EQUIPMENT AND METHODS - A communications device configured to receive data transmitted as encoded data packets from an infrastructure equipment of a wireless communications network. Each of the encoded data packets are transmitted as a control signal component and a data signal component. The control signal component carries control information for detecting and decoding the data signal component in which the encoded data carried by the encoded data packet is transmitted. As part of the ARQ-type protocol, at least the control signal component may be re-transmitted. By including with the control information carried by the retransmitted control signals an indication of at least a temporal location of the data signal component, which has already been transmitted and received in a buffer of a receiver, an improvement in a use of communications resource can be provided and also in some embodiments an improvement in a likelihood of correctly detecting and decoding an encoded data packet. | 2020-01-23 |
20200028631 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE, METHOD, AND RECORDING MEDIUM OF PROGRAM - A receive terminal setting a non-delivery determination time for determining that a next data packet is not delivered after transmitting an acknowledgement (ACK) packet for a received data packet; when the next data packet is not delivered within the non-delivery determination time, the receive terminal repeatedly transmits a retransmission request (RACK) packet prompting the transmission of the next data packet; a transmit terminal specifies a non-delivered data packet using time difference information based on the time-of-day information of the received ACK packet and RACK packet and retransmits the specified data packet to the receive terminal; the time-of-day information here is a time stamp added by the receive terminal to each of the ACK packet and RACK packet when transmitted, or a time stamp added by the transmit terminal to each of the ACK packet and RACK packet when received. | 2020-01-23 |
20200028632 | Physical Channels In New Radio - Hybrid automatic repeat request (HARQ) processes, indicators, and similar methods may be used improve new radio performance in a number of ways. For example HARQ processes may be retransmitted, even before a response is expected, a number of times. Separate acknowledgement may be provided for various code blocks within a single transport block. Multi-bit ACK/NACK signaling may be used to efficiently express the status of individual code blocks or groups of code blocks within a transmission block. Grantless transmissions may be acknowledged implicitly, e.g., via responses comprising downlink control information or sent via a physical hybrid automatic repeat request indicator channel. | 2020-01-23 |
20200028633 | TECHNIQUES FOR LATENCY-AWARE PROCESSING OF RADIO FRAMES - The disclosure relates to a radio device, in particular a user equipment (UE), a base station (BS) or a Sidelink device, comprising: a radio transceiver configured to receive a radio subframe; a receive (RX) processor, configured to process the radio subframe; and a transmit (TX) processor, configured to define an Acknowledgement (ACK) field in the radio subframe based on a processing power of the RX processor and/or a processing power of a second radio device, wherein the radio transceiver is configured to transmit the radio subframe, processed by the TX processor, to the second radio device. | 2020-01-23 |
20200028634 | UPLINK CONTROL INFORMATION TRANSMISSION METHOD AND APPARATUS - A terminal receives downlink scheduling information of a downlink subframe F(i, j), where a set M of preconfigured downlink subframes in which the downlink subframe F(i, j) is located is divided into N subsets of preconfigured downlink subframes, a bit quantity of a hybrid automatic repeat request-acknowledgement HARQ-ACK that needs to be fed back for each downlink subframe in one subset of preconfigured downlink subframes is a predetermined value, and bit quantities of HARQ-ACKs that need to be fed back for any downlink subframes in different subsets of preconfigured downlink subframes are different. The terminal generates a HARQ-ACK codebook according to a receiving status of downlink data. And the terminal generates uplink control information after encoding the HARQ-ACK codebook; and a sending module sends the uplink control information. | 2020-01-23 |
20200028635 | METHOD FOR SUPPORTING MULTIPLE TRANSMISSION TIME INTERVALS, MULTIPLE SUBCARRIER INTERVALS, OR MULTIPLE PROCESSING TIME INTERVALS IN WIRELESS COMMUNICATION SYSTEM, AND APPARATUS THEREFOR - A method for transmitting uplink control information for a terminal supporting multiple transmission time interval (TTI) lengths, multiple subcarrier intervals, or multiple processing time intervals in a wireless communication system according to one embodiment of the present disclosure is performed by the terminal, and may comprise the steps of: receiving a configuration for repeated transmission of HARQ-acknowledgement (ACK)/non-acknowledgement information for a downlink transmission block; and when the repeated transmission is triggered according to the configuration therefor, transmitting the HARQ-ACK information to a base station, wherein the repeated transmission is triggered when a predetermined condition is satisfied. | 2020-01-23 |
20200028636 | SIGNAL TRANSMISSION METHOD AND APPARATUS - The present disclosure provides a signal transmission method and apparatus, where the method includes: transmitting a first signal on subcarriers of a plurality of orthogonal frequency division multiplexing (OFDM) symbols, where a frequency offset of the subcarriers exists among the plurality of OFDM symbols. The present disclosure enables the first signal is no longer concentrated on the subcarriers at a specific frequency, but is dispersed more evenly. The interference of the first signal is more even for the signal being transmitted by the neighboring cell terminal device. On one hand, the influence on the data demodulation of the neighboring cell terminal device is reduced; and on the other hand, if the neighboring cell performs interference measurement, the difference in measurement results on different subcarriers is reduced and the accuracy of the interference measurement result is improved. | 2020-01-23 |
20200028637 | SPECTRUM UTILIZATION FOR STANDALONE NB-IOT CARRIERS - There is provided method comprising: transmitting by a first entity a first carrier signal of a plurality of carrier signals, the first carrier signal being centered at a first frequency offset from a first channel raster point by an amount which is greater than 0 and less than a first threshold, wherein a second carrier signal is adjacent the first carrier signal and centered at a second frequency at or within a second threshold of a second channel raster, both the first carrier signal and the second carrier signal comprising a plurality of subcarriers of a defined bandwidth, and the first frequency and the second frequency differ by an amount substantially equal to a multiple of the defined bandwidth. | 2020-01-23 |
20200028638 | SRS RESOURCE CONFIGURATION ENHANCEMENTS - Certain aspects of the present disclosure provide techniques for sounding reference signal (SRS) resource configuration enhancements. A method generally includes receiving, from the network, a message comprising sounding reference signal (SRS) configuration information, wherein the SRS configuration information comprises configuration information for a first SRS resource set and configuration information for a second SRS resource set and transmitting at least one SRS according to the received SRS configuration information. | 2020-01-23 |
20200028639 | METHODS, BASE UNITS AND REMOTE UNITS OF BASE STATION SYSTEMS OF A WIRELESS COMMUNICATION NETWORK - A method is disclosed performed by a base unit ( | 2020-01-23 |
20200028640 | METHOD AND APPARATUS FOR TRANSMITTING UPLINK CONTROL SIGNAL IN WIRELESS CELLULAR COMMUNICATION SYSTEM - The present disclosure relates to a communication technique for converging an IoT technology with a 5G communication system for supporting a higher data transmission rate beyond a 4G system, and a system therefor. The present disclosure may be applied to an intelligent service (for example, a smart home, a smart building, a smart city, a smart car or connected car, healthcare, digital education, retail business, a security and safety related service, or the like) on the basis of a 5G communication technology and an IoT related technology. The present invention relates to a wireless communication system. More specifically, disclosed is a method and apparatus for transmitting a control signal associated with uplink data transmission by a terminal when the terminal performs uplink transmission. | 2020-01-23 |
20200028641 | SIGNAL TRANSMISSION METHOD AND APPARATUS - This application provides a signal transmission method and apparatus. The method includes: sending a first synchronization signal on a first time-frequency resource, where the first time-frequency resource includes a plurality of first frequency units in a first time unit, and sending a second synchronization signal on a second time-frequency resource, where the second time-frequency resource includes a plurality of second frequency units in the first time unit, and the plurality of first frequency units alternate with the plurality of second frequency units in frequency domain. Technical solutions in embodiments of this application can improve synchronization efficiency. | 2020-01-23 |
20200028642 | DATA SENDING METHOD, RELATED DEVICE, AND SYSTEM - A data sending method, a related device, and a system are described. The method includes sending, by a network device, resource location information of a first reference signal and a physical channel to a terminal, where a first time-frequency resource on which the first reference signal is mapped overlaps a second time-frequency resource corresponding to the physical channel. An overlapping resource is not used to transmit the physical channel, and a third time-frequency resource in the second time-frequency resource other than the overlapping resource is used to transmit the physical channel. Alternatively, an overlapping resource is used to send a second reference signal; or an overlapping region is used to send a second reference signal, where the terminal skips sending the first reference signal, and the second reference signal is orthogonal to the first reference signal. | 2020-01-23 |
20200028643 | METHOD FOR TRANSMITTING AND RECEIVING DM-RS IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for receiving a downlink signal by a user equipment (UE) from an eNB in a wireless communication system is disclosed. In detail, the method comprises the steps of receiving a downlink control channel from the eNB; and receiving, from the eNB, a downlink data channel and a front loaded reference signal for demodulation of the downlink data channel by using control information included in the downlink control channel, wherein resource elements of symbols to which a front loaded reference signal is received are identified by two multiplexing groups or three multiplexing groups, and the downlink control channel includes information on a multiplexing group, to which the front loaded reference signal is allocated, among the multiplexing groups, and information on the number of multiplexing groups, to which data are not allocated, among the multiplexing groups. | 2020-01-23 |
20200028644 | REFERENCE SIGNAL PATTERNS - Various communication systems may benefit from improved performance. For example, communication systems may benefit from a multi-functional reference signal that allows for the harmonization of different reference signal patterns. A method, in certain embodiments, may include constructing at a base station a reference signal including a plurality of reference signal patterns. The plurality of reference signal patterns can include at least one of a default reference signal pattern or a multi-functional signal pattern for at least one of uplink or downlink. The plurality of reference signal patterns can include at least one of partially overlapping or non-overlapping resource elements. In addition, the plurality of reference signal patterns are constructed dynamically for a specific user or group of users. The method may also include sending the reference signal from the base station to a user equipment. | 2020-01-23 |
20200028645 | METHOD FOR TRANSMITTING OR RECEIVING DEMODULATION REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - In a method for supporting a short transmission time interval (sTTI) in a wireless communication system according to one embodiment of the present invention, the method is performed by a terminal, and comprises the steps of: receiving a reference signal for decoding a downlink channel; and decoding the downlink channel by using the reference signal for decoding the downlink channel, wherein the reference signal for decoding the downlink channel may be transmitted by using a pattern to which a frequency separation is applied, in the case of collision with a cell-specific reference signal. | 2020-01-23 |
20200028646 | METHOD FOR TRANSMITTING OR RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for receiving a downlink signal by a terminal in a wireless communication system includes the steps of: receiving, from a base station, a reference point of a system band and information on an operation band of the terminal corresponding to a part of the system band; determining a reference signal sequence for the operation band of the terminal with reference to the reference point of the system band; and receiving a downlink signal in the operation band of the terminal on the basis of the determined reference signal sequence, wherein the information on the operation band of the terminal includes an offset between the operation band of the terminal and the reference point of the system band. | 2020-01-23 |
20200028647 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM - Disclosed herein are a method and apparatus for performing, by UE, decoding in a wireless communication system. According to the present invention, there may be a method and an apparatus for decoding data in which a demodulation reference signal (DMRS) configured by a base station according to a specific pattern is received from the base station through a DMRS symbol, the demodulation reference signal is transmitted on a specific antenna port and located on the same one or two time-axis symbols as at least one other demodulation reference signal transmitted on another antenna port, the specific pattern is determined according to characteristics of a frequency band in which the demodulation reference signal is transmitted, the demodulation reference signal is mapped to the one or two time-axis symbols using at least one of a first code division multiplexing (CDM) on a frequency axis or a second CDM on a time axis, and the data are decoded using the demodulation reference signal. | 2020-01-23 |
20200028648 | ON-DEMAND POSITIONING REFERENCE SIGNAL (PRS) - Certain aspects of the present disclosure relate to methods and apparatus for on-demand UE positioning. For example a method may include transmitting a request that comprises one or more parameters based on a request configuration, to at least one of a plurality of base stations of a network, to participate in at least one of an uplink UE positioning procedure or a downlink UE positioning procedure, and receiving signaling from the at least one of the plurality of base stations of the network in response to the request. | 2020-01-23 |
20200028649 | Resource Configuration Method and Apparatus of Reference Signal and Communications System - A base station including: a processor configured to execute instructions to configure a resource configuration indicating that a first reference signal is precoded to be beamformed and a second reference signal is not precoded; and a transmitter configured to transmit to a User equipment (UE), the resource configuration indicating the first reference signal is precoded to be beamformed and the second reference signal is not precoded, wherein the transmitter is configured to trigger or activate the first reference signal by transmitting an activation of channel state information reference signal (CSI-RS) resources media access control (MAC) control element (CE) after transmitting the resource configuration, and to transmit the second reference signal after transmitting the resource configuration. | 2020-01-23 |
20200028650 | ADAPTIVE RETRANSMISSION METHOD AND DEVICE FOR DELAY REDUCTION IN WIRELESS CELLULAR COMMUNICATION SYSTEM - Disclosed are a communication method for merging, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system, and a system therefor. The disclosure can be applied to intelligent services (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related services, and the like) on the basis of a 5G communication technology and IoT-related technology. In addition, disclosed in the specification are: an adaptive retransmission method and device for delay reduction; a method and a device for selecting radio resource allocation and data size; and a method and a device for performing setting so as to enable different channels to share DMRS with each other. | 2020-01-23 |
20200028651 | METHODS AND APPARATUSES FOR DETECTING CONTROL CHANNELS IN WIRELESS COMMUNICATION SYSTEMS - A wireless navigation system with automatic guidance to the final destination/routes capable of operating in Internet-dead zones includes a system of servers containing data of final destinations/routes, Google and/or Apple Maps API, a voice synthesizer server, a GPS/AGPS system of satellites, servers and processing stations, a set of sensors, a microprocessor, a standard mobile operating system, a supra operating system controlling the above systems and a display and sound system for displaying the final output of the system. | 2020-01-23 |
20200028652 | MULTI-BEAM CSI FEEDBACK - In multi-beam communication, the UE may assist in the scheduling of beams utilized during the multi-beam communication by improving the manner in which the quality of the beam is reported to the network. The apparatus may measure a signal received from a base station on at least one beam. The apparatus may detect a triggering event for providing CSI for the at least one beam. The apparatus may transmit an uplink transmission comprising a CSI report in response to detecting the triggering event. The apparatus may receive an uplink request from a UE for providing CSI for at least one beam. The apparatus may transmit an indication scheduling a CSI report in response to the uplink request. The apparatus may receive an uplink transmission from the UE comprising the CSI report for the at least one beam. | 2020-01-23 |
20200028653 | FEEDBACK INFORMATION PROCESSING METHOD, DEVICE AND SYSTEM, BASE STATION AND TERMINAL - Provided are a feedback information processing method, device and system, a base station and a terminal. The method includes: multiplexing, by a first node, feedback information for a plurality of second nodes in a media access control protocol data unit (MAC PDU), where the feedback information is information generated after the first node correctly receives transmission blocks from the second nodes, and the feedback includes a plurality of pieces of bit information. After the first node multiplexes the feedback information for the plurality of second nodes in the MAC PDU, a radio network temporary identifier (RNTI) is used in a process that the first node delivers the feedback information to the plurality of second nodes. | 2020-01-23 |
20200028654 | INTERFERENCE MEASUREMENT METHOD, DEVICE AND SYSTEM, INTERFERENCE MEASUREMENT INDICATION METHOD AND DEVICE - The present disclosure provides an interference measurement method, an apparatus and a system, and an interference measurement indication method and apparatus. The interference measurement method includes: obtaining an interference measurement resource configuration and an interference measurement reception mode configuration; and performing the interference measurement according to the interference measurement resource configuration and the interference measurement receiving mode configuration. | 2020-01-23 |
20200028655 | USER EQUIPMENT AND WIRELESS COMMUNICATION METHOD - A user equipment (UE) is disclosed including a receiver that receives, from a base station (BS), Zero Power (ZP) Channel State Information-Reference Signal (CSI-RS) resource configuration information and a ZP CSI-RS. The ZP CSI-RS is transmitted as a periodic ZP CSI-RS, a semi-persistent ZP CSI-RS, or an aperiodic ZP CSI-RS. When the ZP-CSI-RS is transmitted as the periodic ZP CSI-RS or the semi-persistent ZP CSI-RS, the ZP CSI-RS resource configuration information designates periodicity and a timing offset for the periodic ZP CSI RS or the semi-persistent ZP-CSI-RS. The receiver receives the ZP CSI-RS based on a ZP CSI RS resource specified using the periodicity and the timing offset. When the ZP CSI-RS is transmitted as the aperiodic ZP CSI-RS, the receiver receives DCI that triggers the aperiodic ZP CSI-RS. The receiver receives the ZP CSI-RS based on a ZP CSI-RS resource specified using the DCI. | 2020-01-23 |
20200028656 | RADAR TRANSMISSION TIME INTERVAL RANDOMIZED RADAR TRANSMISSIONS - Certain aspects provide a method for radar detection by an apparatus. The method including transmitting a radar waveform in transmission time intervals (TTIs) to perform detection of a target object. The method further includes varying the radar waveform across TTIs based on one or more radar transmission parameters. | 2020-01-23 |
20200028657 | FRONT LOADED CSI-RS BASED FEEDBACK - A method, a computer-readable medium, and an apparatus may involve wireless communication in a bundled TTI comprising a first TTI and a second TTI. A first UE may be configured to receive a first data transmission and a first reference signal from a second UE in the first TTI, to transmit a feedback to the second UE, and to receive a second data transmission having one or more transmission parameters adapted based on the feedback in the second TTI. In certain aspects, the first UE may be configured to transmit a first data transmission and a first reference signal to a second UE in the first TTI, to receive a feedback from the second UE, to adapt one or more transmission parameters for a second data transmission in the second TTI based on the feedback, and to transmit the second data transmission to the second UE in the second TTI. | 2020-01-23 |
20200028658 | Radio Network Node, Wireless Device and Methods Performed Therein for Handling Communication in a Wireless Communication Network - Embodiments herein disclose e.g. a method performed by a wireless device ( | 2020-01-23 |
20200028659 | METHOD AND APPARATUS FOR DETERMINING SLOT FORMAT IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus are disclosed from the perspective of a network. In one embodiment, the method includes the network configuring a DL (Downlink) BWP (Bandwidth Part) and an UL (Uplink) BWP in a first serving cell to a UE (User Equipment). The method also includes the network configuring a paired spectrum operation in the first serving cell to the UE. The method further includes the network transmitting a first DCI (Downlink Control Information) to the UE, wherein the first DCI comprises a slot format combination indicating one or more slot format values for the DL BWP and one or more slot format values for the UL BWP. In addition, the method includes the network prevents from setting an amount of slot format values in the slot format combination in the first DCI to be not divided by a first number, wherein the first number is associated with an absolute value of a difference of a first SCS (Subcarrier Spacing) configuration and a second SCS configuration. | 2020-01-23 |
20200028660 | METHOD AND APPARATUS FOR TRANSMITTING SIGNALS OVER A WIRE CONNECTION - A method and apparatus for transmitting data from a transmitter device to one or more receiver devices, each of the one or more receiver devices being connected to the transmitter device via a respective wire connection, the transmitter device being operable to transmit signals onto the wire connections over one or more different channels, the method comprising, for each of the one or more different channels: determining a value of a function S | 2020-01-23 |
20200028661 | OPTICAL TRANSMITTING DEVICE AND OPTICAL RECEIVING DEVICE - An optical transmitting device includes a plurality of transmitters configured to be arranged so as to correspond to a plurality of channels, the transmitters each reproducing a clock from an input data signal, and outputting the data signal identified and reproduced based on the reproduced clock to a light emitting element and a processor configured to control phase difference between the output data signals based on a result of comparison between phases of the reproduced clocks. | 2020-01-23 |
20200028662 | CLOCK TRANSFER AND FILTERING USING DIGITAL CLOCK PHASE INFORMATION - A digital PLL, which can be a virtual PLL, can condition digital phase information, comprising phase modification requests, for transfer, jitter, and phase-noise filtering of clock information between a clock recovery unit and a clock generation unit associated with phase interpolators. The digital PLL can employ a set of accumulators, proportional and integral filter component, generator component, feedback path between the output and input of the digital PLL, and other digital signal processing components. The proportional and integral filter component can be configurable to set a loop damping factor and a loop bandwidth of the filter, based on respective parameters. Based on the filter output, the generator component can generate output phase information, comprising phase modification requests, that can be transmitted to another phase interpolator(s) associated with a transmitter or other component(s) of the device to facilitate generating a clock for the transmitter or other component(s). | 2020-01-23 |
20200028663 | Asynchronous Data Recovery - Described herein is an apparatus for the recovery of asynchronous data into a fixed clock domain. A phase-locked loop (PLL) of the known art is replaced by a modified quadrature resolver, and the output from the resolver re-creates the selected frequency component of the input asynchronous data. The zero-crossings of this re-created data clock are used to sample the input data stream. One advantage of this technique is that it operates as a state machine on a single clock, and no analog components such as phase detectors or VCOs are needed. In another embodiment, the samples from the input data stream are changed from pulses to Gaussians, allowing for conversion of the sample rate from one clock domain to another. | 2020-01-23 |
20200028664 | Sample Rate Conversion by Gaussian Blur - Described herein is an apparatus for the recovery of asynchronous data into a fixed clock domain. A phase-locked loop (PLL) of the known art is replaced by a modified quadrature resolver, and the output from the resolver re-creates the selected frequency component of the input asynchronous data. The zero-crossings of this re-created data clock are used to sample the input data stream. One advantage of this technique is that it operates as a state machine on a single clock, and no analog components such as phase detectors or VCOs are needed. In another embodiment, the samples from the input data stream are changed from pulses to Gaussians, allowing for conversion of the sample rate from one clock domain to another. | 2020-01-23 |
20200028665 | SYSTEM AND METHOD FOR REMOTE CLOCK ESTIMATION FOR RELIABLE COMMUNICATIONS - An electronic device is provided including a processor, a communications interface coupled to the processor, a memory coupled to the processor, and a module saved in the memory. The module configures the processor to receive a first communications packet from a remote device via the communications interface including information useful for estimating a clock offset of the remote device, and determine an upper bound of the clock offset of the remote device with respect to the electronic device based on the information. | 2020-01-23 |
20200028666 | MINIMIZING TIMESTAMP ERROR IN PTP SYSTEMS - In accordance with some embodiments of the present invention, a method of minimizing timing error in a precise timing protocol system includes receiving an input 1PPS signal and a clock signal; outputting an output 1PPS signal a number of clock edges after receipt of the input 1PPS signal; adjusting the clock signal until the output 1PPS signal as jumped a clock cycle; and adjusting an offset to bring the output 1PPS signal to within a half clock period. In some embodiments, further adjustments can be made to the timestamp. | 2020-01-23 |
20200028667 | Blockchain-Based Unexpected Data Detection - Methods, systems, and apparatuses for blockchain-based unexpected data detection are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive a plurality of network function requests corresponding to the decentralized network. The node may analyze the plurality of network function requests to identify whether the requests included unexpected data and/or irregular data, and/or are associated with flagged wallets and/or smart contracts. | 2020-01-23 |
20200028668 | Blockchain-Based Automated User Matching - Methods, systems, and apparatuses for blockchain-based automated user matching are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive match parameters from one or more computing devices associated with supply side entities and demand side entities. The node may execute one or more artificial intelligence algorithms to match the supply side entities with the demand side entities based on the received match parameters. In some instances, the artificial intelligence algorithms may be stored in a smart contract on a blockchain and the matching may be performed through execution of the smart contract by nodes of the decentralized P2P network. | 2020-01-23 |
20200028669 | METHOD AND SYSTEM FOR RATELESS AND POLLUTION-ATTACK-RESILIENT NETWORK CODING - An encoder including a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to construct an encoded message using a message and a random element, construct a hash using a shared secret, and transmit the encoded message and the hash to a destination, through a network. | 2020-01-23 |
20200028670 | METHOD FOR EFFICIENT AND PRACTICAL KEY DISTRIBUTION IN NETWORK CODING SYSTEMS - An encoder includes a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to generate a key, estimate a network capacity, and encode each bit of the key using a random matrix of a selected rank and the estimated network capacity for secure transmission of the key through a network. | 2020-01-23 |
20200028671 | DISTRIBUTED OBJECT ROUTING - Retrieving a file using an index including: looking up the index which includes where a plurality of chunks of the file is stored; retrieving the plurality of chunks from a plurality of storage providers; and reassembling the a plurality of chunks to restore the file. | 2020-01-23 |
20200028672 | SECURE COMMUNICATION METHOD AND SMART LOCK SYSTEM BASED THEREOF - The present disclosure provides a secure communication method, and the method may include: a sending terminal may generate data to be transmitted and determine encrypted data by encrypting the data to be transmitted using a preset encryption algorithm based on an encryption key. The encryption key may be obtained by a key exchange process between a smart door lock and a mobile terminal through a preset secure communication channel. The sending terminal may assign a unique identifier to the encrypted data and may send the encrypted data with a unique identifier to the receiving terminal, so that the receiving terminal may perform identity authentication on the encrypted data with the unique identifier and may decrypt the encrypted data based on the encryption key obtained by the key exchange process according to a result of the identity authentication. | 2020-01-23 |
20200028673 | Content Encryption and Decryption Using a Custom Key - A method for securely communicating digital content includes steps of: (1) receiving data from a plurality of key sources; (2) retrieving a plurality of data sets from the data, each one of the plurality of data sets comprising a plurality of data units; (3) extracting a plurality of selected data units from the plurality of data units; (4) generating a custom key using the plurality of selected data units; (5) encrypting content using the custom key; and (6) transmitting encrypted content. | 2020-01-23 |
20200028674 | METHOD AND APPARATUS FOR ASYMMETRIC CRYPTOSYSTEM BASED ON QUASI-CYCLIC MODERATE DENSITY PARITY-CHECK CODES OVER GF(q) - Methods and apparatus for code-based asymmetric cryptosystem using Quasi-Cyclic Moderate-Density Parity-Check (QC-MDPC) error correcting codes. Specifically, the method and apparatus generalizes the framework of (QC-MDPC) Code-Based (CB) cryptography from the binary domain (Galois Field of two elements) to an arbitrary size of Galois Field and provides an apparatus for implementing the cryptosystem with a simplified computational complexity of key generation, encryption, and decryption components of the cryptosystems and reduced sizes of the public and private security keys. | 2020-01-23 |
20200028675 | SYSTEM AND A METHOD FOR SIGNING TRANSACTIONS USING AIR-GAPPED PRIVATE KEYS - A system for signing transactions. The system includes a first module with a communication interface to a public network; and a controller to handle a transaction with a Blockchain network or a transaction server accessible at the public network. The system also includes a second module with a random number generator; and a secure controller to generate seed words and private keys. The system further includes a bridge module with a controller; and a switch to selectively connect the data interface of the bridge module to either the data interface of the first module or the data interface of the second module such that the data interface of the first module is never connected with the data interface of the second module. | 2020-01-23 |
20200028676 | INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an information processing method includes a monitoring step and a key provision step. The monitoring step includes monitoring an operation state of an information processing device including a key generating unit that generates key information shared among a plurality of devices using a quantum key distribution technique. The key provision step includes providing the generated key information when the operation state satisfies a predetermined condition and stopping the provision of the generated key information when the operation state does not satisfy the condition. | 2020-01-23 |
20200028677 | System and Method for Securing Personal Information Via Biometric Public Key - A device, method, and computer readable storage medium generate a biometric public key for an individual based on both the individual's biometric data and a secret, in a manner that verifiably characterizes both while tending to prevent recovery of either by anyone other than the individual. The biometric public key may be later used to authenticate a subject purporting to be the individual, using a computing facility that need not rely on a hardware root of trust. Such biometric public keys may be distributed without compromising the individual's biometric data. In operation, a confident subset of a set of biometric values of the subject is extracted, including by performing a transform of the set of biometric values. The transform may variously be a Gabor transform, a wavelet transform, processing by a machine learning system, etc. | 2020-01-23 |
20200028678 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR MANAGING ENCRYPTION KEY IN A STORAGE SYSTEM - Techniques manage an encryption key in a storage system. The techniques involve: transmitting an encryption key request from a storage management component to a key management service component; obtaining, via the key management service component, an encryption key encrypted by the key management service component based on the encryption key request; providing the obtained encrypted encryption key to the storage management component; maintaining, in the storage management component, correspondence between the encrypted encryption key and a storage device; and registering, according to the correspondence, the encrypted encryption key corresponding to the storage device to an encryption hardware unit, such that the encryption hardware unit can decrypt the encrypted encryption key to obtain the encryption key corresponding to the storage device. Effective management of the encryption key thus realized. | 2020-01-23 |
20200028679 | PUBLIC-PRIVATE KEY PAIR PROTECTED PASSWORD MANAGER - Embodiments of the invention provide methods and systems for password management using public-private key cryptography. A user device generates a public-private key pair including a public key and a private key and registers the public key with a remote password management server. Account names and passwords can be stored at the password management server in association with the public key. To retrieve the passwords, the user device sends a request to the password management server including the public key. The password management server determines the password from the stored passwords and encrypts it using the public key. The encrypted password is sent to the user device, which can decrypt the encrypted password using the private key corresponding to the public key. The user device can then use the account name and password can to obtain account information from an account provider. | 2020-01-23 |
20200028680 | Systems and Methods to Secure Searchable Data having Personally Identifiable Information - A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request. | 2020-01-23 |
20200028681 | TOKEN DEVICE FOR CONDUCTING CRYPTOGRAPHY KEY BACKUP OR RESTORATION OPERATION - A token device includes: a transmission interface for receiving power from an external device; a physiological characteristic detecting circuit for detecting user's touch actions and physiological characteristics (i.e., biometric characteristics); a smart card accessing circuit for detecting user's card-placing actions and for accessing an on-card secure chip on a smart card; an on-token secure chip; and a control circuit for generating an user identification data corresponding to the detecting result of the physiological characteristic detecting circuit, for respectively transmitting the user identification data to the on-token secure chip and the on-card secure chip for verifying user's identity. If the user's identity is confirmed by both the on-token secure chip and the on-card secure chip, the control circuit would conduct corresponding key backup operations or key restoration operations between the on-token secure chip and the on-card secure chip. | 2020-01-23 |
20200028682 | EXECUTABLE CODED CIPHER KEYS - The disclosure provides for two or more devices that securitize transmission(s) transmitted to and received from these devices comprising at least one executable coded cipher key(s), at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) and that also uses at least one executable coded cipher key(s), such that transmission(s) are sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is encrypted and/or decrypted. When encryption/decryption is completed, the transmission(s) is sent to at least one transmitter such that encryption/decryption of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve encryption/decryption completion. | 2020-01-23 |
20200028683 | SEPARATE CRYPTOGRAPHIC KEYS FOR MULTIPLE MODES - According to examples, an apparatus may include a security enclosure, a main processor housed in the security enclosure, and a physical security monitoring control unit (PSMCU) processor housed in the security enclosure. The PSMCU processor may cause the apparatus to switchably operate between a first mode and a second mode. In the first mode, the PSMCU processor may allow access by the main processor to a first cryptographic key while preventing access by the main processor to a second cryptographic key. In addition, in the second mode, the PSMCU processor may allow access by the main processor to the second cryptographic key while preventing access by the main processor to the first cryptographic key. | 2020-01-23 |
20200028684 | METHOD AND APPARATUS FOR OBTAINING MULTIPLE USER CREDENTIALS - A method for a system includes forming within an app running upon a user smart-device, an ephemeral ID having data associated with a server and anonymous data, outputting the ephemeral ID to a first receiver associated with a first computer and to a second receiver associated with a second computer system separate from the first, receiving from the first receiver an identifier and a nonce, providing the identifier and the nonce to the server, receiving from the server a token associated with the first computer system authorizing access to the first computer system but not the second computer system by the user smart-device, storing the token for facilitated authentication of the user smart-device, and providing the token to the first receiver. | 2020-01-23 |
20200028685 | METHODS AND SYSTEMS FOR NETWORK SECURITY USING A CRYPTOGRAPHIC FIREWALL - A method is performed at a security device. The method includes establishing a network connection with a client system. After establishing the network connection, the security device receives a first packet from the client system. The first packet includes an identifier, a first counter value, and a first one-time password hash generated by the client system. Based on the identifier received, the security device retrieves from a trusted data store the seed and a second counter value. If the first counter value is larger than the second counter value, the security device generates a second one-time password hash based on the identifier, the first counter value, and the seed. In accordance with a determination that the first and second one-time password hashes match, the security device grants, to the client system, access to one or more network resources protected by the security device via the network connection. | 2020-01-23 |
20200028686 | SYSTEMS AND METHODS FOR EXTENDING THE DOMAIN OF BIOMETRIC TEMPLATE PROTECTION ALGORITHMS FROM INTEGER-VALUED FEATURE VECTORS TO REAL-VALUED FEATURE VECTORS - Systems and methods for generating a secure biometric template. The methods comprise: obtaining biometric data from an individual, the biometric data represented as a real-valued feature vector x; mapping the real-valued feature vector x to an integer-valued feature vector X by multiplying each component of the real-valued feature vector x by a value s and performing a nearest integer function using results of the multiplying; and generating the secure biometric template by a cryptographic algorithm using the integer-valued feature vector X. s is a function of n, p and | 2020-01-23 |
20200028687 | CONTINUITY OF ACCESS TO AVIONIC DATA OUTSIDE OF THE COCKPIT OF AN AIRCRAFT - Systems and methods for communicating avionic data to a non-avionic device situated outside of the cockpit of an aircraft are provided. A method may comprise the steps of receiving a request, aimed at receiving avionic data from avionic systems, from a non-avionic client device; determining the distance between the non-avionic device and the cockpit of the aircraft; and adjusting the sending of data in response to the request depending on the determined distance. Developments of the invention describe the use of a wireless access point associated with a secure gateway determining the access rights to the avionic data for the non-avionic device, various sending and/or display adjustments depending notably on the distance, threshold management, various indoor positioning techniques, unilateral or bilateral communications, various notifications, the use of lightweight connected clients (for example earpiece, watch, glasses, etc.). | 2020-01-23 |
20200028688 | OFF-CHAIN BLOCKCHAIN STORAGE WITH VALIDATION - In some examples, a first computing device associated with a first blockchain node receives a transaction request along with related data for storage in an off-chain storage. The first blockchain node may send a communication to a second blockchain node to propose recording the transaction on the blockchain, which may result in the transaction being recorded in a new block on the blockchain as conditionally accepted pending validation of the related data. The first computing device may send the related data to a second computing device associated with the second blockchain node that performs validation. The first blockchain node receives, from the second blockchain node, a communication that proposes recording of the transaction on the blockchain as being validated. The first and second blockchain nodes may send one or more communications to cause addition of another new block to the blockchain indicating validity of the transaction. | 2020-01-23 |
20200028689 | LOCATION-BASED AND TIME-BASED PHOTO AUTHENTICATION - A method is described for receiving a first request for authentication from a user, the first request including a current location, a current location keyword, a current timestamp, and a photo representing the current location. The method further includes generating a pHash of the photo representing the current location, transmitting a second request for an encrypted true index from a server, and receiving the encrypted true index from the server. The method further includes interrogating a plurality of pHashes to identify a true pHash that corresponds to the encrypted true index, where the plurality of pHashes includes the true pHash and a plurality of dummy pHashes, each of the plurality of dummy pHashes being associated with a respective dummy index. The method further includes comparing the pHash of the photo representing the current location with the true pHash to determine whether to authenticate the user. | 2020-01-23 |
20200028690 | VALIDATING AND SECURING CALLER IDENTIFICATION TO PREVENT IDENTITY SPOOFING - A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device. | 2020-01-23 |
20200028691 | SYSTEM AND METHOD FOR A BLOCKCHAIN BASED AUTOMATED CERTIFIABLE WORKFLOW PROCESS - A method and system for implementing a blockchain network for distributing at least maintenance information related to an aircraft service between a plurality of trusted agents including: executing permissions by each of the trusted agents to participate in the blockchain network to interconnect amongst each other to perform a series of actions of with the blockchain network; and orchestrating a maintenance workflow in the blockchain network to provide functions in the blockchain network wherein the maintenance workflow further includes: inputting data for a current activity related to the aircraft service, retrieving a maintenance procedure for the current activity from a maintenance store of procedures, creating a current maintenance work order based on a retrieved maintenance procedure; identifying a trusted agent to inspect maintenance service from the current maintenance work order, and validating by the trusted agent a satisfactory completion of the current maintenance work order. | 2020-01-23 |
20200028692 | BLOCKCHAIN CONSENSUS METHOD AND DEVICE - This specification describes techniques for performing blockchain consensus. An example method performed by a first node in a blockchain includes: receiving first service data; determining a corresponding handling time of the first service data; storing the first service data including the corresponding handling time at a cache, in which the cache stores multiple pieces of additional service data, and in which each piece of additional service data is associated with a respective handling time; determining whether a consensus needs to be performed on at least two pieces of service data; in response to determining that the consensus needs to be performed, selecting the at least two pieces of service data according to a sequence that is based on handling times associated with the at least two pieces of service data; and performing the consensus on the more than one pieces of service data according to the sequence. | 2020-01-23 |
20200028693 | Verifiable Encryption Based on Trusted Execution Environment - A method for verifying a property of plaintext using ciphertext is disclosed. In an embodiment, a computing device may receive the ciphertext at a trusted execution environment (TEE) of the computing device. The TEE may decrypt the ciphertext to generate the plaintext using a private encryption key of an encryption key pair. The encryption key pair comprises a public encryption key and the private encryption key. The TEE may generate a digitally signed validation result by encrypting the validation result using a private signing key of a signing key pair. The signed key pair comprises a public signing key and the private signing key. The private key is retrieved from secure memory of the computing device, and the secure memory may only be accessible by the TEE. The computing device may then transmit the digitally signed validation result. | 2020-01-23 |
20200028694 | Implicitly Certified Digital Signatures - Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message. | 2020-01-23 |
20200028695 | SECURE CRYPTO MODULE INCLUDING CONDUCTOR ON GLASS SECURITY LAYER - A conductor on glass security layer may be located within a printed circuit board (PCB) of a crypto adapter card or within a daughter card upon the crypto adapter card. The conductor on glass security layer includes a glass dielectric layer that remains intact in the absence of point force loading and shatters when a point load punctures or otherwise contacts the glass dielectric layer. The conductor on glass security layer also includes a conductive security trace upon the glass dielectric layer. A physical access attempt shatters a majority of the glass dielectric layer, which in turn fractures the security trace. A monitoring circuit that monitors the resistance of the conductive security trace detects the resultant open circuit or change in security trace resistance and initiates a tamper signal that which may be received by one or more computer system devices to respond to the unauthorized attempt of physical access. | 2020-01-23 |
20200028696 | SYSTEMS AND METHODS TO BUILD A TRUSTED HYPERTEXT TRANSFER PROTOCOL SECURE SESSION ON A LIMITED PRE-BOOT BASIC INPUT/OUTPUT SYSTEM ENVIRONMENT - Systems and methods to build a trusted HTTPS session on a limited pre-boot BIOS environment in an information handling system. The information handling system may include a BIOS that may be stored in a secure read-only region of a flash storage. The BIOS may download signed certification authority (CA) information from a server based on a target location that may be stored at the secure read-only region. The BIOS may authenticate the signed CA information based on a public key that may be stored at the secure read-only region. The BIOS may, when the signed CA information is authenticated, download a root CA chain from the server and authenticate the root CA chain. The BIOS may, when the root CA chain is authenticated, establish a secure encrypted transport layer security (TLS) session with the server based the root CA chain. | 2020-01-23 |
20200028697 | SYSTEM AND METHOD FOR OFF-CHAIN CRYPTOGRAPHIC TRANSACTION VERIFICATION - A system and method for determining transaction compliance in an off-chain environment to offload computationally-intensive compliance processes for cryptographical transactions. Systems and methods for providing consistency across multiple blockchains by not relying on the limitations of any given protocol to guarantee a cost of executing a transaction be kept to a minimum and keep an on-chain overhead minimal. | 2020-01-23 |
20200028698 | PROTECTING MEDIA CONTENT - Content source and sink devices and methods help to guard against compromising security of content transferred from a source device to a sink device, for example where a primary encryption mechanism protecting the content has been compromised. A content source device is configured to connect to a content sink device to transmit digital media content to the content sink device. The content source device includes a connection module configured to establish a connection to the sink device, encrypt a digital media content for transmission across the connection with a first cipher using a connection key, and transmit the encrypted digital media content to the sink device over the connection. The content source also includes a protection module configured to prevent the sink device from using the digital media content without authorisation. The protection module receives a digital certificate identifying the sink device, verifies the digital certificate, and determines if the digital certificate identifies a sink device authorised to receive digital media content over the connection. If the determination is positive, the protection module enables the sink device to use the digital media content. | 2020-01-23 |
20200028699 | DIGITAL CERTIFICATE MANAGEMENT - A client establishes a communication session with a service by negotiating a first cipher suite from a plurality of available cipher suites to secure communications over the first communication session. A cipher suite strength measure from the first cipher suite is recorded to a database and when the customer attempts to negotiate a second cipher suite to secure communications over a second communication session, the second cipher suite strength measure is compared to the database of strength measurements to determine whether the second cipher suite is at least as secure as the previously used cipher suites. | 2020-01-23 |
20200028700 | COMMUNITY WiFi ACCESS POINT (AP) VIRTUAL NETWORK FUNCTION (VNF) WITH WiFi PROTECTED ACCESS 2 (WPA2) PASS-THROUGH - A service provider (SP) network device or system can operate to enable a WiFi protected access 2 (WPA2) pass-through with a user equipment (UE). The WPA2 pass-through can be an interface connection that passes through a computer premise equipment (CPE) or wireless residential gateway (GW) without the CPE or GW modifying or affecting the data traffic such as by authentication or security protocol. The SP network device can receive traffic data from a UE through or via the WPA 2 pass-through from a UE of a community Wi-Fi network at a home, residence, or entity network. Regardless of whether the UE is connected to any other home network at the CPE or is a subscriber to the SP network, the UE can communicate transparently by the WPA 2 pass-through with the SP network device to establish a secure initial access process with the SP network. | 2020-01-23 |
20200028701 | SYSTEMS AND METHODS FOR ALERT SERVICES - Embodiments relate to systems, processes and devices for an information delivery platform or data hub with an alert processor that can be configured to receive a request to generate an alert configuration at the data hub, the request indicating a target unit; generate and store an alert rule corresponding to the alert configuration, the alert rule having a trigger and an action; detect an event at the data hub based on a set of data of the data stored at the data hub, the event having event data; convert the event data to an alert trigger at the data hub based on the trigger of the alert rule; generate an alert notification for the alert trigger based on the action of the alert rule; and transmit the alert notification to the target unit. | 2020-01-23 |
20200028702 | BUILDING MANAGEMENT SYSTEM WITH DYNAMIC CONTROL SEQUENCE AND PLUG AND PLAY FUNCTIONALITY - A Building Management System (BMS) generates and presents a user interface to a user. The user interface displays building automation and control logic as human-readable text including interactive text modifiable by the user. The user interface allows the user to more easily understand complex control logic and make modifications to the control logic. The BMS is also presents equipment graphics on the user interface based on metadata read from controllers. The controller metadata includes information about building equipment operated by the controller and one or more sensors associated with the building equipment. | 2020-01-23 |
20200028703 | Intelligent Environment Control Systems And Methods - Intelligent environment control systems and methods are described. One embodiment includes a processing system. A sensing system is communicatively coupled to the processing system. One or more devices coupled to the processing system are configured to modify an environment associated with a user. The processing system is configured to control the devices. The processing system is configured to receive a sensor input from the sensing system. The processing system is configured to process the sensor input and determine a user interaction with the environment. | 2020-01-23 |
20200028704 | ADJUSTING AMBIENCE OF A ROOM - An ambience adjustment method, system, and non-transitory computer readable medium, includes identifying an ambient condition in a user profile for a most similar first device to a second device and setting the ambient condition of the most similar first device as the ambient condition in the user profile of the second device. | 2020-01-23 |
20200028705 | METHOD AND APPARATUS FOR PROVIDING REMOTE USER INTERFACE SERVICES - A method and an apparatus by which a remote user interface (UI) client device provides a remote UI service, the method including receiving an event message, which includes a URL for accessing a first UI resource providing a UI notifying the receipt of a message, from a remote UI server device; obtaining the first UI resource from the remote UI server device by using the URL; receiving external inputs of message control commands via the first UI resource; and transmitting the message control command to the remote UI server device. | 2020-01-23 |
20200028706 | ARTIFICIAL REFRIGERATOR AND METHOD FOR CONTROLLING TEMPERATURE OF THE SAME - An AI agent includes an information receiver configured to receive a purchase history of an article and determine whether or not a new article for storage in refrigerator requiring refrigeration or freezing storage exists in the purchase history, an information collector configured to collect capacity information on the new article for storage in refrigerator and movement path information on the new article for storage in refrigerator when the new article for storage in refrigerator exists in the purchase history, and an agent controller configured to determine an expected arrival time at which the new article for storage in refrigerator is to be received in a refrigerator based on the movement path information, and transmit the movement path information and the capacity information and the expected arrival time information on the new article for storage in refrigerator to the refrigerator. An AI agent and a refrigerator associated with the AI agent of the present disclosure are associated with an artificial intelligence module, an unmanned aerial vehicle (UAV) robot, an augmented reality (AR) device, a virtual reality (VR) device, and a device related to a 5G service. | 2020-01-23 |
20200028707 | IN-VEHICLE DETECTION SYSTEM AND CONTROL METHOD THEREOF - In-vehicle detection system includes nonvolatile memory, a controller (SoC) that reads and writes data from and in nonvolatile memory, and detector that outputs detection information to SoC. SoC changes a control signal of nonvolatile memory in accordance with the output of detector. | 2020-01-23 |
20200028708 | BUS-INVERT CODING WITH RESTRICTED HAMMING DISTANCE FOR MULTI-BYTE INTERFACES - An encoding process for bus data utilizes data from multiple data line groups on a multi-byte wide bus where each group has an associated DBI line. The process leverages the expanded encoding space for the multiple groups and associated multiple DBI bits. This process may be expanded to four bytes, eight bytes, etc. | 2020-01-23 |
20200028709 | METHOD FOR REMOVING DATA FRAME REDUNDANCY IN NETWORK ENVIRONMENT, AND DEVICE AND COMPUTER PROGRAM FOR CARRYING OUT SAME - The present invention relates to a method for removing data frame redundancy in a network environment and a device for carrying out the method, which can comprise: a data frame reception step of receiving a first data frame from an adjacent node; and a redundant frame determination step of determining whether a reception completion indicator of a second data frame having the same identification information as the first data frame exists, on the basis of a preset redundancy check table, and processing the first data frame according to the determination result. Disclosed is the data frame redundancy removal method, which deletes the first data frame when the reception completion indicator of the second data frame having the same identification information as the first data frame exists in the redundancy check table. | 2020-01-23 |