06th week of 2022 patent applcation highlights part 66 |
Patent application number | Title | Published |
20220045817 | METHOD AND DEVICE FOR NOTIFYING REFERENCE SIGNAL CONFIGURATION INFORMATION - Method and device for notifying reference signal configuration information are disclosed. Channel state information-reference signal (CSI-RS) configuration information is coded to obtain one or more CSI-RS configuration codes. The CSI-RS configuration codes are sent to a terminal device. The terminal device determines, based on CSI-RS configuration codes, CSI-RS configuration information such as a quantity of antenna ports for transmitting a CSI-RS, a CSI-RS pattern, a CSI-RS period and an offset corresponding to the CSI-RS period. | 2022-02-10 |
20220045818 | NODE FOR A RADIO COMMUNICATION NETWORK AND OPERATING METHOD - A node for a radio communication network is described, said node being arranged for a communication mechanism comprising the reception of a first transmission and the subsequent sending of a second transmission in response to said first transmission, wherein said node is furthermore arranged to perform a selecting process for selecting a relative timing for sending said second transmission from among a plurality of predetermined relative timing choices. | 2022-02-10 |
20220045819 | DETERMINING REFERENCE SIGNAL LOCATIONS - For determining reference signal locations, a method determines a number of Transmission Time Intervals (TTI) in a scheduled transmission of a plurality of TTI. The method further determines one or more reference signal locations based on the number of TTI and one or more of a parameter received from a higher layer wherein the higher layer is higher than a physical layer, a subframe index, a subband size, and a Time Division Duplex (TDD) configuration for the scheduled transmission. | 2022-02-10 |
20220045820 | Network Operations Related to Receiving Positioning SRS Transmissions - A base station serves as a positioning node for locating a user equipment (UE). The base station receives information from a network component indicating the UE is transmitting positioning sounding reference signals (SRS), monitors for the positioning SRS based on, at least, the information and when positioning SRS are received from the UE, transmits SRS information to the network. | 2022-02-10 |
20220045821 | CHANNEL STATE INFORMATION-REFERENCE SIGNAL CONFIGURATION METHOD AND APPARATUS - This application provides a channel state information-reference signal configuration method and an apparatus. The channel state information-reference signal configuration method in this application includes obtaining a quantity of UEs, where the UE is a UE in transmission mode TM | 2022-02-10 |
20220045822 | Scheduling Request on a Secondary Cell of a Wireless Device - Systems, apparatuses, and methods are described for wireless communications. A wireless device may receive configuration parameters of a plurality of cells. A secondary cell may have configured scheduling request (SR) resources and a primary cell may not have configured SR resources. The wireless device may determine that configured SR resources for the secondary cell are invalid, based on one or more conditions in a time interval. | 2022-02-10 |
20220045823 | USER EQUIPMENT (UE) RECOMMENDED SOUNDING REFERENCE SIGNAL (SRS) RESOURCE INDEX (SRI) - Certain aspects of the present disclosure provide techniques for sounding reference signal (SRS) resource index (SRI) selection. A method that may be performed by a user equipment (UE) generally includes receiving at least one reference signal (RS), performing an RS measurement based on the at least one RS, and transmitting, to a base station (BS), at least one first message indicating a recommendation for SRI selection determined based on the RS measurement. | 2022-02-10 |
20220045824 | ASYMMETRIC MESSAGE REPETITION - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may determine an asymmetric sequence of transmission configuration indicator (TCI) states for repeating a message or an asymmetric sequence of spatial relations for repeating the message. The UE may repeat the message according to the asymmetric sequence of TCI states or spatial relations. Numerous other aspects are provided. | 2022-02-10 |
20220045825 | METHOD AND APPARATUS FOR INDICATING CHANNEL IN WIRELESS LOCAL AREA NETWORK - The present invention discloses a method and an apparatus for indicating a channel in a wireless local area network WLAN. A sending station generates and sends a physical protocol data unit PPDU, the PPDU includes a preamble field and a data field, a high efficiency signal field HE-SIG-A of the preamble field includes a bandwidth identifier and a channel bonding identifier, and the channel bonding identifier is used to indicate whether a data transmission channel is continuous in a frequency domain. In the foregoing manner, a discontinuous channel in a frequency domain in a wireless local area network is indicated, an available channel for data transmission is improved, and a system throughput is increased. | 2022-02-10 |
20220045826 | TECHNIQUES FOR HYBRID AUTOMATIC REPEAT REQUEST ACKNOWLEDGE RESOURCE INDICATION FOR DOWNLINK SEMI-PERSISTENT SCHEDULING - In an example, a user equipment (UE) may receive, from a base station, a message indicating activation or reactivation of semi-persistent scheduling (SPS) between the UE and the base station. The UE may determine, based on the message, a first resource for transmitting a first acknowledgement/negative-acknowledgement (ACK/NACK) to acknowledge reception of the message. The UE may also receive, from the base station and subsequent to the receiving of the message, an SPS message. The UE may also determine a second resource for transmitting a second ACK/NACK to acknowledge reception of the SPS message. The UE may also transmit, to the base station, the first ACK/NACK on the first resource and the second ACK/NACK on the second resource. | 2022-02-10 |
20220045827 | METHOD AND APPARATUS FOR TRANSMITTING OR RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM - Disclosed herein is a terminal configured to receive information about one or more periodic uplink resources for transmission of HARQ-ACK information for multicast data, monitor a PDCCH in a search space for multicast configured on a specific downlink frequency resource, and detect DCI having a CRC scrambled with a G-RNTI. On a basis that the DCI indicates a specific index, and at least one of the one or more periodic uplink resources is associated with the specific index indicated by the DCI, the terminal may transmit an activation confirmation message to activate the at least one periodic uplink resource associated with the specific index. | 2022-02-10 |
20220045828 | RESOURCE DETERMINATION METHOD, APPARATUS, AND STORAGE MEDIUM - Disclosed is a resource determination method, including: a terminal apparatus receiving first signaling, the first signaling instructing the terminal apparatus to send feedback acknowledgement information corresponding to at least one downlink channel; and the terminal apparatus determining, on the basis of the first signaling, a resource for transmitting the feedback acknowledgement information. Also disclosed are another resource determination method, a terminal apparatus, a network apparatus, and a storage medium. | 2022-02-10 |
20220045829 | FACILITATING MULTIPLEXING OF DOWNLINK GRANT-TRIGGERED APERIODIC CHANNEL STATE INFORMATION REPORTS ON AN UPLINK CONTROL CHANNEL - Apparatus, methods, and computer-readable media for facilitating multiplexing of downlink grant-triggered aperiodic channel state information reports on an uplink control channel are disclosed herein. An example method for wireless communication at a UE includes receiving scheduling to provide multiple A-CSI reports while foregoing A-CSI multiplexing, the scheduling for up to two A-CSI reports in a same slot for the UE, and the multiple A-CSI reports being non-overlapping in time in the same slot. The example method also includes transmitting the multiple A-CSI reports to a base station in respective PUCCH in the same slot and while foregoing CSI multiplexing. | 2022-02-10 |
20220045830 | USER APPARATUS - A user apparatus includes: a receiver configured to perform predetermined measurement for a resource set in direct communication between terminals, the resource set having a likelihood of being used by another group to which the user apparatus does not belong; a control unit configured to determine, based on a result of the predetermined measurement, whether an effect from said another group having a likelihood of using the resource set is acceptable; and a transmitter configured to use the resource set to perform transmission to another user apparatus when a determination is made that the effect from said another group that uses the resource set is acceptable. | 2022-02-10 |
20220045831 | USER EQUIPMENT AND METHOD FOR HANDLING SWITCHING TIME PERIOD OF DOWNLINK-UPLINK SWITCHING FOR HALF DUPLEX-FREQUENCY DIVISION DUPLEX OPERATION - A user equipment and a method for handling a switching time period of downlink (DL)-uplink (UL) switching for half duplex-frequency division duplex operation are provided. The method includes: receiving a first configuration for a first active bandwidth part (BWP) with a first sub-carrier spacing (SCS), the first active BWP being one of an active UL BWP and an active DL BWP; receiving a second configuration for configuring a second active BWP with a second SCS, the second active BWP being another one of the active UL BWP and the active DL BWP; receiving a third configuration for the switching time period, the switching time period having a unit of symbol; performing communication with a Base Station (BS) on the first active BWP with the first SCS; and performing, after the switching time period, communication with the BS on the second active BWP with the second SCS. | 2022-02-10 |
20220045832 | SEARCH SPACE SET ACTIVATION - Disclosed are various techniques for wireless communication. In an aspect, a user equipment (UE) may monitor a physical downlink control channel (PDCCH) monitoring occasion defined by an active search space (SS) set. The UE may receive, during the PDCCH monitoring occasion, a downlink control information (DCI). In response, the UE may activate at least one deactivated SS set based on the DCI and a mapping that associates an SS set to a DCI type, DCI format, transmission direction, or specific combinations thereof. In another aspect, a UE may monitor a subset less than all of PDCCH monitoring occasions defined by an active SS set. The UE may receive, during a PDCCH monitoring occasion, a DCI. In response, the UE may monitor a larger number of PDCCH monitoring occasions defined by the active SS set. | 2022-02-10 |
20220045833 | DEVICES AND METHODS RELATED TO RADIO-FREQUENCY FRONT-END ARCHITECTURE FOR CARRIER AGGREGATION OF CELLULAR BANDS - Circuits and methods related to radio-frequency (RF) architectures having carrier aggregation. In some implementations, a method for performing carrier aggregation (CA) can include providing a duplexer configured to provide duplexing functionality for a first frequency band and a second frequency band with a common antenna. The method can further include providing a first amplification path and a second amplification path coupled to respective ports of the duplexer, each of the first amplification path and the second amplification path configured to amplify a signal in its respective frequency band, each amplification path including a transmit/receive (TX/RX) switch configured to provide time-division duplexing (TDD) functionality for the amplified signal and a received signal. In some implementations, the first frequency band includes a B39 band, and the second frequency band includes a B41 band. | 2022-02-10 |
20220045834 | METHOD AND APPARATUS FOR PERFORMING COMMUNICATION IN MOBILE COMMUNICATION SYSTEM - A user equipment (UE) for performing communication, the UE including a transceiver; and a processor coupled with the transceiver and configured to: control the transceiver to receive a UE capability enquiry, determine UE capability fields, except a frequency division duplexing (FDD) additional UE capability field, a time division duplexing (TDD) additional UE capability field, a frequency range 1 (FR 1) additional UE capability field and a frequency range 2 (FR 2) additional UE capability field, to include values applicable for all duplex modes and frequency ranges, and control the transceiver to transmit UE capability information based on a result of the determination. | 2022-02-10 |
20220045835 | Communication Device and Method for Operating a Communication System for Transmitting Time Critical Data - A communication device and method for operating a communication system for transmitting time-critical data, wherein a respective individual time window within predefined time intervals is specified for data flows assigned to selected control applications running on terminals, where time windows each have an individual cycle time that is a multiple of a general cycle time or corresponds to the general cycle time, first and second communication devices each check, for the selected control applications, whether a specified time window is available for data transmission, where information about a beginning of the time window within the predefined time intervals is in each case transmitted to the terminal upon which the respective selected control application is executing in the event of an available time window, and where data flows that are assigned to selected control applications are each transmitted according to the information about the beginning of the individual time window. | 2022-02-10 |
20220045836 | TIME SYNCHRONIZATION SYSTEM, MASTER DEVICE, SLAVE DEVICE, AND PROGRAM - A time synchronization system includes a master and slave devices connected to each other via a data bus and a signal line dedicated to transmission of a fixed-period signal. The master device transmits the fixed-period signal through the signal line regularly at a transmission period, and transmits start time information indicating a transmission start time at which transmission of the fixed-period signal is started and transmission period information indicating the transmission period for the fixed-period signal through the data bus. The slave device counts a number of times the fixed-period signal is received and calculates, as a current time in the master device, a transmission time at which the master device transmits the fixed-period signal based on the number of times the fixed-period signal is received. The slave device corrects the time to the calculated current time in the master device. | 2022-02-10 |
20220045837 | TIME SYNCHRONIZATION METHOD, APPARATUS, AND SYSTEM - In various embodiments, a method is provided. In this method, a first signal is received from a master node, and is sampled to obtain a first sample. The first sample is then quantized to obtain a quantized form of the first sample. A first synchronization sequence is detected from the quantized form of the first sample at T2. First information is received from the master node and the first information is used to indicate a moment T1 at which the master node sends the first synchronization sequence. A second synchronization sequence is sent to the master node at T3. Second information received from the master node and the second information is used to indicate a moment T4 at which the master node detects a quantized form of the second synchronization sequence. Time synchronization is performed based on T1, T2, T3, and T4. | 2022-02-10 |
20220045838 | Chaotic Communication Method and System Based on Complex Modified Projective Difference Function Synchronization - According to the chaotic communication method and system based on complex modified projective difference function synchronization provided in the present invention, when a chaotic signal has a relatively small amplitude, the amplitude of the chaotic signal can be adjusted by adjusting a proportional matrix, so as to mask plaintext better. Moreover, a robust controller is designed according to a filtered signal and a second coupling function, to ensure complex modified projective difference function synchronization, and such synchronization allows the bit error rate to be zero theoretically. In addition, complex modified projective difference function synchronization does not require a transmitter and a receiver to be exactly consistent, provided that the synchronization can be implemented under the effect of the controller, thereby solving the disadvantage in the prior art that the receiver system and transmitter system are required to have exactly identical structures, and simplifying a structure requirement on the communication system. | 2022-02-10 |
20220045839 | METHODS FOR PROTECTING COMPUTER HARDWARE FROM CYBER THREATS - A semiconductor intellectual property (IP) core comprising a transformation engine designed and configured to represent each element of a field GF(2 | 2022-02-10 |
20220045840 | METHODS AND SYSTEMS FOR SOMEWHAT HOMOMORPHIC ENCRYPTION AND KEY UPDATES BASED ON GEOMETRIC ALGEBRA FOR DISTRIBUTED LEDGER/BLOCKCHAIN TECHNOLOGY - Disclosed are methods and systems to encrypt data with SomeWhat Homomorphic Encryption (SWHE) properties for submission to a distributed ledger/blockchain that allows further open operations retained in the distributed ledger/blockchain on the encrypted data that will be properly reflected when the encrypted result is decrypted by the data owner. The somewhat homomorphic properties include addition and scalar division. Also disclosed is an ability to update a secret key applied for a ciphertext such that a single piece of data may be provided on the distributed ledger/blockchain by a data owner to a new data owner without also exposing other data encrypted with the original secret key of the original data owner. | 2022-02-10 |
20220045841 | HOMOMORPHIC TECHNOLOGY - A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software. The data is recorded in a highly secure manner. The data is stored encrypted in a database and accessed using a homomorphic access technology where the actual encrypted contents are not exposed. | 2022-02-10 |
20220045842 | SECURE BLOCKCHAIN INTEGRATED CIRCUIT - An integrated circuit comprising a CPU coupled to a system bus, a network interface configured to interface with an external device, and a crypto neuromorphic core coupled to the system bus. The cryptographic core comprising a processor or core, an internal bus, and a non-transitory computer-readable memory, wherein the crypto neuromorphic core is isolated from the CPU and the network interface via the system bus and the crypto neuromorphic core runs its own operating system. The crypto neuromorphic core is configured to: contain a secure core comprising a secure processor and dedicated/protected memory; store a private key in the dedicated/protected memory accessible to the secure core but not accessible to other components of the crypto neuromorphic core, the central processing unit, and the network interface; add data to a blockchain using the private key via the network interface; and read data from the blockchain via the network interface. | 2022-02-10 |
20220045843 | CRYPTOGRAPHY USING VARYING SIZED SYMBOL SETS - Disclosed are systems, methods, and non-transitory computer-readable media for symmetric cryptography using varying sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets of varying sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using varying sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack. | 2022-02-10 |
20220045844 | Cryptographic Data Communication Apparatus - In one embodiment, data communication apparatus includes a network interface for connection to a network and configured to receive a sequence of data packets from a remote device over the network, the sequence including data blocks, ones of the data blocks having block boundaries that are not aligned with payload boundaries of the packets, and packet processing circuitry to cryptographically process the data blocks using a block cipher so as to write corresponding cryptographically processed data blocks to a memory, while holding segments of respective ones of the received data blocks in the memory, such that the packet processing circuitry stores a first segment of a data block of a first packet in the memory until a second packet is received, and then cryptographically processes the first and second segments together so as to write a corresponding cryptographically processed data block to the memory. | 2022-02-10 |
20220045845 | AUTONOMOUS EXCHANGE VIA ENTRUSTED LEDGER TOKEN AND TRANSACTION MANAGEMENT - An Autonomous Exchange via Entrusted Ledger (AXEL) blockchain is discussed herein. The AXEL blockchain enables users to perform transactions in a private setting while enabling the transaction records thereof to be verified by other network users without publicly divulging the contents or details of the transaction records. The token identification system and method allows the tokens to carry an immutable identification to prevent negative blockchain occurrences such as double spending. A payment methodology allowing integration of external financial institutions with user owned and managed wallet. | 2022-02-10 |
20220045846 | BLOCKCHAIN PLATFORM SERVICE - The present invention describes an architecture for increasing the performance of blockchain using a virtual actor model to provide stateful services that are highly scalable and responsive to events as they support publishing and/or subscribing to streaming messages and/or events. The architecture as described leverages established distributed design practices to achieve what would otherwise require costly resource intensive hardware. | 2022-02-10 |
20220045847 | DETERMINING A CHANGE TO PRODUCT INFORMATION OR USER INFORMATION VIA HASHING - A device may determine a price of a product based on first information concerning attributes of the product, and provide the price for display by a user device. The device may generate first hash values based on the first information, where a particular first hash value is associated with a particular attribute, and generate a first bit-string that includes the plurality of first hash values. The device may generate second hash values based on second information concerning the attributes of the product, where a particular second hash value is associated with the particular attribute. The device may generate a second bit-string that includes the second hash values, and determine a change to the particular attribute based on the first bit-string and the second bit-string. The device may determine a new price of the product based on the change, and provide the new price for display by the user device. | 2022-02-10 |
20220045848 | PASSWORD SECURITY HARDWARE MODULE - Establish a secure connection from a device to a server by, at the device: sending a shared secret request (SSRq) and an obfuscated secret value of the device to the server, wherein the SSRq is encrypted by a symmetric rolling key known to the device and to a trusted authority but not known to the server and the SSRq incorporates a symmetric key for decrypting the device's obfuscated secret value; receiving a shared secret response (SSRs) and an obfuscated secret value of the server, wherein the device's symmetric rolling key encrypts the SSRs and the SSRs incorporates a symmetric server obfuscation key for decrypting the server's obfuscated secret value; calculating a shared secret by hashing a concatenation of the device's secret value and the server's secret value; generating a symmetric session key based on the shared secret; and establishing the secure connection using the symmetric session key. | 2022-02-10 |
20220045849 | GROUP SERVICE IMPLEMENTATION METHOD AND DEVICE, EQUIPMENT AND STORAGE MEDIUM - Provided are a group service implementation method and device, an equipment and a storage medium. The specific solution is described below. A service transaction request is acquired. In response to the service transaction request including to-be-authenticated data and a threshold signature, a signature group corresponding to the threshold signature is determined. Group information of the signature group is acquired by querying a blockchain, where the signature group includes at least two members, the at least two members of the signature group are used for authenticating the to-be-authenticated data by adopting secure multi-party computation and generating the threshold signature for the to-be-authenticated data by adopting a signature private key, and the group information includes at least a verification public key of the threshold signature. The threshold signature is verified by adopting the verification public key in the group information. | 2022-02-10 |
20220045850 | MEMORY SYSTEM ENCRYPTING DATA - A memory system includes a nonvolatile memory and a controller. In a case where first encrypted data obtained by encrypting first data with a first DEK is stored in the nonvolatile memory, in response to determining that second data received based on a first write request from a host is the same as the first data and a first user uses the host, the controller encrypts the first DEK with a first KEK associated with the first user to acquire a first encrypted DEK, and stores the first encrypted DEK. | 2022-02-10 |
20220045851 | SYSTEM FOR SECURE DATA TRANSMISSION USING FULLY HOMOMORPHIC ENCRYPTION - Systems, computer program products, and methods are described herein for secure data transmission using fully homomorphic encryption. The present invention is configured to electronically retrieve a data file from a source computing device, wherein the data file in encrypted using a public key; initiate a homomorphic engine on the data file, wherein the homomorphic engine comprises one or more homomorphic encryption algorithms; generate, using a first homomorphic encryption algorithm, a header and a trailer for the data file; generate, using the first homomorphic encryption algorithm, a unique row for the data file; generate an evaluation key based on at least generating the header, the trailer, and the unique row for the data file; append the header, the trailer, and the unique row to the data file to generate an appended data file; and transmit the appended data file to a target computing device. | 2022-02-10 |
20220045852 | COLLATION SYSTEM, CLIENT AND SERVER - A collation system | 2022-02-10 |
20220045853 | HYPERVISOR PROTECTED KEY - A method, a computer system, and a computer program product for cryptography are provided. A guest virtual server registers with a trusted hypervisor by using guest credentials. A guest wrapping key associated with the guest credentials is generated. A satellite virtual server instance that shares a master key with the virtual guest server is generated in the trusted hypervisor. A copy of the guest wrapping key is passed to the satellite virtual server instance. A random guest key is wrapped with the guest wrapping key, thereby producing a wrapped guest key. The wrapped guest key is rewrapped with the master key to form a protected guest key. | 2022-02-10 |
20220045854 | UNIFICATION OF DATA FLOWS OVER NETWORK LINKS WITH DIFFERENT INTERNET PROTOCOL (IP) ADDRESSES - Provided herein are systems, devices and methods for opening a connection in a gateway of a cloud based network for a client device connected via two different network links to the gateway and to a Software Defined Perimeter (SDP) controller of a cloud based network. The SDP controller may receive a request from a client device to connect to a gateway of the cloud based network, generate a one-time SPA key for the client device (after authenticated), transmit the SPA key to the gateway, and transmit, via the first network link, the SPA key to the client device. The client device may transmit the SPA key to the gateway via the second network link and the gateway may be configured to open a connection for the client device via the second network link in case the SPA key is valid. | 2022-02-10 |
20220045855 | SECURE COMMUNICATION NETWORK - A method of exchanging a combined cryptographic key between a first node and a second node, | 2022-02-10 |
20220045856 | Split Security Solutions for Video/Audio Using SpaceFlip Class Ciphers - Audio files and Video files are processed with a new level of security by first spotting parts thereof with a strong entropic impact, and treating these sensitive parts (e.g. human faces, secret gadgets) with equivocation generating ciphers that would withstand quantum computer cryptanalysis. | 2022-02-10 |
20220045857 | KEY DISTRIBUTION METHOD AND SYSTEM BASED ON SYNCHRONIZED BROADBAND PHYSICAL RANDOM SOURCES - A key distribution method based on broadband physical random sources includes: utilizing a driving semiconductor laser to generate an optical signal, passing the optical signal through a phase modulator driven by a random signal and then equally dividing the phase-modulated optical signal into two identical paths, injecting the two identical paths into slave semiconductor lasers at both communication parties Alice and Bob's sides, respectively, to generate initial synchronized signals, using the generated initial synchronized signals as driving signals to phase-modulate optical signals generated by continuous-wave (CW) light sources, and inputting the modulated optical signals to dispersion modules; wherein after the modulated CW optical signals pass through the dispersion modules, two synchronized broadband noise-like random signals are generated, and then high-speed synchronized keys are generated by a post-processing method. | 2022-02-10 |
20220045858 | Systems and Methods for Privacy-Reserving Data Hiding - Described in detail herein is a method for encrypting or encoding time-stamped location data associated with a computing device. The method converts time and location information associated with the computing device into a vector format. The method generates a code vector based on the converted time and location vector. The method sorts entries in the code vector based at least in part on a predetermined ordering scheme. The method executes a random modification to each of the sorted entries. The method compares the code vector to at least one other code vector associated with another computing device. The method identifies other code vectors within a specified distance of the given code vector. The method concludes that the computing device and the at least one other computing device were in proximity to each other during a time period corresponding to the time information. | 2022-02-10 |
20220045859 | SYSTEMS AND METHODS FOR MANAGING A COMPROMISED AUTONOMOUS VEHICLE SERVER - Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key. | 2022-02-10 |
20220045860 | CONSENSUS LAYER ARCHITECTURE FOR MAINTAINING SECURITY WITH REDUCED PROCESSING POWER DEPENDENCY IN UNTRUSTED DECENTRALIZED COMPUTING PLATFORMS - Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs. | 2022-02-10 |
20220045861 | SYSTEM AND METHOD FOR AN ELECTRONIC IDENTITY BROKERAGE - A computer implemented system for electronic verification of credentials including at least one processor and data storage is described in various embodiments. The system includes cryptographic mechanisms and electronic communication between one or more computing systems that in concert, provide verification of a prover's credentials in accordance to logical conditions of a verifier's policy without providing additional information to a verifier entity. | 2022-02-10 |
20220045862 | SECURE DIGITAL INFORMATION INFRASTRUCTURE - An authentication and encryption computer system is disclosed including processing devices, a network interface, and a data store. The authentication and encryption system is configured to maintain in the data store content common to a plurality of entities and content independently specified by each of the plurality of entities. The system is configured to receive a content request from an application executing on a mobile device, the content request comprising a secure access code corresponding to an entity, and the content request encrypted by the mobile device. An interface, comprising the content common to the plurality of entities, is customized to include content independently specified by the entity, wherein the content independently specified by the entity comprises a token value. A user request for an item presented via the interface is received and the token value is transferred to the entity. | 2022-02-10 |
20220045863 | TRANSACTION MODE-BASED ELECTRONIC CONTRACT FORENSICS METHOD AND SYSTEM - The present application provides a transaction-based electronic contract forensics method and system: when a user wants to perform forensics for an electronic contract in a blockchain digital deposit platform, initiating, by a present electronic contract platform, a forensics request for the electronic contract; obtaining, by the blockchain digital deposit platform, the forensics request and querying deposit information; obtaining a transaction hash value of the deposit information after the deposit information is queried; querying a deposit transaction corresponding to the deposit platform; obtaining a digest; decrypting the digest, to obtain a storage index table; verifying validity of a private-key signature of the deposit transaction; downloading transaction data of the deposit transaction according to a data index; decrypting the transaction data; and verifying validity, legitimacy, and integrity of the decrypted transaction data. A data source of electronic contract forensics is ensured by querying the deposit information and the corresponding deposit transaction, and credibility of electronic contract forensics is ensured by verifying the validity, the legitimacy, and the integrity of the transaction data, thereby achieving an electronic contract forensics process. | 2022-02-10 |
20220045864 | VERACITY MEASURES FOR ONLINE DISCOURSE - Systems and methods are disclosed for evaluating the veracity of online content, particularly in cases where the online content is signed/authenticated by one or more digital signatures associated with one or more users. Also disclosed are systems and methods for storing and retrieving authenticated content, and displaying authenticated content referencing other authenticated content. | 2022-02-10 |
20220045865 | MORE EFFICIENT POST-QUANTUM SIGNATURES - Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message. | 2022-02-10 |
20220045866 | METHOD AND SYSTEM FOR AUTHENTICATION SEAL DEPLOYMENT IN NETWORKED IMMUTABLE TRANSACTIONS - Computer-implemented method and system of generating an authentication seal. The method includes receiving, at a memory of an authentication agent server computing device, a data record submittal from a client agent having an associated client signing key and a client verification key, the data record submittal including a data record and a record hash (R-HSH) of the data record, associating, using one or more processors, the R-HSH and a client signature associated with the client agent with a unique identifier (B-ID) of a location within an immutable storage medium, the client signature based at least on a client signing key associated with the client agent, generating, using the one or more processors, an authentication seal based at least in part upon at least the R-HSH and the B-ID, and receiving an audit request in verification of the authentication seal in association with the data record. | 2022-02-10 |
20220045867 | SYSTEM AND METHOD FOR SECURE MULTI-PARTY COMPUTATION BASED BLOCKCHAIN TRANSACTION - System and method of creating a multi-party computation (MPC) cryptographic signature for a blockchain based computer network, including: generating at least one first share and second share of a cryptographic key, based on a distributed key generation MPC protocol, signing a received message with the at least one first share, receiving the message signed with the at least one first share, signing the message signed with the at least one first share with the at least one second share, sending the message signed with the at least one second share and the at least one first share to a full node of the computer network, and adding a transaction to a ledger of the computer network, in accordance with the received message signed by the at least one first share and the at least one second share. | 2022-02-10 |
20220045868 | METHOD FOR VALIDATING A DIGITAL USER CERTIFICATE - A method for validating a digital user certificate of a user by a checking device is provided. The user certificate is protected by a digital signature with an issuer key of an issuance location which issues the user certificate. The method has the steps of: receiving the user certificate in the checking device, checking the user certificate using a certificate path positive list with at least one valid certificate path which is provided to the checking device by at least one positive path server, and confirming the validity of the user certificate if the issuer key of the user certificate can be traced back to a root certificate according to one of the valid certificate paths of the certificate path positive list. Also provided is a system, a checking device, a user device, a positive path server, and a computer program product which are designed to carry out the method for validating a digital user certificate. | 2022-02-10 |
20220045869 | BLOCKCHAIN-BASED CONSUMABLES MANAGEMENT WITH SUPPORT FOR OFFLINE INSTRUMENTS - Blockchain-based consumables management with support for offline instruments. In an embodiment, a user device scans a first machine-readable code on a consumable, scans a second machine-readable code displayed on a display of an instrument that is not communicatively connected to a blockchain network, decodes a consumable code from the first machine-readable code, decodes an instrument code from the second machine-readable code, broadcasts a transaction message, comprising the consumable code and the instrument code, to the blockchain network, receives a use code from the blockchain network, encodes the use code into a third machine-readable code, and displays the third machine-readable code, on a display of the user device, for scanning by the instrument. | 2022-02-10 |
20220045870 | METHOD AND SYSTEM FOR INTELLIGENT TRANSPORTATION SYSTEM CERTIFICATE REVOCATION LIST REDUCTION - A method at a computing device within an Intelligent Transportation System (ITS), the method including: receiving a first message, the first message including at least tailoring information for a first ITS endpoint and intended journey details for the first ITS endpoint; storing all or a subset of data from the first message; obtaining a full certificate revocation list; creating a tailored certificate revocation list based on data in the first message and the full certificate revocation list, the tailored certificate revocation list containing certificates or identifiers of certificates for ITS endpoints that may be encountered by the first ITS endpoint when navigating a route provided in the intended journey details; and providing the tailored certificate revocation list to the first ITS endpoint. | 2022-02-10 |
20220045871 | CORRECTING PHYSICAL UNCLONABLE FUNCTION ERRORS BASED ON SHORT INTEGERS SOLUTIONS TO LATTICE PROBLEMS - Physical unclonable functions (PUFs) are described. The PUFs utilize intrinsic information to determine the confidence level of comparison values. The information about confidence levels may be used to simplify the process of recovering the PUF secret. Since the information about confidence levels may be intrinsic, and not know outside the PUF, the PUF may be secure. | 2022-02-10 |
20220045872 | PHYSICAL UNCLONABLE FUNCTION CONFIGURATION AND READOUT - The present disclosure relates to configuring at least one pair of devices in a physical unclonable function (PUF) apparatus and reading out at least one pair of devices for determining a persistent random PUF output. The pair of devices may be readout by measuring a physical difference between the devices/components caused by random manufacturing differences, which may then be used to determine a persistence random PUF output. Configuring the pair of devices includes measuring the random manufacturing difference and, based on that measurement, setting a readout condition for the pair of devices, which dictates aspects of the readout process that should be used for that pair of devices. Each time the pair of devices is readout in the future, it may be readout in accordance with the condition that was set at configuration. | 2022-02-10 |
20220045873 | SECURITY DEVICE INCLUDING PHYSICAL UNCLONABLE FUNCTION CELLS AND OPERATION METHOD THEREOF - A security device includes a physical unclonable function (PUF) cell array including PUF cells connected with word lines and bit lines; first decoder circuitry connecting a first bit line connected to a target PUF cell with a first data line and a second bit line connected with a reference PUF cell to a second data line; a digital-to-analog converter (DAC) control circuit outputting first and second digital codes; a first DAC between a power supply voltage and the first data line, the first DAC generating a first analog output in response to the first digital code; a second DAC between the power supply voltage and the second data line, the second DAC generating a second analog output in response to the second digital code; and a sense amplifier comparing the first analog output and the second analog output and outputting a comparison result. | 2022-02-10 |
20220045874 | CHARGING PROCESSING METHOD AND SYSTEM, AND RELATED DEVICE - A charging processing method includes: when a charging processing device for a user service is unavailable, storing charging data of the user service during the failure period, where the charging data includes charging data that is not sent or charging data that is not processed; and after it is determined that a charging processing device for the user service transitioned from “unavailable” to “available”, sending a charging request message that includes the charging data during the failure period to the available charging processing device, so that the available charging processing device performs charging processing on the charging data before a charging processing device transitioned to “available”. In this method, when the charging processing device or a network is faulty, interruption of the user service can be avoided, and a loss caused for an operator can be avoided. | 2022-02-10 |
20220045875 | MULTICAST MESSAGE PROCESSING METHOD AND APPARATUS, STORAGE MEDIUM AND PROCESSOR - Provided are a multicast message processing method and device, a storage medium and a processor. The method includes: a multicast group address is acquired from a received multicast message; according to the multicast group address, first routing information matching the multicast group address is searched in first data by means of a Hash algorithm; according to mark information and source address information of a multicast group, matched second routing information is searched in second data by means of the Hash algorithm; if the second routing information is found, the multicast message is sent according to next hop information of the multicast message in the second routing information; and if the second routing information is not found, the multicast message is sent according to the next hop information of the multicast message in the first routing information. | 2022-02-10 |
20220045876 | WIRE HARNESS AND COMMUNICATION RELAY METHOD - Provided are a wire harness and a communication relay method with which effects such as reduction in the relay processing load of an in-vehicle device or improvement in the scalability of an in-vehicle device can be expected. A wire harness according to an embodiment includes a circuit board detachably mountable to an in-vehicle device, a plurality of communication lines connected to the circuit board, and a relay unit provided on the circuit board and configured to relay communication between the plurality of communication lines and to relay communication between the communication lines and the in-vehicle device. | 2022-02-10 |
20220045877 | Digital Addressable Lighting Interface, DALI, enabled communication device for transmitting messages over a communication bus, as well as a corresponding method - A Digital Addressable Lighting Interface, DALI, enabled communication device for transmitting messages over a communication bus having two communication lines, said device comprising a switch connected between said two communication lines, a controller arranged for controlling said switch for imposing logical communication levels on said communication bus, an energy storage device, connected in series with said switch, and arranged for storing electrical energy flowing from said bus through said switch, a bypass circuit arranged for bypassing said energy storage device when a voltage over said energy storage device is above a predetermined voltage threshold. | 2022-02-10 |
20220045878 | Distributed System with Fault Tolerance and Self-Maintenance - A distributed system includes a plurality of compute nodes configured to process messages. The compute nodes each process messages corresponding an assigned value of a common parameter of the messages. The values are assigned to the compute nodes such that two or more compute nodes are available to process each message. The values can be assigned to the compute nodes in a grouping configuration or a striping configuration. The compute nodes also circulate one or more tokens among nodes, and perform a self-maintenance operation during a given state of possession of the token. During a self-maintenance operation, the values assigned to the compute node can be reassigned to other compute nodes to ensure processing of corresponding messages. | 2022-02-10 |
20220045879 | CONNECTING VIRTUAL COMPUTER NETWORKS WITH OVERLAPPING IP ADDRESSES USING TRANSIT VIRTUAL COMPUTER NETWORK - A system and method for connecting virtual computer networks in a public cloud computing environment using a transit virtual computer network uses a cloud gateway device in the transit virtual computer network that includes a first-tier logical router and a plurality of second-tier logical routers connected to the virtual computer networks. A source Internet Protocol (IP) address of outgoing data packets from a particular virtual computer network is translated at a particular second-tier logical router of the cloud gateway device from an IP address of the particular virtual computer network to an internal IP address from a particular pool of IP addresses. The outgoing data packets are then routed to the first-tier logical router of the cloud gateway device, where the outgoing data packets are transmitted a destination network from a particular interface of the first-tier logical router of the cloud gateway device. | 2022-02-10 |
20220045880 | APPARATUS AND METHODS FOR GENERATING NON-INTERFERING ELECTROMAGNETIC WAVES ON AN UNINSULATED CONDUCTOR - Aspects of the subject disclosure may include, receiving a plurality of communication signals, and generating, according to the plurality of communication signals, a plurality of electromagnetic waves bound at least in part to a dielectric layer of a conductor. The plurality of electromagnetic waves propagates along the dielectric layer of the conductor without an electrical return path, where each electromagnetic wave of the plurality of electromagnetic waves includes a different portions of the plurality of communication signals, and where the plurality of electromagnetic waves utilizes a signal multiplexing configuration that at least reduces an interference between the plurality of electromagnetic waves. Other embodiments are disclosed. | 2022-02-10 |
20220045881 | CONFIGURING TRAFFIC OPTIMIZATION USING DISTRIBUTED EDGE SERVICES - Some embodiments provide a novel method for configuring managed forwarding elements (MFEs) to handle data messages for multiple logical networks that are implemented in a data center at the MFEs and to provide gateway service processing (e.g., firewall, DNS, etc.). A controller, in some embodiments, identifies logical networks implemented in the datacenter and MFEs available to provide gateway service processing and assigns gateway service processing for each logical network to a particular MFE. The MFEs, in some embodiments, receive data messages from endpoints in the logical networks that are destined for an external network. In some embodiments, the MFEs identify that the data messages require gateway service processing before being sent to the external network. The MFEs, in some embodiments, identify a particular MFE that is assigned to provide the gateway service processing for logical networks associated with the data messages. | 2022-02-10 |
20220045882 | TECHNIQUES FOR ADDING PILOTS TO A FORWARDED SIGNAL BY A REPEATER NODE - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a repeater node may receive a first signal to be forwarded to a receiver node or a control node. The repeater node may generate a second signal that includes repeater node pilots and the first signal to be forwarded to the receiver node or the control node. The repeater node may transmit, to the receiver node or the control node, the second signal. Numerous other aspects are provided. | 2022-02-10 |
20220045883 | Methods and Apparatuses for Signaling and Determining Reference Signal Offsets - Methods and apparatuses disclosed herein enable the use of Demodulation Reference Signal, DMRS, sequences that are numbered relative to an overall system bandwidth, while simultaneously enabling wireless communication devices to determine the DRMS sequence elements mapped to their scheduled bandwidths within the system bandwidth. Advantageously, the wireless communication devices need not know the system bandwidth, or even be aware of where their scheduled bandwidths reside within the system bandwidth. | 2022-02-10 |
20220045884 | METHODS AND APPARATUSES FOR UPLINK CHANNEL SOUNDING BETWEEN BWPS - Methods and apparatuses for uplink (UL) channel sounding between bandwidth parts (BWPs). A method for operating a user equipment (UE) includes receiving first information for a set of UL BWPs of a serving cell, wherein the set of UL BWPs includes more than one UL BWP and receiving second information, for each UL BWP from the set of UL BWPs, for sounding reference signal (SRS) resource sets. The method further includes determining, for each UL BWP from the set of UL BWPs, corresponding first SRS resources from the SRS resource sets and transmitting a SRS, in each UL BWP from the set of UL BWPs, using the corresponding first SRS resources. | 2022-02-10 |
20220045885 | Serial-Link Receiver Using Time-Interleaved Discrete Time Gain - A serial receiver combines continuous-time equalization, analog interleaving, and discrete-time gain for rapid, efficient data reception and quantization of a serial, continuous-time signal. A continuous-time equalizer equalizes a received signal. A number N of time-interleaved analog samplers sample the equalized continuous-time signal to provide N streams of analog samples transitioning at rate reduced by 1/N relative to the received signal. A set of N discrete-time variable-gain amplifiers amplify respective streams of analog samples. A quantizer then quantizes the amplified streams of analog samples to produce a digital signal. | 2022-02-10 |
20220045886 | Method For Processing A Stream Of Data In A Receiver Device - A method for processing, in a receiver device, a signal representative of a stream of data coded from a series of information units through coding using a predefined group of symbols to code each information unit of the series, comprises: —a step of receiving (E | 2022-02-10 |
20220045887 | FPGA BASED SYSTEM FOR DECODING PAM-3 SIGNALS - An FPGA based system for decoding PAM-3 signals is disclosed, wherein the system comprises a directional coupler for separating 100BASE-T1 and 1000BASE-T1 master and slave signals, DVGAs for amplifying the master and slave signals, ADCs for sampling the amplified signals, and a FPGA module, wherein the FPGA module is configured for decoding the PAM-3 symbols, in real-time, from oversampled ADCs data using fully pipelined Register Transfer Level (RTL) architecture. | 2022-02-10 |
20220045888 | COMMUNICATION SIGNAL DEMODULATION APPARATUS AND COMMUNICATION SIGNAL DEMODULATION METHOD - A communication signal demodulation apparatus demodulates a communication signal to generate an output signal. The communication signal demodulation apparatus includes: plural sensor circuits which sense different electrical characteristics of one same communication signal and generate corresponding sensing modulation signals respectively; plural processing filters which filter the corresponding sensing modulation signals respectively and generate corresponding filtered modulation signals respectively; plural demodulators which demodulate the plural filtered modulation signals and generate corresponding demodulation signals respectively, wherein each of the filtered modulation signals corresponds to at least one of the demodulators; and a determination circuit which receive the plural demodulation signals, determine whether each unit signal of each of the demodulation signals is correct or not according to a determination mechanism, and combine one or more correct unit signals to generate the output signal. | 2022-02-10 |
20220045889 | EXTENDING COMMUNICATION RANGE OF WIRELESS DEVICES OPERATING IN A 6 GIGAHERTZ BAND - A method by a wireless device to extend communication range when operating in a 6 Gigahertz (GHz) band of a wireless network is described. The method includes generating a physical layer protocol data unit (PPDU) that includes a preamble portion and a data portion that includes first data and transmitting the PPDU through a wireless medium on a transmission channel that is subdivided into a plurality of resource units (RUs), wherein the first data is duplicated in the data portion in a frequency domain in units of RUs. | 2022-02-10 |
20220045890 | ORTHOGONAL TIME FREQUENCY SPACE MODULATION TECHNIQUES - Orthogonal Time Frequency Space (OTFS) is a novel modulation scheme with significant benefits for 5G systems. The fundamental theory behind OTFS is presented in this paper as well as its benefits. We start with a mathematical description of the doubly fading delay-Doppler channel and develop a modulation that is tailored to this channel. We model the time varying delay-Doppler channel in the time-frequency domain and derive a new domain (the OTFS domain) where we show that the channel is transformed to a time invariant one and all symbols see the same SNR. We explore aspects of the modulation like delay and Doppler resolution, and address design and implementation issues like multiplexing multiple users and evaluating complexity. Finally we present some performance results where we demonstrate the superiority of OTFS. | 2022-02-10 |
20220045891 | SIGNAL TRANSMISSION METHOD AND SYSTEM - Provided are a signal transmission method and system, which relates to wireless communications. The method includes: transmitting, by a first node, a first signal. The first signal comprises at least one of: at least one first structure, or at least one second structure. The first structure includes at least one symbol group, and the symbol group of the first structure includes a cyclic prefix and at least one symbol or includes a cyclic prefix, at least one symbol and a guard period. Each symbol group of the first structure occupies a same subcarrier or a same frequency resource in a frequency domain. The second structure includes at least one symbol group, and the symbol group of the second structure comprises a cyclic prefix and at least one symbol or includes a cyclic prefix, at least one symbol and a guard period. Each symbol group of the second structure occupies a same subcarrier or a same frequency resource in the frequency domain. | 2022-02-10 |
20220045892 | METHOD AND DEVICE IN COMMUNICATION NODE USED FOR WIRELESS COMMUNICATION - The present disclosure provides a method and a device in a communication node used for wireless communications. A communication node receives first information and second information; and transmits a first radio signal, an SCS of a subcarrier occupied by the first radio signal is equal to a first SCS; a sum of a first timing adjustment and a second timing adjustment is used to determine a transmission timing for the first radio signal, and the first timing adjustment is used to determine a transmission timing for a radio signal transmitted earlier than the first radio signal; the second timing adjustment is equal to a sum of a first sub-adjustment and a second sub-adjustment, the first information is used to determine the first sub-adjustment, and the second information is used to determine the second sub-adjustment. The present disclosure improves scheduling flexibility. | 2022-02-10 |
20220045893 | TERMINAL APPARATUS, BASE STATION APPARATUS, AND COMMUNICATION METHOD - Provided are a terminal apparatus, a base station apparatus, and a communication method capable of improving reliability or frequency efficiency in a case of transmission by beamforming. An apparatus includes: a receiver configured to receive a downlink shared channel including configuration information, downlink control information, and a transport block; and a signal detection unit configured to decode the downlink shared channel by using a redundancy version included in the downlink control information. The configuration information includes the number of continuous slots in which an identical transport block is transmitted repeatedly, demodulation reference signals (DMRSs) transmitted in at least two of the continuous slots are not in a relationship of Quasi-colocation (QCL), and the redundancy version is determined from slot indexes of the continuous slots and information for indicating the QCL. | 2022-02-10 |
20220045894 | CODING AND MODULATION APPARATUS USING NON-UNIFORM CONSTELLATION - A coding and modulation apparatus and method are presented. The apparatus comprises an encoder that encodes input data into cell words, and a modulator that modulates said cell words into constellation values of a non-uniform constellation. The modulator is configured to use, based on the total number M of constellation points of the constellation and the code rate, a non-uniform constellation from one or several groups of constellations each comprising one or more constellations. | 2022-02-10 |
20220045895 | APPARATUS AND METHOD FOR RECEIVING QUADRATURE AMPLITUDE MODULATED "QAM" SYMBOL - Techniques are presented for receiving Quadrature Amplitude Modulated (QAM) symbols from a transmitter via a transmission path. In one example, a demodulator is configured to down-convert an incoming Radio Frequency (RF) signal to a baseband signal and convert the baseband signal to digital samples, and output the digital samples. A demapper is configured to receive the digital samples output from the demodulator and output data encoded in QAM symbols. The demapper is further configured to: determine from a constellation of QAM symbols a subset of QAM symbols that a digital sample from the demodulator may represent; apply an offset to each QAM symbol in the subset of QAM symbols of the constellation to result in a subset of offset QAM symbols; determine which QAM symbol in the subset of offset QAM symbols the digital sample most likely represents; and output data representing a determined QAM symbol. | 2022-02-10 |
20220045896 | NETWORK STATE MANAGEMENT - A network device intercepts, from an application associated with a user space, a request message associated with obtaining information regarding a network state from a kernel. The network device directs the request message to a service daemon of the user space based on intercepting the request message, and determines, using the service daemon, network state information regarding the network state. The network device intercepts, from the service daemon, a response message associated with providing the network state information to the application, and directs an altered response message to the application based on intercepting the response message such that the altered response message identifies the kernel as a source of the response message and not the service daemon as the source of the response message. | 2022-02-10 |
20220045897 | Systems, Methods and Devices for Networked Media Distribution - A domain manager configured to manage and/or configure an audio-video (AV) system but not directly participate in networked media transmission or clock synchronization. The domain manager may include a database; an endpoint manager configured to communicate with the database, the endpoint manager being configured to setup and maintain secure connections to and from media devices and controllers; and at least one management module configured to communicate with the database and provide services to the media devices and controllers. In embodiments, the at least one management module may include at least one of a manager for managing credentials and grouping devices into domains, a device directory for managing device registrations and lookup, and an access controller for managing and/or evaluating access control policy. | 2022-02-10 |
20220045898 | USING A PROGRAMMABLE RESOURCE DEPENDENCY MATHEMATICAL MODEL TO PERFORM ROOT CAUSE ANALYSIS - A controller device manages a plurality of network devices. The controller device includes a memory configured to store a dependency model representing dependencies between resources provided by the network devices and a programmed merge strategy, and one or more processors implemented in circuitry and configured to: determine the resources provided by the network devices; determine relationships between the resources according to the programmed merge strategy; construct the dependency model using the determined relationships; determine that at least one of the resources has experienced a failure; and perform a root cause analysis using the dependency mathematical model to determine a root cause of the failure of the at least one of the resources. | 2022-02-10 |
20220045899 | METHOD AND APPARATUS FOR PROVIDING NOTIFICATION OF DETECTED ERROR CONDITIONS IN A NETWORK - Methods for managing a communication session in a communication network are disclosed. For example, a method includes detecting, by a first endpoint comprising at least one processor, an error condition associated with the communication session, sending, by the first endpoint, a notification of the error condition to a second endpoint that is using a transport layer session and receiving, by the first endpoint, a communication from the second endpoint, proposing a response to the error condition. Another method includes receiving, by a first endpoint comprising at least one processor, a notification of an error condition associated with the communication session, selecting, by the first endpoint, a response to the error condition, and sending, by the first endpoint, a communication to a second endpoint that is using a transport layer session, proposing a response to the error condition. | 2022-02-10 |
20220045900 | MALFUNCTION POINT ESTIMATION METHOD AND MALFUNCTION POINT ESTIMATION APPARATUS - A failure location estimation apparatus sets partial networks obtained by dividing a network into one or more networks, and verifies connectivity of a path for each of combinations of terminal nodes for each of the partial networks. The failure location estimation apparatus selects some or all combinations of the combinations of terminal nodes determined to have an abnormality in connectivity for each of the partial networks, and verifies connectivity of a path for each of combinations of nodes included in a selected node connection that is the selected combinations of terminal nodes. The failure location estimation apparatus estimates a failure location in the network based on a verification result of connectivity of each of the combinations of nodes. | 2022-02-10 |
20220045901 | ELECTRONIC DEVICE, METHOD FOR ELECTRONIC DEVICE, COMPUTER READABLE MEDIUM, AND APPARATUS - The present disclosure relates to an electronic device, a method for an electronic device, a computer readable medium, and an apparatus. An electronic device, comprises: a memory having instructions stored thereon; and a processor configured to execute the instructions stored on the memory, to cause the electronic device to perform at least the following: receiving a network configuration information processing request from a first user device for a network to which the first user device is connected; determining whether one or more user devices have been set as primary devices, the primary devices having authorities to process network configuration information; in response to determining that the one or more user devices have been set as primary devices: determining whether the first user device is one of the primary devices; in response to determining that the first user device is one of the primary devices, responding to the network configuration information processing request; and in response to determining that the first user device is not one of the primary devices, denying the network configuration information processing request; and in response to determining that no user device is set as a primary device: responding to the network configuration information processing request. | 2022-02-10 |
20220045902 | CONFIGURING MEASUREMENT REFERENCE SIGNALS FOR MIMO - Systems and methods relating to 6-port and/or greater than 8-port Channel State Information Reference Signal (CSI-RS) configurations are disclosed. In some embodiments, a method of operation of a radio access node in a cellular communications network comprises configuring a plurality of CSI-RS ports for a wireless device, where the plurality of CSI-RS ports is six CSI-RS ports, ten CSI-RS ports, twelve CSI-RS ports, fourteen CSI-RS ports, or sixteen CSI-RS ports, depending on the embodiment. The method further comprises transmitting CSI-RS on at least a subset of the plurality of CSI-RS ports configured for the wireless device. In this manner, support for, e.g., an increased number of antenna ports and/or support for two-dimensional (2D) antenna arrays is provided. | 2022-02-10 |
20220045903 | INTERNET-OF-THINGS DEVICE AUTONOMOUS ACTIVATION - Various techniques are described herein for autonomously registering and/or activating Internet-of-Things (IoT) devices, provisioning wireless network access of those devices, and connecting the IoT device to an NB-IoT network with agreed-to terms for network usage. In various embodiments, IoT devices may be configured to negotiate for NB-IoT network access by (i) sharing their data with the NB-IoT network provider, (ii) security storing and using cryptocurrency to obtain NB-IoT network access, and/or (iii) automatically providing the NB-IoT network provider with access to data from other associated IoT devices and/or with payment from a separate payment provider. Individual IoT devices may be preconfigured with negotiation terms for NB-IoT network access, pre-associated with other devices/users, and/or pre-loaded with cryptocurrency in a secure storage. | 2022-02-10 |
20220045904 | ROUTER, METHOD FOR ROUTER, COMPUTER-READABLE MEDIUM, AND APPARATUS - The present disclosure relates to a router, a method for the router, a computer-readable medium, and an apparatus. A router including: a memory having instructions stored thereon; and a processor configured to execute the instructions stored on the memory to cause the router to perform at least the following: providing a plurality of private subnets isolated from one another, each of the plurality of private subnets having corresponding network configuration information; and in response to a request to perform a first processing on network configuration information from a first user device connected to a first of the plurality of private subnets, performing the first processing on only first network configuration information corresponding to the first private subnet. | 2022-02-10 |
20220045905 | IMPLICIT TRAFFIC ENGINEERING - Briefly, methods and/or apparatuses for implicit traffic engineering, such as for the Internet, are described. | 2022-02-10 |
20220045906 | APPARATUS AND METHODS FOR OPTIMIZING CAPACITY IN WIRELINE CABLE NETWORKS WITH VIRTUAL SERVICE GROUPS - Apparatus and methods for optimizing bandwidth utilization and services in a data network infrastructure. In one embodiment, the data network is a managed Hybrid Fiber Coaxial (HFC) cable network, and the network infrastructure is configured to enable dynamic allocate of frequency bands to individual consumer premises device (e.g., DOCSIS-compliant cable modems). In one variant, the improved network infrastructure enables creation of virtual Service Groups (vSGs), and allocation of individual ones of the CM to such vSGs, to some degree irrespective of topological or “hardwired” location within the network. The allocations can be dynamic, and based on factors such as load balancing, evacuation of portions of the physical network topology (such as to support infrastructure upgrades or replacement), or for yet other reasons such as relating to subscriber tier or service level agreement (SLA). | 2022-02-10 |
20220045907 | NON-DISRUPTIVE IMPLEMENTATION OF POLICY CONFIGURATION CHANGES - Techniques for non-disruptive configuration changes are provided. A packet is received at a network device, and the packet is buffered in a common pool shared by a first processing pipeline and a second processing pipeline, where the first processing pipeline corresponds to a first policy and the second processing pipeline corresponds to a second policy. A first copy of a packet descriptor for the packet is queued in a first scheduler based on processing the first copy of the packet descriptor with the first processing pipeline. A second copy of the packet descriptor is queued in a second scheduler associated based on processing the second copy of the packet descriptor with the second processing pipeline. Upon determining that the first policy is currently active on the network device, the first copy of the packet descriptor is dequeued from the first scheduler. | 2022-02-10 |
20220045908 | CONFIGURATION MANAGEMENT FOR CO-MANAGEMENT - Various examples for discovering policy bindings between group policy rules in a legacy management framework and unified endpoint management rules that are utilized in a modern mobile device management (MDM) device management framework. A configuration state view can allow an administrator to understand inconsistencies or conflicts between group policy rules and UEM rules. | 2022-02-10 |
20220045909 | Neighbor List Adaptive Mapping - Neighbor list adaptive mapping may be provided. A request to a client device to provide a client device view of a network may be sent periodically at a time interval. A length of the time interval may be dependent on a condition at the client device and identity data may be associated with the client device. In response to sending the request to the client device, data corresponding to the client device view of the network may be received. Then, in response to receiving the data, a map of the network may be updated based on the received data corresponding to the client device view of the network. The map may be associated with the identity data associated with the client device. | 2022-02-10 |
20220045910 | METHOD AND APPARATUS FOR SEARCHING FOR MAINTENANCE END POINT (MEP), AND STORAGE MEDIUM - Provided is a method and apparatus for searching for a Maintenance End Point (MEP), and a storage medium. The method includes that: a chip of the MEP parses an obtained packet; the chip of the MEP determines whether a field of the parsed packet matches a field in a combination of a port and a Virtual Local Area Network (VLAN); and in a case where the field of the parsed packet matches the field in the combination of the port and the VLAN, the chip of the MEP determines that the MEP is found successfully. | 2022-02-10 |
20220045911 | INTERNET OF THINGS DEVICE DISCOVERY AND CONFIGURATION - Disclosed are various examples for Internet of Things (IoT) device discovery and configuration. In some embodiments, a management service generates a console user interface. Through the console user interface, an Internet-of-Things (IoT) protocol is selected for an IoT discovery campaign to discover IoT devices that are deployed in an enterprise environment and utilize the IoT protocol. A gateway distribution list is defined for the IoT discovery campaign. A command is transmitted according to the IoT discovery campaign, causing a gateway device to discover IoT devices that are deployed in the enterprise environment and utilize the IoT protocol. | 2022-02-10 |
20220045912 | CONTAINER TELEMETRY IN DATA CENTER ENVIRONMENTS WITH BLADE SERVERS AND SWITCHES - The present disclosure provides systems, methods, and non-transitory computer-readable storage media for determining container to leaf switch connectivity information in a data center in a presence of blade switches and servers. In one aspect of the present disclosure, a method of determining container to leaf switch connectivity information of a data center utilizing at least one blade switch and at least one blade server, includes receiving, at a network controller, link connectivity information that includes south-bound neighboring information between the at least one blade switch of the data center and the at least one blade server of the data center; determining, at the network controller, the container to leaf switch connectivity information of the data center, based on the link connectivity information; and generating a visual representation of a topology of the data center based on the container to leaf switch connectivity information. | 2022-02-10 |
20220045913 | LEARNING SYSTEM THAT COLLECTS LEARNING DATA ON EDGE SIDE, ELECTRONIC APPARATUS, CONTROL METHOD FOR ELECTRONIC APPARATUS, AND STORAGE MEDIUM - A system includes a cloud computing system having a server, and a user environment computing system having an edge electronic device and a group of edge side sensors installed on at least one of inside and outside of the edge electronic device, the cloud computing system and the user environment computing system connected via a network line. The user environment computing system transfers a plurality of kinds of detection data collected by the group of edge side sensors to the cloud computing system for learning of an inference model generated by the server. When detection data is newly obtained from one sensor out of the group of edge side sensors and the detection data newly obtained is related to the inference model, the detection data newly obtained is transferred to the server for additional learning of the inference model. | 2022-02-10 |
20220045914 | METHOD AND APPARATUS FOR CONTROLLING DISAGGREGATED RADIO ACCESS NETWORKS - Aspects of the subject disclosure may include, for example, obtaining a model of a communication network, applying first data to the model to generate an updated model, processing the updated model to establish a first control, enabling first communications in the communication network in accordance with the first control, obtaining first parametric data regarding the first communications in the communication network that are based on the first control, processing the first parametric data in accordance with the updated model to generate an updated first control, and enabling second communications in the communication network in accordance with the updated first control. Other embodiments are disclosed. | 2022-02-10 |
20220045915 | CONSOLIDATING MANUFACTURING INTELLIGENCE EVENT QUEUE ITEMS - Consolidating events to execute objects to extract, transform, and load data from source systems to a structured data store. An event manager process executing on a server runtime utilizes one or more event properties to determine which events can be consolidated to reduce unnecessary processor utilization. | 2022-02-10 |
20220045916 | MACHINE LEARNING BASED END TO END SYSTEM FOR TCP OPTIMIZATION - Bypass network traffic records are generated for a web application. Sufficient statistics of network optimization parameters are calculated for network performance categories. The bypass network traffic records are partitioned for the network performance categories into network traffic buckets. Sufficient statistics and the network traffic buckets are used to generate network quality mappings. The network quality mappings are used as training instances to train a machine learner for generating network optimization policies to be implemented by user devices. | 2022-02-10 |