21st week of 2021 patent applcation highlights part 67 |
Patent application number | Title | Published |
20210160035 | SYSTEMS AND METHODS FOR DOWNLINK CONTROL INFORMATION (DCI) SIZE ALIGNMENT - Embodiments of a method of operation of a wireless device for providing Downlink Control Information (DCI) format size alignment between a first DCI format a second DCI format and corresponding embodiments of a wireless device are disclosed herein. In some embodiments, the method of operation of the wireless device comprises determining one or more Resource Block Group (RBG) parameters for interpreting a frequency-domain resource allocation for the first DCI format. The RBG parameter(s) are either a RBG scaling factor(s) or a RBG size(s). The RBG parameter(s) adjust a granularity of the frequency-domain resource allocation for the first DCI format such that a size of the first DCI format is aligned with a size of the second DCI format. The method further comprises receiving DCI having the first DCI format and interpreting the frequency-domain resource allocation of the DCI in accordance with the one or more RBG parameters. | 2021-05-27 |
20210160036 | SYNCHRONIZATION SIGNAL BLOCK DESIGN - A wireless communication system utilizes a synchronization signal block (SSB) structure to enable beam switching at higher sub carrier spacing (SCS) or uplink transmissions within an SSB. The SSB structure has a first SCS for an SSB transmission and a second SCS for a data transmission. The SSB structure is based on the first SCS and the second SCS, with the SSB structure including at least one gap between SSB symbols or between SSBs. The wireless communication system transmits or receives an SSB based on the SSB structure. A base station may transmit a downlink signal during the gap, for example, where the second SCS is much greater than the first SCS. A user equipment may transmit an uplink signal such as an acknowledgment during the at least one gap. The user equipment or the base station may perform analog beam switching during the at least one gap between SSBs. | 2021-05-27 |
20210160037 | METHOD FOR COMMUNICATION BETWEEN USER EQUIPMENTS AND USER EQUIPMENT - A method for communication between user equipments includes: determining, by a user equipment (UE), a physical control channel resource of a first frequency; and transmitting, by the UE, first control information on a physical control channel of the first frequency; wherein the first control information includes frequency indication information and/or resource indication information of a second frequency, the frequency indication information of the second frequency is used to indicate the second frequency, and the resource indication information of the second frequency is used to indicate an allocated/reserved resource of the second frequency. | 2021-05-27 |
20210160038 | TELECOMMUNICATIONS APPARATUS AND METHODS - A method of conveying an allocation of radio resources on a radio channel for communicating data between a base station and a terminal device in a wireless telecommunications system, wherein the radio channel spans a channel frequency bandwidth divided into frequency resource units which may be selectively allocated for communicating data between the base station and the terminal device, and wherein the method comprises, at the base station, selecting a combination of resource units for communicating the data between the base station and the terminal device from among a predefined set of allowable combinations of resource units, wherein the allowable combinations of resource units include non-contiguous combinations of resource units and wherein the number of allowable combinations of resource units is smaller than the total number of combinations of resource units, and conveying, to the terminal device, an indication of the selected combination of resource units. | 2021-05-27 |
20210160039 | METHOD AND APPARATUS FOR MONITORING AND PROCESSING COMPONENT CARRIERS - A method and apparatus are described which perform bandwidth aggregation by simultaneously monitoring and processing a number of simultaneous, non-contiguous or contiguous component carriers in the downlink. A wireless transmit/receive unit (WTRU) can be configured by an evolved Node-B (eNodeB) to support additional component carriers. A pre-configured additional component carrier may be used. Various methods for activating and deactivating the additional component carrier are also described. | 2021-05-27 |
20210160040 | FRAME STRUCTURES FOR WIRELESS COMMUNICATION - Current frame structures in Long-Term Evolution (LTE) and New Radio (NR) are not designed to accommodate full duplex (FD) communication. Embodiments are disclosed in which frame structures are provided that support FD communication and frequency division duplex (FDD) communication and time division duplex (TDD) communication. In some embodiments, there is defined two separate and independent frame structures: a frame structure for reception (e.g. a downlink frame structure) and a frame structure for transmission (e.g. an uplink frame structure). | 2021-05-27 |
20210160041 | ECHO CANCELLER TRAINING IN FULL DUPLEX NETWORKS - In some embodiments, a method receives a first signal that is sent in a first direction in a network. Communications in the network are full duplex communications in a same frequency band. The first signal is amplified in the first direction. The method trains a first echo canceller to cancel a first echo signal from the first signal where the first echo signal is received in a second direction. After training the first echo canceller, the trained first echo canceller is enabled. The method receives a second signal in the second direction that is sent in the second direction in the network. The second signal is amplified in the second direction. The method trains a second echo canceller to cancel a second echo signal received in the first direction from the second signal where the first echo canceller cancels the first echo signal that is received in the second direction. | 2021-05-27 |
20210160042 | COMMUNICATION SYSTEM AND CONTROL METHOD - A communication system includes: a plurality of sensor terminals each including a clock indicating an individual time and configured to detect sensing information related to a user and information detection time at which the sensing information has been detected; a management terminal configured to retain a reference time and adapted to communicate with the plurality of sensor terminals; and a relationship analysis unit configured to analyze a relationship among the users of the plurality of sensor terminals, in which the management terminal acquires the sensing information and the information detection time from each of the plurality of sensor terminals and corrects the information detection time acquired from each of the plurality of sensor terminals based on a lag between the individual time acquired from the corresponding sensor terminal and the reference time, and the relationship analysis unit analyzes the relationship using the sensing information and the corrected information detection time. | 2021-05-27 |
20210160043 | QUARTER-RATE SERIAL-LINK RECEIVER WITH LOW-APERTURE-DELAY SAMPLERS - The disclosed embodiments provide a system that implements a low-aperture-delay sampler. The system includes a sampler input, which receives an input signal, and a clock input, which receives a clock signal. The system also includes: a first sampling channel, which samples the input signal when the clock signal is low and is associated with a previous clock phase; and a second sampling channel, which samples the input signal when a rising edge is received in the clock signal, wherein the rising edge is associated with a present clock phase. The system additionally includes a combining mechanism, which combines outputs of the first and second sampling channels to produce a sampler output with a significantly reduced aperture delay. | 2021-05-27 |
20210160044 | SKEW DETECTION AND CORRECTION FOR ORTHOGONAL DIFFERENTIAL VECTOR SIGNALING CODES - Methods and systems are described for receiving a plurality of signals corresponding to symbols of a codeword on a plurality of wires of a multi-wire bus, and responsively generating a plurality of sub-channel outputs using a plurality of multi-input comparators (MICs) connected to the plurality of wires of the multi-wire bus, generating a plurality of wire-specific skew control signals, each wire-specific skew control signal of the plurality of wire-specific skew control signals generated by combining (i) one or more sub-channel specific skew measurement signals associated with corresponding sub-channel outputs undergoing a transition and (ii) a corresponding wire-specific transition delta, and providing the plurality of wire-specific skew control signals to respective wire-skew control elements to adjust wire-specific skew. | 2021-05-27 |
20210160045 | DIGITAL RETURN RECEIVER WITH DIGITAL DATA AGGREGATION - In some embodiments, a digital clock management system includes input signal conversion circuitry, logic circuitry and output signal conversion circuitry. The input signal conversion circuitry converts input signals to corresponding first digital data streams, each of which contains digital data synchronized to a first data clock. First digital logic circuitry converts the first digital data streams to second digital data streams, each of which contains digital data synchronized to the first data clock, and converts the second digital data streams to third digital data streams, each of which contains digital data synchronized to a common clock. Second digital logic circuitry converts the third digital data streams to a single digital data stream. The output signal conversion circuitry converts the single digital data stream to a modulated output signal. | 2021-05-27 |
20210160046 | CLOCK SYNTONIZATION USING NETWORK EFFECT AND/OR ADAPTIVE STOCHASTIC CONTROL - Systems and methods are disclosed herein for syntonizing machines in a network. A coordinator accesses probe records for probes transmitted at different times between pairs of machines in the mesh network. For different pairs of machines, the coordinator estimates the drift between the pair of machines based on the transit times of probes transmitted between the pair of machines as indicated by the probe records. For different loops of at least three machines in the mesh network, the coordinator calculates a loop drift error based on a sum of the estimated drifts between pairs of machines around the loop and adjusts the estimated absolute drifts of the machines based on the loop drift errors. Here, the absolute drift is defined relative to a drift of a reference machine. | 2021-05-27 |
20210160047 | CLOCK DATA RECOVERY - A circuit includes a voltage-controlled oscillator (VCO) and a frequency divider. The frequency divider input is coupled to the VCO output. The circuit further includes a phase-frequency detector (PFD). A control output of the PFD is coupled to the VCO. A first PFD input is coupled to a first frequency divider output, and a second PFD input is coupled to a second frequency divider output. The first frequency divider output is configured to provide a first frequency divider signal and the second frequency divider output is configured to provide a second frequency divider signal 90 degrees out of phase with respect to the first frequency divider signal. The PFD is configured to detect an occurrence of at least two edges of a signal on the data input while the second frequency divider signal is continuously logic high across the at least two edges. | 2021-05-27 |
20210160048 | RECURSIVE ALGORITHMS WITH DELAYED COMPUTATIONS PERFORMED IN A HOMOMORPHICALLY ENCRYPTED SPACE - A device, system and method for securely executing recursive computations over encrypted data in a homomorphically encrypted (HE) space. For a recursive algorithm with sequentially dependent recursive iterations, executing the recursive algorithm in parallel by computing multiple recursive iterations simultaneously over multiple parallel execution iterations and not in sequential order. Each parallel execution iteration may compute a partial HE solution of multiple sequential recursive iterations comprising a known HE part and leaves empty a placeholder call slot for an unknown HE part. Placeholder call slots remain empty and are filled at delayed times at a later parallel execution iteration from when the known part of the same HE computation is computed. A final HE solution is computed in fewer multiple parallel execution iterations than the number of sequential recursive iterations, thereby accelerating the recursive algorithm in HE space. | 2021-05-27 |
20210160049 | DATA ENCRYPTION AND DECRYPTION - This disclosure relates to data encryption and decryption. In one aspect, a method includes receiving, by a second peer end computing device, first data from a first peer end computing device. The second end computing device generates a random term based on a result range pre-agreed upon with the first peer end computing device. The result range includes a minimum result value and a maximum result value. The random term is a product of a random number and an agreed upon constant. The agreed upon constant is greater than a difference between the maximum result value and the minimum result value. The second peer end computing device performs a homomorphic operation based on the first data, local private second data, and the random term to obtain an encryption result. The second peer end computing device returns the encryption result to the first peer end computing device. | 2021-05-27 |
20210160050 | METHOD FOR ESTABLISHING ANONYMOUS DIGITAL IDENTITY - The present disclosure relates to a method of establishing a digital identity that reserve a privacy of an entity. The method comprises a first step of receiving a validity verification value and verifying the value; a second step of a homomorphic encryption value of a tag based on a homomorphic encryption value of a identity verification ID; and a third step of associating an anonymous digital identity with identity verification information and storing them if a value which is calculated by carrying out a predetermined arithmetic operation to the homomorphic encryption value is identical to the tag. | 2021-05-27 |
20210160051 | METHOD AND DEVICES FOR CREATING REDUNDANCY AND ENCRYPTION USING MOJETTE TRANSFORM - A method for hyper security encoding includes receiving data to be encrypted, and padding the data to be encrypted with padding data to avoid un-obfuscated bits after encryption. The method also includes encrypting, with a Mojette Transform, the data to be encrypted after the data to be encrypted is padded with the padding data, and outputting a result of the encryption as encrypted data. | 2021-05-27 |
20210160052 | DEVICE AND METHOD FOR RESONANT CRYPTOGRAPHY - A communication network can include a random number beacon broadcasting a random number stream to multiple computing devices. At least two of those computing devices can generate private keys for secured communication based a subset of random numbers from the random number stream. Other devices do not have access to these private keys even though they have access to the subset of random numbers by virtue of receiving the broadcasted random number stream. The subset of random numbers can be extracted based on a predetermined time known only to the two or more devices, and/or the subset of random numbers can be extracted following detection of a predetermined number sequence in the random number stream known only to the two or more devices. Following a similar concept, a computing device can generate private cryptographic keys from a public random number stream. | 2021-05-27 |
20210160053 | MERKLE TREE CONSTRUCTION METHODS AND APPARATUSES AND SIMPLIFIED PAYMENT VERIFICATION METHODS AND APPARATUSES - Embodiments of Merkle tree construction methods and apparatuses are disclosed. One method comprises: for each transaction storage location in a target block of a blockchain, retrieving, by a full node in a blockchain network, data from the respective transaction storage location; analyzing the data retrieved from each transaction storage location; determining whether the data retrieved from the respective transaction storage location is a transaction or concealed data; in response to determining that the data retrieved is a transaction, performing a hash operation on the transaction to obtain a transaction hash; and in response to determining that the data retrieved is concealed data, extracting a transaction hash from the concealed data. | 2021-05-27 |
20210160054 | METHODS AND SYSTEMS FOR READING DATA BASED ON PLURALITY OF BLOCKCHAIN NETWORKS - Disclosed are methods and systems for reading data based on a plurality of blockchain networks. One method comprises: receiving a first-type transaction hash sent by a user, wherein the first-type transaction hash is a hash value of a first-type blockchain transaction associated with a first-type blockchain network; identifying, by the node based on querying a blockchain of the second-type blockchain network, a second-type blockchain transaction that comprises the first-type transaction hash; identifying, by the node, a network identifier from the second-type blockchain transaction; sending the first-type transaction hash to a first-type blockchain network corresponding to the network identifier to obtain the first-type blockchain transaction; and providing the first-type blockchain transaction to the user. | 2021-05-27 |
20210160055 | HARDWARE ACCELERATOR FOR FEISTEL BLOCK CIPHERS - A hardware accelerator is arranged to perform cipher operations and comprises a first memory area arranged to store a first bit string and a second memory area arranged to store a second bit string. A calculation block is arranged to receive a round key and to perform a function on the first bit string. The function comprises combining the first bit string with the round key to produce a combined bit string and performing a non-linear mapping from the combined bit string to a mapped bit string. An addition block is arranged to add the mapped bit string to the second bit string to produce a resultant bit string. A controller is arranged to receive a control signal and, depending on the state of the control signal, provides the first bit string and the resultant bit string to the appropriate memory area. | 2021-05-27 |
20210160056 | METHOD AND APPARATUS FOR DECENTRALIZED TRUST EVALUATION IN A DISTRIBUTED NETWORK - A method and apparatus for decentralized trust evaluation in a distributed network. A method for decentralized trust evaluation in a distributed network comprises obtaining a current block of a blockchain, wherein the current block of the blockchain comprises the hash value of the previous block of the blockchain, a timestamp of creation of the current block, a token issued to a node that creates the previous block of the blockchain, a trust value list indicating current trust values of each of the plurality of nodes, and information indicating evidence based on which the trust values in the trust value list were derived, the evidence was derived after the previous block of the blockchain was created; and extracting current trust values for at least one node of the plurality of nodes from the current block. The method can further comprise steps of collecting the new evidence, creating a new block of the blockchain, selecting an approved new block, issuing a token to a winner node, and performing an access control based on the trust value recorded in the blockchain. | 2021-05-27 |
20210160057 | SHARED BLOCKCHAIN DATA STORAGE BASED ON ERROR CORRECTION CODE - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for storing blockchain data based on error correction code. One of the methods includes determining, by a blockchain node, block data associated with a current block of a blockchain; performing error correction coding of the block data to generate encoded data; dividing, based on one or more predetermined rules, the encoded data into a plurality of data sets; storing, based on the one or more predetermined rules, one or more data sets of the plurality of data sets; hashing each data set of remaining data sets of the plurality of data sets to generate one or more hash values corresponding to the remaining data sets; and storing the one or more hash values. | 2021-05-27 |
20210160058 | BLOCKCHAIN MAINTENANCE METHOD AND APPARATUS, SERVER, AND COMPUTER-READABLE STORAGE MEDIUM - This application discloses a method used to remove a target blockchain node group of a first tenant from a channel. In the method, an execution node of a second tenant receives configuration information of the target blockchain node group of the first tenant which is sent by a management node, obtains channel configuration information of the channel from a consensus organization, and generates channel adjustment information based on the channel configuration information and the configuration information of the target blockchain node group. The execution node of the second tenant sends the channel adjustment information to the consensus organization, and the consensus organization generates a block including the channel adjustment information. A blockchain node group of the second tenant obtains the block from the consensus organization, and adds the block to a blockchain stored in the second tenant. | 2021-05-27 |
20210160059 | DATA PROCESSING DEVICE FOR PROCESSING A RADIO SIGNAL - A data processing device, which is adapted to process a first radio signal is provided. Hereby, the data processing device includes a receiver unit, which is adapted to receive the first radio signal, wherein the first radio signal is indicative of a first set of positions of an object within a first time interval. The data processing device further includes a transaction data generation unit, which is adapted to generate first transaction data based on the received first radio signal. The data processing device further includes an output unit, which is adapted to transfer the first transaction data to the distributed database. Further provided is a corresponding method of processing a first radio signal. | 2021-05-27 |
20210160060 | METHOD FOR KEY SHARING BETWEEN ACCELERATORS IN VIRTUAL CHANNEL - A host processing device instructs a plurality of virtual data processing (VDP) accelerators, configured on each of a plurality of data processing accelerators. The VDP accelerators configure themselves for secure communications. The host device generates an adjacency table of each of the plurality of VDP accelerators. Then the host device then establishes a session key communication with each VDP accelerator and sends the VDP accelerator a list of other VDP accelerators that the VDP accelerator is to establish a session key with, for secure communications between the VDP accelerators. The VDP accelerator establishes a different session key for each pair of the plurality of VDP accelerators. When all DP accelerators have established a session key for communication with other VDP accelerators, according to the respective list of other VDP accelerators sent by the host device, then the host device can assign work tasks for performance by a plurality of VDP accelerators, each communicating over a separately secured virtual communication channel. | 2021-05-27 |
20210160061 | METHOD FOR KEY SHARING BETWEEN ACCELERATORS - A host processing device instructs a plurality of data processing (DP) accelerators to configure themselves for secure communications. The host device generates an adjacency table of each of the plurality of DP accelerators. Then the host device then establishes a session key communication with each DP accelerator and sends the DP accelerator a list of other DP accelerators that the DP accelerator is to establish a session key with, for secure communications between the DP accelerators. The DP accelerator establishes a different session key for each pair of the plurality of DP accelerators. When all DP accelerators have established a session key for communication with other DP accelerators, according to the respective list of other DP accelerators sent by the host device, then the host device can assign work tasks for performance by a plurality of DP accelerators, each communicating over a separately secured communication channel. | 2021-05-27 |
20210160062 | SYSTEMS AND METHODS FOR UTILIZING QUANTUM ENTROPY FOR SECURE VIRTUAL PRIVATE NETWORK CONNECTIONS - A device may establish a connection with a first server device based on a request to establish a peer-to-peer connection between a first client device, associated with the first server device, and a second client device associated with a second server device, and may generate a plurality of quantum random numbers based on establishing the connection with the first server device and based on the request to establish the peer-to-peer connection. The device may generate encryption keys for the first client device and the second client device based on the plurality of quantum random numbers, and may provide the encryption keys to the first client device and the second client device to cause an encrypted peer-to-peer connection to be established between the first client device and the second client device, via an interface provided between the first server device and the second server device. | 2021-05-27 |
20210160063 | CRYPTOGRAPHIC MANAGEMENT OF LIFECYCLE STATES - A secret key value that is inaccessible to software is scrambled according to registers consisting of one-time programmable (OTP) bits. A first OTP register is used to change the scrambling of the secret key value whenever a lifecycle event occurs. A second OTP register is used to undo the change in the scrambling of the secret key. A third OTP register is used to affect a permanent change to the scrambling of the secret key. The scrambled values of the secret key (whether changed or unchanged) are used as seeds to produce keys for cryptographic operations by a device. | 2021-05-27 |
20210160064 | VEHICLE MASTER DEVICE, SECURITY ACCESS KEY MANAGEMENT METHOD, SECURITY ACCESS KEY MANAGEMENT PROGRAM AND DATA STRUCTURE OF SPECIFICATION DATA - A vehicle master device includes a decryption key storage unit that cannot be read from an outside and that stores a decryption key for generation of a security accesses key used to perform device authentication of a rewrite target electronic control unit. The vehicle master device acquires rewrite specification data from an outside, analyzes the rewrite specification data acquired, extracts a key derivation value corresponding to the rewrite target electronic control unit from an analysis result of the rewrite specification data, and by using the decryption key corresponding to the rewrite target electronic control unit stored in the decryption key storage unit, decrypts the key derivation value extracted, and generate a security accesses key. | 2021-05-27 |
20210160065 | CRYPTOGRAPHIC KEY CONFIGURATION USING PHYSICAL UNCLONABLE FUNCTION - The disclosure relates to a method of obtaining a cryptographic key in a chipset ( | 2021-05-27 |
20210160066 | METHOD FOR RESTORING PUBLIC KEY BASED ON SM2 SIGNATURE - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key. | 2021-05-27 |
20210160067 | METHOD FOR BIDIRECTIONAL AUTHORIZATION OF BLOCKCHAIN-BASED RESOURCE PUBLIC KEY INFRASTRUCTURE - The disclosure discloses a method for bidirectional authorization of a blockchain-based resource public key infrastructure, aiming at solving security threat problems that a legal BGP route is illegal and a legal IP address is blocked caused by malicious operations. A technical solution is as follows: constructing a blockchain-based resource public key infrastructure system RPKIB composed of a resource issuer, a resource transaction application client, a resource receiver and a blockchain network; changing any operation of issuing, revoking, overwriting and modifying of a resource certificate by the resource issuer into a bidirectional authorization mode, and implementing the operation of the resource certificate only when the issuer and the receiver both agree; and carrying out, by the issuer, operations of a resource certificate RC and route origin authorization ROA as transactions that are carried out through the blockchain network, and distinguishing whether the operations are malicious behaviors or normal operations. | 2021-05-27 |
20210160068 | DATA SHARING METHOD, APPARATUS, AND SYSTEM, AND ELECTRONIC DEVICE - Methods, systems, and apparatus for blockchain-based data sharing. An example method includes determining, at a data requester node of an index blockchain network that maintains index information sets shared by a plurality of data provider nodes of the index blockchain, target index information set that corresponds to target data recorded in the index blockchain network, wherein the target index information set comprises a ciphertext index of the target data and member information of a target data provider node of the target data; initiating, at the data requester node, a data acquisition request to the target data provider node by using a sharing platform of the index blockchain network, wherein the data acquisition request comprises the ciphertext index of the target data; and receiving, at the data requester node and from the sharing platform, response data that is encrypted by using an identity public key of the target data requester node. | 2021-05-27 |
20210160069 | BLOCKCHAIN SYSTEM, REGISTRATION TERMINAL, APPROVAL TERMINAL, SMART CONTRACT REGISTRATION METHOD, AND SMART CONTRACT REGISTRATION PROGRAM - The present invention prevents falsification of ABI information and makes it possible for the users to safely read data on a blockchain. A registration terminal | 2021-05-27 |
20210160070 | SYSTEMS AND METHODS FOR ESTABLISHING SECURED CONNECTIONS FOR IOT DEVICES - Aspects of the present disclosure include methods, systems, and non-transitory computer readable media that perform the steps of transmitting a token to a gateway, receiving a response token including an encrypted message, decrypting the encrypted message using a decryption key associated with the token to generate a decrypted message, validating content of the decrypted message, transmitting a certificate request in response to successfully validating the content of the decrypted message, receiving a certificate in response to the request, validating the certificate against a certification authority, and transmitting encrypted data via a secured connection in response to successfully validating the certificate. | 2021-05-27 |
20210160071 | ENCRYPTED DATA TRANSMISSION SYSTEM FOR SECURE RESOURCE DISTRIBUTION - A privacy-enabled system for securely transmitting encrypted data is provided. The system comprises: a memory device with computer-readable program code stored thereon; a communication device connected to a network; and a processing device configured to: receive a request for a resource transfer of a resource from a user resource location associated with a user to a destination device associated with a third party; determine a data requirement for completing the resource transfer, wherein the data requirement is a minimum amount of user resource location data required for directing the resource from the user resource location to the destination device and completing the resource transfer; based on determining the data requirement, generate a transmission package comprising the resource, wherein the transmission package has at least a portion of the user resource location data removed or modified; and deliver the transmission package to the destination device to complete the resource transfer. | 2021-05-27 |
20210160072 | AUTHORIZATION CODE MANAGEMENT FOR PUBLISHED STATIC APPLICATIONS - Among other things, embodiments of the present disclosure are directed to providing authorization code management for published static applications. Other embodiments may be described and/or claimed. | 2021-05-27 |
20210160073 | IDENTITY AUTHENTICATION, NUMBER SAVING AND SENDING, AND NUMBER BINDING METHOD, APPARATUS AND DEVICE - Disclosed are an identity authentication, number saving and sending, and number binding method, apparatus and device. The identity authentication method comprises: receiving a user identity authentication request sent by a data authentication platform client, wherein the user identity authentication request comprises user authentication information and user identification information, and a data authentication platform server pre-stores the user authentication information and a registration number and a password, which correspond to the user identification information; acquiring, according to the user identification information, the user authentication information pre-stored in the data authentication platform server; matching the user authentication information in the acquired user identity authentication request with the acquired user authentication information pre-stored in the data authentication platform server; when the matching is successful, receiving a result, sent by the data authentication platform client, of confirming the acquisition of the registration number by a user. | 2021-05-27 |
20210160074 | System and Method for Fair, Secure N-Party Computation Using At Least One Blockchain - Described are a system and method for secure n-party computation. The method includes communicating a first input of an n-party computation to a trusted execution environment (TEE). The method also includes receiving, from the TEE, at least one encrypted output of the n-party computation using the first input and at least one second input of at least one other computing device, and using at least one public key of the at least one other computing device. The method further includes posting the at least one encrypted output on at least one blockchain accessible by the at least one other computing device. The method further includes, in response to posting the at least one encrypted output, receiving at least one proof of publication. The method further includes communicating the at least one proof of publication to the TEE and receiving the function output of the n-party computation. | 2021-05-27 |
20210160075 | BLOCKCHAIN-BASED TRUSTABLE GUARANTEES - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing guarantee information. One of the methods includes receiving an application of a guarantee made by at least a guarantor to a beneficiary; generating a digital version of the guarantee based on the information included in the application; encrypting the digital version to generate cyphertext of the guarantee; generating one or more zero-knowledge proofs (ZKPs) related to one or more values associated with the guarantee; and sending the cyphertext and the one or more ZKPs to a blockchain network to store the cyphertext on a blockchain, wherein the cyphertext is stored on the blockchain through consensus of blockchain nodes of the blockchain network after the one or more ZKPs are successfully verified by the blockchain nodes. | 2021-05-27 |
20210160076 | SYSTEM AND METHOD FOR SECURE BIOMETRIC AUTHENTICATION - The invention presents a biometric authentication system comprising: a template module and a key module that are independent of each other. The template module is used to store encrypted biometric templates, the key module is used to store the decryption keys. The system may further comprise a matching module that acquires the decryption key from the key module and the encrypted template from the template module, decrypts the template using the key, then matches the template to verify the identity. In this system, the encrypted template and decryption key are stored separately both logically and physically, and are only united momentarily during matching, then are immediately deleted. The system is highly secure and addresses the security vulnerabilities in the current banking and payment systems, both online and offline such as ATM machines. | 2021-05-27 |
20210160077 | METHODS AND SYSTEMS FOR A CONSISTENT DISTRIBUTED MEMORY POOL IN A BLOCKCHAIN NETWORK - There may be provided a computer-implemented method. It may be implemented using a blockchain network such as, for example, the Bitcoin network. The computer-implemented method includes: receiving, at a mempool node of distributed mempool network (DMP) implementing a distributed hash table (DHT), a request to update routing information of the mempool node; initializing a set of random walks within a key space of the DHT, the set of random walks used for generating a set of key-value records to be stored by the mempool node; generating a first record in an first table based at least in part on a first identification information stored in stored in a second of a long-distance table type; generating a second record in a third table of the long-distance table type by at least performing a first random walk of the set of random walks, the second record containing a second identification information and an address associated with the second identification information; generating a third record in a fourth table of a short-distance table type by at least obtaining records from a table maintained by a second mempool node of the DMP network. | 2021-05-27 |
20210160078 | OUT-OF-BAND AUTHENTICATION IN GROUP COMMUNICATIONS - System, method, and computer program product for authenticating a message among a groups of computing devices communicating over an unsecured channel, based on an out-of-band (OOB) authenticated channel which may be used to send a short message to all receivers. | 2021-05-27 |
20210160079 | WEARABLE SMART TERMINAL, CLOUD SERVER, MEMORY DEVICE AND FRIEND ADDITION METHOD - A friend addition method for a wearable smart terminal, comprising: when a first wearable smart terminal receives a first request of a first user for adding a friend, starting a wireless signal search function; obtaining the media access control address of a second wearable smart terminal which is found within a preset time and which has a signal strength that is greater than a preset threshold; sending to a cloud server a second request for adding a second user of the second wearable smart terminal as a friend, the second request carrying a user identity of the first user and the media access control address of the second wearable smart terminal, so that the cloud server finds the user identity of the second user and sends to the second wearable smart terminal a third request of the first user for adding the second user as a friend. | 2021-05-27 |
20210160080 | USING A TREE STRUCTURE TO SEGMENT AND DISTRIBUTE RECORDS ACROSS ONE OR MORE DECENTRALIZED, ACYCLIC GRAPHS OF CRYPTOGRAPHIC HASH POINTERS - Provided is a process including: receiving, with one or more processors, a first request to store a record from a computing entity; encoding, with one or more processors, the record in a first plurality of segments; arranging, with one or more processors, the first plurality of segments in respective content nodes of a first content graph, wherein at least some content nodes of the first content graph have two or more content edges of the first content graph pointing to two or more respective other content nodes of the first content graph; and storing, with one or more processors, the content nodes of the first content graph in a verification graph. | 2021-05-27 |
20210160081 | Multiple-Key Verification Information for Mobile Device Identity Document - Techniques are disclosed relating to authenticating a user with a mobile device. In various embodiments, a mobile device receives a request to provision the mobile device with identification information from an identification document issued by an authority to a user for establishing an identity of the user. In response to the received request, the mobile device issues a request for verification information signed by the authority and usable to verify the identification information. The issued request identifies multiple public keys of the mobile device, each having a respective corresponding private key for generating a signature usable to verify the identification information. The mobile device receives and stores the signed verification information, the signed verification information including the plurality of public keys. In some embodiments, the mobile device receives a request provide, at least, a portion of the identification information and selects one of the private keys to generate a signature. | 2021-05-27 |
20210160082 | BLOCKCHAIN TRANSACTION METHOD AND APPARATUS - One or more embodiments of the present specification provide blockchain-based transaction methods, apparatuses, and electronic devices. A target transaction sent by a node device of a transaction initiator is received. An account of the transaction initiator corresponds to a plurality of public keys, and the target transaction includes transaction content and a digital signature. The digital signature is created by using one or more private keys corresponding to the plurality of public keys of the account and is created based on at least a part of the transaction content. The target transaction is verified, including verifying whether the digital signature is valid. In response to a successful verification, the target transaction is recorded to a distributed database of a blockchain based on a consensus rule of the blockchain. | 2021-05-27 |
20210160083 | RETRIEVING PUBLIC DATA FOR BLOCKCHAIN NETWORKS USING HIGHLY AVAILABLE TRUSTED EXECUTION ENVIRONMENTS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Implementations include receiving a request for data from the data source, transmitting the request to a relay system that is external to the blockchain network and that includes a multi-node cluster including a plurality of relay system nodes, receiving a result provided from a relay system node, the result being digitally signed using a private key of the relay system node, verifying that the relay system node is registered, verifying an integrity of the result based on a public key of the relay system node and a digital signature of the result in response to verifying that the relay system node is registered, and transmitting the result to a client in response to verifying the integrity of the result. | 2021-05-27 |
20210160084 | RETRIEVING PUBLIC DATA FOR BLOCKCHAIN NETWORKS USING HIGHLY AVAILABLE TRUSTED EXECUTION ENVIRONMENTS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Implementations include receiving a request for data from the data source, transmitting the request to a relay system that is external to the blockchain network and that includes a multi-node cluster including a plurality of relay system nodes, receiving a result provided from a relay system node, the result being digitally signed using a private key of the relay system node, verifying that the relay system node is registered, verifying an integrity of the result based on a public key of the relay system node and a digital signature of the result in response to verifying that the relay system node is registered, and transmitting the result to a client in response to verifying the integrity of the result. | 2021-05-27 |
20210160085 | DATA INTEGRITY VALIDATION VIA DEGENERATE KEYS - Systems and methods for developing a novel public/private key pair having unique properties are disclosed, whereby standard data security operations in existing data security infrastructures return a data integrity validation result—but do not provide the intended data security of such infrastructures. These novel keys are referred to as degenerate keys and may be used to replace the public and private keys in existing public/private key cryptosystems. Because degenerate key data integrity validation may leverage existing data security infrastructures that are already widely-implemented, such examples may be applied immediately and configured to seamlessly transition from integrity only modes back to secure modes. In some instances, the degenerate key examples described herein may be employed during a software testing and/or factory validation stage of product development to allow for data integrity validation before burning in a developer's active (i.e., non-degenerate) key to the product, thereby pairing the software to the hardware. | 2021-05-27 |
20210160086 | PROVIDING QUALITY OF SERVICE FOR CERTIFICATE MANAGEMENT SYSTEMS - A system for providing quality of service (QoS) levels to clients requesting certificates from a certificate management service is provided. The system includes an application programming interface (API) operable to receive certificate requests from each of a plurality of clients, each certificate request including a client identifier, a QoS manager operable to distribute the certificate requests to a corresponding client queue of a plurality of client queues based on the client identifier, select, based on at least one of a workflow and a client priority level, one or more of the certificate requests distributed to the plurality of client queues, and transmit the selected one or more certificate requests to a QoS queue of the certificate management service for processing. | 2021-05-27 |
20210160087 | Temporal Key Generation And PKI Gateway - Temporal key generation devices and methods are described. One such device of a first domain receives a “seed” to generate a private key associated with a public key for use in a second domain. The device uses the private key in cryptographic operations with the second domain. When the device loses power or is no longer connected to the second domain, the private key may be erased or no longer stored on the device. | 2021-05-27 |
20210160088 | Device Pairing and Authentication - Methods for system component pairing and authentication are described. A challenge message is transmitted to a device. A reply message is received from the device in response to the challenge message. A length of time between transmitting the challenge message and receiving the reply message is determined. The length of time between transmitting the challenge message and receiving the reply message is compared to an expected time. Whether the reply message was received from the device is determined based on the comparing the length of time to the expected time. Communication is enabled with the device based on the determining that the reply message was received from the device. | 2021-05-27 |
20210160089 | ETHERNET TYPE PACKET DATA UNIT SESSION COMMUNICATIONS - Systems, apparatuses, and methods are described for wireless communications. A policy control function may determine a policy and charging control rule comprising one or more Ethernet source MAC addresses and a quality of service policy. The policy control function may send the policy and charging control rule to a session management function to provide an Ethernet PDU session for a wireless device. | 2021-05-27 |
20210160090 | AUTOMATED LIFECYCLE MANAGEMENT WITH FLEXIBLE SCALING AND DYNAMIC RESOURCE ALLOCATION FOR VIRTUALIZED CABLE DATA PLANE APPLICATIONS - Systems and methods to support flexible scaling and dynamic resource allocation for virtualized cable data plane applications. The system includes a head end together with a node to provide data to customer devices. A container operating that includes a data plane application that provides packets of data for transmission to the node. The data plane application is instantiated with at least one of a virtual networking function and a computing resource function. | 2021-05-27 |
20210160091 | R-PHY MAP ADVANCE TIME MEASUREMENT - Systems and methods for dynamically adjusting a MAP advance time for a MAP message sent from a CCAP core to an RPD, the MAP message allocating bandwidth for the RPD during an interval beginning at a start time specified in the MAP message. | 2021-05-27 |
20210160092 | Communication, Monitoring and Control Architecture and Method - A communication network device facilitates communication between devices and/or applications in a network without requiring each device to register with every other device or application. The communication network device may generate and assign a unique identifier to each device or application upon registration and store a role of the device or application (e.g., sender or receiver or both) in addition to capability and compatibility information. The communication network device may then dynamically broker and manage communications from each of the devices or applications to other devices and applications in real-time. Using a communication network device, communications may be directed to devices or applications without requiring a sending device to know of the recipient's network address. Additionally, the communication network device allows for the direct targeting of communications to specific applications. Accordingly, in some arrangements, two applications running on the same device may receive different communications from another device or application. | 2021-05-27 |
20210160093 | METHOD FOR DATA HAND-SHAKING BASED ON ETHERCAT PROTOCOL - A method for data hand-shaking based on EtherCAT protocol is disclosed, the method is implemented by an EtherCAT slave device, and includes: receiving a data packet from a previous device; obtaining self-related data from or inserting feedback data to the data packet for generating a processed packet; transmitting the processed packet to a next device; receiving a returned packet from the next device; transmitting the returned packet to the previous device; performing a packet diversion procedure to at least one of the data packet, the processed packet and the returned packet for generating a backup packet, wherein at least part of the content of the backup packet is identical to the content of the data packet, the processed packet or the returned packet; analyzing the backup packet; and, filtering the backup packet for obtaining designated application data with respect to other EtherCAT slave devices. | 2021-05-27 |
20210160094 | MAIN FEEDERS AS COMMS LINES - A power system is provided and includes an electrical element, feeder lines by which the electrical element is receptive of first signals at first frequency ranges, first and second line replaceable units (LRUs) and first and second communications busses to couple the first and second LRUs to the feeder lines, respectively. The first and second LRUs are intercommunicative using second signals at second frequency ranges via the first and second communications busses and the feeder lines. | 2021-05-27 |
20210160095 | Communication System for Providing Communication Between a Control Module and an Oil and/or Gas Module - The present invention relates to a communication system ( | 2021-05-27 |
20210160096 | Method for Operating an Ethercat Fieldbus System, and Ethercat Fieldbus System - An EtherCAT fieldbus system has an EtherCAT master and a number of EtherCAT slaves. The EtherCAT master and the number of EtherCAT slaves are coupled together by an EtherCAT fieldbus in order to exchange data. A method ascertains active EtherCAT slaves by way of the EtherCAT master; requests respective product codes of the active EtherCAT slaves by way of the master; ascertains a respective device identification of the active EtherCAT slaves from the respective product codes by way of the EtherCAT master, and switches the state of the EtherCAT fieldbus system into the operational state by way of the EtherCAT master if the respective device identification of the active EtherCAT slaves matches a specified device identification. | 2021-05-27 |
20210160097 | SYSTEM AND METHOD FOR PROVIDING A MULTI-DIMENSIONAL RING-LATTICE NETWORK TOPOLOGY - Described herein are systems and methods providing a multi-dimensional ring-lattice network topology. Systems and methods disclosed herein provide for constructing network topologies in a form of a partial mesh (a partially connected network), where a bridge is capable of forwarding packets through other bridges when a direct link to the destination compute device is not available. A temporary on-demand tunnel is created by virtual networking software on-demand, to facilitate a direct tunnel between two virtual network interfaces where such a direct connection is not available with a permanent tunnel, and where there is sufficient traffic demand between these two interfaces that justifies a direct tunnel. The described approach provides a framework for achieving a compromise between link count limitation, and packet-forwarding path length, that can be tailored to address particular network requirements, together with a way to reliably predict the performance of the resulting network. | 2021-05-27 |
20210160098 | SYSTEM AND METHOD FOR EXCHANGING DATA IN A REAL-TIME DATA COMMUNICATION SYSTEM - The invention pertains to communication among stations interconnected by a ring of physical links, operating at a base symbol rate. Each station has an upstream and a downstream link and relays messages originating from the upstream link to its downstream link. Logical links are provided on the ring, each associated with a symbol rate divisor and a link index. Each station transmits messages composed of a strings of symbols on a selected logical link by transmitting the message on its downstream link at the base symbol rate divided by the symbol rate divisor associated with the selected logical link, and offset by the link index of the selected logical link. A station generates a first synchronizing sequence on its downstream link at the base symbol rate divided by the symbol rate divisor associated with a first logical link not used for data, and offset by the link index of the first logical link, and a second synchronizing sequence at the base symbol rate divided by the symbol rate divisor associated with a second logical link not used for data, and offset by the link index of the second logical link. | 2021-05-27 |
20210160099 | SYSTEM AND METHOD FOR PREVENTING SWITCH LOOPS IN LAYER-2 NETWORKS - Described herein are systems and methods for preventing switch loops in a layer 2 network. A method can provide, at a computer including a microprocessor, two or more virtual local area networks (VLANs), each VLAN comprising a number of bridges, a plurality of end nodes connected to the two or more VLANs via a plurality of network interface cards (NICs). The method can connect two of the plurality of nodes to two of the VLANs via two or more tunnels. The method can receive a first instance of a broadcast packet at a bridge of a VLAN, and then receive a second instance of the broadcast packet is the bridge of the VLAN. Upon the second instance of the broadcast packet being received within a configured time period, the method can drop the second instance of the broadcast packet. | 2021-05-27 |
20210160100 | VIRTUAL DRAWERS IN A SERVER - A computer-implemented method comprises receiving an index number for each of a plurality of physical processing units, each of the plurality of physical processing units communicatively coupled to each of a plurality of switch chips in a leaf-spine topology; assigning at least one of the plurality of physical processing units to a first virtual drawer by updating an entry in a virtual drawer table indicating an association between the respective index number of the at least one physical processing unit and an index of the first virtual drawer; and performing a drawer management function based on the virtual drawer table. | 2021-05-27 |
20210160101 | INTERCONNECTING NETWORKS OPERATING DIFFERENT TYPES OF CONTROL PLANES - Security policies are translated into access-control list entries and can be stored by switches in the computer network. When a new device is connected to the computer network, the device may be resolved to the group for which it is a member and an ACL entry may be created for the new device. In networks having redundant switches, the ACL entries may be stored by each redundant network switch. | 2021-05-27 |
20210160102 | ASYNCHRONOUS PROCESSING OF BLOCKCHAIN BLOCKS - A computer-implemented method includes retrieving, by a bridge device communicatively linked to a blockchain network node of a blockchain network, a first set of blockchain blocks from the blockchain network node using a first set of threads of the bridge device; storing, by the bridge device, the first set of blockchain blocks in the bridge device; and verifying, by the bridge device, a second set of blockchain blocks that are stored in the bridge device using a second set of threads of the bridge device; and wherein retrieving the first set of blockchain blocks and verifying the second set of blockchain blocks are performed asynchronously using the first set of threads and the second set of threads. | 2021-05-27 |
20210160103 | MICRO-ADAPTER ARCHITECTURE FOR CLOUD NATIVE GATEWAY DEVICE - A method, a device, and a non-transitory storage medium are described in which a micro-adapter architecture for a device gateway service is provided. The micro-adapter architecture for a device gateway service may be included in a cloud native backend gateway. The cloud native backend gateway may include a set of adapters that are logically grouped in layers for providing device gateway services. The device gateway services may include an application layer, a device layer, and a transport layer. The device gateway services may include bounded contexts based on rules that define the application layer, the device layer, and the transport layer. The device gateway services may be microservices that are distributed within the defined layers. | 2021-05-27 |
20210160104 | TRANSMISSION RANK AND PRECODER SIGNALING IN UPLINK NON-CODEBOOK BASED TRANSMISSION - Techniques and apparatus for configuring transmission rank and/or precoder(s) to support uplink non-codebook based transmission are provided. One technique includes receiving sounding reference signal (SRS) resource(s) from a user equipment (UE), where each SRS resource is associated with one or more precoded ports. At least one of a transmission rank or a set of precoders is determined based on the SRS resource(s). An indication of at least one of the SRS resource(s) is signaled to the UE. The UE uses the indication of the at least one of the SRS resource(s) to send an uplink transmission. | 2021-05-27 |
20210160105 | Method for Uplink Data Transmission, Terminal Device and Network Device - A method for uplink data transmission, a terminal device and a network device are provided. The method may include: receiving subset constraint indication information of an SRS resource sent by a network device, wherein the subset constraint indication information is used for indicating at least one available SRS resource subset; according to the subset constraint indication information, determining the length of an SRI, sent by the network device, in DCI for scheduling uplink data transmission; according to the length of the SRI, determining a target SRI from the DCI; determining, in the at least one available SRS resource subset, a target SRS resource subset corresponding to the target SRI; and according to the target SRS resource subset, determining a transmission parameter used for the uplink data transmission. | 2021-05-27 |
20210160106 | MULTI-FUNCTION LEVEL FINDER FOR SERDES - An illustrative receiver includes: a decision element that derives symbol decisions from a slicer input signal; an equalizer that converts a receive signal into the slicer input signal; a summer that combines the symbol decisions with the slicer input signal to produce an error signal; and a level finder that operates on said signals to determine thresholds at which each signal has a given probability of exceeding the threshold. One illustrative level finder circuit includes: a gated comparator and an asymmetric accumulator. The gated comparator asserts a first or a second gated output signal to indicate when an input signal exceeds or falls below a threshold with a programmable condition being met. The asymmetric accumulator adapts the threshold using up steps for assertions of the first gated output signal and down steps for assertions of the second gated output signal, with the up-step size being different than the down-step size. | 2021-05-27 |
20210160107 | MULTI-TAP DECISION FEED-FORWARD EQUALIZER WITH PRECURSOR AND POSTCURSOR TAPS - A multi-tap Differential Feedforward Equalizer (DFFE) configuration with both precursor and postcursor taps is provided. The DFFE has reduced noise and/or crosstalk characteristics when compared to a Feedforward Equalizer (FFE) since DFFE uses decision outputs of slicers as inputs to a finite impulse response (FIR) unlike FFE which uses actual analog signal inputs. The digital outputs of the tentative decision slicers are multiplied with tap coefficients to reduce noise. Further, since digital outputs are used as the multiplier inputs, the multipliers effectively work as adders which are less complex to implement. The decisions at the outputs of the tentative decision slicers are tentative and are used in a FIR filter to equalize the signal; the equalized signal may be provided as input to the next stage slicers. The bit-error-rate (BER) of the final stage decisions are lower or better than the BER of the previous stage tentative decisions. | 2021-05-27 |
20210160108 | ADAPTIVE EQUALIZER, OPTICAL RECEIVER, AND OPTICAL TRANSMISSION SYSTEM - An adaptive equalizer includes a sample buffer that temporarily stores data obtained by fractional sampling at a sampling rate that is larger than one time and smaller than two times a symbol rate; and a processor coupled to the sample buffer and configured to: specify position of a training sequence in the data based on a correlation value between a first set of (f×T) samples and a second set of (f×T) samples following the first set of samples, assuming that the sampling rate is f, and a symbol length of a code pattern included in the training sequence inserted in the data is T, and calculate an initial value of a tap coefficient set to a tap of an adaptive equalization filter based on the specified training sequence, wherein the symbol length is set to be changeable so that f×T is an integer. | 2021-05-27 |
20210160109 | NEUROMORPHIC DEVICE AND NEUROMORPHIC SYSTEM INCLUDING THE SAME - A neuromorphic device includes a neuron block, a spike transmission circuit and a spike reception circuit. The neuron block includes a plurality of neurons connected by a plurality of synapses to perform generation and operation of spikes. The spike transmission circuit generates a non-binary transmission signal based on a plurality of transmission spike signals output from the neuron block and transmits the non-binary transmission signal to a transfer channel, where the non-binary transmission signal includes information on transmission spikes included in the plurality of transmission spike signals. The spike reception circuit receives a non-binary reception signal from the transfer channel and generates a plurality of reception spike signals including reception spikes based on the non-binary reception signal to provide the plurality of reception spike signals to the neuron block, where the non-binary reception signal includes information on the reception spikes. | 2021-05-27 |
20210160110 | BANDWIDTH ADJUSTABLE EUCLIDEAN MODULATION - A method and apparatus for using Euclidean modulation in an antenna are disclosed. In one embodiment, a method for controlling an antenna comprises mapping a desired modulation to achievable modulation states, mapping modulation values associated with the achievable modulation states to one or more control parameters, and controlling radio frequency (RF) radiating antenna elements using the one or more control parameters to perform beam forming. | 2021-05-27 |
20210160111 | FLEXIBLE FRAME STRUCTURE FOR WIRELESS COMMUNICATION - Current radio frame structures in Long-Term Evolution (LTE) and New Radio (NR) have some restrictions. A frame structure is disclosed herein that aims to provide more flexibility. Embodiments of the flexible frame structure include different parameters that are flexible, i.e. that are configurable. A non-exhaustive list of parameters that may be configurable include: length of the frame; length of a subframe (if a subframe is even defined); length of a slot and/or number of symbol blocks in a slot (if a slot is even defined); length of the CP and/or data portion in a symbol block, or ratio of CP to data portion, which may vary between symbol blocks; downlink/uplink switching gap length, etc. | 2021-05-27 |
20210160112 | METHODS AND APPARATUSES FOR TRANSMITTING AND RECEIVING UPLINK INFORMATION - Embodiments of the present disclosure relate to a method and apparatus of transmitting uplink (UL) information and a method and apparatus of receiving UL information. In one embodiment of the present disclosure, the method of transmitting UL information comprises transmitting a reference signal using a first sequence; and transmitting UL control information using a second sequence; wherein a reference signal and the UL control information are staggered-multiplexed in frequency domain. With embodiments of the present disclosure, the uplink information can be transmitted in reduced uplink symbols so as to adapt for a proposed subframe structure with reduced uplink symbols and thus, the transmission latency can be reduced greatly. | 2021-05-27 |
20210160113 | PHYSICAL LAYER CONVERGENCE PROCEDURE PROTOCOL DATA UNIT COMMUNICATION METHOD AND RELATED APPARATUS - This application provides a physical layer convergence procedure protocol data unit communication method and a related apparatus. The method includes: receiving, by a receiving apparatus, a physical layer convergence procedure protocol data unit PPDU sent by a sending apparatus, where the PPDU includes synchronization adjustment indication information and a data field, and the synchronization adjustment indication information and the data field are sent in a bandwidth less than 20 MHz; and performing, by the receiving apparatus, time synchronization and automatic gain control AGC on the data field based on the synchronization adjustment indication information. According to this solution, the receiving apparatus can perform, by using the synchronization adjustment indication information, time synchronization and automatic gain control AGC on the PPDU transmitted in a narrow bandwidth. | 2021-05-27 |
20210160114 | METHOD AND DEVICE IN NODES USED FOR WIRELESS COMMUNICATION - The present disclosure provides a method and device in nodes used for wireless communication. The communication node first transmits first information, the first information being used for indicating K REs, and then transmits K modulation symbols respectively on the K REs; time-domain resources occupied by the K REs comprise M multicarrier symbols; a first multicarrier symbol is one of the M multicarrier symbols, K1 modulation symbol(s) comprises(comprise) modulation symbol(s) among the K modulation symbols that is(are) mapped onto the first multicarrier symbol; the K modulation symbols belong to a target modulation-symbol sequence; starting K2 modulation symbol(s) in the target modulation-symbol sequence comprises(comprise) the K1 modulation symbol(s); a time-domain position of the first multicarrier symbol among the M multicarrier symbols is related to at least one of a subcarrier spacing of a subcarrier occupied by the K REs or M. The present disclosure improves link performance. | 2021-05-27 |
20210160115 | TRANSMISSION APPARATUS AND TRANSMISSION METHOD OF AN AGGREGATE PHYSICAL LAYER PROTOCOL DATA UNIT - A transmission apparatus includes a transmission signal generator which, in operation, generates a transmission signal having an aggregate physical layer protocol data unit (PPDU) that includes a legacy preamble, a legacy header, a non-legacy preamble, a plurality of non-legacy headers and a plurality of data fields; and a transmitter which, in operation, transmits the generated transmission signal, wherein the legacy preamble, the legacy header and the plurality of non-legacy headers are transmitted using a standard bandwidth, the non-legacy preamble and the plurality of data fields are transmitted using a variable bandwidth that is larger than the standard bandwidth and wherein a plurality of sets of each of the plurality of non-legacy headers and each of the plurality of data fields are transmitted sequentially in a time domain. | 2021-05-27 |
20210160116 | DATA MODULATION METHOD AND APPARATUS - Provided are a data modulation method and apparatus, and a storage medium. The method includes: modulating a first data sequence to obtain a second data sequence; inserting a third data sequence into the second data sequence to obtain a fourth data sequence, where each of data, except for a first one and a last one in the fourth data sequence, of the third data sequence in the fourth data sequence satisfies that power of the each datum is equal to average power of two data adjacent to the each datum, and a phase of the each datum is within an angle between the two data adjacent to the each datum; and transmitting the fourth data sequence. | 2021-05-27 |
20210160117 | SYNCHRONIZATION SIGNAL BLOCK PATTERN AND DEMODULATION REFERENCE SIGNAL DESIGN FOR PHYSICAL BROADCAST CHANNEL FOR CHANNEL FREQUENCIES ABOVE 52.6GHZ - A device of a New Radio (NR) User Equipment (UE), a method and a machine readable medium to implement the method. The device includes a Radio Frequency (RF) interface, and processing circuitry coupled to the RF interface, the processing circuitry to: encode for transmission, to a User Equipment (UE), a Synchronization Signal Block (SSB) including a Physical Broadcast Channel (PBCH) and a channel estimation signal that is time division multiplexed with the PBCH, the channel estimation signal to allow the UE to estimate a channel for the PBCH and including one of a Secondary Synchronization Signal (SSS), a Demodulation Reference Signal (DMRS) or a Phase Tracking Reference Signal (PT-RS); and apply Discrete Fourier Transform-spread-Orthogonal Frequency Division Multiplexing (DFT-s-OFDM) to the PBCH prior to sending the SSB to the RF interface for transmission. | 2021-05-27 |
20210160118 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - A method and an apparatus for receiving broadcast signals thereof are disclosed. The apparatus for receiving broadcast signals, the apparatus comprises a receiver to receive the broadcast signals, a demodulator to demodulate the received broadcast signals by an OFDM (Orthogonal Frequency Division Multiplex) scheme, a frame parser to parse a signal frame from the demodulated broadcast signals, wherein the signal frame includes service data corresponding to each of a plurality of physical paths, a time deinterleaver to time deinterleave service data in each physical path by a TI (Time Interleaving) block, wherein the time deinterleaver further performs inserting at least one virtual FEC block into at least one TI block of the service data, wherein each TI block includes a variable number of FEC blocks of the service data, wherein a number of the at least one virtual FEC block is defined based on a maximum number of FEC blocks of a TI block and a decoder to decode the time deinterleaved service data. | 2021-05-27 |
20210160119 | System and Method for Preamble Detection in MIMO Narrowband Power Line Communications - A PLC network system and method operative with OFDM for generating MIMO frames with suitable preamble portions configured to provide backward compatibility with legacy PLC devices and facilitate different receiver tasks such as frame detection and symbol timing, channel estimation and automatic gain control (AGC), including robust preamble detection in the presence of impulsive noise and frequency-selective channels of the PLC network. A PLC device may include a delayed correlation detector and a cross-correlation detector operating in concert to facilitate preamble detection in one implementation. | 2021-05-27 |
20210160120 | METHOD AND APPARATUS FOR PERFORMING INITIAL ACCESS IN WIRELESS COMMUNICATION SYSTEM - Provided are a method and an apparatus for performing physical resource block (PRB) indexing in a wireless communication system. A user equipment (UE) receives information on an offset between a synchronization signal (SS) block and a system bandwidth from a network through the SS block and performs the PRB indexing on the system bandwidth on the basis of the information on the offset. | 2021-05-27 |
20210160121 | CONFIGURABILITY AND SIGNALING FOR HALF-TONE SHIFT - Described is an apparatus of a User Equipment (UE) operable to communicate with an Evolved Node-B (eNB) on a wireless network. The apparatus may comprise a first circuitry, a second circuitry, and a third circuitry. The first circuitry may be operable to process a configuration transmission carrying a half-tone shifting indicator. The second circuitry may be operable to select one or more subcarrier frequencies for Uplink (UL) transmission based on the half-tone shifting indicator. The third circuitry may be operable to generate a UL transmission for the one or more subcarrier frequencies. The half-tone shifting indicator may have a first value indicating application of a half-subcarrier offset, and a second value indicating no application of the half-subcarrier offset. | 2021-05-27 |
20210160122 | MULTIPLE ACCESS SCHEMES WITH INTERFERENCE MITIGATION - Methods, systems, and devices for multiple access with interference mitigation are described. An exemplary implementation of interference mitigation in a multiple access scheme includes rearranging a N-th bit stream corresponding to a N-th portion of the input bit stream to generate a N-th rearranged bit stream of K rearranged bit streams, for N=1, 2, . . . , K, generating a modulated symbol stream of hierarchical QAM symbols based on the K rearranged bit streams, where bits from the first rearranged bit stream correspond to one or more most significant bits of the hierarchical QAM symbols, bits from the K-th rearranged bit stream correspond to one or more least significant bits of the hierarchical QAM symbols, and bits from a second to (K−1)-th rearranged bit stream correspond to one or more remaining bits of the hierarchical QAM symbols, and transmitting a signal generated from the modulated symbol stream. | 2021-05-27 |
20210160123 | MANAGEMENT OF EVENTS RECEIVED FROM NETWORK DEVICES - Examples described herein relate to method and system for managing events received from network devices. A management station may receive events from the network devices. Further, the management station may determine a delay based at least on a rate at which the events are received at the management station. Moreover, the management station may schedule processing of the events based on the delay. | 2021-05-27 |
20210160124 | Automatic Integrated Control Loop For Fault, Performance And Service Quality Management - A method includes receiving fault management data and service quality management data from an integrated feedback control loop, wherein a first set of faults in the fault management data is correlated with service quality management data if a root cause of the first set of faults is known and wherein a second set of faults in the fault management data are categorized as silent faults if no root cause of the second faults is known, The silent faults in the fault management are correlated with the service quality management data. The disclosure includes prioritizing analysis of the silent faults that affect the service quality management data, and prioritizing repair of faults in the fault management data that affect the service quality management data. | 2021-05-27 |
20210160125 | SYSTEMS AND METHODS FOR FAULT DETECTION BASED ON PEER STATISTICS - While many network components include diagnostic capabilities that are sometimes implemented at the hardware level, these diagnostics can be unreliable. Thus, false indications of operability or inoperability can result when these diagnostics are relied upon exclusively. To better detect operational problems with a network component, operational parameters from the network component and one or more peer devices are analyzed to determine whether the network component is operational. In some embodiments, data derived from these operational parameters is provided to a supervised machine learning model, and the model provides output indicating the operational status of the network component. Some embodiments binarize operational parameters of a device and compute a maximum duration the binarized parameters indicate inactivity of the device. Some embodiments compute a moving average of the binarized parameters. The maximum duration and/or moving average(s) are provided to the machine learning model in some embodiments. | 2021-05-27 |
20210160126 | Beam Failure Recovery Procedure in Dormant State - A base station determines that a first reference signal configured for a beam failure detection overlaps in at least one symbol with a second reference signal. Based on the first reference signal and the second reference signal not being quasi co-located, the base station transmits one of the first reference signal and the second reference signal, and drops transmission of one of the first reference signal and the second reference signal. | 2021-05-27 |
20210160127 | MONITORING AND SELF-HEALING OF DEPLOYED ENVIRONMENTS - Systems and methods for monitoring and correcting a cloud environment are disclosed. An alert associated with an active issue at a component is received and an issue object is generated based on the alert. A self-healing flow is executed based on an alert type of the alert to attempt to correct the active issue. | 2021-05-27 |
20210160128 | PROVISIONING OF WIRELESS SECURITY CONFIGURATION INFORMATION IN A WIRELESS NETWORK ENVIRONMENT - A network environment includes a message-processing resource that receives a communication originated by a communication device and transmitted from the communication device over a wireless communication link. By way of non-limiting example, the communication can be a request for retrieval of content from server resource disposed in the network environment. The message-processing resource processes the communication transmitted over the wireless communication link to identify a network address assigned to the communication device. The message-processing resource maps the network address to corresponding status information associated with the communication device. In response to detecting status information indicating that the communication device has not yet been configured with configuration information supporting secured wireless communications of a particular type, the message-processing resource: initiates generation of configuration information supporting subsequent secured wireless communications between the communication device and a corresponding wireless access point, and forwards the configuration information to the communication device. | 2021-05-27 |
20210160129 | SYSTEMS AND METHODS FOR PROFILING AND CLUSTERING NETWORK-CONNECTED DEVICES - A network device determines when multiple users each connect to a network using one or more devices. The network device obtains device or network-related parameters associated with the one or more devices and generates profiling vectors for each of the multiple users, that connects to the network using the one or more devices, to produce multiple profiling vectors. The network device clusters the multiple profiling vectors to identify cluster centers associated with a plurality of user groups, and determines first users of the multiple users for, or with, whom to perform certain actions or activities based on the first users' affinity with one or more of the plurality of user groups. The network device performs the certain actions or activities with respect to the determined first users. | 2021-05-27 |
20210160130 | Method and Apparatus for Determining Target Object, Storage Medium, and Electronic Device - The present disclosure provides a method and apparatus for determining a target object, a storage medium, and an electronic device. The method includes: obtaining a first control instruction and state information of one or more to-be-controlled objects at a first device, wherein there is a communication connection established between the first device and each of the one or more to-be-controlled objects; and determining, from the one or more to-be-controlled objects according to the state information, a target object that the first control instruction requests to control. | 2021-05-27 |
20210160131 | Configuring a Network Slice - In one example aspect, a method performed by a network node for configuring a network slice is provided, the method comprising, in response to a request to configure a network slice, configuring network resources for providing the network slice, and configuring a state of the network slice to a first state, wherein in the first state the network slice is disabled. | 2021-05-27 |
20210160132 | DEDICATED VIRTUAL COMPUTING SYSTEM SERVERS - A virtual computer system service receives a request from a customer to provision a dedicated server for the exclusive use of the customer. The dedicated server may be used to launch one or more virtual machine instances. The virtual computer system service subsequently selects, from a pool of available servers, a server that can be dedicated to the customer and that does not have capacity allocated to any other customer. The virtual computer system service may update a database to specify, in an entry corresponding to the selected server, that the server has been dedicated for the exclusive use of the customer. Once the database has been updated, the virtual computer system service will enable the customer to launch a virtual machine instance using the dedicated server. | 2021-05-27 |
20210160133 | BLUETOOTH MESH NETWORK PROVISIONING - Information reported by one or more gateway nodes in a Bluetooth mesh network regarding an unprovisioned Bluetooth device is received. Provisioning data for the unprovisioned Bluetooth device is generated. A destination Bluetooth gateway node to which to issue the generated provisioning data is determined from among the one or more gateway nodes reporting the received information. The generated provisioning data is issued to the destination Bluetooth gateway node so that the destination Bluetooth gateway node can perform a provisioning operation directed at the unprovisioned Bluetooth device. | 2021-05-27 |
20210160134 | METHOD FOR MANAGING THE OPERATION OF A SYSTEM ON CHIP, AND CORRESPONDING SYSTEM ON CHIP - System on a chip, comprising several master pieces of equipment, several slave resources, an interconnection circuit capable of routing transactions between master pieces of equipment and slave resources, and a processing unit at least configured to allow a user of the system on a chip to implement within the system on a chip at least one configuration diagram of this system defined by a set of configuration pieces of information including at least one piece of identification information assigned to each master piece of equipment, The identification pieces of information are intended to be attached to all the transactions emitted by the corresponding master pieces of equipment, the set of configuration pieces of information not being used for addressing the slave resources receiving the transactions and being used to define an assignment of at least one piece of master equipment to at least some of the slave resources. | 2021-05-27 |