34th week of 2020 patent applcation highlights part 64 |
Patent application number | Title | Published |
20200266947 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING UPLINK REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEMS - A method, performed by a user equipment (UE), of transmitting an uplink (UL) reference signal in a wireless communication system is provided. The method includes receiving first information indicating whether to apply transform precoding and pi/2 binary phase shift keying (BPSK) modulation to a physical uplink shared channel (PUSCH), receiving second information indicating whether to apply the pi/2 BPSK modulation to an UL demodulation reference signal (DMRS), and identifying a sequence having characteristics of a first peak-to-average power ratio (PAPR) based on the first information and the second information. | 2020-08-20 |
20200266948 | METHOD FOR INDICATING QCL INFORMATION FOR APERIODIC CSI-RS IN WIRELESS COMMUNICATION SYSTEM AND DEVICE FOR PERFORMING THE METHOD - Disclosed herein is a method for receiving a user equipment-specific reference signal-based data signal by a user equipment in a wireless communication system. Particularly, the method comprises the steps of: receiving a control signal for the user equipment-specific reference signal-based data signal from an eNodeB; and receiving the user equipment-specific reference signal-based data signal on the basis of the control signal, wherein the control signal includes information on an antenna port for a channel status information-reference signal, the antenna port being assumed to be quasi-co-located (QCL) with an antenna port for the user equipment-specific reference signal, and the channel status information-reference signal excludes an aperiodic channel status information-reference signal. | 2020-08-20 |
20200266949 | Apparatus and Methods for Wireless Channel Sounding - A technique of operating a wireless communication device includes receiving an assigned starting point index and an assigned reference signal bandwidth for a reference signal. The reference signal is then transmitted multiple times, beginning at an initial resource block that is associated with the assigned starting point index and in accordance with the assigned reference signal bandwidth, across a shared channel. | 2020-08-20 |
20200266950 | METHOD FOR CONFIGURING REFERENCE POINT IRRELEVANT TO COMMON RESOURCE BLOCK GRID AND APPARATUS THEREFOR - Disclosed herein is a method for receiving a demodulation reference signal (DMRS) in a wireless communication system. In particular, the method may include receiving a synchronization signal/physical broadcast channel (SS/PBCH) block, acquiring information about control resource set (CORESET) #0 from a PBCH included in the SS/PBCH block, receiving a physical downlink control channel (PDCCH) through CORESET #0, and receiving a physical downlink shared channel (PDSCH) scheduled based on the PDCCH and a DMRS for the PDSCH, wherein, based on the PDCCH being addressed to a system information-radio network temporary identifier (SI-RNTI), a reference point for the DMRS may be subcarrier # | 2020-08-20 |
20200266951 | TECHNIQUES FOR SHARED RADIO FREQUENCY SPECTRUM CHANNEL CONFIGURATION - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive, from a base station (BS), information identifying a core resource set (CORESET) for one or more shared radio frequency spectrum channels. The CORESET may be configured into a plurality of resource blocks based at least in part on a resource block granularity associated with the one or more shared radio frequency spectrum channels. The UE may communicate with the BS using the CORESET. Numerous other aspects are provided. | 2020-08-20 |
20200266952 | CONFIGURATION OF NON-UE-SPECIFIC SEARCH SPACE FOR M-PDCCH - This disclosure relates to implementations to support non-UE-specific (i.e. common) and UE-specific search spaces (SS) for M-PDCCH. One implementation relates to a UE comprising RF circuitry to receive, from an eNB, configuration information of one or a plurality of common Search Spaces (CSSs) for M-PDCCH; and baseband circuitry to monitor the one or more configured CSS for M-PDCCH transmissions; wherein the RF circuitry and/or baseband circuitry is adapted to support a reduced bandwidth (BW). Another implementation relates to an eNB comprising RF circuitry to transmit configuration information of a plurality of CSSs for M-PDCCH to one or more UEs supporting a reduced BW, wherein the plurality of CSSs for M-PDCCH are differentiated by “based on functionality”-differentiation that includes the type of use case and/or an EC level of the UE. | 2020-08-20 |
20200266953 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATION USING MODULATION, CODING SCHEMES, AND TRANSPORT BLOCK SIZES - A method of processing a signal received over a wireless link may utilize sharing of Modulation and Coding Scheme (MCS) and Transport Block Size (TBS) data. At least one parameter is obtained including a sub-carrier spacing of a transport format. A modulation order and a transport block size may be detected, based on the at least one parameter. The signal received over the wireless link is then processed, based on the detected modulation order and the transport block size. An apparatus may perform the embodiments of the method to process the received signal. | 2020-08-20 |
20200266954 | Method And Apparatus For User Equipment Processing Timeline Enhancement In Mobile Communications - Various solutions for processing timeline enhancement with respect to user equipment and network apparatus in mobile communications are described. An apparatus may determine whether a latency requirement of a service is less than a threshold value. The apparatus may use a first processing time capability to perform a transmission in an event that the latency requirement of the service is not less than the threshold value. The apparatus may use a second processing time capability to perform the transmission in an event that the latency requirement of the service is less than the threshold value. The apparatus may apply a scheduling restriction/optimization to perform the transmission when using the second processing time capability. | 2020-08-20 |
20200266955 | METHODS AND APPARATUS FOR TRANSPORT PROTOCOL ACK AGGREGATION - Aspects of the present disclosure include methods, apparatuses, and computer readable media for receiving at least one TP packet, computing a current data rate or an end time of a low throughput phase, determining if TP is in the low throughput phase, aggregating the at least one received TP packet or an ACK relating to the at least one received TP packet in response to determining that the TP is not in the low throughput phase, and transmitting the ACK to a sending device. | 2020-08-20 |
20200266956 | DATA TRANSMISSION METHOD AND APPARATUS - The present invention provides a data transmission method and apparatus. The method includes: transmitting physical downlink channel data according to a first-type reference signal (RS) or a second-type RS or a third-type RS. The method of the present invention ensures a balance between data transmission performance and RS overheads for different NarrowBand-Internet Of Things (NB-IOT) physical downlink channel data, thereby resolving the problem in the related art of not knowing which RS is to be used to transmit NB-IOT physical channel data. | 2020-08-20 |
20200266957 | TRANSMISSION METHODS TO HANDLE VULNERABLE SYMBOLS - Methods, systems, and devices for wireless communications are described. A first device may identify that a first set of transmission resources in a transmission time interval (TTI) has a higher priority at a second device than a second set of transmission resources in the TTI. The first device may identify that a message is to be transmitted from the first device to the second device via the TTI and process the message into a bit sequence based on the identification of the second set of transmission resources in the TTI, where the processing increases a likelihood that systematic bits of the message are received at the second device despite presence of the second set of transmission resources in the TTI. The first device may transmit the bit sequence to the second device via the TTI. | 2020-08-20 |
20200266958 | Switching of Bandwidth Parts in Wireless Communication Network - The present disclosure relates to switching of bandwidth parts in wireless communication network. Embodiments may provide a method performed by a wireless device for switching of bandwidth parts. The method includes: receiving a first message from a base station indicating a first bandwidth part; and switching to the first bandwidth part in response to determination of the first bandwidth part being not the currently active bandwidth part. | 2020-08-20 |
20200266959 | METHOD AND DEVICE FOR PERFORMING INITIAL CONNECTION IN WIRELESS COMMUNICATION SYSTEM - In a wireless communication system, user equipment (UE) receives information about an uplink (UL) bandwidth part (BWP) from a network through remaining minimum system information (RMSI), and transmits an MSG | 2020-08-20 |
20200266960 | METHOD AND DEVICE IN UE AND BASE STATION FOR WIRELESS COMMUNICATION - The disclosure provides a method and a device in a User Equipment (UE) and a base station for wireless communication. UE transmits first information, the first information being used for determining a first reference signal, then the UE receives second information in a first frequency subband in a first time window and detects third information in a second frequency subband in a second time window; the first time window is related to time-domain resources occupied by the first information; a first antenna port is used for transmitting the first reference signal, each antenna port used for transmitting the second information is spatially related to the first antenna port, and each antenna port used for transmitting the third information is spatially related to the first antenna port. The disclosure simplifies the processes of beam link failure judgement and beam management for a UE, thereby improving the overall performance of the system. | 2020-08-20 |
20200266961 | DYNAMIC BWP SWITCHING UNDER MULTI-TRP TRANSMISSIONS - A UE receives a bandwidth part switch command from a first TRP, the bandwidth part switch command instructing the UE to switch from communicating on a first bandwidth part to communicating on a second bandwidth part. The UE (a) determines to accept the bandwidth part switch command based on a priority level of the first TRP among the plurality of TRPs or (b) informs other TRPs of the plurality of TRPs. The UE switches from communicating on the first bandwidth part to communicating on the second bandwidth part. A first TRP determines whether the first TRP is a primary TRP instructing to switch from communicating on a first bandwidth part to communicating on a second bandwidth part. The first TRP communicates with the UE via the first TRP on either the first bandwidth part or the second bandwidth part, when the first TRP is the primary TRP. | 2020-08-20 |
20200266962 | RETRANSMISSION ACTIVATING/DEACTIVATING METHOD, BASE STATION, USER EQUIPMENT AND DEVICE - The present disclosure provides a retransmission activating/deactivating method, a base station, a user equipment and a device. The method includes: determining a correspondence relationship between a bearer which is allowed for retransmission under the first base station and a bit of a preset field of media access control (MAC) control element (CE) of the first base station for activating/deactivating retransmission; where the preset field is used to indicate activation/deactivation retransmission of the bearer which is allowed for retransmission; and, when determining to activate/deactivate retransmission of the bearer which is allowed for retransmission under the first base station, populating, by the first base station, the bit, which is in the preset field of the MAC CE for activating/deactivating retransmission and corresponding to the bearer, thereby generating the MAC CE for activating/deactivating retransmission, and transmitting to the UE the generated MAC CE for activating/deactivating retransmission. | 2020-08-20 |
20200266963 | DMRS INDICATION METHOD, TERMINAL, AND BASE STATION - Disclosed in the present invention are a demodulation reference signal (DMRS) indication method, a terminal, and a base station. The method in the present invention comprises: a first terminal obtains transmission data flow quantity indication information of all scheduled terminals in at least one scheduling resource, or obtains resource element (RE) quantity indication information occupied by DMRSs corresponding to transmission flows of all the scheduled terminals in the at least one scheduling resource; and the first terminal determines, according to the obtained indication information, RE positions configured or occupied by the DMRSs corresponding to an interference data flow of the first terminal in the scheduling resources. By means of the present invention, DMRSs in transmission of multiple data flows can be indicated, and the present invention is particularly applicable to an MU-MIMO system of a large-scale antenna array. | 2020-08-20 |
20200266964 | METHOD AND APPARATUS FOR CONFIGURING REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method performed by a terminal in a communication system is provided. The method includes receiving, from a base station, demodulation reference signal (DMRS) configuration information using higher layer signaling; receiving, from the base station, downlink control information for transmitting uplink data, the downlink control information including information on DMRS and resource allocation information for the uplink data; identifying a number of at least one DMRS symbol and respective position of the at least one DMRS symbol based on the information on DMRS and resource allocation information; and transmitting, to the base station, the uplink data and the DMRS based on the identified respective position of the at least one DMRS symbol. | 2020-08-20 |
20200266965 | METHODS FOR TRAINING OF FULL-DUPLEX WIRELESS SYSTEMS - A method and apparatus for (a) operating a first full-duplex transceiver to exchange radio-frequency signals with a second full-duplex transceiver, (b) determining at the first full-duplex transceiver that a residual self-interference signal exceeds a threshold, (c) in response to the determination that the residual self-interference signal exceeds the threshold, performing a self-training operation. | 2020-08-20 |
20200266966 | SIGNALING METHOD TO ENABLE FULL DUPLEX IN NEXT GENERATION DOCSIS CABLE MODEM STANDARD - A head-end equipment associated with a communication system configured to interface with an interference group (IG) composed of two or more modems is disclosed. The head-end equipment comprises a memory configured to store a plurality of instructions; and one or more processors configured to retrieve the plurality of instructions from the memory. In some embodiments, the one or more processors, upon execution of the plurality of instructions from the memory, is configured to generate an advanced warning signal to be provided to one or more modems associated with the IG. In some embodiments, the advanced warning signal comprises an information that a select modem, different from the one or more modems, in the IG will be initiating an upstream communication in a select frequency band, as well as information on a start time and a duration of the upstream communication. | 2020-08-20 |
20200266967 | BI-DIRECTIONAL BUFFER WITH CIRCUIT PROTECTION TIME SYNCHRONIZATION - Examples described herein are used in timing synchronization systems. A timing synchronization system provides circuits that support bi-directional half-duplex voltage signals (transmit or receive) but protect against incorrect input/output configuration whereby a transmit signal media is connected to a receive port or a receive signal media is connected to a transmit port. The system provides configurable signal propagation by use of parallel connection of two or more buffer in series with a resistor. Various isolation circuitry and resistors can be used to protect against signal transmission during receive mode. | 2020-08-20 |
20200266968 | CLOCK DATA RECOVERY CIRCUIT - A clock data recovery circuit includes: a first detecting circuit for detecting phases of an incoming data signal and a sampling clock signal to generate a first detection signal; a loop filter for generating a control signal according to the first detection signal; a second detecting circuit for detecting phases of a reference signal and a feedback signal to generate a second detection signal; a control voltage generating circuit for generating a control voltage based on the second detection signal; a voltage-controlled oscillator for generating the sampling clock signal according to the control voltage; a phase adjustment circuit for adjusting the phase of the sampling clock signal according to the control signal to generate the phase-adjusted signal; and a frequency divider circuit for conducting a frequency division operation on the phase-adjusted signal to generate the feedback signal. | 2020-08-20 |
20200266969 | SECURING AUDIO COMMUNICATIONS - Systems and methods include establishing a cryptographically secure communication between an application module and an audio module. The application module is configured to execute on an information-handling machine, and the audio module is coupled to the information-handling machine. The establishment of the cryptographically secure communication may be at least partially facilitated by a mutually trusted module. | 2020-08-20 |
20200266970 | A COMPUTATION DEVICE AND METHOD - Some embodiments are directed to an electronic computation device ( | 2020-08-20 |
20200266971 | RE-ENCRYPTING DATA ON A HASH CHAIN - Techniques are disclosed for managing encrypted data stored in one or more blocks of a first data structure. One embodiment presented herein includes a computer-implemented method, which includes retrieving the encrypted data from the one or more blocks. The method further includes placing the encrypted data in a container object. The method further includes applying an encryption technique to the container object to generate an encrypted container object and a key. The method further includes generating a second data structure. A first block of the second data structure may include either the encrypted container object or information related to the encrypted container object. | 2020-08-20 |
20200266972 | COMPUTING RANGE QUERIES OVER ENCRYPTED DATA - A method (and structure and computer product) to encrypt plaintext data into ciphertext data includes encrypting, using a processor on a computer, plaintext into corresponding ciphertext, using a Property Preserving Encryption (PPE) protocol in which a predefined property is maintained when plaintext values are encrypted into ciphertext values. The predefined property is randomly flipped during encryption to reverse the predefined property in the corresponding ciphertext node. An indication of whether the predefined property has been maintained or reversed is stored as the state of encryption. | 2020-08-20 |
20200266973 | A COMPUTATION DEVICE AND METHOD - A computation device ( | 2020-08-20 |
20200266974 | APPARATUS FOR PERFORMING THRESHOLD DESIGN ON SECRET KEY AND METHOD THEREOF - An encryption method is disclosed. The encryption method includes calculating a secret key from a ring as a set closed for addition and multiplication defined between elements, generating a plurality of partial secret keys using the calculated secret key and a random matrix, and distributing the plurality of generated partial secret keys. | 2020-08-20 |
20200266975 | WEARABLE DEVICE WITH INTEGRATED RFID OR NFC CHIPSET - A wearable device with integrated RFID or NFC chipset, includes: a microchip for management and encryption of radio-frequency communications in RFID or NFC standards; at least one antenna, including metal coils to transmit/receive signals in RFID or NFC standards and/or metal coils to generate the electric current required for operation; a memory chip for storing data and encryption keys, manageable by the microchip; a wearable object, integrating the components of the device; a reversible closing buckle for the wearable object, associated with the opposite ends of the coils of the antenna. The buckle can determine in the coils a point of discontinuity, capable of reversibly inhibiting the respective transmission/reception functions of signals in RFID or NFC standards and of generating electric current via electromagnetic induction, thereby preventing unauthorized transmission by the microchip of the data and of the encryption keys of the same, contained in the memory chip. | 2020-08-20 |
20200266976 | FEDERATED KEY MANAGEMENT - A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system. | 2020-08-20 |
20200266977 | LONG-HAUL HIGH RATE QUANTUM KEY DISTRIBUTION - Multiple bit values can be encoded on a single photon in a quantum key distribution (QKD) system using a plurality of sidebands of an optical carrier frequency. Computational and conjugate bases can be defined, and photons decoded based on a selected state from either basis. If n sidebands are available, as many as log | 2020-08-20 |
20200266978 | Key Generation Device and Method - A key generation method includes modulating a first key to a first light source signal, to obtain a modulated optical signal, splitting the modulated optical signal, to obtain a first sub modulated optical signal and a second sub modulated optical signal, attenuating the first sub modulated optical signal such that a quantity of photons included in each period of the first sub modulated optical signal is less than a preset value, and sending an attenuated first sub modulated optical signal to a receive-end device, and obtaining a second key carried in the second sub modulated optical signal, and storing the second key. | 2020-08-20 |
20200266979 | INFORMATION RECORDING DEVICE AND HOST DEVICE - According to one embodiment, an information recording device includes a memory and a controller. The memory includes a secret recording section. The secret recording section includes a first area and a second area. The controller is configured to control the memory. The controller is configured to permit access to the first area in a case where a first authentication process related to the secret recording section is performed and configured to permit access to the second area in a case where a second authentication process related to the secret recording section is performed. | 2020-08-20 |
20200266980 | QUANTUM RANDOM NUMBER GENERATOR LOCK - A lock system having a true random number generator (TRNG) configured to generate true random numbers that are based on physical phenomena, including one designated as a public key. A computer with a memory receives and stores a copy of the public key. The computer also receives a copy of a public key from a user device. A lock assembly is in electrical communication with the computer and is configured to switch from a locked mode to an unlocked mode in response to receiving an unlock command from the computer. The computer is configured to compare the stored copy of the public key generated by the TRNG to the copy of the public key received from the user device and to determine if they match. If the two public keys match, the computer sends the unlock command to the lock assembly. | 2020-08-20 |
20200266981 | DISTRIBUTED RANDOMNESS GENERATION VIA MULTI-PARTY COMPUTATION - Described is a system for jointly generating a random value amongst a set of servers for secure data sharing. The set of servers initiates a randomness generation protocol where each server in the set of servers selects a randomly generated polynomial and broadcasts a cryptographic hash function of the randomly generated polynomial. Each server sends its value of the cryptographic hash function of the randomly generated polynomial to the set of servers. The randomness generation protocol is used in a multi-party computation protocol to ensure a set of data is securely shared electronically amongst the set of servers via a secure, authenticated broadcast channel. | 2020-08-20 |
20200266982 | VIRTUAL MEMORY EXTENSION LAYER FOR HARDWARE SECURITY MODULES - A key management system includes a hardware security module (HSM) with a secure memory; an HSM driver implementing an API, interfaced with the HSM to provide handles to cryptographic objects stored on the secure memory of the HSM; and a shim layer interfaced with the HSM driver. The layer is generally configured to enable a client application to interact with the HSM via the driver, i.e., for the HSM to manage cryptographic objects for the client, notwithstanding the layer. External memory storage resides outside the HSM and is interfaced with the layer. The method includes instructing (at the layer) to: (i) encrypt cryptographic objects from the HSM (with the help of the driver) and store the resulting encrypted objects at respective memory locations on the storage, to free up memory space; and (ii) store handles to such cryptographic objects along with references to said respective memory locations, on the storage. | 2020-08-20 |
20200266983 | ENTITLEMENT MANAGEMENT MESSAGE EPOCH AS AN EXTERNAL TRUSTED TIME SOURCE - An external trusted time source is implemented over a network for conditional access system (CAS)/digital rights management (DRM) client devices. A client device includes untrusted software and a trusted execution environment (TEE) for processing an entitlement management message (EMM) that includes an epoch sequence number (ESN) transmitted from an EMM server using a first network connection. A remaining client key set (CKS) lifetime value is stored and updated in the TEE based on the ESN processed. | 2020-08-20 |
20200266984 | METHODS AND SYSTEMS FOR PREPARING AND PERFORMING AN OBJECT AUTHENTICATION - The present invention relates to the field of tracing and anti-counterfeit protection of physical objects, and particularly to preparing and performing a secure authentication of such objects. Specifically, the invention is directed to a method and a system for preparing a subsequent secured authentication of a physical object or group of physical objects by a recipient thereof, to a method and system for authenticating a physical object or group of physical objects, to a method and system of securely providing a time-variant combination scheme for authenticating a physical object or group of physical objects according to the above methods, and to related computer programs corresponding to said methods. The invention is based on the concept of increasing the security level by increasing the information entropy of the data on which the anti-counterfeit protection is based by means of random data communicated to authenticating entities in an algorithmically hidden way. | 2020-08-20 |
20200266985 | SYSTEM FOR SECURING VERIFICATION KEY FROM ALTERATION AND VERIFYING VALIDITY OF A PROOF OF CORRECTNESS - The invention relates to distributed ledger technologies such as consensus-based blockchains. A blockchain transaction may include digital resources that are encumbered by a locking script that encodes a set of conditions that must be fulfilled before the encumbered resources may be used (e.g., transferring ownership/control of encumbered resources). A worker (e.g., a computer system) performs one or more computations to generate a proof, which is encoded as part of an unlocking script. A verification algorithm may utilize the proof, a verification key, and additional data such as a cryptographic material associated with the worker (e.g., a digital signature) to verify that digital assets of the transaction should be transferred. As a result of the validation of this transaction, any third party is able to check the contract was executed corrected rather than re-executing the contract, thus saving computational power. | 2020-08-20 |
20200266986 | SYSTEMS AND METHODS FOR OPERATING SECURE ELLIPTIC CURVE CRYPTOSYSTEMS - Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as simple power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem. | 2020-08-20 |
20200266987 | SYSTEMS AND METHODS FOR MINTING A PHYSICAL DEVICE BASED ON HARDWARE UNIQUE KEY GENERATION - Minting a physical computing device based on unique key generation, wherein the key generation is configured to create a private-public key pair. In implementations, the key pair may be generated upon initialization of the physical computing device, such that the physical computing device is minted with the key pair. The key pair may be utilized as a token for supply-chain billings, payments, auditing, etc. associated with the physical computing device. | 2020-08-20 |
20200266988 | HIDDEN SUBJECT IDENTIFICATION SYSTEM - A method determines whether another party has information about a person without disclosing personal identification information of the person. The method includes receiving, at a third computer system, a first set of data comprising personal identification information of a first person and encrypting the first set of data to generate a third set of data. The method also includes transmitting, to a second computer system, the third set of data. The method further includes receiving, at the third computer system from the second computer system, a message indicating the third set of data matches a fourth set of data encrypted from a second set of data comprising personal identification information of a second person. The method still further includes transmitting, from the third computer system, a message indicating the second person matches the first person when the fourth and third set of data matches. | 2020-08-20 |
20200266989 | AN AD-HOC NETWORK - Ad-hoc network comprising a configurator device and a plurality of nodes, wherein each node is an electronic device, wherein each node is connected by a communication connection with at least one of the other nodes and/or with the configurator device, wherein each node can be in different states comprising at least a non-commissioned state (NC), a commissioned state and a trust ring member state (TR) wherein a first node of the plurality of nodes being in the non-commissioned state (NC) is configured to send an non-commissioned advertisement message to the configurator device comprising an identifier of the first node, wherein the configurator device is configured to send an automated commissioning initialization (ACI) message to the first node containing a token, wherein the token is encrypted by a symmetric network key, wherein the first node is configured to send out a commissioning request message containing the received encrypted token, wherein the first node is configured to change its state, when it receives an authorisation message from another node or from the configurator device. | 2020-08-20 |
20200266990 | COMMUNICATING WITH A VEHICLE TRACKING DEVICE VIA SHORT MESSAGE SERVICE (SMS) SECURED BY SINGLE-USE CREDENTIALS - A system addresses a security vulnerability in sending commands to a vehicle tracking device via SMS test messaging. The system provides a single-use credential value for authenticating the SMS communication link before it can be used to command the vehicle tracking device. The single-use credential value, also referred to herein as a One-Time Personal Identification Number (OTPIN), is preferably time-based so that it can be used only once. | 2020-08-20 |
20200266991 | CRYPTOGRAPHY METHOD AND SYSTEM FOR SECURING DATA VIA ELECTRONIC TRANSMISSION - A blockchain-based record of transactions taking place through a smartphone or other electronic/peripheral device. The blockchain record itself contains mathematical hashes, including encryption if desired, based on the various data components of a smartphone or other device, which creates a distributed ledger system that is extremely difficult to break into to add, delete, or alter individual transactions after the fact. | 2020-08-20 |
20200266992 | ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - An electronic device is provided. The electronic device includes a communication interface including circuitry, a memory, and a processor which, based on receiving ID information generated by performing a first encryption process on biometric information and password information generated by performing a second encryption process on the biometric information from an external electronic device through the communication interface, is configured to control the electronic device to: store the ID information and the password information in the memory. The processor, based on receiving first ID information and first password information from the external electronic device, is configured to control the electronic device to: acquire at least one candidate ID information from the memory based on the first ID information, compare password information corresponding to each of the acquired at least one candidate ID information with the first password information to identify one of the candidate ID information, and perform user authentication based on the identified candidate ID information and corresponding password information. | 2020-08-20 |
20200266993 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS - Example embodiments of systems and methods for data transmission between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device. The receiving device can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. | 2020-08-20 |
20200266994 | SYSTEM AND METHOD FOR IMPLEMENTING BLOCKCHAIN TRANSACTIONS USING A CONSUMER APPLIANCE - Consumer appliances and methods for their use are generally provided herein. A method may include obtaining a purchase authorization from a user of the consumer appliance authorizing the purchase of a software application, generating a discrete block of a blockchain in response to obtaining the purchase authorization, and transmitting the discrete block to a blockchain network wirelessly connected to the consumer appliance. The method may further include downloading and implementing the software application using the appliance controller and graphical user interface. | 2020-08-20 |
20200266995 | MANAGING STATE IN ACCELERATORS - Methods and apparatus for managing state in accelerators. An accelerator performs processing operations on a data chunk relating to a job submitted to the accelerator. During or following processing the data chunk, the accelerator generates state information corresponding to its current state and stores the state information or, optionally, the accelerator state information is obtained and stored by privileged software. In connection with continued processing of the current data chunk or a next job and next data chunk, the accelerator accesses previously stored state information identified by the job and validates the state information was generated by itself, another accelerator, or privileged software. Valid state information is then reloaded to restore the state of the accelerator/process state, and processing continues. The chunk processing, accelerator state store, validation, and restore operations are repeated to process subsequent jobs. An accelerator and/or privileged software may use a MAC (Message Authentication Code) algorithm to generate a MAC over a message comprising the accelerator state information. The MAC is then used to validate previously stored state information. | 2020-08-20 |
20200266996 | SYSTEMS FOR PRODUCING AND MAINTAINING VERIFIED ELECTRONIC SIGNATURES - Physically supplied user information is used to first verify the identity of a user before an app is supplied to a user device. Hardware identifiers of the user device are reviewed to determine whether to allow or deny use of the app on the user device. Once the app is approved, a user request is received by the app which is forwarded to the provider. The provider approves or disapproves of the request based, in part, on whether data in the request matches data maintained by the provider. Such approval/disapproval is provided from the provider to a party responsible for satisfying the user request. In addition, the provider generates a one-time-use electronic signature using data from a sequencer and data from the request, and the one-time-use electronic signature can be supplied to a signature repository and/or added to legal documents. | 2020-08-20 |
20200266997 | CRYPTOASSET CUSTODIAL SYSTEM WITH DIFFERENT CRYPTOGRAPHIC KEYS CONTROLLING ACCESS TO SEPARATE GROUPS OF PRIVATE KEYS - Methods, systems, and apparatus, including medium-encoded computer program products, for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include, in at least one aspect, a method including: identifying for an action an associated private-keys group out of different private-keys groups, each having an associated cryptographic group key; decrypting, at a first computer, a first level of encryption of a private key associated with the action using the associated cryptographic group key; decrypting, at a second computer distinct from the first computer, a second level of encryption of the private key associated with the action using a hardware-based cryptographic key used by the second computer; using, at the second computer, the private key associated with the action in a process of digitally signing data to authorize the action; and sending the digitally signed data to a third computer to effect the action. | 2020-08-20 |
20200266998 | Data Storage Devices and Methods for Encrypting a Firmware File Thereof - A data storage device including a non-volatile memory and a micro-controller is provided. The non-volatile memory stores a firmware file. The micro-controller is coupled to the non-volatile memory, and performs an encryption procedure on the firmware file. The encryption procedure includes: using a first key and a first algorithm to encrypt the firmware file to generate a signature, using the first key and a second algorithm to scramble the signature to generate a scrambled signature, and attaching the scrambled signature to the firmware file. | 2020-08-20 |
20200266999 | COMPUTE DIGITAL SIGNATURE AUTHENTICATION SIGN WITH ENCRYPTED KEY INSTRUCTION - A single architected instruction to produce a signature for a message is executed. The executing includes determining an encrypted sign function of a plurality of encrypted sign functions supported by the instruction to be performed and obtaining input for the instruction. The input includes a message and an encrypted cryptographic key. Based on the encrypted sign function to be performed and the input, a signature to be used to verify the message is produced. | 2020-08-20 |
20200267000 | COMPUTE DIGITAL SIGNATURE AUTHENTICATION VERIFY INSTRUCTION - A single architected instruction to verify a signed message is executed. The executing includes determining a verify function of a plurality of verify functions supported by the instruction to be performed and obtaining input for the instruction. The input includes a message and a key. Based on the verify function to be performed and the input, a signature of the message is verified. | 2020-08-20 |
20200267001 | COMPUTE DIGITAL SIGNATURE AUTHENTICATION SIGN INSTRUCTION - A single architected instruction to produce a signature for a message is obtained. The instruction is executed, and the executing includes determining a sign function of a plurality of sign functions supported by the instruction to be performed. Input for the instruction is obtained, and the input includes a message and a cryptographic key. A signature is produced based on the sign function to be performed and the input. The signature is to be used to verify the message. | 2020-08-20 |
20200267002 | BLINDED ENDORSEMENT FOR BLOCKCHAIN - An example operation may include one or more of receiving, at an endorser node, a request message from a client system which comprises data to be stored on a blockchain, determining whether to endorse the data via invocation of chaincode which receives the data as input and executes the data against a current state of the blockchain, in response to a determination to endorse the data, generating a response message including a result of the execution and signing the response message based on a traceable blinded ring signature associated with the endorser node, and transmitting the generated response message that has been signed with the traceable blinded key ring to the client system. | 2020-08-20 |
20200267003 | ELECTRONIC IDENTIFICATION VERIFICATION METHODS AND SYSTEMS WITH STORAGE OF CERTIFICATION RECORDS TO A SIDE CHAIN - Method of certification including receiving user data at a device of a certifying entity. The method includes generating a salt that is unique. The method includes hashing the data combined with the salt to create a generated hashed data. The method includes generating a certification record based on signing the generated hashed data using a private key of the certifying entity to create a signed certification of the data. The method includes hashing the certification record. The method includes transmitting the hashed certification record to a blockchain for storing. The method includes receiving a certification tx-ID of the hashed certification record. The method includes generating a certification data block including the certification record and the certification tx-ID. The method includes storing the certification data block to a side chain. | 2020-08-20 |
20200267004 | On-Demand Emergency Management Operations in a Distributed Computing System - Various methods and systems are provided for providing on-demand emergency management. On-demand emergency management includes emergency management operations (e.g., certificate update operations or managed-secrets rollover operations) for accelerated deployment and expedited installation of certificates or secrets. In operation, a host secret manager on a host machine communicates with client secret managers on virtual machines running the host machine, to provide expedited installation of secrets on the virtual machines. During the certificate update operations, the host secret manager communicates the certificate update secret package having a new secret state to a client secret manager that installs the new certificate state on the virtual machine. And, during managed-secrets rollover operations, based on accessing a managed-secrets rollover secret package having a notification-based new secret state, the host secret manager polls a dSMS service, and communicates with a client secret manager, such that client secret manager installs the new secret on the virtual machine. | 2020-08-20 |
20200267005 | CERTIFICATE GENERATION WITH FALLBACK CERTIFICATES - A system and method for of providing secure communication between a client device having a non-volatile read only memory and a first server is disclosed. One embodiment is evidenced by a method that comprises determining if a generation of a certificate is complete, the certificate generated in the client device and having a public key generated from a private key, providing the generated certificate to the first server to authenticate the client device if the generation of the certificate is complete, and retrieving a fallback certificate from the non-volatile read only memory and providing the fallback certificate to the first server to ephemerally authenticate the client device until the generated certificate is provided to the first server if the generation of the certificate is not complete. | 2020-08-20 |
20200267006 | SYSTEM FOR ASSIGNING ACCESS RIGHTS TO USER DEVICE AND METHOD THEREOF - A system for assigning access rights to a user device. The system includes a source configured to serve the executable code to the user device and a target device. The target device is configured to perform at least one of creating a target device crypto-identity, which is an asymmetric cryptographic keypair consisting of a public key and a corresponding private key; and assigning itself a target device crypto-identity. Upon receiving a connection from the user device having an executable code for connecting and authenticating with a cryptographic algorithm, the target device is configured to receive a user device contact information in an executing environment of the target device and determine whether admin rights have been set in the target device. The system also includes the user device configured to use a resource identifier for obtaining the executable code from the source and executing the executable code in the user device. | 2020-08-20 |
20200267007 | EFFICIENT AND DYNAMIC SUPPORT OF MOBILE LOW LATENCY SERVICES - A method and apparatus for efficient and dynamic support of mobile low latency services including maintaining, by a control plane entity of an inter mobile device information exchange service hosting management functionality for said service, information on a plurality of participants of said service in a service area. A forwarding rule indicative of forwarding messages related to said service from a sender participant of said plurality of participants to a receiver participant of said plurality of participants is generated based on said information on said plurality of participants of said service in said service area. The forwarding rule is transmitted to a user plane entity of said service, and said user plane entity is located in a connection path between said control plane entity and said first participant of said service and in a connection path between said control plane entity and said second participant of said service. | 2020-08-20 |
20200267008 | API CONTENT BASED CHARGING METHOD AND CAPABILITY EXPOSURE FUNCTION ENTITY - A method includes: receiving, by a capability exposure function entity, an API calling request, where the API calling request includes an API identifier; determining, based on a correspondence between the API identifier and a content charging parameter, the content charging parameter corresponding to the API identifier; recording charging data based on the content charging parameter; and sending the charging data to a charging system. The corresponding capability exposure function entity is further disclosed. According to the solutions in this application, when receiving the API calling request, the capability exposure function entity may obtain the corresponding content charging parameter based on the API identifier, and record the charging data based on the content charging parameter. | 2020-08-20 |
20200267009 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a memory, a generation unit, and a transmission unit. The memory stores cumulative traffic in a specified period in data communication with a management apparatus. The generation unit generates data to be notified to the management apparatus. The, transmission unit transmits the data generated by the generation unit to the management apparatus via a different apparatus if a sum of traffic for transmitting the data to the management apparatus and the cumulative traffic stored in the memory exceeds a predetermined upper limit. | 2020-08-20 |
20200267010 | CONFERENCE MANAGER (CM) FOR LOW BANDWIDTH VIDEO CONFERENCING - Video conferencing involves transmission of video as well as audio over a network between people involved in the video conferencing, over a network. Typically, quality of conference sessions are affected by quality of network connection. If the bandwidth of the network is low, that that may cause call quality issues or call drops, which is not desirable especially in certain applications such as a surgery over video conferencing. Disclosed herein is a Conference Manager (CM) that can facilitate video conferencing over a low bandwidth network. The CM uses a producer unit and a consumer unit, for video capture and transmission, and a communication device for audio capture and transmission. The CM captures and combines audio and video data at a receiving end of the communication network. The CM also uses a fast block-wise data transfer mechanism for facilitating communication between the transmitting end and the receiving end. | 2020-08-20 |
20200267011 | MULTICAST CROSS-DOMAIN METHOD, DEVICE AND SYSTEM AND COMPUTER READABLE STORAGE MEDIUM - Provided are a multicast cross-domain method, device and system, and a computer readable storage medium. The method includes: dividing nodes in each domain of a multi-domain network into a multicast proxy nodes and a common nodes; sending, by the common nodes, a subscription request to a multicast source node outside the each domain through the multicast proxy nodes in the each domain; sending, by the multicast source node, a bit indexed explicit replication (BIER) multicast message obtained through BIER encapsulation to the multicast proxy nodes; and sending, by the multicast proxy nodes, the BIER multicast message to the common nodes. | 2020-08-20 |
20200267012 | WIRELESS BROADBAND METER COLLAR - A broadband access system, comprising a broadband access hub device (hub device) and broadband access premise devices (premise devices) wirelessly coupled the hub device to provide broadband services to multiple user equipment (UEs), is described. The hub device may access broadband services on a fiber optic broadband network and wirelessly provide access to the broadband services to the premise devices. The premise device may wirelessly communicate with the hub device and communicate with user equipment (UEs) for providing access to the broadband services through the hub device. The premise device may be attached to an electric utility meter, and a power interface module of the premise device may supply electrical power to the premise device from the electric utility meter. | 2020-08-20 |
20200267013 | MULTI-ROLE DEVICES FOR AUTOMATION ENVIRONMENTS - In accordance with one aspect of the invention, an automation control device, such as a host or hub, is provided with enhanced functionality so that it becomes a multi-role automation control device. The multi-role automation control device is capable of controlling an expanded variety of “smart” or other devices whose native control protocol is not generally compatible. The multi-role automation control device may be implemented using a variety of underlying devices including a host, hub, soundbar, “smart” thermostat, “smart” amplifier, audio speaker, or other device. | 2020-08-20 |
20200267014 | System, Device, and Method of Multi-Path Wireless Communication - System, device, and method of multi-path wireless communication. A method includes: constructing in an electronic device of a user, a control message indicating a user command intended to be performed by a Home Automation Device (HAD) of the user; wherein the constructing includes inserting into the control message a unique Message-Identifier. The method then transmits the control message, from the electronic device of the user to the HAD, concurrently via at least two different wireless communications channels which include at least: (i) a first wireless communication channel that includes passage of traffic through the Internet, and (ii) a second wireless communication channel in which no traffic passes through the Internet. | 2020-08-20 |
20200267015 | Systems and Methods for Differential Pressure Determination and Control - Systems and Methods for Differential Pressure Determination and Control are disclosed. In one aspect, embodiments of the present disclosure include a system, which able to obtain pressure measurements. The system can include, a sensor and a processor coupled to the sensor. A further embodiment includes memory coupled to the processor where the memory has stored thereon instructions, which when executed by the processor, cause the processor to: determine, a local set of pressure measurements from the sensor and/or compare the local set of pressure measurements with an external set of pressure measurements. | 2020-08-20 |
20200267016 | MANAGEMENT TERMINAL, ELECTRONIC DEVICE, AND MANAGEMENT METHOD OF ELECTRONIC DEVICE - A management terminal may include an ID inputter configured to receive an ID of an electronic device from a user; a memory configured to store management information for a plurality of the electronic devices in association with a plurality of the IDs for identifying the plurality of electronic devices, when the management information for the plurality of electronic devices is input; a communication interface connected to at least one of the plurality of electronic devices by wire or wirelessly; and a controller configured to control the communication interface to transmit the management information stored in the memory to the electronic device connected to the communication interface. | 2020-08-20 |
20200267017 | Internet of Things Multiplexer - A method and system for providing configuration information to an Internet of Things (IoT) device. The method is performed at an IoT device and includes identifying a predetermined condition. The method further includes transmitting, via a network, a first signal to a first server based on identifying the predetermined condition and receiving ownership information from the first server. The ownership information includes contact information for a second server that is configured to provide configuration information to the IoT device. The method further includes transmitting a second signal to the second server and receiving configuration information from the second server. The method further includes performing an operation based on the configuration information. | 2020-08-20 |
20200267018 | LOW-POWER WAKE-UP CIRCUIT FOR CONTROLLER AREA NETWORK (CAN) TRANSCEIVER - A system includes a controller area network (CAN) transceiver. The CAN transceiver includes a wake-up circuit having an attenuator circuit coupled to a CAN bus. The wake-up circuit also includes a common-gate amplifier circuit coupled to the attenuator circuit. The wake-up circuit also includes an offset generation circuit coupled to the common-gate amplifier circuit. | 2020-08-20 |
20200267019 | GROUP-COHERENT MEMORY - Operating a data distribution including a data distribution module and a plurality of host-bus adapters coupled to the data distribution module can include defining a coherent group that includes a set of members that includes the plurality of host-bus adapters; providing a group-coherent memory area in each of the set of members; and initiating a one-to-all broadcast message from a one of the plurality of host-bus adapters to all of the set of members when the one of the plurality of host-bus adapters requests a write to its local group-coherent memory area. The group-coherent memory area in each of the set of members is physically mirrored with a temporal coherence and no semaphores or access enables are required to achieve the temporal coherence of the coherent group. | 2020-08-20 |
20200267020 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR TRANSACTION MANAGEMENT SPANNING MULTIPLE HETEROGENEOUS COMPUTING NETWORKS - A method and apparatus for providing communications between dissimilar computing networks, such as distributed ledger networks. A ledger-agnostic overlay network and computing architecture spans a range of digital communication networks including transaction only DLT networks like Bitcoin's DLT, smart contract based DLT like Ethereum, and also traditional centralized systems. Implementations communicate transaction information across heterogeneous jurisdictional boundaries, payment networks, banking systems, public and private distributed ledgers, internal corporate accounting systems, and exchanges. | 2020-08-20 |
20200267021 | METHOD, APPARATUS, AND SYSTEM FOR SELECTING NETWORK DEVICE - An apparatus includes a program instructing hardware and a computer readable storage medium coupled to the hardware and storing programming instructions for execution by the hardware. The programming instructions instruct the hardware to: receive a network device selection message sent by a first network device, where the network device selection message contains a virtual local area network (VLAN) mapping capability identifier of the first network device and a device identifier of the first network device; when determining that both the apparatus and the first network device have VLAN mapping capability according to local VLAN mapping capability and the VLAN mapping capability identifier of the first network device, select a network device for executing VLAN mapping according to sizes or a sequence of a local device identifier and the device identifier of the first network device. | 2020-08-20 |
20200267022 | VXLAN Configuration Method, Device, and System - In a VXLAN configuration method, a first network device obtains configuration information, generates first GRASP information based on the configuration information, and sends the first GRASP information to a second network device, where the configuration information includes VTEP device information, a plurality of pieces of VTEP device information are respectively used to indicate a plurality of VTEPs included in a VXLAN, the first GRASP information includes objective information, and the objective information is used to carry the configuration information. The second network device receives the first GRASP information and establishes a VXLAN tunnel based on the first GRASP information. In this way, automatic VXLAN configuration is implemented. | 2020-08-20 |
20200267023 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, COMMUNICATION PROGRAM AND DEVICE CONNECTION CONTROL PROGRAM - A control means | 2020-08-20 |
20200267024 | Methods and Apparatuses for Signaling and Determining Reference Signal Offsets - Methods and apparatuses disclosed herein enable the use of Demodulation Reference Signal, DMRS, sequences that are numbered relative to an overall system bandwidth, while simultaneously enabling wireless communication devices to determine the DRMS sequence elements mapped to their scheduled bandwidths within the system bandwidth. Advantageously, the wireless communication devices need not know the system bandwidth, or even be aware of where their scheduled bandwidths reside within the system bandwidth. | 2020-08-20 |
20200267025 | METHOD AND APPARATUS FOR SOUNDING REFERENCE SIGNAL TRANSMISSION ON SIDELINK - Methods and apparatus for SL SRS transmission are disclosed. One method of a relay/remote UE comprises transmitting a SRS on a SL. The SRS is based on a SL SRS configuration which configures location information of the SRS in time-frequency domain. The transmission of SRS can be either periodic or aperiodic. Further, the SRS is a single SRS or a set of SRS. | 2020-08-20 |
20200267026 | POSITIONING BASED ON SOUNDING REFERENCE SIGNAL (SRS) CARRIER SWITCHING FRAMEWORK - In some aspects, a method of wireless communication by a user equipment (UE) includes receiving, by the UE on a component carrier (CC), a downlink (DL) control information (DCI) that triggers transmission, by the UE on another CC, of an uplink (UL) reference signal (RS) for positioning. The method additionally includes transmitting, by the UE in response to the DCI, the UL RS for positioning on the other CC. In other aspects, a method of wireless communication by a base station includes transmitting, by the base station to a UE on a CC, a DCI that triggers transmission, by the UE on another CC, of an UL RS for positioning. The method additionally includes receiving, by the base station from the UE in response to the DCI, the UL RS for positioning on the other CC. | 2020-08-20 |
20200267027 | PROPAGATION CHANNEL ESTIMATION METHOD - A propagation channel estimation method is provided. In-phase and quadrature components of a propagation channel estimation value in each pilot subcarrier are separated into amplitude and phase components. A propagation channel of a data subcarrier portion existing between pilot subcarriers is estimated by phase/amplitude separation linear interpolating in each separated amplitude and phase component. A reference parameter is produced by linear interpolating a portion between pilot subcarriers on a complex plane. When quadrants on the complex plane of the interpolated phase component estimation value and the reference parameter are different, a phase connecting process to cancel a discontinuity of the phases is executed to the phase component estimation value interpolated by the phase/amplitude separation linear interpolation. When the quadrants are not different or after the phase connecting process, a complex propagation channel estimation value of the data subcarrier portion is calculated from the phase and amplitude components of the propagation channel estimation value. | 2020-08-20 |
20200267028 | LINE DRIVER CIRCUIT - A line driver circuit includes a first input terminal, a second input terminal, a first input stage, a second input stage, a first output stage, and a second output stage. The first input stage includes a first input coupled to the first input terminal, and a second input coupled to the second input terminal. The second input stage includes a first input coupled to the first input terminal, and a second input coupled to the second input terminal. The first output stage includes a first input coupled to a first output terminal of the first input stage and a second input coupled to a first output terminal of the first input stage. A second output stage includes a first input coupled to a second output terminal of the first input stage and a second input coupled to a second output terminal of the first input stage. | 2020-08-20 |
20200267029 | ADAPTIVE EQUALIZER SYSTEM - One example includes an equalizer system. The system includes a filter system configured to receive digital sample blocks associated with an input signal and to provide equalized digital sample blocks associated with the respective digital sample blocks based on adaptive tap weights. Each of the digital sample blocks includes samples and each of the equalized digital sample blocks includes equalized samples. The system also includes a sample set selector to select a subset of equalized samples from each of the equalized digital sample blocks at the output of the filter and an error estimator configured to implement an error estimation algorithm on the subset of the equalized samples to determine a residual error associated with the equalized samples. The system further includes a tap weight generator configured to generate the adaptive tap weights in response to the residual error and to provide the adaptive tap weights to the filter. | 2020-08-20 |
20200267030 | ADAPTIVE EQUALIZATION CIRCUIT AND OPTICAL RECEIVER - An adaptive equalization circuit includes: a first filter configure to perform filtering on an input signal based on a tap coefficient; an applying circuit configured to apply, to the signal, noise outside a band of the signal; and a controller configured to set, for the first filter, the tap coefficient that compensates for transmission line characteristics of the signal, based on the signal to which the noise is applied by the applying circuit. | 2020-08-20 |
20200267031 | SYSTEM AND METHODS FOR MULTI-LEVEL SIGNAL TRANSMISSION - An optical network includes a transmitter portion configured to (i) precode an input digitized stream of symbols into a precoded symbol stream, (ii) pulse shape the precoded symbol stream with an eigenvalue channel matrix, and (iii) transmit the pulse shaped symbol stream over a digital optical link. The optical network further includes a receiver portion configured to (i) recover the pulse shaped symbol stream from the digital optical link, (ii) decompose eigenvalues of the eigenvalue channel matrix from the recovered symbol stream, and (iii) decode the decomposed symbol stream into an output symbol stream. | 2020-08-20 |
20200267032 | MULTI-LEVEL SIGNALING IN MEMORY WITH WIDE SYSTEM INTERFACE - Techniques are provided herein to increase a rate of data transfer across a large number of channels in a memory device using multi-level signaling. Such multi-level signaling may be configured to increase a data transfer rate without increasing the frequency of data transfer and/or a transmit power of the communicated data. An example of multi-level signaling scheme may be pulse amplitude modulation (PAM). Each unique symbol of the multi-level signal may be configured to represent a plurality of bits of data. | 2020-08-20 |
20200267033 | FEEDBACK MESSAGE HAVING A SEQUENCE INDICATING FEEDBACK INFORMATION CORRESPONDING TO DATA BLOCKS - Apparatuses, methods, and systems are disclosed for transmitting and/or receiving feedback. One apparatus ( | 2020-08-20 |
20200267034 | RECEIVE DEVICE, RECORDING MEDIUM FOR DETECTING SIGNAL - A receive device includes: a quadrature detector; and a first signal detector that detects whether a signal subjected to detection in the quadrature detector is a received signal. The first signal detector assigns the signal subjected to quadrature detection in the quadrature detector to an orthogonal plane divided into a plurality of quadrants and derives an amount of movement of the signal assigned between quadrants, integrates absolute values of derived amounts of movement over a predetermined period of time, and determines whether the signal subjected to quadrature detection is a received signal by comparing an integrated value derived from integration with a threshold value. | 2020-08-20 |
20200267035 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING TIME DIVISION DUPLEX FRAME CONFIGURATION INFORMATION IN WIRELESS COMMUNICATION SYSTEM - A method and an apparatus for transmitting and receiving Time Division Duplex (TDD) frame configuration information are disclosed. The base station transmits TDD frame configuration information as system information to a user equipment through a common control channel so as to dynamically change the TDD frame configuration according to uplink and downlink traffic conditions. The base station may deliver the same system information to all user equipments in the cell, removing ambiguity in User Equipment (UE) operations and avoiding interference. In comparison to an existing method of delivering TDD frame configuration information through system information update, the disclosed method enables user equipments to rapidly cope with traffic changes. In addition, user equipments may receive and apply TDD frame configuration information at the same time. | 2020-08-20 |
20200267036 | Method for Spreading Data Symbol Frequency Domain Information in Power Line Carrier Communication - Disclosed is a method for spreading data symbol frequency domain information in power line carrier communication, wherein when generating a data symbol in power line carrier communication, multiple times of frequency domain information diversity copy is used in place of the conventional ROBO copy, such that the diversity copy is independent of channel time-varying property, but only dependent on channel characteristics; as such, diversity copy is implemented within the same symbol, which facilitates simplifying the processing circuit of frequency domain and meanwhile enhances communication reliability. | 2020-08-20 |
20200267037 | APPARATUSES FOR NEXT GENERATION BLOCK-WISE SINGLE CARRIER WAVEFORMS - Disclosed are apparatuses for a communication device. An apparatus for a communication device includes control circuitry configured to use circular convolution for pulse shape filtering of a block of data symbols of a single carrier waveform to generate a block-wise single carrier (BWSC) symbol. The apparatus is also configured to insert one of a data-based cyclic prefix or a data-based cyclic postfix into the BWSC symbol one of before the pulse shape filtering or after the pulse shape filtering. An apparatus for a communication device includes control circuitry configured to remove one or more of a cyclic prefix or a cyclic postfix from a received BWSC symbol, and use circular convolution to demodulate the received BWSC symbol. | 2020-08-20 |
20200267038 | METHOD AND DEVICE IN UE AND BASE STATION USED FOR WIRELESS COMMUNICATION - The present disclosure provides a method and a device in a UE and a base station used for wireless communications. The UE first receives a first signaling, and then transmits a first radio signal; the first signaling is used for determining K REs, and K first-type complex numbers are used for generating the first radio signal, K first-type parameters respectively correspond to the K first-type complex numbers. The K first-type parameters are related to a frequency-domain position of the K REs, each of the K first-type parameters is related to a length of cyclic prefix of an RE onto which a corresponding first-type complex number is mapped; the first radio signal carries a first bit block, the K first-type parameters and the first bit block are used for generating the K first-type complex numbers. The present disclosure improves uplink coverage performance. | 2020-08-20 |
20200267039 | Communication Device and Method for Radio Frequency Communication - A communication device is provided that includes a receiver configured to receive a radio frequency signal. The communication device further includes a processor configured to determine a shift frequency based on a component radio frequency signal. The processor is configured to determine a second signal based on the radio frequency signal. The component radio frequency signal is based on the radio frequency signal and associated with a frequency related to the radio frequency signal represented in the frequency domain. The second signal is determined based on shifting frequencies related to the radio frequency signal represented in the frequency domain by the shift frequency. | 2020-08-20 |
20200267040 | PAPR REDUCTION FOR OFDM SIGNALS - In embodiments of the presently described subject matter, two efficient PAPR reduction methods for OFDM signals based upon the principle of tone reservation and building upon the clipping noise analysis presented in “Analysis of clipping noise and tonereservation algorithms for peak reduction in OFDM systems,” L. Wang and C. Tellambura, | 2020-08-20 |
20200267041 | METHOD AND APPARATUS FOR PROCESSING DELAYED SIDELINK SIGNAL - An example of the present specification proposes a technique for decoding a plurality of wireless signals having different characteristics. For example, the plurality of wireless signals may have different CP lengths, be received in different frequency bands, or be configured by different channels. An example of the present specification proposes an example of performing of decoding by using a plurality of reception windows on the basis of a specific wireless signal. Another example of the present specification proposes an example of a proposal of feedback information to a transmission UE on the basis of a specific wireless signal. | 2020-08-20 |
20200267042 | MCS TABLE ADAPTATION FOR 256-QAM - The present disclosure relates to adaptive modulation and coding scheme selection and signaling in a communication system. In particular, a modulation and coding scheme to be used for transmission of a data is selected from a set of predetermined modulation and coding schemes. The predetermination of the set is performed by selecting the set from a plurality of predefined sets. The sets have the same size, so that a modulation and coding selection indicator signaled to select the modulation and coding scheme may be advantageously applied to any of the selected sets. Moreover, a second set includes schemes with a modulation not covered by the schemes of a first set, and which is of a higher order than any modulation in the first set. | 2020-08-20 |
20200267043 | DYNAMIC CONFIGURATION METHOD, TERMINAL DEVICE, NETWORK DEVICE AND COMPUTER STORAGE MEDIUM - Disclosed are a dynamic configuration method, a terminal device, a network device and a computer storage medium. The method comprises: a terminal device receiving configuration information of at least two modulation and coding scheme (MCS) tables, wherein the configuration information is used for determining the at least two MCS tables; the terminal device receiving scheduling information sent by a network side; and the terminal device determining a target MCS table from the at least two MCS tables based on the scheduling information and the correlation between scheduling information and an MCS tables. | 2020-08-20 |
20200267044 | HIGH-ASSURANCE MULTI-DOMAIN NETWORK SWITCH - Embodiments for a method of implementing multiple domains in a network switching device are disclosed. The method includes assigning a plurality of hardware ports to a plurality of domains. Ports are assigned to at least two of the plurality of domains, and none of the ports are concurrently assigned to multiple domains. The method also includes loading rules for forwarding packets between the plurality of ports into a data plane. The rules direct the data plane to forward only between ports in a common domain of the plurality of domains. The method also includes assuring that a packet received at any port assigned to a first domain is not sent in legible form from any port assigned to a second domain if an error causes the data plane to forward or request forwarding the packet to any port assigned to a second domain. | 2020-08-20 |
20200267045 | LOGICAL NETWORKING AND AFFINITY DETERMINATION OF IOT DEVICES USING PARTITIONED VIRTUAL SPACE - A partitioned virtual space supports logical networking of IoT devices. Agents of the devices are assigned to interest-based cells in a virtual space, and can travel among the cells. Within the cells, pairs of devices are tested for similarity, based on device profiles, and for detected affinity. Agents of devices having affinity are connected in a logical network. Some attributes can be based on a personality model and can reflect the personality of a user or other principal associated with a device. Such attributes can influence requests for affinity testing, calculation of similarity, and further behavioral effects incorporated in affinity determination. Evaluation of recommendations can lead to updating of similarity scores or changes in affinity determination. Disclosed embodiments provide scalable, distributed, autonomous, and unsupervised device-to-device connectivity, free of prior constraints. Embodiments can be implemented in the cloud, with privacy protection. | 2020-08-20 |
20200267046 | METHOD FOR SYNCHRONIZING A SET OF DEVICES, ASSOCIATED COMPUTER PROGRAM AND SYNCHRONIZATION SYSTEM - The invention relates to a method for synchronizing interconnected critical devices comprising servers and clients, each critical device being connected to another critical device by a virtual link, each termination of which is associated with a minimum and a maximum value of transmission time for a data packet, the method, implemented periodically, comprising:
| 2020-08-20 |