39th week of 2021 patent applcation highlights part 80 |
Patent application number | Title | Published |
20210306123 | UPLINK TRANSMISSION - Embodiments of the present disclosure relate to methods, devices and computer readable mediums for uplink transmission. In example embodiments, a method implemented at a terminal device is provided. The method comprises, in response to being configured with at least one SRS resource set by a network device and the at least one SRS resource set being associated with first and second CSI-RS resources, receiving, from the network device, a first CSI-RS transmitted via a first TRP over the first CSI-RS resource and a second CSI-RS transmitted via a second TRP over the second CSI-RS resource. The method further comprises determining, based on the received first and second CSI-RSs, first precoding information for uplink transmission via the first TRP and second precoding information for uplink transmission via the second TRP respectively. The method further comprises determining, from the first and second TRPs, at least one TRP for uplink transmission, the at least one TRP being associated with third precoding information selected from the first and second precoding information. In addition, the method further comprises transmitting, based on the third precoding information, at least one SRS to the network device via the at least one TRP. | 2021-09-30 |
20210306124 | SCHEDULING RELEASE FEEDBACK - Example embodiments of the present disclosure relate to feedback to scheduling release feedback. According to embodiments of the present disclosure, there is provided a solution for feedback to a scheduling release indication. The first device receives control information which comprises a scheduling release indication. The scheduling release indication is associated with a hybrid automatic repeat request (HARQ) process. The first device transmits a feedback to the release indication on an occasion allocated for the HARQ process. In this way, the second device does not need to transmit the scheduling release indication for several times, thereby saving resources. Further, overhead can be saved. | 2021-09-30 |
20210306125 | QUASI-COLOCATION INDICATION AFTER DOWNLINK TRANSMISSION - Quasi-colocation (QCL) indication is discussed after downlink transmission. In the management of multiple transmission-reception point (TRP) downlink transmissions, a second indication of a QCL assumption for a particular downlink transmission may be transmitted to receiving user equipment (UEs) after transmission of the downlink transmission. Once a TRP passes a listen before talk (LBT) procedure in a first time interval, it may send a first downlink control information (DCI) with indication of a first QCL assumption for the transmission in the first time interval. The TRP then transmits the downlink transmission intended for part of the multi-TRP downlink transmission. Upon receiving an indication that another of the TRPs was unsuccessful in its part of the multi-TRP transmission, the TRP may transmit a second DCI in a subsequent time interval with adjustments to the QCL assumption for the UEs to use in processing the downlink transmission from the first time interval. | 2021-09-30 |
20210306126 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING WIRELESS SIGNAL IN WIRELESS COMMUNICATION SYSTEM - The present invention relates to a wireless communication system, more specifically, to a method and an apparatus therefor, the method comprising the steps of: merging a first cell having a first TTI and a second cell having a second TTI, the length of the second TTI being N (N>1) times the length of the first TTI; receiving data scheduling information for the second cell in the first TTI of the first cell; and establishing data communication on the basis of the data scheduling information in the second TTI of the second cell corresponding to the first TTI of the first cell, wherein the first TTI for the first cell is any one TTI from among the N number of TTIs of the first cell corresponding to the second TTI of the second cell. | 2021-09-30 |
20210306127 | MINIMIZATION OF BASE STATION TO BASE STATION INTERFERENCE IN TDD NETWORKS - Methods and apparatuses are disclosed for minimization of network node to network node interference in Time Division Duplex (TDD) network. According to one embodiment, a method in a network node for re-mote interference management includes receiving information indicating a position for a reference signal within a communication signal slot, the position being indicated being indicated relative to a reference point associated with a downlink-to-uplink switch; at least one of transmitting the reference signal and receiving the reference signal based at least in part on the received information; and determining whether remote interference is present based at least in part on at least one of the received reference signal and the received information indicating the position of the reference signal. | 2021-09-30 |
20210306128 | SINGLE LOCAL OSCILLATOR IN A MULTI-BAND FREQUENCY DIVISION DUPLEX TRANSCEIVER - Embodiments of the present disclosure relate to multi-band FDD transceivers. An example transceiver includes a LO, configured to generate a LO signal to be shared between a receiver and a transmitter of the transceiver. Both the receiver and the transmitter use quadrature signal processing and are configured to multi-band operation. Sharing a single LO to perform frequency conversion of different frequency bands of received and transmitted signals advantageously allows reducing the number of LOs used in a multi-band FDD transceiver. | 2021-09-30 |
20210306129 | PHYSICAL DOWNLINK SHARED CHANNEL TIME DOMAIN RESOURCE ALLOCATION FOR 5G OR OTHER NEXT GENERATION NETWORK - Time domain resource allocation is facilitated for a physical downlink shared channel. For instance, a physical downlink shared channel associated with a mobile device can be configured via a broadcast channel, and a data structure associated with the physical downlink shared channel corresponding to a physical downlink control channel can also be configured. The configured data structure can be sent to the mobile device to be utilized for physical downlink shared channel transmissions between the wireless network device and the mobile device. Additionally, the time domain resources can be allocated by transmitting a physical downlink shared channel transmission to the mobile device based on a condition associated with a radio resource control connection being determined to not have been satisfied. | 2021-09-30 |
20210306130 | METHOD OF SYNCHRONIZING NODES IN A DETERMINIST MESH NETWORK - The present invention relates to a method for synchronising a node in a deterministic mesh network, in particular a network of sensors using a channel hopping (TSCH) transmission medium access mode. Each node measures the successive synchronisation offsets of its local clock in relation to those of neighbour nodes with which it enters into communication, the measurement being carried out by detecting a reception event of a packet transmitted by the neighbour node or an acknowledgement of a packet transmitted by said node to the neighbour node. The node estimates from these synchronisation offsets, a synchronisation offset for the timeslot and corrects its local clock by a fraction of the synchronisation offset thus estimated. Said fraction may be determined by means of multi-agent reinforcement learning (MARL), each agent being associated with a node of the network. | 2021-09-30 |
20210306131 | WIRELESS STATION AND METHOD OF CORRECTING FREQUENCY ERROR - A wireless station includes at least one oscillator to output a reference signal, and an error calculator to calculate a frequency of the reference signal and calculate a frequency error by subtracting a target frequency of the reference signal from the calculated frequency of the reference signal. The wireless station further includes a modulation data generator to generate modulation data by adding a correction value, varying in negative correlation with the frequency error calculated by the error calculator, to data to be transmitted, and a modulator to conduct frequency modulation on the basis of the modulation data and the data to be transmitted. | 2021-09-30 |
20210306132 | CLOSED LOOP LANE SYNCHRONIZATION FOR OPTICAL MODULATION - A system for transmitting signals via serial links includes a plurality of lanes for combining data onto a transmission media, a skew detector configured to detect skew among two of the plurality of lanes, and a variable delay circuit controlled by the skew detector, configured to delay the start of a clock signal to circuitry of one of the plurality of lanes. | 2021-09-30 |
20210306133 | Decentralized Methods and Systems for Storage, Access, Distribution and Exchange of Electronic Information and Documents over the Internet using Blockchain to protect against Cyber attacks and Theft - Decentralized security methods and systems using a hybrid permission based blockchain with public key infrastructure (PKI) for storage, access, distribution, exchange and execution of electronic information including images, files, media between individuals and or nodes is more secure on connected devices and servers than traditional systems and software applications that are vulnerable to cyberattacks and theft. Email is a popular way of transferring documents and other forms of content. However, there does not exist a decentralized system to protect sensitive information against cyber attacks and theft such that the information can be shared, accessed, executed, and or distributed to other individual(s) and or systems—including save, upload, email, co-author, co-edit, redline, comment, markup, e-sign documents that automatically enforces legally binding and verification processes for and between individual(s) and or business(es). To store and distribute electronic information securely using a decentralized method and system, authorized individuals(s) are authenticated and automatically entered into a smart contract, using a private and public key authentication and verification process where the electronic information is stored as a block that is immutable and secure during both transmission and access by authorized user(s) only. The electronic information may be distributed using a webmail plugin extension and a decentralized storage vault using blockchain to enable secure transmission and storage, which may act in concert with software controlled by the registered owner of the electronic information. The electronic information is securely, transmitted to the registered members using a permission based blockchain on our servers. Decentralized systems and methods provide smart contracting when electronic information is exchanged between authorized and permitted user(s) where creating, uploading, accessing, viewing, editing, redlining, replying, printing, downloading, e-signing and or marking up are each stored as separate immutable blocks within the permission based blockchain allowing the system to securely track the version history and users activity to enforce legally binding and verification processes. Standard email, storage systems and web applications today lack the decentralized security systems and methods for authorized users) to access, control, share, add, modify and distribute the information exchange processes between connected devices and systems that protect against cyber attacks and data theft. | 2021-09-30 |
20210306134 | METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATIONS ON DATA IN A PROCESSING DEVICE, CORRESPONDING PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT - Cryptographic circuitry, in operation, conditionally swaps a first operand and a second operand of a cryptographic operation based on a control value. The conditional swapping includes setting a first mask of a number of bits and a second mask of the number of bits based on the control value, the first mask and the second mask being complementary and having a same Hamming weight. A result of a bitwise XOR operation on the first operand and the second operand is stored as a temporary value. A combination of bitwise logical operations are performed to conditionally swap the first operand and the second operand. | 2021-09-30 |
20210306135 | ELECTRONIC DEVICE WITHIN BLOCKCHAIN BASED PKI DOMAIN, ELECTRONIC DEVICE WITHIN CERTIFICATION AUTHORITY BASED PKI DOMAIN, AND CRYPTOGRAPHIC COMMUNICATION SYSTEM INCLUDING THESE ELECTRONIC DEVICES - An electronic device of a first domain, which is a blockchain-based public key infrastructure (PKI) domain, includes: an interface configured to receive, from a first entity belonging to a second domain which is a certification authority (CA)-based PKI domain, a first certificate of the first entity and a second certificate of a second entity, wherein the second entity is an upper node of the first entity and is a node of a blockchain; a memory configured to store the first certificate and the second certificate; and a processor configured to look up a transaction corresponding to the second entity at a distributed ledger of the first domain based on an identifier of the second entity, verify the second certificate based on the transaction, and verify the first certificate based on the second certificate. | 2021-09-30 |
20210306136 | VALIDATION AS A SERVICE FOR THIRD PARTIES USING HOMOMORPHIC ENCRYPTION - Systems and methods for validating credentials are disclosed. One example method, performed by one or more processors of a computing device associated with a neural network, includes training the neural network to infer validity information for encrypted credentials received from a credential source, wherein the validity information is inferred without decrypting the encrypted credentials, receiving a first encrypted credential from the credential source, generating an encrypted validity indicator for the first encrypted credential based on the validity information inferred by the neural network, and providing the encrypted validity indicator to the credential source. | 2021-09-30 |
20210306137 | BLOCKCHAIN-BASED ADVERTISEMENT MONITORING METHOD AND APPARATUS, AND ELECTRONIC DEVICE - The specification discloses a blockchain-based advertisement monitoring method and apparatus, and an electronic device. The method may include: obtaining, by a playing device, an advertisement resource; at each of a plurality of different time points while playing the advertisement resource, collecting, by the playing device, screenshots of the advertisement resource; generating, by the playing device, a plurality of signatures based on the collected screenshots, an device identifier of the playing device, and a private encryption key of the playing device; generating, by the playing device, verification information based on the plurality of signatures; and uploading, by the playing device, the verification information to a blockchain network. | 2021-09-30 |
20210306138 | SYSTEMS FOR PROVIDING SECURE COMMUNICATIONS USING A PROTOCOL ENGINE - Systems and methods for implementing confidential communications between nodes of a network provide reduced power consumption, require less memory, and provide improved security, relative to previously-known systems and method. Preferred embodiments implement protocol functions in hardware, as opposed to software, to yield some or all of the foregoing improvements. Some embodiments use a hashing circuit for multiple purposes, while maintaining its ability to compute successive intermediate hash values. Some embodiments improve security of systems using circuits configured to leverage a favorable data format. | 2021-09-30 |
20210306139 | RESTRICTED PARTIAL KEY STORAGE - Examples provide a system for managing access-restricted partial cryptographic keys for encrypting and decrypting data. In some examples, a slot server generates and stores a first partial key. The first partial key is access-restricted based on access control data. A slot value mapped to the storage location is returned to the client by the slot server. The client generates a second partial key which is stored at the client device with the slot value. To obtain the first partial key, the client sends a request to the slot server, including the slot value. The requesting client is validated using access control data. If the request comes from a validated client, the slot server provides the first partial key to the client. The first partial key and the second partial key are combinable to generate a composite key for encrypting and decrypting data. | 2021-09-30 |
20210306140 | REMOTE APPROVAL AND EXECUTION OF RESTRICTED OPERATIONS - Techniques are provided for approval and execution of restricted operations. One method comprises receiving a request to perform an operation from a user; providing a redirect request with a protected request to obtain approval from an approval system; receiving a protected request approval with the protected request that was generated by the approval system using a shared secret; comparing the received protected request to a regenerated request generated using information stored with the request; and initiating an execution of the operation in response to the comparing satisfying one or more approval criteria. The shared secret may be shared between a operation execution system and the approval system. The processing of the request, an approval result and/or the execution of the operation can be audited. | 2021-09-30 |
20210306141 | METHOD OF SECRETS INJECTION FOR AUTONOMOUS VEHICLES - Systems and methods are provided for distributing secrets and sensitive information for autonomous vehicles. In particular, systems and methods are provided for automating the acquisition of secrets and sensitive information for autonomous vehicles. Secrets, such as certificates, passwords, storage account keys, shared access signatures, encryption keys, and decryptions keys, are securely distributed to autonomous vehicles for use by various services and applications in the autonomous vehicle. | 2021-09-30 |
20210306142 | TECHNOLOGIES FOR MANAGING A FLEXIBLE HOST INTERFACE OF A NETWORK INTERFACE CONTROLLER - Technologies for processing network packets by a host interface of a network interface controller (NIC) of a compute device. The host interface is configured to retrieve, by a symmetric multi-purpose (SMP) array of the host interface, a message from a message queue of the host interface and process, by a processor core of a plurality of processor cores of the SMP array, the message to identify a long-latency operation to be performed on at least a portion of a network packet associated with the message. The host interface is further configured to generate another message which includes an indication of the identified long-latency operation and a next step to be performed upon completion. Additionally, the host interface is configured to transmit the other message to a corresponding hardware unit scheduler as a function of the subsequent long-latency operation to be performed. Other embodiments are described herein. | 2021-09-30 |
20210306143 | METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MANAGING MESSAGE IN APPLICATION SYSTEM - An application system includes a plurality of objects, one of which has one of a plurality of object types. A first object associated with a first message in a plurality of messages in the application system is determined from the plurality of objects, the first message being generated based on the first object. A second object type having a dependency on a first object type of the first object is acquired based on a type dependency between a set of object types in the plurality of object types. The plurality of messages are searched for a second message generated based on a second object of the second object type. The first message and the second message are displayed associatively. Associated messages in a plurality of messages may be acquired, and then the plurality of messages are presented more clearly and more effectively. | 2021-09-30 |
20210306144 | QUANTUM ATTACK-RESISTANT SYSTEM TO FACILITATE AND ENHANCE PROCESSES OF CRYPTOGRAPHY KEY EXCHANGE - A quantum attack-resistant system for processes of cryptography key exchange comprises a linear space computing module, a manifold computing module, and a Banach space computing module. The system implements the technologies of homotopy morphing and key cloaking for facilitating the processes of key exchange to perform quantum attack-resistant operations in a mathematics space which is different from the spaces that generic quantum attacks work on, and then retrieve the original key in a Hilbert space after the processes of key exchange. The system not only avoids quantum attacks on key exchange processes, but also avoids the defects of current PQC solutions, the vulnerability of the main streamed symmetric & asymmetric encryption systems, and the limitation of quantum key operation in a Hilbert space. Both legacy key solution and quantum key solution are provided and implemented without requiring expensive devices. | 2021-09-30 |
20210306145 | SYSTEMS AND METHODS OF POST-QUANTUM SECURITY MANAGEMENT - A Data Security Management System using a communications interface configured to receive and transmit one or more portions of Post Quantum Resistant Encrypted data within a network comprising a plurality of endpoints. Using End-to-End (E2E) Post Quantum Resistant encryption techniques to protect the data, the Data Security Management System provides the flexibility for multiple data schemes in a distributive environment such as, but not limited to, Hyperledger. The system uses a Policy Manager to perform the base configuration of the session to be transmitted or received in an encrypted state. This encrypted state comprises Post Quantum Cryptographic algorithm in use for that session, inclusive with associated keys or digital signatures. The Policy Manager is further configured to verify an identity of endpoint by a multifactor cryptographic authentication mechanism or a biometric authentication mechanism to validate a connection to or from an endpoint. | 2021-09-30 |
20210306146 | QUANTUM COMPUTING-THREAT-RESISTANT METHOD AND SYSTEM FOR USE ON CRYPTOGRAPHY KEY EXCHANGING PROCESSES - A quantum computing-threat-resistant system for cryptography key exchange comprises a linear-space computing module, a manifold computing module, and a Banach-space computing module. The system implements the technologies of homotopy morphing and key cloaking for facilitating the key-exchanging processes to perform quantum computing-threat-resistant operations in a mathematics space which is different from the spaces that generic quantum attacks work on, and then retrieve the original key in a Hilbert space after the processes of key exchange. The system not only avoids quantum attacks on key-exchanging processes, but also avoids the defects of current PQC solutions, the vulnerability of the main streamed symmetric & asymmetric encryption systems, and the limitation of quantum key operation in a Hilbert space. Both legacy key solution and quantum key solution are provided and implemented without requiring expensive devices. | 2021-09-30 |
20210306147 | AUTHENTICATION USING TRANSFORMATION VERIFICATION - An example system includes a processor to receive, at a setup or sign-up, a first cipher including a biometric template transformed using a first transformation and encrypted using a secret key, a second cipher including a security vector encrypted using the secret key, a third cipher including the biometric template transformed using a second transformation and encrypted, and a fourth cipher including an encrypted second security vector. The processor can receive, at a runtime or sign-in, a fifth cipher and a sixth cipher. The processor can verify that the fifth cipher includes a second biometric template transformed using the first transformation and encrypted using the secret key and that the sixth cipher includes the second biometric template transformed using the second transformation by testing a format attribute of the transformation functions using comparisons of inner products. The processor can authenticate a user based on the Euclidean distance between the first cipher and the sixth cipher not exceeding a threshold in response to detecting that the transformations are verified. | 2021-09-30 |
20210306148 | INTEGRATED CIRCUIT (IC) SIGNATURES WITH RANDOM NUMBER GENERATOR AND ONE-TIME PROGRAMMABLE DEVICE - Systems and methods of generating a security key for an integrated circuit device include generating a plurality of key bits with a physically unclonable function (PUF) device. The PUF can include a random number generator that can create random bits. The random bits may be stored in a nonvolatile memory. The number of random bits stored in the nonvolatile memory allows for a plurality of challenge and response interactions to obtain a plurality of security keys from the PUF. | 2021-09-30 |
20210306149 | HARDWARE SECURITY MODULE PROXY DEVICE FOR STORAGE EXPANSION - A proxy hardware security module (HSM) is disclosed, useable with an existing HSM for expansion of key storage for the HSM. The proxy HSM receives a signing request that is targeted to the HSM, and retrieves a wrapped version of a signing key from a storage location separate from the HSM. The proxy HSM provides the wrapped signing key to the HSM, and provides the signing request to the HSM. Upon receipt of a response to the signing request indicating successful execution of a signing operation by the HSM, the proxy HSM transmits a key destroying request to the HSM, and a confirmation message to the device from which the signing request was received. Upon completion of the signing request, the HSM does not retain the signing key. | 2021-09-30 |
20210306150 | COMPUTER IMPLEMENTED METHODS AND SYSTEMS FOR MANAGING A CRYPTOGRAPHIC SERVICE - The present invention relates to a computer implemented method, software product and computer system for managing a cryptographic service. The computer implemented method comprises: establishing a pool of encryption materials; periodically updating the pool of encryption materials; and responsive to an encryption request from an encrypting application: selecting encryption materials from the pool; encrypting payload data included in the encryption request using the selected encryption materials; and returning encrypted payload data to the encrypting application. | 2021-09-30 |
20210306151 | DEAUTHORIZATION OF PRIVATE KEY OF DECENTRALIZED IDENTITY - Embodiments disclosed herein are related to the deauthorization of a private key associated with a decentralized identifier. While a user of a computing system is authenticated as a decentralized identifier, the system detects user input, and determines based on that user input that the private key associated with the decentralized identity is to be revoked. In response to this determination, the private key is deauthorized so that the private key cannot be used to perform actions for the decentralized identity at least until the private key is restored. | 2021-09-30 |
20210306152 | BLOCKCHAIN-BASED HYBRID AUTHENTICATION - In a particular embodiment, blockchain-based hybrid authentication is disclosed that includes receiving, by a smart contract controller, an invocation of a smart contract and accessing, by the smart contract controller, one or more parameters associated with a client account. In this embodiment, the smart contract determines whether the one or more parameters fulfill the smart contract. In response to determining that the one or more parameters fulfill the smart contract, the smart contract provides an attestation of an identity associated with the client account. | 2021-09-30 |
20210306153 | IDENTITY VERIFICATION METHOD AND COMPUTER DEVICE EMPLOYING THE SAME - An identity verification method applied in a computer device includes periodically collecting biometric data of a user. A difference between the collected biometric data and pre-stored biometric data is determined. The pre-stored biometric data is updated to be the collected biometric data, and the collected biometric data and identification information of the user are uploaded to a blockchain when the difference is greater than a preset threshold. Once current biometric data of the user is obtained, and the identification information of the user from the blockchain based on the current biometric data of the user is downloaded, identity verification is performed on the user based on the downloaded identification information. | 2021-09-30 |
20210306154 | VALIDATING ELECTRONIC DEVICES IN A BLOCK CHAIN NETWORK - A method is described. The method can include establishing a block chain network of multiple imaging devices. The block chain network can be established such that, at least a first imaging device of the multiple imaging devices can be validated by at least a second imaging device of the multiple imaging devices. Further, the method can include generating a block message by the first imaging device. The block message can be generated by using a secured hash function and based on a set of parameters that can be associated with the first imaging device. The set of parameters can include, a first imaging device identifier, a network fluctuation parameter, and at least one inertial parameter. Furthermore, the method can include sending by the first imaging device the block message to the second imaging device. In this regard, the block message can facilitate validation of the first imaging device. | 2021-09-30 |
20210306155 | ROBUST STATE SYNCHRONIZATION FOR STATEFUL HASH-BASED SIGNATURES - In one example an apparatus comprises a computer readable memory, a signing facility comprising a plurality of hardware security modules, and a state synchronization manager comprising processing circuitry to select, from the plurality of hardware security modules, a set of hardware security modules to be assigned to a digital signature process, the set of hardware security modules comprising at least a first hardware security module and a second hardware module, and assign a set of unique state synchronization counter sequences to the respective set of hardware security modules, the set of state synchronization counter sequences comprising at least a first state synchronization counter sequence and a second state synchronization counter sequence. Other examples may be described. | 2021-09-30 |
20210306156 | APPLYING PKI (PUBLIC KEY INFRASTRUCTURE) TO POWER OF ATTORNEY DOCUMENTS - Technology for using a Certificate of Authority and key based encryption in connection with legal Power of Attorney (POA) documents to control access to the POA so that security and/or immutability is enhanced. In some embodiments, PKI (public key infrastructure) is used to enhance privacy and immutability of POA data. | 2021-09-30 |
20210306157 | INFRASTRUCTURE DEVICE ENROLMENT - According to aspects of the present disclosure, there is provided methods and devices for enrolling a device into a network, including a device comprising a secure storage comprising a device identifier and a public key, and a controller configured to: retrieve a proof-of-ownership certificate comprising a cryptographic binding between the device identifier and an owner identifier based on a secret key corresponding to the stored public key, authenticate the proof-of-ownership certificate based on the stored device identifier and public key, establish an authenticated communication channel with a device manager based on the authenticated proof-of-ownership certificate, and receive setup information from the device manager to enrol the device on the network. | 2021-09-30 |
20210306158 | CERTIFICATION SYSTEM AND CERTIFICATION METHOD FOR CERTIFYING THE EXISTENCE OF A DIGITIAL CONTENT - A certification system for certifying existence of digital content or “resource”, in particular available on the Internet network or usable through the network, is provided. The system has a certification platform, which is arranged for generating a certification pack, and a distributed database, to which the certification pack and/or an identification element associated therewith is/are transmitted. The certification platform comprises at least a management application for identifying and classifying the digital content, one or more collection applications for acquiring the digital content, and a certification protocol, which, for each collection application, comprises a corresponding set of certification procedures, each of which generates a certification element for a corresponding step of the procedure for acquiring the digital content, so as to create the certification pack from the group of certification elements. | 2021-09-30 |
20210306159 | MANAGEMENT SYSTEM AND METHOD FOR SECURE SIGNING OF CERTIFICATES - A management system and a method for secure signing of certificates, which have a certificate signing subsystem set up in a device of a controlled management site, unless authorized externally, internal data of the subsystem cannot be accessed arbitrarily, and each unit applying for a certificate needs confirmation of identity to increase the security of certificate application and signing. In addition, the certificate signing subsystem is a device with arithmetic capability, which operates fast and can increase the efficiency of certificate signing. Because units or companies applying for certificates do not need to set up a certificate signing system by themselves, provided that they are connected to the certificate signing subsystem of the present invention, certificates can be applied for and obtained, thereby saving business operating costs. | 2021-09-30 |
20210306160 | SYSTEMS AND METHODS FOR FACILITATING POLICY-COMPLIANT END-TO-END ENCRYPTION FOR INDIVIDUALS BETWEEN ORGANIZATIONS - Disclosed herein is a method of facilitating policy-compliant end-to-end encryption for individuals between organizations. Accordingly, the method may include a step of receiving, using a communication device, a first recipient indication associated with a first recipient of a first tenant from a sender device associated with a sender of a second tenant. Further, the method may include a step of retrieving, using a storage device, a predefined policy definition associated with the first tenant. Further, the method may include a step of identifying, using a processing device, a recipient certificate associated with the first recipient based on the predefined policy definition. Further, the method may include a step of retrieving, using the storage device, the recipient certificate associated with the first recipient based on the identifying. Further, the method may include a step of transmitting, using the communication device, the recipient certificate to the sender device. | 2021-09-30 |
20210306161 | SECURE ONLINE ISSUANCE OF CUSTOMER-SPECIFIC CERTIFICATES WITH OFFLINE KEY GENERATION - In a system comprising an customer providing a service to a plurality of client devices, a method and system for providing an customer-specific digital certificate to a client device of the plurality of client devices is disclosed. The method comprises receiving, in an intermediate certificate authority, a pre-generated digital certificate and an encrypted client device private key encrypted according to a private key encryption key PrKEK, receiving, from the client device, a request for the customer-specific digital certificate, the request comprising at least one of client device identifying information and information identifying the customer, the request signed according to a pre-provisioned client device digital certificate, and transmitting the customer-specific digital certificate and the encrypted client device private key to the client device. | 2021-09-30 |
20210306162 | Security Governance of the Processing of a Digital Request - Disclosed is a method for validating a digital request in which cooperating entities are able to use security processors loaded with an application for processing the request, each processor issuing, on request, a digital certificate of integrity; wherein said method includes: an application integrity verification process such that, based on the issued certificates, each entity ensures that each of the other entities implements an application identical to its own; a process by which entities create a common secret and thus form a group of Creative entities; and a process by which entities of the group of Creative entities designate the signatory entities, thus forming a group of cooperating signatory entities, so that, as such, the group has access to the common secret; in order for the request to be validated if and only if entities of the group of signatory entities implement the application by means of the common secret. | 2021-09-30 |
20210306163 | SYSTEM FOR SECURE ACCELERATED RESOURCE ALLOCATION - Disclosed in some examples are methods, systems, devices, and machine-readable mediums that provide an ability for an entity to independently commence, advance, and complete a resource allocation offer in a matter of minutes as opposed to weeks or months after an automated resource pre-committal process. The system, using and incorporating machine learning techniques and algorithms, may have several phases, including a setup phase, resource pre-committal phase, an import phase, a processing phase, a verification phase, a resource allocation offer phase, and a resource allocation phase in which the system allocates resources to a vendor. | 2021-09-30 |
20210306164 | DISTRIBUTED KEY MANAGEMENT FOR TRUSTED EXECUTION ENVIRONMENTS - Disclosed herein are methods, systems, and apparatus, for securely executing smart contract operations in a trusted execution environment (TEE). One of the methods includes establishing, by a key management (KM) TEE of a KM node, a trust relationship with a plurality of KM TEEs in a plurality of KM nodes based on performing mutual attestations with the plurality of KM TEEs; initiating a consensus process with the plurality of KM TEEs for reaching consensus on providing one or more encryption keys to a service TEE of the KM node; in response to reaching the consensus with the plurality of KM TEEs, initiating a local attestation process with a service TEE in the KM node; determining that the local attestation process is successful; and in response to determining that the local attestation process is successful, providing one or more encryption keys to the TEE executing on the computing device. | 2021-09-30 |
20210306165 | PERSONAL UNCLONNABLE FUNCTION - The technology disclosed herein provides a system for generating a personal unclonable function (PUF) for a user based on a biometric data related to the user. Implementations of the system include a camera to generate a partial image of a user's tongue, a sensor to generate a moisture level in the user's saliva, a PUF generator configured to generate a PUF benchmark of the user based on combination of the partial image of a user's tongue and the moisture level in the user's saliva, and an access control unit configured to control access to one or more user devices based on the PUF benchmark. | 2021-09-30 |
20210306166 | Network information transmission systems - A network information transmission system. The network information transmission system includes a packet handling device including a control plane configured to open a remote direct memory access (RDMA) connection with a destination external to the network information transmission system, an encapsulator configured to encapsulate one or more packets traversing the packet handling device, producing one or more encapsulated packets, and a transmitter configured to transmit the one or more encapsulated packets, via the RDMA connection, to the destination external to the network information transmission system. Related apparatus and methods are also described. | 2021-09-30 |
20210306167 | STATELESS MULTICAST BASED ON LOCAL LABEL SPACES - Various example embodiments for supporting stateless multicast communications in a communication system are presented. Various example embodiments for supporting stateless multicast communications may be configured to support stateless multicast communications in a label switching network (e.g., a Multiprotocol Label Switching (MPLS) network, an MPLS—Traffic Engineered (TE) network, or the like) based on use of local label spaces of nodes of the label switching network for encoding of an explicit path tree for the multicast communications within the multicast communications. Various example embodiments for supporting stateless multicast communications in a label switching network based on use of local label spaces of nodes of the label switching network may be configured to support use of local label spaces of nodes of the label switching network by using network-wide unique node identifiers to uniquely identify nodes with which the node and adjacency labels of the explicit path tree are associated. | 2021-09-30 |
20210306168 | PARTICIPANT IS CALLED WHEN IT IS TIME TO JOIN A MEETING - A system to call a participant to join and connect to a meeting is described herein. The system includes a meeting server and a communication server. The meeting server is programmed to set the meeting and call a participant based on the response to a meeting request. The communication server is programmed to send the meeting request to the participant by one or more communication methods or protocols. | 2021-09-30 |
20210306169 | METHOD AND SYSTEM FOR JOINING AN ONLINE MEETING - A method includes permitting, by a server, a first device to join an online meeting held with at least a third device based on receiving a user input from the first device. The method includes permitting, by the server, a second device to join the online meeting in addition to the first device based on receiving login information associated with a user account used by the first device from the second device. The method includes providing, by the server and to at least the third device in the online meeting, screen information of the second device after permitting the second device to join the online meeting. | 2021-09-30 |
20210306170 | PARTICIPANT IDENTIFICATION IN MIXED MEETING - One embodiment provides a method, including: supporting, using a meeting application of an information handling device, a mixed meeting, wherein the mixed meeting comprises participants originating from at least two connection mediums; attempting, using a processor, to determine the identities of each of the participants in the mixed meeting; and providing an indication of each of the determined identities to at least one of the participants. Other aspects are described and claimed. | 2021-09-30 |
20210306171 | REQUIRED MEETING PARTICIPANT IDENTIFICATION - One embodiment provides a method, including: identifying, with reference to a predetermined ruleset for an online meeting, a list of eligible required participants; identifying, using at least one identity-determining technique, identities for present participants in the online meeting; determining, with reference to the predetermined ruleset and upon comparison of the list of the eligible required participants to the identified identities of the present participants, whether a minimum threshold number of the eligible required participants are present in the online meeting; and performing an action based upon the determination. Other aspects are described and claimed. | 2021-09-30 |
20210306172 | UNAUTHORIZED PARTICIPANT EXCLUSION FROM ONLINE MEETING - One embodiment provides a method, including: identifying, based upon a permissions policy, a list of authorized participants associated with at least one segment of an online meeting; identifying, using at least one identity-determining technique, an identity of each participant that joins the online meeting; determining, by comparing the identity of each participant against the list of authorized participants, whether an unauthorized participant is present in the at least one segment; and preventing, responsive to determining that the unauthorized participant is present, the unauthorized participant access to meeting data associated with the at least one segment. Other aspects are described and claimed. | 2021-09-30 |
20210306173 | METHODS AND SYSTEMS FOR MANAGING MEETING NOTES - The present disclosure provides systems and methods for managing meeting notes. In accordance with some embodiments, a method is provided that includes receiving nonverbal cue information associated with one or more meeting participants, determining an engagement level for each of the one or more meeting participants based on emotional information associated with the nonverbal cue information, composing meeting notes based on the determined engagement level for each of the one or more meeting participants, and storing the meeting notes. | 2021-09-30 |
20210306174 | SYSTEM AND METHOD FOR DETERMINING A SOURCE AND TOPIC OF CONTENT FOR POSTING IN A CHAT GROUP - A system for determining a source and topic of content for posting in a chat group is disclosed. The system includes a memory and at least one processor. The at least one processor may be configured to perform operations including identifying a user as a source of content; identifying a topic from the content using a language analysis application; determining, from the identified topic, a particular chat group from among a set of chat groups; and posting a portion of the content as a new message from the user in a message thread for the particular chat group. | 2021-09-30 |
20210306175 | TELEMETRY BASED ON HFC DISTRIBUTION NETWORK INFRASTRUCTURE - Methods, systems, and computer readable media can be operable to facilitate a gathering and transmission of monitoring data from a sensor module to a telemetry control center. One or more sensor modules may be attached or otherwise connected to one or more devices that are included within an HFC infrastructure. Each sensor module may include one or more sensors that capture monitoring signals. The sensor module may interface with a communication link that is associated with the device to which it is connected. The sensor module may process the captured monitoring signals and output the processed signals to a telemetry control center, the processed signals being output over a reverse signal path that is utilized by the device to which the sensor module is connected. | 2021-09-30 |
20210306176 | BUILDING MANAGEMENT SYSTEM WITH SPACE GRAPHS INCLUDING SOFTWARE COMPONENTS - A building system including one or more memory devices configured to store instructions that cause one or more processors to store a graph data structure in a data storage device including a plurality of nodes representing a plurality of entities and a plurality of edges between the plurality of nodes representing a plurality of relationships between the plurality of entities, wherein the plurality of entities include a first entity representing one of a person, place, or piece of equipment of the building, wherein a second entity of the plurality of entities represents a software component, wherein the software component performs operations for the person, place, or piece of equipment of the building indicated by one or more edges of the plurality of edges relating the first entity to the second entity and cause the software component to execute and perform the operations for the person, place, or piece of equipment. | 2021-09-30 |
20210306177 | Adaptable and Secure Can Bus - A communication module is configured to communicate a first part of a message packet configured to identify message content contained in the message packet and a second part of the message packet and change the second part of the message packet in response to a trigger. A received message packet's changing portion is compared with the set of the authorized changing portions to determine whether the received message packet is authorized for the common control network. The received message packet is discarded or ignored in response to the received message packet's changing portion not matching at least one of the authorized changing portions in the set of the authorized changing portions. | 2021-09-30 |
20210306178 | ESTABLISHING A NETWORK MICRO-TUNNEL WITHIN A NETWORK TUNNEL - A first network device may communicate, in association with a tunnel establishment network protocol, with a second network device to cause a network tunnel between the first network device and the second network device to be established. The first network device may determine, based on communicating with the second network device to cause the network tunnel to be established, that the network tunnel is to support network micro-tunnel functionality within the network tunnel. The first network device may communicate, based on determining that the network tunnel is to support network micro-tunnel functionality, with the second network device to identify a traffic class, of one or more traffic classes, to which network micro-tunnel functionality within the network tunnel is to be applied. The first network device may cause a network micro-tunnel to be established within the network tunnel for traffic associated with the traffic class. | 2021-09-30 |
20210306179 | TRANSPORTING FIBRE CHANNEL OVER ETHERNET - Methods and apparatus for the Transporting of Fibre Channel data over Ethernet are disclosed. In one embodiment of the invention, a server ( | 2021-09-30 |
20210306180 | TRANSPORTING FIBRE CHANNEL OVER ETHERNET - Methods and apparatus for the Transporting of Fibre Channel data over Ethernet are disclosed. In one embodiment of the invention, a server ( | 2021-09-30 |
20210306181 | CHANNEL TRAINING ADAPTATION - A method may include detecting parameter(s) of communication between an AP and a STA. The method may include determining a training configuration for a channel estimation of the communication based on the parameter(s). The method may include transmitting a DL transmission or a trigger frame to the STA. The DL transmission may include a training block configured according to the training configuration. The trigger frame may include the training configuration and instructions for the STA to include a training block configured according to the training configuration in a UL transmission to the AP. The STA may be configured to determine the channel estimation of a channel of the communication using the training block of the DL transmission received at the STA. Alternatively, the method may also include determining the channel estimation of a channel of the communication using the training block of the UL transmission received at the AP. | 2021-09-30 |
20210306182 | METHOD FOR PERFORMING CHANNEL ESTIMATION IN WIRELESS COMMUNICATION SYSTEM AND DEVICE THEREFOR - The present specification provides a method for estimating a channel by a terminal in a wireless communication system supporting machine-type communication (MTC). Particularly, the terminal receives, from a base station, configuration information for receiving a cell-specific reference signal (CRS) and a dedicated demodulation reference signal (DMRS), and receives the CRS on the basis of the configuration information. The terminal then receives the DMRS and control information by means of an MTC physical downlink control channel (MPDCCH), performs channel estimation for the MPDCCH on the basis of the DMRS and the CRS, and demodulates the control information on the basis of the channel estimation, wherein one precoder among a plurality of candidate precoders applied to the CRS is applied to the DMRS. | 2021-09-30 |
20210306183 | METHODS, APPARATUS AND SYSTEMS FOR CHANNEL ESTIMATION AND SIMULTANEOUS BEAMFORMING TRAINING FOR MULTI-INPUT MULTI-OUTPUT (MIMO) COMMUNICATIONS - Methods, apparatuses, and systems to enable a channel estimation of more than one channel for Multi-Input Multi-Output (MIMO) communications in a wireless network is provided. The method includes determining a first set of complex numbers comprising first channel estimation signal associated with a first channel, determining a second set of complex numbers comprising second channel estimation signal associated with a second channel, and transmitting the first set of complex numbers and the second set of complex numbers via a physical layer (PHY) frame, wherein the second set of complex numbers are complex conjugates of the first set of complex numbers. | 2021-09-30 |
20210306184 | SRS SENDING METHOD, SRS RECEIVING METHOD, AND DEVICE - Embodiments of this application provide an SRS sending method, an SRS receiving method, and a device. A manner of determining an antenna used to send an SRS is provided. In addition, a case in which one subframe includes a plurality of symbols is considered by using a quantity of first time units that are used by a terminal device to send an SRS in one uplink subframe and a case in which one antenna is enabled to implement continuous sending as much as possible is also considered by using a quantity of first time units that are consecutively used to send the SRS in one subframe by using a same antenna. | 2021-09-30 |
20210306185 | METHOD FOR DETERMINING TRANSMISSION PARAMETERS OF UPLINK SIGNAL, TERMINAL AND NETWORK DEVICE - Provided are methods for determining a transmission parameter of an uplink signal, a terminal and a network device. The method includes that: a terminal determines a first SRS resource set receives, from a network device, first indication information which is for instructing the terminal to transmit an aperiodic SRS, determines a target SRS resource set according to the first indication information and the first SRS resource set, sends the aperiodic SRS to the network device on an SRS resource in the target SRS resource set, receives, from the network device, second indication information which is for indicating a target SRS resource in the target SRS resource set; and the terminal determines a transmission parameter used to transmit an uplink signal according to the target SRS resource. | 2021-09-30 |
20210306186 | SERDES EQUALIZATION FOR SHORT, REFLECTIVE CHANNELS - An illustrative short, high-rate communications link includes a serializer that provides a signal having a symbol rate of at least 10 GHz; and a deserializer that receives the signal via a printed circuit board (“PCB”) trace coupled to the serializer with a first impedance mismatch and coupled to the deserializer with a second impedance mismatch. At least one of the serializer and deserializer includes an equalizer that attenuates a frequency component of the signal at half of the symbol rate relative to a frequency component of the signal at one third of the symbol rate. Though such attenuation may reduce signal-to-noise ratio, an improved communications performance may nevertheless be achieved by suppression of signal reflections. | 2021-09-30 |
20210306187 | Multi-Stage Equalizer for Inter-Symbol Interference Cancellation - An equalizer includes a first feed-forward stage that provides a measure of low-frequency IS I and a second feed-forward stage that includes a cascade of stages each making an IS I estimate. The IS I estimate from each stage is further equalized by application of the measures of low-frequency IS I from the first feed-forward stage and fed to the next in the cascade of stages. The IS I estimate from the stages thus become progressively more accurate. The number of stages applied to a given signal can be optimized to achieve a suitably low bit-error rate. Power is saved by disabling stages which are not required to meet that goal. | 2021-09-30 |
20210306188 | PROCESSING AMPLITUDE MODULATION SIGNALS WITH NOISE ESTIMATION - In one example, a communications circuit processes an amplitude modulated signal by using a first circuit having signal paths to process an amplitude modulated signal as represented by an in-phase component and by a quadrature component, and by using a second circuit to discern random noise pulses from the quadrature component of the amplitude modulated signal. In response, the second circuit generates an estimate of overall noise representing the random noise pulses in the amplitude modulated signal. In the above and more specific examples, the random noise pulses may appear as pulses which overlap with, in terms of time and bandwidth of frequency spectrum, information of the amplitude modulated signal, and the first and second circuits may be part of an RF radio receiving the amplitude modulated signal from an antenna. | 2021-09-30 |
20210306189 | METHOD, TRANSMITTER, STRUCTURE, TRANSCEIVER AND ACCESS POINT FOR PROVISION OF MULTI-CARRIER ON-OFF KEYING SIGNAL - A method of transmitting an On-Off Keying, OOK, signal which includes an ON waveform and an OFF waveform forming a pattern representing transmitted information. The method includes obtaining a basic baseband waveform; scrambling the basic baseband waveform by applying a first binary randomised sequence where one of the binary values cause transformation to a complex conjugate; modulating the information to be transmitted by applying the scrambled basic baseband waveform for the ON waveform and applying no waveform for the OFF waveform; and transmitting the modulated information. | 2021-09-30 |
20210306190 | METHOD FOR WIRELESS COMMUNICATION WITH WIRELESS COMMUNICATION TERMINAL FOR LONG DISTANCE TRANSMISSION AND WIRELESS COMMUNICATION TERMINAL USING SAME - Provided is a base wireless communication terminal. The base wireless communication terminal includes a transceiver and a processor. The processor is configured to transmit a mixed Physical Layer Protocol Data Unit (PPDU) including both data for a Long Range (LR) wireless communication terminal and data for a non-LR wireless communication terminal to the LR wireless communication terminal and the non-LR wireless communication terminal using the transceiver. The LR PPDU including only the data for the LR wireless communication terminal has a narrower bandwidth than a bandwidth of the non-LR PPDU including only the data for the non-LR wireless communication terminal. | 2021-09-30 |
20210306191 | Method for Determining Demodulation Reference Signal for Multiple Access Transmission - The present disclosure relates to a method for a terminal device to determine demodulation reference signal (DMRS), comprising: obtaining ( | 2021-09-30 |
20210306192 | MULTIPLE ACCESS WIRELESS COMMUNICATIONS USING A NON-GAUSSIAN MANIFOLD - A method and apparatus for multiple-access wireless transmission is disclosed. The method involves mapping a plurality of signals onto a multi-dimensional non-Gaussian source manifold, the plurality of signals including signals targeted for transmission to a plurality of receivers. The method also involves transforming the source manifold into a multi-dimensional target manifold using a polarization stream network. The method further involves generating a multiple-access transmission waveform for transmission to the plurality of receivers, the multiple-access transmission waveform being based on the target manifold. | 2021-09-30 |
20210306193 | REDUCTION OF PEAK TO AVERAGE POWER RATIO - A method for Peak to Average Power Ratio (PAPR) reduction at an input of analog to digital converter (ADC) of the receiver, the method includes mapping, by a mapper, an input symbol to an output symbol that maintains a peak power constraint at the input of the ADC; wherein the mapping is responsive to (a) previously transmitted symbols and (b) a state of the channel following a transmission of the current output symbol; transmitting the output symbol by the transmitter; receiving, by the receiver, a received symbol that represents the output symbol; and de-mapping the received symbol, by a de-mapper of the receiver, to a de-mapped symbol that represents the input symbol. | 2021-09-30 |
20210306194 | ITERATIVE REFERENCE SIGNAL SYMBOL RECONSTRUCTION AND CHANNEL ESTIMATION - Methods, systems, and devices for wireless communications are described. A transmitting device (e.g., a user equipment (UE) or base station) may reduce a peak to average power ratio (PAPR) by clipping signals transmitted to a receiving device according to a clipping level. The receiving device may receive, from the transmitting device, an indication of the clipping level associated with a reference signal. The receiving device may receive the reference signal and identify distortions based on the clipping level. The receiving device may iteratively reconstruct peaks of the clipped reference signal until the receiving device is able to obtain accurate pilot symbols for use in channel estimation. The techniques described herein may enable receiving devices to improve efficiency and reliability of communications by improving channel estimation, which may increase the probability of successfully decoding transmitted information. | 2021-09-30 |
20210306195 | METHOD OF SIGNAL GENERATION AND SIGNAL GENERATING DEVICE - A transmission method simultaneously transmitting a first modulated signal and a second modulated signal at a common frequency performs precoding on both signals using a fixed precoding matrix and regularly changes the phase of at least one of the signals, thereby improving received data signal quality for a reception device. | 2021-09-30 |
20210306196 | METHOD, DEVICE AND STORAGE MEDIUM FOR TRANSFERRING, BY EMITTER, FLOW OF SAMPLES TO RECEIVER BY EMITTER - The present invention concerns a method and device for transferring, by an emitter, a flow of samples to a receiver through a wireless interface using Single-Carrier Frequency Division Multiple Access. The emitter: —selects consecutive blocks of M samples of the flow of samples, —modulates each selected block, —selects, for each modulated block, half of the modulated block located in the center of the modulated block, —selects, with a M/2 sample shift, consecutive blocks of M samples, —modulates each selected block with the shift, —selects, for each modulated block with the shift, half of the modulated block with the shift located in the center of the modulated block with the shift, —forms a stream composed of one in two half ordered modulated blocks and, between two half ordered modulated blocks, one half ordered modulated block with the shift, —transfers the formed stream. | 2021-09-30 |
20210306197 | ORTHOGONAL TIME FREQUENCY SPACE COMMUNICATION SYSTEM COMPATIBLE WITH OFDM - A system and method for orthogonal time frequency space communication and waveform generation. The method includes receiving a plurality of information symbols and encoding an N×M array containing the plurality of information symbols into a two-dimensional array of modulation symbols by spreading each of the plurality of information symbols with respect to both time and frequency. The two-dimensional array of modulation symbols is then transmitted using M mutually orthogonal waveforms included within M frequency sub-bands. | 2021-09-30 |
20210306198 | METHOD AND DEVICE FOR DETERMINING BASEBAND PARAMETER - Disclosed are a method and device for determining a baseband parameter, used for solving the problem of there not yet being an explicit solution for how to determine a numerology in a new radio communication system. The method comprises: according to an initial synchronization signal it detects, a terminal determining the TRP group to which said terminal belongs; according to a third synchronization signal detected in the TRP group and/or system information of the terminal group, the terminal determining the numerology. The solution provided by the embodiments of the present invention correctly identifies numerologies corresponding to different sub-bands, different TRPs, and/or different beams in a TRP group, thus achieving synchronization with different sub-bands, different TRPs, and/or different beams in the TRP group and ensuring that the terminal may operate, according to correct numerology, on a corresponding sub-band, TRP, or beam. | 2021-09-30 |
20210306199 | SYSTEMS AND METHODS FOR INSERTING SUPPLEMENTAL CONTENT INTO A QUADRATURE AMPLITUDE MODULATION SIGNAL USING EXISTING BANDWIDTH - Systems and methods are described herein for inserting supplemental content into a QAM signal. A unicast QAM signal between a server and a client device for delivery of content is established. The QAM signal has a particular frequency corresponding to the channel on which it will be transmitted to the client device. A request or other signal may be received from the client device requesting that supplemental content be inserted into the QAM signal. A portion of the bandwidth of the QAM signal is allocated for the supplemental content. The supplemental content is transcoded into a supplemental QAM signal in the particular frequency. The supplemental content may be packetized content such as internet protocol-based content and may be retrieved from a server or database. The supplemental QAM signal is then inserted into the unicast QAM signal using the allocated portion of the bandwidth. | 2021-09-30 |
20210306200 | SYSTEM FOR DECOMPOSING EVENTS AND UNSTRUCTURED DATA - A system is provided that executes artificial intelligence for unstructured data. A memory coupled to a processor that executes instructions for: a first engine using artificial intelligence (AI) to create a structured event or scraped structured event records from unstructured and semi-structured log messages; an extraction engine in communication with a managed infrastructure and the first engine, the extraction engine configured to receive managed infrastructure data; and a signaliser engine that includes one or more of a NMF engine, a k-means clustering engine and a topology proximity engine, the signaliser engine inputting a list of devices and a list a connection between components or nodes in the managed infrastructure, the signaliser engine determining one or more common characteristics and produces one or more clusters of events. | 2021-09-30 |
20210306201 | NETWORK SYSTEM FAULT RESOLUTION VIA A MACHINE LEARNING MODEL - Disclosed are embodiments for automatically resolving faults in a complex network system. Some embodiments monitor one or more of system operational parameter values and message exchanges between network components. A machine learning model detects a fault in the complex network system, and an action is selected based on a cause of the fault. After the action is applied to the complex network system, additional monitoring is performed to either determine the fault has been resolved or additional actions are to be applied to further resolve the fault. | 2021-09-30 |
20210306202 | MESSAGE PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE AND COMPUTER-READABLE STORAGE MEDIUM - A message processing method, applied to a terminal device including a modem, includes: monitoring a running state of the modem, and restarting the modem when it is monitored that the modem crashes; and maintaining a communication connection state, and prohibiting notification of a modem crash message to a user. By maintaining a normal communication state after the modem crashes, it is ensured that the user continues to use the various services of the terminal normally to avoid the interruption of the ongoing business of the user; and the terminal resumes normal operation after the modem is restarted, and the user does not perceive that the modem has ever crashed, thereby maintaining the experience of using the terminal normally all the time. | 2021-09-30 |
20210306203 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR ERROR HANDLING FOR INDIRECT COMMUNICATIONS - A method, apparatus, and computer program product provide for network communication error originator identification with a header, such as an HTTP header. In the context of a method, the method causes a service request from a NF client to be transmitted to a NF server via one or more intermediary network proxy functions. The method receives a service response with error information identifying the type or identity of the originator of the error response or identifying the type or identity of network proxy function having relayed the error response. The method may also be enabled to redirect a service request to a different NF server or a different network proxy function, and to enable the NF client to determine whether to redirect the request to a different NF server or a different network proxy function. | 2021-09-30 |
20210306204 | DIAGNOSTIC SYSTEM AND VEHICLE - A vehicle is provided that includes Ethernet controllers that operate first electronic devices and perform communication using scalable service-oriented middleware on Ethernet/internet protocol (SOME/IP). An Ethernet switch generates a communication path between the Ethernet controllers and executes communication between the Ethernet controllers based on the generated path. A plurality of CAN controllers operate second electronic devices and perform CAN communication. A gateway then executes the CAN communication with the CAN controllers, executes communication with the Ethernet switch, and transmits CAN diagnostic information of the CAN controller to the Ethernet switch. | 2021-09-30 |
20210306205 | MANAGING FAILOVER REGION AVAILABILITY FOR IMPLEMENTING A FAILOVER SERVICE - The present disclosure generally relates to managing a failover service for regions in an active-active configuration. The failover service can receive a list of regions and a list of rules that must be satisfied for a region to be considered available for failover. For each primary region of a plurality of primary regions, the failover service can then determine the regions that satisfy each rule of the list of rules and are available for failover. The failover service can then deliver this information to a client. The failover service can determine the regions that do not satisfy one or more of the rules from the list of rules and deliver this information to a client. The failover service can perform automatic remediation and client remediation to the unavailable failover regions. | 2021-09-30 |
20210306206 | SYSTEM FOR IMPLEMENTING A DATA PROTOCOL ENABLED APPLICATION - Novel tools and techniques are provided for implementing a DLP resource as a User managed cloud resource with compliance tools, automated service delivery, federate-able cloud single sign-on, and agile resource integration. A method for implementing a communication network for an Internet of Thing (IoT) application includes establishing a multi-path connection among data link protocol (DLP) nodes. One of the DLP nodes is an IoT device. Each DLP node includes a slow agent and a fast agent. A first DLP node determines a second DLP node has failed. The second DLP node is associated with a role in the communication network. The first DLP node transmits a DLP frame carrying the control message to the plurality of DLP nodes. The first DLP node re-establishes a connection with a third DLP node based on the control message. The third DLP node takes over the role of the second DLP node. | 2021-09-30 |
20210306207 | SYSTEMS AND METHODS FOR ROUTING DATA IN DISTRIBUTED ENVIRONMENTS - Described in detail herein are systems and methods for routing data in a distributed environment. A controller can maintain an inactive state. A terminal can receive a request associated with a physical object. The terminal can be communicatively coupled to a cloud computing system. The terminal can attempt to transmit the request to the cloud computing system. A router communicatively coupled to the controller and cloud computing system can attempt to initiate communication between the terminal and the cloud computing system in response to the terminal attempt to transmit the request to the cloud computing system. The router can route the request to the controller in response to failing to initiate communication between the terminal and the cloud computing system after specified amount of time. The controller can switch from an inactive state to an active state in response to receiving the request. | 2021-09-30 |
20210306208 | WEB HANDLING SYSTEM - A web handling system is described, including a plurality of web handling controllers and a web handling process logic controller networked to form a ring network. A processor of the web handling process logic controller being configured to determine whether a fault exists within the ring network, and responsive to determining that a fault exists within the ring network, to generate and send signals throughout the ring network to switch the configuration of the ring network to at least one linear network. | 2021-09-30 |
20210306209 | FAILURE DETERMINATION APPARATUS AND FAILURE DETERMINATION METHOD FOR RELATIVE POSITION ACQUISITION SYSTEM - An ECU in a failure determination apparatus receives a wireless LAN signal from a power-transmission-side wireless communication unit with a vehicle-side wireless communication unit and determines whether a relative position acquisition system fails based on whether predetermined expressions are established for the respective reception intensities of a low frequency signal at first to fourth power-transmission-side antennas, which are included in the wireless LAN signal. | 2021-09-30 |
20210306210 | METHOD AND SYSTEM TO IDENTIFY A SOURCE OF SIGNAL IMPAIRMENT - A method and system for managing performance of over a multimedia content distribution network (MCDN), such as a digital subscriber line network, involves receiving an indication of an impairment in network performance from an MCDN client. The MCDN node associated with the client may be identified and a community of MCDN clients coupled to the MCDN node may be further identified. Impairment information, representative of MCDN equipment, may be collected for each of the MCDN clients. Detailed network diagnostics and field service may be performed for MCDN clients based on a characterization of the impairment parameters. After remediation of the MCDN node, collection of the impairment information may be terminated. | 2021-09-30 |
20210306211 | METHOD AND APPARATUS FOR DETECTION OF NETWORK FUNCTION FAILURE AND RESTART IN A NETWORK ENVIRONMENT - Computer program products, methods, and apparatuses, for providing and implementing the efficient detection of network component failures and restart conditions are described. | 2021-09-30 |
20210306212 | SYSTEM AND METHOD FOR EXCHANGING CONFIGURATION INFORMATION BETWEEN TWO NODES IN A WIRELESS NETWORK - The present disclosure relates to a method and system for managing and exchanging configuration information between two nodes in a wireless network. In one embodiment, a method implemented on a first node is disclosed. The method comprises: generating a first message that comprises first configuration information associated with the first node; and transmitting the first message to a second node for exchanging configuration information with the second node, wherein the first node and the second node cooperate to serve at least one cell in a wireless network as a base station. | 2021-09-30 |
20210306213 | SYSTEMS AND METHODS FOR SECURE PROVISIONING OF SSH CREDENTIALS - Embodiments relate to systems and methods for securely provisioning login credentials to an electronic device on a network, e.g., a consumer premises device (CPE) device, such as, among other devices, a modem. The login credential may be used, for example, for securely provisioning and configuring a CPE device. | 2021-09-30 |
20210306214 | INDUSTRIAL INTERNET OF THINGS DEVICE PROVISIONING - Provisioning industrial internet of things (IIOT) devices arranged for deployment in disparate geographic locations includes grouping a subset of IIOT devices into a batch. Each IIOT device stores a system-wide unique identifier (SWUI) and first communication information that identifies a global computing server. The method includes recording with a first input system the SWUI of each IIOT device in the batch, generating a batch identifier, associating the batch identifier with the batch of IIOT devices or each IIOT device in the batch, and associating the batch identifier with customer information. The customer information is associated with second communication information, which identifies a customer-based computing server. The method includes receiving, at the global computing server, incoming communications from a selected IIOT device, and based on the SWUI, and retrieving the batch identifier. Based on the batch identifier, second communication information identifying the customer-based computing server is transmitted to the selected IIOT device. | 2021-09-30 |
20210306215 | NETWORK SLICE CONFIGURATION - Apparatuses and methods in a communication system are provided. A method comprises receiving a service request comprising service requirements; determining, based on the service request, service level specification of the request, the service level specification comprising performance parameters and network functions to support the requested service; normalizing the determined service level specification by scaling the performance parameters according into a given normalization model of the network to obtain normalized service level specification; determining, based on the network functions and the given normalization model, normalized performance capability of the network functions and a configuration of a network slice supporting the requested service; comparing the normalized service level specification to the normalized performance capability; and determining, based on the comparison, whether the requested service can be realized with the network slice, and if so, create the slice. | 2021-09-30 |
20210306216 | NETWORK CONFIGURATION DIAGRAM GENERATE METHOD AND RECORDING MEDIUM - A network configuration diagram generate method executed by a computer, the method includes identifying, in a predetermined system in which a plurality of virtual machines are used, a location where each of the plurality of virtual machines is located and a communication destination with which each of the plurality of virtual machines communicates; determining, for each change in a configuration of the predetermined system, a relationship of a communication distance between the plurality of virtual machines by using the location and the communication destination, the configuration indicating a relationship of the plurality of virtual machines; extracting a difference between the relationship of the communication distance before the configuration change and the relationship of the communication distance after the configuration change; and generating a network configuration diagram in which the extracted difference is indicated. | 2021-09-30 |
20210306217 | TECHNIQUES FOR DYNAMIC RATE-LIMITING - Systems and methods provide techniques for dynamic rate-limiting, such as techniques that utilize one or more of asynchronous rate-limiting, context-aware rate-limiting, and cost-aware rate-limiting. In one example, a method for asynchronous rate-limiting includes the steps of receiving a rate-limiting request for a service application; extracting one or more policy-defining parameters from the rate-limiting request; querying a local cache storage medium associated with the rate-limit decision node to identify one or more local rate-limiting policies associated with the rate-limiting request; determining, based on the one or more policy-defining parameters and the one or more local rate-limiting policies, a rate-limiting decision for the rate-limiting request; and transmitting the rate-limiting decision to the service application in response to the rate-limiting request. | 2021-09-30 |
20210306218 | INTELLIGENT POLICY CONTROL ENGINE FOR 5G OR OTHER NEXT GENERATION NETWORK - An intelligent network policy engine can be utilized to apply dynamic policy changes for microservices. For example, based on outlined service provider policies, user equipment state data, and/or network state data, the intelligent network policy engine can determine which microservices to use and/or what order to use the microservices to increase a performance of the network. The intelligent network policy engine can perform conflict resolution based on how network traffic should be treated in certain scenarios. | 2021-09-30 |
20210306219 | OPTIMUM RESOURCE ALLOCATION AND DEVICE ASSIGNMENT IN A MEC CLUSTER - A network device in a Multi-Access Edge Computing (MEC) cluster may receive a request for a service that requires use of a resource of a first type; and determine whether a resource utilization level, associated with the resource, at a MEC device in the MEC cluster exceeds a threshold. When the network device determines that the resource utilization level exceeds the threshold, the network device may determine whether a candidate MEC device is available within the MEC cluster to provide a resource of the first type; and enable the service to be provided. | 2021-09-30 |
20210306220 | CONFIGURATION FOR USER EQUIPMENT INTRA-FREQUENCY MEASUREMENT OF SOUNDING REFERENCE SIGNALS - Certain aspects of the present disclosure relate to wireless communications, and more particularly, to techniques for a UE to measure sounding reference signal (SRS) transmission from another UE. The measurements results may be used, for example, by a serving cell for interference mitigation purposes. For example, the disclosed techniques may include a first UE receiving a configuration for measuring SRS transmitted by a second UE; determining a first bandwidth part (BWP) associated with the configuration; determining a frequency reference point for the SRS to be measured; determining SRS measurement resources, based on one or more parameters of the configuration and the frequency reference point; and measuring SRS transmitted by the second UE on the determined SRS measurement resources. | 2021-09-30 |
20210306221 | PROFILE GENERATION FOR BANDWIDTH MANAGEMENT - Profile generation for bandwidth management is provided. A content provider receive a notification regarding a new application or media file. Profile information for the application or media file is determined. Such profile information includes information regarding consumption of bandwidth throughout a time period of usage of the application or media file. The profile may be stored in memory in association with the application or media file. A request is received from a user device regarding access to the application or media file. Access to the requested application or media is provided to the user device; the profile is also provided to the user device for use in evaluating whether bandwidth requirements of the application or media file exceeds an available network bandwidth of a network of the user device. | 2021-09-30 |
20210306222 | Self-Healing and Dynamic Optimization of VM Server Cluster Management in Multi-Cloud Platform - Virtual machine server clusters are managed using self-healing and dynamic optimization to achieve closed-loop automation. The technique uses adaptive thresholding to develop actionable quality metrics for benchmarking and anomaly detection. Real-time analytics are used to determine the root cause of KPI violations and to locate impact areas. Self-healing and dynamic optimization rules are able to automatically correct common issues via no-touch automation in which finger-pointing between operations staff is prevalent, resulting in consolidation, flexibility and reduced deployment time. | 2021-09-30 |