41st week of 2020 patent applcation highlights part 71 | ||
Patent application number | Title | Published |
---|---|---|
20200322103 | Beam Search Pilots for Paging Channel Communications - The present disclosure describes techniques and systems for beam search pilots for paging channel communications. In some aspects, a user device receives, from a base station of a wireless network, a beam search pilot on a beam. The user device determines that a signal quality of the beam search pilot meets a signal quality threshold. Based on this determination, the user device transmits, to the base station, an indication that the beam search pilot meets the signal quality threshold. The user device then receives a paging channel communication on the beam provided by the base station. | 2020-10-08 |
20200322104 | System and Method for OFDMA Tone Allocation in Next Generation Wi-Fi Networks - An orthogonal frequency division multiple access (OFDMA) frame tone allocation includes a 256 tone payload consisting of 228 data and pilot tones and 28 null tones. The 28 null tones consist of guard tones and at least one direct current (DC) tone. In one example, the 256 tone payload consists of 224 data tones, 4 common pilot tones, and 28 null tones. In another example, the 256 tone payload consists of 222 data tones, 6 common pilot tones, and 28 null tones. In yet another example, the 256 tone payload may consist of 220 data tones, 8 common pilot tones, and 28 null tones. The OFDMA frame may be a downlink OFDMA frame or an uplink OFDMA frame. | 2020-10-08 |
20200322105 | TRANSMISSION APPRATUS AND TRANSMISSION METHOD - A transmission apparatus of the present disclosure comprises a transmitter that transmits a Trigger Frame for allocating resources for Uplink Multi User (UL MU) transmission, the Trigger Frame comprising a common information field that includes a type subfield indicating one of a plurality of trigger types, wherein the plurality of trigger types includes a first trigger type indicating a basic trigger used for soliciting any type of response frame from a recipient terminal station a second trigger type indicating a specific trigger used for soliciting a specific type of UL MU response frame from a plurality of terminal stations; and a receiver that receives the specific type of UL MU response frame from the plurality of terminal stations when the type subfield indicates the second trigger type. | 2020-10-08 |
20200322106 | PARAMETER CONFIGURATION METHOD AND RELATED PRODUCTS - Disclosed in the embodiments of the present application are a parameter configuration method and related products, the method includes: receiving, by a terminal, at least one preset parameter of a phase tracking reference signal PT-RS from a network device, wherein the at least one preset parameter of the PT-RS is configured for at least one bandwidth part BWP of the terminal, and the at least one preset parameter is used for indicating resource information that needs to be used by the terminal when the terminal sends or receives the PT-RS on the at least one BWP. | 2020-10-08 |
20200322107 | INTEGRATED CIRCUIT - A Method of scrambling reference signals, device and user equipment using the method are provided. In the method, a plurality of layers of reference signals assigned on predetermined radio resource of a plurality of layers of resource blocks with the same time and frequency resources are scrambled, the method comprising: an orthogonalizing step of multiplying each layer of reference signal selectively by one of a plurality of orthogonal cover codes (OCCs) with the same length wherein the OCC multiplied to a first layer of reference signal can be configured as different from those multiplied to other layers of reference signals; and a scrambling step of multiplying all of symbols obtained from the OCC multiplied to each of the other layers of reference signals by a symbol-common scrambling sequence wherein the symbol-common scrambling sequences can be different from each other for reference signals multiplied by the same OCC. | 2020-10-08 |
20200322108 | System and Method for SRS Switching, Transmission, and Enhancements - User Equipments (UEs) may be assigned a set of aggregated component carriers for downlink carrier aggregation and/or carrier selection. Some UEs may be incapable of transmitting uplink signals over all component carriers in their assigned set of aggregated component carriers. In such scenarios, a UE may need to perform SRS switching in order to transmit SRS symbols over all of the component carriers. Embodiments of this disclosure provide various techniques for facilitating SRS switching. For example, a radio resource control (RRC) message may be used to signal a periodic SRS configuration parameter. As another example, a downlink control indication (DCI) message may be used to signal an aperiodic SRS configuration parameter. Many other examples are also provided. | 2020-10-08 |
20200322109 | METHOD OF DERIVING QCL ASSUMPTION IN MULTI-PANEL TRANSMISSION AND RELATED DEVICE - A method of deriving a Quasi-CoLocation (QCL) assumption for a user equipment (UE) in multi-panel transmission is disclosed. The method comprises obtaining a plurality of control resource set (CORESET) groups from a network of the wireless communication system, determining a default QCL assumption for demodulation reference signal (DM-RS) port(s) of at least one physical downlink share channel (PDSCH), reception scheduled by a scheduling physical downlink control channel (PDCCH) according to a CORESET of one of the plurality of CORESET groups when a time offset between a reception of downlink control information (DCI), in the scheduling PDCCH and the at least one PDSCH reception is less than a threshold, wherein at least one of the plurality of CORESET groups includes at least one CORESET for indicating a QCL assumption, and applying the default QCL assumption for reception of the DM-RS port(s) of the at least one PDSCH. | 2020-10-08 |
20200322110 | DATA TRANSMISSION METHOD, DEVICE, AND SYSTEM - A data transmission method, applied to a base station, includes: acquiring target information for indicating transmission direction from pre-configured indication unit allocation information, the target information for indicating transmission direction being configured for a terminal to determine transmission directions of uplink data transmission on an uplink slot and downlink data transmission on a downlink slot in a frequency division duplexing (FDD) mode; and sending the target information for indicating transmission direction to the terminal, to cause the terminal to determine respective transmission directions of the uplink slot and the downlink slot in the FDD mode according to the target information for indicating transmission direction. | 2020-10-08 |
20200322111 | Dynamic Flow Control In AMPDU Aggregation In Wireless Communications - A first communication apparatus dynamically controls data flow in aggregated medium access control (MAC) protocol data unit (AMPDU) aggregation by negotiating an initial block acknowledgement (Block-ACK) window size for the AMPDU aggregation with the second communication apparatus. The first communication apparatus adjusts the AMPDU aggregation during subsequent communication with the second communication apparatus by creating a Block-ACK frame with a reserved field, which has a value indicating a change to the AMPDU aggregation, and then transmitting the Block-ACK frame to the second communication apparatus. | 2020-10-08 |
20200322112 | METHOD AND APPARATUS FOR MANAGING CONTENTION WINDOW IN WIRELESS COMMUNICATION SYSTEM - A base station is provided. The base station transmits multiple data in a first subframe, receives response signals corresponding to the multiple data, determines a ratio of negative acknowledge (NACK) signals to the response signals, and adjusts or maintains a contention window based on the determined ratio. The present disclosure relates to communication schemes for combining 5th-generation (5G) communication systems with internet of things (IoT) technology to support higher data transmission rate as post-4th-generation (post-4G) systems and systems for the same. The present disclosure may be used in intelligent services (e.g., smart home, smart building, smart city, smart car, or connected car, health-care, digital education, retail business, security and safety-related services, etc.) based on the 5G communication technology and IoT-related techniques. | 2020-10-08 |
20200322113 | METHODS AND USER EQUIPMENT FOR HANDLING COMMUNICATION - Embodiments herein show a method performed by a user equipment for handling communication via a set of serving cells comprising a first serving cell and a second serving cell of a communication network. The user equipment receives a grant on a first serving cell, wherein the grant comprises a first identifier identifying Channel State Information Reference Signal (CSI-RS) resources of the first serving cell. Furthermore, the user equipment calculates a first CSI report for the first serving cell using the CSI-RS resources identified by the first identifier; and calculates a second CSI report for a second serving cell, using CSI-RS resources of the second serving cell identified by a second identifier, the second identifier being received previously in a grant on the second serving cell. The user equipment then transmits the first and second CSI reports to a network node serving the first serving cell. | 2020-10-08 |
20200322114 | COMMUNICATION APPARATUS AND CONTROL SIGNAL MAPPING METHOD - A communication apparatus includes a receiver and circuitry. In operation, the receiver receives a Demodulation Reference Signal (DMRS) and receives downlink control information indicating a mapping pattern of the DMRS from a plurality of mapping patterns, and the circuitry determines the mapping pattern based on the downlink control information. The plurality of mapping patterns include a first mapping pattern and a second mapping pattern. Resource elements used for the DMRS of the second mapping pattern are same as a part of resource elements used for the DMRS of the first mapping pattern. A number of the resource elements used for the DMRS of the first mapping pattern is larger than a number of the resource elements used for the DMRS of the second mapping pattern. | 2020-10-08 |
20200322115 | Secondary Cell Deactivation in a Wireless Device and a Base Station - A wireless device receives from a base station at least message that comprises configuration parameters of a plurality of cells. The plurality of cells comprises a plurality of secondary cells. The plurality of cells are grouped into a plurality of groups that comprise a primary group comprising a primary cell with a primary control channel, and a secondary group comprising a plurality of secondary cells. The plurality of secondary cells comprise a first secondary cell with a secondary control channel, and a deactivation timer value for a deactivation timer of the first secondary cell. The wireless device keeps the first secondary cell active in response to: the deactivation timer with the deactivation timer value being expired in a subframe, and a secondary cell in the secondary group being activated in the subframe. | 2020-10-08 |
20200322116 | Bandwidth Part Management in a Secondary Cell of a Wireless Device - A wireless device receives configuration parameters of a cell. The cell comprises bandwidth parts (BWPs). The BWPs comprise a first active BWP. The configuration parameters comprise a timer value for a BWP inactivity timer. A first downlink control information (DCI) indicating an activation of the cell is received. In response to the first DCI indicating the activation of the cell: the first active BWP is activated; and the BWP inactivity timer is started based on the timer value. During the BWP inactivity timer running, a second DCI is received via the first active BWP. | 2020-10-08 |
20200322117 | COMPONENT CARRIER (DE)ACTIVATION IN COMMUNICATION SYSTEMS USING CARRIER AGGREGATION - This invention relates to the proposal of component carrier (de)activation message that is allowing a activation or deactivation of one or more component carriers in the uplink or downlink. Furthermore, the invention relates to the use of the new component carrier (de)activation message in methods for (de)activation of downlink component carrier(s) configured for a mobile terminal, a base station and a mobile terminal. To enable efficient and robust (de)activation of component carriers, the invention proposes to use component carrier-specific or cell-RNTI(s) for the scrambling of the CRC of the component carrier (de)activation message, and to explicitly indicate the intended recipient of the component carrier (de)activation message in a corresponding field in the message. Furthermore, the invention further proposes different designs of the component carrier (de)activation message and further uses thereof, so as to trigger CQI reporting and/or SRS transmission by a mobile terminal. | 2020-10-08 |
20200322118 | METHODS TO SUPPORT CONFIGURED GRANT TRANSMISSION AND RETRANSMISSION - In one aspect there is a method performed by a wireless device, WD. The method includes: (1) the WD receiving a PUSCH-Config IE from a base station, wherein the PUSCH-Config IE includes a first set of PUSCH configuration parameters, wherein the first set of PUSCH configuration parameters includes at least one of the following: txConfig, maxRank, or codebookSubset; and (2) the WD transmitting data on the PUSCH corresponding to a configured grant using the first set of PUSCH configuration parameters. | 2020-10-08 |
20200322119 | USER TERMINAL AND RADIO COMMUNICATION METHOD - The present invention is designed so that, in a future radio communication system that accommodates multiple user terminals having different numerologies, these multiple user terminals can transmit UL reference signals properly. According to the present invention, a user terminal receives information related to an uplink (UL) reference signal, and controls transmission of the UL reference signal in a specific period based on the information related to the UL reference signal. In this specific period, UL reference signals of a plurality of user terminals where different numerologies are configured are multiplexed. | 2020-10-08 |
20200322120 | HANDLING COLLISIONS BETWEEN MULTIPLE ACKNOWLEDGEMENT TRANSMISSIONS AND AN UPLINK DATA TRANSMISSION - Methods, systems, and devices for wireless communications are described. A base station may transmit a downlink control transmission and multiple downlink data transmissions to a user equipment (UE). The UE may schedule an uplink data transmission based on the downlink control transmission and may schedule transmission acknowledgement messages based on the multiple downlink data transmissions. The UE may identify that the scheduled uplink data transmission overlaps with the scheduled transmission acknowledgement messages. The UE may generate one or more acknowledgement codebooks for transmission of the multiple transmission acknowledgment messages and may multiplex the one or more acknowledgement codebooks with the uplink data transmission on the uplink data channel. In some cases, the UE may multiplex the codebooks based on determining that a set of timing thresholds are satisfied by an earliest of the multiple transmission acknowledgement messages and the uplink data transmission with respect to one or more downlink transmissions. | 2020-10-08 |
20200322121 | APPARATUS AND METHOD FOR ESTIMATING SYNCHRONIZATION OF BROADCAST SIGNAL IN TIME DOMAIN - A method and an apparatus for estimating synchronization of a broadcast signal in a time domain using a synchronization estimation signal through steps of: performing a correlation operation using a correlation window on a plurality of synchronization estimation signals separated to a plurality of paths and outputting a plurality of correlated signals; delaying the plurality of correlated signals to output a plurality of delayed signals; and estimating the synchronization using the plurality of delayed signals are provided. | 2020-10-08 |
20200322122 | DATA TRANSMISSION DEVICE AND DATA TRANSMISSION METHOD - A data transmission device includes an embedded clock-scheme differential signal transmission circuit and an in-phase signal transmission circuit. The data transmission device accepts transmission-object data and a transmission instruction for the data. Then, the data transmission device determines between the embedded clock-scheme differential signal transmission circuit and the in-phase signal transmission circuit, by which circuit to transmit the data, based on at least either one of the data and the transmission instruction. The data transmission device causes the determined circuit to transmit the data. | 2020-10-08 |
20200322123 | SENSOR COMMUNICATION CONTROL SHAPED FOR EMC COMPLIANCE - A restraint control module is provided in this disclosure. The restraint control module is configured to communicate a sync pulse to a sensor. The control module may include a sync pulse driver circuit and a memory. The memory may store the waveform profile of a sync pulse. The sync pulse driver circuit generates a sync pulse in response to the waveform profile stored in the memory. The sync pulse may be transmitted to one or more sensors. The waveform profile stored in the memory may be derived from a sync pulse with reduced electro-magnetic emissions by applying spectrum analysis. | 2020-10-08 |
20200322124 | ENCRYPTED INFORMATION MATCHING DEVICE, ENCRYPTED INFORMATION MATCHING METHOD, AND RECORDING MEDIUM HAVING ENCRYPTED INFORMATION MATCHING PROGRAM STORED THEREON - An encrypted information matching device | 2020-10-08 |
20200322125 | DISTRIBUTED COMPUTATION METHOD AND SYSTEM - The computation efficiency of distributed secure implementation of the computation of a (sum of) products of values Vi, Wi from different servers on a distributed computing system is improved by generation of coefficients of a first polynomial and second polynomial by a first server. The first polynomial P has all numbers Xi from a first data set on the first server as roots. The second polynomial Q has values Q(Xi)=Vi for the numbers Xi from the first data set. The first device transmits coefficients of the first and second polynomial P, Q to a second server in encrypted form. The second sever computes encrypted values and and the second server may compute a sum encrypted sum of the products from the encrypted product | 2020-10-08 |
20200322126 | USING ERROR DETECTION BITS FOR CRYPTOGRAPHIC INTEGRITY AND AUTHENTICATION - In some examples, a method includes receiving a plaintext message including plaintext data and error detection bits. The method also includes encrypting the plaintext message based on a feedback algorithm to generate an encrypted message including a set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication. The set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication can replace the error detection bits in whole or in part. A receiver can confirm the cryptographic integrity and the cryptographic authentication of the encrypted message by decrypting the set of encrypted bits. | 2020-10-08 |
20200322127 | DYNAMIC MASKING - A circuit includes a cipher accessing a plurality of read-write memory units configured to handle data tables obtained from a modified mask; wherein the modified mask is being determined from an initial mask and a random value, the random value selecting one or more modifications of the initial mask amongst a plurality of predefined modifications including permutation operations. Developments of the invention describe the use of mathematically optimal or equivalent masks; the use of random values; a range of permutation operations comprising offset shifting and/or rotation and/or XOR operations and/or coprime construction; the use of round masks; the use of a Physically Unclonable Function; the refresh or update of modified masks and/or round masks; and verifications of the optimality and/or integrity of masks. System features (e.g. CPU, co-processor, local and/or remotely accessed external memory storing masks, volatile memory) and computer program products are described. | 2020-10-08 |
20200322128 | ZERO-KNOWLEDGE PROOF FOR BLOCKCHAIN ENDORSEMENT - An example operation may include one or more of receiving one or more responses to a storage request for a blockchain from one or more endorser nodes of the blockchain, extracting transaction data of the storage request included in the one or more responses, generating a zero-knowledge proof of endorsement based on the extracted transaction data and the one or more responses, and transmitting the zero-knowledge proof to a blockchain node for inclusion within a data block among a hash-linked chain of data blocks. | 2020-10-08 |
20200322129 | PROCESSING BLOCKCHAIN DATA BASED ON SMART CONTRACT OPERATIONS EXECUTED IN A TRUSTED EXECUTION ENVIRONMENT - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing blockchain data under a trusted execution environment (TEE). One of the methods includes receiving, by a blockchain node, a request to execute one or more software instructions in a TEE executing on the blockchain node; determining, by a virtual machine in the TEE, data associated with one or more blockchain accounts to execute the one or more software instructions based on the request; traversing, by the virtual machine, a global state of a blockchain stored in the TEE to locate the data; and executing, by the virtual machine, the one or more software instructions based on the data. | 2020-10-08 |
20200322130 | Decentralized SON and RAN Management Using Blockchain - Systems, methods and computer software are disclosed for decentralizing Self Organizing Network (SON) and Radio Access Network (RAN) management using blockchain. In one embodiment a method is disclosed, comprising: creating, by a HetNet Gateway (HNG), a blockchain genesis block; creating, by the HNG, a datastream; receiving, at the HNG, a configuration request from a Converged Wireless System (CWS); adding, by the HNG, a blockchain block for the CWS; granting permission for the CWS to send and receive data from the blockchain; and sending, by the HNG, a configuration response to the CWS. | 2020-10-08 |
20200322131 | SYSTEM AND METHOD FOR BLOCKCHAIN-BASED DEVICE AUTHENTICATION BASED ON A CRYPTOGRAPHIC CHALLENGE - A system for blockchain-based authentication comprises an interface and a processor configured to (i) receive, by a first device, a command from a second device, where the first device is associated with a first trust certificate, (ii) receive a second trust certificate from the second device, (iii) communicate a cryptographic challenge using a public key of the second device to the second device, (iv) receive a response to the cryptographic challenge from the second device, (v) check whether the response matches with a predetermined correct response or not, and (vi) authenticate the second device and execute the commend received from the second device only if the response matches with the predetermined correct response. | 2020-10-08 |
20200322132 | SYSTEM AND METHOD FOR AUTHENTICATING OFF-CHAIN DATA BASED ON PROOF VERIFICATION - Determining when and/or how to execute a program or script published to a blockchain network may rely on data that is external to the blockchain (i.e., external data) such as data about the real-world state and events. A prover (e.g., a node of the blockchain network) may perform one or more computations on behalf of a client, such as the execution of the program. To execute the program properly, the prover may rely on external data, which the prover may obtain from a data provider that has a trust relationship with the client (e.g., the client accepts as valid data provided by a trusted data provider). Systems and methods described herein may be utilized by a prover to provide cryptographically verifiable assurances of the authenticity of input data purportedly obtained from a data provider, the input data utilized in the execution of a program or script published to a blockchain network. An example of a blockchain network is a Bitcoin-based network. | 2020-10-08 |
20200322133 | SYSTEM FOR CHARACTERIZATION AND TRACKING OF ELECTRONIC DATA IN A NETWORKED ENVIRONMENT USING COHESIVE INFORMATION UNITS - Embodiments of the present disclosure provide a system for data characterization and tracking via cohesive information units. In particular, the system may be structured to define a cohesive information unit (“CIU”) which may serve as the fundamental functional unit that serves as the basis for data electronically stored, transferred, modified, and/or copied within computing systems. Each CIU may be electronically associated with metadata which serves to identify the CIU as the CIU is stored and/or in motion. Rather than allowing applications and/or users to change the data within the CIU directly, the system may write subsequent CIU's to reflect proposed changes by the applications and/or users. In this way, the system provides a secure and reliable way to maintain authenticity of data within the entity system. | 2020-10-08 |
20200322134 | Onboarding Software on Secure Devices to Generate Device Identities for Authentication with Remote Servers - Systems, methods and apparatuses to configure a computing device for identification and authentication are described. For example, a key management server (KMS) has a certificate generator and is coupled to a registration portal. A copy of secret implemented into a secure component during its manufacture in a factory is stored in the KMS. After leaving the factory, the component can be assembled into the device. The portal receives registration of the component and a hash of software of the device. The certificate generator generates, independent of the device, public keys of the device, using the copy of the secret stored in the KMS and hashes of the software received via the registration portal, and then sign a digital certificate of the public key of the device. Authentication of the device can then be performed via the private key of the device and the certified public key. | 2020-10-08 |
20200322135 | CRYPTOGRAPHIC METHODS AND SYSTEMS FOR AUTHENTICATION IN CONNECTED VEHICLE SYSTEMS AND FOR OTHER USES - Cryptographic authentication is described to improve security in connected vehicle systems and other applications. Identity Based Cryptography and threshold cryptography are among techniques used in some embodiments. | 2020-10-08 |
20200322136 | DATABASE TRANSACTION GUARANTEED COMMITMENT - An example operation may include one or more of receiving, by a committer node or peer of a blockchain network, a block comprising a lock request that locks a partial state of a smart contract, the lock request comprising a submitter identifier and a lock delay, the committer node or peer configured to process blocks of transactions, the method further comprising, validating the lock request, committing transactions comprising the submitter identifier with no delay, and committing transactions not comprising the submitter identifier after the lock delay. | 2020-10-08 |
20200322137 | SELF CERTIFICATION OF DEVICES FOR SECURE TRANSACTIONS - Embodiments of the invention are directed to techniques for enabling self-certification of an electronic device to result in the issuance of a security certificate that the electronic device may use to authenticate itself to another entity. In some embodiments, the device is caused to initiate the self-certification process upon determining that a status of a current security certificate is no longer valid. In some embodiments, an electronic device may communicate with a certificate authority, which may generate a set of policy data that indicates permissions for the electronic device. The electronic device may then generate an electronic record to be associated with the security certificate, which it may sign using a private key. The certificate authority may then verify the authenticity of the signed electronic record using a public key associated with the electronic device. The electronic record may be appended to some collection of records. | 2020-10-08 |
20200322138 | ENCRYPTION BY DEFAULT IN AN ELASTIC COMPUTING SYSTEM - Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context. | 2020-10-08 |
20200322139 | DISTRIBUTED KEY CACHING FOR ENCRYPTED KEYS - Methods, systems, and devices for distributed caching of encrypted encryption keys are described. Some multi-tenant database systems may support encryption of data records. To efficiently handle multiple encryption keys across multiple application servers, the database system may store the encryption keys in a distributed cache accessible by each of the application servers. To securely cache the encryption keys, the database system may encrypt (e.g., wrap) each data encryption key (DEK) using a second encryption key (e.g., a key encryption key (KEK)). The database system may store the DEKs and KEKs in separate caches to further protect the encryption keys. For example, while the encrypted DEKs may be stored in the distributed cache, the KEKs may be stored locally on application servers. The database system may further support “bring your own key” (BYOK) functionality, where a user may upload a tenant secret or tenant-specific encryption key to the database. | 2020-10-08 |
20200322140 | IMMUTABLE BROADCASTING QUEUES - An example operation may include one or more of receiving, by a broadcast server node, data from a plurality of data provider nodes; and executing, by the broadcast server node, a smart contract to: encrypt the data with encryption keys; generate a broadcast queue based on the encrypted data; and assign a subset of consumer nodes authorized to receive the encrypted data of the broadcast queue. | 2020-10-08 |
20200322141 | KEY EXCHANGE SYSTEM, TERMINAL DEVICE, KEY EXCHANGE METHOD, PROGRAM, AND RECORDING MEDIUM | 2020-10-08 |
20200322142 | Method and Apparatus for Achieving Fine-Grained Access Control with Discretionary User Revocation Over Cloud Data - A method for a data owner to enforce attribute-based and discretionary access control over a cloud-based data store by specifying an access policy, creating a plurality of users with attributes that satisfy the access policy, and revoking one or more of the plurality of users by embedding their respective identities as revoked into a ciphertext, whereby only those of the plurality of users whose attributes satisfy the access policy and that are not revoked can decrypt the ciphertext. | 2020-10-08 |
20200322143 | Enriching local cryptoprocessor queries with sdn augmented information - The present technology discloses a method for enriching local crypto-processor queries with software-defined networking augmented information, comprising sending, from a virtual machine installed on a physical host, a request for trust verification data; augmenting, by an identity verification system on the physical host, the request for trust verification data with encrypted information from an external entity; receiving, at a trusted processor module on the physical host, the request for trust verification data; receiving, at the virtual machine, the trust verification data; and assessing, at the virtual machine, a state of the physical host based on the trust verification data. | 2020-10-08 |
20200322144 | UNIQUE IDENTIFIERS BASED ON QUANTUM EFFECTS - A method is provided for determining a unique identifier of a device, the device including a quantum tunnelling barrier unique to the device. The method comprises applying a potential difference across the quantum tunnelling barrier, the potential difference sufficient to enable tunnelling of charge carriers through the quantum tunnelling barrier. The method further comprises measuring an electrical signal, the electrical signal representative of a tunnelling current through the quantum tunnelling barrier, the tunnelling current characteristic of the quantum tunnelling barrier. The method further comprises determining, from the measured electrical signal, a unique identifier for the device. Related apparatuses, systems, computer-readable media and methods are also provided herein. | 2020-10-08 |
20200322145 | AUTHENTICATION OF NETWORK DEVICES USING ACCESS CONTROL PROTOCOLS - Systems, methods, and computer-readable media for authenticating access control messages include receiving, at a first node, access control messages from a second node. The first node and the second node including network devices and the access control messages can be based on RADIUS or TACACS+ protocols among others. The first node can obtain attestation information from one or more fields of the access control messages determine whether the second node is authentic and trustworthy based on the attestation information. The first node can also determine reliability or freshness of the access control messages based on the attestation information. The first node can be a server and the second node can be a client, or the first node can be a client and the second node can be a server. The attestation information can include Proof of Integrity based on a hardware fingerprint, device identifier, or Canary Stamp. | 2020-10-08 |
20200322146 | Protecting Sensors and Emitters - This invention pertains to protecting communications between multiple sensors and emitters or securing data transmission between multiple computers or multiple vehicles. This invention provides a secure method for two or more parties to communicate privately, even when the processor has malicious malware or there is a backdoor in the main processor. In some embodiments, the energy received by the sensor is encrypted before it undergoes an analog to digital conversion. In some embodiments, the encryption occurs inside the sensor. In some embodiments, the encryption hardware is a part of the sensor and creates unpredictable energy changes that interact with the sensor. In some embodiments, there are less than 40 sensors in a communication system and in other embodiments there are more than 1 billion sensors. In some embodiments, the invention provides a method for the sensors of a network of self-driving cars to communicate securely. | 2020-10-08 |
20200322147 | METHOD FOR GENERATING PUBLIC KEY AND SECRET KEY BASED ON MODULE-WAVY AND MODULE-LWR AND METHOD OF ENCRYPTION AND DECRYPTION USING THE KEYS - The computer-implemented method for generating a public key and a secret key of the present disclosure comprises determining, by a processor, the secret key (s) by sampling from a distribution over {−1, 0, 1} | 2020-10-08 |
20200322148 | METHOD AND APPARATUS FOR AUTHENTICATION AND ENCRYPTION SERVICE EMPLOYING UNBREAKABLE ENCRYPTION - Qwyit® Authentication and Encryption Service serves as a direct replacement of Transport Layer Security. Applications can place a small code segment within their communications protocol, resulting in authenticated and encrypted message traffic with the features of TLS while adding additional improvements as set forth herein. QAES provides a direct next generation replication and enhancement of the current, only global secure communications framework. QAES provides the same features, benefits, authentication (embedded) and data security (stream cipher) for communications traffic using the Qwyit® Directory Service key store. The combination of features and properties provide a simple, straightforward way for any application to incorporate secure communications. The unique, superior Qwyit® protocol delivers where TLS fails: embedded security without any need for additional bandwidth, processing power or cumbersome user requirements. QAES shows Qwyit® can provide secure communications within the network tolerances for insecure communications. QAES easily allows any client/server or cloud-based application to add TLS-like authentication and encryption. The present invention includes a Qwyit® Directory Server application that can be run on, or added to, any current communications server (web, file, comms, app, DB, etc.), as well as client code for easy insertion into the communications protocol/processing of a connected device/app. | 2020-10-08 |
20200322149 | ELECTRONIC CHIP WITH COMMUNICATION INTERFACES - An electronic chip with a communication interface is disclosed. In an embodiment, an electronic device includes an electronic chip having a plurality of ISO/IEC 7816 standardized interfaces. | 2020-10-08 |
20200322150 | Applying Attestation Tokens to The Intermediate System to Intermediate System (ISIS) Routing Protocol - In one embodiment, a method includes receiving an ISIS hello message including an attestation token from a second network apparatus, determining that the attestation token is valid for the second network apparatus at a current time, establishing an adjacency to the second network apparatus in response to the determination, computing, based at least on the attestation token, a trust level for a first link from the first network apparatus to the second network apparatus and a trust level for first prefixes associated with the first link, and sending an LSP comprising the trust level for the first link and the trust level for the first prefixes to neighboring network apparatuses, where the trust level for the first link and the trust level for the prefixes are used by the network apparatuses in the network to compute a routing table of the network. | 2020-10-08 |
20200322151 | APPARATUS AND METHODS FOR SECURE ACCESS TO REMOTE CONTENT - System comprising an authorisation server; a client device communicably coupled to the authorisation server and configured to execute an application program; and a remote server communicably coupled to the client device for providing an application feature to the application program. The application program is configured to, in response to receiving a user request to use an application feature: access a first private key; and transmit an access request signed with the first private key to the authorisation server. The authorisation server is configured to issue a signed security token signed with a second private key to the application program in response to receiving the signed access request. The signed security token has a finite lifetime within which the application program can access the requested application feature using the signed security token. The application program is configured to access the application feature from the remote server using the signed security token. | 2020-10-08 |
20200322152 | RELATING TO IDENTITY AUTHENTICATION AND VALIDATION - There is provided an authentication system for validating identity credentials of a user attempting to access a resource provided by a remote resource provision system. The authentication system includes an input configured to receive, from the resource provision system, an authentication request comprising a cryptographic representation of digital identity data of the user and an associated token identifier, where the digital identity data comprises at least one image of an identity credential of the user. The system also includes a processor configured to: determine a pre-stored cryptographic identifier corresponding to the token identifier; and compare the received cryptographic representation with the pre-stored cryptographic identifier. The system further includes an output configured to transmit, to the remote resource provision system and in response to determining a match between the received cryptographic representation and the pre-stored cryptographic identifier, an authentication confirmation indicating successful validation of the digital identity data. | 2020-10-08 |
20200322153 | BLOCKCHAIN-BASED PATROL INSPECTION PROOF STORAGE METHOD, APPARATUS, AND ELECTRONIC DEVICE - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based storage of patrol inspection proof are provided. One of the methods includes: receiving proof information of patrol inspection at a patrol inspection site; obtaining one or more operating environment parameters of the mobile terminal at a time of the patrol inspection, wherein the one or more operating environment parameters comprise at least location information and sensor data of the mobile terminal; performing credibility verification on the patrol inspection site based on the proof information, the location information, and the sensor data using an algorithm model based on labeled identification information, labeled operating environment parameters, and historical attendance information; and in response to the credibility verification being successful, uploading verification information associated with the proof information for storing in a blockchain. | 2020-10-08 |
20200322154 | METHODS AND SYSTEMS FOR ENHANCING PRIVACY AND EFFICIENCY ON DISTRIBUTED LEDGER-BASED NETWORKS - One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy, efficiency and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy and efficiency to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks. | 2020-10-08 |
20200322155 | BIOMETRIC DIGITAL SIGNATURE GENERATION FOR IDENTITY VERIFICATION - Systems, methods, and apparatus for biometric digital signature generation for identity verification are disclosed. In one or more embodiments, a method for identity verification of a user comprises sensing, by at least one sensor, biometric information from the user. The method further comprises generating, by a sensor device, biometric data from the biometric information. Also, the method comprises hashing, by the user device utilizing a fuzzy hash algorithm or a hash algorithm (i.e. a non-fuzzy hash algorithm), at least a portion of the biometric data to generate a biometric digital signature for the user. In addition, the method comprises comparing, by a verification node, the biometric digital signature to a previous biometric digital signature for the user. Further, the method comprises verifying, by the verification node, the user when the verification node determines that the biometric digital signature is identical to the previous biometric digital signature for the user. | 2020-10-08 |
20200322156 | BIOSHARES: APPLY SHAMIR SECRET SHARING TO SECURE FINGERPRINT IN THE CLOUD - A secure fingerprint identification system and method, includes storing n shares of transformed gallery pair tables for each person into n cloud computer systems, each of the transformed gallery pair tables is generated by transforming first biometric input into first transformed data, determining an integer part and a fraction part using the first transformed data, splitting the integer part into the n shares and determining a threshold number. Data for a probe pair table is used to obtain a second biometric input, which is transformed into second transformed data. A probe integer part and a probe fraction part are determined using the second transformed data. The threshold number of the gallery pair tables is downloaded from the clouds. The integer part is reconstructed from the threshold shares. Matching is performed including exactly matching the probe integer part and the reconstructed integer part and matching the fraction parts within a threshold. | 2020-10-08 |
20200322157 | BIOMETRIC IDENTITY VERIFICATION SYSTEMS, METHODS AND PROGRAMS FOR IDENTITY DOCUMENT APPLICATIONS AND RENEWALS - An automated identity verification computing device, system and method receives an encrypted renewal request from a user computing device including a biometric value, a digital passport object identifier, and request data. The computing device, system and method retrieves trusted biometric data based on the digital passport object identifier from an identity database, determine a verification score based on the trusted biometric data and the biometric value, and generates a renewal package including the verification score, the digital passport object identifier, and the request data. The computing device, system and method transmit the renewal package to a sponsoring authority computing device. | 2020-10-08 |
20200322158 | METHOD AND APPARATUS FOR DETERMINING TRUST STATUS OF TPM, AND STORAGE MEDIUM - This application discloses a method and an apparatus for determining a trust status of a TPM, and a storage medium, and pertains to the field of data security technologies. The method includes: sending, by a verifier ( | 2020-10-08 |
20200322159 | METHOD FOR INDEX-BASED AND INTEGRITY-ASSURED SEARCH IN A BLOCKCHAIN - The present invention relates to methods for a blockchain search system, and particularly, the present invention relates to methods for assuring the data integrity on blockchain hybrid storage. Furthermore, the present invention provides a cost-efficient update scheme to maintain the on-chain index and authenticated data structure and is efficient and scalable under various operational parameters. | 2020-10-08 |
20200322160 | INTEGRITY PROTECTION - A message authentication code, for a message transmitted and received over a communications network, is formed by applying inputs to an integrity algorithm acting on the message. The inputs comprise: an integrity key; a value indicating a transfer direction; and a frame-dependent integrity input, wherein the frame-dependent integrity input is a frame-dependent modulo count value that also depends on a random value and on a frame-specific sequence number. | 2020-10-08 |
20200322161 | Secure Transmission - A method for providing evidential data is disclosed. The method comprises establishing one or more first secret tokens with a server; obtaining one or more data items from one or more sensors; modifying the one or more data items with at least one of the one or more first secret tokens to provide one or more modified data items; generating a respective first hash value for each of the one or more modified data items; generating a second hash value for a data set comprising each of the first hash values but excluding the one or more data items; transmitting a first message comprising the one or more data items, the one or more first hash values and the second hash value to the server; obtaining one or more transaction identifiers which comprise one or more static identifiers; transmitting an indication of the static identifiers to the server, comprising generating a respective third hash value for each of the one or more static identifiers, and the indication includes the third hash values; and establishing one or more second secret tokens with the server after transmission of the first message, the one or more second secret tokens for combining with one or more second data items obtained from the one or more sensors for generating a second message | 2020-10-08 |
20200322162 | Distributed Proof-of-Work for Sharded or Parallel Blockchains - A computer-based method for combining individual hashpower of a plethora of shards that use a proof-of-work hash procedure such that each shard benefits from the hashpower from all other shards in the plethora of shards whereby a chosen set of shards having a maximal combined individual hashpower is a consensus. | 2020-10-08 |
20200322163 | USING DOUBLE HASHING SCHEMA TO REDUCE SHORT HASH HANDLE COLLISIONS AND IMPROVE MEMORY ALLOCATION IN CONTENT-ADDRESSABLE STORAGE SYSTEMS - Example embodiments of the present invention relate and a method and an apparatus for double hashing. The method including receiving a hash signature, including a short hash handle, for a data block. The method then includes determining a bucket with which the hash signature should be associated and associating the hash signature with the bucket. | 2020-10-08 |
20200322164 | INFORMATION PROCESSING APPARATUS, REGISTRATION APPARATUS, INFORMATION PROCESSING METHOD, REGISTRATION METHOD, AND COMPUTER PROGRAM - Provided is an information processing apparatus including: a generation section that generates, from secret keys corresponding to a plurality of respective algorithms, a plurality of public keys corresponding to the respective algorithms, a plurality of addresses corresponding to the respective algorithms, and a plurality of electronic signatures corresponding to the respective algorithms, by using the algorithms, at least one of the algorithms being an algorithm that is not solved in polynomial time; and a transmission control section that allows transaction data including the generated public keys, addresses, and electronic signatures to be transmitted to a P2P network. | 2020-10-08 |
20200322165 | DISTRIBUTED LEDGER DEVICE, DISTRIBUTED LEDGER SYSTEM, AND DISTRIBUTED LEDGER MANAGEMENT METHOD - Provided is a distributed ledger device, aiming at easily and appropriately determining a status of operational processing on a distributed ledger in a certain distributed ledger device at another distributed ledger device. A BC node in a BC system including a plurality of BC nodes that manage a distributed ledger for a predetermined target transaction, the BC node including: the storage device; and the processor, in which the storage device stores the distributed ledger, and the processor, when executing processing relating to the distributed ledger, transmits content information indicating contents of the processing to be managed by another BC node that manages the distributed ledger. The processor may transmit an instruction to register the content information in another distributed ledger managed by the plurality of BC nodes that manage the distributed ledger. | 2020-10-08 |
20200322166 | METHOD FOR THE SECURE EXCHANGE OF MESSAGES BETWEEN TERMINAL DEVICES IN A NETWORK - A method for a secure exchange of one or more messages between terminal devices in a network connecting said terminal devices. The method may include creating a message by a first terminal device, digitally signing the message with a private key of the first terminal device, and transmitting the signed message to at least a second terminal device. The creation of the message to be transmitted and the digital signing may occur before an event relating to an intended interworking of the terminal devices triggers the transmission of the signed message, wherein a content of the created message to be evaluated by the second terminal device is related to the event. | 2020-10-08 |
20200322167 | CRYPTO INTEGRATION PLATFORM - A system, includes at least one processor; and at least one memory communicatively coupled to the at least one processor. The at least one processor is configured to receive an order to execute a trade of at least one transactional item associated with a first account, wherein the order, the first account, and a second account are associated with a common identifier; generate a first transaction to transfer the at least one transactional item from the first account to the second account; generate a second transaction that includes the order; verify that the first transaction was authorized by a same party as the second transaction; and authorize placement of the order on an exchange if the first transaction was authorized by the same party as the second transaction. | 2020-10-08 |
20200322168 | PRIVACY PRESERVING IP TRACEBACK USING GROUP SIGNATURE - A method, a computer-readable medium, and an apparatus for IP traceback are provided. The apparatus may generate a group public key shared by a plurality of routers controlled by a service provider. The apparatus may generate a unique private signing key for a router of the plurality of routers. The private signing key may be used to generate a group signature for a session of network traffic. The group public key may be applied to the group signature to identify the service provider. The apparatus may identify the router by applying the group public key and a master secret key to the group signature. The apparatus may deploy preventive or mitigate action on the identified router. | 2020-10-08 |
20200322169 | ACCOUNTABLE IDENTITIES ON THE INTERNET - The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session. | 2020-10-08 |
20200322170 | Identity Authentication Method and System, and Computing Device - Identity authentication method, system, and computing device are disclosed. The method includes: an identity authentication method is provided, which includes: a first device establishing a communication connection with a second device, and obtaining encrypted information through the Internet, where the first device is a device that is allowed to access the Internet, and the second device is a device that is not allowed to access the Internet; the first device encrypting identity information of an account that is logged into the second device by using the encrypted information, and sending the encrypted identity information to the second device; and the first device receiving a verification result that is returned by the second device, wherein the second device verifies the encrypted identity information based on verification information. | 2020-10-08 |
20200322171 | METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION AMONG CONSTRAINED DEVICES - In one example, an apparatus such as an authorization server and method for secure communication between constrained devices issues cryptographic communication rights among a plurality of constrained devices. Each of the plurality of constrained devices comprises no more than one cryptographic algorithm code module per cryptographic function. The method includes receiving a cryptographic communication rights request associated with at least a first of the plurality of constrained devices in response to a cryptographic algorithm update request, and includes providing a response including an identification of a subset of the plurality of constrained devices that have cryptographic communication rights with the identified first of the plurality of constrained devices. A software update server then updates the cryptographic code modules in the sub-set of the plurality of constrained devices. | 2020-10-08 |
20200322172 | SMART TELEVISION TERMINAL AND METHOD FOR ESTABLISHING A TRUST CHAIN THEREFOR - Method for establishing a trust chain, comprising: requesting a third CA for a third key pair and a third certificate, writing a private key of the third key pair and the third certificate into a security storage area, the third certificate comprising model information of the smart television (SMTV) terminal and information of a public key of the third key pair. The SMTV terminal check its possession of a fourth certificate on every start, generate a unique fourth key pair in absence of a fourth certificate, submit online a public key of the fourth key pair and a unique identification of each SMTV terminal to a fourth CA to request for a fourth certificate, send along the third certificate and a signature signed on the request with the private key of the third key pair; write the fourth certificate into the security storage area upon receiving the fourth certificate. | 2020-10-08 |
20200322173 | USER AUTHENTICATION WITH SELF-SIGNED CERTIFICATE AND IDENTITY VERIFICATION AND MIGRATION - In embodiments, an authentication server interfaces between a user device with a self-signed certificate and a verifying computer that accepts a user name and password. The user device generates a self-signed certificate signed by a private key on the user device. The self-signed certificate is transmitted to a verifying party computer over a network. The verifying party stores the self-signed certificate with user identification data. The user migrates trust to another device by providing the root certificate and intermediate certificate as a certificate chain to a second device, which then adds a new intermediate certificate to create a longer certificate chain with the same root certificate. In subsequent communications, the verifying party receives a certificate chain including the self-signed certificate from the second user device, and matches that with the user identification data stored in a database. | 2020-10-08 |
20200322174 | AUTHENTICATION METHOD, DEVICE, AND SYSTEM - This application provides an authentication method and related device and system. The method includes sending, by a first network device, a first next-hop resolution protocol (NHRP) registration request message to the second network device, where the first NHRP registration request message is used to request the second network device to perform digital certificate authentication on the first network device, and the first NHRP registration request message includes first PKI certificate information. The method may further include receiving, by the first network device, a first NHRP registration reply message indicating that the digital certificate authentication performed by the second network device succeeds. In this way, authentication is performed between a spoke device and a hub device using a PKI certificate. This helps reducing authentication workload and improving authentication security. | 2020-10-08 |
20200322175 | Cross-Chain Messaging and Message Validation - The current disclosure is directed towards providing methods and mechanisms enabling computationally efficient cross-chain messaging and message validation between subchains of a large-scale decentralized network. In one example, the current disclosure provides for determining if a message generated by a first subchain, received at a second subchain, represents a valid, consensually generated message of the first subchain, by comparing the received message with a public-key-share list of the first subchain stored in the second subchain. In one example, the current disclosure provides for a method comprising receiving a first message from a first subchain at a smart contract of a second subchain, wherein the smart contract of the second subchain comprises a public-key-share list of the first subchain, determining if the first message is valid based on the public-key-share list, and executing a transaction based on the first message responsive to the first message being determined valid. | 2020-10-08 |
20200322176 | REMOTE ATTESTATION OF MODULAR DEVICES WITH MULTIPLE CRYPTOPROCESSORS - The present technology discloses systems, methods, and computer-readable media for requesting at least one signed security measurement from at least one module with a corresponding cryptoprocessor, the at least one module existing within a device; receiving the at least one signed security measurement from the at least one module with the corresponding cryptoprocessor; validating the at least one signed security measurement; generating a signed dossier including all validated signed security measurements in a secure enclave, the signed dossier being used by an external network device for remote attestation of the device. | 2020-10-08 |
20200322177 | SMART HOME CONROLLER REFRIGERATOR AND CONTROL METHOD THEREFOR - The present invention relates to a smart home controller refrigerator and a control method therefor, the smart home controller refrigerator, according to one embodiment of the present invention, comprising: a control unit comprising a control protocol communication unit for receiving control information for controlling a home appliance in a home, an operation protocol communication unit for generating an operation signal calculated from the control information, and a signal transmission unit for transmitting the operation signal to the home appliance; at least one storage space; and at least one door for controlling the opening/closing of the at least one storage space. | 2020-10-08 |
20200322178 | LOCATION DETERMINATION FOR DEVICE CONTROL AND CONFIGURATION - Systems and methods for determining locations and configuring controllable devices are provided. Example systems and methods include determining a location estimate for a computing device and capturing image data, by the computing device, of a physical space that includes a controllable device performing an identification action. The example systems and methods may also include identifying the controllable device in the image data based at least in part on the identification action and determining configuration information for the controllable device. The configuration information may be based at least in part on the location estimate for the computing device. | 2020-10-08 |
20200322179 | INFOTAINMENT APPARATUS OF VEHICLE, AND CONTROL METHOD FOR THE SAME - An infotainment apparatus of a vehicle includes: a communication device configured to receive relative location information of an Internet of Things (IoT) device included in a predetermined space from an external device; a controller configured to generate a virtual space based on the relative location information of the IoT device, generate an icon of the IoT device, dispose the icon of the IoT device in the virtual space, generate a Graphic User Interface (GUI) of the virtual space in which the icon of the IoT device is located; and a display configured to display the GUI of the virtual space. | 2020-10-08 |
20200322180 | Method for Transmitting Data Packets, Controller and System Having a Controller - The invention relates to a method for transmitting at least one data packet from a first communication participant via a transfer channel shared with at least one further communication participant, wherein data packets are transmitted by the communication participants according to a Round-Robin method. The method comprises receiving by the first communication participant of at least one data packet from the at least one further communication participant via the shared transfer channel, wherein the further communication participant is configured to transmit data packets of different priority values, and determining a priority value from the data packet assigned to the further communication participant. The method comprises a transmission of the data packet by the first communication participant via the shared transfer channel depending on the priority value. The invention also relates to a controller and a system as well as a motor vehicle. | 2020-10-08 |
20200322181 | SCALABLE CLOUD SWITCH FOR INTEGRATION OF ON PREMISES NETWORKING INFRASTRUCTURE WITH NETWORKING SERVICES IN THE CLOUD - Systems and methods are described for integration of networking infrastructure with network services running in a Virtual Private Cloud (VPC) of an enterprise network. According to one embodiment, a cloud switch implemented by cloud services provided by a cloud service provider, creates a logical cloud port to provide connectivity to one of multiple resources provided by the cloud service provider. The cloud switch creates a physical cloud port to provide connectivity to a physical, on-premises network infrastructure component of multiple physical network infrastructure components within the enterprise network. The logical cloud port is associated with a particular resource and the physical cloud port is associated with a physical port of a physical network infrastructure component of the multiple physical network infrastructure components. | 2020-10-08 |
20200322182 | VIRTUAL CLOUD EXCHANGE SYSTEM AND METHOD - A Virtual Cloud Exchange (VCX) and method for establishing connectivity between a host computer in a customer network and a cloud service provider, includes a customer facing software defined network (SDN) switch; a cloud computing service facing SDN switch; and a processor executing instructions to generate a customer facing network routing virtual network function (VNF) and a cloud facing network routing VNF; and configure a first open virtual switch (vSwitch) and a second open vSwitch. The customer facing SDN switch generates a first overlay tunnel between the customer facing SDN switch and the first open vSwitch and the cloud facing SDN switch generates a second overlay tunnel between the cloud facing SDN switch and the second open vSwitch. | 2020-10-08 |
20200322183 | USING MULTIPLE ETHERNET VIRTUAL PRIVATE NETWORK (EVPN) ROUTES FOR CORRESPONDING SERVICE INTERFACES OF A SUBSCRIBER INTERFACE - Techniques are disclosed for an Ethernet Virtual Private Network (EVPN) Virtual Private Wire Service (VPWS) network with service interface-aware forwarding. In one example, a first network device signals to a second network device, using EVPN route advertisements, a multi-service service tunnel to transport network packets for a plurality of services. The services are identifiable by virtual local area network (VLAN) identifiers in the packets. The first network device is configured with a single transport interface for the service tunnel and the single transport interface is configured with respective service interfaces for the services. The first network device detects failure of a failed service interface of the service interfaces and outputs, in response to the failure, an EVPN route withdrawal message for the service tunnel that identifies the service corresponding to the failed service interface. | 2020-10-08 |
20200322184 | METHOD FOR ESTIMATING SELF-INTERFERENCE CHANNEL AND DEVICE FOR SAME - A method for estimating a self-interference channel by a communication device which operates in a full-duplex mode can comprise the steps of: determining the amount of resources to be used for estimating a self-interference channel for each antenna; transmitting a reference signal by means of resources distinguished by means of each antenna in accordance with the amount of resources that has been determined for each antenna; and estimating the self-interference channel on the basis of the reference signal. | 2020-10-08 |
20200322185 | ITERATIVE CHANNEL ESTIMATION AND EQUALIZATION WITH SUPERIMPOSED REFERENCE SIGNALS - In a transmitter apparatus, a known reference signal is superimposed on top of a data signal that is typically not known a priori to a receiver and the combined signal is transmitted. At a receiver, an iterative channel estimation and equalization technique is used to recover the reference signal and the unknown data signal. In the initial iteration, the known reference signal is recovered by treating the data signal as noise. Subsequent iterations are used to improve estimation of received reference signal and the unknown data signal. | 2020-10-08 |
20200322186 | METHOD FOR ESTIMATING SELF-INTERFERENCE CHANNEL AND DEVICE FOR SAME - A method for estimating a self-interference channel by a communication device which operates in a full-duplex mode can comprise the steps of: transmitting a reference signal in a first transmission unit by means of resource elements (REs) of which the number is smaller than the number of antennas of a communication device; estimating a self-interference channel by using a first reference signal matrix, which is returned by means of a self-interference channel in the first transmission unit, and reference signal matrices which are returned by means of a self-interference channel in a predetermined number of transmission units prior to the first transmission unit; and storing information about the estimated self-interference channel. | 2020-10-08 |
20200322187 | UPLINK SOUNDING REFERENCE SIGNAL (SRS) TRANSMISSION IN CARRIER AGGREGATION SYSTEM - An apparatus can receive or transmit parameters for a sounding reference signal (SRS) transmission configuration as an uplink (UL)/downlink (DL) configuration of a serving cell. A time division duplex (TDD) operation with a plurality of component carriers (CCs) can be enabled/generated based on the parameters and at least one component carriers being reserved for the UL transmission or having a higher priority than a physical channel transmission such as a physical uplink shared channel (PUSCH) transmission or a physical uplink control channel (PUCCH) transmission. | 2020-10-08 |
20200322188 | CHANNEL ESTIMATION - A method in a first base station in a communications network for performing channel estimation of a first wireless channel between a first wireless device and the first base station. A signal comprising a first component is received over the first wireless channel, the first component corresponding to a first reference signal transmitted by the first wireless device to the first base station, and a second component, wherein at least part of the second component corresponds to a second reference signal transmitted by a second wireless device to a second base station. Also, receiving scheduling information according to which the second wireless device is scheduled to transmit the second reference signal to the second base station; generating, a constructed reference signal representative of the second reference signal; and performing channel estimation of the first wireless channel between the first wireless device and the first base station. | 2020-10-08 |
20200322189 | SAMPLER OFFSET CALIBRATION DURING OPERATION - Methods and systems are described for sampling a data signal using a data sampler operating in a data signal processing path having a decision threshold associated with a decision feedback equalization (DFE) correction factor, measuring an eye opening of the data signal by adjusting a decision threshold of a spare sampler operating outside of the data signal processing path to determine a center-of-eye value for the decision threshold of the spare sampler, initializing the decision threshold of the spare sampler based on the center-of-eye value and the DFE correction factor, generating respective sets of phase-error signals for the spare sampler and the data sampler responsive to a detection of a predetermined data pattern, and updating the decision threshold of the data sampler based on an accumulation of differences in phase-error signals of the respective sets of phase-error signals. | 2020-10-08 |
20200322190 | EFFICIENT SPHERE DETECTOR ALGORITHM FOR LARGE ANTENNA COMMUNICATION SYSTEMS USING GRAPHIC PROCESSOR UNIT (GPU) HARDWARE ACCELERATORS - A method of detecting a symbol transmitted over a communication channel in a multiple input-multiple output communication system. The method includes receiving a plurality of symbols transmitted over a communication channel of a multiple input-multiple output communication system. A sphere radius is initialized based on attributes of the communication channel. A first matrix of possible transmitted signals is defined as well as a second matrix of received symbols. The matrix of possible transmitted signals is searched using a breadth-first search (BFS). Each level of the search tree is analyzed utilizing matrix multiplication to determine selected symbols satisfying the initialized sphere radius. A maximum likelihood solution is of the transmitted symbols is derived based on the selected symbols. | 2020-10-08 |
20200322191 | VARIABLE GAIN AMPLIFIER AND SAMPLER OFFSET CALIBRATION WITHOUT CLOCK RECOVERY - Methods and systems are described for generating a time-varying information signal at an output of a variable gain amplifier (VGA), sampling, using a sampler having a vertical decision threshold associated with a target signal amplitude, the time-varying information signal asynchronously to generate a sequence of decisions from varying sampling instants in sequential signaling intervals, the sequence of decisions comprising (i) positive decisions indicating the time-varying information signal is above the target signal amplitude and (ii) negative decisions indicating the time-varying information signal is below the target signal amplitude, accumulating a ratio of positive decisions to negative decisions, and generating a gain feedback control signal to adjust a gain setting of the VGA responsive to a mismatch of the accumulated ratio with respect to a target ratio. | 2020-10-08 |
20200322192 | RECEPTION DEVICE, RECEPTION METHOD, AND COMMUNICATION SYSTEM - A reception device includes: a reception unit receiving transmission signals; a splitting unit splitting received signals into real component and imaginary component; a narrowing unit narrowing down possible signal point candidates of real component of the signal and imaginary component of the signal to signal point candidates based on the real component and the imaginary component of the split received signal; a signal point candidate hypothesizing unit hypothesizing one signal point candidate of real component from the signal point candidates of real component obtained by narrowing-down and hypothesizing one signal point candidate of imaginary component from the signal point candidates of imaginary component obtained by narrowing-down; and a signal estimation value calculating unit estimating real component of the signal based on the one hypothesized real component signal point candidate and estimating imaginary component of the signal based on the one hypothesized imaginary component signal point candidate. | 2020-10-08 |
20200322193 | MULTI-MODE WIRELESS TRANSMISSION METHOD AND APPARATUS - Provided is a next-generation wireless local area network (WLAN) frame communication method. The communication method may include modulating a first symbol in a signal field A (SIG-A) of a next-generation WLAN frame using a first modulation method, modulating a second symbol in the SIG-A of the next-generation WLAN frame using a second modulation method, and modulating a short training field (STF) signal of the next-generation WLAN frame in response to a next-generation WLAN mode. | 2020-10-08 |
20200322194 | SYNCHRONOUSLY-SWITCHED MULTI-INPUT DEMODULATING COMPARATOR - Methods and systems are described for obtaining a set of carrier-modulated symbols of a carrier-modulated codeword, each carrier-modulated symbol received via a respective wire of a plurality of wires of a multi-wire bus, applying each carrier-modulated symbol of the set of carrier-modulated symbols to a corresponding transistor of a set of transistors, the set of transistors further connected to a pair of output nodes according to a sub-channel vector of a plurality of mutually orthogonal sub-channel vectors, recovering a demodulation signal from the carrier-modulated symbols, and generating a demodulated sub-channel data output as a differential voltage on the pair of output nodes based on a linear combination of the set of carrier-modulated symbols by controlling conductivity of the set of transistors according to the demodulation signal. | 2020-10-08 |
20200322195 | SYSTEM AND SCHEME OF SCALABLE OFDM NUMEROLOGY - For a wireless communications system, scalable orthogonal frequency division multiplexing (OFDM) numerology is incorporated in a manner that can apply to radio link transmissions in future wireless network for frequency division duplex (FDD) and time division duplex (TDD) communications. | 2020-10-08 |
20200322196 | OVERLAP-SAVE FBMC RECEIVER - An FBMC equalization and demodulation unit and corresponding method to process an FBMC signal includes FBMC symbols, each FBMC symbol comprising data mapped over M subcarriers, oversampled by a factor K, filtered by a prototype filter and transposed in the time-domain, comprising: a frequency domain transposition unit, configured to transpose a block of P*KM samples comprising at least one FBMC symbol into frequency domain samples, where P is an integer greater than one, an equalizer unit configured to multiply the frequency domain samples by one or more coefficients computed from a propagation channel estimate, at least one circular convolution unit, configured to perform P circular convolutions between subsets of the equalized samples and a frequency domain response of a frequency shifted version of the prototype filter, and adders, to sum corresponding outputs of each of the P circular convolutions. | 2020-10-08 |
20200322197 | DETERMINING NUMBER OF MIDAMBLES IN A PACKET - A communication device receives a physical layer (PHY) protocol data unit (PPDU). The PPDU includes i) a PHY preamble and ii) PHY data portion that includes one or more PHY midambles, and the PHY preamble includes i) an indication of a length of the PPDU, and ii) an indication of a periodicity of PHY midambles in the PHY data portion. The communication device calculates a number of PHY midambles in the PPDU using i) the indication of the length of the PPDU, and ii) the indication of the periodicity of PHY midambles. The communication device calculates a reception time for the PPDU using the calculated number of PHY midambles, and processes the PPDU using the calculated reception time. | 2020-10-08 |
20200322198 | Reserving Channel By Cyclic Prefix Extension For Alignment With Symbol Boundary In Mobile Communications - Examples pertaining to reserving channel by cyclic prefix (CP) extension for alignment with a symbol boundary in mobile communications are described. An apparatus extends a CP of a symbol to result in an extended symbol that aligns with a timing reference. The apparatus then transmits the extended symbol. | 2020-10-08 |
20200322199 | USER TERMINAL AND RADIO COMMUNICATION METHOD - A user terminal that includes a transmitter that transmits uplink control information on an uplink control channel and a controller that bases the transmission of the uplink control information on a number of symbols of the uplink control channel. The transmission of the uplink control information uses one of a first uplink control channel format and a second uplink control channel format, and the first uplink control channel format uses a cyclic shift that depends on the uplink control information, and the second uplink control channel format does not use a cyclic shift that depends on the uplink control information. | 2020-10-08 |
20200322200 | METHOD FOR RECEIVING NRS AND NB-IOT DEVICE THEREOF - One disclosure of the present specification proposes a method for receiving a Narrowband Reference Signal (NRS) by a Narrow band Internet of Things (NB-IoT) device. The method may comprise receiving the NRS on at least one or more orthogonal frequency division multiplexing (OFDM) symbols. The one or more OFDM symbols are in a time division duplex (TDD) subframe. If the TDD subframe corresponds to a TDD special subframe, the one or more OFDM symbols for receiving the NRS is determined based on which TDD special subframe configuration index among a plurality of TDD special configuration indexes is used by the TDD special subframe. | 2020-10-08 |
20200322201 | METHODS AND SYSTEMS FOR GENERATING A LOW PEAK-TO-AVERAGE POWER RATIO (PAPR) DATA AND REFERENCE SIGNAL - Embodiments of the present disclosure relate to systems and methods to generate a signal in a communication network. The method comprises filtering a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-s-OFDM) data signal, and one of a DFT-S-OFDM and orthogonal frequency division multiplexing (OFDM) reference signal (RS) using a data filter and a RS filter respectively, to produce filtered data signal and filtered RS. The RS filter has one to one relationship with the data filter. Thereafter, port mapping the filtered RS to a corresponding port assigned to the transmitter to obtain port mapped filtered RS, wherein the port mapped filtered RS comprises a first subset of non-zero locations comprising of the filtered RS values and a second subset of zero locations comprising of zero values. | 2020-10-08 |
20200322202 | RECEIVER-SIDE PROCESSING OF ORTHOGONAL TIME FREQUENCY SPACE MODULATED SIGNALS - Wireless communication techniques for transmitting and receiving reference signals is described. The reference signals may include pilot signals that are transmitted using transmission resources that are separate from data transmission resources. Pilot signals are continuously transmitted from a base station to user equipment being served. Pilot signals are generated from delay-Doppler domain signals that are processed to obtain time-frequency signals that occupy a two-dimensional lattice in the time frequency domain that is non-overlapping with a lattice corresponding to data signal transmissions. | 2020-10-08 |