48th week of 2021 patent applcation highlights part 84 |
Patent application number | Title | Published |
20210376970 | METHODS AND APPARATUS FOR MULTI-CARRIER COMMUNICATIONS WITH VARIABLE CHANNEL BANDWIDTH - A mobile station using orthogonal frequency division multiple access (OFDMA). The frequency processing circuitry and the processor of the mobile station are configured to scan spectral bands for a first signal. The first signal having synchronization and cell identification information, and is received in a first band of a cell having a full bandwidth. The first band being within a first bandwidth part and the first bandwidth part being a portion of the full bandwidth of a cell that comprises a plurality of bandwidth parts. Further, the frequency processing circuitry and the processor configured to receive and process signals in the first bandwidth part and configured to switch to receive and process a second bandwidth part, the second bandwidth part being different frequency size than the first bandwidth part. | 2021-12-02 |
20210376971 | METHODS AND APPARATUS FOR MULTI-CARRIER COMMUNICATIONS WITH VARIABLE CHANNEL BANDWIDTH - A mobile station using orthogonal frequency division multiple access (OFDMA). The frequency processing circuitry and the processor of the mobile station are configured to scan spectral bands for a first signal. The first signal having broadcast information and being in a first band, the first band being a portion of a full bandwidth of the cell, wherein the broadcast information includes bandwidth information. Further, the frequency processing circuitry and the processor are configured to receive additional broadcast information by processing a second band being in a single sideband in the frequency domain of the full bandwidth of the cell with respect to the first band. Further, the frequency processing circuitry and the processor configured to access the cell using the broadcast information received in both the first band and the second band. | 2021-12-02 |
20210376972 | USER EQUIPMENT FOR SUPPORTING EN DC, AND CONTROL METHOD THEREFOR - A disclosure of the present specification provides a user equipment (UE) supporting a Dual Connectivity (DC) with Evolved Universal Terrestrial Radio Access (E-UTRA) and New Radio (NR). The UE may include a transceiver configured with the DC and configured to transmit an uplink signal and receive a downlink signal; and a processor configured to control the transceiver. Wherein based on (i) that the E-UTRA includes at least E-UTRA operation band | 2021-12-02 |
20210376973 | INTERFERENCE-AWARE BEAMFORMING - Aspects of the disclosure relate to an interference-aware beamforming environment in which an AP controller can determine one or more beams of one or more APs to serve various STAs. For example, an AP can request that STA(s) provide one or more uplink pilot signals during different time slots. The AP can receive the uplink pilot signal(s) and determine, for each STA, the uplink beam quality of each transmit beam-receive beam pair over which an uplink pilot signal was received from the respective STA. The AP can use reciprocity to determine, for each STA, the downlink beam quality for various transmit beam-receive beam pairs. The AP can use the determined downlink beam quality to identify the best beam with which to serve various STAs. An AP controller can determine which downlink beam(s) an AP should use to serve a STA based on the downlink beams originally selected by the APs. | 2021-12-02 |
20210376974 | FAIRNESS AND COMPLEXITY CONSTRAINED UPLINK TRANSMISSION USING COORDINATED MULTIPOINT (COMP) NON-ORTHOGONAL MULTIPLE ACCESS (NOMA) - A method in a communication network. The method includes a first network node receiving a first combined signal comprising a first message transmitted by a first UE and a second message transmitted by a second UE. The method includes the first network node decoding the first message. The method includes the first network node using a backhaul link to transmit the decoded first message to a second network node that receives a second combined signal comprising the first message and a third message transmitted by a third UE. | 2021-12-02 |
20210376975 | METHOD AND APPARATUS FOR IMPROVING CARRIER AGGREGATION IN NEXT-GENERATION MOBILE COMMUNICATION SYSTEM - Disclosed are a communication scheme and a system thereof for converging an IoT technology and a 5G communication system for supporting a high data transmission rate beyond that of a 4G system. The disclosure can be applied to intelligent services (for example, services related to a smart home, smart building, smart city, smart car, connected car, health care, digital education, retail business, security, and safety) based on 5G communication technology and IoT-related technology. Disclosed is a method of a user equipment (UE) in a wireless communication system. The method includes: receiving a message including secondary cell (SCell) configuration information from a base station; identifying whether a condition for transitioning the SCell to a dormant state is satisfied; and in case that the condition for transitioning the SCell to the dormant state is satisfied, releasing periodic transmission resources for the SCell configured in the UE. | 2021-12-02 |
20210376976 | PILOT CONFIGURATION METHOD, CHANNEL MEASUREMENT METHOD, AND COMMUNICATION DEVICE - Embodiments of the present application provide a pilot configuration method, a channel measurement method, and a communication device, for use in resolving the technical problem in an NR system that a terminal cannot determine the location of a time-frequency resource occupied by a CSI-RS. The pilot configuration method comprises: a base station determines configuration information of CSI-RSs of N ports according to a predefined CSI-RS configuration pattern of a system, wherein the CSI-RS configuration pattern is used for representing configurations for time-frequency locations of resource elements (REs) of the CSI-RSs of different ports in a time slot when at least one OFDM symbol in a PRB is used as a time domain unit, the configuration information at least comprises the number of ports and an index parameter, and the index parameter is used for indicating the time-frequency location of the RE of the CSI-RS of each of the N ports in the time slot; the base station transmits the configuration information to a terminal connected to the base station by signaling, and transmits the CSI-RSs according to the configuration information, so that the terminal determines the time-frequency locations of the REs of the CSI-RSs in the time slot according to the configuration information and the predefined CSI-RS configuration pattern of the system, and performs channel measurement by using the CSI-RSs at the time-frequency locations. | 2021-12-02 |
20210376977 | REFERENCE SIGNAL GROUPING FOR FULL-DUPLEX OPERATION - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may receive information indicating whether a reference signal is associated with a full-duplex operation; receive the reference signal; and transmit feedback based at least in part on the reference signal and the information indicating whether the reference signal is associated with the full-duplex operation. Numerous other aspects are provided. | 2021-12-02 |
20210376978 | AMPLITUDE-MODULATED PHASE TRACKING REFERENCE SIGNALS FOR A MULTILAYER COMMUNICATION LINK - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may transmit an indication of a capability of the UE to communicate one or more of uplink transmissions or downlink transmissions having amplitude-modulated phase tracking reference signals on at least a first layer of a multilayered communication link that includes the first layer and a second layer; and communicate an uplink transmission or a downlink transmission based at least in part on the indication. Numerous other aspects are provided. | 2021-12-02 |
20210376979 | TRANSPORT BLOCK SEGMENTATION AND SIGNALING - Methods, systems, and devices for wireless communication are described. A method may include identifying a reference number of tones for an overhead channel of a transport block and segmenting the transport block into a code block based at least in part on the reference number of tones for the overhead channel. In some examples, a code block indicator or the reference number of tones may be transmitted on a control channel. Another method may include receiving a code block size indicator associated with a code block of a transport block, decoding the code block based at least in part on the code block size indicator and assembling the transport block based at least in part on the decoded code block. In some examples, the code block size indicator may be received using a control channel. | 2021-12-02 |
20210376980 | SOUNDING REFERENCE SIGNAL TRANSMISSION IN LOW LATENCY WIRELESS TRANSMISSIONS - Methods, systems, and devices for wireless communication are described that support sounding reference signal (SRS) transmission in low latency wireless transmissions. A set of shortened transmission time intervals (sTTIs) for uplink transmissions of a first wireless service may be identified; the set of sTTIs located within subframe time boundaries of a subframe of a second wireless service with a longer TTI than the sTTIs. Two or more sTTIs within the set of sTTIs may be used for SRS transmissions within the subframe time boundaries. | 2021-12-02 |
20210376981 | COMMUNICATION METHOD AND COMMUNICATIONS APPARATUS - A communication method and a communications apparatus are provided, to resolve a problem of how to send and receive a remote interference management reference signal (RIM-RS) during remote interference measurement. The method includes determining a transmission resource of a reference signal based on identification information and parameter information, where the transmission resource includes one or more of a sequence, a frequency domain resource, and a time domain resource of the reference signal, the identification information is used to identify a network device, the parameter information includes sequence indication information and frequency domain indication information, the sequence indication information is used to indicate one or more candidate sequences, and the frequency domain indication information is used to indicate one or more candidate frequency domain resources. The method may further include sending the reference signal on the transmission resource. | 2021-12-02 |
20210376982 | RADIO TRANSMISSION APPARATUS AND METHODS - A radio transmission apparatus determines information indicative of an estimated communications channel condition and generates a single modulation signal or a plurality of modulation signals based on the estimated communications channel condition information. The single modulation signal is transmitted from a first antenna of a plurality of antenna or the plurality of modulation signals are transmitted from the first antenna and at least a second antenna of the plurality of antenna. The plurality of modulation signals include different information from each other and are transmitted over an identical frequency band and at an identical temporal point. The single modulation signal and the plurality of modulation signals contain parameter information indicating a number of modulation signals transmitted at the same time. | 2021-12-02 |
20210376983 | SCHEDULING FOR POSITIONING REFERENCE SIGNAL (PRS) IN NARROWBAND-INTERNET OF THINGS (NB-IOT) - Wireless communications systems and methods related to communicating positioning reference signals (PRSs) for narrowband communication are provided. A first wireless communication device determines a time-frequency PRS pattern based at least in part on a narrowband communication frequency band configuration and a PRS subframe configuration mode associated with a set of subframes. The first wireless communication device communicates, with a second wireless communication device, a plurality of PRSs using the determined PRS time-frequency pattern in the set of subframes. The PRS subframe configuration mode can indicate a first configuration including a bitmap indicating a set of PRS subframes positioned within a group of contiguous subframes, a second configuration indicating a subset of the group of contiguous subframes that may carry the PRSs, or a combination thereof. The first configuration and/or the second configuration can be used to indicate the set of subframes. | 2021-12-02 |
20210376984 | UE SPECIFIC BEAMFORMING FOR NARROWBAND COMMUNICATIONS - Methods, systems, and devices for wireless communications are described in which beamforming may be configured at a user equipment (UE) for narrowband communications. The UE may be a narrowband UE that may provide an indication to a base station that the UE is capable of performing beamforming communication for a unicast channel transmission. Such an indication may be provided in response to the UE receiving a non-beamformed broadcast channel transmission from the base station via a first carrier. The base station may receive the indication and configure the UE with a beamformed narrowband communications scheme. Such a beamformed formed narrowband communications scheme may be used for narrowband downlink shared channel communications, narrowband downlink control channel communications, or combinations thereof. In some cases, beamformed communications may be configured on a different carrier than the first carrier. The base station and UE may then communicate using beamformed transmissions. | 2021-12-02 |
20210376985 | Uplink Transmission Cancellation - A wireless device receives, from a base station, a first uplink grant, for a first transport block (TB) of a hybrid acknowledgment repeat request (HARQ) process. The wireless device cancels an uplink transmission of the first TB of the HARQ process based on receiving a pre-emption indication indicating cancellation of transmission via one or more uplink resources indicated by the first uplink grant. The wireless device determines, after cancelling the uplink transmission of the first TB of the HARQ process, that a received second uplink grant is used for a new transmission of a second TB associated with the HARQ process. The wireless device transmits, to the base station, the second TB of the HARQ process based on the determining. | 2021-12-02 |
20210376986 | METHOD AND SYSTEM FOR TRANSMITTING AND RECEIVING PROTOCOL DATA UNIT IN COMMUNICATION NETWORKS - The present disclosure relates to a pre-5 | 2021-12-02 |
20210376987 | FEEDBACK TRANSMISSIONS FOR MIXED SERVICES - A method for communications comprising obtaining configuration information from a network node. The configuration information is related to resource configurations of feedback transmissions with respect to data transmissions from the network node to the terminal device for different types of services. The method further comprises determining a correspondence between the resource configurations and the different types of services based at least in part on the configuration information. | 2021-12-02 |
20210376988 | ENHANCEMENTS TO RECEPTION RELIABILITY FOR DATA AND CONTROL INFORMATION - Enhancing reception reliability for control information or data information includes receiving: a first configuration for a CORESET and a second configuration for a second CORESET; a first PDCCH, in the first CORESET or the second CORESET, including a first DCI format; and a first PDSCH, scheduled by the first DCI format, including a TB. The method further includes transmitting a first PUCCH including a first HARQ-ACK codebook and a second PUCCH including a second HARQ-ACK codebook. HARQ-ACK information, in response to receiving the TB, is included in: the first HARQ-ACK codebook when the first PDCCH is received in the first CORESET and the second HARQ-ACK codebook when the first PDCCH is received in the second CORESET. | 2021-12-02 |
20210376989 | METHOD FOR TRANSMITTING AND RECEIVING SIGNAL BY TERMINAL SUPPORTING DUAL-CONNECTIVITY BETWEEN E-UTRA AND NR AND TERMINAL PERFORMING THE METHOD - Provided is a method for transmitting and receiving a signal by a terminal supporting dual-connectivity between evolved universal terrestrial radio access (E-UTRA) and new radio (NR). In the method, when the terminal is configured to aggregate at least two carriers and when the at least two carriers include one of E-UTRA operating bands | 2021-12-02 |
20210376990 | Delaying a Radio Resource Control Triggered Bandwidth Part Switching - A wireless device receives a radio resource control (RRC) reconfiguration message triggering a first active bandwidth part (BWP) switching of a first cell. Based on the triggering the first active BWP switching during a second active BWP switching of a second cell, the first active BWP switching is delayed until the second active BWP switching is completed. | 2021-12-02 |
20210376991 | Preemption Indicator Techniques - Techniques are disclosed relating to downlink control information for wireless communications. In some embodiments, the downlink control information includes code block group information that indicates which code block groups are transmitted and soft buffer handling information that indicates whether to flush previously-determined soft bits that correspond to one or more code block groups. | 2021-12-02 |
20210376992 | SIGNAL INJECTION IN TIME DIVISION DUPLEX (TDD) COMMUNICATION SYSTEMS - According to one aspect of the disclosure, a radio node for Time Division Duplex, TDD, communications is provided. The radio node includes processing circuitry configured to inject a signal into a time window where the time window is positioned, in a time domain, between a TDD first direction subframe to a TDD second direction subframe and the time window has a time duration less than the TDD first direction subframe and TDD second direction subframe, and perform at least one function using the injected signal. | 2021-12-02 |
20210376993 | TDD UPLINK/DOWNLINK RE-CONFIGURATION MECHANISM - The invention relates to methods for communicating within a communication system when re-configured from a source to a target uplink/downlink configuration. The invention is also providing mobile station for performing these methods, and computer readable media the instructions of which cause the mobile station to perform the methods described herein. Specifically, the invention suggests to perform PUSCH transmissions in response to Downlink Control Information, DCI, transmissions such that the source uplink/downlink configuration is applied to PUSCH transmissions relating to DCI transmissions received up to and including subframe N−6, a predefined uplink/downlink configuration is applied to PUSCH transmissions relating to DCI transmissions received during subframes N−5 to N−1; and the target uplink/downlink configuration is applied to PUSCH transmissions relating to DCI transmissions received from subframe N onward. | 2021-12-02 |
20210376994 | TIME CONSISTENCY SYNCHRONIZATION METHOD FOR DISTRIBUTED SIMULATION - The invention belongs to the technical field of time synchronization of computer co- simulation, and particularly relates to a time consistency synchronization method for distributed simulation. According to the time consistency synchronization method, a most appropriate master clock is selected according to votes, and then the other clocks in a network are controlled to synchronize by using the master clock, so that the consistency of data of each node and a time-related event in time logic is ensured. Even if a certain simulation node goes down, influences on the other links of the whole system are relatively small, which can effectively perform decentration, ensure the time consistency to the greatest extent, and ensure the correctness and the scale of a whole distributed system. | 2021-12-02 |
20210376995 | PRIVACY-ENHANCED DECISION TREE-BASED INFERENCE ON HOMOMORPHICALLY-ENCRYPTED DATA - A technique for computationally-efficient privacy-preserving homomorphic inferencing against a decision tree. Inferencing is carried out by a server against encrypted data points provided by a client. Fully homomorphic computation is enabled with respect to the decision tree by intelligently configuring the tree and the real number-valued features that are applied to the tree. To that end, and to the extent the decision tree is unbalanced, the server first balances the tree. A cryptographic packing scheme is then applied to the balanced decision tree and, in particular, to one or more entries in at least one of: an encrypted feature set, and a threshold data set, that are to be used during the decision tree evaluation process. Upon receipt of an encrypted data point, homomorphic inferencing on the configured decision tree is performed using a highly-accurate approximation comparator, which implements a “soft” membership recursive computation on real numbers, all in an oblivious manner. | 2021-12-02 |
20210376996 | HOMOMORPHIC ENCRYPTION DEVICE AND CIPHERTEXT ARITHMETIC METHOD THEREOF - A homomorphic encryption device includes: a recryption parameter generating circuit, a recryption circuit, and an arithmetic circuit. The recryption parameter generating circuit is configured to generate a recryption parameter including a plurality of recryption levels respectively for a plurality of ciphertexts based on an arithmetic scenario including information about an arithmetic schedule between the plurality of ciphertexts. The recryption circuit is configured to generate a plurality of recrypted ciphertexts by recrypting each of the plurality of ciphertexts to a corresponding recryption level based on the recryption parameter. The arithmetic circuit is configured to output an arithmetic result by performing operations by using the plurality of recrypted ciphertexts, according to the arithmetic scenario. | 2021-12-02 |
20210376997 | ARTIFICIAL INTELLIGENCE CALCULATION SEMICONDUCTOR DEVICE AND STORAGE DEVICE COMPRISING THE SAME - An artificial intelligence calculation semiconductor device is provided. The artificial intelligence calculation semiconductor device comprising: a control unit; and a MAC (Multiply and Accumulator) calculator which executes a homomorphic encryption calculation through the control unit, wherein the MAC calculator includes an NTT (Numeric Theoretic Transform)/INTT (Inverse NTT) circuit which generates cipher texts by performing a homomorphic multiplication calculation through transformation or inverse transformation of data, a cipher text multiplier which executes a multiplication calculation between the cipher texts, a cipher text adder/subtractor which executes addition and/or subtraction calculations between the cipher texts, and a rotator which performs a cyclic shift of a slot of the cipher texts. | 2021-12-02 |
20210376998 | ELECTRONIC DEVICE FOR SORTING HOMOMORPHIC CIPHERTEXT USING SHELL SORTING AND OPERATING METHOD THEREOF - Provided are an electronic device for sorting homomorphic ciphertext by using shell sorting and an operating method thereof to sort ciphertext generated by using homomorphic encryption according to a size of an original number corresponding thereto. | 2021-12-02 |
20210376999 | DATA ENCRYPTION AND DECRYPTION - This disclosure relates to data encryption and decryption. In one aspect, a method includes receiving, by a second peer end computing device, first data from a first peer end computing device. The second end computing device generates a random term based on a result range pre-agreed upon with the first peer end computing device. The result range includes a minimum result value and a maximum result value. The random term is a product of a random number and an agreed upon constant. The agreed upon constant is greater than a difference between the maximum result value and the minimum result value. The second peer end computing device performs a homomorphic operation based on the first data, local private second data, and the random term to obtain an encryption result. The second peer end computing device returns the encryption result to the first peer end computing device. | 2021-12-02 |
20210377000 | Prioritized Content Encryption for Rapid Breach Response - Techniques for rapid video on demand (VOD) media content breach response are described. In some embodiments, during content preparation, a server generates an encrypted media content item by generating a first encrypted portion using a first key derived from a first seed that is of a first type and generating a second encrypted portion using a second key derived from a second seed that is of a second type. In some embodiments, the server classifies the first portion in a first category (e.g., a prioritized category) and the second portion in a second category (e.g., a non-prioritized category). During a breach response, the server repairs the encrypted media content item by re-encrypting portions in the first category, e.g., re-encrypting the first encrypted portion using a replacement key derived from a replacement seed that is of the first type, and updating encryption metadata. | 2021-12-02 |
20210377001 | Removing Access to Blockchain Data - Access to blockchain data may be removed by deleting an encryption key held in a remote server. Incoming data is stored in the blockchain after being encrypted at the key server. An ordinary blockchain user gains access to the data, after forwarding the encrypted data to the remote key server for decryption. Upon receipt of an input (e.g., time stamp), the key server deletes the key. Thereafter, the encrypted data on the blockchain is rendered inaccessible to the ordinary blockchain data user. At no point, does the ordinary data user have access to the key stored in the remote server. Embodiments may find particular use in removing access to personal data stored in a blockchain following the elapse of a predetermined amount of time, as may be required by privacy laws. Granular control over data access can may be afforded through the use of composite keys and/or key hierarchies. | 2021-12-02 |
20210377002 | SECURE TRANSMISSION OF ELECTRONIC HEALTH RECORDS VIA BLOCKCHAIN - The present disclosure provides a distributed computer system, which includes a plurality of computing devices. Each computing device includes a memory, a portion of a Blockchain, a transceiver, and a processor. The memory stores a plurality of data transaction requests. Each data transaction request corresponds to a block in the Blockchain and includes a cryptographic hash of a previous block, a timestamp, and transaction data. The transceiver receives a data transaction request from a subset of the plurality of computing devices. The processor determines whether the received data transaction request corresponds to at least one block in the portion of the Blockchain. The processor updates an internal record of the Blockchain, based on determining that the data transaction request corresponds to at least one block in the portion of the Blockchain. The processor then verifies the updated internal record of the Blockchain with a computing device in the subset. | 2021-12-02 |
20210377003 | DISTRIBUTED BLOCKCHAIN-TYPE IMPLEMENTATIONS CONFIGURED TO MANAGE TOKENIZED DIGITAL ASSETS AND IMPROVED ELECTRONIC WALLETS, AND METHODS OF USE THEREOF - In some embodiments, the present description provides a distributed blockchain ledger system that includes at least: a first distributed blockchain ledger, configured to storing first cryptographically-secured data representative of a plurality of tokenized assets; a second distributed blockchain ledger, configured to storing second cryptographically-secured data representative of a plurality of transactions related to the plurality of tokenized assets; and a plurality of smart contracts that is configured to self-execute to at least: store the first cryptographically-secured data on the first distributed blockchain ledger, store the second cryptographically-secured data on the second distributed blockchain ledger, and maintain a plurality of digital associations between the first cryptographically-secured data of the first distributed blockchain ledger and the second cryptographically-secured data of the second distributed blockchain ledger. | 2021-12-02 |
20210377004 | Onboarding Software on Secure Devices to Generate Device Identities for Authentication with Remote Servers - Systems, methods and apparatuses to configure a computing device for identification and authentication are described. For example, a key management server (KMS) has a certificate generator and is coupled to a registration portal. A copy of secret implemented into a secure component during its manufacture in a factory is stored in the KMS. After leaving the factory, the component can be assembled into the device. The portal receives registration of the component and a hash of software of the device. The certificate generator generates, independent of the device, public keys of the device, using the copy of the secret stored in the KMS and hashes of the software received via the registration portal, and then sign a digital certificate of the public key of the device. Authentication of the device can then be performed via the private key of the device and the certified public key. | 2021-12-02 |
20210377005 | SECURE AGGREGATE MEDIAN SYSTEM, SECURE COMPUTATION APPARATUS, SECURE AGGREGATE MEDIAN METHOD, AND PROGRAM - An aggregate median is efficiently obtained while confidentiality is kept. An order computing part generates ascending order a and descending order d within a group when a table which has been stably sorted based on a desired value attribute and a key attribute is grouped based on the key attribute. A subtracting part generates shares {a−d}, {d−a} of a−d, d−a. A bit deleting part generates shares {a′}, {d′} of a′, d′ obtained by excluding least significant bits from {a−d}, {d−a}. An equality determining part generates shares {a″}, {d″} of {a″}:={|a′=0|}, {d″}:={|d′=0|}. A format converting part ( | 2021-12-02 |
20210377006 | Time-Aware Blockchain Staged Regulatory Control of Internet of Things Data - The concepts and technologies disclosed herein are directed to time-aware blockchain staged regulatory control of Internet of Things (“IoT”) data. A federation platform can receive a registration request from an enterprise edge platform to register a blockchain identifier for publication of public data on a public blockchain. The federation platform can determine if the registration request contains any restricted data parameters. In response to determining that the registration request does not contain any restricted data parameters, the federation platform can query a security module to obtain an encryption key. The federation platform can receive the encryption key from the security module. The federation platform can store the encryption key in association with the blockchain identifier and an enterprise edge platform ID that uniquely identifies the enterprise edge platform. The federation platform can return the encryption key to the enterprise edge platform and allow publication of encrypted public data to the public blockchain. | 2021-12-02 |
20210377007 | KEY ENCRYPTION KEY WRAPPING - In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document. | 2021-12-02 |
20210377008 | SHARED KEY GENERATION BASED ON DUAL CLOCKS - Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have two clocks. The first clock is a real-time clock and the second clock is a variable-time clock. The variable time clocks are synchronized and run at the same rate, faster or slower than real time. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp obtained from their variable time clocks. Since the computing systems have synchronized variable-time clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another. | 2021-12-02 |
20210377009 | Multiparty Key Exchange - This invention pertains to secure communications between multiple parties and/or secure computation or data transmission between multiple computers or multiple vehicles. This invention provides a secure method for three or more parties to establish one or more shared secrets between all parties. In some embodiments, there are less than 40 parties and in other embodiments there are more than 1 million parties that establish a shared secret. In some embodiments, establishing a shared secret among multiple parties provides a method for a secure conference call. In some embodiments, a shared secret is established with multiple computer nodes across the whole earth to help provide a secure Internet infrastructure that can reliably and securely route Internet traffic. In some embodiments, a shared secret is established so that self-driving vehicles may securely communicate and securely coordinate their motion to avoid collisions. In some embodiments, a shared secret is established with multiple computer nodes that participate as a network, performing blockchain computations. | 2021-12-02 |
20210377010 | KEY MANAGEMENT METHOD AND RELATED DEVICE - Embodiments of this disclosure disclose a key management method and a related device, the method including: selecting a random number and a key according to an operation instruction inputted by a user; generating a first encryption ciphertext of the key, according to the random number, the key, a first public key, and a second public key, the first public key being determined according to a point on an elliptic curve and a private key of a hardware security module (HSM), and the second public key being determined according to the point on the elliptic curve and a private key of the client; generating a symmetric key sequence according to the key and a preselected hash function; encrypting data according to the symmetric key sequence to obtain a data ciphertext; and transmitting the first encryption ciphertext and the data ciphertext to a cloud server. | 2021-12-02 |
20210377011 | System for an Encoded Information Transmission - The present invention relates to electric communications and more specifically to a system for transmitting encoded information over radio channels and wired communication lines, including the Internet. The invention may be used in systems for transmitting encrypted information for receiving and transmitting confidential information (messages) with the possibility of providing increased protection against unauthorized decoding by an unauthorized user also in case when such unauthorized user utilizes computers (computer facilities) of ultra-high performance. The system for the encoded information transmission, wherein the transmitting side comprises modules for generating/displaying the output/received information of the transmitting side, cryptographic calculations of the transmitting side, service information of the transmitting side, a module for generating a set key of the transmitting side, a module for generating a computed key of the transmitting/receiving side, and a module of transmitting side communication channel, and the receiving side comprises modules for generating/displaying the output/received information of the receiving side, cryptographic calculations of the receiving side, service information of the receiving side, a module for generating a set key of the receiving side, a module for generating a computed key of the transmitting/receiving side, and a module of receiving side communication channel, and, according to the invention, the system additionally comprises, at the transmitting side and the receiving sides, respectively, macroblocks for blocking computer brute-force search of the transmitting side (MBS) and for blocking computer brute-force search of the receiving side (MBS), such that each of said macroblocks at the transmitting side and the receiving side comprises at least three modules for information encoding/cryptographic transformations (MBC | 2021-12-02 |
20210377012 | Secret Distribution Among Storage Devices - In a storage system that includes a plurality of storage devices configured into one or more write groups, quorum-aware secret sharing may include: encrypting a device key for each storage device using a master secret; generating a plurality of shares from the master secret such that a minimum number of storage devices required from each write group for a quorum to boot the storage system is not less than a minimum number of shares required to reconstruct the master secret; and storing the encrypted device key and a separate share of the plurality of shares in each storage device. | 2021-12-02 |
20210377013 | GENERATION OF ENCRYPTION KEYS USING BIOMETRICS - Methods and systems for improved generation of biometrics using biometrics and secure storage of biometrics are provided. In one embodiment, a method is provided that includes scanning and digitizing a plurality of biometrics to form a plurality of digitized biometrics. An encryption key for use in cryptographic applications may be generated based on the plurality of digitized biometrics. A biometrics encryption seed may be received and may be used to encrypt the plurality of digitized biometrics to generate a plurality of encrypted biometrics. The plurality of encrypted biometrics may then be stored. | 2021-12-02 |
20210377014 | ENCRYPTION METHOD - Disclosed is a method of encrypting a data signal for providing to an input of a radio frequency transmitter, such as modulated baseband signals in the physical layer for wireless transmission. The method comprises receiving the data signal comprising one or more first frequency components with a first phase profile in a frequency band of interest; applying a dispersive encrypting signal filter to the data signal to generate an encrypted data signal comprising the one or more frequency components with a second phase profile, wherein the second phase profile is different to the first phase profile. Decryption is achieved by applying a decrypting filter to the encrypted data signal to substantially reverse the effect of the encrypting filter and recover the first phase profile. | 2021-12-02 |
20210377015 | NONINTERACTIVE MULTI AGENT KEY MANAGEMENT - A private key management system (PKMS) that may include a first agent configured to receive a request from a client device; a distributed ledger shared between the first agent and multiple second agents such that the distributed ledger operates based on a consensus algorithm; a validation engine maintained by each of the first agent and the multiple second agents, the validation engine configured to query the distributed ledger to obtain data to verify the request; and a vault module maintained by each of the first agent and the multiple second agents, the vault module configured to perform a cryptography operation based on the request after the validation engine verifies the request. | 2021-12-02 |
20210377016 | KEY ROLLOVER FOR CLIENT SIDE ENCRYPTION IN DEDUPLICATION BACKUP SYSTEMS - Embodiments are described for re-keying encrypted data with a new encryption key. A server maintains a ClientBlocks list comprising (handle, hash) pairs for each client, a deduplication table, and encrypted data for one or more clients. Each client stores handles and encryption keys. The server goes through the ClientBlocks list looking for blocks that need to be re-encrypted, due to issuance of new encryption key. When the server finds a block that needs to be re-encrypted, it sends the ciphertext with its key ID to the client with a request to re-encrypt the data. The client then decrypts the data and re-encrypt it with a newer key identified by the newer key version. The server then writes newer key version, and new ciphertext someplace in physical storage, and replaces the pointer in the deduplication table with a pointer to the newly stored ciphertext block. | 2021-12-02 |
20210377017 | Effective Key Management For Data Encryption and Decryption - The present disclosure generally relates to effective key management by properly matching keys used for encryption to data that needs to be decrypted after receiving instructions to change or delete keys. By matching the actual key, rather than just a key index, to a command, each command will use the correct key throughout the entire life-span of the command, even if the key is switched or deleted prior to servicing the command. To implement the key management, a snapshot of the doorbell database is taken. All pending commands that are in the snapshot are then fetched prior to updating a key database with either the change or deletion of the key. After fetching of all pending commands from the snapshot and ensuring the keys are stored in a command context, the key database is updated. | 2021-12-02 |
20210377018 | SECURE REMOTE ACCESS TO INDUSTRIAL CONTROL SYSTEMS USING HARDWARE BASED AUTHENTICATION - A system and method for secure remote access to an industrial control system using hardware based authentication is provided, comprising secure user authentication, secure interactive remote access or secure machine-to-machine remote access or communication, and remote access services. Secure user authentication comprises two-factor authentication based on smart cards, and secure interactive remote access via a managed remote-access appliance comprises a virtual machine and software that can only be used with a smart card credential. | 2021-12-02 |
20210377019 | ENCRYPTION KEYS FOR REMOVABLE STORAGE MEDIA - In some examples, a device receives a plurality of encryption keys from a secure storage of a management controller, where a first encryption key of the plurality of encryption keys is for site-wide access of information on removable storage media plugged into respective computers of a site, and a second encryption key of the plurality of encryption keys is to restrict access of information on removable storage media plugged into a subset of the computers. The device uses a given encryption key of the plurality of encryption keys to encrypt information written to or decrypt information read from a first removable storage medium plugged into a first computer of the computers, wherein the management controller is associated with and is separate from a processor of the first computer. | 2021-12-02 |
20210377020 | PRIVATE KEY CACHE IN SECURE ENCLAVE - Disclosed techniques relate to storing a key cache within a secure enclave. In some embodiments, a computing system receives, from an application, a request to access a database, where the request is associated with a particular account. The computing system then accesses, using an identifier associated with the particular account, a key cache stored in a secure enclave of a memory of the computing system to determine at least one private key associated with the request, where the key cache stores private keys of a key management system (KMS) for a plurality of accounts. The computing system performs a cryptographic operation for accessing the database within the secure enclave using the at least one private key. In various embodiments, disclosed techniques may improve the security of cryptographic private keys cached for a plurality of tenants. | 2021-12-02 |
20210377021 | Method for Synchronizing a Receiver Initialization Vector with a Transmitter Initialization Vector - A method for synchronizing transmitter and receiver initialization vectors includes: generating a key and providing the key to a transmitter and a receiver; initializing a transmitter initialization vector and a receiver initialization vector with an initialization vector; forming a transmitter partial counter from a counter of the transmitter initialization vector; encrypting a message using the key and the transmitter initialization vector; generating and transmitting a data packet containing the encrypted message and the transmitter partial counter; incrementing the counter; receiving a data packet with an encrypted message and the transmitter partial counter; extracting the transmitter partial counter from the data packet; forming a receiver partial counter from a counter of the receiver initialization vector; based on a comparison of the receiver partial counter and the transmitter partial counter, changing the counter of the receiver initialization vector; decrypting the message and incrementing the counter of the receiver initialization vector. | 2021-12-02 |
20210377022 | UNMANAGED SECURE INTER-APPLICATION DATA COMMUNICATIONS - Aspects of secure inter-application data communications are described. In one example, a first application executing on a computing device obtains an identity certificate. The identity certificate can include a unique identifier of the computing device and a public key of the first application. To obtain the public keys of other applications executing on the computing device, the first application can query a management computing environment using the identity certificate. Once the computing device is authenticated by the management computing environment, the management computing environment can store the public key of the first application and return any public keys of other applications executing on the computing device. Once the public keys have been exchanged between the applications, the applications can encrypt and sign data packages for secure data communications between each other. | 2021-12-02 |
20210377023 | METHOD AND SYSTEM FOR INTERACTING PUBLIC AND PRIVATE BLOCKCHAINS WITH CONTROLLED PARTICIPATION AND DISPUTE RESOLUTION - A method for controlling participation in a blockchain based on time includes: storing participant profiles, each including a public key of a cryptographic key pair and a period of time; storing a blockchain comprised of a plurality of blocks; receiving a block submission from a specific computing system including a digital signature and a new data value; verifying the digital signature based on the public key stored in a specific participant profile related to the specific computing system; verifying that the specific computing system is eligible for participation in the blockchain based on the period of time included in the specific participant profile and a present time; generating a new block comprised of a block header and the new data value; and transmitting the generated new block to nodes associated with the blockchain. Private blockchains are generated for dispute resolution of things posted to the primary blockchain. | 2021-12-02 |
20210377024 | NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE AND COMMUNICATION DEVICE - A first terminal device may receive first address information which is a first IP address of the first communication device from the first communication device by using a communication network to which the first terminal device and a first communication device belong, and a first public key of the first communication device. The first terminal device may send a first authentication request in which the first public key is used to the first communication device with the first address information as a destination, and send first connection information to the first communication device with the first address information as a destination in a case where a first authentication response is received from the first communication device. The first connection information may be used by the first communication device to establish a first wireless connection between the first communication device and an external device. | 2021-12-02 |
20210377025 | CRYPTOGRAPHIC PROCESSING EVENTS FOR ENCRYPTING OR DECRYPTING DATA - A cryptographic method is provided. The cryptographic method comprises an initialisation phase for determining a provisional generator point G′ equal to a first product G′=[d′]G, where d′ is a first random scalar forming a secret key of N bits and G is a generator point of an elliptical curve, and determining a provisional key Q′ equal to a second product Q′=[d′]Q, where Q is a point of the elliptical curve forming a public key. During an encryption phase a second random scalar forming a second secret key k of M bits, with M2021-12-02 | |
20210377026 | METHOD FOR MULTIPLYING POLYNOMIALS FOR A CRYPTOGRAPHIC OPERATION - A method is provided for multiplying two polynomials. In the method, first and second polynomials are evaluated at 2t inputs, where t is greater than or equal to one, and where each input is a fixed power of two | 2021-12-02 |
20210377027 | USER AND USER DEVICE AUTHENTICATION - Disclosed are systems and methods for authenticating a user and a user device. In one embodiment, a method does not use any stored usernames, passwords, or tokens. In certain embodiments, a when a user requests authentication a server provides variable values to a client device. The client device returns to the server an output based on inputting the variable values into formulas associated with the client device. The server uses the client device generated output to authenticate the client device and the user by, in some embodiments, attempting to decrypt a user ID file associated with the client device. Each time the user requests authentication different variable values are used to prevent prediction and hacking of the system. | 2021-12-02 |
20210377028 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR SECURED DATA TRANSFER OVER A DECENTRLAIZED COMPUTER NETWORK - A method and apparatus for secured, peer-to-peer transfer of data rights over a computer network, the method being accomplished by a distributed computing system including a distributed ledger platform and an off-chain data host platform. On-chain authorization tokens are used to track data access rights, enforce access policies, and control distribution of encryption keys. | 2021-12-02 |
20210377029 | DYNAMIC SEGMENTATION OF NETWORK TRAFFIC BY USE OF PRE-SHARED KEYS - Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted. | 2021-12-02 |
20210377030 | OFFLINE AUTHENTICATION OF BATTERIES - An offline authentication of batteries includes communicating an encrypted authentication request to secondary batteries and a vehicle controller by a primary battery of an electric vehicle. The encrypted authentication request is decrypted to obtain a first random number and a fleet flag. An encrypted authentication response, including a first random number, a second random number, and a vehicle identifier, is communicated to each battery. Each battery verifies the first random number and the vehicle identifier. An encrypted battery status, including the first and second random numbers and an authentication status, is communicated to the primary battery that verifies the first and second random number and the authentication status. The primary battery communicates an encrypted authentication message to the secondary batteries and the vehicle controller. The secondary batteries and the vehicle controller verify the first and second random numbers and the authentication status for authenticating each battery. | 2021-12-02 |
20210377031 | PREVENTING MALFORMED CIPHERTEXT ATTACKS ON PRIVACY PRESERVING BIOMETRIC AUTHENTICATION - Embodiments may include techniques to prevent illegal ciphertexts using distance computations on homomorphic and/or functional encrypted templates while detecting whether the resulting distance does not meet requirements for validity. For example, a method may comprise receiving and storing enrollment information from a client computer system, the enrollment information comprising an encrypted enrollment template of authentication data and a plurality of randomly generated encrypted templates, receiving an additional encrypted template to be used to authenticate the user from the client computer system, authenticating the user by determining distances between the received additional encrypted template and the stored encrypted enrollment template and the each of the stored plurality of randomly generated encrypted templates, and determining that authentication is successful when the received additional encrypted template meets distance requirements relative to the stored encrypted enrollment template and the each of the stored plurality of randomly generated encrypted templates. | 2021-12-02 |
20210377032 | SYSTEM AND METHOD FOR MANAGING TRUST AND WEARABLE DEVICE FOR USE THEREWITH - Disclosed is a system for managing trust. The system comprises at least one wearable device, at least one terminal device and a server arrangement. The server arrangement is configured to determine occurrence of a first type of event between a wearable device and another wearable device or a second type of event between the wearable device and a terminal device; receive a device ID and a class of each of the at least one wearable device and the at least one terminal device; receive a rating and process the rating to generate updated activity information for each of the wearable device, and the other wearable device or the terminal device; update a profile corresponding to each of the at least one wearable device or the at least one terminal device with the updated activity information and allocate an incentive for the profile based on the updated activity information. | 2021-12-02 |
20210377033 | CLOUD-BASED MANAGEMENT SERVICE DEVICE REGISTRATION USING INTERMEDIATE CLOUD STORAGE - Techniques are described herein that are capable of registering a user device with a cloud-based management service using an intermediate cloud storage. For instance, the intermediate cloud storage may store an encrypted data blob including information that identifies the user device. The intermediate cloud storage or a registration system may decrypt the encrypted data blob so that the registration system may use the decrypted data blob to register the user device with the cloud-based management service. For instance, the registration system may retrieve the encrypted or decrypted data blob from the intermediate cloud storage by providing a requisite secret to the intermediate cloud storage. The requisite secret may be provided to the registration system by the user device (e.g., via a matrix barcode, such as a QR code). | 2021-12-02 |
20210377034 | AUTHENTICATION USING KEY DISTRIBUTION THROUGH SEGMENTED QUANTUM COMPUTING ENVIRONMENTS - Methods, systems, and apparatus for authenticating and authorizing users using quantum key distribution through segmented quantum computing environments. In one aspect, a method includes receiving a first and second plaintext data input from a first party and from a second party, respectively; applying a quantum computation translation operation to the first and second plaintext data inputs to generate a corresponding first sequence of quantum computations and a second sequence of quantum computations; implementing the first and second sequence of quantum computations in a first and second segmented quantum computing environment, respectively, to obtain a first and second sequence of measurement results; generating a first and second encryption key using the first and second sequence of measurement results, respectively, and an encrypted authorization token using the second encryption key; and sending the first encryption key to the first party, and the encrypted authorization token to the second party. | 2021-12-02 |
20210377035 | INTELLIGENT HASHING OF SENSITIVE INFORMATION - Described are techniques for preserving data security for sensitive information. The techniques including identifying sensitive information in first audio data from a first client device. The techniques further comprise generating second audio data including hashed sensitive information, where the hashed sensitive information comprises an audio clip that replaces the sensitive information and that is based on the sensitive information. The techniques further comprise transmitting the second data including the hashed sensitive information to a second client device. The techniques further comprise receiving third audio data including the hashed sensitive information from the second client device. The techniques further comprise generating fourth audio data by replacing the hashed sensitive information with the sensitive information and transmitting the fourth audio data including the sensitive information to the first client device. | 2021-12-02 |
20210377036 | DATA STRUCTURES - In an example, a data structure comprises a first genesis record having an associated authentication value and a plurality of subsequent records arranged in an order, wherein at least one subsequent record includes the authentication value associated with the first genesis record and an authentication value associated with another record in the data structure. A method may include designating one of the subsequent records as a second genesis record, acquiring an authentication value for the second genesis record, deleting at least one record preceding the second genesis record in the data structure and adding a further record to the data structure wherein the further record includes the authentication value of the second genesis record and an authentication value associated with a directly preceding record in the data structure. | 2021-12-02 |
20210377037 | ASYNCHRONOUSLY DETERMINING RELATIONAL DATA INTEGRITY USING CRYPTOGRAPHIC DATA STRUCTURES - Methods for asynchronously determining relational data integrity using cryptographic data structures are performed by systems and devices. Changes in current tables of relational databases are reflected in associated history tables. Cryptographic hybrid blockchain ledgers are updated with transaction records, for entry changes in current and history tables, including transaction information and hash values of corresponding entry changes. Hybrid blockchain ledgers also include root hash values of Merkle trees of transaction records in current blocks, and hash values of prior blocks. A current block receipt is asynchronously generated and provided as a single hash value from which the validity states of the tables and ledger are able to be verified. Cryptographic receipts of specific transactions reflected in table entry changes are generated and provide immutable evidence of specific transaction existence for users. Ledger-enabled tables are provided for mixed database operations with ledger-disabled tables, and temporal history table database operations are enabled. | 2021-12-02 |
20210377038 | METHOD AND APPARATUS FOR PROCESSING PRIVACY DATA OF BLOCK CHAIN, DEVICE, AND STORAGE MEDIUM - Embodiments of the present disclosure disclose a method for processing privacy data of a block chain. When implemented by a block chain node, a specific implementation comprises: acquiring a data calculation transaction request initiated by a data user side based on a privacy smart contract; acquiring homomorphically encrypted source data according to the data calculation transaction request; invoking the privacy smart contract according to a calculation task in the data calculation transaction request; and performing an uplink operation on the data calculation transaction request and the calculation result to feed the data calculation transaction request and the calculation result back to the data user side of the data calculation transaction request, for the data user side to perform a homomorphic decryption and de-blinding on the calculation result, to acquire a plaintext calculation result. Thus, the scheme of processing the privacy data of the block chain is optimized. | 2021-12-02 |
20210377039 | CHECKOUT WITH MAC - A system for protecting personal information uses a challenge and an encrypted copy of the challenge in the form of a message authentication code (MAC) to provide authentication among multiple parties. The challenge is received by a first party from a second party. The challenge is encrypted by the first party to form the MAC and then both the challenge and the MAC are returned to the second party. The second party authenticates the first party by confirming the challenge. The second party sends the MAC and challenge to the third party. The third party decrypts the MAC using a key shared with the first party. When the decrypted MAC matches the challenge, the first party is authenticated to the third party. The process is applicable to transaction processing to limit compromise of payment instrument details. | 2021-12-02 |
20210377040 | TRUST AND IDENTITY MANAGEMENT SYSTEMS AND METHODS - The disclosure relates to, among other things, systems and methods for facilitating the secure recording and use of assertions made by entities regarding other entities. Embodiments of the disclosed systems and methods provide mechanisms to make assertions in an authentic and authoritative manner and enable discovery and reliance on those assertions using trusted distributed ledgers and/or derivatives of the same. Various embodiments may be used in connection with establishing security associations and/or secure communication channels between entities and/or the secure management of governed electronic resources. | 2021-12-02 |
20210377041 | SYSTEM FOR RECORDING VERIFICATION KEYS ON A BLOCKCHAIN - Systems and methods described herein relate to the execution of locking transactions in a blockchain system. In the context of smart contracts, it may be advantageous to have a public record (e.g., recorded on a blockchain) of a proof of correct execution of a circuit published by a worker and the verification key, thereby allowing anyone (e.g., nodes of the blockchain) to verify validity of the computation and proof. However, there are challenges to recording large blocks of data (e.g., large keys that may comprise multiple elliptic curve points) on the blockchain. For example, in a Bitcoin-based blockchain network, a protocol that utilizes standard transactions may be constrained to locking scripts and unlocking scripts that are collectively no t larger than a first predetermined size limit, and the size of a redeem script (if utilized) may be limited to being no more than a second predetermined size limit | 2021-12-02 |
20210377042 | ELECTRONICALLY VERIFYING A PROCESS FLOW - A method verifies an authenticity, integrity, and provenance of outputs from steps in a process flow. One or more processor(s) validate one or more inputs to each step in a process flow by verifying at least one of a hash and a digital signature of each of the one or more inputs. The processor(s) then generate digital signatures that cover outputs of each step and the one or more inputs to each step, such that the digital signatures result in a chain of digital signatures that are used to verify an authenticity, an integrity and a provenance of outputs of the one or more steps in the process flow. | 2021-12-02 |
20210377043 | SYSTEMS AND METHODS FOR USE IN PROVISIONING CREDENTIALS - Systems and methods are provided for provisioning identity credentials based on interactions with verifying or trusted users. One exemplary computer-implemented method includes receiving a request for a digital identity from a user, where the request includes identifying information for the user and a verified user identifier, and transmitting, to a verified user associated with the verified user identifier, an attestation request for the user. The method also includes receiving, from the verified user, an attestation in response to the attestation request with regard to at least some of the identifying information for the user, generating a digital identity for the user based on a number of attestations of the identifying information for the user, and sharing a digital identity notice with the user including an identifier for the user, whereby the user is permitted to share the digital identity with a relying party via the identifier. | 2021-12-02 |
20210377044 | EPHEMERAL CRYPTOGRAPHY KEYS FOR AUTHENTICATING COMPUTING SERVICES - Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed. | 2021-12-02 |
20210377045 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR AUTHENTICATION AND AUTHORIZATION OF NETWORKED DATA TRANSACTIONS - A method and apparatus for cryptographically linking separated authentication and authorization processes to support data transaction signing when group or corporate authority structures are required. The apparatus provides a secure, scalable model to represent authority in an entity context while conducting distributed ledger technology transactions. The method supports a range of cryptographic methods for separating the linked authentication and authorization processes including split key encryption, multi-party computation, multi-signature authorization, and execution of decentralized smart contract authorization logic. The method supports multiple models for authorization including organizational structures, consensus models including voting, and workflow processes. | 2021-12-02 |
20210377046 | METHOD, SYSTEM, TRANSMITTER, AND RECEIVER FOR AUTHENTICATING A TRANSMITTER - Method, system, transmitter, and receiver for authenticating a transmitter. The authentication is performed using an asymmetric key pair and using a digital signature. | 2021-12-02 |
20210377047 | SYSTEMS, METHODS, AND APPARATUSES FOR NETWORK MANAGEMENT - Methods, systems, and apparatuses for network management are described. A network device may provide a network that is accessible using a network credential. An internet of things (IoT) device may be required to be configured or provisioned before joining the network. The IoT device may be associated with a scannable identifier. A user device may determine the scannable identifier and, based on the scannable identifier, provide provisioning credentials to the IoT device. | 2021-12-02 |
20210377048 | Digital Signature Method, Signature Information Verification Method, Related Apparatus and Electronic Device - This application discloses a digital signature method, a signature information verification method, a related apparatus and an electronic device, and relates to the field of information security in quantum computing. The digital signature method includes: acquiring a to-be-sent file and a private key used by a first electronic device for digital signature, where the private key includes a first invertible matrix; generating, based on a randomly generated second invertible matrix and a first tensor, a second tensor isomorphic to the first tensor; using a hash function to digitally sign the to-be-sent file based on the second tensor, to obtain a first character string; generating, based on the first character string, the first invertible matrix and the second invertible matrix, signature information provided by the first electronic device for the to-be-sent file. | 2021-12-02 |
20210377049 | Combined Digital Signature Algorithms for Security Against Quantum Computers - A server can record (i) a first digital signature algorithm with a first certificate, and a corresponding first private key, and (ii) a second digital signature algorithm with a second certificate, and a corresponding second private key. The server can select first data to sign for the first algorithm and the first private key in order to generate a first digital signature. The server can select second data to sign, wherein the second data to sign includes at least the first digital signature. The server can generate a second digital signature for the second data to sign using the second algorithm and the second private key. The server can transmit a message comprising (i) the first and second certificates, and (ii) the first and second digital signatures to a client device. Systems and methods can concurrently support the use of both post-quantum and classical cryptography to enhance security. | 2021-12-02 |
20210377050 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR OBTAINING DIGITALLY SIGNED DATA - A method of obtaining digitally signed data is disclosed. The method comprises sending first data (e | 2021-12-02 |
20210377051 | METHOD OF ESTABLISHING A FUTURE 2-WAY AUTHENTICATION BETWEEN A CLIENT APPLICATION AND AN APPLICATION SERVER - A process for establishing a future 2-way authentication between a client application and an application server. In operation, an OIDC server receives a request from the client application to establish a secure connection from the client application. The request includes a certificate generated using a public-private key pair associated with the client application or a user, and authentication credentials associated with the client application or the user. The OIDC server establishes that the authentication credentials are valid, and provisions a cryptographic identifier of the certificate associated with the request to a list of trusted certificates. The OIDC server then provides one or more application servers with access to the list of trusted certificates to enable the application servers to authenticate the client application based on verifying that cryptographic identifier of the certificate presented by the client application is provisioned into the list of trusted certificates. | 2021-12-02 |
20210377052 | SOCIAL MEDIA CONTENT MANAGEMENT SYSTEMS - Disclosed embodiments provide techniques for computerized moderation, authorship recording, and distribution of social media content. Moderator-supplied tags are associated with content and supplied to a machine learning system as training data. Using blockchain, authorship is authenticated and can be converted from anonymous to non-anonymous. Collaboration among authors on content is supported with authorship lists that can contain a mix of anonymous and non-anonymous authors. Contribution limits are established to determine royalty payments for sale and rent of content. | 2021-12-02 |
20210377053 | SYSTEMS AND METHODS FOR CONFIGURING A NETWORK FUNCTION PROXY FOR SECURE COMMUNICATION - A device may determine that a network function of a network is to use a secure communication protocol. The network function may be configured to facilitate communication via the network. The device may identify a component of a resource configuration that is to instantiate the network function. The device may instantiate, using the component, a proxy for the network function. The device may configure the proxy to obtain a certificate that is associated with the secure communication protocol. The device may cause the proxy to use the certificate to communicate with another proxy that is associated with the network function to perform an operation associated with the network function. | 2021-12-02 |
20210377054 | SYSTEMS AND METHODS FOR MANAGING PUBLIC KEY INFRASTRUCTURE CERTIFICATES FOR COMPONENTS OF A NETWORK - A device may determine that a network function of a network has been instantiated to facilitate communication via the network. The device may request a certificate authority to provide a certificate for the network function. The device may receive, from the certificate authority, the certificate. The device may generate a certificate profile to enable other network functions of the network to authenticate communications with the network function, wherein the certificate profile identifies: the certificate and a certification protocol. The device may provide, to the network function, the certificate profile to cause the network function to use the certificate to communicate with the other network functions. | 2021-12-02 |
20210377055 | CLIENT CERTIFICATE AUTHENTICATION IN MULTI-NODE SCENARIOS - A routing plane includes an authentication packaging system that receives client authentication information, as part of a request from a requesting client that is to be routed to a target service. The authentication packaging system combines the authentication information with assertion information indicative of an assertion as to the identity of the routing plane, using an entropy, such as a signing key. The authentication package is attached to the request and is sent to the target service. The target service validates the authentication package based on the entropy and authenticates the routing plane based on the assertion information and performs authentication processing based on the authentication information. | 2021-12-02 |
20210377056 | SECURE SHARING OF CREDENTIAL INFORMATION - A first user device may be used to request provisioning of a secure credential on a second user device. A provisioning system may facilitate the provisioning in a manner that ensures security and privacy of the requesting parties. The provisioning requests may be made using an application on the first user device such as a third-party application or using a web application via a browser. The credential may be added to a digital wallet on the second user device. The credential may be useable by the second user device to perform one or more contactless transactions. | 2021-12-02 |
20210377057 | DEVICES AND METHODS FOR AUTHENTICATION - A device has a receiver designed to receive a data packet from a communication partner, a data processor to process the data packet in order to obtain a secret value, a transmitter designed to transmit a transmit message having information based on the secret value to the communication partner, and an authentication device designed to receive a challenge message and to use the secret value to create a response message, wherein the transmitter is designed to create the transmit message to include the response message. | 2021-12-02 |
20210377058 | INTEGRATED PHYSICAL UNCLONABLE FUNCTION DEVICE - An integrated physical unclonable function device includes at least one reference capacitor and a number of comparison capacitors. A capacitance determination circuit operates to determine a capacitance of the at least one reference capacitor and a capacitance of each comparison capacitor. The determined capacitances of the comparison capacitors are then compared to the determined capacitance of the reference capacitor by a comparison circuit. A digital word is then generated with bit values indicative of a result of the comparisons made by the comparison circuit. | 2021-12-02 |
20210377059 | POWER DISTRIBUTION OVER ETHERNET CONNECTION - In an embodiment, an apparatus includes a source device including a first current limiter and a second current limiter in parallel with each other and a first transformer and a second transformer; a load device includes a third transformer and a fourth transformer in parallel with each other; and an Ethernet cable is electrically coupled between the source device and the load device, the Ethernet cable including first twisted pair lines and second twisted pair lines. A direct current (DC) voltage is provided to the first current limiter and the second current limiter, the first transformer is electrically coupled to an output of the first current limiter, and the second transformer is electrically coupled to an output of the second current limiter. The DC voltage is transmitted to the third transformer and the fourth transformer in parallel with each other via the first twisted pair lines and the second twisted pair lines. The first twisted pair lines and second twisted pair lines are included in an Ethernet cable electrically coupled between the source device and the load device. | 2021-12-02 |
20210377060 | CONTROLLER AREA NETWORK CONTROLLER AND TRANSCEIVER - A Controller Area Network, CAN, transceiver comprising: two terminals for coupling to a CAN bus; a transmitter arrangement configured to transmit signalling on the bus based on transmit data, the transmitter arrangement configured to drive the bus to a dominant state or recessive state based on the transmit signal; an impedance control device; a signalling detector to determine the length of time the transmit data comprises a logic zero prior to a transition to a logic one state and: based on the length of time being longer than a predetermined threshold, provide for control of an output impedance by the impedance control device in accordance with a first scheme; and based on the length of time being shorter than said predetermined threshold, provide for one of: control of said output impedance in accordance with a second scheme; and no control of the output impedance by the impedance control device. | 2021-12-02 |
20210377061 | SYSTEMS AND METHODS FOR SELECTIVE PROVISIONING OF A CHARGING FUNCTION IN A WIRELESS NETWORK - A system described herein may provide for the selection of a charging function (“CHF”) associated with a particular user equipment (“UE”). A particular CHF may be selected, from a group of candidate CHFs, based on CHF selection criteria respectively associated with the candidate CHFs and attribute information associated with the UE. The attribute information may describe attributes of the UE, profile information associated with the UE, and/or attributes of traffic and/or bearers associated with the UE. | 2021-12-02 |
20210377062 | DYNAMIC VIRTUAL ENVIRONMENT - Techniques for conducting a virtual event are described. One example method includes displaying, on a display screen of a computing device, a plurality of icons, each icon representing a different virtual event participant, wherein the plurality of icons includes a first icon representing a virtual event participant associated with the computing device; receiving, from an input device of the computing device, input representing a direction of movement for the first icon; and in response to receiving the input, moving the first icon on the display screen in the direction represented by the input. | 2021-12-02 |
20210377063 | INCLUSIVENESS AND EFFECTIVENESS FOR ONLINE MEETINGS - A system or method may be used to improve effectiveness or inclusiveness of a communication session. A method may include identifying first parameters for the communication session and determining at least one second parameter as an output of a multivariate model using the first parameters as an input, the at least one second parameter output from the multivariate model based on the at least one second parameter having, compared to at least one of the first parameters, a higher likelihood of achieving inclusiveness. In an example, at least one graphical control may be generated for changing one of the first parameters to the at least one second parameter. | 2021-12-02 |
20210377064 | SYSTEMS AND METHODS FOR UPSTREAM AND DOWNSTREAM CATV PLANT CAPACITY EXPANSION - Systems and methods for permitting DOCSIS 3.1 equipment to operate at higher frequencies than specified in the DOCSIS 3.1 standard. Exemplary systems may be capable of alternating between a first mode of operation that provides DOCSIS 3.1 compatible services and a second mode of operation providing a higher level of service than DOCSIS 3.1. | 2021-12-02 |
20210377065 | ELECTRONIC DEVICE AND METHOD FOR CONTINUOUSLY REPRODUCING MULTIMEDIA CONTENT IN EXTERNAL ELECTRONIC DEVICE - An electronic device and a method for controlling the electronic device are provided. Multimedia content is reproduced in the electronic device. After the reproduction of the multimedia content in the electronic device, a display of the electronic device is controlled to display a plurality of objects respectively indicating a plurality of external devices which is identified by the electronic device. In response to input to an object among the plurality of objects, an external device indicated by the object is authorized to continuously reproduce multimedia content. | 2021-12-02 |
20210377066 | COMMUNICATION CONTROL DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A communication control device includes: a processor configured to: acquire identification information of a communication terminal from the communication terminal that is authenticated by communication via a wide area communication network; and when the identification information is included in a storage storing an information set in which associated are (i) the identification information of the communication terminal and (ii) specific connection unit information indicating a specific connection unit that is predetermined for the communication terminal in a narrow area communication network different from the wide area communication network, perform control such that the communication terminal is connected to the specific connection unit as a connection destination of the communication terminal, based on the specific connection unit information of the information set including the acquired identification information. | 2021-12-02 |
20210377067 | NETWORK ACCESS METHOD AND APPARATUS, AND STORAGE MEDIUM - The present disclosure relates to a network access method, which belongs to the technical field of smart homes. The method includes: after short-distance wireless communication is established between a smart home device and a terminal, the terminal receiving access requirement information transmitted by the smart home device; the terminal determining a target base station according to the access requirement information; the terminal transmitting access information for accessing the target base station to the smart home device; and the smart home device initiating a random access to the target base station according to the access information, such that the smart home device accesses a cellular mobile network. According to the present disclosure, a terminal provides access information required for accessing a base station to a smart home device, such that the smart home device initiates random access to the base station in order that the smart home device performs information interaction with the base station by means of cellular mobile communication, thereby meeting the communication requirements of the smart home device. | 2021-12-02 |
20210377068 | AGGREGATOR APPARATUS FOR STANDARDIZED ACCESS TO A PLURALITY OF NETWORK SEGMENTS OF A FIELD BUS SYSTEM - An aggregator is designed to form first data connections to field access devices. The field access devices are connected to different network segments of a field bus system. The aggregator forms a second data connection to a host computer. The aggregator receive first data traffic from the host computer via the second data connections and to forward the first data traffic, via the first data connections to a field access device of that network segment in which the particular field bus component, to which the first data traffic is directed, is situated. The aggregator is also designed to receive second data traffic from a field bus component in one of the network segments via at least one of the first data connections and to forward the second data traffic to at least one of the host computers via at least one of the second data connections. | 2021-12-02 |
20210377069 | AUTOMATION NETWORK, NETWORK DISTRIBUTOR AND METHOD FOR TRANSMITTING DATA - An automation network with network subscribers is provided, in which the network subscribers are interconnected via a data line network. At least one network subscriber is configured as a master subscriber, which is adapted to send telegrams via the data line network. At least one network subscriber is configured as a network distributor, which is adapted to route telegrams. The network distributor has a plurality of input/output ports, and is connected to the master subscriber via a first input/output and data line network. The master subscriber is configured to use a telegram element to indicate that the telegram is enabled for processing by the network subscribers. In addition, the network distributor is configured to process a telegram received via the first input/output port when the telegram element indicates enablement of processing of the telegram by the network subscribers. | 2021-12-02 |