52nd week of 2018 patent applcation highlights part 74 |
Patent application number | Title | Published |
20180375618 | ACK CLOCK COMPENSATION FOR HIGH-SPEED SERIAL COMMUNICATION INTERFACES - In a serial communication interface with transceivers that run on different clocks, an ACK transmit FIFO is used to track packets transmitted, and an ACK receive queue is used to track ACK bits for received packets. The ACK receive queue contains a number of entries, and training for the transceivers begins transmitting ACK bits from the ACK receive queue once the ACK receive queue has multiple valid ACK bits. When the ACK receive queue is less than a lower threshold, an ACK compensation mechanism sends one or more packets that make the ACK receive queue grow. When the ACK receive queue is more than an upper threshold, the ACK compensation mechanism sends one or more packets that make the ACK receive queue shrink. The combination of the ACK receive queue and the ACK compensation mechanism allow dynamically compensating for the different clocks of the two transceivers. | 2018-12-27 |
20180375619 | METHOD FOR TRANSMITTING UPLINK CONTROL INFORMATION AND USER APPARATUS FOR CARRYING OUT SAME - Provided is a method for a user equipment (UE) for reporting uplink control information according to one embodiment of the present specification. The method may comprise the steps of: determining whether a simultaneous transmission is permitted of a first uplink control channel configured with a transmission time interval (TTI) of a first size and a second uplink control channel configured with a TTI of a second size which is different from the first size; if a simultaneous transmission is permitted, then determining if a full or partial overlap exists between a resource for the first uplink control channel and a resource for the second uplink control channel; and, if a full or partial overlap of resources exist, then selecting any one from among the first uplink control channel and second uplink control channel, and transmitting uplink control information to be transmitted by the first uplink control channel and second uplink control by means of the selected uplink control channel. | 2018-12-27 |
20180375620 | METHOD AND DEVICE FOR SHORT-LATENCY COMMUNICATIONS IN UE AND BASE STATION - The disclosure provides a method and a device for reducing latency in radio communications. A User Equipment (UE) first receives K radio signal groups and then transmits an uplink signaling, K being a positive integer greater than 1 and the uplink signaling including HARQ-ACK information, wherein lengths of Enhanced Transmission Time Intervals (eTTIs) corresponding to the K radio signal groups correspond to K time lengths respectively, and any two time lengths of the K time lengths are not equal. The HARQ-ACK information indicates whether a coding block in the K radio signal groups is correctly decoded. The numbers of radio signals in the K radio signal groups are Q | 2018-12-27 |
20180375621 | DATA RETRANSMISSION - A technique is provided for controlling sending, by a user device to a network node in a wireless network via spatial multiplexing during a first transmission time interval, a first instance of a first protocol data unit via a first transport block and a first instance of a second protocol data unit via a second transport block, controlling receiving a first data indicator associated with the first transport block that indicates that the first transport block was not received by the network node, and controlling sending, by the user device to the network node via spatial multiplexing during a second transmission time interval in response to receiving the first data indicator, at least a portion of a second instance of the first protocol data unit via a third transport block and at least a portion of a third instance of the first protocol data unit via a fourth transport block. | 2018-12-27 |
20180375622 | DYNAMIC COVERAGE ENHANCEMENT - A plurality of payload messages ( | 2018-12-27 |
20180375623 | TERMINAL DEVICE, COMMUNICATION METHOD, AND INTEGRATED CIRCUIT - A terminal device and a base station device efficiently communicate with each other. The terminal device includes a transmission unit configured to repeatedly transmit uplink control information including at least one CQI using a plurality of PUCCHs in a plurality of subframes, in a case where uplink control information is transmitted in the PUCCH in an initial subframe included in the plurality of subframes, based on whether the uplink control information includes an HARQ-ACK, (i) the uplink control information is transmitted using the PUCCH in a first subframe included in the plurality of subframes, or (ii) the uplink control information is not transmitted in the first subframe included in the plurality of subframes. | 2018-12-27 |
20180375624 | METHOD AND APPARATUS FOR RE-TRANSMITTING MMT PACKET AND METHOD AND APPARATUS FOR REQUESTING MMT PACKET RE-TRANSMISSION - The present invention discloses a method of re-transmission of a lost MMT packet by a packet transmission apparatus. The method includes generating a media processing unit (MPU) based on a media fragment unit (MFU) and generating an MMT asset by encapsulating the MPU; generating an MMT packet based on the MPU included in the generated MMT asset; and transmitting the generated MMT packet, wherein the method further comprises adding, in a signaling message related to re-transmission of the MMT packet, delay_constrained_ARQ_flag to indicate whether or not the MMT packet transmission apparatus supports a delay-constrained automatic repeat request (ARQ) function. | 2018-12-27 |
20180375625 | TECHNIQUES AND APPARATUSES FOR SHARED REFERENCE SIGNAL TRANSMISSION AND RECEPTION - Certain aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may determine a shared demodulation reference signal (DMRS) configuration for a plurality of resource blocks of a channel, wherein a frequency domain associated with the plurality of resource blocks overlaps for a control resource of the channel and a data resource of the channel, and wherein the plurality of resource blocks are associated with a shared precoding scheme. The device may transmit a DMRS based at least in part on determining the shared DMRS configuration to enable a receiver to receive the plurality of resource blocks of the channel. Numerous other aspects are provided. | 2018-12-27 |
20180375626 | DOWNLINK POWER ALLOCATION METHOD FOR MUST TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - The present application discloses a method for transmitting a downlink signal by a base station in a wireless communication system. Particularly, the method comprises the steps of: distributing a total transmission power with respect to data for a short range user equipment (UE) and data for a long range UE; and transmitting the data for the short range UE through a plurality of layers, and transmitting the data for the long range UE through at least one of the plurality of layers, using the distributed transmission power, wherein the data for the short range UE and the data for the long range UE are transmitted through the same time resource and the same frequency resource, and a transmission power of the data for the short range UE distributed for each of the plurality of layers has an equal value. | 2018-12-27 |
20180375627 | TERMINAL DEVICE, BASE STATION DEVICE, COMMUNICATION METHOD, AND INTEGRATED CIRCUIT - A terminal device and a base station device efficiently communicate with each other. For the terminal device, in a case that third information is configured, a third maximum number of layers assumed for determining a bit width for a first RI and a fourth maximum number of layers assumed for determining a bit width for a second RI are provided, based on the third information. In a case that third information is not configured, (i) the third maximum number is provided, based on the smallest of a first number and a second number, and (ii) the fourth maximum number is provided, based on a smallest one of the first number and a third number. The first number is a second maximum number of the layers indicated by second information, the second number is a largest one of the number of antenna ports of a plurality of first CSI-RS resources, and the third number is a largest one of the number of antenna ports of a plurality of second CSI-RS resources. | 2018-12-27 |
20180375628 | COMMON REFERENCE SIGNALS FOR MULTIPLE SEARCH SPACES WITHIN A CONTROL RESOURCE SET - Methods, systems, and devices for wireless communication are described. In some wireless communications systems, a base station may transmit control information to a user equipment (UE) in a control resource set (coreset) of a transmission time interval (TTI). As described herein, the base station may transmit common control information in a common search space (CSS) of the coreset and a UE-specific control information in a UE-specific search space (USS) of the same coreset. In addition, the base station may transmit reference signals in the coreset to allow the UE to perform channel estimation to correctly decode or demodulate the control information in the CSS and USS of the coreset. In some examples, the reference signals transmitted in the CSS and USS of the coreset may include a common sequence for the coreset. | 2018-12-27 |
20180375629 | TECHNIQUES FOR ORTHOGONAL DEMODULATION REFERENCE SIGNALS - Various aspects described herein relate to techniques for using orthogonal demodulation reference signals (DMRSs) for downlink control channels in wireless communications systems. In an aspect, a method for a user equipment (UE) includes receiving one or more DMRSs over a multi-symbol downlink control channel. The method may further include identifying a time-first control channel element (CCE)-to-resource element group (REG) mapping for the multi-symbol downlink control channel, and identifying an orthogonal DMRS of the one or more DMRSs based on the time-first CCE-to-REG mapping, and decoding the multi-symbol downlink control channel based on at least the identified orthogonal DMRS. | 2018-12-27 |
20180375630 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATION USING MODULATION, CODING SCHEMES, AND TRANSPORT BLOCK SIZES - A method of processing a signal received over a wireless link may utilize sharing of Modulation and Coding Scheme (MCS) and Transport Block Size (TBS) data. At least one parameter is obtained including a sub-carrier spacing of a transport format. A modulation order and a transport block size may be detected, based on the at least one parameter. The signal received over the wireless link is then processed, based on the detected modulation order and the transport block size. An apparatus may perform the embodiments of the method to process the received signal. | 2018-12-27 |
20180375631 | Reference Signal Transmission Method, Apparatus, And System - The present disclosure relates to a reference signal transmission method. In one example method, physical layer signaling is received by a terminal device. The physical layer signaling includes configuration information. The configuration information indicates a time domain resource of a reference signal. The time domain resource of the reference signal is determined by the terminal device according to the configuration information. The reference signal and a first physical channel is sent by the terminal device. The reference signal is used for demodulation of the first physical channel. | 2018-12-27 |
20180375632 | METHOD FOR SUPPORTING FLEXIBLE RESOURCE ALLOCATION IN WIRELESS COMMUNICATION SYSTEM, AND DEVICE THEREFOR - Disclosed is a method by which an operating station (STA) transmits a signal in a multiple user (MU) scheme in a wireless LAN (WLAN) system. In the present method, the STA configures a wireless frame, which includes a data field for data transmission and a signaling (SIG) field including control information, wherein the SIG field includes a SIG A field, which includes bandwidth information indicating the whole bandwidth having a bandwidth of 2 | 2018-12-27 |
20180375633 | UPLINK AND DOWNLINK TRANSMISSION RESOURCE ALLOCATION METHOD AND DEVICE - Disclosed are an uplink and downlink transmission resource allocation method and device. In this application, a first channel is transmitted on a specified time-frequency resource within a first channel transmitting period according to the first channel transmitting period. The first channel is at least used for notifying allocation information of an uplink transmission resource and a downlink transmission resource within the first channel transmitting period or an effective time period of the first channel, so that dynamic partitioning and notification of the uplink transmission resource and the downlink transmission resource are achieved. | 2018-12-27 |
20180375634 | OVERLAPPING CODE BLOCK GROUPS FOR MULTIPLE CODEWORDS - Methods, systems, and devices for wireless communication are described that support overlapping code block groups (CBGs) for multiple codewords. A receiving device may receive multiple codewords from a transmitting device over a set of spatial layers. The receiving device may determine an association between a set of feedback bits and code blocks (CBs) of the multiple codewords. The association may be based on a CBG configuration, which may bundle one or more sets of CBs of the one or more codewords using time boundaries (e.g., symbols) or based on a uniform or proportional CB distribution. Based on whether decoding of the codewords is successful, the receiving device may transmit the set of feedback bits. The number of feedback bits may be the same regardless of whether one or two codewords are received. | 2018-12-27 |
20180375635 | METHOD AND APPARATUS FOR SELECTING MULTIPLE TRANSPORT FORMATS AND TRANSMITTING MULTIPLE TRANSPORT BLOCKS SIMULTANEOUSLY WITH MULTIPLE H-ARQ PROCESSES - A method and apparatus for selecting multiple transport formats and transmitting multiple transport blocks (TBs) in a transmission time interval simultaneously with multiple hybrid automatic repeat request (H-ARQ) processes in a wireless communication system are disclosed. Available physical resources and H-ARQ processes associated with the available physical resources are identified and channel quality of each of the available physical resources is determined. Quality of service (QoS) requirements of higher layer data to be transmitted are determined. The higher layer data is mapped to at least two H-ARQ processes. Physical transmission and H-ARQ configurations to support QoS requirements of the higher layer data mapped to each H-ARQ process are determined. TBs are generated from the mapped higher layer data in accordance with the physical transmission and H-ARQ configurations of each H-ARQ process, respectively. The TBs are transmitted via the H-ARQ processes simultaneously. | 2018-12-27 |
20180375636 | METHOD AND USER EQUIPMENT FOR RECEIVING DOWNLINK CHANNEL, AND METHOD AND BASE STATION FOR TRANSMITTING DOWNLINK CHANNEL - A method and apparatus for transmitting/receiving a downlink channel in a wireless communication system are provided. A physical downlink control channel (PDCCH) can be transmitted using one or more resource element groups (REGs) among a plurality of REGs in a transmission time interval (TTI). Each of the plurality of REGs occupies 12 consecutive resource elements (REs) belonging to a physical resource block (PRB) along a frequency domain within an orthogonal frequency division multiplexing (OFDM) symbol with or without a reference signal (RS) in the TTI. | 2018-12-27 |
20180375637 | Clock Synchronization Device - In an embodiment, a clock synchronizing circuit includes: a phase comparator including a first circuit having a first input configured to receive a data signal; and a second circuit. The first circuit is configured to detect edges of the data signal. The second circuit includes a clock generator configured to generate a clock signal with adjustable frequency, where the phase comparator is configured to compare, after detecting an edge of the data signal, an edge of the data signal with an edge of the clock signal, and where the second circuit is configured to modify a frequency of the clock signal as a function of an output signal of the phase comparator. | 2018-12-27 |
20180375638 | SECURE MODELS FOR IOT DEVICES - A hub device of a network receives a data model that includes a secure portion that is encrypted and one or more unsecure portions. The hub device deploys the one or more unsecure portions of the data model to respective edge devices of the network. The hub device decrypts the secure portion of the data model. The edge devices collect data (e.g., from sensors) and process the data using the unsecure portions of the data model. The edge devices send the processed data to the hub device. The hub device performs operations on the received processed data using the decrypted secure portion of the data model in a secure execution environment (e.g., a TPM or other secure module). The secure portion of the data model generates a result, which is then transmitted to an endpoint. | 2018-12-27 |
20180375639 | Multiplication Operations on Homomorphic Encrypted Data - In aspects of multiplication operations on homomorphic encrypted data, a computing device stores homomorphic encrypted data as a dataset, and implements an encryption application that can perform multiplication operations on ciphertexts in the homomorphic encrypted data, where the ciphertexts include polynomial variables of the ciphertexts. The encryption application can compute and store intermediate polynomial variables that are computed as the multiplication operations are performed. The encryption application can then utilize one or more of the intermediate polynomial variables rather than recomputing the intermediate polynomial variables as the multiplication operations are performed on the ciphertexts. | 2018-12-27 |
20180375640 | Variable Relinearization in Homomorphic Encryption - In aspects of variable relinearization in homomorphic encryption, a computing device stores homomorphic encrypted data as a dataset, and implements an encryption application that can perform a multiplication operation on a ciphertext in the homomorphic encrypted data, where the multiplication operation contributes to increase a noise component in the ciphertext. The encryption application can determine a relinearization amount by which to relinearize the ciphertext after the multiplication operation, where the determination is effective to optimize a noise increase in the ciphertext based at least in part on projected subsequent multiplication operations on the ciphertext. The encryption application can then relinearize the ciphertext utilizing the determined relinearization amount that optimizes the noise increase in the ciphertext for optimal relinearization performance. | 2018-12-27 |
20180375641 | TECHNIQUE TO GENERATE SYMMETRIC ENCRYPTION ALGORITHMS - An invention aimed at keeping in a secret and indecipherable form any type of information or data that can be stored, transmitted, displayed or expressed by any means or format, regardless of what its content or purpose may be and to keep the original information inaccessible to unauthorized persons, by means of a cryptographic technique, procedure or process of encryption widely applicable, either physically (hardware), logically (software) or mixed (Firmware) and other forms that may be created in the future. This protected Invention defines a technique, process or procedure for generating multiple encryption or ciphering algorithms with industrial application in both private and public sectors in the areas of national defense, telecommunications, computer science, computer programs, banking and electronic payment transactions, encryption or ciphering of still images, moving images and sounds, in their storage or transmission Including but not limited to the detailed areas, being this list illustrative and not limitative. | 2018-12-27 |
20180375642 | SM4 ACCELERATION PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS - A processor of an aspect includes a plurality of packed data registers, and a decode unit to decode an instruction. The instruction is to indicate one or more source packed data operands. The one or more source packed data operands are to have four 32-bit results of four prior SM4 cryptographic rounds, and four 32-bit values. The processor also includes an execution unit coupled with the decode unit and the plurality of the packed data registers. The execution unit, in response to the instruction, is to store four 32-bit results of four immediately subsequent and sequential SM4 cryptographic rounds in a destination storage location that is to be indicated by the instruction. | 2018-12-27 |
20180375643 | PROCESSOR WITH SECURE HASH ALGORITHM AND DIGITAL SIGNAL PROCESSING METHOD WITH SECURE HASH ALGORITHM - A processor using an internal memory to store constants Kt required in a secure hash algorithm (SHA). The latency due to loading the constants Kt from an external memory, therefore, is eliminated. The processor further introduces an instruction set architecture that provides one instruction for the processor to read the constants Kt from the internal memory and perform a particular process on the read constants Kt. Thus, the SHA works efficiently. | 2018-12-27 |
20180375644 | INTRODUCING MIDDLEBOXES INTO SECURE COMMUNICATIONS BETWEEN A CLIENT AND A SERVER - A method of communicating over a network between first and second endpoints, one being and the other being a server. The method comprises: establishing a first secure transport layer channel between the first and second endpoints, establishing a second secure transport layer channel between the first endpoint and a middlebox to which the first endpoint is to delegate processing of the traffic sent over the first secure transport layer channel; the first endpoint validating the middlebox via the respective second secure transport layer channel, and on condition of said validation sharing the encryption key of the first channel with the middlebox via the second secure transport layer channel; and causing the traffic sent over the channel to be routed via the middlebox. The method thereby enables the middlebox to process, in the clear, content of the traffic sent over the first channel. | 2018-12-27 |
20180375645 | DATABASE PASSWORD CHANGES - Systems and methods for changing database passwords are described. A first server computing system receives an indication to perform a password change process for an administrative account of an associated database. The server generates a vault configured to store a password change status and a password secret associated with the account. The server sets the password change status to a first value to indicate that the server is performing the password change process and then performs the password change process for the account. The server then sets the password change status to a second value to enable a second server computing system to perform a second password change process for a second administrative account of a database associated with the second server system. The database associated with the second server computing system is a standby database of the database associated with the first server system. | 2018-12-27 |
20180375646 | DISTRIBUTED VPN SERVICE - For a network that includes host machines for providing computing and networking resources and a VPN gateway for providing external access to those resources, a novel method that distributes encryption keys to the hosts to encrypt/decrypt the complete payload originating/terminating at those hosts is described. These encryption keys are created or obtained by the VPN gateway based on network security negotiations with the external networks/devices. These negotiated keys are then distributed to the hosts via control plane of the network. In some embodiments, this creates a complete distributed mesh framework for processing crypto payloads. | 2018-12-27 |
20180375647 | FLEXIBLE SECURITY CHANNEL ESTABLISHMENT IN D2D COMMUNICATIONS - A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data. | 2018-12-27 |
20180375648 | SYSTEMS AND METHODS FOR DATA ENCRYPTION FOR CLOUD SERVICES - Systems and methods for secure storage and transmission of sensitive information in a cloud environment. The methods comprise: receiving sensitive information corresponding to a first resource associated with a first cloud, generating an encryption key for encrypting the sensitive information, encrypting the sensitive information using the encryption key, transmitting the encrypted sensitive information to a cloud connector via a first communication channel, and transmitting the encryption key to a configuration service. The configuration service is associated with a second cloud. The method may further comprise, by a cloud connector: receiving the encryption key from the second resource associated with the second cloud and using the encryption key to decrypt the encrypted sensitive information. | 2018-12-27 |
20180375649 | AGREEMENT OF EXCHANGE KEYS ON THE BASIS OF TWO STATIC ASYMMETRIC KEY PAIRS - A method for setting up a subscriber identity module for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server includes generating one or several exchange keys from keys of the provisioning server and of the subscriber identity module on a production server and are transmitted into the subscriber identity module and stored, so that the subscriber identity module is put particularly into a state as though it had generated the exchange keys itself. In a method for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server, the subscriber identity module sends its public key to the provisioning server, which subsequently generates the exchange keys. | 2018-12-27 |
20180375650 | APPARATUS AND METHOD FOR ADDING AN ENTROPY SOURCE TO QUANTUM KEY DISTRIBUTION SYSTEMS - The invention relates to a Quantum Key Distribution apparatus ( | 2018-12-27 |
20180375651 | METHOD FOR LEVERAGING A SECURE TELECOMMUNICATION SESSION - A method for leveraging a first secure channel of communication between a first agent and a second agent to create a second secure channel of communication between the first agent and a third agent. The method includes creating the first secure channel of communication between the first agent and the second agent using a configurable data-driven initial process on a first computing device. Responsive to the first agent receiving a request from the third agent to establish the second secure channel of communication, the method further includes retrieving identifying information from the third agent. The method further includes ending the identifying information from the third agent to the second agent over the first secure channel of communication. Responsive to receiving approval of the third agent's request from the second agent, the method further includes establishing the second secure channel of communication. | 2018-12-27 |
20180375652 | METHOD FOR RE-KEYING AN ENCRPYTED DATA FILE - A method for re-keying an encrypted data file, the data file being stored chunkwise on a storage entity (SE), data file chunks being encrypted with a global secret, and the method being performed in a memory available to a computing device, includes partially updating a global secret for encryption data for a data chunk to be re-keyed such that an output of a non-interactive oblivious key exchange is used to identify the private key of the data chunk to be re-keyed with a new private key; and reencrypting the data chunk to be re-keyed with the updated global secret. | 2018-12-27 |
20180375653 | Policy-Based Key Recovery - A device establishes a key recovery policy and generates a key that is protected based on the key recovery policy. The key recovery policy indicates which combinations of other entities can recover the protected key. The device generates different shares of the protected key, each share being a value that, in combination with the other share(s), allows the protected key to be recovered. Each share is associated with a particular leaf agent, the device encrypts each share with the public key of the leaf agent associated with the share and provides the encrypted share to a service. When recovery of the protected key is desired, a recovering authority can generate the protected key only if the recovering authority receives decrypted shares from a sufficient one or combination of leaf agents as indicated by the recovery policy. | 2018-12-27 |
20180375654 | ENHANCING SECURITY FOR MULTIPLE STORAGE CONFIGURATIONS - A method begins by a processing module identifying, for a DSN (Dispersed Storage Network) memory using multiple IDA (Information Dispersal Algorithms) configurations simultaneously, a first IDA configuration with a highest security level relative to each of the multiple IDA configurations. The method continues by generating at least one master key. The method continues by encoding the master key with a secure error coding function to produce master key slices according to the first IDA configuration. The method continues by storing the master key slices in the DSN memory using the first IDA configuration. The method continues by, when storing data with a second IDA configuration having a security level lower than the first IDA configuration, retrieving the master key slices, decoding the master key slices to obtain the master key and encrypting the data using the master key. | 2018-12-27 |
20180375655 | AUTHORIZATION KEY ESCROW - A key originating device generates a subject key that is managed by a policy. The subject key may be generated and the policy configured at the instruction of a user, an application, or a service, such as a provisioning service. The policy that manages the subject key identifies at least one or more entities that are authorized to receive the subject key. The subject key is provided varying layers of encryption as it is communicated between the originating device, an escrow services, and an authorized entity. | 2018-12-27 |
20180375656 | Parental Control in a Networked Environment - Methods, systems, and products control presentation of media content within a networked environment of multiple devices. Interaction rules are used to determine which ones of the devices interact with each other. Further rules may define what media content is playable by each one of the devices in the networked environment. | 2018-12-27 |
20180375657 | SINGLE-INPUT MULTIFACTOR AUTHENTICATION - Multifactor authentication is a method to secure data and accounts and to prevent unauthorized access. A first factor can be information that the user knows, such as a username and password combination. A second factor can be something that the user possesses, such as a token generator or a trusted device. The present invention enables a user to present multiple authentication factors through a single biometric input using stored credentials and tokens generated by a secure element. | 2018-12-27 |
20180375658 | SINGLE-INPUT MULTIFACTOR AUTHENTICATION - Multifactor authentication is a method to secure data and accounts and to prevent unauthorized access. A first factor can be information that the user knows, such as a username and password combination. A second factor can be something that the user possesses, such as a token generator or a trusted device. The present invention enables a user to present multiple authentication factors through a single biometric input using stored credentials and tokens generated by a secure element. | 2018-12-27 |
20180375659 | SINGLE-INPUT MULTIFACTOR AUTHENTICATION - Multifactor authentication is a method to secure data and accounts and to prevent unauthorized access. A first factor can be information that the user knows, such as a username and password combination. A second factor can be something that the user possesses, such as a token generator or a trusted device. The present invention enables a user to present multiple authentication factors through a single biometric input using stored credentials and tokens generated by a secure element. | 2018-12-27 |
20180375660 | MULTI-FACTOR AUTHENTICATION IN VIRTUAL, AUGMENTED, AND MIXED REALITY (xR) APPLICATIONS - Systems and methods for multi-factor authentication in virtual, augmented, and mixed reality (xR) applications are described. In some embodiments, an xR headset may include a processor and a memory coupled to the processor, the memory comprising program instructions stored thereon that, upon execution, cause the xR headset to: authenticate a user wearing the xR headset, and, in response to the authentication, log the user into an Information Handling System (IHS) distinct from the xR headset. | 2018-12-27 |
20180375661 | DEVICE - A passive, one-time password device may include a fingerprint authentication engine and a wireless communication module. The device may be passive, and therefore powered only by energy harvested from a radio-frequency (RF) excitation field. The device also may be configured to use the wireless communication module to wirelessly communicate a one-time password responsive to verifying the identity of a bearer of the device using the fingerprint authentication engine. | 2018-12-27 |
20180375662 | SECURE KEY STORAGE FOR MULTI-CORE PROCESSOR - The disclosed technology is generally directed to secure key storage. A secret device key may be mutated based on a hash of a first boot loader to derive a first mutated key. The first mutated key may be mutated based on a random seed to derive a second mutated key. The second mutated key may be used to encrypt the hash of the runtime for a first core. The second mutated key may be mutated based on a hash of the runtime of the first execution environment for the second core to derive a third mutated key. The second mutated key may be used to encrypt the hash of the runtime of the first execution environment. The encrypted keys and hashes may be stored in a secure key store. | 2018-12-27 |
20180375663 | SECURE COMMUNICATIONS PROVIDING FORWARD SECRECY - Embodiments of the invention can establish secure communications using a single non-traceable request message from a first computer and a single non-traceable response message from a second computer. Non-traceability may be provided through the use of blinding factors. The request and response messages can also include signatures that provide for non-repudiation. In addition, the encryption of the request and response message is not based on the static keys pairs, which are used for validation of the signatures. As such, perfect forward secrecy is maintained. | 2018-12-27 |
20180375664 | SYSTEMS AND METHODS FOR ELECTRONIC SIGNING OF ELECTRONIC CONTENT REQUESTS - Systems and methods are disclosed for cryptographic signing of content requests. One method includes receiving, at a content network, a content request from a publisher website, the publisher website purporting to be associated with a publisher domain. At the content network, a public key may be received associated with the publisher domain. At the content network, at least one policy may be received associated with the publisher domain. It may be determined whether the content request comprises a cryptographic signature. If it is determined that the content request does not comprise a cryptographic signature, content may or may not be provided to the publisher website according to the policy from the publisher domain. If it is determined that the content request comprises a cryptographic signature, the cryptographic signature of the request may be validated using the public key. Upon successfully validating the cryptographic signature of the content request, content maybe provided to the publisher website according to the content request. | 2018-12-27 |
20180375665 | DEVICE PROVISIONING - A device is equipped with a public/private key pair. The private key is stored in a secure location on the device and the public key is utilized to track ownership of the device by a manufacturer, vendor, and/or one or more provisioning services. When a user purchases the device, a transaction involving the public key associated with the device and the user is recorded. The one or more provisioning services, which are provided access to user information, prepare a configuration payload for the device specific to the user and the device. The configuration payload is encrypted using the device's public key. When the device is powered on, the configuration payload is sent to the device. The device decrypts the configuration payload using the device's private key and adjusts one or more configuration parameters based on the configuration payload. | 2018-12-27 |
20180375666 | UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICES - A secure programming system can receive a job control package having a security kernel and a target payload of content for programming into a pre-defined set of trusted devices. A device programmer can install a security kernel on the trusted devices and reboot the trusted devices using the security kernel to validate the proper operation of the security kernel. The target payload can then be securely installed on the trusted devices and validated. | 2018-12-27 |
20180375667 | APPARATUS AND METHOD FOR CERTIFICATE ENROLLMENT - An apparatus includes a processor coupled to a memory wherein the processor and the memory are configured to provide a secure execution environment. The memory includes a shared secret value. The processor is configured to receive a certificate, wherein the certificate includes a device identifier and a digital signature. The processor validates the certificate based on the digital signature and the device identifier, recovers a cryptographic key based on the shared secret value and the device identifier, and performs a cryptographic operation based on the recovered cryptographic key. | 2018-12-27 |
20180375668 | MEDIA CHANNEL MONITORING TO PROVE CONTENT PRESENTATION - Blockchain-based proof of presentation of content on a media channel, including: a blockchain; a generator configured to generate at least first, second, and third parameters, wherein the first and second parameters are input parameters and the third parameter is calculated as an output parameter of a one-way cryptographic function, the generator configured to incorporate the first and third parameters into a first type of block and append the first type of block to the blockchain; an embedder configured to receive and embed the second parameter into the content to produce tainted content; and a probe configured to monitor the media channel for the tainted content and to extract the second parameter from the tainted content. | 2018-12-27 |
20180375669 | METHOD FOR GENERATING A CHALLENGE WORD, ELECTRONIC DEVICE, SET VALUE PERIPHERAL, AND SYSTEM IMPLEMENTING SAID METHOD - Method for generating a challenge word, electronic device, input peripheral, and system implementing said method. The invention relates to a system and to a method for generating a challenge word (WCH) that is intended to be used in the context of an authentication request (Mi). Such a system particularly relies on an electronic device ( | 2018-12-27 |
20180375670 | METHOD FOR SECURING AN INTEGRATED CIRCUIT DURING FABRICATION - The invention relates to a method of securing an integrated circuit during its fabrication on a wafer, said method including the following steps:
| 2018-12-27 |
20180375671 | DISTRIBUTED STORAGE NETWORK DATA REVISION CONTROL - Multiple revisions of an encoded data slice are generated, with each revision having the same slice name. Each of the data slices represents the same original data portion, but each is encoded so that no single data slice can be used to reconstruct the original data portion. Appropriate revision numbers are associated with each encoded data slice, and the encoded data slices and associated revision numbers are transmitted for storage in selected storage units of a distributed storage network. If write confirmations are received from at least a write threshold number of storage units, a commit command is transmitted so that the most recently written data slices will be available for access. After a commit command is issued, a current directory used to access the encoded data slices can be sliced, encoded, and stored in the same way as the data slices. | 2018-12-27 |
20180375672 | POWER OF ETHERNET POWER AND DATA SPLITTING SYSTEMS AND METHODS - The disclosure includes an electronic system that receives data and power from an Ethernet cable and splits the data and the power. The system can include a housing and an input port coupled to the housing. The input port can be arranged and configured to receive the Ethernet cable that transmits the data and the power. The system can also include a splitter circuit located along an internal portion of the housing. The splitter circuit can be arranged and configured to receive the data and the power from the Ethernet cable and thereby split the data from the power. The splitter circuit can include at least one capacitor arranged and configured to block power; and an electrical component having an impedance arranged and configured to block data. | 2018-12-27 |
20180375673 | POWER PROVIDING DEVICE AND METHOD, POWER RECEIVING DEVICE - The invention relates to a power providing device ( | 2018-12-27 |
20180375674 | JUDGEMENT UNIT AND CONTROLLING METHOD THEREOF, POWER SUPPLY DEVICE AND CONTROLLING METHOD THEREOF - A judgement unit applied in a Power over Ethernet (PoE) device is disclosed herein. The judgement unit is configured to determine whether the PoE device is coupled to a load. If the judgement unit determines that the PoE device is not coupled to the load, a definite time handshaking activation signal is outputted for activating a definite time handshaking communication mode of the PoE device so as to communicate with the load in a definite time handshaking manner. | 2018-12-27 |
20180375675 | SYSTEM AND METHOD TO PROVIDE DEFAULT MULTICAST GROUP (MCG) FOR ANNOUNCEMENTS AND DISCOVERY AS EXTENDED PORT INFORMATION IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT - Systems and methods to provide default multicast group (MCG) for announcements and discovery as extended port information in a high performance computing environment. In accordance with an embodiment, hence, in order to enable IB multicast operations in a well-defined way without depending on SA access, there should be at least one IB multicast group (MCG) defined by the Subnet Manager and communicated to the IB clients via extended SMA attributes. | 2018-12-27 |
20180375676 | SYSTEM AND METHOD FOR SCALABLE, INTERACTIVE VIRTUAL CONFERENCING - A scalable virtual conferencing system which implements a hub and spoke architecture. For example, one embodiment of a scalable virtual conferencing system comprises: a participant management module to logically group each participant in the virtual conferencing system into a hub or one of a plurality of spokes; and a data flow management module to control communication of information between participants in the spokes and participants in the hub, the data flow management module to limit intercommunication from the spokes to the hub in accordance with the manual user input and/or participant management policy; wherein at least one participant in a first spoke is designated as a spoke leader for the first spoke, the spoke leader logically grouped into both the hub and the first spoke, the data flow management module to allow information generated within the first spoke to be propagated into the hub based on input from the spoke leader. | 2018-12-27 |
20180375677 | HANDLING EXCESS TRAVEL-RELATED INFORMATION - Travel-related-information messages (TRIMS) are received from one or more information sources, and information included in the messages is placed into a first (e.g. TPEG™) or second (e.g. TPEG+) group. A determination is made that a first TRIM reporting message including information from the first group will exceed a permissible size, so excess information is removed from the first group and added to the second group, thereby decreasing the size of the first TRIM reporting message to the permissible message size or less. Some or all of the excess information removed from the first group is added to the second group. First and second TRIM reporting messages are generated from information included in the first and second groups. The first and second TRIM reporting messages are transmitted to end-user devices using different service ports. | 2018-12-27 |
20180375678 | BUILDING AUTOMATION MANAGEMENT - A method of building automation control from a computing device is provided and includes a computing device: accessing a building automation network through one or more network connections and identifying automated devices attached to that building automation network; determining a user interface structure for the automated devices and a device user interface for each automated device from device names of the automated devices on the building automation network; providing a user interface comprising the user interface structure and the device user interfaces on the computing device; and controlling one or more of the automated devices over one of the one or more network connections using instructions received over the user interface. | 2018-12-27 |
20180375679 | BUILDING AUTOMATION MANAGEMENT - A method of building automation control from a computing device is provided and includes a computing device: accessing a building automation network through one or more network connections and identifying automated devices attached to that building automation network; determining a user interface structure for the automated devices and a device user interface for each automated device; providing a user interface comprising the user interface structure and the device user interfaces on the computing device; and controlling one or more of the automated devices over one of the one or more network connections using instructions received over the user interface. | 2018-12-27 |
20180375680 | System and Method for Monitoring a Property - There are provided systems and methods for monitoring a property using a system of sensor units in one or more premises on the property that can interface with respective utilities entering the premises or being generated by appliances on the premises with a minimal of effort and without requiring modification of the utility's equipment or the appliance. The systems and methods are connectable to a cloud-based monitoring, analytics and notification system via a long range network connection directly from one or more of the sensor units. The system of sensors can also incorporate primary and secondary units with at least one primary unit capable of communicating directly to the cloud-based system/server via a long-range connection with the secondary units sending data to the cloud via the primary unit by communicating at the property via a short-range communication connection. There are also provided various sensor units for specifically monitoring water flow and water leakage, flooding, sump pump operability, levels within water softeners and other fluid containing vessels, electrical power usage, furnace operations, among others as described herein. | 2018-12-27 |
20180375681 | System and Method for Isolating Device Communications in a BACnet/IP Building Automation Network - A building automation system and method is provided for isolating device communications in a BACnet/IP building automation network. The system may comprise at least one processor in a BACnet device configured via executable instructions included in at least one memory to communicate UDP messages for field devices onto an Ethernet network for receipt by at least one other BACnet device on the Ethernet network. The at least one processor may be configured to receive and store in a memory a configurable local subnet, a BACnet/IP UDP port, and a local UDP port. The at least one processor may also be configured to determine a UDP message that is to be broadcast only on the local subnet. In addition, the at least one processor may be responsive to the determination, to broadcast the UDP message to BACnet devices on the same local subnet using the local UDP port stored in the memory. | 2018-12-27 |
20180375682 | Portable Acoustical Unit - A portable acoustic unit is adapted for insertion into an electrical receptacle. The portable acoustic unit has an integrated microphone and a wireless network interface to an automation controller. The portable acoustic unit detects spoken voice commands from users in the vicinity of the electrical receptacle. The portable acoustic unit merely plugs into a conventional electrical outlet to provide an extremely simple means of voice control through a home or business. | 2018-12-27 |
20180375683 | INFORMATION PROCESSING SYSTEM, METHOD, AND APPARATUS - An information processing system includes Spine switches, Leaf switches coupled to the Spine switches in a form of a Latin square fat tree, and apparatuses each coupled to any one of the Leaf switches and including a processor. The processor performs, in a case where the processor is included in one of first apparatuses coupled to one of first Leaf switches, first collective communication with others of the first apparatuses on a route via a first Spine switch. The first Leaf switches correspond to at least a portion of points other than points at infinity of a finite projective plane corresponding to the Latin square fat tree. The processor performs second collective communication with others of the first apparatuses on a route via a second Spine switch at each phase of the first collective communication. The second Spine switch is different from the first Spine switch. | 2018-12-27 |
20180375684 | Segment Routing Gateway Storing Segment Routing Encapsulating Header Used in Encapsulating and Forwarding of Returned Native Packet - In one embodiment, a Segment Routing gateway receives Segment Routing packets encapsulating native packets. The Segment Routing gateway stores the Segment Routing encapsulating headers. The native packets are communicated to a service function (or other device). Upon return, Segment Routing packets are generated including the returned native packets using correspondingly stored Segment Routing encapsulating headers, possibly updated with new policies. Segment Routing includes, but is not limited to, SRv6 and SR-MPLS. In one embodiment, the native packet is sent from a physical interface of the SR gateway to the service function, and returned to the SR gateway on one of its physical interface(s). In one embodiment, shared storage is accessible to both the SR gateway and the service function (or other device), so references (e.g., memory locations or pointers) are communicated between the SR gateway and the service function (or other device). | 2018-12-27 |
20180375685 | Virtual Private Network VPN Service Optimization Method and Device - A first network device includes a processor configured to analyze a data stream entering a network on which the first network device is located to obtain a traffic characteristic of a target data stream, and advertise a Flow Specification (FlowSpec) route, where the FlowSpec route carries redirect indication information, the redirect indication information includes identification information, the identification information is used to uniquely identify a first virtual private network (VPN) instance in a second network device, the redirect indication information instructing to redirect the data stream including the traffic characteristic of the target data stream to the first VPN instance, the second network device is an edge device of a service provider network accessed by the network, and the first VPN instance is a target VPN instance to which the target data stream is redirected in the second network device. | 2018-12-27 |
20180375686 | SYSTEMS AND METHODS FOR PERFORMING SERVICE TAG SWITCHING IN AN APPLICATION DELIVERY CONTROLLER - The disclosure is directed towards systems and methods for performing service tag switching. A device intermediary to a client and a server receives a packet including a virtual network device identifier tag that identifies a list of functions to be performed on the packet. The device tags the packet with a first service tag identifying a first functional entity of the device to which to route the packet. The device routes the packet to the first functional entity configured to perform a first function. Responsive to the first function being performed, the device selects a subsequent service tag identifying a subsequent functional entity to route the packet. The device tags the packet with the subsequent service tag and routes the packet to the subsequent functional entity. Once all of the list of functions to be performed on the packet have been performed, the device forwards the packet to its destination. | 2018-12-27 |
20180375687 | SCALABLE TENANT NETWORKS - Template-driven locally calculated policy updates for virtualized machines in a datacenter environment are described. A central control and monitoring node calculates and pushes down policy templates to local control and monitoring nodes. The templates provide boundaries and/or a pool of networking resources, from which the local control and monitoring node is enabled to calculate policy updates for locally instantiated virtual machines and containers. | 2018-12-27 |
20180375688 | PROGRAMMABLE AND RECONFIGURABLE FRAME PROCESSOR - A programmable and reconfigurable frame processor comprises: a first data processing unit; a first state machine connected to the first data processing unit; a second data processing unit; a second state machine connected to the second data processing unit; and a master state machine respectively connected to the first and second state machines. The first and second data processing units each comprises a frame structure description table for storing a frame header address pointer, a frame tail address pointer and values of respective sections specified in a communication protocol. The first state machine, the second state machine and the master state machine each comprises a protocol state structure description table for storing a header address pointer, a tail address pointer and state transition values. | 2018-12-27 |
20180375689 | A SUCCESSIVE JOINT CHANNEL ESTIMATION BASED INTERFERENCE CANCELLATION SCHEME AGAINST COLLIDING INTERFERENCES - A network device generates a successive joint channel estimation based on interference cancellation processes to eliminate or reduce colliding interferences (colliders) at a receiver end. A selection component selects a strongest interference collider from among pseudo noise sequences operating as colliders. A 2 by 2 matrix successive joint channel estimation component performs a successive 2 by 2 matrix joint channel estimation with an initial correlation metric between the strongest interference collider and each remaining interference collider in a first iteration of a set of iterations. A correlation metric component generates an updated correlation metric vector based on the 2 by 2 matrix joint channel estimation. Another 2 by 2 matrix joint channel estimation is then performed with the updated correlation metric vector between a next strongest interference collider and remaining interference colliders of the plurality of interference colliders at a second iteration of the set of iterations. | 2018-12-27 |
20180375690 | CHANNEL ESTIMATION EVALUATION IN MIMO SYSTEMS - The present disclosure relates to methods, a device and a system for evaluation of channel estimate. One method is performed in a first access point arranged to communicate with one or more wireless devices through information streams that are created using multiple co-located antennas. The method comprises transmitting or receiving a packet A, to/from, the first wireless device, wherein the packet A is transmitted using a precoder determined using the channel estimate, retrieving information about possibly interfering transmissions C between further access points in the vicinity of the first access point, and respective second wireless devices; wherein the information comprises location information and timing information related to the possibly interfering transmissions, determining spatial separations between the transmissions A and C and evaluating the channel estimate, based on the determined spatial separations. | 2018-12-27 |
20180375691 | METHODS USED IN CONTROL NODES, AND ASSOCIATED CONTROL NODES - Method used in a first control node controlling one or more first links among two or more first radio nodes in a first network, and an associated first control node. Transmitting desired sounding and sensing related parameters of the first control node to a second control node controlling one or more second links among two or more second radio nodes in a second network neighboring the first network and operating at the same frequency as the first network. Receiving, from the second control node, sounding and sensing related parameters to be applied to the one or more second links, which are adjusted based on the desired sounding and sensing related parameters of the first control node. Adjusting the desired sounding and sensing related parameters of the first control node, based on the sounding and sensing related parameters to be applied to the one or more second links and applying them. | 2018-12-27 |
20180375692 | TIMING BASED ARBITRATION METHODS AND APPARATUSES FOR CALIBRATING IMPEDANCES OF A SEMICONDUCTOR DEVICE - Systems and apparatuses are provided for an arbiter circuit for timing based ZQ calibration. An example system includes a resistor and a plurality of chips. Each of the plurality of chips further includes a terminal coupled to the resistor and a calibration circuit. The calibration circuit determines whether the resistor is available based, at least in part, on timing information that is unique to a corresponding chip of the plurality of chip. The timing information of each chip of the plurality of chips has a fixed duration of time common to the plurality of chips. | 2018-12-27 |
20180375693 | PHASE DELAY DIFFERENCE-BASED CHANNEL COMPENSATION - A technique includes determining a first phase delay associated with communication of a bit pattern having a first bit transition frequency over a communication channel; and determining a second phase delay associated with communication of a bit pattern having a second bit transition frequency greater than the first bit transition frequency over the communication channel. The technique includes regulating a compensation applied to a signal received from the communication channel based at least in part on a difference of the first and second phase delays. | 2018-12-27 |
20180375694 | ADJUSTING A CONTINUOUS TIME LINEAR EQUALIZATION-BASED RECEIVER - Devices and methods for adjusting operation of a receiver that includes a continuous time linear equalizer, a decision feedback equalizer, and a feed forward equalizer. Operation of the receiver may be controlled by determining whether the receiver is operating in operation region using frequency responses of the feed forward equalizer at a first frequency and a second frequency and using the frequency responses of the decision feedback equalizer at the first frequency and the second frequency. If the operation is outside the frequency, a parameter of the continuous time linear equalizer is adjusted based on the frequency responses of the feed forward equalizer and the decision feedback equalizer. | 2018-12-27 |
20180375695 | METHODS AND APPARATUS FOR ENABLING AND DISABLING SCRAMBLING OF CONTROL SYMBOLS - Methods and apparatus for the selection and/or configuration of scrambling operations to accommodate e.g., both scrambling and non-scrambling connections (such as to e.g., legacy type devices). In one embodiment, media interface devices (such as e.g., HDMI (High-Definition Multimedia Interface)) devices may provide enhanced scrambling capabilities; solutions disclosed herein provide, among other things, support for both enhanced scrambling capable devices and legacy devices, and enable a device to determine the scrambling capabilities of a connected device. | 2018-12-27 |
20180375696 | APPARATUS AND METHOD FOR CODEWORD-BASED SCRAMBLING OF DATA - Aspects of the present disclosure include systems and methods that transmit masked data by designating one or more selected bits in a bit stream containing data bits, selecting a mask for the bit stream based on the one or more selected bits, masking the bit stream without altering the one or more selected bits, encoding the masked bit stream into one or more codewords, and transmitting the one or more codewords. | 2018-12-27 |
20180375697 | MODULATION CODING SCHEME (MCS) INDICATION IN LTE UPLINK - Methods, systems, and devices for indicating a modulation coding scheme (MCS) in LTE are described. A user equipment (UE) may receive downlink control information (DCI) from an evolved Node B (eNB) that includes an uplink grant of resources. The DCI may be configured and have a format that conveys an MCS table reference. The UE may identify the MCS table reference and, based on the reference, identify a legacy MCS table or a non-legacy MCS table. The legacy MCS table may be associated with quadrature amplitude modulation (QAM) up to a first order, and the non-legacy MCS table may be associated with QAM up to a second order, the second order being higher than the first order. The UE may modulate and code information for uplink transmissions using the identified MCS table. | 2018-12-27 |
20180375698 | Radio-Network Node, Wireless Device and Methods Performed Therein - Embodiments herein relate to a method performed by a radio-network node ( | 2018-12-27 |
20180375699 | Optimized CORDIC for APSK Applications - A reduced COordinate Rotation DIgital Computer (CORDIC) cell in a parallel CORDIC has an xy-path from x and y inputs to x and y outputs, and a z-path from a z-input to a z-output. Bit-shifts in the xy-path are hardwired. The z-path has a shortened adder/subtractor with a built-in or hardwired fixed parameter. Input bits from the z-input are split into most significant and least significant bits. The number of most significant bits equals the shortened adder/subtractor width. The most significant bits are input to the non-inverting inputs of the adder/subtractor for calculating the most significant z-output bits. The least significant bits are connected directly (or via buffers) from the z-input to the z-output. | 2018-12-27 |
20180375700 | TRANSMITTING METHOD, RECEIVING METHOD, TRANSMITTING APPARATUS, AND RECEIVING APPARATUS - A transmitting method includes: configuring a frame using a plurality of orthogonal frequency-division multiplexing (OFDM) symbols, by allocating a plurality of transmission data to a plurality of areas; and transmitting the frame. The plurality of areas are each identified by at least one time resource among resources and at least one frequency resource among frequency resources. The frame includes a first period in which a preamble is transmitted, and a second period in which the plurality of transmission data are transmitted by at least one of time division and frequency division. The second period includes a first area, and the first area includes a data symbol generated from first transmission data, a data symbol generated from second transmission data and subsequent to the data symbol generated from the first transmission data, and a dummy symbol subsequent to the data symbol generated from the second transmission data. | 2018-12-27 |
20180375701 | PACKET MODE AUTO-DETECTION IN MULTI-MODE WIRELESS COMMUNICATION SYSTEM, SIGNAL FIELD TRANSMISSION FOR THE PACKET MODE AUTO-DETECTION, AND GAIN CONTROL BASED ON THE PACKET MODE - A method for automatically detecting a packet mode in a wireless communication system supporting a multiple transmission mode includes: acquiring at least one of data rate information, packet length information and channel bandwidth information from a transmitted frame; and determining the packet mode on the basis of the phase rotation check result of a symbol transmitted after a signal field signal and at least one of the data rate information, the packet length information and the channel bandwidth information acquired from the transmitted frame. | 2018-12-27 |
20180375702 | Apparatus and Method for Sending and Receiving Broadcast Signals - A broadcast signal receiver is disclosed. A broadcast signal receiver according to an embodiment of the present invention comprises a synchronization & demodulation module performing signal detection and OFDM demodulation on a received broadcast signal; a frame parsing & deinterleaving module performing parsing and deinterleaving of a signal frame of the broadcast signal; a demapping & decoding module performing conversion of data of at least one Physical Layer Pipe (PLP) of the broadcast signal into the bit domain and FEC decoding of the converted PLP data; and an output processing module outputting a data stream by receiving the at least one PLP data. | 2018-12-27 |
20180375703 | BACKSCATTER DEVICES INCLUDING EXAMPLES OF SINGLE SIDEBAND OPERATION - Examples described herein include devices and systems utilizing backscatter communication to generate transmissions in accordance with wireless communication protocols. Examples are described including single sideband operation, generation of a carrier wave using Bluetooth, downlink communication to a backscatter device, and combinations thereof. | 2018-12-27 |
20180375704 | TRANSMIT DIVERSITY FROM ORTHOGONAL DESIGN FOR FBMC/OQAM - How to apply an Alamouti like space-time coding (or transmit diversity) to a Filter Bank Multicarrier (FBMC) transmission using Offset QAM (OQAM). In FBMC, due to the orthogonality in the real domain only, an intrinsic interference results thereof for the imaginary component. Simply adapting the Alamouti scheme to FBMC OQAM is not obvious since the intrinsic interference terms are not equivalent at each antenna since it depends on the surrounding symbols. The application proposes to use a precoding symbol chosen to cancel out (zero) the intrinsic interference individually for each antenna, ie a code rate of ½ (sending one data symbol requires two time units). A more elaborated embodiment proposes to choose the contiguous precoding symbols such that a virtual QAM Alamouti scheme is achieved, without rate loss. | 2018-12-27 |
20180375705 | TECHNIQUES FOR CARRIER SHARING BETWEEN RADIO ACCESS TECHNOLOGIES - Techniques are described herein for addressing tone misalignment between signals of a first radio access technology (RAT) and signals of a second RAT in a combined signal. In some wireless communications systems, the tones of uplink (UL) signals may be shifted up or down based on the configuration of the particular RAT. If UL signals of the first RAT are not shifted in frequency and UL signals of the second RAT are shifted in frequency, processing the combined signal may include additional processing to account for the mismatch. | 2018-12-27 |
20180375706 | METHOD AND APPARATUS FOR RECEIVING A REDUCED PEAK TO AVERAGE POWER RATIO SIGNAL - A method and apparatus for receiving a reduced peak to average power ratio signal is disclosed. The method includes receiving a signal, the signal being processed prior to transmission to reduce peak to average power ratio, determining a processing mode used to reduce the peak to average power ratio of the received signal, and reducing the amplitude level for a portion of the received signal using constant modulus clipping if the processing mode includes a two-dimensional constellation extension. The apparatus includes a processing circuit that receives a signal, the signal being processed prior to transmission to reduce peak to average power ratio, and a limiter circuit that determines a processing mode used to reduce the peak to average power ratio of the received signal and reduces the amplitude level for a portion of the received signal using constant modulus clipping if the processing mode includes a two-dimensional constellation extension. | 2018-12-27 |
20180375707 | ZERO TAIL AND UNIQUE WORD BASED WAVEFORMS FOR DFT-S OFDM AND OFDM - Methods and systems for operation in a wireless network are provided, the method including receiving modulated data symbols and zeros in a frequency-domain, and mapping in the frequency-domain the modulated data symbols and zeros in an interleaved manner to sub-carriers within a resource allocation. The method further includes generating a time-domain data signal based on the mapped sub-carriers, and generating a time domain cancellation signal by sign inverting and repeating a predetermined number of time-domain samples at a tail portion of the data signal. The method further includes combining the time-domain data signal and the time domain cancellation signal to generate an exact zero tail data signal such that the exact zero tail data signal has a zero tail length equal to the predetermined number of time-domain samples, and transmitting the exact zero tail data signal. | 2018-12-27 |
20180375708 | MAPPING BITS IN A COMMUNICATION SYSTEM - Methods and apparatuses for Orthogonal Frequency Division Multiplexing (OFDM) based communication are disclosed. In a method at least some least important bits derived from data to be transmitted are mapped into at least one portion of an OFDM transmission unit, the at least one portion being reserved for the least important bits. More important bits derived from said data are mapped into a different portion of the ODFM transmission unit. | 2018-12-27 |
20180375709 | DISTRIBUTED PROCESSING SOFTWARE BASED MODEM - An all-digital software-only modem using distributed processing resources of cloud computing is provided. In particular, all processes that were previously supported by purpose built software, firmware, Field Programmable Gate Array (FPGA) hardware description language (HDL) firmware, and an Application Specific Integrated Circuit (ASIC) are in the instant disclosure supported entirely by a High Performance Computing (HPC) server inside a cloud computing environment. | 2018-12-27 |
20180375710 | METHOD AND APPARATUS FOR GENERATING AND TRANSMITTING REFERENCE SIGNAL AND DATA IN WIRELESS COMMUNICATION SYSTEM - One embodiment of the present invention relates to a method for a terminal generating and transmitting a reference signal and data in a wireless communication system, comprising the steps of: generating a sequence corresponding to a basic bandwidth; generating a demodulation reference signal (DMRS) corresponding to the entire bandwidth by mapping the generated sequence onto a frequency band; truncating the generated DMRS according to the bandwidth of data to be transmitted; and transmitting the truncated DMRS and the data. | 2018-12-27 |
20180375711 | CIRCUITS AND SYSTEMS FOR WIDEBAND QUADRATURE SIGNAL GENERATION - Wide band quadrature signal generation includes a frequency synthesizer generating a LO or 2×LO signal, a polyphase filter coupled to receive the LO signal and generate first in-phase and quadrature LO signals, a 2:1 frequency divider coupled to receive the 2×LO signal and generate second in-phase and quadrature LO signals, and a LO signal selector for selecting either the first or second in-phase LO signals as an output in-phase LO signal and either the first or second quadrature LO signals as an output quadrature LO signal based on an output frequency. In some embodiments, when the output frequency is above a threshold, the first in-phase and quadrature LO signals are selected as the output in-phase and quadrature LO signals and when the output frequency is at or below the threshold, the second in-phase and quadrature LO signals are selected as the output in-phase and quadrature LO signals. | 2018-12-27 |
20180375712 | PROXY WITH A FUNCTION AS A SERVICE (FAAS) SUPPORT - An example method for processing a client request includes determining a set of functions to invoke for processing an initial request sent by a client to an application. The set of functions includes a function stored at a server. The method also includes invoking, by a proxy, the function at the server. The server provides the function as a function as a service (FAAS) for invocation by one or more third parties. The method further includes sending, by the proxy, a processed request to the application. The processed request is based on a result of the function. The method also includes receiving, by the proxy, a response to the processed request from the application. | 2018-12-27 |
20180375713 | RESILIENT DOMAIN NAME SERVICE (DNS) RESOLUTION WHEN AN AUTHORITATIVE NAME SERVER IS UNAVAILABLE - In one embodiment, a resolution resiliency application performs robust domain name system (DNS) resolution. In operation, the resolution resiliency application determines that an authoritative name server that is responsible for a domain name specified in a DNS query is unavailable. In response to determining that the authoritative name server is unavailable, the resolution resiliency application performs operation(s) that modify one or more DNS records stored in a cache based on one or more resiliency policies associated with the authoritative name server. The resolution resiliency application then generates a DNS response to the DNS query based on a DNS record stored in the modified cache. Notably, unlike conventional techniques that may generate inaccurate DNS responses based on stale DNS records, the disclosed techniques increase the likelihood of providing clients with DNS responses that accurately provide requested information. | 2018-12-27 |
20180375714 | RESILIENT DOMAIN NAME SERVICE (DNS) RESOLUTION WHEN AN AUTHORITATIVE NAME SERVER IS UNAVAILABLE - In one embodiment, a resolution resiliency application performs robust domain name system (DNS) resolution. In operation, the resolution resiliency application determines that an authoritative name server that is responsible for a domain name specified in a DNS query is unavailable. In response to determining that the authoritative name server is unavailable, the resolution resiliency application performs operation(s) that modify one or more DNS records stored in a cache based on one or more resiliency policies associated with the authoritative name server. The resolution resiliency application then generates a DNS response to the DNS query based on a DNS record stored in the modified cache. Notably, unlike conventional techniques that may generate inaccurate DNS responses based on stale DNS records, the disclosed techniques increase the likelihood of providing clients with DNS responses that accurately provide requested information. | 2018-12-27 |
20180375715 | TECHNIQUES FOR INDICATING A DEGRADED STATE OF AN AUTHORITATIVE NAME SERVER - In one embodiment, a zone resiliency application indicates that an authoritative name server is in a degraded state. In operation, the zone resiliency application determines that the authoritative name server is in a degraded state. The zone resiliency application then generates a status record that indicates the degraded state. Subsequently, the zone resiliency application associates the status record with a domain name service (DNS) response to a DNS query. The zone resiliency application then transmits the DNS response and the associated status record to a requester. | 2018-12-27 |
20180375716 | RESILIENT DOMAIN NAME SERVICE (DNS) RESOLUTION WHEN AN AUTHORITATIVE NAME SERVER IS DEGRADED - In one embodiment, a resolution resiliency application modifies domain name service (DNS) resolution. In operation, the resolution resiliency application determines that an authoritative name server has begun recovering from a degraded state or receives a flush list update from the authoritative name server. In response, the resolution resiliency application performs operation(s) that modify a query rate and/or a cache. The query rate specifies a frequency associated with DNS queries transmitted to the first authoritative name server. The cache stores DNS record(s) received from the first authoritative name server. Finally, the resolution resiliency application generates a DNS response to a DNS query based on the modified query rate and/or the modified cache. | 2018-12-27 |
20180375717 | DAISY CHAIN DISTRIBUTION IN DATA CENTERS - A method and a system to provide daisy chain distribution in data centers are provided. A node identification module identifies three or more data nodes of a plurality of data nodes. The identification of three or more data nodes indicates that the respective data nodes are to receive a copy of a data file. A connection creation module to, using one or more processors, create communication connections between the three or more data nodes. The communication connections form a daisy chain beginning at a seeder data node of the three or more data nodes and ending at a terminal data node of the three or more data nodes. | 2018-12-27 |