52nd week of 2017 patent applcation highlights part 66 |
Patent application number | Title | Published |
20170373762 | COMMUNICATIONS METHODS AND USER EQUIPMENTS - Embodiments of this application provide communications methods and user equipments. A communications method disclosed herein comprises: obtaining, by a user equipment, at least one signal value that is generated based on contact between the user equipment and a human body, where the human body is also in contact with another user equipment; determining at least one transmission parameter at least according to the at least one signal value and a preset transmission parameter rule; and communicating with the another user equipment at least according to the at least one transmission parameter. | 2017-12-28 |
20170373763 | INFORMATION INTERACTION METHODS AND USER EQUIPMENT - Embodiments of the present application provide interaction methods and user equipment. An interaction method disclosed here in comprises: determining, by a user equipment, information that needs to be sent to at least one other user equipment, wherein the at least one other user equipment and the user equipment are in contact with a same human body; determining at least one frequency corresponding to the information at least according to the information and a preset information rule; and controlling a capacitance value of the user equipment to change at the at least one frequency. | 2017-12-28 |
20170373764 | SYSTEM FOR INTERFERENCE CANCELLATION AND METHOD THEREOF - The invention relates to a system for interference cancellation and method thereof. The system includes a receiver, a transmitter, and a channel estimating and equalizing device. The transmitter and the receiver use different wireless communication technologies to transmit and receive data. The channel estimating and equalizing device can estimate the channel between the transmitter and the receiver for interference cancellation. The embodiments of the invention provide a system and a method thereof for reducing interferences generated when using one wireless communication technology to transmit signals but using another wireless communication technology to receive signals by using digital baseband signals. | 2017-12-28 |
20170373765 | Antenna - An antenna unit for monitoring the RF transmission line and RF signal path to an antenna unit used in a distributed antenna system. The antenna has a resistor connected to ground, and a DC injector including a capacitor having a first side connected to an RF transmission line and a second side connected to the antenna, with a first inductor coupled between the resistor and the monitoring module. | 2017-12-28 |
20170373766 | SYSTEM FOR PISTON ROD MONITORING - A sensor system for determining a condition associated with a piston rod of a reciprocating system includes an interrogator system having a first antenna. The sensor system further includes a second antenna separated from the first antenna by an air gap distance. The second antenna is configured to be coupled to the piston rod of the reciprocating system. The second antenna is a patch antenna and is configured to communicate with the first antenna through a range of translational movement relative to the first antenna. The sensor system further includes a radio frequency sensor coupled to the second antenna. The radio frequency sensor is configured to be coupled to the piston rod of the reciprocating system, measure a characteristic associated with the piston rod of the reciprocating system, and transmit data associated with the characteristic to the first antenna of the interrogator system through the second antenna. | 2017-12-28 |
20170373767 | WIRELESS DEVICE WITH A MULTI-TURN DIRECTIONAL COUPLER - A directional coupler disclosed herein may include a main line provided on a substrate, the main line having a first end connected to an input port and a second end connected to an output port. The coupler may include a coupled line disposed on the substrate, the coupled line having a first end connected to a coupled port and a second end to an isolated port. The main line is electrically isolated from the coupled line. The coupled line includes multiple turns forming a winding, and a portion of the winding overlaps with the main line. The coupled line forms a plurality of windings inductively coupled with the main line. The main line and the coupled line are routed to propagate electric signals on both lines in a same direction, and enhance inductive coupling by mutual inductance. | 2017-12-28 |
20170373768 | Antenna Status Remote Monitoring System - An antenna monitoring unit for monitoring an RF transmission line and RF signal path to an antenna unit used in a distributed antenna system in a structure. The antenna is DC isolated from the RF transmission line through a current injector, allowing testing by sending a code from a base station to a remote antenna location and using a monitoring module to confirm reception of the code and transmit data to the base station relating to the antenna unit. | 2017-12-28 |
20170373769 | PROXIMATE COMMUNICATION WITH A TARGET DEVICE - Systems and methods may use proximate communication to retrieve information pertaining to a target device. In one example, the method may include detecting the target device within a vicinity of a user device, receiving an information request response communication including information pertaining to the target device, and receiving an operation request response communication including information pertaining to a performed operation. | 2017-12-28 |
20170373770 | RECEIVING CIRCUIT CAPABLE OF PERFORMING I/Q MISMATCH CALIBRATION BASED ON EXTERNAL OSCILLATING SIGNAL - A receiving circuit includes: a first receiving terminal for receiving a RF signal; a second receiving terminal for receiving an external oscillating signal generated by an external oscillator; a low-noise amplifier coupled with the first receiving terminal and the second receiving terminal and utilized for generating an output signal; a first switch element positioned between the second receiving terminal and the low-noise amplifier; an in-phase signal processing circuit for generating an in-phase detection signal based on the output signal; an quadrature signal processing circuit for generating an quadrature detection signal based on the output signal; and a calibration circuit for controlling the first switch element and capable of performing an I/Q mismatch calibration operation according to the in-phase detection signal and the quadrature detection signal when the first switch element is turned on. | 2017-12-28 |
20170373771 | SYSTEMS AND METHODS FOR SATELLITE NOISE AND INTERFERENCE CALIBRATION USING TERMINAL MEASUREMENTS - Systems and methods are provided for satellite noise and interference calibration using satellite terminal measurements. In one implementation, a method includes partitioning a satellite network into a first partition including a plurality of terminals and a plurality of inroute frequency channels (IFCs); instructing the plurality of terminals of the partition to measure the SINR of the plurality of IFCs; processing the plurality of SINR measurements to compute normalized IFC measurements for each of the plurality of terminals; processing the normalized IFC measurements for each terminal to compute final calibrated IFC SINR offsets for each IFC of the partition; and normalizing the final calibrated IFC SINR offsets with respect to a lowest SINR offset IFC. The normalized final calibration offsets may be made available to each of the satellite terminals. During subsequent operation, the satellite terminals may consider the amount of interference present in an IFC before switching to the channel. | 2017-12-28 |
20170373772 | CELL MEASUREMENT METHOD AND TERMINAL - The present disclosure provides a cell measurement method and a terminal. The cell measurement method includes steps of: measuring a pilot signal from a to-be-measured cell, so as to acquire an channel estimation of N pilot signal transmission ports of the to-be-measured cell, N≧1; determining an equivalent received power corresponding to each precoding matrix in accordance with each precoding matrix in a set of precoding matrices and the channel estimation of the N pilot signal transmission ports of the to-be-measured cell; and determining an equivalent received power of the to-be-measured cell in accordance with the equivalent received power corresponding to each precoding matrix. | 2017-12-28 |
20170373773 | SYSTEMS AND METHODS FOR CALIBRATING OUT THE RADIATION CHANNEL MATRIX IN A MULTIPLE INPUT, MULTIPLE OUTPUT (MIMO) OVER-THE-AIR (OTA) RADIATED TEST SYSTEM - A MIMO test system is provided that performs non-cable-conducted, over-the-air radiated calibration and test modes of operations. A DUT is located in an anechoic chamber having a plurality of probe antennas disposed therein. During the calibration mode, the test instrument causes predetermined signals to be transmitted over a transmission channel comprising a non-cable-conducted, OTA interface between probe antennas of the chamber and antenna ports of the DUT and obtains measurements of received power and relative phase. The test instrument uses the measurements to construct a radiation channel matrix associated with the transmission channel and obtains an inverse matrix of the radiation channel matrix. During the test mode, the test system performs a non-cable-conducted, OTA radiated test during which the test instrument applies the inverse matrix to DUT performance measurements obtained by the test instrument to calibrate out the radiation channel matrix from the DUT performance measurements. | 2017-12-28 |
20170373774 | MEDIA SYSTEM ANALYSIS AND CONTROL - A method of processing media output events, each having a corresponding duration, from a plurality of media content receivers within a media distribution system, comprises: a. dividing the output events into a plurality of segments, such that output events having similar properties are placed into the same one of said segments; b. within each said segment, identifying a long duration threshold based on the distribution of the durations of the output events within that segment; c. and applying the long duration thresholds of each said segment for control and/or analysis of the media distribution system. | 2017-12-28 |
20170373775 | Radiobeacon Data Sharing by Forwarding Low Energy Transmissions to a Cloud Host - Remote actuation of machines or machine systems is realized by a system for coupling a radiobeacon to a smart device and in turn to a broader network. The smart device is configured as a proximity-actuated “community nodal device” by an application that operates as part of the system. The community nodal device is given instructions to function as a “soft switch”: to automatically “upswitch”, amplify, and broadcast low energy, local area radiobeacon “messages” to a cloud-based server, where the message is interpreted according to rules or policies established by an operator, and a command is transmitted for execution to a remote device. Conventional smart devices generally discard data not addressed to the owner of the smart device. Instead of discarding third party messages, the system preempts their handling, and using a soft switch formed from background resources, anonymously, without access to the message by a user interface of the proxy device, and without waiting for a network query from the host, engineers an “upswitched transmission” of radiobeacon-generated data to a cloud host. Advantageously, confidential sharing of ad hoc community resources results in a negligible load on background resources of the community nodal device. Messages may include a sensor data payload. Bit overloading enables a sensor data payload to be compressed into a few hundred bytes or less. | 2017-12-28 |
20170373776 | BROADCASTING SIGNAL TRANSMISSION APPARATUS, BROADCASTING SIGNAL RECEIVING APPARATUS, BROADCASTING SIGNAL TRANSMISSION METHOD AND BROADCASTING SIGNAL RECEIVING METHOD - The present invention provides a method for transmitting a broadcasting signal. A method for transmitting a broadcasting signal according to the present invention suggests a system capable of supporting a next generation broadcasting service in an environment which supports a next generation hybrid broadcast using a terrestrial broadcast network and an internet network. Furthermore, in an environment which supports a next generation hybrid broadcast, suggested is an efficient signaling scheme which can embrace both a terrestrial broadcast network and an internet network. | 2017-12-28 |
20170373777 | SYSTEMS AND METHODS FOR SIGNAL MIXING - Systems and methods for a signal mixing device are provided. An example method includes generating a mixing request during a live performance based on sensed mouth movement when sensed audio from the mouth is less than a threshold. In such an example method, the sensed mouth movement may be generated from a sensor mounted separately from an audio sensor of a microphone, and may be displayed at a mixing console during the live performance. | 2017-12-28 |
20170373778 | METHOD FOR BROADCASTING PROTECTED MULTIMEDIA CONTENTS - A method for broadcasting protected multimedia content includes, at predetermined intervals, having an access-rights server broadcast each new right of access to the broadcast multimedia content only to those terminals whose logins are included in a broadcast list. In response to a predetermined event, a terminal sends, to the access-rights server, via a point-to-point connection, a status message indicating, to the access-rights server, that the terminal is in its ready state. Alternatively, if the terminal is occupied, it avoids sending a status message. In the absence of reception of the status message that was expected in response to the predetermined event, the access-rights server automatically removes the identifier of the terminal from the broadcast list. | 2017-12-28 |
20170373779 | TRANSMITTING SYSTEM, MULTIPLEXING APPARATUS, AND LEAP SECOND CORRECTION METHOD - A transmitting system includes an outputting apparatus and a multiplexing apparatus. The outputting apparatus transmits MMTP packets to which an NTP short format timestamp is added. The multiplexing apparatus multiplexes the MMTP packets. The multiplexing apparatus includes an extractor, a controller, a determiner, a management information generator, a continuity determiner, and a transmission timing adjuster. The transmission timing adjuster writes, for adjustment of a transmission timing of an MMTP packet being close to an MMTP packet in which an NTP short format timestamp value is discontinuous, time information taking a leap second processing into consideration, to the NTP short format timestamp of the MMTP packet. | 2017-12-28 |
20170373780 | METHOD FOR UPLINK TRANSMISSION IN UNLICENSED BAND, AND DEVICE USING SAME - A method and a device for uplink transmission in an unlicensed band are provided. The device receives an uplink grant for uplink transmission in an unlicensed band from a base station, and transmits an uplink channel in a subframe in the unlicensed band on the basis of the uplink grant. The subframe comprises a plurality of orthogonal frequency division multiplexing(OFDM) symbols, and at least one of a plurality of the OFDM symbols is defined by gaps during which the uplink channel is not transmitted. | 2017-12-28 |
20170373781 | APPARATUS AND METHOD FOR CONTROLLING INTERFERENCE BETWEEN SERVICES IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a 5 | 2017-12-28 |
20170373782 | Communication Using Chaotic Waveforms - Example communication systems and methods are described. In one implementation, a method receives a first chaotic sequence of a first temporal length, and a second chaotic sequence of a second temporal length. The method also receives a data symbol for communication to a destination. Based on the data symbol, the second chaotic sequence is temporally shifted and combined with the first chaotic sequence to generate a composite chaotic sequence. The first chaotic sequence functions as a reference chaotic sequence while the second chaotic sequence functions as a data-carrying auxiliary chaotic sequence. | 2017-12-28 |
20170373783 | APPARATUS AND METHOD FOR DETECTING OPTICAL SIGNAL - An optical signal detecting apparatus and method. The optical signal detecting apparatus includes an optical demultiplexer configured to demultiplex an input optical signal into a first optical signal having a first band wavelength and a second optical signal having a second band wavelength, a first optical detector configured to detect the first optical signal, and a second optical detector configured to detect the second optical signal, and the optical demultiplexer, the first optical detector, and the second optical detector may be provided in a TO-CAN package. | 2017-12-28 |
20170373784 | OPTICAL TRANSMISSION APPARATUS AND WAVELENGTH CONTROL METHOD - An optical transmission apparatus includes a first transmitter configured to transmit a first optical signal in a first wavelength band and a second optical signal in a second wavelength band located next to the first wavelength band; a second transmitter configured to transmit a third optical signal in a third wavelength band located next to the second wavelength band and a fourth optical signal in a fourth wavelength band located next to the third wavelength band; and a processor coupled to the first transmitter and the second transmitter and configured to select the third wavelength band among the first wavelength band, the second wavelength band, the third wavelength band and the fourth wavelength band, and control the first wavelength band, the second wavelength band, and the fourth wavelength band based on the third wavelength band. | 2017-12-28 |
20170373785 | RECEIVING DEVICE AND LOCAL LIGHT CONTROL METHOD - A receiving device includes a light source, a wave multiplexer, a converter, a demodulator and a processor. The light source outputs local light. The wave multiplexer causes the local light to interfere with a received signal to acquire an optical signal. The converter converts the optical signal into an electrical signal. The demodulator demodulates the electrical signal to acquire a demodulated signal. The processor is configured to correct an error of the demodulated signal. The processor is configured to acquire a signal correction amount and/or an error rate. The processor is configured to control the light source in order to adjust an output intensity of the local light based on the signal correction amount and/or the error rate. | 2017-12-28 |
20170373786 | Optical Line Terminal (OLT) Support of Optical Network Unit (ONU) Calibration - An optical line terminal (OLT) channel termination (CT) comprises a receiver configured to receive an upstream message which comprises a correlation tag from an optical network unit (ONU), wherein the correlation tag represents a unique number, a processor coupled to the receiver and configured to process the upstream message, and generate a downstream message based on the upstream message, wherein the downstream message comprises the correlation tag, and a transmitter coupled to the processor and configured to transmit the downstream message to the ONU. | 2017-12-28 |
20170373787 | MODE-MULTIPLEXING CONTROL METHOD, AND TRANSMISSION APPARATUS AND RECEPTION APPARATUS FOR THE SAME - A mode-multiplexing control method, and a transmission apparatus and reception apparatus for the same, the mode-multiplexing control method performed by the transmission apparatus, the mode-multiplexing control method including measuring data traffic, determining a transmission mode count to be used based on the measured data traffic, and transmitting data to a reception apparatus through an optical line in transmission modes corresponding to the determined transmission mode count. | 2017-12-28 |
20170373788 | ASYNCHRONOUS FEEDBACK TRAINING - Systems, apparatuses, and methods for implementing asynchronous feedback training sequences are described. A transmitter transmits a training sequence indication to a receiver via a communication channel including a plurality of data lines. The training sequence indication includes a bit sequence to indicate the beginning of a training sequence. The indication includes a transition from a zero to a one at the midpoint of a supercycle of ‘N’ clock cycles in length, followed by a predetermined number of ones. The training sequence indication is then followed by a test pattern. The beginning of the test pattern occurs at the end of a supercycle. The receiver determines if there are any errors in the received test pattern, and then sends feedback to the transmitter that indicates whether any errors were detected. Responsive to receiving the feedback, the transmitter alters delay settings for one or more of the data lines. | 2017-12-28 |
20170373789 | COMMUNICATION MODE SELECTION - A device includes a memory, a processor, and a transceiver. The memory is configured to store capability data corresponding to a set of stations. The processor is configured to select, based at least in part on the capability data, one of a multi-user multiple-input multiple-output (MU-MIMO) mode or an orthogonal frequency-division multiple access (OFDMA) mode for wireless communication with a subset of the set of stations. The transceiver is configured to wirelessly communicate with the subset in the selected one of the MU-MIMO mode or the OFDMA mode. | 2017-12-28 |
20170373790 | ADAPTIVE MODULATION AND PROTOCOL SYSTEM - A communication system includes a wireless interface including a transmitter, receiver, and a programmable device responsive to a communication signal to switch a communication mode in accordance with the communication signal. A module is coupled to the wireless interface and includes a processor and a memory coupled to the processor. The memory includes a protocol sensor configured to identify a given protocol for received information and employ a corresponding software protocol for further communications. | 2017-12-28 |
20170373791 | SPATIAL LAYERED TRANSMISSION METHOD AND DEVICE - The present application provides a spatial layered transmission method and a spatial layered transmission device. The spatial layered transmission method includes steps of: dividing to-be-transmitted data into at least two layers of spatial data; determining a symbol rate for each layer of spatial data, to enable an error between SERs for the layers of spatial data to be smaller than a predetermined error threshold; and encoding each layer of spatial data in accordance with the determined symbol rate, and transmitting the encoded layer of spatial data. | 2017-12-28 |
20170373792 | APERIODIC CHANNEL STATE INFORMATION (CSI) REPORTING FOR ENHANCED CARRIER AGGREGATION - Systems, methods, apparatuses, and computer program products for aperiodic channel state information (CSI) reporting for enhanced carrier aggregation are provided. One method includes transmitting, by a network node, a configuration of at least two aperiodic channel state information (A-CSI) reporting modes per one or more configured downlink (DL) component carriers (CC) to at least one user equipment. The method may also include transmitting an aperiodic channel state information (A-CSI) trigger to the at least one user equipment. The transmitting of the A-CSI trigger may cause the at least one user equipment to dynamically switch between the two configured aperiodic channel state information (A-CSI) reporting modes. | 2017-12-28 |
20170373793 | TECHNIQUES FOR MANAGING BLIND DECODING REDUCTION FOR CONTROL CHANNEL SEARCH SPACES - Aspects described herein relate to managing blind decoding of a control channel search space. A number of blind decodes configured for a control channel search space can be determined based at least in part on one or more parameters broadcasted by a access point that transmits a control channel in the control channel search space. One or more reduction values can be determined for the number of blind decodes at the UE. A pattern for performing a subset of the number of blind decodes can be determined based at least in part on the one or more reduction values. Blind decoding can be performed for the control channel based on the pattern for performing the subset of the number of blind decodes to obtain control data transmitted in the control channel. | 2017-12-28 |
20170373794 | METHOD AND APPARATUS FOR PERFORMING UPLINK TRANSMISSION FOR USER EQUIPMENT REQUIRING COVERAGE ENHANCEMENTS IN WIRELESS COMMUNICATION SYSTEM - A method and apparatus for transmitting uplink (UL) data in a wireless communication system is provided. For one embodiment, a user equipment (UE), adds short cyclic redundancy check (CRC) per each fragment, which consists of a transport block for the UL data, and transmits the UL data to a network. For another embodiment, the UE selects one physical uplink control channel (PUCCH) format, which is used to carry uplink control information (UCI), among multiple PUCCH formats, and transmits the UL data to a network by using the one PUCCH format. | 2017-12-28 |
20170373795 | METHOD AND USER EQUIPMENT FOR RECEIVING SIB1 - The present disclosure relates to a method used in a User Equipment (UE) for receiving System Information Block Type 1 (SIB1) of a serving cell of the UE and the associated UE. The method includes: receiving a signal carrying the SIB1 of the serving cell; determining one or more neighboring cells of the serving cell as potential interference neighboring cells; determining one or more SIB1 Resource Elements (REs) carrying the SIB1 of the serving cell and one or more SIB1 REs carrying SIB1 of each of the potential interference neighboring cells; determining one or more of the potential interference neighboring cells having one or more SIB1 REs colliding with said one or more SIB1 REs of the serving cell, as valid interference neighboring cells; cancelling SIB1 of each of the valid interference neighboring cells from the received signal; and decoding the received signal after the cancellation to obtain the SIB1 of the serving cell. | 2017-12-28 |
20170373796 | TRANSMITTING APPARATUS AND MAPPING METHOD THEREOF - A transmitting apparatus is disclosed. The transmitting apparatus includes an encoder to perform channel encoding with respect to bits and generate a codeword, an interleaver to interleave the codeword, and a modulator to map the interleaved codeword onto a non-uniform constellation according to a modulation scheme, and the constellation may include constellation points defined based on various tables according to the modulation scheme. | 2017-12-28 |
20170373797 | TRANSMITTING APPARATUS AND MAPPING METHOD THEREOF - A transmitting apparatus is disclosed. The transmitting apparatus includes an encoder to perform channel encoding with respect to bits and generate a codeword, an interleaver to interleave the codeword, and a modulator to map the interleaved codeword onto a non-uniform constellation according to a modulation scheme, and the constellation may include constellation points defined based on various tables according to the modulation scheme. | 2017-12-28 |
20170373798 | DECODING APPARATUS AND DECODING METHOD INCLUDING ERROR CORRECTION PROCESS - A decoding apparatus includes an input power estimating circuit, an error correction decoder and a controller. The input power estimating circuit generates multiple estimated input powers for multiple sets of data included in a packet that needs to be corrected, and calculates respective power differences between the multiple estimated input powers and a reference power. The controller determines one or multiple candidate error positions according to one of the multiple power differences that is higher than a predetermined threshold. The error correction decoder performs a decoding process on the packet according to the one or multiple candidate error positions. | 2017-12-28 |
20170373799 | METHOD AND APPARATUS FOR ACK TRANSMISSION IN A WLAN - The present invention relates to a method and apparatus for acknowledgement (ACK) transmission in a WLAN. A station receives a plurality of data frames from a plurality of other stations and then transmits an ACK for the plurality of data frames to the plurality of stations. The ACK is a multi-user (MU) block ACK frame which includes a plurality of block ACKs for the plurality of stations. One block ACK includes at least one ACK for at least one data frame that is received from one station. | 2017-12-28 |
20170373800 | METHOD FOR TRANSMITTING MULTIPLEXED HARQ FEEDBACKS IN A CARRIER AGGREGATION SYSTEM AND A DEVICE THEREFOR - The present invention relates to a wireless communication system. More specifically, the present invention relates to a method and a device for transmitting multiplexed HARQ feedbacks in a carrier aggregation system, the method comprising: configuring with a plurality of cells, wherein at least two cells of the plurality of cells are configured with Physical Uplink Control Channel (PUCCH) resources, respectively; generating a Hybrid-ARQ (HARQ) feedback by multiplexing the HARQ feedbacks of all of the plurality of cells configured for the UE; selecting a cell among the at least two cells with the PUCCH resources; and transmitting the generated HARQ feedback on the selected cell. | 2017-12-28 |
20170373801 | EFFICIENT HARQ FEEDBACK - Systems and methods are disclosed for providing efficient downlink Hybrid Automatic Request (HARQ) feedback. In some embodiments, a method of operation of a wireless device in a cellular communications system comprises receiving downlink control information from a radio access node in a first subframe T. The downlink control information comprises an indication of a HARQ timing offset K. The method further comprises transmitting downlink HARQ feedback to the radio access node in a subframe T+K. In this manner, HARQ feedback can be directly scheduled by the network, which in turn enables efficient HARQ feedback. | 2017-12-28 |
20170373802 | ROBUSTNESS ENHANCEMENTS OF EFFICIENT HARQ FEEDBACK - Systems and methods are disclosed for providing efficient downlink Hybrid Automatic Request (HARQ) feedback. In some embodiments, a method of operation of a wireless device in a cellular communications system comprises receiving a downlink control information message comprising a HARQ feedback buffer index and storing a downlink HARQ feedback flag in a position within a HARQ feedback buffer that corresponds to the HARQ feedback buffer index. In this manner, multiple downlink HARQ feedback flags can be stored in the HARQ feedback buffer and subsequently transmitted to a network node in an efficient manner. | 2017-12-28 |
20170373803 | Device and Method of Handling Uplink Transmission - A communication device comprises a storage device for storing instructions of receiving a semi-persistent scheduling (SPS) uplink (UL) grant in a transmission time interval (TTI) from a base station (BS), wherein the SPS UL grant indicates a UL frequency resource periodically allocated to the communication device; storing the SPS UL grant as a configured UL grant; initializing the configured UL grant to start in an earliest TTI after the first TTI and applying the configured UL grant to a plurality of TTIs after the earliest TTI; transmitting at least one first repetition of a UL transmission by using a hybrid automatic repeat request (HARQ) process according to the configured UL grant; starting a UL HARQ round trip time (RTT) timer for the HARQ process in response to the UL transmission; and starting a drx-ULRetransmissionTimer for the HARQ process, when the UL HARQ RTT timer expires. | 2017-12-28 |
20170373804 | METHODS FOR ENABLING DELAY-AWARENESS IN THE CONSTRAINED APPLICATION PROTOCOL (COAP) - A Delay Indicator parameter is contained in CoAP messages to reflect delay tolerance information. The Delay Indicator is leveraged by CoAP Clients and CoAP Servers to improve their behavior such as entering sleep mode to save energy while not violating delay requirements. A timeout mechanism for CoAP Response is enabled by a RESPONSE_Timer based on the Delay Indicator in CoAP ACK. Cancellation of CoAP Requests is enabled by leveraging the delay tolerance information as indicated by Delay Indicator. | 2017-12-28 |
20170373805 | METHOD FOR PERFORMING A PUCCH TRANSMISSION ON A PUCCH CELL IN A CARRIER AGGREGATION SYSTEM AND A DEVICE THEREFOR - The present invention relates to a wireless communication system. More specifically, the present invention relates to a method and a device for performing a PUCCH transmission on a PUCCH cell in a carrier aggregation system, the method comprising: configuring a cell with Physical Uplink Control Channel (PUCCH) resource; receiving a PUCCH transmission prohibit indication from a network that indicates which cell with PUCCH resource is prohibited for PUCCH transmission; and performing a PUCCH transmission on the cell with PUCCH resource if the PUCCH transmission prohibit indication doesn't indicate the cell. | 2017-12-28 |
20170373806 | METHOD AND DEVICE FOR FORMING CONTROL FIELD COMPRISING INFORMATION ABOUT RESOURCE UNITS IN WIRELESS LAN SYSTEM - Provided is a control field comprising allocation information about resource units (RUs) in a wireless LAN system in which a plurality of RUs are supported. A control field comprising allocation information about RUs can be comprised in an uplink or downlink PPDU and can be designed in accordance with a plurality of frequency bands. A control field corresponding to a particular frequency band can be duplicated over another frequency band. Also, the control field corresponding to the particular frequency band can be used for scheduling of a data field corresponding to the same frequency band and a data field corresponding to another frequency band. | 2017-12-28 |
20170373807 | METHODS AND DEVICES FOR HANDLING AND ASSIGNING UPLINK PILOTS - Disclosed are methods and devices for controlling radio base stations and User Equipments, UEs, in a wireless communication network. Corresponding computer programs are also provided. Embodiments provides mechanisms whereby it will be possible to determine whether an uplink pilot sequences has been contaminated. Further embodiments provides methods and devices for assigning a new uplink pilot sequence to a UE if the uplink pilot sequence assigned to the UE is deemed to be contaminated. | 2017-12-28 |
20170373808 | METHOD FOR MULTI-USER TRANSMISSION AND RECEPTION IN WIRELESS COMMUNICATION SYSTEM AND DEVICE FOR SAME - Disclosed are a method for multi-user transmission and reception in a wireless communication system and a device for same. More particularly, a method for performing multi-user (MU) transmission by a station (STA) device in a wireless communication system comprises the steps of: generating a high efficiency-long training field (HE-LTF) sequence in a frequency domain in accordance with an MU transmission bandwidth; and transmitting a physical protocol data unit (PPDU) which comprises one or more symbols to which the HE-LTF sequence is mapped, wherein the HE-LTF sequence can be generated by multiplying one row of a P matrix to a length unit of a row of the P matrix in a predetermined sequence. | 2017-12-28 |
20170373809 | METHOD OF PROCESSING DATA BLOCK IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for processing a data block by a user equipment in a wireless communication system comprises generating tail bits of 18 bits by performing trellis termination in a turbo encoder of code rate 1/5 containing a plurality of constituent encoders; and deploying the tail bits of 18 bits to 5 encoded bit sequences of the turbo encoder according to a prescribed rule, wherein 4 tail bits are deployed to a systematic bit sequence among the 5 encoded bit sequences according to the prescribed rule, and 4 tail bits are deployed to each of specific 2 parity bit sequences among 4 parity bit sequences according to the prescribed rule. | 2017-12-28 |
20170373810 | WIRELESS COMMUNICATION METHOD AND WIRELESS COMMUNICATION DEVICE - Wireless communication methods and devices are provided. The wireless communication method includes transmitting a reference signal and a data signal in a Physical Resource Block (PRB) with a coverage enhancement level, wherein the number of resource elements transmitting the reference signal in the PRB is determined by the coverage enhancement level, the channel type and/or the coding rate of the data signal. | 2017-12-28 |
20170373811 | INTERFERENCE MEASUREMENT METHOD, BASE STATION AND USER EQUIPMENT - Embodiments of the present invention provide an interference measurement method, a base station, and a user equipment. The method includes: determining, by a user equipment, a first resource for interference measurement in a first subframe or determining a second resource not for interference measurement in the first subframe according to at least one of the zero-power CSI-RS configuration information, the non-zero power CSI-RS configuration information, and the CSI-IM configuration information; and performing interference measurement on the first resource, or performing no interference measurement on the second resource. The embodiments of the present invention can improve precision of interference measurement. | 2017-12-28 |
20170373812 | TRANSMITTING DEVICE, RECEIVING DEVICE AND METHODS THEREOF - The present invention relates to a transmitting device and a receiving device. The transmitting device ( | 2017-12-28 |
20170373813 | METHODS AND SYSTEMS FOR ACKNOWLEDGMENT CONFIGURATION - Methods, apparatus, and systems disclosed provide for the configuration of acknowledgments of data. In some aspects, a method includes generating an aggregated media access control (MAC) protocol data unit (A-MPDU) frame, comprising a media access control protocol data unit (MPDUs), the media access control protocol data unit (MPDUs) comprising a media access control (MAC) header and data, wherein the media access control (MAC) header comprises an indication of an acknowledgment type for the data of the MPDU; and transmitting the A-MPDU onto a wireless network. | 2017-12-28 |
20170373814 | METHOD FOR TRANSMITTING CONTROL INFORMATION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method is provided for generating Acknowledgement/Negative Acknowledgement (ACK/NACK) information by a user equipment (UE) in a wireless communication system supporting carrier aggregation. The UE receives, from a base station (BS), a plurality of codewords through a plurality of downlink carriers. Each of the plurality of downlink carriers support one or more codewords according to a transmission mode. The transmission mode is independently configured per each of the plurality of downlink carriers. The UE determines a total number of ACK/NACK bits, and generates a sequence of the ACK/NACK bits according to the total number of the ACK/NACK bits. The UE determines the total number of ACK/NACK bits based on a total number of the plurality of downlink carriers and a type of each transmission mode independently configured per each of the plurality of downlink carriers. | 2017-12-28 |
20170373815 | APPARATUS AND METHOD FOR SINGLE-TONE DEVICE DISCOVERY IN WIRELESS COMMUNICATION NETWORKS - Embodiments of wireless communication devices and methods for device discovery is generally described herein. Some of these embodiments describe an apparatus having processing circuitry arranged to configure a single-tone discovery signal for transmission in a symbol in a transmission opportunity based on an assignment pattern. The assignment pattern may define frequency positions, for a set of transmission opportunities, at which the apparatus shall transmit discovery signals in the corresponding transmission opportunity. The apparatus may have physical layer circuitry arranged to transmit the single-tone discovery signal in the corresponding transmission opportunity. Other methods and apparatuses are also described. | 2017-12-28 |
20170373816 | SIGNALING METHOD FOR MULTI-USER TRANSMISSION, AND WIRELESS COMMUNICATION TERMINAL AND WIRELESS COMMUNICATION METHOD USING SAME - The present invention relates to a signaling method of a wireless LAN frame for multi-user transmission, and to a wireless communication terminal, and a wireless communication method using the same. | 2017-12-28 |
20170373817 | CSI REPORTING IN PUSCH FOR CARRIER AGGREGATION - Carrier aggregation allows concurrent transmission on multiple component carriers (CC) to increase the data rate. A user equipment (UE) device in a cellular network provides periodic or aperiodic channel state information of the DL channel to a base station (eNB) for each of the aggregated CCs. The UE receives two or more reference signals corresponding to two or more aggregated CCs from an eNB. The UE computes a plurality of channel state information (CSI) reports for each of two or more aggregated CCs derived from the two or more reference signals. The UE receives a positive CSI request from the eNB for a CSI report and transmits CSI feedback to the eNB comprising one or more CSI reports selected from the plurality of CSI reports. | 2017-12-28 |
20170373818 | Method, Micro Base Station, and Macro Base Station for Adjusting Communications Mode - Provided are a method, a micro base station, and a macro base station for adjusting a communication mode, the method including: a first communication node sending duplex mode adjustment information to a second communication node, herein the second communication node at least supports a full-duplex mode. According to the technical solution provided by the present disclosure, by sending the duplex mode adjustment information to the second communication node, the influence on the system flexibility for a reason that the second communication node enables a full-duplex mode at all times is avoided, the power consumption caused by the full-duplex mode to the second communication node is reduced and the burden of subordinate terminals of the second communication node is decreased. | 2017-12-28 |
20170373819 | MULTI-RADIO FILTERING FRONT-END CIRCUITRY FOR TRANSCEIVER SYSTEMS - Devices and systems useful in concurrently receiving and transmitting Wi-Fi signals and Bluetooth signals in the same frequency band are provided. By way of example, an electronic device includes a transceiver configured to transmit data and to receive data over channels of a first wireless network and a second wireless network concurrently. The transceiver includes a plurality of filters configured to allow the transceiver to transmit the data and to receive the data in the same frequency band by reducing interference between signals of the first wireless network and the second wireless network. | 2017-12-28 |
20170373820 | HYBRID FULL DUPLEX COMMUNICATIONS IN A RADIO FREQUENCY CABLE NETWORK - Systems and methods presented herein provide for improved duplex communications in an RF cable network comprising a plurality of CMs. In one embodiment, a system includes a CMTS operable to transmit downstream communications to the CMs and to process upstream communications from the CMs. The system also includes a duplex RF communication path between the CMTS and the CMs. The CMTS is further operable to transmit a control signal that directs a first of the CMs to transmit, to direct the remaining CMs to receive the transmission from the first CM, to direct the CMs to report received power levels of the transmission from the first CM, and to calculate RF isolations of the remaining CMs with respect to the first CM based on the reported power levels. | 2017-12-28 |
20170373821 | COMMUNICATION APPARATUS AND NETWORK SYSTEM - A slave unit that is a communication apparatus according to the present invention includes: a frame relaying unit that receives, among communication frames received by a reception port, a communication frame to be relayed to the other apparatus and outputs the received communication frame to a transmission port; a frame transmitting unit that generates a communication frame and outputs the communication frame to the transmission port; and a transmission-frame arbitrating unit that regulates output of the communication frame to the transmission port performed by the frame transmitting unit in a guard time that is a period including a time period in which arrival of the communication frame transmitted in a network in a fixed cycle is expected. | 2017-12-28 |
20170373822 | Clock Synchronization Using Sferic Signals - A system and method involve using sferic signals to synchronize clocks and/or determine relative receiver positions within a communications network. A sferic signal is detected, encoded, and then identified. A time-difference-of-arrival (TDOA) for the sferic signal is then calculated. A clock error estimate is determined from the TDOA. The clock error estimate is then used to synchronize clocks and/or determine relative receiver positions. | 2017-12-28 |
20170373823 | Fast Clock and Data Recovery for Free-Space Optical Communications - A method includes receiving an optical signal through an optical link and determining a receiving power for the optical link. The method further includes comparing the receiving power for the optical link to a first receiving power threshold and transitioning a clock and data recovery circuit form a normal mode to a holdover mode when the receiving power is less than the first receiving power threshold. The clock and data recovery circuit, when operating in the holdover mode, configured to hold a recovered clock to a known-good clock frequency. When the receiving power for the optical link is greater than a second receiving power threshold, the method initiates a transition of the clock and data recovery circuit from the holdover mode to the normal mode and reacquires synchronization between the recovered clock and a current rate of the incoming data stream using the known-good clock frequency. | 2017-12-28 |
20170373824 | DISTRIBUTED PHASE LOCKED LOOP IN HEARING INSTRUMENTS - A system, in some embodiments, comprises: an antenna; a receiver, coupled to the antenna, to receive wireless signals from another electronic device; a signal processor (SP) coupled to the receiver; and a phase locked loop (PLL), distributed among the receiver and the SP, to synchronize the frequency of a data sampling clock used by the SP with the frequency of a source clock determined by the receiver. | 2017-12-28 |
20170373825 | 1-16 & 1.5-7.5 Frequency Divider For Clock Synthesizer In Digital Systems - A frequency divider unit has a digital frequency divider configured to divide by an odd integer, and a dual-edge-triggered one-shot coupled to double frequency of an output of the digital frequency divider. The frequency divider unit is configurable to divide an input frequency by a configurable ratio selectable from at least non-integer ratios of 1.5, 2.5, and 3.5. In embodiments, the frequency divider unit relies on circuit delays to determine an output pulsewidth, and in other embodiments the output pulsewidth is determined from a clock signal. In embodiments, the unit is configurable to divide an input frequency by a configurable ratio selectable from at least non-integer ratios of 1.5, 2.5, 3.5, 4.5, 5.5, 6.5, and 7.5 as well as many integer ratios including 2, 4, 6, and 8. In embodiments, the digital frequency divider is configurable to provide a 50% duty cycle to the one-shot. | 2017-12-28 |
20170373826 | CLOCK SYNCHRONIZER AND METHOD OF ESTABLISHING AN OUTPUT CLOCK - A hybrid numeric-analog clock synchronizer, for establishing a clock or carrier locked to a timing reference. The clock may include a framing component. The reference may have a low update rate. The synchronizer achieves high jitter rejection, low phase noise and wide frequency range. It can be integrated on chip. It may comprise a numeric time-locked loop (TLL) with an analog phase-locked loop (PLL). Moreover a high-performance number-controlled oscillator (NCO), for creating an event clock from a master clock according to a period control signal. It processes edge times rather than period values, allowing direct control of the spectrum and peak amplitude of the justification jitter. Moreover a combined clock-and-frame asynchrony detector, for measuring the phase or time offset between composite signals. It responds e.g. to event clocks and frame syncs, enabling frame locking with loop bandwidths greater than the frame rate. | 2017-12-28 |
20170373827 | RESOLVING INTERACTION BETWEEN CHANNEL ESTIMATION AND TIMING RECOVERY - System and method of timing recovery for recovering a clock signal with reduced interaction between an adaptive channel estimator and the overall timing loop for correcting clock phase. The channel response estimation in the timing recovery loop is dynamically adapted to the current channel response that varies over time. The channel estimator includes compensation logic operable to detect and compensate a correction of clock phase ascribed to the channel estimator. The compensation logic can calculate the offset between a center of filter (COF) value and a COF nominal value, the offset indicative of the amount and direction of clock phase correction contributed by the channel estimator. Based on the offset, the compensation logic adjusts the estimates channel response by adjusting the tap weights of the channel estimator to correct the offset, thereby compensating the clock phase correction. | 2017-12-28 |
20170373828 | USING SECURE KEY STORAGE TO BIND A WHITE-BOX IMPLEMENTATION TO ONE PLATFORM - A method for performing a secure function in a data processing system is provided. In accordance with one embodiment, the method includes generating and encoding an encryption key. The encoded encryption key may be encrypted in a key store in a trusted execution environment (TEE) of the data processing system. The encrypted encryption key may encrypted, stored, and decrypted in the key store in the TEE, but used in a white-box implementation to perform a secure function. The secure function may include encrypting a value in the white-box implementation for securing a monetary value on, for example, a smart card. In one embodiment, each time an encryption key or decryption key is used, it is changed to a new key. The method makes code lifting and rollback attacks more difficult for an attacker because the key is stored separately from, for example, a white-box implementation in secure storage. | 2017-12-28 |
20170373829 | PROTECTION METHOD AND DEVICE AGAINST A SIDE-CHANNEL ANALYSIS - A method for executing, by a circuit, an operation combining first and second input data and providing an output data of the same size, may include generating from the first input data a first input set including all possible data in relation to a size of the first data, generating from the second input data a second input set including all possible data in relation to a size of the second data, and applying the operation to each pair of data including a data of the first input set and a data of the second input set, an output set of the operation including data resulting from the application of the operation to each of the pairs of data. | 2017-12-28 |
20170373830 | METHOD FOR PROTECTING SUBSTITUTION OPERATION AGAINST SIDE-CHANNEL ANALYSIS - A method for executing an operation by a circuit, may include using a first mask set of mask parameters including a same number of occurrences of all possible values of a word of an input data in relation to a size thereof, using an input set including for each mask parameter in the first mask set a data obtained by applying XOR operations to the input data and to the mask parameter and providing an output set including all data resulting from the application of the operation to a data in the input set. The output data may be obtained by applying XOR operations to any of the data in the output set and to a respective second mask parameter in a second mask set including a same number of occurrences of all possible values of the second mask parameters in relation to a size of thereof. | 2017-12-28 |
20170373831 | METHODS AND DEVICES AGAINST SIDE-CHANNEL ANALYSIS - A method for executing an operation whereby a first input data, may be combined with a second input data, may include: defining data pairs whereby each data of a first input set is associated with a respective data of a second input set, the data in the first and second input sets may be obtained by applying Exclusive OR (XOR) operations to the first and second input data and to all first and second mask parameters of first and second mask sets; and computing output data by applying the operation to each of the data pairs, to obtain an output set, the first and second mask sets being such that a combination by XOR operations of each pairs of corresponding first and second mask parameters may produce a third mask set, where each mask sets may include a word column having a same number of occurrences of all possible values of the words. | 2017-12-28 |
20170373832 | METHODS AND DEVICES AGAINST A SIDE-CHANNEL ANALYSIS - A method for executing by a circuit a bit permutation operation by which bits of an input data are mixed to obtain an output data including at least two words, may include: generating a first mask set including mask parameters, the mask set having one word column per word of the input data, each word column comprising a same number of occurrences of all possible values of one input data word in relation to a size of the input data word; generating an input set by combining the input data with each mask parameter of the first mask set by Exclusive OR (XOR) operations; and computing an output set including output data resulting from the application of the bit permutation operation to each data in the input set, where the first mask set may be generated such that the output set includes columns of output words, and each output word column including a same number of occurrences of all possible values of one output word in relation with a size of the output word. | 2017-12-28 |
20170373833 | ESTABLISHING ENTROPY ON A SYSTEM - Servers in datacenters, mobile devices and virtualized servers without human interaction may experience difficulties in establishing entropy in a virtualized computing environment. Entropy is an important foundation for cryptography and a lack of entropy has led to weaknesses that can be used to break cryptographic systems in the past. | 2017-12-28 |
20170373834 | POLYNOMIAL-BASED HOMOMORPHIC ENCRYPTION - A method includes generating a secret key for encryption and decoding data. The method includes identifying a set of data in plaintext format. The method further includes converting, by a processing device, the data in plaintext format to ciphertext using a polynomial. The method also includes sending the ciphertext to a remote device for data processing, wherein the remote device is to process the ciphertext without having the secret key. The method includes receiving processed ciphertext from the remote device. The method further includes decoding, by the processing device, the processed ciphertext based on the secret key and the polynomial to yield processed plaintext. The method also includes outputting the processed plaintext. | 2017-12-28 |
20170373835 | KEY MANAGEMENT SYSTEM AND METHOD - A system and method for private key management in a public key encryption system are disclosed. In one embodiment, the system and method may utilize a “fake” private key to provide the private key management. | 2017-12-28 |
20170373836 | AES Hardware Implementation - A method of performing at least one of end-to-end Advanced Encryption Standard (AES) encryption and end-to-end AES decryption in an instruction execution module comprising hardware logic in a processor having an instruction set, receives in response to a particular instruction set being executed, key values and text data identified by operands in the executed instruction, the received key values defining an initial round key and forming current key values and the received text data defining an initial state array to be processed in an initial round and forming a current state array; and for each round of a plurality of rounds of | 2017-12-28 |
20170373837 | PROTECTION METHOD AND DEVICE AGAINST A SIDE-CHANNEL ANALYSIS - A method for executing an operation by a circuit, may include executing a first operation to process an input data, the circuit generating during the execution of the first operation a first signal, and executing in the circuit a second operation receiving the input data and configured to add to the first signal, between first and second instants during the execution of the first operation, a continuous second signal. A combination of the first and second signal forming a resultant signal in which the second signal may be indistinctly measurable with the first signal from outside of the circuit. The second signal and the resultant signal varying as a function of the input data. | 2017-12-28 |
20170373838 | METHODS FOR PROTECTING SUBSTITUTION OPERATION USING SUBSTITUTION TABLE AGAINST A SIDE-CHANNEL ANALYSIS - A method for executing by a circuit a substitution operation such that an output data may be selected in a substitution table using an input data as an index. The substitution operation may be performed using a new masked substitution table. The input data may be combined by XOR operations with a new value of a first mask parameter, and the output data may be combined by XOR operations with a new value of a second mask parameter. The new masked substitution table may be generated by computing the new value of the first mask parameter by applying XOR operations to a previous value of the first mask parameter and to a first input mask, computing the new value of the second mask parameter by applying XOR operations to a previous value of the second mask parameter and to a second input mask, and generating the new masked substitution table using a previous masked substitution table and the first and second input masks. | 2017-12-28 |
20170373839 | HARDWARE ACCELERATOR FOR PLATFORM FIRMWARE INTEGRITY CHECK - Encryption of a BIOS using a programmable logic device (PLD) is described. A PLD may include a static random-access memory area including programmable logic in a Lookup Table to receive a request to authenticate a basic input/output system (BIOS) executing on a processor coupled to the PLD. The PLD may calculate a hash value of a message associated with the BIOS using a Secure Hash Algorithm (SHA). The PLD may also include a random-access memory area including a first embedded random access memory block (EBR) to store a first portion of a 256-bit message digest associated with the message, a fifth portion of the 256-bit message digest, and second, third, fourth, sixth, seventh, and eighth EBRs to store second, third, fourth, sixth, seventh, and eighth portions of the 256-bit message digest, respectively. | 2017-12-28 |
20170373840 | BROWSER SECURITY MODULE - Authenticated requests can be sent without requiring the requests to include or potentially expose secret information used for the authentication process. A client device use a security credential such as a key to sign a request to be sent to a recipient. When the request is received, the recipient determines whether the request was signed using the correct key for the sender. In some embodiments a client token is included with the request that statelessly encodes the key, enabling a recipient capable of decoding the client token to determine the key and compare that key to the signature of the request. The sender can store the secret information in a secure location, such as a browser security module, such that the secret information is not exposed to the browser or script executing on the client device. | 2017-12-28 |
20170373841 | KEY EXCHANGE METHOD, KEY EXCHANGE SYSTEM, KEY DEVICE, TERMINAL DEVICE, AND PROGRAM - A random number generating unit generates random numbers s | 2017-12-28 |
20170373842 | System and Method for Authenticating Public Artworks and Providing Associated Information - Processing artist artwork authentication and published artwork information at a user computing device comprises an artist artwork authentication and artist information system employing a client device configured to use imaged date converted to text to identify an artist central authority server for authenticating published artworks as well as an artwork unique identifier. The artist artwork authentication and artist information system communicates with the central authority server using the identity of the artist central authority server and requests a public key for the central authority server. The client device, upon receiving the public key, then communicates another message to the central authoritative server that includes an encrypted version of the unique identifier that can be used to identify a piece of artwork and an artist associated with the artwork. The client device receives in response receives information regarding the artwork, information relating to the artist, and other information relevant to the artwork. | 2017-12-28 |
20170373843 | SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION - Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit. | 2017-12-28 |
20170373844 | SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION - Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. In some embodiments, the secure circuit is configured to generate a public key and a private key for an application, and receive, from the application via an API, a request to perform a cryptographic operation using the private key. The secure circuit is further configured to perform the cryptographic operation in response to the request. | 2017-12-28 |
20170373845 | Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card - A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards. | 2017-12-28 |
20170373846 | Password-Based Generation and Management of Secret Cryptographic Keys - A user computer generates a secret cryptographic key through communication with a server. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. In response to input of an input password, the user computer encodes the secret user value and the input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first value and check value to check whether the input password equals the user password. If so, the server encodes the first value and secret server value to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value. | 2017-12-28 |
20170373847 | METHOD FOR UPDATING A PUBLIC KEY - A method for updating a public key is provided. The method includes: acquiring, by a transmitting-end device, a first hash value calculated based on a first current public key; generating a first update public key and a first update private key; generating an update string such that a hash value of a hash function calculated based at least on the first update public key and the update string is equal to the first hash value; calculating, by a receiving-end device, a second hash value based at least on the first update public key and the update string according to the hash function; and verifying the first update public key by comparing the first hash value and the second hash value. | 2017-12-28 |
20170373848 | METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM - When data is encrypted and stored for a long time, encryption key(s) and/or algorithm(s) should be updated so as not to be compromised due to malicious attack. To that end, stored encrypted data is converted in the storage system with new set of cryptographic criteria. During this process, read and write requests can be serviced. | 2017-12-28 |
20170373849 | TRANSACTION AGENTS AND SYSTEMS - A hardware agent is a hardware device attached to, embedded in, or otherwise associated with a good. In particular, the hardware agent is bound to the good in such a way that information held by the agent may be confidently associated with the good. The hardware agent is constructed to securely hold information about the good, and information about stakeholders, such that the agent may autonomously make binding decisions regarding the good, including sales and financial transactions. Although the hardware agent may perform many functions autonomously, it often will have communication capabilities enabling it to share information with stakeholders, or to others as allowed | 2017-12-28 |
20170373850 | DATA ENCRYPTION METHOD, DECRYPTION METHOD, APPARATUS, AND SYSTEM - A data encryption method performed at a computing device includes: receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device; in response to the data encryption request: separately obtaining unique device information of the at least two target storage devices; generating, based on the unique device information, a public key according to a preset policy; encrypting the original data by using the public key to obtain ciphertext; and destructing relevant data of the public key from the computing device, and storing the ciphertext into the at least two target storage devices. | 2017-12-28 |
20170373851 | COMPUTER SECURITY LOCKS HAVING SEPARATE KEY PAIRS - A computer security lock having separate key pairs includes an encryption board inserted between a main board and a hard disk, and an encryption board being inserted into the encryption board to perform a real-time authentication process. The electronic key and the encryption board performs the real-time authentication process and hardware anti-copy self-testing process, and encrypt the data communicated between the encryption board and the electronic key. After passing the authentication process and the hardware anti-copy self-testing process, the electronic key combines an internally stored key list with the key list on the encryption board, and selects a user key to encrypt/decrypt the data on the disk according to the partition of the hard disk where the encrypted data is written to. The computer security lock can assure the safety of the data, and the hardware is prevented from being copied. | 2017-12-28 |
20170373852 | UNIQUE TOKEN AUTHENTICATION CRYPTOGRAM - Embodiments of the invention are directed to systems and methods for validating transactions using a cryptogram. One embodiment of the invention is directed to a method of processing a remote transaction initiated by a communication device provisioned with a token. The method comprises receiving, by a service provider computer, from an application on the communication device, a request for a token authentication cryptogram, wherein the token authentication cryptogram includes encrypted user exclusive data. The service provider computer may generate the token authentication cryptogram to include the user exclusive data. The service provider computer may send the token authentication cryptogram to the application, where the token authentication cryptogram can be used to validate the transaction, and the user exclusive data is extracted from the token authentication cryptogram during validation. | 2017-12-28 |
20170373853 | MANAGING USER PROFILES SECURELY IN A USER ENVIRONMENT - User profiles of applications installed in a user environment, which may be compromised by malware, are managed to protect against such malware gaining access to sensitive data that may be contained in the user profiles. The method includes the steps of detecting, by a management agent of a user environment, a launch of an application within the user environment, verifying, by a filter driver, an identity of the application against a stored profile of the application, and responsive to determining that the identity of the application matches the stored profile of the application, importing, by the management agent, an encrypted user profile from a remote storage to local storage, decrypting, by the filter driver, the encrypted user profile, and providing the decrypted user profile to the application. | 2017-12-28 |
20170373854 | METHODS AND APPARATUS TO AUTHENTICATE AND DIFFERENTIATE VIRTUALLY IDENTICAL RESOURCES USING SESSION CHAINING - Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining are disclosed. In response to a session request from at least one of a management device or a resource, example methods and apparatus locate a session chain stack associated with an identifier of the at least one of the management device or the resource, and determine whether a first nonce at a top of the session chain stack associated with the identifier of the at least one of the management device or the resource is equal to a second nonce associated with the session request from the at least one of the management device or the resource. Upon determining that the nonce at the top of the session chain stack associated with the identifier of the at least one of the management device or the resource is equal to the second nonce, example methods and apparatus initiate a session between the management device and the resource, and re-negotiate the second nonce between the management device and the resource to generate a third nonce. | 2017-12-28 |
20170373855 | METHOD AND DEVICE FOR SCANNING FOR DATA PROCESSING DEVICES - There is provided a method of scanning for a remote device, the method comprising: generating, at a data processing device, a search input; transforming, at the data processing device, the search input to provide a transformed output, wherein the transformed output is representative of the search input; transmitting, a communication comprising the transformed output from the data processing device to the remote device; receiving, at the data processing a device, a communication from the remote device based on the transformed output. | 2017-12-28 |
20170373856 | PREFIX FINGERPRINT - A system and method for prefix fingerprints for a first file or a first data object. A prefix fingerprint comprises a plurality of hash values. The hash values of the prefix fingerprints are typically generated starting at the same offset within the file or data object, but are generated based on different data sizes. Later, a second file or second data object can be compared with the first file or first data object to determine if the second file or data object is a prefix of the first file or data object. A hash value is selected from the previously determined prefix fingerprint of the first file based on the size of the second file. A hash is generated for the second file using the same offset value and size as was used to generate the selected hash value from the prefix fingerprint. The hash values are then compared. | 2017-12-28 |
20170373857 | METADATA TRANSCODING - The present document relates to transcoding of metadata, and in particular to a method and system for transcoding metadata with reduced computational complexity. A transcoder configured to transcode an inbound bitstream comprising an inbound content frame and an associated inbound metadata frame into an outbound bitstream comprising an outbound content frame and an associated outbound metadata frame is described. The inbound content frame is indicative of a signal encoded according to a first codec system and the outbound content frame is indicative of the signal encoded according to a second codec system. The transcoder is configured to identify an inbound block of metadata from the inbound metadata frame, the inbound block of metadata associated with an inbound descriptor indicative of one or more properties of metadata comprised within the inbound block of metadata, and to generate the outbound metadata frame from the inbound metadata frame based on the inbound descriptor. | 2017-12-28 |
20170373858 | CRYPTOGRAPHIC PRIMITIVE FOR USER AUTHENTICATION - A method of biometric authentication includes receiving a biometric input from a user for authentication of the user to access a system. The method includes receiving a set of elements of a field and a random number from an authentication server via a network. The method further includes decoding the biometric input based on the set of elements to generate a polynomial. The method also includes generating a signature key based on the polynomial. The method includes signing the random number with the signature key. The method includes sending the signed random number to the authentication server. The method further includes restricting access to the system until the user is authenticated by the authentication server. The method also includes permitting access to the system in response to receiving an authentication message from the authentication server. | 2017-12-28 |
20170373859 | Cryptographic Signature System and Related Systems and Methods - The disclosed devices, systems, and methods relate to a validation system which can be used to authenticate photos and videos. The system can have various steps including; a user taking a photo or video, sensor data being collected by a processing system, the sensor data being hashed to create a cryptographic signature, and the cryptographic signature being stored. The cryptographic signature can be later compared with the correspond photo or video for purposes of authentication. | 2017-12-28 |
20170373860 | ROUTING CLOUD MESSAGES USING DIGITAL CERTIFICATES - Provided are a system and method for routing messages in a multi-tenant cloud computing environment based on digital certificates. In one example, a server includes a network interface configured to receive a request and a digital certificate from a network object, where the digital certificate includes a plurality of attributes. The server also includes a processor configured to determine whether the digital certificate is valid, and in response to determining the digital certificate is valid, detect tenant information from an attribute among the plurality of attributes included in the digital certificate. For example, the detected tenant information may identify a tenant of the multi-tenant cloud computing environment. The network interface may be further configured to transmit the request to the multi-tenant cloud computing environment based on the detected tenant information. | 2017-12-28 |
20170373861 | SHARED KEYS BASED ON MULTIPLE FEATURES - A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input; generating a secret key and a plurality of shared keys according to a shared secret scheme; associating each of the plurality of shared keys with a respective feature of the registration input; generating a plurality of additional features associated with additional keys having a similar format as a shared key associated with a respective feature; storing the plurality of shared keys associated with respective features together with the plurality of additional keys associated with additional features; and encrypting an element to be protected by the secret key using the secret key. | 2017-12-28 |