03rd week of 2022 patent applcation highlights part 63 |
Patent application number | Title | Published |
20220021491 | RELAY DESIGN FOR SIDELINK COMMUNICATIONS USING NETWORK CODING - Methods, systems, and devices for wireless communications are described in which sidelink communications between devices may be retransmitted using one or more nodes. A first user equipment (UE) may transmit a broadcast, multicast, or groupcast communication to a set of other UEs using sidelink resources. A node may monitor the communications and store the first UE transmission. UEs of the set of other UEs may transmit feedback reports to the node that indicate one or more missing packets of the first UE transmission. The node may retransmit one or more of the stored packets to the set of other UEs based on the feedback reports. In some cases, the sidelink communications may be encoded using a network coding algorithm, and the node may retransmit network coded packets based on the feedback reports, may transmit newly encoded packets based on the feedback reports, or combinations thereof. | 2022-01-20 |
20220021492 | SYSTEMS AND METHODS FOR ESTIMATING BIT ERROR RATE OF A SIGNAL - Methods and systems for generating an estimate of a bit error rate of a signal are provided. Methods and systems include obtaining an eye mask for a receiver, receiving a signal with the receiver, generating an eye mask probability density function of the eye mask, generating an eye diagram probability density function based on the signal, calculating a product of the eye mask probability density function and the eye diagram probability density function, summing the product of the eye mask probability density function and the eye diagram probability density function, and estimating the bit error rate of the signal based on the summing of the product of the eye mask probability density function and the eye diagram probability density function. | 2022-01-20 |
20220021493 | UPLINK COMPOSITE BEAM SYNTHESIS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit sounding reference signals (SRSs) on a plurality of beams to a base station using a set of SRS resources indicated by the base station. The UE may receive, from the base station, an SRS resource indicator indicating one or more SRS resources of the set of SRS resources and determine a combined transmit beam from the plurality of beams based at least in part on the SRS resource indicator. Numerous other aspects are provided. | 2022-01-20 |
20220021494 | GENERATION OF AN OFDM-BASED SINGLE CARRIER WAKE-UP SIGNAL - Orthogonal Frequency Division Multiplex and Non-Coherent Demodulation A method includes obtaining a reference signal waveform which is defined in accordance with a non-coherent modulation scheme. The method also includes shaping the reference signal waveform to obtain at least one signal waveform associated with one or more subcarriers of a plurality of subcarriers. The method also includes inputting the at least one signal waveform to at least one corresponding channel of a multi-channel orthogonal frequency division multiplex, OFDM, modulator. The method further includes transmitting an OFDM symbol output by the OFDM modulator. Said shaping approximates a baseband representation of a part of the OFDM symbol associated with the one or more subcarriers to the reference signal waveform. For example, the reference signal waveform can be a reference wake-up signal waveform. | 2022-01-20 |
20220021495 | METHOD AND APPARATUS FOR DETERMINING QUASI-CO-LOCATION REFERENCE SIGNAL - Provided are a method and apparatus for determining a quasi-co-location reference signal. The method includes: determining a first transmission configuration indication list corresponding to a first control channel element, determining, in the first transmission configuration indication list, index information of transmission configuration indication activated for the first control channel element, and determining a quasi-co-location reference signal activated for the first control channel element according to the index information and the first transmission configuration indication list. | 2022-01-20 |
20220021496 | CSI-RS Resource Reuse - Embodiments of a method in a wireless access node are disclosed. A method in an access node of a wireless network, the method comprises: transmitting a first Non-Zero Power (NZP) Channel State Information Reference Signal (CSI-RS) in a first set of resource elements of a subframe, the first NZP CSI-RS having a respective first number of ports; transmitting at least one second NZP CSI-RS in a second set of resource elements of the subframe, the second set of resource elements being a subset of the first set of resource elements, each second NZP CSI-RS having a respective second number of ports that is less than the first number of ports; and configuring at least one user equipment (UE) to perform rate matching using one or more Zero Power (ZP) CSI-RSs in a third set of resource elements of the subframe, the third set of resource elements overlapping the first set of resource elements and not overlapping the second set of resource elements. | 2022-01-20 |
20220021497 | PHASE TRACKING REFERENCE SIGNAL DESIGN FOR SINGLE-CARRIER WAVEFORM WITH MULTIPLE DATA LAYERS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit, to a base station, information indicating at least one of a power amplifier sharing configuration or a phase noise sharing configuration for a plurality of layers of a single-carrier communication. The UE may receive, from the base station, a phase tracking reference signal (PTRS) configuration for the plurality of layers based at least in part on at least one of the power amplifier sharing configuration or the phase noise sharing configuration. The UE may perform the single-carrier communication in accordance with the PTRS configuration. | 2022-01-20 |
20220021498 | MEDIA ACCESS CONTROL (MAC) CONTROL ELEMENT (CE) SPATIAL RELATION INFORMATION UPDATE FOR SOUNDING REFERENCE SIGNAL (SRS) - The present disclosure relates to media access control (MAC) control element (CE) spatial relation information update for sounding reference signal (SRS). Specifically, a user equipment (UE) may receive a MAC CE from a network entity indicating a synchronization signal block (SSB) set and a SSB index within the SSB set as a reference signal (RS) for configuring spatial relation information of a SRS resource, wherein the UE is configured with a plurality of SSB sets corresponding to a plurality of physical cell identifications (PCIs) in a serving cell; and updating spatial relation information for one or more SRS resources within a SRS resource set based on the MAC CE. | 2022-01-20 |
20220021499 | MULTIPLE TRANSMISSION SCHEMES IN WIRELESS COMMUNICATION - Methods, systems, and devices for multiple transmission schemes in wireless communication are described. In one aspect, a wireless communication method is disclosed to include: transmitting, by a first communication device, at least one of i) a repetition mode of data transmissions to be sent to a second communication device, ii) a mapping between N indicated beams and all scheduled transmissions of the data, or iii) a RV (Redundant Version) relationship among the all scheduled transmissions of the data, wherein the transmitting is based on at least one of the N indicated beam(s), a DMRS (Demodulation Reference Signals) port indication, or K time domain occasions, N and K being non-negative integers. | 2022-01-20 |
20220021500 | USER TERMINAL AND RADIO COMMUNICATION METHOD - A user terminal includes: a receiving section that receives a synchronization signal block at a first frequency to which sensing of a channel before transmission is applied; and a control section that uses at least one of a downlink shared channel and a downlink control channel to receive system information at the first frequency, the downlink shared channel being mapped on at least one of a plurality of non-contiguous symbols and a specific band wider than a band of a control resource set 0 at a second frequency to which the sensing of the channel before the transmission is not applied, and the downlink control channel being mapped on a symbol of the synchronization signal block. According to one aspect of the present disclosure, it is possible to perform appropriate communication in an unlicensed band. | 2022-01-20 |
20220021501 | SCHEDULING FOR POSITIONING REFERENCE SIGNAL (PRS) IN NARROWBAND-INTERNET OF THINGS (NB-IOT) - Wireless communications systems and methods related to communicating positioning reference signals (PRSs) for narrowband communication are provided. A first wireless communication device determines a time-frequency PRS pattern based at least in part on a narrowband communication frequency band configuration and a PRS subframe configuration mode associated with a set of subframes. The first wireless communication device communicates, with a second wireless communication device, a plurality of PRSs using the determined PRS time-frequency pattern in the set of subframes. The PRS subframe configuration mode can indicate a first configuration including a bitmap indicating a set of PRS subframes positioned within a group of contiguous subframes, a second configuration indicating a subset of the group of contiguous subframes that may carry the PRSs, or a combination thereof. The first configuration and/or the second configuration can be used to indicate the set of subframes. | 2022-01-20 |
20220021502 | TRANSPORT BLOCK DEFINITIONS FOR DIFFERENTIAL DATA-AIDED DEMODULATION REFERENCE SIGNALS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit an indication that the UE supports communications having a first transport block applied to demodulation reference signals (DMRSs) and a second transport block applied to data symbols of a data channel. The UE may transmit an uplink communication or receiving a downlink communication having the first transport block applied to the DMRSs and the second transport block applied to the data symbols of the data channel. Numerous other aspects are provided. | 2022-01-20 |
20220021503 | Acknowlegment for Simultaneous Transmission and Reception - Methods are disclosed for communication devices capable of simultaneous transmission and reception, wherein a first method is for reception of a packet comprising a header and a payload and a second method is for transmission of a packet comprising a header and a payload. The second method comprises transmitting at least a part of the header. The first method comprises receiving at least a part of the header, attempting to decode the part of the header, and (when the part of the header is successfully decoded) transmitting a header acknowledgement signal. The second method comprises monitoring receipt of a header acknowledgement signal, and (when absence of the header acknowledgement signal is detected) interrupting the transmission of the packet and scheduling the packet for retransmission. Corresponding apparatuses, transceivers, communication devices and computer program products are also disclosed. | 2022-01-20 |
20220021504 | WIRELESS COMMUNICATIONS METHOD AND COMMUNICATIONS DEVICE - Provided in the implementations of the present disclosure are a wireless communication method and communication device. The method comprises: determining a second time unit according to a time domain position of at least one first time unit in a plurality of first time units used for transmitting data; and transmitting feedback information by using the second time unit, wherein the feedback information is feedback information aiming at the data transmitted on the plurality of first time units. | 2022-01-20 |
20220021505 | FEEDBACK INFORMATION DETERMINING METHOD AND COMMUNICATION APPARATUS - This application provides a feedback information determining method and a communication apparatus. The method includes: A terminal device determines N first time domain resources in a first time unit based on a periodicity of a physical downlink shared channel (PDSCH), where the N first time domain resources are used to receive the PDSCH, and N is a positive integer. The terminal device determines, based on the N first time domain resources, a hybrid automatic repeat request acknowledgement (HARQ_ACK) codebook corresponding to the first time unit, where the HARQ-ACK codebook includes feedback information corresponding to the N first time domain resources. | 2022-01-20 |
20220021506 | METHOD FOR DETERMINING CONTENTION WINDOW SIZE (CWS), AND RELATED PRODUCT - A method for determining a contention window size (CWS) is applied to a network device and includes determining hybrid automatic repeat request-acknowledgement (HARQ-ACK) information corresponding to a physical downlink shared channel (PDSCH) transmitted on a reference time unit on a first unlicensed carrier; and determining a first CWS according to the HARQ-ACK information, wherein the first CWS is used for performing channel detection on the first unlicensed carrier. | 2022-01-20 |
20220021507 | CROSS LINK INTERFERENCE REFERENCE SIGNAL CONFIGURATION - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a base station (BS) may receive a first downlink determining, based at least in part on an uplink transmission schedule for a user equipment (UE), one or more communications that are to be transmitted as a cross link interference reference signal (CLI-RS) during a time window. The BS may transmit, to the UE, an instruction to transmit the one or more communications as the CLI-RS during the time window. Numerous other aspects are provided. | 2022-01-20 |
20220021508 | LICENSED ASSISTED SIDELINK ACCESS USING AN INDICATION OF MULTIPLE DATA CHANNELS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first user equipment (UE) may transmit, to a second UE via a sidelink sub-channel of a licensed carrier, an indication of multiple data channels of an unlicensed carrier to be used to attempt one or more sidelink communications between the first UE and the second UE. The UE may attempt the one or more sidelink communications between the first UE and the second UE using the multiple data channels. Numerous other aspects are provided. | 2022-01-20 |
20220021509 | COMMUNICATION METHOD AND COMMUNICATIONS DEVICE - This application relates to a communication method and a communications device. The communication method includes: determining, a first signal to be sent on a first uplink carrier; determining a second signal to be sent on a second uplink carrier, where the first uplink carrier corresponds to a first radio access technology, and the second uplink carrier corresponds to a second radio access technology; and when a first transmission timing corresponding to the first signal is different from a second transmission timing corresponding to the second signal, and if the first signal and the second signal overlap in time domain, sending, a third signal, where the third signal is the second signal, or is the second signal or a part of the first signal, where the part of the first signal is carried on a symbol that does not overlap with a symbol corresponding the second signal. | 2022-01-20 |
20220021510 | RADIO FREQUENCY MODULE AND COMMUNICATION APPARATUS - A radio frequency (RF) module including a module substrate; a filter with a passband including communication band for TDD; a switch connected to the filter; a power amplifier that is arranged on a first surface of the module substrate and connected to the filter via the switch; a low-noise amplifier that is arranged on a second surface of the module substrate and connected to the filter via the switch; a filter with a passband including communication band; a low-noise amplifier that is arranged on the second surface and connected to the filter; and a conductive member arranged between the low-noise amplifiers on the second surface. | 2022-01-20 |
20220021511 | COMMUNICATION SYSTEMS, APPARATUSES AND METHODS - A communication system including a master apparatus and a slave apparatus, the slave apparatus, in an upstream period, transmits a slave data signal to the master apparatus based on a slave clock signal; and the master apparatus: during reception of the slave data signal, extracts timing information from the slave data signal and adjusts a phase and/or frequency of a master clock signal or a definition thereof relative to a reference phase and/or frequency based on the extracted timing information to enable decoding of the received slave data signal; in a downstream period, transmits a master data signal to the slave apparatus based on the master clock signal according to the adjustment; and adjusts the phase and/or frequency of the master clock signal during transmission of the master data signal to reduce a change in the phase and/or frequency of the master clock signal effected according to the adjustment. | 2022-01-20 |
20220021512 | Extended Sync Network - An apparatus is provided for converting the form in which a synchronisation request for a barrier synchronisation is provided. The synchronisation request is provided from a first synchronisation circuitry to a second synchronisation circuitry by asserting one of a set of separate signals that may each correspond to a bit in a register or a signal on a wire. The second synchronisation circuitry provides for the packetisation of the sync request by sending a packet comprising the sync request over a network to be received at a further subsystem. | 2022-01-20 |
20220021513 | DELAY JITTER COMPENSATION METHOD AND DEVICE, AND COMPUTER STORAGE MEDIUM - The present disclosure discloses a delay jitter compensation method and device, and a computer storage medium. The method includes: determining, by a time stamp compensation component, a current delay jitter of a data link layer according to the latest recorded data cumulant and a fixed value of data cumulant, the fixed value of data cumulant indicating a value of data cumulant without any delay jitter in the data link layer; and acquiring, by the time stamp compensation component, an initial time stamp recorded in a protocol layer, and compensating the initial time stamp according to the current delay jitter of the data link layer to obtain a compensated time stamp, the compensated time stamp being a time stamp obtained by compensating the initial time stamp. | 2022-01-20 |
20220021514 | LOW-COMPLEXITY SYNCHRONIZATION HEADER DETECTION - A technique of separating a sequence of modulation shift keying (MSK) symbols into a first portion and a second portion and separately comparing the first portion of the sequence of MSK symbols and the second portion of the sequence of MSK symbols against a first portion of a reference sequence of MSK symbols and a second portion of the reference sequence of MSK symbols allows a low complexity detection of a start field delimiter in a wireless communication packet. | 2022-01-20 |
20220021515 | STORAGE CONTROLLER, SYSTEM INCLUDING THE SAME, AND METHOD OF OPERATING THE SAME - A client system includes a client-side host device, and a client-side storage device including a storage controller and a storage memory. The storage controller includes a host interface, a processor configured to control a read operation and a write operation for the storage memory, and a homomorphic encryption and decryption accelerator configured to, based on receiving a read request from the client-side host device, perform homomorphic encryption on first plaintext data that is read from the storage memory, to generate first homomorphic ciphertext data, and provide the first homomorphic ciphertext data to the client-side host device through the host interface, and based on receiving a write request from the client-side host device, perform homomorphic decryption on second homomorphic ciphertext data that is received through the host interface, to generate second plaintext data, and write the second plaintext data in the storage memory. | 2022-01-20 |
20220021516 | System and Method for Securing a Database by Scrambling Data - A system is configured for managing security of a database associated with an organization. A fingerprint of an authorized user is captured. The data is scrambled using a scrambling technique. A list of users authorized to access the data is received from the user. A descrambler key corresponding to the scrambling technique is generated. The descrambler key is associated with fingerprints and predetermined location coordinates of authorized users. The descrambler key is configured to descramble the data when authorized users attempt to access the data using their fingerprints at their corresponding location coordinates. The scrambled data is encrypted. The system determines whether a particular user attempting to access the data is authorized to access the data by validating a fingerprint and location coordinates of the particular user. If the particular user is authenticated, the descrambler key descrambles the data. The particular user is allowed to access the data. | 2022-01-20 |
20220021517 | BLOCK CIPHER ENCRYPTION FOR PROCESSOR-ACCELERATOR MEMORY MAPPED INPUT/OUTPUT COMMUNICATION - Technologies for secure data transfer of MMIO data between a processor and an accelerator. A MIMO security engine includes a first block cipher pipeline to encrypt a count using a key; a first exclusive-OR (XOR) to generate a first XOR result of the encrypted count and a length multiplied by an authentication key; a second block cipher pipeline to encrypt (count+1) using the key; a second XOR to generate a second XOR result of plaintext data and the encrypted (count+1); a plurality of Galois field multipliers (GFMs) to perform Galois field multiplication on additional authenticated data (AAD), powers of the authentication key, and ciphertext data; and a plurality of exclusive-ORs (XORs) to combine results of the GFMs and the first XOR result to generate an authentication tag. Other embodiments are described and claimed. | 2022-01-20 |
20220021518 | DATA BLOCK MODIFICATION - A method of modifying a data block of a data structure comprising a plurality of linked data blocks comprising: receiving a selection of said data block comprising block data; creating modified block data; transmitting a request to a plurality of validator devices over a network, said request comprising a modification record and requesting permission to modify said data block in accordance with the modified block data; determining that consensus is reached by the plurality of validator devices that said data block can be modified in accordance with the modified block data; in response to said determining: modifying said data block in accordance with the modified block data; and adding a modification data block to the data structure, the modification data block comprising: the modification record and a cryptographic hash of a data block that precedes the modification data block after addition of the modification data block to the data structure. | 2022-01-20 |
20220021519 | DEVICE UPDATE TRANSMISSION USING A FILTER STRUCTURE - A server including a processor and a non-transitory computer readable medium is provided. The medium includes computer-executable instructions cause the processor to perform operations including obtaining a filter data structure comprising a plurality of hash values, each hash value corresponding to a computer device of a plurality of computer devices in an update campaign, determining that a requesting computerized device is in the update campaign, in response to determining, sending a request to confirm that the computerized device is a member of the campaign, in response to confirming that the computerized device is a member of the campaign, providing the device update to the computerized device, and in response to determining that the computerized device does not belong to the campaign, providing an indication that there is no device update for the computerized device. | 2022-01-20 |
20220021520 | METHOD AND APPARATUS FOR ESTABLISHING TRUSTED CHANNEL BETWEEN USER AND TRUSTED COMPUTING CLUSTER - Some embodiments of the present specification provide a method and an apparatus for establishing a trusted channel between a user and a trusted computing cluster. According to the method, when a user wants to establish a trusted channel with a trusted computing cluster, the user only negotiates a session key with any first trusted computing unit in the cluster to establish the trusted channel. Then, the first trusted computing unit encrypts the session key using a cluster key common to the trusted computing cluster to which the first trusted computing unit belongs, and sends the encrypted session key to a cluster manager. The cluster manager transmits the encrypted session key in the trusted computing cluster, so that other trusted computing units in the cluster obtain the session key and join the trusted channel. Thus, the user establishes a trusted channel with the entire trusted computing cluster. | 2022-01-20 |
20220021521 | SECURE CONSENSUS OVER A LIMITED CONNECTION - A method of validating a multi-party consensus over a limited connection comprising a validating device configured to transmit a query having a finite number of possible valid answers to a plurality of computing nodes via a unidirectional secure communication channel, receive a limited length string computed based on an aggregated response aggregating a plurality of responses each computed for a multi-party consensus answer to the query by each of at least some of the plurality of computing nodes using a respective secret component, compute a plurality of locally computed strings each computed based on a respective one of the finite number of possible valid answers using an aggregated secret aggregating the plurality of secret components, validate the multi-party consensus answer by comparing the received limited length string to each of the plurality of locally computed strings and initiating one or more operations according to an outcome of the validation. | 2022-01-20 |
20220021522 | STORAGE MEDIUM, RELAY DEVICE, AND COMMUNICATION METHOD - A non-transitory computer-readable storage medium storing a program that causes a computer to execute a process, the process includes receiving a certification of a first communication device from a second communication device which issues the certification to the first communication device; receiving, from the second communication device, policy information which indicates whether the certificate is permitted to be sent; when the first communication device requests that the certificate be sent to the third communication device, determining whether the certificate is permitted to be sent to the third communication device, the third communication device requesting the first communication device to send the certificate; when determining that the certificate is permitted to be sent to the third communication device, sending, to the third communication device, the certificate. | 2022-01-20 |
20220021523 | Cloud Container Security Framework - A containerized application is initialized in a cloud-based computing environment. Thereafter, the containerized application obtains environment variables encapsulating credentials. The containerized application stores the environment variables in a secret store of the containerized application. The environment variables are later wiped upon completion of the storing of the environment variables. Related apparatus, systems, techniques and articles are also described. | 2022-01-20 |
20220021524 | SECURING DATA USING KEY AGREEMENT - Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices. | 2022-01-20 |
20220021525 | SECURING DATA USING KEY AGREEMENT - Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices. | 2022-01-20 |
20220021526 | CERTIFICATELESS PUBLIC KEY ENCRYPTION USING PAIRINGS - A transmitter device for sending an encrypted message to a receiver device in an identity-based cryptosystem, the transmitter device being associated with a transmitter identifier. The transmitter device is configured to receive a transmitter partial private key from a trusted center, the transmitter device being configured to: send a request for two public session keys to the receiver device; receive from the receiver device a first ciphertext set, the first ciphertext set being derived from an encryption and authentication of two public session keys; decrypt and authenticate the two public session keys from the first ciphertext set using a receiver identifier and the transmitter partial private key; determine a second ciphertext set from the transmitter partial private key, from the receiver identifier, and from the two public session keys, the second ciphertext comprising an encrypted message; send the second ciphertext set to the receiver device. | 2022-01-20 |
20220021527 | SECURE DATA DISTRIBUTION PROTOCOL USING BLOCKCHAINS - One or more systems and methods are presented for secure data communications utilizing blockchains. One or more systems and methods may utilize multiple blockchains to provide an immutable cryptographically linked set of blocks. Each of these blocks may contain one or more actions associated with a computer network. In one embodiment, a trusted third party may be utilized to authenticate and/or verify data prior to inputting data into one or more blockchains. | 2022-01-20 |
20220021528 | SECURE STORAGE TECHNIQUES UTILIZING CONSORTIUM DISTRIBUTED LEDGERS - Techniques are disclosed for securely managing data. In one example, a service provider receives user image data and user biometric data associated with a user. The service provider generates a user profile cryptographic key based on hashing this data, which may be associated with a user identifier. The service provider may further generate a public/private key pair associated with the user identifier. The public key and the user profile cryptographic key are stored, in association with the user identifier, to a consortium blockchain network. The service provider then receives a request, signed with the private key, to store a document in association with the user identifier. The service provider generates a document cryptographic key of the document, and executes a request to store the document cryptographic key to the blockchain in association with the user profile cryptographic key, the request verified using the public key. | 2022-01-20 |
20220021529 | KEY PROTECTION PROCESSING METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM - This application discloses a key protection processing method, apparatus, device and storage medium, which relates to data security and data transmission. A specific implementation scheme is: generating a first public key according to a first private key, where the first public key and a second private key are used to generate a first encryption key; sending the first public key to a second electronic device; receiving a second public key from the second electronic device, where the second public key is generated according to the second private key; generating a second encryption key according to the second public key and the first private key, where the first encryption key and the second encryption key are used to process an original key used in data interaction. | 2022-01-20 |
20220021530 | CRYPTOGRAPHIC KEY GENERATION USING KUMMER VARIETIES - An authenticated, ID-based private/public key pair, with a self-certified public key, is generated using Kummer arithmetic without bilinear pairings. Two or more parties can generate such key pairs and use them as their respective long-term key pairs which, when combined with the parties' short-term key pairs, can allow the parties to establish an authenticated, short-term shared key. Some embodiments are suitable for connected vehicles communicating with each other and/or with other systems. Other features are also provided. | 2022-01-20 |
20220021531 | TAMPER-PROOF DATA PROCESSING DEVICE - A data processing device having a housing in which are arranged a processor, a program memory connected to the processor and at least one hardware component connected to the processor via a data line and supplied with power via a power supply line, comprises a microcontroller arranged in the housing and having an interface and a persistent key memory in which the public key of a first public/private key pair is stored, wherein a switch controlled by the microcontroller is interposed in the data line, and wherein the microcontroller is configured to receive a signature, generated using the private key of the first key pair, of a memory module detachably connected to the interface via the interface, to verify the signature using the public key of the first key pair, and to switch on the switch in the case of verification. | 2022-01-20 |
20220021532 | Tracking Tainted Connection Agents - Methods and systems for tracking tainted connection agents, such as without a trusted central authority, are described herein. During a server outage, a client device may verify that a connection agent is untainted based on a public-key encryption or certificate-based system. If the connection agent is untainted, a server may sign a public key or certificate associated with the connection agent. The server may provide, to the client device, a lease, a public key associated with the server. The connection agent may sign data generated by the client device. The client device may verify a signature of the signed public key, such as based on the public key associated with the server. The client device may verify a signature of the signed data, such as based on the verified public key associated with the connection agent. | 2022-01-20 |
20220021533 | PROVING PRIME INTEGERS FOR ENCRYPTION - A device may receive a set of cryptographic parameters associated with an integer, wherein the set of cryptographic parameters includes a linked list of potential prime integers, in an order, used to generate the integer. The device may determine, iteratively and in the order, whether each potential prime integer included in the linked list of potential prime integers is a prime integer using a primality test or a lookup operation based on a set of proven prime integers. The device may determine whether the integer is a proven prime integer based on determining whether each potential prime integer included in the linked list of potential prime integers is a prime integer. The device may authorize, when the integer is a proven prime integer, the integer for use in a cryptographic protocol. | 2022-01-20 |
20220021534 | LOCATION AWARE CRYPTOGRAPHY - A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity. | 2022-01-20 |
20220021535 | IDENTITY-BASED ENCRYPTION METHOD BASED ON LATTICES - A calculation device is disclosed. The calculation device includes: a memory storing at least one instruction and identity information; and a processor performing the at least one instruction, wherein the processor may randomly sample small elements, generate a function-processed output value by function-processing the stored identity information, and generate an encrypted text for a message by using a master public key computed using a ring having a dimension (d) represented by a power of 2 and an integer multiplication of 3 or more, the sampled small elements and the function-processed output value. | 2022-01-20 |
20220021536 | COMPUTING SYSTEM WITH DECENTRALIZED AUTHENTICATION AND AUTHORIZATION - A computing system can have a data storage device connected to a host as part of a distributed computing system with an initial reputation score assigned to the data storage device with a decentralize module. The data storage device is positioned in a hierarchical device organization based on the reputation score with the hierarchical device organization maintained by the decentralize module. A decentralized secret sharing scheme generated by the decentralize module can authenticate the host with multiple different secrets sourced from different components logically positioned in different levels of the hierarchical device organization. | 2022-01-20 |
20220021537 | PRIVACY-PRESERVING IDENTITY ATTRIBUTE VERIFICATION USING POLICY TOKENS - Methods and systems for privacy-preserving identity attribute verification are presented. During an interaction between a relying entity and a user, a relying entity computer can transmit a policy token to a user device. The policy token may indicate the information needed by the relying entity in order to perform the interaction. The user device can verify the policy token, then use the policy token in conjunction with an identity token to generate a zero-knowledge proof. The user device may transmit the zero-knowledge proof to an identity service provider computer. The identity service provider computer may verify the zero-knowledge proof, then generate a verification message. The identity service provider computer may sign the verification message and transmit the signed verification message to the relying entity computer. The relying entity computer may verify the verification message and complete the interaction with the user. | 2022-01-20 |
20220021538 | BLOCKCHAIN TOKEN-BASED CLOUD ORCHESTRATION ARCHITECTURE FOR DISCRETE VIRTUAL NETWORK INSTANCES - A blockchain-enabled service-based cloud native function (CNF) application architecture including a physical cloud infrastructure that includes computing resources, an application service mesh network including CNF that communicate with each other, and a blockchain-supported network slice orchestration of one or more network slices managed by a slice coin orchestrator, each network slice being an instantiated logical network, is defined by a smart contract deployed on a blockchain network. The slice coin orchestrator transacts smart contracts transferring tokens that are configured to be exchangeable for instantiation of a network slice, defined as slice coins, with each slice coin of the plurality of slice coins being configured to regulate at least one of access to and use by the one or more network slices to at least one of the computing resources and the CNF applications of the application service mesh network. | 2022-01-20 |
20220021539 | SYSTEM AND METHOD FOR IMPLEMENTING A TWO-SIDED TOKEN FOR OPEN AUTHENTICATION - A system and method for implementing a two-side token for OAUTH are described. A first request for access by a partner app server to user account information owned by a host server is received at a host auth server. Upon receiving authorization to share the user account information, a response is returned to the partner app sever. The response includes an access token. In response to returning the response to the partner app server, an event is written to an event queue. The event provides an indication that the request for access was received and that the corresponding response with the access token was returned. The event, when read by a host app server, instructs the host app server to submit a second request to a partner auth server for a reciprocal access token. | 2022-01-20 |
20220021540 | KEY PROTECTION FOR COMPUTING PLATFORM - A security accelerator device stores a first credential that is uniquely associated with the individual security accelerator device and represents a root of trust to a trusted entity. The device establishes a cryptographic trust relationship with a client entity that is based on the root of trust, the cryptographic trust relationship being represented by a second credential. The device receives and store a secret credential of the client entity, which is received via communication secured by the second credential. Further, the device executes a cryptographic computation using the secret client credential on behalf of the client entity to produce a computation result. | 2022-01-20 |
20220021541 | AN ONLINE AND OFFLINE CIRCULATING UNBALANCED OIL AND VINEGAR SIGNATURE METHOD - The present invention discloses an online and offline circulating unbalanced oil and vinegar signature method, which decomposes the traditional unbalanced oil and vinegar signature process into offline and online parts, wherein the offline step is independent of the signature message, and can be performed in advance, and a combination of circulating calculation methods is used in the calculating process to improve performance. When the online part needs to be signed, the final signature operation is completed by using the calculated result stored in the offline step. The present invention is a multi-variable public key cryptosystem-based unbalanced oil and vinegar signature scheme, which is a lightweight digital signature scheme suitable for low-performance electronic devices. The invention decomposes the unbalanced oil and vinegar signature algorithm into offline and online parts, and the offline step calculation can be performed in advance, which can more fully utilize energy and accelerate the online signature process simultaneously. In the calculation of the offline step, the present invention uses a circulating calculation method, which greatly reduces the size of the secret key and shortens the signature period. | 2022-01-20 |
20220021542 | LOW LATENCY IMMUTABLE DATA INTEGRITY - Devices, systems, and methods for secure communication. A method includes generating, at least partially by a first device, an asymmetric key pair including a private signing key and a corresponding public verification key. Before providing the public verification key or a value used to generate the public verification key to a second device, the method includes requesting and receiving a keyless signature from a keyless signature infrastructure (KSI) for the public verification key or a value used to generate the public verification key. The method further includes providing the KSI signature and (a) the public verification key or (b) the value used to generate the public verification key to the second device, and communicating a first message to the second device, the first message signed using the private signing key. | 2022-01-20 |
20220021543 | OBJECT SIGNING WITHIN A CLOUD-BASED ARCHITECTURE - A system and method for digitally signing an object. An object signing agent sends a signing request for an object to a remote signing server, which, in response to receiving the request, generates a virtual machine executing code for signing the object. The object is signed within the virtual machine and returned to the object signing agent. | 2022-01-20 |
20220021544 | Secure Serial Peripheral Interface (SPI) Flash - A secure memory device is disclosed. In one embodiment, the memory device includes a controller configured to decode and execute commands issued by a host device; a cryptographic engine, the cryptographic engine configured to authenticate a subset of the commands, the subset of the commands each including a digital signature; and a first monotonic counter, the first monotonic counter being incremented after executing at least some of the subset of the commands, wherein a value of the first monotonic counter is used to generate the digital signature. | 2022-01-20 |
20220021545 | NOVEL METHOD OF SECURING LEGACY ANALOG SENSOR CIRCUITS USED IN PHYSICAL SECURITY, PREMISE ACCESS CONTROL AND INDUSTRIAL SCADA APPLICATIONS - Embodiments are directed to an apparatus, comprising: a microcontroller configured as a Universal Field Panel. The microcontroller provides channels that (i) couple to a digital encrypted security interface (DESI) via a digital communications interface and/or couple to a sensor comprising an analog signal, and wherein the analog sensor comprises one or more resistors coupled with one or more switches to monitor Boolean status from sensors (ii) wherein the digital encrypted security interface (DESI) couples to a sensor input and/or couples to a control output where signals to command a relay are authenticated prior to execution, (iii) authenticate and encrypt the sensor or control output. The control output is a programmable relay or solid-state device that features a Form-C control interface for providing authentication from command-and-control platforms to the devices and/or signals they are controlling. | 2022-01-20 |
20220021546 | METHOD, SYSTEM AND APPARATUS FOR DELAYED PRODUCTION CODE SIGNING FOR HETEROGENEOUS ARTIFACTS - The disclosed embodiments enable applying production nature to a software signature post-build (or even post-release), where the signature type is determined by the existence of a production-signed intermediate CA certificate—either hosted in the cloud (for pure release immutability), or re-ingested into the package (if certain modification are allowed). This allows a so-called deferred issuance of the product release. Even if the CA certificate is to be reinserted into the package, this modification likely affects only the delivery shell (e.g., installer) and may not require format-specific binary changes of, possibly heterogeneous, artifacts therein. | 2022-01-20 |
20220021547 | DIGITAL METHOD FOR CONTROLLING ACCESS TO AN OBJECT, A RESOURCE OR SERVICE BY A USER - Controlling access to an object or service by a user by a smart lock access control device involves sending by the smart lock to a virtual key a message comprising: the identifier of the smart lock (Lock-ID); a challenge (Ch1) created by the smart lock; the signature by the private key of the smart lock (Klock-priv) of information related to the identifier of the smart lock (Lock-ID) and challenge (Ch1); and the level of interaction required among at least two levels of interaction. The method verifies by the virtual key that the smart lock is known to it by comparison of the smart lock identifier received to that stored by the virtual key, validates by the virtual key of the signature by using the public key of the smart lock (Klock-pub); and, if the validation is positive, selects and implements the level of interaction received by the virtual key; and after validation of the interaction by the virtual key, and send a message by the virtual key to the smart lock comprising: the identifier of the virtual key (Key-ID); and a first opening key depending on the challenge received (Ch1) and the information (Kv1) contained in the virtual key; so that if the smart lock validates the opening key, it gives access to the object or service with the access level associated with the interaction level used. | 2022-01-20 |
20220021548 | BI-DIRECTIONAL POWER OVER ETHERNET FOR DIGITAL BUILDING APPLICATIONS - In one or more embodiments, a system includes a plurality of network devices comprising a plurality of ports, a power bus connecting the network devices, wherein power is shared between the network devices over the power bus, and a controller for identifying available power and allocating power to the ports. The ports include a plurality of PSE (Power Sourcing Equipment) PoE (Power over Ethernet) ports each operable to transmit power to a device connected to one of the PSE PoE ports, a plurality of PD (Powered Device) PoE ports each operable to receive power from a device connected to one of the PD PoE ports, and a plurality of bi-directional PoE ports each configurable to operate as a PSE PoE port to transmit power to a device connected to one of the bi-directional PoE ports or as a PD PoE port to receive power from the connected device. | 2022-01-20 |
20220021549 | NOTIFYING OFF-LINE CHARGING SYSTEMS OF USER EQUIPMENT EVENTS IN PRESENCE REPORTING AREAS - A policy control and resource function (PCRF) is subscribed (at a network entity) to receive notifications of events for a first set of presence reporting areas (PRAs) associated with a packet data network (PDN) connection involving a user equipment. An online charging system (OCS) is subscribed (at the network entity) to receive notifications of events for a second set of PRAs associated with the PDN connection involving the user equipment. The network entity notifies an off-line charging system (OFCS) in response to a first event occurring at one or more first PRAs that are in the first set of PRAs. | 2022-01-20 |
20220021550 | BIT INDEXED EXPLICIT REPLICATION USING MULTIPROTOCOL LABEL SWITCHING - Various systems and methods for performing bit indexed explicit replication (BIER) using multiprotocol label switching (MPLS). For example, one method involves receiving a packet that includes a MPLS label. The packet also includes a multicast forwarding entry. The method also involves determining, based on the value of the MPLS label, whether to use the multicast forwarding entry to forward the packet. The method further includes forwarding the packet. | 2022-01-20 |
20220021551 | CONTEXTUALLY AWARE CONFERENCING SYSTEM - A computer-implemented method for switching the meeting mode of a communication feed during a conference call is disclosed. The computer-implemented method can receive a first feed type from the communication feed during a first meeting mode. The computer-implemented method can detect a plurality of contextual activity from the communication feed of a first party. The computer-implemented method can observe a first mode switch indicator from the plurality of contextual activity. The computer-implemented method can, responsive to observing the first mode switch indicator, switch the conference call from the first meeting mode to a second meeting mode of the communication feed. | 2022-01-20 |
20220021552 | SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE - A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g. by selectively activating/deactivating service logic modules in the gateway. The service management system also may selectively provide secure communications and exchange of information among gateway devices and among associated endpoint devices. An exemplary service management system includes a router connected to the network and one or more computer platforms, for implementing management functions. Examples of the functions include a connection manager for controlling system communications with the gateway devices, an authentication manager for authenticating each gateway device and controlling the connection manager and a subscription manager for managing applications services and/or features offered by the gateway devices. A service manager, controlled by the subscription manager, distributes service specific configuration data to authenticated gateway devices. | 2022-01-20 |
20220021553 | METHOD FOR CONTROLLING THE FUNCTIONING OF AT LEAST ONE SMART HOME APPLIANCE AND NETWORK SYSTEM - A method for controlling the functioning of at least one smart home appliance of a network system comprising a cloud server, a terminal device and at least one smart home appliance registered in said cloud server. The method comprises a phase of creating an activity group comprising: selecting one or more registered smart home appliance; selecting control instructions; associating the selected control instructions to the selected smart home appliances; selecting a trigger event for each one of the selected control instructions; activating said activity group; and the cloud server sending the selected control instructions to the selected smart home appliances according to the trigger event. | 2022-01-20 |
20220021554 | HOME APPLIANCE, TERMINAL DEVICE, AND WIRELESS CONNECTION METHOD THEREOF - A home appliance is disclosed. The disclosed home appliance comprises: a communication device for performing communication using a plurality of communication methods; and a processor for, when wireless identification information of a home appliance is received from an external server via a first communication method, controlling the communication device to operate in an access point (AP) mode in which communication is performed in a second communication method by using the received wireless identification information, wherein the processor is connected to a terminal device via the second communication method, and if wireless configuration information for an access point accessed by the terminal device is received from the terminal device, the processor controls the communication device to access the access point via a third communication method by using the received wireless configuration information. | 2022-01-20 |
20220021555 | DECENTRALISED COMMUNICATION SYSTEM AND CORRESPONDING CONTROL METHOD - Decentralised communication system comprising at least two modules, each module being connected to at least one neighbouring module by a point-to-point connection ( | 2022-01-20 |
20220021556 | VIRTUAL LAYER-2 NETWORK - Systems and methods for a virtual layer- | 2022-01-20 |
20220021557 | VXLAN Implementation Method, Network Device, and Communications System - A Virtual eXtensible Local Area Network (VXLAN) method comprises obtaining, by a network device, a mapping from a virtual local area network identifier VLAN ID to a VXLAN network identifier VNI; receiving, by the network device through a port, an Ethernet frame forwarded by an access device, where a VLAN tag field in the Ethernet frame includes the VLAN ID; adding, by the network device, a VXLAN header to the Ethernet frame based on the VLAN ID and the mapping to obtain a VXLAN packet, where a VNI field in the VXLAN header includes the VNI; and sending, by the network device, the VXLAN packet. | 2022-01-20 |
20220021558 | CONFIGURING CHANNEL STATE INFORMATION REFERENCE SIGNAL SUBBAND PRECODING RESOURCE BLOCK GROUPS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may receive a signaling communication that includes information specifying whether a channel state information reference signal (CSI-RS) precoding resource block group includes a same quantity of resource blocks (RBs) that is included in a CSI reporting subband configured for the UE. The CSI-RS precoding resource block group may enable the UE to perform a channel estimation based at least in part on a CSI-RS transmitted by a base station. The UE may perform the channel estimation based at least in part on the CSI-RS transmitted by the base station. The channel estimation may be based at least in part on whether the CSI-RS precoding resource block group includes the same quantity of RBs that is included in the CSI reporting subband configured for the UE. Numerous other aspects are provided. | 2022-01-20 |
20220021559 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATIONS - Embodiments of a method and an apparatus for wireless communications are disclosed. In an embodiment, a method for wireless communications involves generating a packet for transmission to a user, where generating the packet includes: encoding user signaling parameters and setting a station-identification (STA-ID) of the user to a value, where the signaling parameters include a number of space time streams (nSTS) spatial streams, establishing a dummy user without changing the user signaling parameters, setting a STA-ID of the dummy user to a value that is different from the STA-ID value of the user, indicating the nSTS spatial streams that are allocated to the dummy user and that are to include Long Training Field (LTF) symbols, and transmitting the packet to the user with the LTF symbols. | 2022-01-20 |
20220021560 | METHOD AND APPARATUS FOR BEAMFORMING - Embodiments of a method and an apparatus for beamforming are disclosed. In an embodiment, a method for beamforming involves transmitting, by a beamformer to a beamformee, a sounding packet that includes training symbols, receiving, at the beamformee, the sounding packet that includes the training symbols, deriving, at the beamformee, channel estimates from the training symbols included in the sounding packet, computing, at the beamformee, a feedback matrix from the derived channel estimates, transmitting, by the beamformee to the beamformer, a packet that includes two sets of symbols, where the feedback matrix is applied to at least one of the two sets of symbols, receiving, at the beamformer, the packet that includes the two sets of symbols, and operating the beamformer according to the two sets of symbols included in the packet. | 2022-01-20 |
20220021561 | METHOD FOR TRANSMITTING SOUNDING REFERENCE SIGNAL, TERMINAL DEVICE AND NETWORK DEVICE - Disclosed are a method for transmitting a sounding reference signal, a terminal device and a network device. The method comprises: a terminal device determining, in a first time-domain resource unit, a plurality of second time-domain resource units for sending a sounding reference signal (SRS) of the terminal device; the terminal device determining, according to a frequency hopping pattern of the terminal device, a target resource for sending the SRS on the plurality of second time-domain resource units; and the terminal device sending, according to the target resource, the SRS to a network device. The present invention reduces the interference of SRS signals between different terminal devices, and also avoids the occurrence of a continuous strong interference situation between terminal devices. | 2022-01-20 |
20220021562 | MULTI-CHANNEL DIGITAL ISOLATOR WITH INTEGRATED CONFIGURABLE PULSE WIDTH MODULATION INTERLOCK PROTECTION - A multi-channel digital isolator includes a digital isolator and an interlock circuit. The isolator includes a transmitter having a transmitter output, a receiver having a receiver input and a receiver output, an isolation barrier coupled between the transmitter output and the receiver input, and an output buffer having a buffer input and configured to output an isolated signal. The transmitter is configured to transmit an input signal across the isolation barrier. The interlock circuit has an interlock input coupled to the receiver output and an interlock output coupled to the buffer input. The interlock module is configured to prevent overlapping active states between the first isolated signal and a complementary isolated signal. In some implementations, the digital isolator also includes a dead-time insertion circuit. | 2022-01-20 |
20220021563 | COMMUNICATION DEVICE FOR VEHICLE AND SKEW CORRECTING METHOD - A communication device for a vehicle includes: a transmitting section that transmits differential signals from a first control section to a second control section via a transmission path; a receiving section that receives the differential signals that were transmitted to the second control section by the transmitting section; a skew measuring section that measures a signal difference of the differential signals on the transmission path; and a transmitting/receiving skew correcting section that, based on the signal difference measured by the skew measuring section, corrects both transmitting time differential signals that are transmitted from the first control section and receiving time differential signals that are received at the second control section. | 2022-01-20 |
20220021564 | METHOD AND APPARATUS FOR CONTROLLING COMMUNICATION COMPENSATION, AND AIR CONDITIONER - The present disclosure relates to a method for controlling communication compensation, comprising: determining a length class of a communication link according to a time length of pulse data transmitted on the communication link; and determining a compensation scheme for communication compensation according to the length class of the communication link. In the invention, a length class of a communication link determined according to a time length of pulse data transmitted on the communication link is used to determine a compensation scheme for communication compensation so as to perform time compensation on data, thereby preventing attenuation caused by an excessively long communication distance, and improving the stability of long-distance communication performed by means of Homebus. Also disclosed are an apparatus for controlling communication compensation, and an air conditioner. | 2022-01-20 |
20220021565 | SINGLE CARRIER TRANSMISSION WITH ADAPTIVE ROLL-OFF FACTOR FOR ULTRA RELIABLE AND LOW LATENCY COMMUNICATION SYSTEMS - A single carrier transmission that minimizes spectral efficiency loss and reduces out of band emission by using adaptive filtering in a block where different filter parameters are used for different symbols within a block. | 2022-01-20 |
20220021566 | APPARATUS, SYSTEM AND METHOD FOR PROVIDING LOCATIONING MULTIPATH MITIGATION - In at least one embodiment, a system for providing locationing multipath mitigation for wireless communication is provided. The system includes a receiver having at least one controller. The at least one controller is programmed to; receive a first narrowband wireless signal including a predetermined symbol from a transmitter across a wideband transmission channel that exhibits a multipath condition and additive noise, the first narrowband wireless signal being convoluted with the wideband channel to form a first received signal and to perform autocorrelation on the first received signal to extract the predetermined symbol. The at least one controller is further configured to filter the extracted predetermined symbol to deconvolve the first received signal to minimize the effects of the multipath condition and the additive noise to provide a first deconvoluted signal. | 2022-01-20 |
20220021567 | METHOD TO VERTICALLY ALIGN MULTI-LEVEL CELL - Methods, systems, and devices for improving uniformity between levels of a multi-level signal are described. Techniques are provided herein to unify vertical alignment between data transmitted using multi-level signaling. Such multi-level signaling may be configured to capture transmitted data during a single clock cycle of a memory controller. An example of multi-level signaling scheme may be pulse amplitude modulation (PAM). Each unique symbol of the multi-level signal may be configured to represent a plurality of bits of data. | 2022-01-20 |
20220021568 | RESTRICTED EUCLIDEAN MODULATION - A method and apparatus for using Euclidean modulation in an antenna are disclosed. In one embodiment, a method for controlling an antenna comprises mapping a desired modulation to achievable modulation states, mapping modulation values associated with the achievable modulation states to one or more control parameters, and controlling radio frequency (RF) radiating antenna elements using the one or more control parameters to perform beam forming. | 2022-01-20 |
20220021569 | METHOD AND DEVICE FOR TRANSMITTING EHT PPDU IN WIRELESS LAN SYSTEM - A method and device for transmitting an EHT PPDU in a wireless LAN system is proposed. Specifically, a transmission STA generates an STF signal for a 320 MHz band. The transmission STA transmits an EHT PPDU including the STF signal to a reception STA. The STF signal is generated on the basis of an EHT STF sequence. The EHT STF sequence is a first sequence in which preconfigured sequence M is repeated, and is defined as {M 1 −M 0 −M 1 −M 0 −M −1 M 0 −M 1 −M 0 −M −1 M 0 M −1 M 0 −M −1 M 0 −M 1 −M}*(1+j)/sqrt(2). Sqrt( ) represents a square root. Preconfigured sequence M is defined as M={−1, −1, −1, 1, 1, 1, −1, 1, 1, 1, −1, 1, 1, −1, 1}. | 2022-01-20 |
20220021570 | DATA COMPRESSION METHOD AND APPARATUS - Embodiments of this application provide a data compression method, including: performing first processing on π/2-binary phase shift keying BPSK modulated data with a length of M, to obtain first frequency domain data with a length of M, where the first processing includes Fourier transform, and M is an even number; performing second processing on second frequency domain data with a length of Q, to obtain time domain data, where data in the second frequency domain data is included in the first frequency domain data, Q is a positive integer, M is greater than Q, Q is greater than or equal to M/2, and the second processing includes inverse Fourier transform; and sending the time domain data on one time domain symbol. | 2022-01-20 |
20220021571 | Synchronization Method and Device, Synchronization System, and Computer-Readable Storage Medium - Provided is a synchronization method, which includes: a first device periodically sends a first PSS sequence and first PDSCH control information at frequency points F | 2022-01-20 |
20220021572 | SYSTEMS AND METHODS FOR REGISTERING COMPUTER SERVER EVENT NOTIFICATIONS - A system for secure transmission of business event notifications includes a memory, at least one processor, a service gateway configured to: publish application programming interfaces (APIs) for secure transmission of business event notifications, a notification server configured to: publish APIs for secure transmission of business event notifications corresponding to the APIs published by the service gateway, obtain a new business event to report, determine a partner to receive a notification of the new business event, transmit an event notification to the partner by way of the service gateway APIs, and register the event notification in a database. | 2022-01-20 |
20220021573 | LINK FAULT MONITORING METHOD AND APPARATUS - Embodiments of this application provide a link fault monitoring method and related apparatus, and the method includes: A network monitoring device obtains a poor-quality parameter of a target link segment, where the poor-quality parameter is a proportion of the quantity of abnormal terminal devices in the target terminal devices that transmit data by the target link segment; and the network monitoring device determines, based on the poor-quality parameter, whether the target link segment is a faulty link segment. The embodiments of this application provide a technical solution that facilitates monitoring a potential faulty link segment in a network link. | 2022-01-20 |
20220021574 | SYSTEM AND METHODS TO VALIDATE ISSUE DETECTION AND CLASSIFICATION IN A NETWORK ASSURANCE SYSTEM - Systems, methods and computer-readable storage media are provided for detecting and simulating issues in a network. | 2022-01-20 |
20220021575 | Synchronization of a Shared Service Configuration Across Computational Instances - A system may include a central computational instance configured to provide a service to a plurality of computational instances, wherein the service is associated with configurations respectively corresponding to the computational instances. The system may also include a computational instance dedicated to a managed network and storing a synchronization history specifying information that was synchronized between the computational instance and the central computational instance. One or more processors may be configured to: (i) receive a configuration of the service into the computational instance, wherein the configuration was received from a non-production computational instance of the plurality of computational instances; (ii) read, from the configuration, a synchronization identifier; (iii) determine that the synchronization identifier does not exist in the synchronization history; and (iv) in response to determining that the synchronization identifier does not exist in the synchronization history, transmit the configuration to the service provided by the central computational instance. | 2022-01-20 |
20220021576 | BULK DISCOVERY OF DEVICES BEHIND A NETWORK ADDRESS TRANSLATION DEVICE - In one example, a network management system discovers a plurality of network devices behind a network address translation device, such as a firewall. The network management system may receive a model of a seed network device, generate a first activation configuration and commit the first activation configuration on the seed network device. The network management system may connect to the seed network device and discover neighboring devices from information in the seed network device. The network management system may connect to the neighboring devices, automatically create a model of the neighboring network devices, generate s activation configurations for the neighboring network devices and commit the activation configurations on the neighboring network devices. The network management system may iterative perform these steps until it discovers all the discoverable network devices behind the network address translation device. | 2022-01-20 |
20220021577 | DYNAMIC NETWORK AWARENESS - Systems and methods for managing a network are disclosed. One method can comprise determining presence of a first network device associated with a network. If the first network device is not present, a second network device can be configured to assume authority of the network. If the first network device is present, the second network device can be configured to join the network. Other aspects relate to providing services in an environment having multiple service providers. | 2022-01-20 |
20220021578 | METHOD FOR CONFIGURING MODELING PARAMETERS, ELECTRONIC DEVICE AND COMPUTER STORAGE MEDIUM THEREOF - A method for configuring modeling parameters, an electronic device and a computer storage medium, which relate to the field of artificial intelligence and deep learning technologies, are disclosed. An association rule among modeling parameters is hidden in an interaction, and the user is guided to complete a configuration of the modeling parameters in the form of a page interaction. | 2022-01-20 |
20220021579 | SUPERVISED TRAFFIC MANAGEMENT IN SIGMESH NETWORKS - Systems and methods of managing a Bluetooth SigMesh network involve a supervisor configured to monitor one or more network parameters of the SigMesh network, such as topology, message identity, transmit count, transmit interval, relay retransmit count, or relay retransmit interval. The supervisor determines whether one or more of the network parameters are to be adjusted for improving transmission efficiency, reducing traffic congestion, avoiding flooding of packets on the mesh network, or ensuring injection of packets in the SigMesh network. The supervisor provides feedback to one or more nodes with the adjusted network parameters to improve transmission efficiency and reduce traffic in the SigMesh network. | 2022-01-20 |
20220021580 | ICT RESOURCE MANAGEMENT DEVICE, ICT RESOURCE MANAGEMENT METHOD, AND ICT RESOURCE MANAGEMENT PROGRAM - The ICT resource management device ( | 2022-01-20 |
20220021581 | BASELINE NETWORK DEPENDENCY MAPPING AND ALERTING - Apparatuses, methods, systems, and program products are disclosed for baseline network dependency mapping and alerting. An apparatus includes an asset module that identifies a plurality of network assets of a data network, a dependency module that determines dependencies between the plurality of network assets across different physical and virtual layers within the data network, and a baseline module that generates a snapshot of the plurality of network assets and the dependencies between the plurality of network assets across the different physical and virtual layers within the data network at a point in time. | 2022-01-20 |
20220021582 | ON-DEMAND TOPOLOGY CREATION AND SERVICE PROVISIONING - The disclosure provides an approach for service provisioning. Embodiments include receiving first configuration data related to a first network endpoint and second configuration data related to a second network endpoint. Embodiments include generating a service map based on the first configuration data and the second configuration data. Embodiments include receiving a request to provision a service between the first network endpoint and the second network endpoint. Embodiments include determining in response to the request and based on the service map, first service configuration data for the first network endpoint and second service configuration data for the second network endpoint. Embodiments include provisioning the service between the first network endpoint and the second network endpoint by pushing the first service configuration data to the first network endpoint and pushing the second service configuration data to the second network endpoint. | 2022-01-20 |
20220021583 | AUTOMATED CONFIGURATION OF MACHINE-TO-MACHINE SYSTEMS - A gateway is provided with configuration management logic to identify a set of configurations corresponding to a deployment of a particular application, and automatically send corresponding configuration data to a set of devices in range of the gateway. Service management logic of the gateway determines that assets on the set of devices correspond to one or more asset abstractions defined for the particular application, where the configuration data is sent to the set of devices based on the assets corresponding to the asset abstractions. Sensor data is received during the deployment as generated by a sensor asset of one of the devices, the sensor data is processed according to service logic of the particular application to generate a result, and actuating data is generated and sent during the deployment to an actuator asset on the set of devices based on the result. | 2022-01-20 |
20220021584 | DIFFERENTIAL DATAFLOW APPROACH FOR COMPUTING GROUPING MEMBERSHIP IN NETWORK CONTROLLERS - Certain embodiments described herein are generally directed to techniques for computing grouping object memberships in a network. Embodiments include receiving a plurality of network configuration updates. Embodiments include identifying delta updates to a plurality of grouping objects based on the plurality of configuration updates. Embodiments include determining a parallel processing arrangement for the delta updates based on dependencies in a directed graph comprising representations of the plurality of grouping objects. Embodiments include processing the delta updates according to the parallel processing arrangement in order to determine memberships of the plurality of grouping objects. Embodiments include distributing one or more updates to one or more endpoints based on the memberships of the plurality of grouping objects. | 2022-01-20 |
20220021585 | CLUSTER MANAGEMENT OF EDGE COMPUTE NODES - In one embodiment, a controller assigns a set of one or more endpoints in a network to a particular edge networking device in the network to process data generated by those one or more endpoints prior to sending the data to a remote application. The controller monitors performance metrics for the particular edge networking device. The controller makes, based on the performance metrics, a determination that performance of the particular edge networking device is below a defined threshold. The controller re-assigns, based on the determination, at least a portion of the set of one or more endpoints to a second edge networking device in the network. | 2022-01-20 |
20220021586 | MULTI-EDGE ETHERCHANNEL (MEEC) CREATION AND MANAGEMENT - Systems and methods of creating and managing a multi-edge EtherChannel (MEEC) include, with a control node communicatively coupled to a plurality of edge nodes within a network, receiving including data defining a bundle of a plurality of links communicatively coupling the plurality of edge nodes and a first server and data identifying the first server. A map-notify message is sent to an edge node defining a link state for at least the first edge node. A map-proxy register message defining a plurality of link states for the plurality of the edge nodes within the bundle is sent to at least a second edge node to synchronize the first edge node with respect to at least the second edge node of the plurality of edge nodes. A map-reply message indicating load balancing data of a plurality of the edge nodes may be sent to an ingress edge node and data packets may be load balanced based on the load balancing data. | 2022-01-20 |
20220021587 | A METHOD AND AN APPARATUS FOR FAULT PREDICTION IN NETWORK MANAGEMENT - Network management apparatus and methods are described. A network management apparatus comprises network data receiving means for receiving network data that is representative of the current condition of a communications network, the network data comprising a plurality of values indicative of the performance of network elements; network data transformation means for transforming the received network data into a network state vector that is indicative of a current state of the network; and network state prediction means for predicting a future network state vector of the network from the current network state vector, the network state prediction means comprising a self-learning prediction module having a memory for storing at least one internal state. | 2022-01-20 |
20220021588 | DISCOVERY PROCESS IDENTIFICATION AND CLASSIFICATION - Embodiments presented herein provide apparatus and techniques for identifying and classifying processes and associated applications executing in a network. All processes executing in a network may be identified using a discovery process. The processes may be clustered based on associations between the processes. Suggested application entries may then be generated based at least in part on the clusters of processes. A configuration item type and a discovery pattern may be generated for each suggested application entry. A subsequent discovery process may use the configuration item type and discovery patterns to identify associated configuration items in the network. | 2022-01-20 |
20220021589 | METHOD AND ELECTRONIC DEVICE FOR PLACING MICRO NETWORK FUNCTION - A method, performed by an electronic device, of placing a micro network function, includes: determining at least one micro network function used for a service; predicting control signaling overhead of at least one cell including at least one cell edge cloud, based on a history of control signaling overhead of the at least one cell; and placing the at least one micro network function in the at least one cell edge cloud, based on the predicted control signaling overhead of the at least one cell. | 2022-01-20 |
20220021590 | METHOD, SYSTEM, AND DEVICE FOR ADAPTIVE DETERMINATION OF NETWORK SLICE CONFIGURATION AND RESOURCE REQUIREMENTS - A method and system for adaptive determination of network slice configuration and resource requirement is disclosed. The method includes creating a service requirement set based on a service request. The method further includes determining enhancements and adjustments to be done in the service requirement set based on a plurality of user entitlements corresponding to the user associated with the service request. The method further includes generating an updated service requirement set based on the enhancements and adjustments applied on the service requirement set. The method further includes determining a network slice template hierarchy based on the updated service requirement set. The method further includes determining a resource requirement corresponding to each of the plurality of network sub-nets based on the updated service requirement set, the plurality of user entitlements, and dynamic network context. | 2022-01-20 |