17th week of 2016 patent applcation highlights part 60 |
Patent application number | Title | Published |
20160119093 | METHOD AND DEVICE FOR SENDING SIGNAL, AND STORAGE MEDIUM - Disclosed is a method for sending a signal, comprising: a small cell sending a discovery signal (DS) in a corresponding sending mode according to a current state of the small cell. Further disclosed is a device for sending a signal. In the present invention, according to the current state of the small cell, an access state of the small cell is adjusted in real time, thereby significantly reducing the interference of the small cell to a neighbor cell, improving the system performance, and being able to reduce the energy consumption of the small cell. | 2016-04-28 |
20160119094 | PSEUDORANDOM SEQUENCE GENERATION FOR OFDM CELLULAR SYSTEMS - In one embodiment, a transmitter includes a binary sequence generator unit configured to provide a sequence of reference signal bits, wherein the sequence is an inseparable function of a cell identification parameter, a cyclic prefix mode corresponding to the transmitter and one or more time indices of the sequence. The transmitter also include a mapping unit that transforms the sequence of reference signal bits into a complex reference signal, and a transmit unit configured to transmit the complex reference signal. In another embodiment, a receiver includes a receive unit configured to receive a complex reference signal and a reference signal decoder unit configured to detect a sequence of reference signal bits from the complex reference signal, wherein the sequence is an inseparable function of a cell identification parameter, a cyclic prefix mode corresponding to a transmitter and one or more time indices of the sequence. | 2016-04-28 |
20160119095 | COORDINATING TRANSMISSION OF POSITIONING REFERENCE SIGNALS AND NON-REFERENCE SIGNALS - A base station coordinates transmission of positioning reference signals and non-reference signals. The base station includes a transceiver to detect a reference signal transmitted by one or more other base stations in one or more physical resource blocks. The base station also includes a processor to identify a pattern of resources allocated to the one or more other base stations based on the one or more physical resource blocks including the reference signal. The transceiver is to bypass transmission of non-reference signals in physical resource blocks indicated by the pattern. | 2016-04-28 |
20160119096 | REFERENCE SIGNAL AND TRANSMIT POWER RATIO DESIGN FOR NON-ORTHOGONAL TRANSMISSIONS - Techniques are provided for reference signal transmissions and transmit power ratio determination in non-orthogonal transmissions. A traffic-to-pilot power ratio (TPR) may be determined for a base layer for a non-orthogonal channel and another TPR may be determined for an enhancement layer for the non-orthogonal channel. Reference signal transmissions may be transmitted by a base station at a reference signal transmission power, and a user equipment (UE) may estimate channel quality for the base layer or the enhancement layer based at least in part on an energy level of the received reference signal and one or more of the first TPR or the second TPR. A base station may transmit TPR signaling that may indicate one or more TPR values for one or both of the base layer or enhancement layer. | 2016-04-28 |
20160119097 | CODEBOOK DESIGN AND STRUCTURE FOR ADVANCED WIRELESS COMMUNICATION SYSTEMS - A base station capable of communicating with a user equipment (UE) includes a transceiver configured to transmit Channel State Information-Reference Signal (CSI-RS) according to a CSI-RS configuration comprising a number of antenna ports, and downlink signals containing the CSI-RS configuration and a precoding-matrix-construction configuration for precoding matrix indicator (PMI) reporting on physical downlink shared channels (PDSCH), the precoding-matrix-construction configuration comprising a first and second sampling factors, O | 2016-04-28 |
20160119098 | WIRELESS COMMUNICATION SYSTEM AND METHOD, AND WIRELESS COMMUNICATION APPARATUS - A wireless communication system is a wireless communication system that adopts backoff control. The wireless communication system is provided with: a first wireless communication apparatus; and a second wireless communication apparatus. The first wireless communication apparatus transmits a first signal to the second wireless communication apparatus with a first period, and the second wireless communication apparatus transmits a second signal to the first wireless communication apparatus with a delay of a fixed time, which is shorter than one period of the first period, from a time point at which the first wireless communication apparatus transmits the first signal. | 2016-04-28 |
20160119099 | METHOD AND APPARATUS FOR TRANSRECEIVING CHANNEL STATE INFORMATION IN WIRELESS COMMUNICATION SYSTEM - The present invention relates to a wireless communication system. A method for a terminal reporting channel state information (CSI) in a wireless communication system, according to one embodiment of the present invention, comprises the steps of: receiving, from a second cell, which is a serving cell and neighboring a first cell, resource block allocation information related to downlink data of the second cell; selecting, based on the resource block allocation information, either a first interface measurement resource (IMR) in which interference from the second cell is present or a second IMR in which interference from the second cell is absent; and transmitting, to the first cell, a channel quality indicator (CQI) calculated based on the IMR which has been selected. | 2016-04-28 |
20160119100 | CHANNEL-SOUNDING METHOD USING A PLURALITY OF ANTENNAS, AND APPARATUS FOR SAME - The present invention relates to a wireless communication system. More particularly, the present invention relates to a method and to an apparatus for transmitting an SRS in a multi-antenna system. The method comprises the steps of: acquiring specific information for discriminating a first antenna group and a second antenna group from among a plurality of antennas, wherein said first antenna group includes one or more antennas which are set to a turned-on state to perform communication with a base station, and said second antenna group includes one or more other antennas which are set to a turned-off state; transmitting an SRS to the base station if a predetermined condition is satisfied, under the condition that the second antenna group is set to the turned-off state; and setting the second antenna group to a turned-off state after the transmission of the SRS. | 2016-04-28 |
20160119101 | Method and Arrangement for CSI Measurement - There are proposed a base station and User Equipment, UE, for determining and applying separate Channel State Information, CSI, for flexible subframes in a wireless communication system applying time division duplex, TDD. The method in a UE comprises, for a flexible subframe, receiving ( | 2016-04-28 |
20160119102 | METHOD AND SYSTEM FOR TRANSMITTING AND RECEIVING PROTOCOL DATA UNIT IN COMMUNICATION NETWORKS - The present disclosure relates to a pre-5 | 2016-04-28 |
20160119103 | CONTROL INFORMATION SENDING METHOD AND CONTROL INFORMATION RECEIVING METHOD, AND APPARATUS - The present application discloses a control information sending method that includes: determining, from a preset set of patterns, a pattern as a first pattern, where the pattern comprised in the preset set of patterns is one or more patterns that are determined according to a coverage enhancement degree. The pattern determines an aggregation level that is used for transmitting control information, and determines the number of the multiple subframes, and also determines a resource indicator for a resource that is used for transmitting the control information. The pattern further determines a control information format that is used for transmitting, in each subframe of the multiple subframes, the control information. The method further includes: acquiring, according to the first pattern, the control information on a resource, to which the control information is mapped, in each subframe of the multiple subframes. | 2016-04-28 |
20160119104 | METHOD AND APPARATUS FOR WIRELESS COMMUNICATION - A method for communication over a wireless network is provided. The method includes receiving, at a Station (STA), a frame over the wireless network; determining if the received frame is corrupted, and if the received frame is not corrupted, transmitting, on a first control response, to the peer STA information relating to the subsequent transmission of the peer STA, and if the received frame is corrupted, transmitting, on a second control response, to a peer STA information relating to a subsequent transmission of the peer STA. | 2016-04-28 |
20160119105 | FOUNTAIN HARQ FOR RELIABLE LOW LATENCY COMMUNICATION - Methods, systems, and devices are described for fountain hybrid automatic repeat request (HARM) for reliable low latency communication. A wireless device may transmit a data block based on a low latency operational mode. The device may then transmit a number of redundancy versions of the data block prior to determining whether an acknowledgement (ACK) has been received. In some examples the ACK may be an augmented ACK, which may be based on the number of redundancy versions received prior to successfully decoding the data block, and which may include an additional resource request. In some examples, the device may select an updated modulation and coding scheme (MCS) based on the augmented ACK. In some examples, the device may increase a number of frequency resources (e.g., component carriers) used for transmission based on the augmented ACK. | 2016-04-28 |
20160119106 | METHOD AND BASE STATION FOR TRANSMITTING A DATA BLOCK - A method and a base station of transmitting a data block are provided. At least one data block is transmitted via at least one of at least two downlink frequency bands. A modulation symbol and N spreading sequences are received. Acknowledgement/negative acknowledgement (A/N) information is determined in accordance with the modulation symbol and the N spreading sequences. The modulation symbol and the N spreading sequences jointly determine the A/N information. And the at least one data block may be retransmitted depending on the A/N information determined. | 2016-04-28 |
20160119107 | Special operations channel in vectored systems - Methods and devices are provided wherein a signal sent on a special operation channel is modified by an identification of a line. | 2016-04-28 |
20160119108 | METHOD OF TRANSMITTING AND RECEIVING CONTROL INFORMATION IN A WIRELESS COMMUNICATION SYSTEM - A method of transmitting and receiving control information in a wireless communication system is disclosed. The method of receiving control information related to a specific point-to-multipoint service in a user equipment of a wireless communication system comprises receiving a notification message including indication information and an identifier identifying the point-to-multipoint service from a network, the indication information indicating at least one downlink channel related to the specific point-to-multipoint service among a plurality of downlink channels established for transmission of control information for at least one or more point-to-multipoint service, and receiving at least one downlink channel indicated by the indication information. | 2016-04-28 |
20160119109 | METHOD FOR COMMUNICATING DATA, COMMUNICATION CONTROLLER AND CIRCUIT ARRANGEMENT - Method for communicating data between a first circuit and a second circuit, in particular a microcontroller unit and a mixed signal circuit of a motor vehicle control device, which is also distinguished by the fact that, during full duplex operation, data are serially transmitted between the first circuit and the second circuit and a transmitter of the data provides a clock signal, in particular for decoding data by a receiver. The invention also describes a communication controller and a circuit arrangement for carrying out the method. | 2016-04-28 |
20160119110 | APPARATUS AND METHOD FOR CANCELLING SELF-INTERFERENCE SIGNAL IN RF FRONT END - The apparatus includes a transmission signal divider for dividing and transmitting a received signal to a transmission antenna and an attenuator, an attenuator for applying a predetermined attenuation factor to the transmitted signal divided to the attenuator, a phase shifter for phase-shifting the signal to which the attenuation factor is applied by a predetermined phase, and a time delayer for time-delaying the phase-shifted signal by a predetermined time. | 2016-04-28 |
20160119111 | System and Apparatus for Clock Retiming with Catch-Up Mode and Associated Methods - An apparatus includes analog or mixed-signal circuitry that operates in response to a first signal, and digital circuitry that operates in response to a second signal. The apparatus further includes a signal retiming circuit. The signal retiming circuit retimes an output signal of a digital signal source to reduce interference between the digital circuitry and the analog or mixed-signal circuitry by retiming edges of the output signal of the digital signal source to fall on cycle boundaries of the first signal. | 2016-04-28 |
20160119112 | COMMUNICATION APPARATUS, TIME SYNCHRONIZATION SYSTEM, AND TIME SYNCHRONIZATION METHOD - A communication apparatus ( | 2016-04-28 |
20160119113 | NON-INTEGER OVERSAMPLED TIMING RECOVERY FOR HIGHER ORDER QUADRATURE MODULATION COMMUNICATION SYSTEMS USING IN-PHASE SAMPLES - Apparatus and method for performing entirely digital timing recovery for high bandwidth radio frequency communications. The received digital data source can be sampled from any (minimum 2×) non-integer oversampled transmitted data. This method re-samples the data through interpolation and phase adjustment. The output phase error adjusts the receiver's Analog-to-digital Convertor sampling clock to improve synchronization with the transmitter's Digital-to-analog Convertor clock phase, thus improving transmitted symbol recovery. | 2016-04-28 |
20160119114 | NON-INTEGER OVERSAMPLED TIMING RECOVERY FOR HIGHER ORDER QUADRATURE MODULATION COMMUNICATION SYSTEMS USING QUADRATURE-PHASE SAMPLES - Apparatus and method for performing entirely digital timing recovery for high bandwidth radio frequency communications. The received digital data source can be sampled from any (minimum 2×) non-integer oversampled transmitted data. This method re-samples the data through interpolation and phase adjustment. The output phase error adjusts the receiver's Analog-to-digital Convertor sampling clock to improve synchronization with the transmitter's Digital-to-analog Convertor clock phase, thus improving transmitted symbol recovery. | 2016-04-28 |
20160119115 | METHOD FOR DETECTING IN A RECEIVER A TRANSMITTER LOCAL TIME - The method and apparatus for detecting in a receiver a transmitter local time, comprising determining a reference time for the transmitter local time; receiving from the transmitter a transmission time duration signal that elapsed on the transmitter since the reference time for the transmitter local time; and determining the transmitter local time based on the reference time for the transmitter local time and the received transmitter time duration. A time stamp signal based on the transmitter local time signal is generated at the receiver and is superimposed on the sensor data stream transmitted to the receiver. Consequently, the advantage is provided that a data stream can be transmitted without the incorporation of any time stamp. | 2016-04-28 |
20160119116 | Symbol Boundary Detection - A symbol boundary in a data packet having a guard interval preceding a preamble having a predetermined sequence of symbols is detected by receiving a signal representing a data packet; sampling the received signal at a sampling rate; estimating channel impulse responses from a set of samples in dependence on the predetermined sequence of symbols of the preamble; determining an energy value for each of a plurality of windows of channel impulse responses, each of the windows corresponding to W number of consecutive samples, the energy value for each of the windows being indicative of the total energy associated with the channel impulse responses of that window; determining which of the windows has the greatest energy value; and identifying the earliest sample of the consecutive W samples in said determined greatest energy window, the earliest sample being indicative of a symbol boundary for the preamble. | 2016-04-28 |
20160119117 | OVERSAMPLING CDR WHICH COMPENSATES FREQUENCY DIFFERENCE WITHOUT ELASTICITY BUFFER - A method, algorithm, architecture, circuit and/or system that compensates for frequency difference in oversampled CDRs. The oversampled CDR uses a programmable divider whose division ratio is changed, for one or more cycles, from its usual division ratio, when accumulated phase movement in either direction exceeds a threshold. Accordingly, the elasticity buffer in oversampled CDRs can be made much smaller or entirely eliminated, resulting in less area, and reduced or eliminated dependence of max allowed burst size on ppm difference. The threshold can be kept programmable, and more than half unit interval, to provide robustness towards high frequency jitter. | 2016-04-28 |
20160119118 | METHOD AND APPARATUS FOR HIGH SPEED CHIP-TO-CHIP COMMUNICATIONS - Described herein are systems and methods of receiving first and second input signals at a first two-input comparator, responsively generating a first subchannel output, receiving third and fourth input signals at a second two-input comparator, responsively generating a second subchannel output, receiving the first, second, third, and fourth input signals at a third multi-input comparator, responsively generating a third subchannel output representing a comparison of an average of the first and second input signals to an average of the third and fourth input signals, configuring a first data detector connected to the second subchannel output and a second data detector connected to the third subchannel output according to a legacy mode of operation and a P4 mode of operation. | 2016-04-28 |
20160119119 | COMPACT FUZZY PRIVATE MATCHING USING A FULLY-HOMOMORPHIC ENCRYPTION SCHEME - A method for data matching includes providing two sets of encrypted data elements by converting data elements to respective sets of vectors and encrypting each vector with a public key of a homomorphic encryption scheme. Each data element includes a sequence of characters drawn from an alphabet. For pairs of encrypted data elements, a comparison measure is computed between the sets of encrypted vectors. An obfuscated vector is generated for each encrypted data element in the first set, which renders the first encrypted data element indecipherable when the comparison measure does not meet a threshold for at least one of the pairs of data encrypted elements comprising that encrypted data element. The obfuscated vectors can be decrypted with a private key, allowing data elements in the first set to be deciphered if the comparison measure meets the threshold for at least one of the data elements in the second set. | 2016-04-28 |
20160119120 | METHOD AND APPARATUS FOR PUBLIC-KEY ENCRYPTED COMMUNICATION - A method and an apparatus for public-key encrypted communication includes: encrypting, by a first device, random information according to a first public key to obtain a first ciphertext; encrypting, by the first device, plaintext information according to a second public key to obtain a second ciphertext, where the plaintext information is unencrypted data to be sent by the first device to a second device, the first public key is represented in a form of a polynomial, the first public key is obtained through calculation on a truncated polynomial ring according to system parameters, the second public key is represented in a form of a polynomial, the second public key is randomly selected on a truncated polynomial ring, and the random information is randomly selected on a truncated polynomial ring; and sending, by the first device, the first ciphertext and the second ciphertext to the second device. | 2016-04-28 |
20160119121 | ENCRYPTION/DECRYPTION APPARATUS AND ENCRYPTION/DECRYPTION METHOD THEREOF - An encryption/decryption apparatus and an encryption/decryption method thereof are provided. A data encryption/decryption unit performs an encryption/decryption operation to a digital data and thus generates an encryption/decryption power signal corresponding to the encryption/decryption operation. A complementary power generating unit generates a complementary power signal corresponding to the encryption/decryption power signal. The encryption/decryption apparatus outputs the complementary power signal and the encryption/decryption power signal as a power signal, wherein a sum of the complementary power signal and the encryption/decryption power signal is a fixed value. | 2016-04-28 |
20160119122 | ARCHITECTURE AND INSTRUCTION SET FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass. | 2016-04-28 |
20160119123 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119124 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119125 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119126 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119127 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119128 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119129 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119130 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119131 | FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES) - A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key generation for 128/192/256 bit keys. The flexible aes instruction set enables full use of pipelining capabilities because it does not require tracking of implicit registers. | 2016-04-28 |
20160119132 | METHOD AND DEVICE FOR GENERATING A HASH VALUE - A method for generating a hash value as a function of digital input data, including: a) division of the input data into 16 input data blocks each having length 32*m bits, b) initialization of eight working data blocks having specifiable values, each of the eight working data blocks having a length of 32*m bits, c) modification of the input data blocks and of the working data blocks. | 2016-04-28 |
20160119133 | PERMUTATION COMPOSITION BASED HASH FUNCTION - The disclosed hash and message padding functions are based on the permutation composition problem. To compute a hash of a message using permutation composition based hashing, the message is split into equal size blocks. For each block, a permutation composition value is computed. The block permutation composition values are then combined through composition to generate an overall permutation composition value. The hash of the message is then based on the overall permutation composition value. To pad a message using permutation composition based padding, the message is split into equal size blocks. For each block, a permutation composition value is computed and the permutation composition value is added to the block. The padded blocks are then recombined to generate the padded message. | 2016-04-28 |
20160119134 | ENCRYPTION METHOD, ENCRYPTOR, AND ENCRYPTION SYSTEM FOR ENCRYPTING ELECTRONIC DATA BY SPLITTING ELECTRONIC DATA - An encryption method includes displaying encryption target data on a display screen as an image, performing first acceptance in which designation of an at least partial region of the displayed image is accepted, performing second acceptance in which designation regarding splitting of the designated at least partial region is accepted, and splitting data that is included in the encryption target data and corresponds to the designated at least partial region in accordance with the designation regarding the splitting under a secret sharing scheme. | 2016-04-28 |
20160119135 | SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS - A system and method for securing data and information is disclosed. Multiple cryptographic paradigms may be applied to multiple length data segments to encrypt such data to prevent unauthorized use. The system and method uses pattern keys. At least one pattern key uses a cryptographic paradigm different from the other pattern keys. Furthermore, each pattern key has a given key strength and at least one of the pattern keys key strength differs from the one or more other pattern keys used in the process. The pattern keys are applied to the data in accordance with a key pattern which defines the sequence that each pattern key is applied to the data. The length of each data segment may vary one from the other and such segment length is determined in accordance with the pattern key applied. In addition, the initial plaintext data may first be encrypted using a first password before the disclosed process is implemented | 2016-04-28 |
20160119136 | CRYPTOGRAPHIC DEVICE AND SECRET KEY PROTECTION METHOD - A cryptographic device and a secret key protection method are provided. The cryptographic device protects a secret key of the cryptographic device when processing a message. The cryptographic device includes: a secret key protection circuit, configured to generate an indecipherable signal according to the message and the secret key by a hash calculation circuit; and a cryptographic processor, configured to process the message and the secret key according to the indecipherable signal to generate an encrypted message. | 2016-04-28 |
20160119137 | DIVERSIFIED INSTRUCTION SET PROCESSING TO ENHANCE SECURITY - Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes receiving a block of information from non-processor memory at an interface between the non-processor memory and processor memory comprising two or more processor memory levels, determining whether the block of information received from the non-processor memory at the interface corresponds to encrypted instruction code, and decrypting the block of information at the interface between the non-processor memory and the processor memory for storage in one of the two or more levels of the processor memory in response to a determination that the received block of information corresponds to the encrypted instruction code. The block of information is stored at the one of the two or more levels of the processor memory without being decrypted when the received block of information is determined to correspond to data. | 2016-04-28 |
20160119138 | DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA - Generating a seed and/or a key from live biometric indicia, such that all the information necessary for generating the seed and/or the key is not stored, is provided. A method comprises receiving and enrolling a biometric template from a user; assigning an optimization value to the enrolled biometric template; encrypting an item of test data using the optimization value, such that the optimization value is an encryption seed; storing the encrypted item of test data on the storage medium; destroying the encryption seed after encrypting the item of test data; receiving a live biometric template; comparing the templates and determining an interval based on a probability that the templates are specific to the same user; iteratively testing values within the interval to identify the value in the interval for decrypting the encrypted item of test data; and generating the key using the seed. | 2016-04-28 |
20160119139 | WIRELESS DEVICE AND METHOD FOR REKEYING WITH REDUCED PACKET LOSS FOR HIGH-THROUGHPUT WIRELESS COMMUNICATIONS - Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key. | 2016-04-28 |
20160119140 | METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS - An example method includes facilitating installation of a data collector on a media device; collecting, via the data collector, a media identifier indicative of media presented at the media device; encrypting a user identifier that identifies the user of the media device, the encrypting of the user identifier based on a first encryption key corresponding to a first database proprietor having first user information associated with the user identifier; encrypting a device identifier that identifies the media device, the encrypting of the device identifier based on a second encryption key corresponding to a second database proprietor having second user information associated with the device identifier; sending the media identifier to a data collection server; sending the encrypted user identifier to a second server associated with the first database proprietor; and sending the encrypted device identifier to a third server associated with the second database proprietor. | 2016-04-28 |
20160119141 | SECURE COMMUNICATION AUTHENTICATION METHOD AND SYSTEM IN DISTRIBUTED ENVIRONMENT - The present invention relates to a secure communication authentication method and system in a distributed environment. By using the method and the system of the present invention, disadvantages in a platform identity certification process in TCG remote certification are alleviated, a method for platform identity certification is expanded, and by combining three technologies, that are, zero-knowledge proof, a Kerberos framework and a virtual TPM, a new verification method is designed, which is mainly intended to make improvement in the aspects in the existing method such as platform information exposure, a trusted third-party bottleneck and complexity avoidance. By using the method and the system of the present invention, the problems of privacy exposure and efficiency in mutual verification between remote servers in the existing distributed system. | 2016-04-28 |
20160119142 | Encryption, Decryption, and Triggered Delivery of Files - Encrypting information includes receiving a question/answer pair, generating a file pass phrase, encrypting the file with the file pass phrase, normalizing the answer, encrypting the file pass phrase with the normalized answer, creating a hash of the normalized answer; delivering encrypted information includes alerting the recipient of the encrypted file to be downloaded, providing the recipient with questions associated with the encrypted file, normalizing answers provided by the recipient, creating a hash of the normalized answers, comparing the hash to stored hashes associated with the encrypted file, allowing download of the encrypted file when a predetermined number of the stored hashes match the normalized hashes; and storing and triggering delivery of encrypted information to a recipient includes storing encrypted information about a recipient, determining a triggering event associated with the encrypted information, delivering to the recipient an invitation to retrieve the encrypted information upon occurrence of the triggering event. | 2016-04-28 |
20160119143 | USER IDENTITY AUTHENTICATING METHOD, TERMINAL, AND SERVER - A user identity authenticating method, a terminal, and server are provided. The method includes determining according to a preset first-biological-feature processing instruction set, whether a currently-entered first user biological feature matches a second user biological feature, to obtain a first result, where the first-biological-feature processing instruction set is configured by a server, and the second user biological feature is a biological feature that is registered on the server; determining, whether the first result is correct; and if the first result is correct, sending the first result to the server to determine whether the first user biological feature is authenticated. The method not only enhances security when the server performs user identity authenticating, but also prevents the second user biological feature from being leaked to a non-secure area. | 2016-04-28 |
20160119144 | DATA ENCRYPTION AND/OR DECRYPTION BY INTEGRATED CIRCUIT - In an embodiment, an apparatus is provided that may include an integrated circuit to be removably communicatively coupled to at least one storage device. The integrated circuit of this embodiment may be capable of encrypting and/or and decrypting, based at least in part upon a first key, data to be, in at least in part, stored in and/or retrieved from, respectively, at least one region of the at least one storage device. The at least one region and a second key may be associated with at least one access privilege authorized, at least in part, by an administrator. The second key may be stored, at least in part, externally to the at least one storage device. The first key may be obtainable, at least in part, based, at least in part, upon at least one operation involving the second key. Of course, many alternatives, modifications, and variations are possible without departing from this embodiment. | 2016-04-28 |
20160119145 | SECURE TRANSMISSION - A method for providing evidential data is disclosed. The method includes establishing one or more first secret tokens with a server; obtaining one or more data items from one or more sensors; modifying the one or more data items with at least one of the one or more first secret tokens to provide one or more modified data items; generating a respective first hash value for each of the one or more modified data items; generating a second hash value for a data set including each of the one or more data items; and transmitting the one or more data items, the one or more first hash values, and the second hash value to the server. | 2016-04-28 |
20160119146 | Secure Data Shredding in an Imperfect Data Storage Device - Apparatus and method for secure data shredding in an imperfect data storage device. In some embodiments, a hash function is applied to multi-bit random sequence to generate an output hash. A combinatorial logic function logically combines the output hash with a secret to provide an output value. The random string is processed into a plurality of secret shares which are stored in a first location in a non-volatile memory and the output value is stored in a different, second location of the memory. The secret is subsequently shredded by applying an erasure operation upon the secret shares in the first location of the memory. | 2016-04-28 |
20160119147 | Method and System of Online Content Review, Authentication, and Certification - A method and apparatus for the certification, review, and authentication of scientific and academic content produced by a content creator and certified by relevant credible and established entities through a scientific framework that depends on online interoperable systems, and presents such content to consumers through a system that provides automatic measures for notifying the user of the authenticity of the matter. While prior systems have been proposed for content verification, most purely apply for fact checking of numbers and figures and to establish what the end parties guarantee to have exchanged is true. On the other hand, this method and apparatus provides a technical and conceptual framework for authenticating and/or reviewing bodies and the content creators to engage in a revenue model while certifying the content not only with hard facts and figures but also abstract nature and conceptual accuracy. | 2016-04-28 |
20160119148 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME USING CONTROL FLOW SIGNATURES - A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow control instruction which terminates the sequence; a hash generator, configured to generate a hash associated with execution of the sequence of instructions; a memory configured to securely receive a reference signature corresponding to a hash of a verified corresponding sequence of instructions; verification logic configured to determine a correspondence between the hash and the reference signature; and authorization logic configured to selectively produce a signal, in dependence on a degree of correspondence of the hash with the reference signature. | 2016-04-28 |
20160119149 | SECURITY SYSTEM FOR HANDHELD WIRELESS DEVICES USING TIME-VARIABLE ENCRYPTION KEYS - In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as PDA, smartphone, cellular telephone or the like, characterized by a relatively robust data processing capability and a body mounted key generating component which is adapted to be mounted on an individual's body, in a permanent or semi-permanent manner, for wirleessly broadcasting, within the immediate proximity of the individual, a secret or private key identifying signal corresponding to a time variable secure key information under the control of the certification authority. The key identifying signal is generated in a format that facilitates secure wireless communication with the individual in accordance with a predetermined encryption algorithm including a PKI encryption algorithm. The disclosed system may be used with a console for coordinating access to a variety of different communication system and networks. | 2016-04-28 |
20160119150 | OUT-OF-BAND ENCRYPTION KEY MANAGEMENT SYSTEM - An encryption key management system includes an encryption IHS that is coupled to a network. The encryption key management system also includes a host processing system. An off-host processing system in the encryption key management system is coupled to the host processing system and is coupled to the encryption IHS through the network. The off-host processing system provides an encryption key request to the encryption IHS through the network, receives an encryption key from the encryption IHS through the network and stores the encryption key, provides the encryption key to the host processing system in response to authenticating a user, and revokes the encryption key in response to a revocation instruction received from the encryption IHS through the network. The providing the request, and the receiving, providing, and revoking the encryption key may be performed by the off-host processing system while the host-processing system is not in an operating mode. | 2016-04-28 |
20160119151 | METHOD AND SYSTEM FOR DETECTING MISBEHAVIOR FOR VEHICLE-TO-ANYTHING COMMUNICATION - A method for issuing a reliable certificate to a vehicle for a vehicle-to-anything (V2X) communication in a server on a network comprises receiving a certificate issue request including vehicle identification information and road-side unit (RSU) identification information from an RSU. Log information for the certificate issue request is extracted from a database. Normality or abnormality is determined according to whether a predetermined certificate issue criteria is satisfied by analyzing the certificate issue request and the log information. The certificate is issued and the certificate is transmitted to a vehicle communication module according to determination of normality, or certificate revocation information is registered according to determination of abnormality. | 2016-04-28 |
20160119152 | NON-DETERMINISTIC TIME GENERATION AND EVENT-ASSOCIATION SYSTEM - Occurrence of an event is detected within a device such as a computer, a communications device, a machine or process component. A non-deterministic time value (NDT) is requested for and associated with the detected event. Each NDT value is generated as a function of a calendar value created at time intervals as a root hash value of a distributed, hash-tree document authentication infrastructure. | 2016-04-28 |
20160119153 | Zero Standby Power for Powerline Communication Devices - An embodiment is an integrated System on Chip (SoC) including a communication interface configured to implement a communication protocol including functional blocks that are energized or de-energized individually so that a minimum power consumption is used to receive and detect a signal, and a receiver identification (ID) detection function configured to determine whether the signal is intended for the device in which the SoC resides. The SoC further includes a power management function configured to control which functions in the SoC and/or device in which the SoC resides are energized or de-energized depending on the results of the receiver ID detection function, and a power source capable of energizing a minimum number of the functional blocks required to receive and detect a signal, wherein the power source can be used in a low power state and switched over to a main power supply when the SoC is energized. | 2016-04-28 |
20160119154 | USAGE AND PERFORMANCE BASED BILLING - A network performance-based billing method of billing for a plurality of file transmissions over a network comprises (1) selecting one or more performance improvement features associated with a service; (2) selecting a performance level associated with a bucket size representing the maximum number of bytes that can be transferred at the selected performance level; (3) selecting one or more parameters associated with each selected performance improvement feature; (4) selecting a target performance level to achieve for a selected file transmission; and (5) adjusting the selected parameters at the selected file transmission to achieve the selected performance level, wherein the bucket level associated with the selected performance level is depleted by the size of the transmitted file. | 2016-04-28 |
20160119155 | ENGINE FOR PROCESSING CONTENT RULES ASSOCIATED WITH LOCATIONS IN A PAGE - A device, system, and method are directed towards enabling a network application to process and respond to requests from client devices. A rules engine receives a page, evaluates a set of rules, and performs actions based on the rules. Actions may modify the page or perform other actions affecting the environment. A rules engine may also process rules prior to processing pages, in order to optimize subsequent evaluation of the rules. | 2016-04-28 |
20160119156 | PROTOCOL INDEPENDENT MULTICAST SPARSE MODE (PIM-SM) SUPPORT FOR DATA CENTER INTERCONNECT - Techniques are described for utilizing Protocol Independent Multicast Sparse Mode (PIM-SM) to transport BUM (broadcast, unknown unicast, and multicast) traffic in a Virtual Extensible LAN (VXLAN) underlay of a data center, where the BUM traffic is received on active-active, multi-homed Ethernet virtual private network (EVPN) interconnects between multiple physical data centers. For example, the techniques may readily be applied to support usage of PIM-SM where provider edge (PE) routers of the EVPN operate as gateways between the EVPN and the VXLAN spanning the data center interconnect. | 2016-04-28 |
20160119157 | MIGRATING EMBMS INTO A CLOUD COMPUTING SYSTEM - A method is executed by a multimedia broadcast multicast services gateway (MBMS-GW) to offload data plane traffic, where the data plane traffic is enhanced MBMS (e MBMS) downlink traffic for a data plane interface Internet Protocol (IP) multicast transport between the MBMS-GW and an enhanced node B (e Node B). The method includes allocating an IP multicast address and a common tunnel endpoint identifier (C-TEID) for an MBMS session between node B (e Node B) and a broadcast multicast service center (BM-SC). The method also includes configuring the at least one network element to match an IP address and a user datagram protocol (UDP) port of incoming data plane traffic, to modify the IP address and UDP port to the IP multicast address and associated UDP port, and to push a general packed radio service (GPRS) tunneling protocol (GTP) user data (GTP-U) header including the C-TEID onto the data plane traffic. | 2016-04-28 |
20160119158 | Network and User Equipment for Handling MBMS MDT in Wireless Communication System - A method of handling a multimedia broadcast multicast service (MBMS) minimization of driver test (MDT) for a network of a wireless communication system includes transmitting a first MBMS measurement configuration to instruct a first user equipment (UE) to perform an MBMS MDT operation; receiving a first MBMS measurement result and a first multicast-broadcast single frequency network (MBSFN) area identity (ID) which indicates that the first MBMS measurement result is generated for a first MBSFN area identified by the first MBSFN area ID, from the first UE; and processing the first MBMS measurement result according to the first MBSFN area ID. | 2016-04-28 |
20160119159 | Bit Index Explicit Replication Forwarding Using Replication Cache - A data packet forwarding method including receiving, by a network node, a data packet that comprises a bit string, a BFIR identifier (ID), and a multicast replication path (MRP) ID, wherein the BFIR ID identifies an ingress network node for a multicast group, and wherein the MRP ID identifies the multicast group, identifying an entry in a BIER Replication Path Cache Table (BRCT) using the BFIR ID and the MRP ID, wherein the entry identifies a replication neighbor (NBR) list associated with the BFIR ID and the MRP ID, and forwarding the data packet in accordance with the replication NBR list. | 2016-04-28 |
20160119160 | CONTROL DEVICE, METHOD OF CONTROLLING THE SAME, AND INTEGRATED CONTROL SYSTEM - A control device, a method of controlling the same, and an integrated control system are provided. The method includes in response to a setting command being input, registering a setting state of at least one device connected to the control device at a time point when the setting command is input as a preferred setting state of the at least one device, and, in response to an execution command being input, transmitting a control command to the at least one device based on the registered preferred setting state. | 2016-04-28 |
20160119161 | SYSTEM AND METHOD OF PROVIDING CONTROL INFORMATION TO DEVICE REGARDING PRODUCT - Controlling a consumer electronic applicant through a mobile terminal to execute functionality appropriate for processing a consumer product is performed by obtaining a device specification of the consumer electronic device and product information on the product to be processed, and generating a command that controls the consumer electronic device to execute the appropriate functionality for processing the product. | 2016-04-28 |
20160119162 | METHOD FOR CONTROLLING AN HVAC SYSTEM USING A PROXIMITY AWARE MOBILE DEVICE - A mobile wireless device (e.g. smart phone) may be used to remotely control an HVAC system. A program code stored in the memory of the mobile wireless device may cause the mobile wireless device to store geographic information in the memory of the mobile wireless device, monitor a location of the mobile wireless device, and compare the stored geographic information to the location of the mobile wireless device. If the comparison meets predetermined criteria, the program code may cause the mobile wireless device to transmit a command either directly or indirectly to an HVAC controller, causing the HVAC controller to transition from a first operating state having a first temperature setpoint to a second operating state having a second temperature setpoint. | 2016-04-28 |
20160119163 | BILLING MULTIPLE PACKET FLOWS ASSOCIATED WITH A CLIENT ROUTER - A method includes receiving at a network device, an identifier from a vehicle routing device. The vehicle routing device is configured to identify packet data flows based on an application running on a vehicle client device. The packet data flows are flowing over a communication link between the vehicle routing device and the vehicle client device. The method includes identifying each packet of each flow according to the application that sends or receives packets related to each of the packet data flows, determining an extended header for the one or more packet data flows based on an Internet protocol version 6 (IPv6) extension header and a RADIUS vendor specific attributes (VSA) structure, and transmitting, by the vehicle routing device, to the network device, the extended header and the one or more packet data flows. | 2016-04-28 |
20160119164 | COMPONENT AND METHOD FOR MANAGING COMMUNICATION - A communication management component for organizing data exchanges between communicating devices of an Ethernet type network, the management component having interface means, distribution means adapted to acquire incoming data coming from each communicating device via interface means and to distribute it via the interface means to the other communicating devices, and processor means arranged to control the distribution means in such a manner that the incoming data coming from a sender device is distributed to the other devices, each communicating device in turn becoming the sender device in a first predefined sequence that is repeated cyclically. | 2016-04-28 |
20160119165 | METHODS AND SYSTEMS TO MANAGE NETWORK CONNECTIONS - Methods and systems to efficiently aggregate two or more access networks to form a virtual access network are disclosed. The resulting virtual access network is more resource-efficient, faster, more reliable, more secure, and provides more functionality than each individual access network. The virtual access network can be created by a client device that includes a client asset management module. The client asset management module can cooperate with a gateway access manager module of a gateway for creating and for operating the virtual access network. | 2016-04-28 |
20160119166 | METHOD AND APPARATUS FOR PROVIDING GATEWAY FUNCTION - Disclosed herein is a method and apparatus for providing a gateway function. The gateway function may be provided through interaction between a gateway and a server. In providing the gateway function, the gateway may provide a relatively lower layer, and the server may provide a relatively upper layer. The server may provide a gateway function in an NFV manner. The gateway may perform processing by calling a mapping function of the NFV type provided by the server. The server may be one of cloud servers providing an NFV pool. | 2016-04-28 |
20160119167 | DIVERSITY RECEPTION DEVICE, DIVERSITY RECEPTION METHOD, RECEPTION PROGRAM, AND RECORDING MEDIUM - A CFR estimation unit ( | 2016-04-28 |
20160119168 | COMMUNICATING THROUGH PHYSICAL VIBRATION - A data transmitter includes a vibration motor and a switch to regulate voltage from a direct-current (DC) power supply to the vibration motor. A microcontroller generates a pulse width modulation signal with which to drive the switch and regulate the voltage to the vibration motor in a sinusoidal manner, to generate data as symbols from vibrations that form a series of bits from the vibration motor. The microcontroller may also cancel and jam a sound of vibration (SoV) created by the vibration motor. A data receiver includes a vibration sensor to sample data from vibrations in an incoming signal at a predetermined sampling rate, and a microcontroller, coupled to the vibration sensor, to control the sampling rate through an inter-integrated circuit (I2C) protocol or the like. A memory card, coupled to the microcontroller, stores the data with a serial peripheral interface (SPI) protocol or the like. | 2016-04-28 |
20160119169 | APPARATUSES AND METHODS FOR ADDING OFFSET DELAYS TO SIGNAL LINES OF MULTI-LEVEL COMMUNICATION ARCHITECTURES - Apparatuses and methods for adding offset delays to signal lines of multi-level communication architectures are disclosed herein. An example method may include comparing a current channel state of a channel of a multi-level communication bus with a next channel state of the channel. The example method may further include, based on the comparison, applying an offset delay to a control signal configured to control transition of a signal line of the channel from a value associated with the current channel state to a value associated with the next channel state. The example method may further include after application of the offset delay, driving the signal line to the value associated with the next channel state responsive to the control signal. | 2016-04-28 |
20160119170 | HOLEVO CAPACITY ACHIEVING JOINT DETECTION RECEIVER - An optical receiver may include a unitary transformation operator to receive an n-symbol optical codeword associated with a codebook, and to perform a unitary transformation on the received optical codeword to generate a transformed optical codeword, where the unitary transformation is based on the codebook. The optical receiver may further include n optical detectors, where a particular one of the n optical detectors is to detect a particular optical symbol of the transformed optical codeword, and to determine whether the particular optical symbol corresponds to a first optical symbol or a second optical symbol. The optical receiver may also include a decoder to construct a codeword based on the determinations, and to decode the constructed codeword into a message using the codebook. The optical receiver may attain superadditive capacity, and, with an optimal code, may attain the Holevo limit to reliable communication data rates. | 2016-04-28 |
20160119171 | System and Method for Wireless Communication Using Space-Time Block Code Encoding - An embodiment provides a method for wireless communications including an access point (AP) space-time block code (STBC) encoding a high efficiency wireless local area network (WLAN) (HEW) signal A (SIGA) fields, and transmitting a preamble comprising a duplicate stream portion including a repeated legacy long training field, and comprising a two-stream portion including the STBC-encoded HEW SIGA fields. In further embodiments, the method includes the duplicate stream portion including a pair of SIG-LTFs (or alternatively a compressed SIG-LTF) which is used for channel estimation and auto-detection. | 2016-04-28 |
20160119172 | PEAK SUPPRESSION DEVICE - A peak suppression device includes an acquiring unit that acquires multiple envelopes of carrier signals that are included in a multicarrier signal, an adding unit that adds the envelopes to generate a combined envelope, a detecting unit that detects a peak value and a peak timing of the multicarrier signal by using the combined envelope, and a suppressing unit that suppresses a peak of the multicarrier signal in accordance with the peak value and the peak timing. | 2016-04-28 |
20160119173 | Compressed Feedback Format for WLAN - Channel data for a plurality of OFDM tones for one or more spatial or space-time streams are determined. A plurality of angle values associated with the one or more spatial or space-time streams and the one or more OFDM tones of the plurality of OFDM tones are determined. For each of the one or more spatial or space time streams, a per-tone signal to noise ratio (PT-SNR) associated with one or more OFDM tone of the plurality of OFDM tones is determined, and an average signal to noise ratio (avg-SNR) is determined by averaging signal to noise ratio (SNR) values corresponding to one or more OFDM tones of the plurality of OFDM tones. A feedback report is generated to include at least i) the plurality of angle values, ii) the PT-SNRs, and iii) the avg-SNR. | 2016-04-28 |
20160119174 | Method and Apparatus for Identifying Channel Bandwidth and Channel Offset of an Orthogonal Frequency Division Multiplexing Signal - Methods, apparatuses and systems for identifying a channel bandwidth and channel offset of an orthogonal frequency division multiplexing (OFDM) signal. The OFDM signal is received by a receiver apparatus that may be tuned to RF bandwidth of 20 MHz, 40 MHz or 80 MHz. The method utilized by the apparatus includes identifying the location of the primary channel and subsequently determining a sequence of equalized frequency domain sub-symbols of the signal field in the lower and the upper frequency band. Further, a cross-correlation between the sequence of equalized frequency domain sub-symbols is computed along with the computing energy of the sequence of equalized frequency domain sub-symbols. Finally, the cross-correlation and the computed energy are compared for identifying the channel offset and the channel bandwidth. | 2016-04-28 |
20160119175 | TELECOMMUNICATION SIGNALING USING NONLINEAR FUNCTIONS - One exemplary embodiment can describe a method for communicating. The method for communicating can include a step for identifying characteristics of a communications channel, a step for identifying a set of nonlinear functions used to generate waveforms, a step for assigning a unique numeric code to each waveform, a step for transmitting a numeric sequence as a series of waveforms, a step for receiving the series of waveforms, and a step for decoding the series of waveforms. | 2016-04-28 |
20160119176 | APPARATUS FOR TRANSMITTING BROADCAST SIGNALS, APPARATUS FOR RECEIVING BROADCAST SIGNALS, METHOD FOR TRANSMITTING BROADCAST SIGNALS AND METHOD FOR RECEIVING BROADCAST SIGNALS - The present invention provides a method of transmitting broadcast signals. The method includes, processing input streams into plural PLPs; encoding data of the each PLPs according to code rates, wherein the encoding data of the each PLPs further includes, encoding data of at least one PLP with LDPC codes, bit interleaving the LDPC encoded data of the PLP, mapping the bit interleaved data onto a set of constellations according to the code rate, MIMO encoding the mapped data, and time interleaving the MIMO encoded data; building at least one signal frame by mapping the encoded data of the each PLPs; and modulating data in the built signal frame by OFDM method and transmitting the broadcast signals having the modulated data, wherein the bit interleaved data of each PLPs are mapped by using either QAM, NUQ, or NUC. | 2016-04-28 |
20160119177 | Semi-Polar Modulator - A modulation processor ( | 2016-04-28 |
20160119178 | METHOD AND SYSTEM FOR RECOGNIZING RADIO LINK FAILURES ASSOCIATED WITH HSUPA AND HSDPA CHANNELS - A method and system for detecting radio link (RL) failures between a wireless transmit/receive unit (WTRU) and a Node-B are disclosed. When signaling radio bearers (SRBs) are supported by high speed uplink packet access (HSUPA), an RL failure is recognized based on detection of improper operation of at least one of an absolute grant channel (AGCH), a relative grant channel (RGCH), a hybrid-automatic repeat request (H-ARQ) information channel (HICH), an enhanced uplink dedicated physical control channel (E-DPCCH) and an enhanced uplink dedicated physical data channel (E-DPDCH). When SRBs are supported by high speed downlink packet access (HSDPA), an RL failure is recognized based on detection of improper operation of at least one of a high speed shared control channel (HS-SCCH), a high speed physical downlink shared channel (HS-PDSCH) and a high speed dedicated physical control channel (HS-DPCCH). | 2016-04-28 |
20160119179 | Transparent PSTN Failover - Novel tools and techniques for implementing Transparent PSTN Failover. In some embodiments, a VoIP switch might receive a call request for connection between a calling party at a calling telephone number (“TN”) and a called party at a called TN. Based on a determination that connection via a session border controller (“SBC”) between the VoIP switch and an Internet Protocol (“IP”) gateway has been lost, the VoIP switch might route the call request to a PSTN redirect TN through the PSTN. One of the Class 5 switch of the PSTN or the IP gateway might replace the redirect TN with the called TN, based on a determination that the redirect TN represents a PSTN failover. The IP gateway may then route the call request to an IP PBX for terminating (establishing) the call connection between calling party and called party, without interception by an operator, receptionist, or auto attendant. | 2016-04-28 |
20160119180 | RETRIEVING CONSOLE MESSAGES AFTER DEVICE FAILURE - A service controller of a computing device can store console messages so that an external management device can retrieve the console messages after a malfunction or crash of the computing device. For example, the service controller can be configured to redirect serial output (e.g., console messages, system log messages, system error message, etc.) to a network interface controller for transmission over a network connection. The service controller can be configured to store the console messages in non-volatile memory of the service controller. The service controller can receive a request for the stored console messages and transmit the stored console messages to an external device. | 2016-04-28 |
20160119181 | NETWORK STATE MONITORING SYSTEM - In a device monitoring system for a communication network, an SNMP monitor acquires state information of devices to be monitored from a group under monitoring, and monitors the states of the devices to be monitored. A command monitor uses a monitor command to acquire the state information of the devices to be monitored. A monitor manager checks monitoring conditions of the devices to be monitored by the SNMP monitor, and sets, if there is a device to be monitored from which state information has failed to obtain, the device as a new target for monitoring and causes the command monitor to transmit a monitor command. The monitoring result is updated by the state information acquired by the command, thereby improving the reliability of failure monitoring. | 2016-04-28 |
20160119182 | MONITORING INTERNET USAGE ON HOME NETWORKS OF PANELIST USERS - The present disclosure relates generally to monitoring internet usage on home networks of panelist users. One examples method includes after determining that a user has accepted an offer to modify a home network of the user to monitor network traffic generated by devices connected to the home network, identifying a gateway device on the home network configured to receive network traffic from devices connected to the home network and communicate with an external network on behalf of the devices; determining that the gateway device is operable to be modified over the home network to include a monitoring application; and in response to determining that the gateway device is operable to be modified, modifying the gateway device over the home network to include the monitoring application. | 2016-04-28 |
20160119183 | SYSTEM AND METHOD FOR MASTER SWITCH ELECTION - A system and method for electing a master switch includes a management port for coupling a first switch to a management system, a plurality of stacking ports for coupling the first switch to other switches in a stacked switch, and a control unit. The control unit detects one or more first connectivity settings of the management port, exchanges the first connectivity settings with the other switches using at least one of the stacking ports, exchanges second connectivity settings for the other switches using the stacking ports, and elects a master switch for the stacked switch based on the first and second connectivity settings. In some embodiments, the control unit further receives a first management configuration from the management system, exchanges the first management configuration with the other switches, exchanges second management configurations of the other switches, and further elects the master switch based on the first and second management configurations. | 2016-04-28 |
20160119184 | DYNAMICALLY RECONFIGURABLE RADIO AIR INTERFACE FOR COMMUNICATING OVER A MESH NETWORK AND A WIDE AREA NETWORK - Methods, apparatus, and systems for wireless communication are provided. A method for wireless communication using a single radio air interface includes configuring a radio air interface of a first device to operate in accordance with a first variant of resource-spread multiple access technology, communicating wirelessly from a first device to a base station of a wide area network using the first variant of resource-spread multiple access technology, reconfiguring the radio air interface to operate in accordance with a second variant of resource-spread code division multiple access technology, and communicating wirelessly with a second device in a mesh network subsequent to reconfiguring the radio. The first device and the second device communicate wirelessly at power levels below a power level threshold selected to cause the base station to ignore transmissions between the first device and the second device. | 2016-04-28 |
20160119185 | SYSTEM AND METHOD FOR CONFIGURATION OF NETWORK-CAPABLE APPLIANCES - A controlling device is used to configure a target device for wireless network communications through use of a setup wizard. The setup wizard is used to obtain information required to perform communications on a wireless network via a wireless network router and a digital representation of the information obtained through use of the setup wizard is provided to the target device via use of the controlling device. The target device will use the digital representation of the information to configure itself for wireless network communications. | 2016-04-28 |
20160119186 | ZERO-CONFIGURATION NETWORKING PROTOCOL - According to an example, a network device serving as a monitoring device for a zero-configuration network protocol is in a subnet in a network including multiple subnets. The monitoring device may receive and update a service in another subnet that is notified by a manager. Also, the monitoring device may respond to a query for the service from a terminal in the subnet when the queried service is in another subnet. | 2016-04-28 |
20160119187 | MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS - Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to a border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network. | 2016-04-28 |
20160119188 | END HOST PHYSICAL CONNECTION ON A SWITCH PORT USING MULTIPLE ETHERNET FRAMES - Machine logic (for example, software) that performs the following steps: (i) providing a system including a first hypervisor and a first topology agent; (ii) running the topology agent on the hypervisor; (iii) dynamically creating a first unique address for the first topology agent; and (iv) storing the first unique address in a set of forwarding database (FDB) table(s) located on a set of network switch(es). Also, lightweight mechanisms on network switches for finding and/or clearing media access controller (MAC) addresses from FDB tables. | 2016-04-28 |
20160119189 | SYSTEM FOR CONTROLLING CARRIER VIRTUAL NETWORK - A system for controlling a carrier virtual network is disclosed. The system includes at least one virtual network controller for controlling resources of a carrier virtual network based on customer request information received from a customer network controller, and at least one physical network controller for controlling resources of a carrier physical network based on a service profile received from the at least one virtual network controller. The at least one virtual network controller interworks with the at least one physical network controller in a one to one, one to N (N is an integer equal to or larger than 2), or N to one correspondence. | 2016-04-28 |
20160119190 | TRANSPARENT MIDDLEBOX GRACEFUL ENTRY AND EXIT - Middleboxes include a processor configured to determine that a network connection between a client device and a server device is idle. A connection table is configured to create a first connection entry at the middlebox for the client device and a second connection entry at the middlebox for the server device. The first and second connection entries are initialized after determining that the network connection between the client device and the server device is idle. A network control module is configured to activate redirection of the network connection between the client device and the server device to the middlebox after determining that the network connection between the client device and the server device is idle. | 2016-04-28 |
20160119191 | METHOD FOR SIMULATING A COMMUNICATION SYSTEM, SIMULATION SYSTEM FOR A COMMUNICATION SYSTEM AND COMPUTER PROGRAM - A method for simulating a communication system, and simulation system for a communication system and computer program, the communication system having a communication protocol which regulates a communication between at least two transmitter-receivers of the communication system via a common communication channel in such a way that a first transmitter-receiver transmits a data packet only when no use of the communication channel by a second transmitter-receiver is indicated to the first transmitter-receiver, includes sending a data packet by at least the first transmitter-receiver via the common communication channel even when at least the second transmitter-receiver is using the communication channel. | 2016-04-28 |
20160119192 | MANAGEMENT SYSTEM THAT MANAGES COMPUTER SYSTEM - A management system displays a list of elements of some element types from among a plurality of element types, and receives a selection of the two or more elements from the list. The management system displays a topology which is configured of the two or more selected elements and an element (related element) related to the two or more selected elements and in which the two or more selected elements and the related element are segmented by element types. | 2016-04-28 |