01st week of 2022 patent applcation highlights part 67 |
Patent application number | Title | Published |
20220006612 | SM3 HASH ALGORITHM ACCELERATION PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS - A processor includes a decode unit to decode an SM3 two round state word update instruction. The instruction is to indicate one or more source packed data operands. The source packed data operand(s) are to have eight 32-bit state words A | 2022-01-06 |
20220006613 | SECURE SECRET RECOVERY - A secret is sliced into a number of encrypted slices. The encrypted slices can be distributed amongst members of a group. The encrypted slices make recovery of the secret possible, but a group authority key is required for decryption. Thus, a number of slices are necessary, but still not sufficient, to recover the secret. | 2022-01-06 |
20220006614 | SECRET SIGMOID FUNCTION CALCULATION SYSTEM, SECRET LOGISTIC REGRESSION CALCULATION SYSTEM, SECRET SIGMOID FUNCTION CALCULATION APPARATUS, SECRET LOGISTIC REGRESSION CALCULATION APPARATUS, SECRET SIGMOID FUNCTION CALCULATION METHOD, SECRET LOGISTIC REGRESSION CALCULATION METHOD, AND PROGRAM - A technique for performing secure computation of a sigmoid function with high speed and precision is provided. A secret sigmoid function calculation system is a system, in which g(x) is assumed to be a secure computable function, which calculates, from a share [[x]] of an input value x, a share [[σ′(x)]] of a value of a sigmoid function for the input value x, and includes: a first comparing means that generates a first comparison result [[c]]=less_than([[x]], t | 2022-01-06 |
20220006615 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR DISTRIBUTING SHARES OF DIGITALLY SIGNED DATA - A computer-implemented method of distributing a shared secret, such as a transaction on the Bitcoin blockchain among a plurality of participants is disclosed. The method comprise a mapping step wherein a plurality of inputs to the mapping step are mapped to respective elliptic curve points of an elliptic curve of an elliptic curve cryptography system common to the participants. In a first encryption step, a plurality of said elliptic curve points are encrypted by means of a public key of a public-private key pair of the elliptic curve cryptography system to provide an output adapted to be decrypted by means of the corresponding private key of the public-private key pair, and in a second encryption step wherein a plurality of parts of at least one input to said second encryption step are multiplied by respective terms of a series known to said participants. In a secret sharing step a plurality of shares of an input to said secret sharing step are distributed to a plurality of said participants such that said input is accessible to a threshold number of said shares and is inaccessible to less than said threshold number of said shares. | 2022-01-06 |
20220006616 | DISTRIBUTED ANONYMIZED COMPLIANT ENCRYPTION MANAGEMENT SYSTEM - A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key. | 2022-01-06 |
20220006617 | METHOD AND APPARATUS FOR DATA STORAGE AND VERIFICATION - Disclosed are data storage and verification methods and a device executable in a trusted execution environment. The data storage method comprises: encrypting, using a first key, user data and version information of the user data to generate first ciphertext, and storing the first ciphertext into a general storage space (S | 2022-01-06 |
20220006618 | SYSTEM GENERATED DATA SET ENCRYPTION KEY - Generating unique data encryption keys for a data set, by allocating a data set associated with a security policy, where the security policy specifies a key encryption key (KEK) label, retrieving the KEK label from the security policy, storing the KEK label as metadata of the data set, opening the data set for a first time write, generating a data encryption key (DEK), retrieving a KEK from a key store according to the KEK label, encrypting the DEK using the KEK, storing the encrypted DEK as metadata of the data set, and encrypting the data set using the DEK. | 2022-01-06 |
20220006619 | ENCRYPTION KEY MANAGEMENT FOR AN AUTOMATED WORKFLOW - Media, system, and method for providing encryption key management to an automated workflow within a group-based communication system. The automated workflow is encrypted using an organization-specific encryption key and is stored in a data store. Responsive to a triggering event, the encrypted workflow is retrieved from the data store to be decrypted and a corresponding decryption key is retrieved from a key store. The decrypted workflow performs a series of steps responsive to determining that a trigger condition has been met. The steps may be associated with at least one of sending a form and sending a message to a user within the group-based communication system. | 2022-01-06 |
20220006620 | NETWORK BOUND ENCRYPTION FOR RECOVERY OF TRUSTED EXECUTION ENVIRONMENTS - The technology disclosed herein provides network bound encryption that enables a trusted execution environment to persistently store and access recovery data without persistently storing the decryption key. An example method may include: establishing a trusted execution environment in a first computing device, the trusted execution environment comprising an encrypted memory area; loading cryptographic key data of a second computing device and executable code into the trusted execution environment; transmitting combined key data that is based on the cryptographic key data to a third computing device; deriving a cryptographic key from combined key data received from the third computing device, the received combined key data being based on the cryptographic key data of the second computing device and cryptographic key data of the third computing device; and causing the trusted execution environment to execute the executable code and use the cryptographic key to access sensitive data on a persistent storage device. | 2022-01-06 |
20220006621 | MULTI-FACTOR-PROTECTED PRIVATE KEY DISTRIBUTION - The present invention provides methods, systems and computer program products (software) for the reliable, attack-resistant authentication of a network-connected user to a network-connected service provider. | 2022-01-06 |
20220006622 | CONNECTED SECURE KEY REDISTRIBUTION SYSTEM AND METHOD - In one embodiment, a method for securely distributing secret keys for hardware devices is disclosed. A distributor server transmits to a provider server an order for hardware devices. Each hardware device has a unique identifier and at least one secret key for authentication. The provider server sends a database associated with the distributor, for each of the hardware devices, the unique identifier and an unencrypted version of the at least one secret key. In response to an order received by the distributor from a customer for a portion of the hardware devices, the distributor server provides the database the unique identifiers and an associated customer order identifier, and the distributor server provides a customer server the unique identifiers. In response to the customer logging into the database and providing the order information, the database provides the customer the unencrypted keys for the hardware devices to allow authentication. | 2022-01-06 |
20220006623 | SYSTEMS AND METHODS FOR SELECTIVE ACCESS TO LOGS - Systems are provided for managing access to a log of dataset that is generated when the dataset is accessed. A system stores, with respect to each of a log producer and a log accessor, an encrypted symmetric key for dataset that is encrypted using a corresponding public key. The system returns the encrypted symmetric key for the log producer, such that the log producer can decrypt the dataset that is encrypted using the symmetric key. A log of the dataset is generated when the log producer accesses the dataset. | 2022-01-06 |
20220006624 | User Terminal, Permission Information Management Method, and Permission Information Management Program - A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after electronically signing the permission request with a secret encryption key, and acquires, from permission information transmitted from a right-holder terminal, a content decryption key by using a secret decryption key of the second key pair and uses the content. The right-holder terminal stores a third key pair and the content decryption key, verifies the permission request received, and encrypts the content decryption key by using the public encryption key of the second key pair included in the permission request and transmits the permission information including the encrypted content decryption key after electronically signing the permission information with a secret encryption key of the third key pair. The permission request and the permission information are transmitted and received via a blockchain. | 2022-01-06 |
20220006625 | Secure Firmware Transfer for an Integrated Universal Integrated Circuit Card (iUICC) - A device can (i) operate a primary platform (PP) within a tamper resistant element (TRE) and (ii) receive encrypted firmware images for operating within the primary platform. The TRE can store in nonvolatile memory of the TRE (i) a PP static private key (SK-static.PP), (ii) a server public key (PK.IDS1), and (iii) a set of cryptographic parameters. The TRE can generate a one-time PKI key pair of SK-OT1.PP and PK-OT1.PP and send the public key PK-OT1.PP to a server. The TRE can receive a one-time public key from the server comprising PK-OT1.IDS1. The TRE can derive a ciphering key using an elliptic curve Diffie Hellman key exchange and the SK-static.PP, SK-OT1.PP, PK.IDS1, and PK-OT1.IDS1 keys. The TRE can decrypt the encrypted firmware using the derived ciphering key. The primary platform can comprise a smart secure platform (SSP) and the decrypted firmware can comprise a virtualized image for the primary platform. | 2022-01-06 |
20220006626 | CHANNEL KEY LOADING IN A COMPUTING ENVIRONMENT - Aspects of the invention include channel key loading of a host bus adapter (HBA) based on a secure key exchange (SKE) authentication response by a responder node of a computing environment. A non-limiting example computer-implemented method includes receiving an authentication response message at an initiator channel on an initiator node from a responder channel on a responder node to establish a secure communication, the receiving at a local key manager (LKM) executing on the initiator node. A state check can be performed based on a security association of the initiator node and the responder node. An identifier of a selected encryption algorithm can be extracted from the authentication response message. The initiator channel can request to communicate with the responder channel based at least in part on a successful state check and the selected encryption algorithm. | 2022-01-06 |
20220006627 | QUANTUM KEY DISTRIBUTION NODE APPARATUS AND METHOD FOR QUANTUM KEY DISTRIBUTION THEREOF - A quantum key distribution (QKD) node apparatus and a QKD method therein. The QKD node apparatus may include a QKD module for generating quantum keys and quantum key IDs, a quantum key synchronization management module for storing the quantum keys and the quantum key IDs as outbound and inbound quantum keys in a distributed manner and sharing the outbound and inbound quantum keys with a second QKD node apparatus, and a quantum key orchestration module for delivering a master key and a master key ID to a secure application connected therewith in response to a request for the master key with the ID of a second secure application and delivering a packet including the master key encrypted with the outbound quantum key shared with the second QKD node apparatus, the master key ID, and a quantum key ID, to the second QKD node apparatus. | 2022-01-06 |
20220006628 | GENERATING A KEY AT A DEVICE BASED ON A MEMORY OF THE DEVICE - An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device. | 2022-01-06 |
20220006629 | Secure Analytics Using Term Generation and Homomorphic Encryption - Provided are methods and systems for performing secure analytics using term generations and a homomorphic encryption. An example method includes receiving, by at least one server from a client, a term generation function, a hash function, a public key of a homomorphic encryption scheme, and a homomorphically encrypted list of indices, wherein the list of indices is generated using the term generation function and the hash function, applying, by the server, the term generation function, the hash function, and the public key to a data set to determine a further homomorphically encrypted list of indices, extracting, by the server and using the homomorphically encrypted list of indices and the further homomorphically encrypted list of indices, data from the encrypted data set to obtain an encrypted result, and sending the encrypted result to the client to decrypt the encrypted result using a private key of the homomorphic encryption scheme. | 2022-01-06 |
20220006630 | LOW OVERHEAD SIDE CHANNEL PROTECTION FOR NUMBER THEORETIC TRANSFORM - An apparatus comprises an input register comprising an input polynomial, a processing datapath communicatively coupled to the input register comprising a plurality of compute nodes to perform a number theoretic transform (NTT) algorithm on the input polynomial to generate an output polynomial in NTT format. The plurality of compute nodes comprises at least a first butterfly circuit to perform a series of butterfly calculations on input data and a randomizing circuitry to randomize an order of the series of butterfly calculations. | 2022-01-06 |
20220006631 | Policy Based Authentication - Methods and systems for expedited authentication for mobile applications are described herein. A user of a mobile device may authenticate with an enterprise system, and thereby be granted access to enterprise applications and services on the mobile device. The user may then activate an application in a managed partition of the mobile device. The application may determine that the enterprise system supports expedited authentication. The application may request expedited authentication, and the request may be compared to policies for expedited authentication. If the request is permitted, the application may be granted access to an authorization code for expedited authentication. The application may then perform the expedited authentication, and the user may be granted access to the application when the expedited authentication has completed. | 2022-01-06 |
20220006632 | INFORMATION VERIFICATION METHOD, APPARATUS, AND DEVICE - Implementations of the present specification disclose an information verification method, apparatus, and device. The method includes: receiving a communication verification request of a user; obtaining first biometric feature data inputted by the user, and performing biometric feature verification on the user based on the first biometric feature data; obtaining pre-stored benchmark biometric feature data of the user if the biometric feature verification on the user succeeds, and sending first check information corresponding to the benchmark biometric feature data and a target token corresponding to a pre-stored communication account of the user to a serving end, so that the serving end determines a verification result of the communication account based on the first check information, the target token, and second check information that corresponds to the pre-stored benchmark biometric feature data of the user; and receiving the verification result sent by the serving end, and determining, based on the verification result, whether the communication account of the user is abnormal. | 2022-01-06 |
20220006633 | CURABLE COMPOSITIONS FOR CURED-IN-PLACE PIPES - Disclosed is a curable composition with enhanced curing time at ambient temperatures, the curable composition including (a) a resin, e.g., 4,4′-isopropylidenediphenol-epichlorohydrin copolymer and (b) one or more curing agents, wherein a ratio of a weight percentage of the resin to a weight percentage of the curing agent or curing agents is from about 12:1 to about 15:1. Also disclosed is a method of curing a cured-in-place liner, wherein the cured-in-place liner contains the above curable composition. | 2022-01-06 |
20220006634 | DECENTRALIZED DATA AUTHENTICATION - Disclosed are various embodiments for decentralizing the authentication or verification of data. An identity key can be generated for a data item. A request can then be sent to an authentication provider for authentication of the data item, the request comprising the identity key and the data item. A verified claim for the data item can then be received in response. Subsequently, an identity document is generated, the identity document comprising the identity key for the data item and the verified claim. Finally, the identity document can be stored in a distributed ledger. | 2022-01-06 |
20220006635 | GEOSPATIAL-TEMPORAL PATHOGEN TRACING IN ZERO KNOWLEDGE - Techniques for geospatial-temporal pathogen tracing in zero knowledge include: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; transmitting, by the first user device, first publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry; and applying at least the first publicly verifiable exposure data and second publicly verifiable exposure data to a machine learning model, to obtain actionable intelligence associated with the pathogen. | 2022-01-06 |
20220006636 | TOKEN PROCESSING WITH SELECTIVE DE-TOKENIZATION FOR PROXIMITY BASED ACCESS DEVICE INTERACTIONS - A method includes providing an initial communication, by an access device to a user device. The access device can receive the user identifier and the access token and receive a secret associated with the user. The access device can determine, using the user identifier and/or the access token, if the transaction is authorized by an authorizing entity computer associated with the access device or by an authorizing entity not associated with the access device. If the transaction is authorized by the authorizing entity computer associated with the access device, the access device can transmit an authorization request message comprising the user identifier, the secret, and the access token to the authorizing entity computer. The authorizing entity computer validates the secret, retrieves a real credential of the user using the user identifier, and authorizes the transaction. | 2022-01-06 |
20220006637 | FILE SYSTEM SUPPORTING REMOTE ATTESTATION-BASED SECRETS - An operating system kernel receives a request from an application to access a secret, the application and the operating system kernel executing in a first trust domain; and an attestation-based secrets manager receives the request from the operating system kernel, validates the request using remote attestation, gets the secret from a secure storage in the second trust domain when the request is validated, and sends the secret from the second trust domain to the operating system kernel, the attestation-based secrets manager executing in a second trust domain; wherein the operating system kernel then sends the secret to the application. | 2022-01-06 |
20220006638 | BLOCK CHAIN PROOF FOR IDENTIFICATION - Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise. | 2022-01-06 |
20220006639 | INFORMATION PROCESSING PROGRAM, DEVICE, AND METHOD - A non-transitory recording medium storing an information processing program executable by a computer to perform a process, the process comprising: executing an authenticity check of written document data in a case in which a request for an authenticity check of the written document data has been received from a requesting party; transmitting an inquiry result from the authenticity check to the requesting party; storing information regarding the requesting party and identification information for the written document data in association with each other in a first storage section, in response to either the authenticity check request from the requesting party or transmission of the authenticity check inquiry result to the requesting party; and notifying an issuing party of the written document data, as pre-stored in a second storage section, of information regarding the requesting party associated with the written document data identification information. | 2022-01-06 |
20220006640 | BLOCKCHAIN WITH NON-TURING COMPLETE SYSTEM GUARDS - A system manages blockchain transactions through the use of guards and sentinels. Guards process data prior to the data's commitment to the blockchain by enforcing schema and access controls. Guards also send invalidation messages when a change to the blockchain invalidates a sentinel's view of what is true about the blockchain. Sentinels provide an interface to the blockchain for users and applications to develop data and queries to the blockchain, via in some embodiments, an application program interface. Sentinels also receive invalidation messages and take steps to determine the new state of the blockchain and take any additional actions responsive to the change. These actions may include complex responses involving, in some cases, addition of new blocks to the blockchain. Data additions proposed by a sentinel are still checked by the guards for conformance to establish rules and access controls. | 2022-01-06 |
20220006641 | Distribution of Blockchain Validation - A blockchain environment may accumulate Merkle values calculated by individual nodal machines. Any nodal machine (such as a miner system) need only be sent Merkle child values as inputs. The nodal machine may then determine a hierarchical Merkle value based only on the Merkle child values provided as the inputs. Because the nodal machine only requires the Merkle child values, the nodal machine is relieved from downloading/storing an entire blockchain. The nodal machine need only download the piece, segment, or portion of interest, which consumes far less memory byte space and requires far less processor time/tasks/cycles/operations. Moreover, because each nodal machine only needs to download a small block/byte portion of the blockchain, network packet traffic is greatly reduced. | 2022-01-06 |
20220006642 | SYSTEM AND METHOD FOR CONTENT STORAGE AND OWNERSHIP VERIFICATION - A method that ensures validity, reliability, preservation, and accessibility of data and its related metadata for an underlying asset or project using blockchain technology, specifically non-fungible tokens, the modern cloud, and cryptography. | 2022-01-06 |
20220006643 | MAC TAG LIST GENERATION APPARATUS, MAC TAG LIST VERIFICATION APPARATUS, AGGREGATE MAC VERIFICATION SYSTEM AND METHOD - A MAC tag list generation apparatus, on reception of a nonce N unique value to each MAC generation process and a message M, generates a t×m group test matrix H serving as combinatorial group testing parameters for s (a positive integer) which is the number of the MACs to be generated, generates a MAC tag list T=(T[1], . . . , T[t]) by generating a MAC value T[i] corresponding to the i-th test (i=1, . . . , t) using the group test matrix H, the nonce N, and pseudorandom functions F and G with variable length input and fixed length output for the message M, and outputs the MAC tag list. | 2022-01-06 |
20220006644 | METHODS AND DEVICES FOR PROVIDING MESSAGE AUTHENTICATION CODE SUITABLE FOR SHORT MESSAGES - This application relates to devices and methods of authenticating messages exchanged over a network between a transmitter and a receiver, the method comprising: at a transmitter side, for transmitting a message, generating a truncated MAC code by selecting or generating predetermined bits from a message authentication code (MAC) computed over a concatenation of a predetermined part of the message with at least one predetermined part of a previously transmitted message; wherein a bitlength of truncated MAC code is smaller than a bitlength of the message authentication code (MAC) appending the truncated MAC code to the message for transmission; at a receiver side, for authenticating a message, receiving a previously transmitted message, the message and the truncated MAC code, generating an expected truncated MAC code by selecting or generating predetermined bits from a message authentication code (MAC) computed over a concatenation of a predetermined part of the message with at least one predetermined part of a previously transmitted message; authenticating the message and the previously transmitted message if the truncated MAC code as received is identical to the expected truncated MAC code. | 2022-01-06 |
20220006645 | POST-QUANTUM SECURE LIGHTEIGHT INTEGRITY AND REPLAY PROTECTION FOR MULTI-DIE CONNECTIONS - An apparatus includes a first integrated circuit disposed on a first die, a second integrated circuit disposed on a second die, an interconnect to provide a communication connection between the first die and the second die. The first die comprises a processing circuitry to generate a first message authentication code (MAC) tag using a first message data to be communicated from the first die to the second die and a first cryptographic key, and transmit the first message data and the first MAC tag to the second die via the interconnect. | 2022-01-06 |
20220006646 | SYSTEM AND METHOD FOR GENERATING CURRENT LIVE AND TEST VERSIONS OF DNS DATA FOR ROLLOVER - A method for concurrently publishing a current version of a plurality of Domain Name System (DNS) records for zone of a domain name and for storing a next version of the plurality of DNS records for the zone, the method comprising the steps of: obtaining selected data of registry data associated with the domain name stored in a registry database; digitally signing the registry data to generate a first signed DNS record and digitally signing the registry data to generate a second signed DNS record; and a distribution system for coordinating concurrent generation and transmission of the current version and the next version; the distribution system and signing system cooperating to: a) generate the current version to include the first signed DNS record; and b) while the current version is operational in the DNS, generate the next version the second signed DNS record. | 2022-01-06 |
20220006647 | ANONYMOUS SERVICE ACCESS - A method of operating a service provider server and a computing device to provide anonymous service access. For the service provider server, the method comprises: receiving a service message from a computing device; and determining whether to send a service response message, and if so sending a service response message. The service message includes a pseudonym associated with the computing device, service data and a signature on the pseudonym generated by either the service provider server or an identity manager. The service response message is broadcast by the service provider server or transmitted to the identity manager. | 2022-01-06 |
20220006648 | CONTRACT APPARATUS AND METHOD OF BLOCKCHAIN USING DIGITAL CONTENTS ORGINAL KEY - Disclosed are blockchain type contract terminal and method using a digital contents original confirmation key. There are provided: an input module that is inputted with a contract term regarding an object of contract; a position information collection module that collects, in real time, position information of the object at the time of contract; a contract creation module that creates a contract by using the contract term inputted by the input module and the position information at the time of contract collected in real time by the position information collection module; a digital contents original confirmation key interface module that provides the contract term inputted by the input module and the position information at the time of contract collected in real time by the position information collection module to a contents initializer and an international authentication adjustment server, and receives a digital contents original confirmation key from the contents initializer or the international authentication adjustment server; a digital contents original contract creation module that combines the digital contents original confirmation key received at the digital original confirmation key interface module with the contract created at the contract creation module to create a digital contents original contract; a blockchain creation module that encrypts the contract created by the digital contents original contract creation module to create a blockchain; and a blockchain distributed storage control module that transmits the blockchain created at the blockchain creation module to another terminal in a P2P manner for storing on a network in a distributed manner. | 2022-01-06 |
20220006649 | RECEIVING INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK - The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly. | 2022-01-06 |
20220006650 | SECURE DEVICE COMMUNICATION - The present disclosure includes secure device communication. An embodiment includes a processing resource, a memory, and a network management device communication component configured to, send public information to a network attached device communication component, and receive a network attached device public key and an encrypted random string value from the network attached device communication component. The network attached device public key and the random string value are received independent of a type of the network attached device communication component due to the public information. The network management communication component is further configured to decrypt the random string value from the network attached device communication component and send, to the network attached device communication component, a message and a signature to authenticate independent of the type of the network attached device communication component due to the public information. | 2022-01-06 |
20220006651 | METHODS AND SYSTEMS FOR SUBMISSION AND VALIDATING DECENTRALIZED VERIFIABLE CLAIMS IN A PHYSICAL WORLD - Methods and systems for implementing Blockchain-based verifiable claims for use with assets in a physical world, such as Internet-of-Things (IoT) devices, are described. Verifiable claims are integrated with Root of Trust (RoT) technology, in a manner that allows verifiable claims to be linked with physical assets and a “proof” of provisioning of decentralized identity to be established. A system integrates Blockchain and IoT technologies, including Blockchain IoT device with hardware RoT implemented thereon. A validation process leverages RoT of the device to establish a decentralized “proof” of RoT on the Blockchain, which can then be used as a verifiable claim for the device. The validation process can also use the “proof” of RoT to further validate data obtained from the Blockchain IoT device, and to validate business logic allowing context based control of any subsequent transactions. Further, the validation process achieves automation with respect to trustability. | 2022-01-06 |
20220006652 | METHOD AND ARCHITECTURE FOR SECURING AND MANAGING NETWORKS OF EMBEDDED SYSTEMS WITH OPTIMISED PUBLIC KEY INFRASTRUCTURE - Methods and apparatuses for data communication and cybersecurity are provided to handle the PKI over constrained devices with application over PAN/LP-WAN and other similar devices and networks. This significantly improves the security capabilities of such devices in terms of identity verification, encrypted communication, and device life-cycle management. The apparatus may authenticate a party of a data communication session using a micro certificate within a micro public key infrastructure that provides transport or application layer security. The micro public key infrastructure may be the combination of communication protocol, micro certificates, and a management platform. The apparatus may establish the data communication session using the micro certificate. The apparatus may perform secured data communication over the data communication session. | 2022-01-06 |
20220006653 | SYSTEM AND METHODS FOR CONFIDENTIAL COMPUTING - Systems, apparatuses, methods, and computer-readable media for implementing confidential computing of one or more computing systems and/or devices using component authentication and data encryption with integrity and anti-replay mechanisms are disclosed. In some examples, the systems, apparatuses, methods, and computer-readable media described herein can perform various techniques, including one or more secure boot processes, component and data authentication, and data encryption with integrity and anti-replay, among other secure techniques. One implementation may include executing secure boot process based on authentication of a device identifier stored in a secure physical object of a processing device. Another implementation may include encrypting and storing a counter value corresponding to a cache line and generating an integrity tag value replacing error correction code bits associated with the cache line with the generated cache line tag value. | 2022-01-06 |
20220006654 | METHOD TO ESTABLISH AN APPLICATION LEVEL SSL CERTIFICATE HIERARCHY BETWEEN MASTER NODE AND CAPACITY NODES BASED ON HARDWARE LEVEL CERTIFICATE HIERARCHY - An intelligent method of mutual validation between a cluster manager and a new node, also enabling automatic signing of an application certificate for the new node. A root certificate authority is embedded in a cluster manager at the factory. The certificate includes the cluster manager serial number. Similarly, a certificate is embedded in an appliance to be joined as a new node, the certificate including the appliance's serial number. When requesting to join the cluster, the node sends its certificate to the cluster manager. The cluster manager verifies that the serial number in the certificate matches a serial number in its white list and validates the certificate ownership by the node. Conversely, the cluster manager sends its certificate to the node, so that the node can verify its communicating with a valid cluster manager. The node can then ask the manager to sign its application certificate, and the manager uses its root certificate authority to sign the certificate. | 2022-01-06 |
20220006655 | CONSENSUS METHOD OF CONSORTIUM BLOCKCHAIN, AND CONSORTIUM BLOCKCHAIN SYSTEM - This specification discloses a consensus method of a consortium blockchain and a consortium blockchain system. The method includes: dividing, by a primary consensus node of the consortium blockchain, proposed data into data blocks corresponding to backup consensus nodes of the consortium blockchain based on erasure coding (EC), the data blocks corresponding to hash values calculated based on EC; sending, by the primary consensus node, a first data block to a corresponding backup consensus node, wherein the first data block is forwarded by the corresponding backup consensus node receiving the first data block to one or more other backup consensus nodes; and initiating, by the primary consensus node, a consensus process for the proposed data based on a Practical Byzantine Fault Tolerance (PBFT) protocol to send a hash value of the first data block to the corresponding backup consensus node via a PBFT protocol message. | 2022-01-06 |
20220006656 | ACHIEVING CERTIFICATE PINNING SECURITY IN REDUCED TRUST NETWORKS - Achieving certificate pinning security in reduced trust networks. A client receives a second certificate from a server over a first secured communications channel. The first secured communications channel is established based at least upon a first digital certificate associated with the first secured communications channel being certified by a pinned certificate. The client sends a request towards the server via a second communications channel with an untrusted computer system, and the request is received by the server. The server generates a response comprising a timestamp, a URI portion, and a signature that is generated using the second certificate. The server sends the response via the second communications channel. The client receives the response, and uses the second certificate to verify that the response is authentic and that the timestamp and URI portion are valid. The client then processes the payload. | 2022-01-06 |
20220006657 | MUTUAL AUTHENTICATION OF COMPUTER SYSTEMS OVER AN INSECURE NETWORK - Methods and systems are provided for mutual authentication between an agent, such as a user ( | 2022-01-06 |
20220006658 | NEURAL BLOCKCHAIN - The present invention is directed to a computer-implemented system for secure storage and transfer of digital data between users, based on a blockchain-like protocol, and to a computer-implemented method employing said computer system. | 2022-01-06 |
20220006659 | Secure Time-to-Live - Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message. | 2022-01-06 |
20220006660 | RICH COMMUNICATION SERVICES MULTICAST SYSTEM - An improved telecommunications network that can reduce the network load on a rich communication services (RCS) server and/or local routers that implement 1-to-N and/or M-to-N services is described herein. In particular, the improved telecommunications network may include an improved RCS server that can route multicast messages instead of and/or in addition to unicast messages. For example, the improved RCS server can create a multicast group for a group of UEs in response to a request from a UE to create a group of UEs. Creation of the multicast group may include assigning a group Internet protocol (IP) address to the multicast group. The improved RCS server can then determine which UEs in the multicast group are capable of sending and/or receiving multicast messages, and send multicast messages instead of unicast messages to these UEs. | 2022-01-06 |
20220006661 | Access and communicate live audio streaming under micro channel or keyword(s) - Various embodiments of a system, methods, server, client, and graphical user interface for creating micro channel or keyword(s) and associating settings in response to receiving request to create micro channel or keyword(s) with associated settings, wherein associated settings comprises allow one or more contacts, invited users or invitation accepted users, followers, any or all or part of users of network to communicate live audio streaming under said created micro channel or keyword(s) or access communicated live audio streaming under said created micro channel or keyword(s), receiving request from micro channel or keyword(s) related users including creator of micro channel or keyword(s) and associated allowed users to communicate live audio streaming under selected micro channel or keyword(s) and communicating live audio streaming to micro channel or keyword(s) for enabling micro channel or keyword(s) related users to access related live audio streaming. | 2022-01-06 |
20220006662 | SELECTION OF A COORDINATOR DEVICE FOR AN AUTOMATED ENVIRONMENT - An automated environment can include multiple controller devices capable of communicating with multiple accessory devices. The controller devices can automatically elect one of their number as a coordinator device for the environment and can automatically perform a new election if an incumbent coordinator becomes unavailable or resigns. The election processes can be transparent to any users. An elected coordinator can perform various operations to facilitate management of the automated environment, including routing of communications between controllers and accessories. | 2022-01-06 |
20220006663 | REMOTE MANAGEMENT APPARATUS AND REMOTE MANAGEMENT SYSTEM - A remote management apparatus remotely manages one or more devices. After establishing communication with a communication device incorporated in or connected to each of the one or more devices via a network, the remote management apparatus identifies a model of each of the one or more devices based on information received from the communication device. | 2022-01-06 |
20220006664 | AUTOMATIC SCENE CREATION USING HOME DEVICE CONTROL - A distributed system of home device controllers can control a set of home devices. A home device controller of the system can determine a set of configurations for a set of home devices being repeatedly configured by a user. The controller can automatically display a selectable feature indicating a suggested scene corresponding to the set of configurations for the set of home devices. The system can receive one or more inputs to select the suggested scene, and based at least in part on the one or more inputs, associate the suggest scene with a set of triggers. In response to detecting the set of triggers, the controller can automatically transmit a set of commands that correspond to the suggested scene to the set of home devices to execute the suggested scene. | 2022-01-06 |
20220006665 | DETECTING AND RESOLVING DESYNCHRONIZATION OF TRIP COUNTER VALUES IN AUTHENTICATED MESSAGES - Techniques for using a trip flag to detect desynchronization of trip counter values in a vehicle system. Techniques include a first electronic control unit (ECU) receiving a synchronization message including a trip counter and receiving a message from a second ECU including a trip flag. The trip flag includes a single bit of data generated by the second ECU. The first ECU compares the trip flag to a last bit of the trip counter stored at the first electronic control unit and processes the message in response to the trip flag matching the trip counter. The first ECU compares the trip counter to a previous trip counter based on the trip flag differing from the trip counter. The first ECU processes the message using the previous trip counter or increments the trip counter to process the message based on the comparison with the previous trip counter. | 2022-01-06 |
20220006666 | METHOD AND SYSTEM FOR DETECTING AND DEFENDING AGAINST ABNORMAL TRAFFIC OF IN-VEHICLE NETWORK BASED ON INFORMATION ENTROPY - A method for detecting and defending against abnormal traffic of an in-vehicle network based on information entropy, including the following steps: step 1: setting a sliding window; step 2: setting a threshold; step 3: collecting and processing traffic; step 4: calculating information entropy in the sliding window when the window is full; and step 5: detecting traffic of a controller area network (CAN) bus and an in-vehicle Ethernet. Based on impact of abnormal traffic on the information entropy, the information entropy in the sliding window is calculated in real time and compared with the preset thresholds, to detect whether an abnormality occurs. | 2022-01-06 |
20220006667 | RELAY DEVICE SYSTEM - A relay device system is a relay device system to be installed in a vehicle, the relay device system including a wireless relay device configured to wirelessly communicate with a communication device provided outside the vehicle, and a plurality of wired relay devices that are communicably connected to the wireless relay device, the plurality of wired relay devices each including a communication unit configured to communicably connect to an ECU for controlling an on-board device installed in the vehicle, the ECUs including an HMI-related ECU, a travel control-related ECU, and a self-driving-related ECU, the wired relay device that is connected to the HMI-related ECU and the wired relay device that is connected to the travel control-related ECU being arranged in a front portion of the vehicle, and the wired relay device that is connected to the self-driving-related ECU being arranged in a rear portion of the vehicle. | 2022-01-06 |
20220006668 | SWITCHBOARD MANAGEMENT SYSTEM USING RING NETWORK - The present disclosure relates to a system for managing a switchboard using a ring network, including a plurality of switchboards for forming at least one group, a switch for forming a ring network with the plurality of switchboards to receive operation information related to an operation of a device provided in each switchboard from at least one switchboard among the plurality of switchboards, and a monitoring server for receiving the operation information, and it can be applied to other exemplary embodiments. | 2022-01-06 |
20220006669 | IN-VEHICLE COMMUNICATIONS SYSTEM, IN-VEHICLE COMMUNICATION METHOD, AND DEVICE - This application provides an in-vehicle communications system used in a vehicle. The in-vehicle communications system includes a control device, a plurality of gateway devices, and a plurality of communication endpoints. Each gateway device is communicatively coupled to the control device, and each gateway device is communicatively coupled to at least two other gateway devices. Each gateway device is further communicatively coupled to at least one communication endpoint. A gateway device or a controller is configured to: when receiving communication data of end-to-end communication, route the communication data by using a first communication link indicated by a local routing policy, and if the first communication link is abnormal, route a part or all of the communication data by using a second communication link. The system may be used in the field of assisted driving and self-driving. | 2022-01-06 |
20220006670 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR TRANSACTION MANAGEMENT SPANNING MULTIPLE HETEROGENEOUS COMPUTING NETWORKS - A method and apparatus for providing communications between dissimilar computing networks, such as distributed ledger networks. A ledger-agnostic overlay network and computing architecture spans a range of digital communication networks including transaction only DLT networks like Bitcoin's DLT, smart contract based DLT like Ethereum, and also traditional centralized systems. Implementations communicate transaction information across heterogeneous jurisdictional boundaries, payment networks, banking systems, public and private distributed ledgers, internal corporate accounting systems, and exchanges. | 2022-01-06 |
20220006671 | Network Layer Performance and Security Provided By a Distributed Cloud Computing Network - A GRE tunnel is configured between multiple computing devices of a distributed cloud computing network and a single origin router of the origin network. The GRE tunnel has a first GRE endpoint that has an IP address that is shared among the computing devices of the distribute cloud computing network and a second GRE endpoint that has a publicly routable IP address of the origin router. A first computing device receives an IP packet from a client that is destined to an origin server. The first computing device processes the received IP packet and encapsulates the IP packet inside an outer packet to generate a GRE encapsulated packet whose source address is the first GRE endpoint and the destination address is the second GRE endpoint. The GRE encapsulated packet is transmitted over the GRE tunnel to the single origin router. | 2022-01-06 |
20220006672 | NETWORK NODE AND DEVICE FOR DATA COMMUNICATION NETWORKS - A network node for a Data Communication Network (DCN) and a network device for providing traffic to the DCN are provided. The network node is configured to receive a plurality of packets carrying DCN messages; determine, from the received packets, a first set of packets addressed to other network nodes of the DCN. The network node is then configured to forward the first set of packets over a Time-Division-Multiplexing (TDM) connection, in particular over an Optical Data Unit-k (ODUk) connection, to a determined network node of the DCN. According to the application, a high bandwidth efficiency is maintained, and the number of interfaces to be managed on a controller is reduced. | 2022-01-06 |
20220006673 | RECEIVED SIGNAL EQUALIZATION OF WIRELESS TRANSMISSIONS - Example operations may include obtaining a first received signal of a first wireless transmission by a transmitting device of a wireless signal received at a receiving device. The operations may also include obtaining a second received signal of a second wireless transmission by the transmitting device that is a retransmission of the wireless signal also received at the receiving device. The operations may further include determining, based on the first received signal and the second received signal, an equalization of distortion of propagation of the wireless signal between the transmitting device and the receiving device. In addition, the operations may include generating an equalized signal based on the determined signal equalization, wherein the equalized signal is an estimate of the wireless signal as transmitted by the transmitting device. | 2022-01-06 |
20220006674 | Method for estimating a wireless communication channel, device for estimating a wireless communication channel and computer program therefor - A method for estimating a wireless communication channel between a transmitter and a receiver, including a plurality of paths for propagation of a wave, at least one of the transmitter and the receiver being formed of a plurality of antennas. The method includes: for at least one path, determining a characteristic matrix, which depends on a first element representative of at least one propagation direction associated with the path, and a second element representative of a propagation distance associated with the path; and estimating the communication channel from the at least one obtained characteristic matrix. | 2022-01-06 |
20220006675 | TRANSMISSION DEVICE - A transmission device includes a frequency detector configured to detect a frequency of an input signal to generate frequency information; a signal generator configured to generate a modulation wave signal with a frequency equivalent to the frequency of the input signal based on the frequency information; and a single side band modulator configured to modulate a carrier wave by the modulation wave signal. | 2022-01-06 |
20220006676 | FREQUENCY MODULATION DEMODULATION DEVICE AND CONTROL METHOD OF FREQUENCY MODULATION DEMODULATION DEVICE - A frequency modulation demodulation device and a control method thereof are provided. The frequency modulation demodulation device includes an input terminal, a phase converter, a phase-locked loop circuit, and a frequency offset/shift detector. The input terminal receives an input signal. The phase converter is coupled to the input terminal and receives the input signal to obtain a phase signal. The phase-locked loop circuit is coupled to the phase converter to generate a phase adjustment signal according to the phase signal, and the phase-locked loop circuit adjusts the phase signal according to the phase adjustment signal to perform demodulation of the input signal. The frequency offset/shift detector is coupled to the phase-locked loop circuit and generates a frequency offset/shift determining signal according to the phase adjustment signal obtained from the phase-locked loop circuit. The frequency offset/shift determining signal is related to a phase frequency offset/shift of the input signal. | 2022-01-06 |
20220006677 | METHOD PERFORMED BY USER EQUIPMENT, AND USER EQUIPMENT - The present invention provides a method performed by user equipment, and user equipment. The method comprises: acquiring configuration information of a parameter related to generation of an Orthogonal Frequency Division Multiplexing (OFDM) baseband signal of a sidelink physical channel or signal; and generating the OFDM baseband signal of the sidelink physical channel or signal according to the acquired configuration information of the parameter, wherein the parameter comprises a frequency offset determining parameter for determining a frequency offset, so that the OFDM baseband signal of the sidelink, such as an OFDM baseband signal of a 5G sidelink, can be correctly generated. | 2022-01-06 |
20220006678 | METHODS AND APPARATUSES FOR TRANSMITTING AND RECEIVING UPLINK INFORMATION - Embodiments of the present disclosure relate to a method and apparatus of transmitting uplink (UL) information and a method and apparatus of receiving UL information. In one embodiment of the present disclosure, the method of transmitting UL information comprises transmitting a reference signal using a first sequence; and transmitting UL control information using a second sequence; wherein a reference signal and the UL control information are staggered-multiplexed in frequency domain. With embodiments of the present disclosure, the uplink information can be transmitted in reduced uplink symbols so as to adapt for a proposed subframe structure with reduced uplink symbols and thus, the transmission latency can be reduced greatly. | 2022-01-06 |
20220006679 | METHOD OF TRANSMITTING SYNCHRONIZATION SIGNAL AND APPARATUS THEREFOR - A method of transmitting a synchronization signal block, which is transmitted by a base station in a wireless communication system, is disclosed in the present invention. The method includes the steps of mapping a synchronization signal block including a PSS (primary synchronization signal), an SSS (secondary synchronization signal), and a PBCH (physical broadcasting channel) to a plurality of symbols, and transmitting the synchronization signal block mapped to a plurality of the symbols to a user equipment. In this case, in a symbol mapped the PSS, in a symbol mapped the SSS, and in a symbol mapped the PBCH, centers of subcarriers to which the PSS, the SSS, and the PBCH are mapped are the same and the number of subcarriers to which the PBCH is mapped is greater than the number of subcarriers to which the PSS and the SSS are mapped. | 2022-01-06 |
20220006680 | METHOD AND APPARATUS FOR CONFIGURING DEMODULATION REFERENCE SIGNAL POSITION IN WIRELESS CELLULAR COMMUNICATION SYSTEM - The present disclosure relates to a communication method and system for converging a 5 | 2022-01-06 |
20220006681 | APPARATUS AND METHOD FOR RECOVERY OF SYNCHRONIZATION IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a pre-5 | 2022-01-06 |
20220006682 | Systems And Methods For Transmitting And Receiving Auxiliary Data - A data transmission system includes a transmitter circuit. The transmitter circuit receives regular data bits and auxiliary data bits. The transmitter circuit encodes a first subset of the regular data bits to generate a first subset of encoded data comprising pairs of symbols that are used in quadrature amplitude modulation. The transmitter circuit encodes the auxiliary data bits and a second subset of the regular data bits to generate a second subset of the encoded data comprising at least one pair of symbols that are unused for encoding by the quadrature amplitude modulation. The transmitter circuit generates a modulated output signal that indicates the first and second subsets of the encoded data using pulse amplitude modulation. | 2022-01-06 |
20220006683 | DATA TRANSMISSION METHOD AND COMMUNICATION APPARATUS - Embodiments of this application provide a non-coherent data transmission method and a communication apparatus. In the method, a transmit end device determines, in a first constellation, a first constellation point corresponding to first to-be-modulated bits, where the first constellation point corresponds to P first symbols, P=M*N, M is a positive integer, and N is an integer greater than 1; and sends the P first symbols on N resource units by using M antenna ports, or sends P second symbols determined based on the P first symbols, and foregoes sending demodulation reference signals of the P first symbols or the P second symbols. In the method, a constellation is designed, and each constellation point in the constellation corresponds to a plurality of resource units so that data can be transmitted with no need to transmit a reference signal, and only the data needs to be transmitted. | 2022-01-06 |
20220006684 | COAP-BASED OPC UA MESSAGE TRANSMISSION METHOD, AND SERVER - The present application relates to a CoAP-based OPC UA message transmission method, comprising: packaging and encoding data by using an OPC UA information model; packaging an entire OPC UA data message into a load part of a CoAP message; then, on the basis of a UA-CoAP server, querying whether a CoAP-to-HTTP proxy server is present in a network; if present, transmitting a UA-CoAP data message to the CoAP-to-HTTP proxy server; converting the received data message into HTTP; and transmitting the data message to an OPC UA client. The present application solves the problem wherein data of a limited-resource industrial field device cannot be uniformly described and cannot be uniformly accessed, while the requirement of the industrial field device accessing a web service is satisfied. | 2022-01-06 |
20220006685 | NETWORK LOG TIME ALIGNMENT METHOD, APPARATUS, AND HOST - A network log time alignment method and an apparatus are provided. The method includes: obtaining log data stored in multiple network devices; parsing the log data to obtain features of each network device; determining associated features of the multiple network devices according to the features of each network device, where the associated features are features that are of the network devices and that have an association in space; and then, performing alignment on log time in multiple pieces of log data according to the associated features. Therefore, associated features of related devices of a network fault can be found, and log time are automatically aligned according to the associated features, thereby improving the efficiency and the accuracy of the fault location and sectionalization. | 2022-01-06 |
20220006686 | BEAM FAILURE RECOVERY METHOD AND DEVICE AND COMMUNICATION SYSTEM - A beam failure recovery method and device and a communication system. The device includes: a receiver configured to, after a period of time upon the terminal equipment receive a beam failure recovery (BFR) response and before activation or reconfiguration signaling, monitor and/or receive a downlink signal in a first cell of the terminal equipment according to an antenna quasi-co-located (QCL) parameter identical to a selected reference signal (q_new) or a reference signal (q_new) indicated by a higher layer. | 2022-01-06 |
20220006687 | SERVICE CHAINING WITH SERVICE PATH MONITORING - Example methods and systems for failure handling for service chaining with service path monitoring. One example may comprise a first computer system detecting a data packet that is being forwarded along a first service path. The first computer system may configure a liveness check query and send the liveness check query along with the data packet towards a service virtualized computing instance to cause a liveness check response. In response to detecting the liveness check response from the service virtualized computing instance, the first computer system may determine that the service virtualized computing instance is available. Otherwise, report information may be generated and sent to trigger a switch from the first service path to a second service path that excludes the service virtualized computing instance. | 2022-01-06 |
20220006688 | NETWORK ASSISTED SIDELINK BEAM FAILURE RECOVERY - A method of wireless communication by a first sidelink user equipment (UE) transmits a sidelink (SL) beam failure recovery (BFR) message to a communications node, indicating a new candidate beam and an identifier (ID) of a second sidelink UE. The method also receives an acknowledgment of the SL BFR message. A communications node receives a sidelink beam failure recovery message from a first sidelink user equipment, indicating a new candidate beam and an ID of a second sidelink UE. The method also transmits information identifying the new candidate beam and the ID to the second sidelink UE. Another method by a first sidelink user equipment receives a sidelink beam failure recovery message from a base station, indicating a new candidate beam and an ID of a second sidelink UE. The method changes a beam used to communicate with the second sidelink UE in response to receiving the BFR message. | 2022-01-06 |
20220006689 | BEAM FAILURE DETECTION AND RECOVERY WITH CARRIER AGGREGATION - This disclosure provides systems, methods, and apparatuses, including computer programs encoded on computer storage media, for wireless communication. In one aspect of the disclosure, a user equipment (UE) detects a beam failure of a first beam for a first component carrier (CC) based on a link quality associated with the first beam for the first CC. The first CC and a second CC are within a same group of CCs. The UE initiates one or more beam failure recovery operations associated with any CC within the same group of CCs as the first and second CCs based on a determination of a beam failure of a second beam for the second CC. The determination is based on the detection of the beam failure for the first CC and based on the first CC and the second CC being within the same group of CCs. | 2022-01-06 |
20220006690 | USER TERMINAL AND RADIO COMMUNICATION METHOD - In order to appropriately control communication even in a case where a BFR procedure is performed on a plurality of cells, a user terminal according to an aspect of the present disclosure includes a transmitting section that transmits a Beam Failure Recovery reQuest (BFRQ) to a cell in which a Radio Link Failure has occurred, and a control section that determines, according to whether or not a given secondary cell that supports uplink control channel transmission is configured, at least one of a cell to which the BFRQ is transmitted or a channel utilized for the BFRQ transmission. | 2022-01-06 |
20220006691 | DISTRIBUTED CONTROL SYSTEM, AUTOMATIC ANALYSIS DEVICE, AND AUTOMATIC ANALYSIS SYSTEM - In a distributed control system, when the determination that an error has occurred is made as a result of comparison of correct connection information retained in a storage unit and connection information of an actually connected control object device or terminal communication device by a comparison unit, a central computation device outputs a display signal of an abnormal part to a display device, and the display device displays the abnormal part on the basis of the display signal. A distributed control system and an automatic analysis device provided with the same, and an automatic analysis system are thereby provided, whereby an erroneous connections or defects can be more easily and reliably detected than in the prior art, even when a plurality of control boards are distributedly arranged in the same device. | 2022-01-06 |
20220006692 | SYSTEMS AND METHODS FOR AUTOMATICALLY PROVISIONING SMART DEVICES - A system may provision a smart device to allow the smart device to communicate using a network and use at least one service of a management platform. A device identifier of the smart device may be stored in a data store accessible to the management platform. The smart device may send a message to the management platform that includes the device identifier, and in some implementations other information such as location information. The management platform may determine that the smart device has been provisioned, for example based on the device identifier or other information, and provide a service to the smart device from the management platform. | 2022-01-06 |
20220006693 | DIMENSIONING NETWORK SERVICES (NS) - A method and network node are provided for dimensioning a network service (NS). The method comprises calculating, based on given capacity requirements of the NS, a required number of virtual network functions component (VNFC) instances of each of a plurality of virtual network function (VNF) in the NS; selecting a VNF deployment flavor (VnfDf) for each of the plurality of VNFs in the NS, based on the calculated required number of VNFC instances; generating a network service deployment flavor (NsDf) including the selected VnfDfs; and onboarding a network service descriptor (NSD), which includes the NsDf, for use for instantiating the dimensioned NS. | 2022-01-06 |
20220006694 | Configuration Of Networked Devices - There is provided mechanisms for configuration of parameters for a networked device to be provisioned in a network. A method is performed by a device configuration node. The method includes obtaining a request for configuration of parameters for the networked device. The request indicates that the networked device is of a certain device type. The method includes selecting a template from a set of templates stored in a database. The template is selected based on the certain device type. The method includes providing configuration of at least a subset of the parameters for the networked device based on the template. | 2022-01-06 |
20220006695 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF THE SAME, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - An information processing apparatus is provided, the apparatus comprises a first communication interface for performing wireless communication via a network provided by an external access point; a second communication interface for performing wired communication; a unit for setting, in a case where a user operation to set a first communication function for connecting to the external access point via the first communication interface to perform wireless communication has been accepted, a setting indicating that a second communication function for performing wired communication will not be used, and unit for setting, in case where a user operation to cancel the setting of the first communication function has been accepted before the information processing apparatus belongs to the network provided by the external access point, a setting indicating that the second communication function will be used. | 2022-01-06 |
20220006696 | RECONFIGURABLE MULTIPLEXER - A reconfigurable triplexer that can support more frequency bands than a traditional triplexer is disclosed. For example, the reconfigurable triplexer can handle frequencies of several hundred megahertz up to 10 gigahertz. Further, certain implementations of the reconfigurable multiplexer can reduce or eliminate frequency dead zones that exist with traditional multiplexers. The reconfigurable triplexer includes a multi-stage filter bank capable of supporting a number of frequency bands and a bypass circuit that enables the triplexer to support a variety of sets of frequencies. For instance, unlike traditional triplexers, the reconfigurable triplexer can support both frequency bands with relatively narrow spacing and frequency bands with relatively wide spacing. Further, the inclusion of the bypass circuit enables the reduction or elimination of dead zones between supported frequencies. | 2022-01-06 |
20220006697 | PATH COMPUTATION TOOL FOR A COMMUNICATIONS NETWORK - A tool is provided to generate one or more communication paths through one or more networks from a starting location to an ending location. The generated communication paths may be displayed for comparison by a user or computing device and, upon selection, the one or more networks may be configured or provisioned to instantiate a selected communication path in the networks. In particular, the selected communication path may be provided to one or more corresponding network configuration systems to communicate with the network devices in the communication path and alter the operating state of the network devices according to the communication path information. Some implementations of the network path tool may provide an auditing of diversity aspects of a network path or circuit that may receive network path information and display diversity audit information through any user interface utilized by the path computation tool. | 2022-01-06 |
20220006698 | SYSTEM AND METHOD FOR BUILDING IDEMPOTENT CONFIGURATION MANAGEMENT MODULES FOR A CLOUD INFRASTRUCTURE SERVICE - Embodiments provide a system and method for building idempotent configuration management modules for cloud infrastructure services. Idempotency of a configuration management (CM) task in a CM plan is one of the mechanisms used to achieve repeatable and reliable automations of configuration management tasks. This helps DevOps and operations personnel reliably apply and maintain configuration of their systems. | 2022-01-06 |
20220006699 | OpenFlow Instance Configuration - An AC obtains configuration information of a global instance and configuration information of an AP instance corresponding to each AP. The AC sends the configuration information of a corresponding AP instance to each AP respectively, so that each AP creates an AP instance based on the received configuration information of the AP instance, and binds an AP identifier to the created AP instance. The AC creates the global instance based on the configuration information of the global instance. The AC binds an AC identifier and an AP identifier of each AP to the global instance. | 2022-01-06 |
20220006700 | SYSTEMS AND METHODS FOR DESIGNING A SLICE INFRASTRUCTURE - A device associated with a network may receive a service profile for a network slice of the network, where the service profile includes one or more service characterizations of the network slice. The device may determine, based on thresholding rules and for each service characterization, whether the service characterization requires selection from a plurality of building blocks, to obtain a group of service characterizations requiring selection. The device may select, based on selection rules and for each service characterization of the group of service characterizations requiring selection, a building block from the plurality of building blocks, to obtain selected building blocks, where the selection rules map attributes of service characterizations to building blocks. The device may stack, based on stacking rules, the selected building blocks, to obtain a slice infrastructure for the network slice. The device may deploy the slice infrastructure for the network slice in the network. | 2022-01-06 |
20220006701 | DASHBOARD FOR DISPLAY OF STATE INFORMATION IN A GRAPHIC REPRESENTATION OF NETWORK TOPOLOGY - Techniques to display a graphic representation of a computer network topology are described. In one example, a network device is configured to generate an output comprising a graphic representation of a topology of a computer network, the computer network comprising compute nodes interconnected by a packet-based communications network provided by a set of network devices, wherein the policy controller is further configured to: identify, amongst the compute nodes or the network devices, a network element having state information indicating an operational state of interest; modify state information for one or more resources that are coupled to the identified network element; and based upon whether the network topology information indicates a visible graphic symbol for the identified network element, output a visual indicator corresponding to the visible graphic symbol or corresponding to a visible resource that is communicably coupled to the identified network element. | 2022-01-06 |
20220006702 | CONFIGURING COMPUTING NODES IN A THREE-DIMENSIONAL MESH TOPOLOGY - A system according to one embodiment includes a collection of computing nodes arranged in a mesh of N×M×Z topology, the nodes including computational hardware, wherein Z2022-01-06 | |
20220006703 | DATA SERVICE OVERLOAD DETECTION AND MITIGATION - The described technology is directed towards presenting a server overload condition that can result from a spike in client requests. Upon receiving an incoming client request for data at a server, a request buffer condition of a client request buffer (e.g., a counter) is evaluated to determine whether the client request corresponds to an anticipated overload state with respect to a request-handling capability of the server, e.g., whether the client request buffer is full. If so, an overload response (e.g., a retry response) is returned to the client indicating so that the client retries a corresponding client request after a time delay. If not in the anticipated overload state, the request is further processed, e.g., to provide a regular response containing the requested data, such as by adding a request information entry associated with the incoming client request to the client request buffer and updating the request buffer condition. | 2022-01-06 |
20220006704 | PREDICTIVE SCORING BASED ON KEY PERFORMANCE INDICATORS IN TELECOMMINUCATIONS SYSTEM - A method includes: receiving protocol event data from a plurality of probes within the telecommunication system; determining a most probable cause of a call event from the protocol event data; applying the most probable cause to a trained machine learning algorithm that includes the most probable cause as its input and a telecommunication system score as its output; and in response to an output score from the trained machine learning algorithm, performing a corrective action for a plurality of network users that are expected to be affected by the most probable cause. | 2022-01-06 |
20220006705 | SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A METADATA DRIVEN RULES ENGINE ON BLOCKCHAIN USING DISTRIBUTED LEDGER TECHNOLOGY (DLT) - Systems, methods, and apparatuses for implementing a metadata driven rules engine on blockchain using Distributed Ledger Technology (DLT) in conjunction with a cloud based computing environment are described herein. For example, according to one embodiment there is a system having at least a processor and a memory therein executing within a host organization, in which such a system includes means for operating a blockchain interface to a blockchain on behalf of a plurality of tenants of the host organization, wherein each one of the plurality of tenants operate as one of a plurality of participating nodes on the blockchain having access to the blockchain; displaying a Graphical User Interface (GUI Interface) to a user device communicably interfaced with the system over a network, wherein the GUI interface is to prompt for a metadata rule definition at the user device when displayed by the user device; receiving input at the system from the GUI interface displayed to the client device, the input defining the metadata rule definition, wherein the metadata rule definition includes one or more conditions or criteria to be matched to a transaction received at the blockchain; auto-generating code for a smart contract representing the metadata rule definition based on the input received from the GUI interface displayed to the client device; submitting the smart contract having the code representing the metadata rule definition to the blockchain for consensus by participating nodes of the blockchain; and adding the smart contract having the code representing the metadata rule definition onto the blockchain by writing the metadata rule definition into an asset of a new block on the blockchain pursuant to the smart contract attaining consensus from the participating nodes of the blockchain. Other related embodiments are disclosed. | 2022-01-06 |
20220006706 | ON-THE-FLY REORGANIZATION OF DIRECTED ACYCLIC GRAPH NODES OF A COMPUTING SERVICE FOR HIGH INTEGRATION FLEXIBILITY - Systems and techniques that facilitate on-the-fly reorganization of directed acyclic graph nodes of a computing service for high integration flexibility are provided. In various embodiments, an input component can receive from a computing client a requested response time to be satisfied by a computing service. In various embodiments, a node property component can access an execution matrix. In various cases, the execution matrix can list execution properties of a plurality of nodes corresponding to the computing service. In various instances, the plurality of nodes can respectively perform a plurality of sub-operations associated with the computing service. In various aspects, the plurality of nodes can include one or more multi-level-of-execution subsets of nodes. In various cases, each multi-level-of-execution subset can contain at least two nodes that facilitate a same sub-operation at different levels of resource utilization. In various embodiments, a node identification component can identify a set of nodes from the plurality of nodes listed in the execution matrix, such that the identified set can include one node from each of the multi-level-of-execution subsets, and such that the execution properties of the identified set can collectively satisfy the requested response time. In various aspects, the node identification component can build for the computing client a workflow corresponding to the computing service based on the identified set. | 2022-01-06 |
20220006707 | SHARABLE STORAGE METHOD AND SYSTEM FOR NETWORK DATA ANALYTICS - A method and system of unifying data transmission and storage in a communication network are provided. The method comprises determining, by a coordinator associated with a network data analytics function (NWDAF) service instance set, what data that more than one NWDAF service instances in the NWDAF service instance set requires, if the data required by the more than one NWDAF service instances is the same, requesting, by the coordinator associated with the NWDAF service instance set, the data from a network function service instance set, and receiving the data from a data storage function that is notified by the network function service instance set of the request from the coordinator associated with the NWDAF service instance set. | 2022-01-06 |
20220006708 | INSTANTIATION OF CLOUD-HOSTED FUNCTIONS BASED ON CALL TO FUNCTION GRAPH - A system, computer-implemented method, and/or non-transitory computer-readable media may provide a warm start technique for cloud-hosted functions. Included is a non-transitory memory storage comprising instructions, and one or more processors in communication with the memory, wherein the one or more processors execute the instructions to identify a cloud-hosted function configured to be executed within a cloud computing environment. The cloud-hosted function is instantiated within the cloud-hosted computing environment. The one or more processors additionally execute the instructions to determine a hold (preservation) time to maintain the instantiation of the cloud-hosted function within the cloud computing environment, based on a plurality of function execution metrics calculated for the cloud-hosted function. The one or more processors further execute the instructions to maintain the instantiation of the cloud-hosted function within the cloud computing environment for the determined hold time. | 2022-01-06 |
20220006709 | Escalation Tracking and Analytics System - An embodiment may involve persistent storage containing a representation of an escalation path including an ordering of groups, wherein the groups each represent agents and include maximum numbers of contact attempts, maximum times to wait after the contact attempts, and channels for each of the contact attempts. The embodiment may also involve processors configured to: (i) receive an indication that an event has occurred; (ii) perform attempts to contact the agents in the groups; (iii) receive a request for live tracking of the attempts; (iv) generate a representation of a graphical user interface that identifies: a current agent for which contact is being attempted, a number of attempts made to contact the current agent, and a time at which either a subsequent attempt or an escalation to a subsequent group is to be made; and (v) provide the representation of the graphical user interface. | 2022-01-06 |
20220006710 | COMPUTER SYSTEM PROVIDING MIRRORED SAAS APPLICATION SESSIONS AND RELATED METHODS - A computing device may include a memory and a processor cooperating with the memory to record data indicative of interactions with shared applications following logons to the computing device, with the data including a number of times and a sequential order of the interactions. The processor may be further configured to determine probabilities of launching the shared applications following a next logon to the computing device from the recorded data, and following the next logon, display shared applications on the display based on the determined probabilities. | 2022-01-06 |
20220006711 | METHOD AND SYSTEM FOR INDUCING SECURE COMMUNICATIONS BETWEEN ONE OR MORE EMULATED SERVERS AND EMULATED CLIENTS TO TEST A DEVICE THEREBETWEEN - The technology disclosed provides a method of testing handling of HTTPS sessions of a plurality of clients with a plurality of servers by a switching, bridging or routing device (i.e., a DUT), where the testing is conducted by a test system coupled to ports on the DUT. The method includes using client state machines running on at least four processor cores, communicating through the DUT with server state machines running on at least four additional processor cores. The method also includes, for each connection between a client represented by a client state machine and a server represented by a server state machine, setting up an HTTPS session by negotiating an encryption protocol and completing an HTTPS handshake. Further, the method includes following the setup of between 100,000 HTTPS sessions and 10,000,000 HTTPS sessions, conducting a stress test including combining payload data and header information without using the negotiated encryption. | 2022-01-06 |