15th week of 2021 patent applcation highlights part 60 |
Patent application number | Title | Published |
20210111842 | Wireless Communication Device and Corresponding Apparatus, Method and Computer Program - Embodiments of the present disclosure relate to wireless communication devices, systems comprising wireless communication devices, and to an apparatus, a method and a computer program for a wireless communication device. The apparatus comprises a transceiver module for transmitting and receiving wireless transmissions. The apparatus comprises a processing module that is configured to control the transceiver module. The processing module is configured to communicate with a further wireless communication device via the transceiver module. The communication with the further wireless communication device is based on a transmission of data frames between the wireless communication device and the further wireless communication device. Each data frame is based on a two-dimensional grid in a time-frequency plane having a time dimension resolution and a frequency dimension resolution. The processing module is configured to select a communication mode from a plurality of communication modes for the communication between the wireless communication device and the wireless communication device. The communication mode defines a combination of a frequency dimension resolution and a time dimension resolution of the two-dimensional grid in the time-frequency plane. The communication mode is selected from the plurality of communication modes based on an estimated self-interference of the plurality of communication modes. | 2021-04-15 |
20210111843 | TIME-FREQUENCY RESOURCE ALLOCATION METHOD AND APPARATUS - A time-frequency resource allocation method includes: obtaining an uplink reference signal of user equipment (UE) on which allocation is to be performed when scheduling a time-frequency resource for the UE; measuring, based on the obtained uplink reference signal, each beam in a second preset quantity of orthogonal beam groups including a first preset quantity of beams, to determine a level of each beam; then determining, based on the level of each beam, a beam attribute that is of the UE and that is in the second preset quantity of orthogonal beam groups; and then, allocating, based on the beam attribute that is of the UE and a beam attribute that is of one or more UEs on which allocation has already been performed and that is in the second preset quantity of orthogonal beam groups, the time-frequency resource to the UE on which allocation is to be performed. | 2021-04-15 |
20210111844 | Wireless Communication Device and Corresponding Apparatus, Method and Computer Program - Embodiments of the present disclosure relate to wireless communication devices, systems comprising wireless communication devices, and to an apparatus, a method and a computer program for a wireless communication device. The apparatus comprises a transceiver module for transmitting and receiving wireless transmissions. The apparatus comprises a processing module that is configured to control the transceiver module. The processing module is configured to communicate with a further wireless communication device via the transceiver module. The communication with the further wireless communication device is based on a transmission of data frames between the wireless communication device and the further wireless communication device. Each data frame is based on a two-dimensional grid in a time-frequency plane having a time dimension resolution and a frequency dimension resolution. The processing module is configured to select a communication mode from a plurality of communication modes for the communication between the wireless communication device and the wireless communication device. The communication mode defines a combination of a frequency dimension resolution and a time dimension resolution of the two-dimensional grid in the time-frequency plane. The processing module is configured to negotiate a communication mode of the plurality of communication modes to select for a future communication between the wireless communication device and the further wireless communication device with the further wireless communication device. | 2021-04-15 |
20210111845 | METHOD AND APPARATUS FOR DESIGNING RATE MATCHING PATTERN FOR PARTIAL DEMODULATION REFERENCE SIGNAL (DMRS) TRANSMISSION - An apparatus and method are provided for partial transmission of a PDSCH DMRS due to PDSCH RM. The method includes determining, by the UE, whether a downlink received from a base station is rate matched; and in response to determining that the downlink is rate-matched, determining, by the UE, that a rate matching pattern of the downlink is applicable for partial transmission of a reference signal, and decoding, by the UE, the downlink with a partial transmission of the reference signal. | 2021-04-15 |
20210111846 | METHOD FOR TRANSMITTING AND RECEIVING CHANNEL STATE INFORMATION BETWEEN TERMINAL AND BASE STATION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS SUPPORTING SAME - Disclosed are a method for transmitting and receiving channel state information between a terminal and a base station in a wireless communication system and an apparatus supporting same. According to an embodiment applicable to the present invention, a terminal may receive, from a base station, configuration information related to a first channel state information reference signal (CSI-RS) resource for measurement, measure channel state information using a CSI-RS transmitted from a neighbor cell on the basis of the configuration information, and transmit the measured channel state information to the base station. | 2021-04-15 |
20210111847 | SRS DESIGN SUPPORTING MULTIPLE ANTENNAS - A user equipment (UE) sends an indication supported combinations of sounding reference signal (SRS) resources, unsupported combinations of SRS resources, or compatible SRS resources to a base station. The base station selects one or more SRS resources for the UE from the SRS resources that are supported by the UE or are compatible for the UE. In some examples, the UE receives a configuration from the base station for multiple SRS resource sets. After configuring the UE with multiple SRS resource sets, the base station selects one of the SRS resources sets, and may indicate the selected SRS resource set to the UE. The UE transmits a physical uplink shared channel (PUSCH) to the base station using SRS resources from the selected SRS resource set. | 2021-04-15 |
20210111848 | CONTROL CHANNEL SIGNALING TECHNIQUES IN WIRELESS SYSTEMS WITH MULTIPLE POSSIBLE TRANSMISSION TIME INTERVALS - Control information may be transmitted for different TTI lengths. Different control information for the different TTIs may be transmitted using control channel resources that are established for communication of control information, such as a physical downlink control channel (PDCCH), for example. Control information for a first TTI may be located in a first set of resources, and control information for a second TTI may be located in a second set of resources. The first set of resources may be located within a first search space that may be searched by a user equipment (UE) to identify the first control information. The second set of resources may be located within a second search space that may be searched by the UE to identify the second control information. | 2021-04-15 |
20210111849 | BEAM MEASUREMENT METHOD, NETWORK-SIDE DEVICE, TERMINAL DEVICE, AND STORAGE MEDIUM - A beam measurement method, a network-side device, a terminal device, and a storage medium are provided. The method includes: sending configuration information to a terminal device, where the configuration information includes information related to channel state information reference signal CSI-RS resources that are used for beam measurement on an unlicensed frequency band UFB; and sending the CSI-RS resource to the terminal device based on the configuration information, so that the terminal device performs beam measurement on the UFB based on the configuration information and the CSI-RS resource. | 2021-04-15 |
20210111850 | COMMUNICATION APPARATUS AND REFERENCE SIGNAL RECEPTION METHOD - Disclosed are a wireless transmitter and a reference signal transmission method that improve channel estimation accuracy. In a terminal, which transmits a reference signal using n (n is a non-negative integer 2 or greater) band blocks (which correspond to clusters here), which are disposed with spaces therebetween in a frequency direction, a reference signal controller switches the reference signal formation method of a reference signal generator between a first formation method and a second formation method based on the number (n) of band blocks. In addition, a threshold value setting unit adjusts a switching threshold value based on the frequency spacing between band blocks. Thus, the reference signal formation method can be selected with good accuracy and, as a result, channel estimation accuracy is further improved. | 2021-04-15 |
20210111851 | SECONDARY CELL ACTIVATION IN NEW RADIO SYSTEM - A method of activating a secondary cell (SCell) can include receiving on a primary cell (PCell) at a user equipment (UE) a first medium access control (MAC) control element (CE) for activating the SCell, receiving on the PCell a second MAC CE for indicating a first transmission configuration indication (TCI) state for receiving one of a physical downlink control channel (PDCCH) or a physical downlink shared channel (PDSCH) of the SCell, starting to perform a time-frequency tracking process in the SCell based on a synchronization signal block (SSB) indicated in the first TCI state without waiting for an arrival of a third MAC CE on the PCell for activating a semi-persistent (SP) channel state information reference signal (CSI-RS) resource set of the SCell, and performing a CSI reporting process based on the SP CSI-RS resource set activated by the third MAC CE on the SCell. | 2021-04-15 |
20210111852 | METHOD FOR DETERMINING FEEDBACK INFORMATION, TERMINAL DEVICE, AND NETWORK DEVICE - Embodiments of this application provide a method for processing information bits in a wireless communication network. A communication device receives a radio resource control (RRC) signaling, wherein the RRC signaling comprises time window information and time unit format information, wherein the time window information comprises a hybrid automatic repeat request (HARQ) time sequence K1 set, wherein K1 is a time relationship between a time unit of a physical downlink shared channel (PDSCH) and a time unit of a physical uplink control channel (PUCCH), or wherein the K1 is a time relationship between a time unit of a (PDSCH) and a time unit of a physical uplink shared channel (PUSCH). The device determines HARQ feedback information based on the time window information and the time unit format information and sends the HARQ feedback information. | 2021-04-15 |
20210111853 | METHOD AND APPARATUS FOR MULTIPLEXING CHANNEL STATE INFORMATION - For multiplexing channel state information (CSI), a user equipment (UE) includes a transceiver configured to receive configuration information for CSI reporting and a processor configured to decode the configuration information and calculate a CSI according to the configuration information. The transceiver is configured to transmit the calculated CSI on an uplink (UL) channel, where the CSI includes N segments and is transmitted in one slot, where N>1. A first of the N segments includes a rank indicator (RI) and at least one other CSI parameter. A base station (BS) includes a processor configured to generate configuration information for CSI reporting and a transceiver configured to transmit, to a UE, the configuration information via a downlink (DL) channel; and receive, from the UE, a CSI report calculated in accordance with the configuration information on an uplink UL channel. | 2021-04-15 |
20210111854 | MITIGATING INTERFERENCE BETWEEN BASE STATIONS AND MICROWAVE BACKHAUL TRANSCEIVERS - Techniques for detecting and/or mitigating interference in a wireless network are discussed herein. An environment may include a base station in communication with one or more user equipment (UE) and one or more microwave backhaul transceivers. In some examples, the base station may and transceivers may communicate using frequencies in the same band (e.g., a millimeter frequency band). A geometry of devices in an environment can be determined. Further, interference can be detected based on a flexible portion of a transmission or a source identifier that can be included in a transmission. In some examples, the microwave backhaul transceivers may communicate via a same or similar millimeter frequency resources. Wireless resource(s) can be selected or otherwise determined for one or more components of the network to mitigate interference in the network. | 2021-04-15 |
20210111855 | COORDINATED ACCESS POINT TIME DIVISION MULTIPLE ACCESS - This disclosure provides methods, devices and systems for sharing time resources of a wireless medium. Particular implementations relate more specifically to coordinated AP (CAP) time-division-multiple-access (TDMA) techniques for sharing the time resources of a transmission opportunity (TXOP). According to such techniques, a coordinated AP that wins contention and gains access to the wireless medium for the duration of a TXOP may share its time resources with other coordinated APs. To share its time resources, the winning AP may partition the TXOP into multiple TXOP segments each including respective time resources representing a sub-duration of the TXOP. For example, the winning AP may assign, grant or allocate (hereinafter used interchangeably) itself one or more of the time resources and also allocate each of one or more remaining time resources to one or more other ones of the coordinated APs. | 2021-04-15 |
20210111856 | COMMAND PROCESSING METHOD AND TERMINAL DEVICE - A command processing method is used to solve a problem that the terminal device cannot process a BWP switching command, a BWP activation command or a BWP deactivation command that is received in a case where there are a plurality of BWPs simultaneously activated for the terminal device, and there is ongoing random access on one or more BWPs in the activated plurality of BWPs. The method includes: receiving a first command in a case where there is at least one configured or activated BWP for the terminal device, and there is ongoing random access on at least one BWP in the at least one configured or activated BWP, the first command including at least one of the BWP switching command, the BWP activation command or the BWP deactivation command; and processing the first command according to a preset processing manner. | 2021-04-15 |
20210111857 | METHOD FOR CONTROLLING A BWP INACTIVITY TIMER AND TERMINAL DEVICE - Embodiments of the present disclosure provide a method for controlling a BWP inactivity timer and a terminal device. The method includes: controlling, in a case where there is at least one configured or activated BWP for the terminal device, a BWP inactivity timer of each BWP in the at least one configured or activated BWP according to a preset processing mode or a network configuration mode, the preset processing mode or the network configuration mode being to start the BWP inactivity timer, or restart the BWP inactivity timer, or not start the BWP inactivity timer, or stop the BWP inactivity timer. | 2021-04-15 |
20210111858 | FULL-DUPLEX COMMUNICATION METHOD IN HIGH EFFICIENT WIRELESS LAN NETWORK AND STATION APPARATUS - A full-duplex communication method in a high efficiency wireless local area network (WLAN), the full-duplex communication method being performed by an access point (AP) in a WLAN network, includes transmitting a reference frame to at least one station (STA); receiving an uplink frame from the at least one STA in a time period determined on the basis of the reference frame; and transmitting a downlink frame to the at least one STA in a specific time duration of the time period, wherein the uplink frame and the downlink frame are transmitted through the same channel. | 2021-04-15 |
20210111859 | CLOCK DATA RECOVERY CIRCUIT WITH IMPROVED PHASE INTERPOLATION - A clock data recovery circuit includes a ring oscillator that generates a plurality of ring oscillator clock signal responsive to an input clock signal. A delay-locked loop delays a selected one of the ring oscillator clock signals to generate a plurality of delay-locked loop clock signals. A data sampler selects from the plurality of delay-locked loop clock signals to sample a received data stream. | 2021-04-15 |
20210111860 | FRAME TRIGGER RECREATION METHOD AND FRAME TRIGGER RECREATOR - A frame trigger recreation method is provided. Said frame trigger recreation method comprises the steps of generating a periodic trigger on the basis of a receiver clock with at least one period adjustment and at least one offset based on a difference between the receiver clock and a transmitter clock. | 2021-04-15 |
20210111861 | DESKEWING METHOD FOR A PHYSICAL LAYER INTERFACE ON A MULTI-CHIP MODULE - Systems, apparatuses, and methods for implementing a deskewing method for a physical layer interface on a multi-chip module are disclosed. A circuit connected to a plurality of communication lanes trains each lane to synchronize a local clock of the lane with a corresponding global clock at a beginning of a timing window. Next, the circuit symbol rotates each lane by a single step responsive to determining that all of the plurality of lanes have an incorrect symbol alignment. Responsive to determining that some but not all of the plurality of lanes have a correct symbol alignment, the circuit symbol rotates lanes which have an incorrect symbol alignment by a single step. When the end of the timing window has been reached, the circuit symbol rotates lanes which have a correct symbol alignment and adjusts a phase of a corresponding global clock to compensate for missed symbol rotations. | 2021-04-15 |
20210111862 | HETEROGENEOUS CLOCK MANAGEMENT SOLUTION - Systems and techniques for an heterogeneous clock management solution for industrial systems are described herein. In an example, a system includes a clock management circuit adapted to receive core timing information from a core of an integrated circuit. The clock management circuit is further adapted to correlate the core timing information with a reference clock. The clock management circuit is further adapted to output frequency and time offset of the reference clock to the core timing information. The system includes an execution circuit adapted to schedule a transaction from the core at a scheduled time relative to the reference clock using the frequency and time offset. The execution circuit is further adapted to issue a command to execute the transaction at the scheduled time. | 2021-04-15 |
20210111863 | ENABLING STATELESS ACCELERATOR DESIGNS SHARED ACROSS MUTUALLY-DISTRUSTFUL TENANTS - An apparatus to facilitate enabling stateless accelerator designs shared across mutually-distrustful tenants is disclosed. The apparatus includes a fully-homomorphic encryption (FHE)-capable compute kernel. The FHE-capable compute kernel is to establish a secure session with a trusted environment executing on a host device communicably coupled to the apparatus; generate, as part of establishing the secure session, per-tenant FHE keys for each tenant utilizing the FHE-capable compute kernel, the per-tenant FHE keys utilized to encrypt tenant data provided to the FHE-capable compute kernel; process tenant data that is in an FHE-encrypted format encrypted with a per-tenant FHE key of the per-tenant FHE keys; and store the tenant data that is in the FHE-encrypted format encrypted with the per-tenant FHE key of the per-tenant FHE keys. | 2021-04-15 |
20210111864 | Compressible (F)HE with Applications to PIR - A request is received for specific information that can be deteunined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information. | 2021-04-15 |
20210111865 | Compressible (F)HE with Applications to PIR - A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information. | 2021-04-15 |
20210111866 | SYSTEM AND METHOD USING A LOCALLY REFERENCED BLOCKCHAIN - A method comprises generating a signed blockchain transaction using a secure computing device arranged in a local area, and an apparatus set up for short-range communication. The method comprises associating the signed blockchain transactions with the local area, wherein the signed blockchain transaction indicates a presence of the apparatus in the local area. | 2021-04-15 |
20210111867 | SYSTEM AND METHOD FOR IMPLEMENTING A RESOLVER SERVICE FOR DECENTRALIZED IDENTIFIERS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a resolver service. One of the methods includes: obtaining, from a blockchain, event data for a plurality of blockchain transactions associated with a plurality of decentralized identifiers (DIDs); storing the event data in a database; receiving a request for information associated with the event data, wherein the request comprises one or more account identifiers; identifying one or more DIDs respectively corresponding to the one or more account identifiers based on pre-stored mapping relationships between the one or more DIDs and the one or more account identifiers; and providing, from the database, event data for one or more blockchain transactions associated with the identified one or more DIDs. | 2021-04-15 |
20210111868 | PROGRAMMABLE BLOCKCHAIN SOLID STATE DRIVE AND SWITCH - A programmable data storage device includes: a non-volatile memory; a storage controller configured to control the non-volatile memory; a network interface; and a field programmable gate array configured to: implement a blockchain algorithm; and store at least one block of a blockchain corresponding to the blockchain algorithm in the non-volatile memory via the storage controller; and a processor having memory coupled thereto, the memory having instructions stored thereon that, when executed by the processor, cause the processor to: send and receive one or more blocks of the blockchain via the network interface; and control the field programmable gate array to execute the blockchain algorithm on the one or more blocks of the blockchain. | 2021-04-15 |
20210111869 | SYSTEMS AND METHODS FOR GATED OFFER ELIGIBILITY VERIFICATION - Systems and methods for determining consumer eligibility for a gated offer using verification data from a verification source, while reducing exposure of the verification data, are herein disclosed. In one example, a method for a verification source comprises, generating a seed hash from a pre-determined data specification, aggregating verification data based on one or more data fields indicated by the data specification to produce aggregated verification data, hashing the aggregated verification data using the seed hash to produce hashed verification data, receiving hashed customer data from a verification platform, receiving a comparison request from the verification platform, comparing the hashed customer data with the hashed verification data; and returning a result to the verification platform indicating if the hashed customer data matches the verification data. | 2021-04-15 |
20210111870 | AUTHORIZING AND VALIDATING REMOVABLE STORAGE FOR USE WITH CRITICAL INFRASTRCTURE COMPUTING SYSTEMS - An information processing system validates authorization of a removable storage device for accessing the system. For example, the system detects a removable storage device. A first content hash and a first set of device verification data are obtained from a validation token stored on the storage device. A second content hash is obtained based on hashing content currently stored on the storage device. A second set of device verification data is obtained from the storage device. The system denies the storage device access to the system based on at least one of the first and second content hashes failing to match and the first and second sets of device verification data failing to match. The system grants the storage device access to the system based on the first and second content hashes matching and the first and second sets of device verification data matching. | 2021-04-15 |
20210111871 | VEHICLE, TERMINAL COMMUNICATING WITH THE VEHICLE, AND METHOD OF CONTROLLING THE VEHICLE - A method of controlling a device performing communication with a terminal is provided. A random number is generated for attempting a communication connection with the terminal. Hashing is performed on the generated random number with a shared key using a hash-based message authentication code algorithm to obtain a hash value. The obtained hash value is encrypted to generate an advertising (ADV) signal. The generated ADV signal is periodically transmitted. Communication with the terminal is performed in response to receiving a communication connection signal from the terminal. At least one load is operated based on information transmitted from the terminal. The periodical transmission of the ADV signal includes periodically generating the random number, periodically generating the ADV signal in response to the periodic generation of the random number, and periodically transmitting the ADV signal. | 2021-04-15 |
20210111872 | GENERATING HASH VALUES - A device is suggested for processing input data including a hardware accelerator generating a first hash value based on a first portion of the input data and a second hash value based on a second portion of the input data, wherein the first hash value is generated based on a first configuration of the hardware accelerator and wherein the second hash value is generated based on a second configuration of the hardware accelerator. Also, a method for operating such device is provided. | 2021-04-15 |
20210111873 | REPEATED MODULO METHOD AND APPARATUS FOR SIZE-LIMITATION OF INTERIM CALCULATION RESULTS - A method and apparatus for limiting the size of large numbers during numeric calculations, such as during encryption and decryption calculations. | 2021-04-15 |
20210111874 | KEY MANAGEMENT SYSTEM, COMMUNICATION DEVICE AND KEY SHARING METHOD - A key management apparatus receives a key request including a first device identification information and a second device identification information, encrypts a common key using the first device identification information to generate a first encrypted common key, encrypts the common key using the second device identification information to generate a second encrypted common key, and transmits a key response including the first encrypted common key and the second encrypted common key. A first device receives the key response, decrypts the first encrypted common key using the first device identification information to obtain the common key, and transmits the second encrypted common key. A second device receives the second encrypted common key and decrypts the second encrypted common key using the second device identification information to obtain the common key. | 2021-04-15 |
20210111875 | SECURE SHARED KEY ESTABLISHMENT FOR PEER TO PEER COMMUNICATIONS - Systems and methods for secure peer-to-peer communications are described. Devices registered into trusted network may be capable of establishing a shared data encryption key (DEK). In embodiments, each device may be configured to obtain a share of a data encryption key (DEKi) that can be stored locally. The shares may be shares in an M of N Secret Sharing Scheme. This may involve a network that includes an integer, N, devices, and in which M devices may share a secret (i.e. the DEK) during communications, M being an integer less than or equal to N. To obtain the entire DEK during encryption/decryption, a requesting device may send requests to M of N devices for their shares of the DEK. Once M shares are obtained, they may be used generate the DEK for encrypting/decrypting data between the devices. | 2021-04-15 |
20210111876 | SECURE SESSION FOR DECRYPTION - A method comprises: receiving, at a first device, a request to decrypt data encrypted with a symmetric key, the encrypted data stored on a memory device and determining if the request is part of an active session based on configuration parameters and session status. In response to determining the request is part of an active session, the method further comprises: requesting, by the first device, decryption by a plurality of devices of shards of the symmetric key, the shards encrypted with public keys from the plurality of devices, wherein decryption of the data requires reconstituting the symmetric key from a threshold number of the shards; receiving decrypted shards until the threshold number of shards is reached; updating the session status; reconstituting, by the first device, the symmetric key from the decrypted shards; and decrypting, by the first device, the encrypted data with the symmetric key. | 2021-04-15 |
20210111877 | SYSTEMS AND METHODS FOR GENERATING SIGNATURES - System and method for digitally signing messages using multi-party computation. | 2021-04-15 |
20210111878 | METHOD AND SYSTEM FOR SIGNING OUTPUT USING A KERNEL - In one embodiment, a computer-implemented method of digitally signing input by a data processing (DP) accelerator operation, and embedding the digitally signed input into an output, includes receiving, from a host device, a signature kernel specifying input to the signature kernel and executing the signature kernel to: extract a watermark from the input and obtain a hash for the watermark; generate output from the input; and embed the hash into the output. The DP accelerator provides the output to the host device. In an embodiment, the input includes an artificial intelligence (AI) model that is executed by the DP accelerator. The DP accelerator receives second input from the host, thereby producing an inference output from the AI model. The digitally signed watermark of the AI Model is embedded into the inference output and is provided to the host device. | 2021-04-15 |
20210111879 | KEY MANAGEMENT FOR ENCRYPTED DATA - Key management for encrypted data includes establishing a cache of key decryption keys and periodically evicting the keys from the cache. A pool of key encryption keys also is created and periodically, selected key encryption keys are removed from service. Notably, the rate of removal of the encryption keys differs from the rate of cache eviction for the decryption keys. Thereafter, clear data is encrypted with a cipher to produce cipher text, and the cipher is encrypted with a selected key encryption key from the pool. Finally, in response to an access request for the clear data, an attempt to locate in the cache a key decryption key for the encrypted cipher is made. If attempt fails, the key decryption key is retrieved from remote memory. Finally, the encrypted cipher is decrypted with the located key, and the cipher text decrypted to produce the clear data. | 2021-04-15 |
20210111880 | ACCESS CONTROL METHODS, ACCESS CONTROL DEVICES, AND COMPUTER READABLE MEDIA - An access control method, which may be applied in a cloud environment, is provided in various embodiments. The access control method includes: receiving from a user a request for access to a resource; determining a group access key related to the resource; determining a user key of the user; determining whether the group key is an integer multiple of the user key; and granting the user access to the resource if it is determined that the group access key is an integer multiple of the user key. | 2021-04-15 |
20210111881 | ACCESS TO CONTENT OF ENCRYPTED DATA SESSION - Methods, terminal and a data center gateway are provided for allowing efficient debugging and troubleshooting of data session encrypted with Perfect Forward Secrecy (PFS) encryption techniques such as for example the Transport Layer Security (TLS) protocol version 1.3. Embodiments of the invention allow the user terminal to authorize a data center gateway to persistently store one or more encryption keys associated with the data session for use to access the recorded data session and troubleshooting it after the session ended, when faults are detected. When a fault is detected, the user terminal provides authorization to the gateway to persistently store the data session along with one or more encryption key(s). With this, the gateway allows for the data session to be later decrypted and faults to be investigated despite the data session being encrypted with PFS techniques | 2021-04-15 |
20210111882 | SECURITY OF CIPHERING AND INTEGRITY PROTECTION - A network node of a mobile communications network may need to generate at least one new Input Offset Value, IOV value, for use in protecting communications between the network node and a mobile station. The network node then associates a fresh counter value with the or each new IOV value; calculates a Message Authentication Code based on at least the at least one new IOV value, the fresh counter value associated with the or each new IOV value, and a constant indicating that the Message Authentication Code is calculated to protect the new IOV value; and transmits the at least one new IOV value, the fresh counter value associated with the or each new IOV value, and the calculated Message Authentication Code to the mobile station. | 2021-04-15 |
20210111883 | QUANTUM TOKENS - Secure, semi-classical authentication schemes are presented. An authentication token is generated by applying a pre-determined measurement to a plurality of random quantum states to obtain a sequence of classical measurement outcomes. The token is validated by receiving the classical measurement outcomes and verifying whether the sequence corresponds to a statistically plausible result for the pre-determined measurement of the plurality of quantum states. | 2021-04-15 |
20210111884 | TRUSTED DATA MANAGEMENT SYSTEMS AND METHODS - This disclosure relates to, among other things, systems and methods for the secure management and verification of data. Certain embodiments disclosed herein provide for a trusted data management platform that may interact with a trusted assertion service to securely record assertion information relating to the generation and/or processing of data managed by the platform. Data consumers interact with the trusted assertion service to authenticate and/or otherwise verify the provenance, chain-of-handling, and/or other information associated with data managed by the trusted data management platform and/or associated data marketplaces. | 2021-04-15 |
20210111885 | ELECTRONIC ACCESS CONTROL MULTI-FACTOR AUTHENTICATION USING CENTRALIZED HARDWARE SECURED CREDENTIAL SYSTEM AND METHODS OF USE THEREOF - Aspects of the present disclosure include a tokenless, network-attached, multi-factor authentication software based electronic access control logon system and methods of use thereof, and may provide equivalent in security to a Public Key Infrastructure smart card system. The logon system may allow tokenless, but authorized, entities to access secure systems, with the secure logon system not requiring placement of individual or organization identifying information on a physical object that may be removed from a restricted location. Aspects of the present disclosure may include maintaining user credentials within individually encrypted credential bins within a Credential Hardware Security Module (HSM) that is securely accessible by authorized endpoints in a distributed network. A successful logon may occur when an authorized user accesses the user's corresponding credential bin within the Credential HSM via an additionally authorized corresponding device, such that the device and user authentication may combine to provide multi-factor authentication. | 2021-04-15 |
20210111886 | ENCRYPTED DATA KEY MANAGEMENT - An encrypted file system key associated with a first secure enclave may be received. A request from a second secure enclave to access a file system associated with the encrypted file system key may be received. In response to receiving the request, the encrypted file system key may be decrypted with a cryptographic key associated with an enclave manager to obtain a file system key. The file system key may be encrypted based on another cryptographic key associated with the second secure enclave to generate a re-encrypted file system key. Furthermore, the re-encrypted file system key may be provided to the second secure enclave. | 2021-04-15 |
20210111887 | WATERFALL REQUEST FOR DECRYPTION - A method comprises: receiving, at a first device, a request to decrypt data encrypted with a symmetric key, the encrypted data stored on a memory device; retrieving shards of the symmetric key, the shards encrypted with public keys from a plurality of devices, wherein decryption of the data requires reconstituting the symmetric key from a threshold number of the shards; determining a priority to request decryption of the shards with private keys from the plurality of devices; requesting decryption by the plurality of devices of the shards in the determined priority until the threshold number of shards is reached; reconstituting the symmetric key from the decrypted shards; and decrypting the encrypted data with the symmetric key. | 2021-04-15 |
20210111888 | DATA MANAGING APPARATUS, DATA PROCESSING APPARATUS, AND DATA MANAGING METHOD - The present disclosure is designed to properly prevent tampering of data, which might take place in a data collection route. Data managing apparatus | 2021-04-15 |
20210111889 | RELAY NETWORK FOR ENCRYPTION SYSTEM - A method comprises registering, by a first device having a public key, with a gateway server by providing a proof of work based on the first device public key and encrypting and decrypting data using cryptographic information transmitted via the gateway server between other devices similarly registered. | 2021-04-15 |
20210111890 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER ON AN AUGMENTED, MIXED AND/OR VIRTUAL REALITY PLATFORM TO DEPLOY EXPERIENCES - Systems and methods for authenticating a user on an augmented, mixed and/or virtual reality platform are provided. Once the user is authenticated, advertisements, experiences, appless apps, and/or tools may be deployed to a user, such as transforming an object on gaze into an advertisement, experience, scripted or un-scripted 3D object, animated or still 2D image, appless app, and/or tool. Using augmented, mixed and/or virtual reality technology, when a user looks/gazes at a virtual object, the bubble may then pop, transitioning into a video screen. The video screen is not being augmented on the virtual object itself. | 2021-04-15 |
20210111891 | COMPUTER-READABLE RECORDING MEDIUM, MANAGEMENT APPARATUS, AND METHOD FOR IDENTITY VERIFICATION - An identity verification is managed by generating a workflow used by a control apparatus that controls a system in which a plurality of business entities manages attribute information in user information that identifies a user. The workflow is generated, based on a first list of target business entities that perform identity verification of the user, a second list of business entities indicating whether cooperation is performed among the business entities for the identity verification, a number of electronic certificates that certify the user information for completing the identity verification, and a procedure time taken by each of the business entities for the identity verification, so that the workflow minimizes a procedure time taken for completion of the identity verification by the target business entities, and that describes a distribution procedure of the electronic certificates that are used in the identity verification at each of the business entities. | 2021-04-15 |
20210111892 | SCALABE ATTESTATION FOR TRUSTED EXECUTION ENVIRONMENTS - In function-as-a-service (FaaS) environments, a client makes use of a function executing within a trusted execution environment (TEE) on a FaaS server. Multiple tenants of the FaaS platform may provide functions to be executed by the FaaS platform via a gateway. Each tenant may provide code and data for any number of functions to be executed within any number of TEEs on the FaaS platform and accessed via the gateway. Additionally, each tenant may provide code and data for a single surrogate attester TEE. The client devices of the tenant use the surrogate attester TEE to attest each of the other TEEs of the tenant and establish trust with the functions in those TEEs. Once the functions have been attested, the client devices have confidence that the other TEEs of the tenant are running on the same platform as the gateway. | 2021-04-15 |
20210111893 | SECURE DIGITAL INFORMATION INFRASTRUCTURE - An authentication and encryption computer system is disclosed including processing devices, a network interface, and a data store. The authentication and encryption system is configured to maintain in the data store content common to a plurality of entities and content independently specified by each of the plurality of entities. The system is configured to receive a content request from an application executing on a mobile device, the content request comprising a secure access code corresponding to an entity, and the content request encrypted by the mobile device. An interface, comprising the content common to the plurality of entities, is customized to include content independently specified by the entity, wherein the content independently specified by the entity comprises a token value. A user request for an item presented via the interface is received and the token value is transferred to the entity. | 2021-04-15 |
20210111894 | SECURE DIGITAL INFORMATION INFRASTRUCTURE - An authentication and encryption computer system is disclosed including processing devices, a network interface, and a data store. The authentication and encryption system is configured to maintain in the data store content common to a plurality of entities and content independently specified by each of the plurality of entities. The system is configured to receive a content request from an application executing on a mobile device, the content request comprising a secure access code corresponding to an entity, and the content request encrypted by the mobile device. An interface, comprising the content common to the plurality of entities, is customized to include content independently specified by the entity, wherein the content independently specified by the entity comprises a token value. A user request for an item presented via the interface is received and the token value is transferred to the entity. | 2021-04-15 |
20210111895 | SECURE ENROLMENT OF SECURITY DEVICE FOR COMMUNICATION WITH SECURITY SERVER - Provided is novel technology for secure security data transmission and more particularly for registering network-enabled security devices such as IP cameras to a security server over a public network such as to a cloud-based security service. An enrollment server is provided that is logged into using a computing device to request and receive an activation code for the security device. The activation code is then provided to the security device, e.g. directly by the computing device. The Security device authenticates itself based on the activation code and in one example provides a public key that will be used to verify its registration. Data transmissions by the device are secured in part on the basis of its registration. | 2021-04-15 |
20210111896 | METHODS AND SYSTEMS FOR NETWORK SECURITY USING A CRYPTOGRAPHIC FIREWALL - A method is performed at a security device. The method includes establishing a network connection with a client system. After establishing the network connection, the security device receives a first packet from the client system. The first packet includes an identifier, a first counter value, and a first one-time password hash generated by the client system. Based on the identifier received, the security device retrieves from a trusted data store the seed and a second counter value. If the first counter value is larger than the second counter value, the security device generates a second one-time password hash based on the identifier, the first counter value, and the seed. In accordance with a determination that the first and second one-time password hashes match, the security device grants, to the client system, access to one or more network resources protected by the security device via the network connection. | 2021-04-15 |
20210111897 | OFFLINE PROTECTION OF SECRETS - Examples of the present disclosure describe systems and methods relating to the offline protection of secrets. A secret may be encrypted using a public key provided by the client. The client may have obtained the public key from a cryptographic hardware device, wherein the private key of the cryptographic key pair may be bound to the cryptographic hardware device. The encrypted secret may be transmitted by a service to the client using a secured or an unsecured transmission method. In some examples, the service may transmit a subsequent encrypted secret, which may invalidate a previously encrypted secret. In order to authenticate with the service, the client may select an encrypted secret for decryption. The client may access the private key stored by the cryptographic device and decrypt the encrypted secret with the private key. The client may then use the decrypted secret to authenticate with the service. | 2021-04-15 |
20210111898 | AUTHENTICATION USING KEY DISTRIBUTION THROUGH SEGMENTED QUANTUM COMPUTING ENVIRONMENTS - Methods, systems, and apparatus for authenticating and authorizing users using quantum key distribution through segmented quantum computing environments. In one aspect, a method includes receiving a first and second plaintext data input from a first party and from a second party, respectively; applying a quantum computation translation operation to the first and second plaintext data inputs to generate a corresponding first sequence of quantum computations and a second sequence of quantum computations; implementing the first and second sequence of quantum computations in a first and second segmented quantum computing environment, respectively, to obtain a first and second sequence of measurement results; generating a first and second encryption key using the first and second sequence of measurement results, respectively, and an encrypted authorization token using the second encryption key; and sending the first encryption key to the first party, and the encrypted authorization token to the second party. | 2021-04-15 |
20210111899 | CRYPTOANCHOR READER - Unique Physical Unclonable (PUF) function objects may be created by molding or extruding specialized particles creating a measurable physical characteristic over a surface. The magnetized particles form a unique measurable magnetic “fingerprint” based on the random size, position, polar rotation, magnetization level, particle density, etc., of the particles. PUF objects may also vary in other physical characteristics by having a mixture of magnetic, conductive (magnetic or nonmagnetic), optically reflective or shaped, varied densities or mechanical properties resulting in random reflection, diffusion, or absorption of acoustical energy particles in a matrix or binder. The present invention envisions sensing any of the characteristics. | 2021-04-15 |
20210111900 | VERIFICATION INFORMATION ATTACHING DEVICE, VERIFICATION DEVICE, INFORMATION MANAGEMENT SYSTEM, METHOD, AND PROGRAM - A verification information attaching device ( | 2021-04-15 |
20210111901 | EXECUTING ENTITY-SPECIFIC CRYPTOGRAPHIC CODE IN A TRUSTED EXECUTION ENVIRONMENT - Disclosed are various embodiments for executing entity-specific cryptographic code in a trusted execution environment. In one embodiment, encrypted code implementing a cryptographic algorithm is received from a service via a network. The encrypted code is provided to an application executed in a trusted execution environment of the computing device. The encrypted code is decrypted in the trusted execution environment. The decrypted code is executed in the trusted execution environment to generate a cryptogram including information encrypted using the cryptographic algorithm. | 2021-04-15 |
20210111902 | SYSTEM INFORMATION PROTECTION AT A NETWORK FUNCTION IN THE CORE NETWORK - Methods, systems, and devices for wireless communications are described. Private keys may be maintained upstream in a network at a more secure location. For example, when a signature is needed, a base station may transmit a signing request to a signing function within the core network and may transmit system information (SI) to be protected. The signing function may use a private key to generate a signature for the SI and returns the signature to the base station. The base station may transmit the SI and the signature to user equipment (UEs) within a coverage area of the base station. The UEs may obtain a public key corresponding to the private key and may use the public key to verify that the signature for the SI is valid and from the base station. The public key, and hence the signature, may correspond to a particular tracking area. | 2021-04-15 |
20210111903 | COMPILING A SIGNATURE - A device is suggested including a cryptographic module, wherein the device is operable in a secure mode and in a non-secure mode, wherein the cryptographic module is configured in the secure mode by storing a secret key and a seed value in the cryptographic module, and wherein the device is operable in the non-secure mode to generate a signature based on input data utilizing the secret key and the seed value. Also, a method for operating such device is provided. | 2021-04-15 |
20210111904 | Systems and Methods for Accelerated Certificate Provisioning - Embodiments described herein provide systems and methods to prevent, or provide a countermeasure, to a co-existence attack, for example, that may occur in a Security Credential Management System (SCMS) where both regular butterfly key (RBK) protocol and unified butterfly key (UBK) protocol are supported. Embodiments described herein provide, support, employ, or implement hardware acceleration for a Hardware Security Module (HSM), for example, for cryptographic operations (e.g., block ciphers, digital signature schemes, and key exchange protocols). | 2021-04-15 |
20210111905 | AUTOMATED REPLACEMENT OF SELF-SIGNED SERVER CERTIFICATES - Certain aspects and features provide an automated process for a server switching from a self-signed digital certificate to a digital certificate signed by a trusted certificate authority (CA). During initiation of an encrypted communication session, for example, during a transport layer security (TLS) handshake, upon receiving a client hello message, the server determines if it is using a self-signed digital certificate. If so, the server automatically creates and sends a certificate signing request, receives a CA-signed digital certificate, and replaces the self-signed digital certificate in its key store with the CA-signed digital certificate. The server then includes the new, CA-signed digital certificate in the server hello message sent back to the client to establish the encrypted communication session. | 2021-04-15 |
20210111906 | PSEUDONYM CREDENTIAL CONFIGURATION METHOD AND APPARATUS - Embodiments of this application provide a pseudonym credential configuration method and apparatus. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device. | 2021-04-15 |
20210111907 | AUTOMATED REPLACEMENT OF RENEWABLE SERVER CERTIFICATES - Certain aspects and features provide an automated process for a server switching from existing digital certificate that is expired or about to expire to a new digital certificate signed by a trusted certificate authority (CA). During initiation of an encrypted communication session, for example, during a transport layer security (TLS) handshake, upon receiving a client hello message, the server determines whether it is using a renewable digital certificate. If so, the server automatically creates and sends a certificate signing request; receives a new, CA-signed digital certificate; and replaces the existing digital certificate in its key store with the new digital certificate. The server then includes the new digital certificate in the server hello message sent back to the client to establish the encrypted communication session. | 2021-04-15 |
20210111908 | METHOD AND APPARATUS FOR PROTECTING EMBEDDED SOFTWARE - Disclosed is a device and method to secure software update information for authorized entities. In one embodiment, a device for receiving secured software update information from a server, the device includes: a physical uncolonable function (PUF) information generator, comprising a PUF cell array, configured to generate PUF information, wherein the PUF information comprises at least one PUF response output, wherein the at least one PUF response output is used to encrypt the software update information on the server so as to generate encrypted software update information; a first encrypter, configured to encrypt the PUF information from the PUF information generator using one of at least one public key from the server so as to generate encrypted PUF information; and a second encrypter, configured to decrypt the encrypted software update information using one of the at least one PUF response output so as to obtain the software update information. | 2021-04-15 |
20210111909 | FLUID METER COMMUNICATING WITH AN ELECTROMECHANICAL VALVE - A fluid meter includes communication means arranged to receive an external opening or closing command to open or close an electromechanical valve suitable for being included in a cut-off unit mounted in the proximity of the fluid meter, authentication means arranged to authenticate a control frame including the opening or closing command, and a first communication interface arranged to transmit both the control frame and electrical energy to a second communication interface of the cut-off unit via a wireless link. The electrical energy is suitable for electrically powering the second communication interface of the cut-off unit. | 2021-04-15 |
20210111910 | METHOD AND SYSTEM FOR MANAGING POWER DELIVERY AND FIXTURE OPERATION FOR POWER OVER ETHERNET SYSTEMS - The present invention is a system for providing power and controlling a plurality of ethernet devices, comprising: a driver, wherein the driver provides for the control of the system; a plurality of sensors, wherein the plurality of sensors collect sensor specific data and are in communication with the driver; a Power over Ethernet (POE) switch, wherein the POE switch is in communication with the plurality of sensors; a plurality of fixtures in communication with the driver and the POE switch, wherein the plurality of fixtures are light sources; and a local power source, wherein the local power source is in communication with the POE switch. | 2021-04-15 |
20210111911 | METHOD AND SYSTEM FOR MANAGING POWER DELIVERY AND FIXTURE OPERATION FOR POWER OVER ETHERNET SYSTEMS - The present invention is a system for providing power and controlling a plurality of ethernet devices, comprising: a driver, wherein the driver provides for the control of the system; a plurality of sensors, wherein the plurality of sensors collect sensor specific data and are in communication with the driver; a Power over Ethernet (POE) switch, wherein the POE switch is in communication with the plurality of sensors; a plurality of fixtures in communication with the driver and the POE switch, wherein the plurality of fixtures are light sources; and a local power source, wherein the local power source is in communication with the POE switch. | 2021-04-15 |
20210111912 | DATA MANAGEMENT APPARATUS, DATA MANAGEMENT METHOD, AND DATA COMMUNICATION SYSTEM - A data management apparatus manages a plurality of data items output by a plurality of communication devices that output data. The data management apparatus includes at least one memory configured to store instructions, and at least one processor configured to execute the instructions. The instructions, when executed by the at least one processor, include receiving a data acquisition request, including an application identification of an application from the data acquisition apparatus, extracting data output by the application on a communication device corresponding to the application identification included in the data acquisition request, among the plurality of data items received from the plurality of communication devices via a relay apparatus, and transmitting the extracted data to the data acquisition apparatus. | 2021-04-15 |
20210111913 | MULTICAST TRANSFER SYSTEM AND MULTICAST TRANSFER METHOD - [Problem] To perform path switching quickly and efficiently when path switching is required in a multicast transfer system. | 2021-04-15 |
20210111914 | DISTRIBUTED MULTICAST LOGICAL ROUTER - Some embodiments provide a method for configuring a set of MFEs to implement a distributed multicast logical router and multiple logical switches to process the multicast data messages. The method sends, from a managed forwarding element (MFE) implementing the distributed multicast logical router, a multicast group query to a set of data compute nodes (DCNs) that are logically connected to one of several logical switches and that execute on the same host machine as the managed forwarding element. The method receives multicast group reports from a subset of the set of DCNs and at least one of the multicast group reports specifies a multicast group of interest. The method distributes, to a set of MFEs executing on other host machines, a summarized multicast group report specifying a set of multicast groups of interest to the first MFE (i.e., multicast groups that the first MFE participates in). | 2021-04-15 |
20210111915 | GUIDING A PRESENTER IN A COLLABORATIVE SESSION ON WORD CHOICE - Suggesting words includes, during a collaborative session involving a plurality of participants, determining a first subject domain of interest for at least one participant of the collaborative session that is not a presenter and selecting, using a processor, at least one word within the first subject domain. The word can be provided to a communication device of the participant designated as the presenter and not to any other communication device of a participant. | 2021-04-15 |
20210111916 | CONTENT FEATURE BASED VIDEO STREAM SUBSCRIPTIONS - Disclosed in some examples are devices, systems, methods, and machine-readable mediums which provide for a network-based communication service that allows users in a network-based communication session to subscribe to video streams of the communication session that are of interest by subscribing to content features of those video streams rather than the video streams themselves. Content features may be any object in the video stream that is recognized by applying an image processing algorithm to one or more video frames. Example content features may include recognized users and/or other recognized objects. | 2021-04-15 |
20210111917 | Personalized Video Calls - A system for facilitating interactive and personal video communication between notable individuals and members of the public, including interaction that is tailored to the individual member of the public, the video interaction able to be monitored and controlled by a third party. | 2021-04-15 |
20210111918 | REMOTE SERVICE DIAGNOSTICS AND SERVICE SCHEDULING FOR APPLIANCES - A method of automating the diagnostics and scheduling of service calls associated with a malfunctioning appliance is provided. The method includes obtaining data associated with a trigger event based on a fault code of a malfunctioning appliance, identifying one or more technicians based on the obtained data, determining the availability of the one or more technicians, providing the availability of the identified one or more technicians for display on a user interface of an interactive assembly in communication with the malfunctioning appliance, and receiving a user selection of a technician through user interaction with the user interface on the interactive assembly. | 2021-04-15 |
20210111919 | DIRECTIONAL WIRELESS DROP SYSTEMS FOR BROADBAND NETWORKS AND RELATED METHODS - Directional wireless drop systems are provided. These systems include a tap unit that is connected to a communications line of the broadband network; a cable modem unit connected to the tap unit; a plurality of wireless routers connected to the cable modem unit; and a directional antenna unit that is connected to at least a first of the wireless routers. Each wireless router is associated with a respective one of a plurality of subscriber premises that are served by the directional wireless drop system and is configured to communicate with at least one device that is located at the respective one of plurality of subscriber premises. | 2021-04-15 |
20210111920 | MODULAR PROCESSOR ARCHITECTURE OF A COCKPIT AND INFOTAINMENT SYSTEM FOR A VEHICLE - The approach relates to a modular computer architecture of a cockpit and infotainment system for a vehicle that includes an I/O module with an I/O computing node ( | 2021-04-15 |
20210111921 | METHOD AND APPARATUS FOR ESTABLISHING COMMUNICATION BETWEEN VEHICLE DIAGNOSIS DEVICE AND VEHICLE, AND VEHICLE COMMUNICATION INTERFACE DEVICE - Embodiments of the present invention relate to the field of vehicle technologies, and disclose a method for establishing communication between a vehicle diagnosis device and a vehicle. The method is applied to a vehicle communication interface device. In the method, when a channel establishment instruction of the vehicle diagnosis device is received, a CAN controller in an idle state in at least two CAN controllers is determined, and then a communication parameter is set for the CAN controller in an idle state. Further, when a specified communication pin set of the vehicle diagnosis device is received, it is determined whether a CAN controller connected to the specified communication pin set is in an idle state. If yes, a communication channel from the vehicle diagnosis device to the specified pin set is established according to a communication parameter in the CAN controller connected to the specified communication pin set, so that the vehicle diagnosis device is communicatively connected to the vehicle through the specified pin set. In the method, no switch is required between the CAN controller and the communication pin set, so that the CAN controller can be easily and quickly allocated. | 2021-04-15 |
20210111922 | NETWORK PROCESSING DEVICE AND NETWORKS PROCESSING METHOD OF COMMUNICATION FRAMES - To realize a low power consumption and a small area of a network communication system and a semiconductor device for mounting the same. In the processing method of the network router or network communication frame, the received frame is input to the hash generator, to obtain an address based on the resulting hash value, the position of the address in the rule table, stores the rule corresponding to the received frame. | 2021-04-15 |
20210111923 | Method to Write Requests on a Vehicle Diagnostic Bus - A method carried out in a system, the system comprising at least a diagnosis plug-in device ( | 2021-04-15 |
20210111924 | Distributed Control System and Communication Control Method Therefor - In the present invention, device information is collected while real-time performance and high-speed performance of control-related normal communication are maintained. The distributed control system has: a central processing device; a central communication device; multiple terminal communication devices each having at least one controlled device connected thereto; an information storage device; and a network having a tree structure comprising multiple communication paths between the central communication device and the terminal communication devices, between the terminal communication devices, and between the terminal communication devices and the information storage device. The network is provided with a first communication path for connecting the upstream-side communication port of a terminal communication device with the downstream-side communication port of a terminal communication device and for connecting the upstream-side communication port of a terminal communication device with the normal communication port of the central communication device; and a second communication path for connecting between the downstream-side communication ports of terminal communication devices positioned at edges of the network and for connecting the downstream-side communication ports of the terminal communication devices with the device information communication port of the information storage device. | 2021-04-15 |
20210111925 | SYSTEMS AND METHODS FOR PROVIDING NETWORK CONNECTORS - A networking system may include a first network such as a private cloud network and a second network such as a public cloud network. The first network may include a switch coupled to a computing resource. To facilitate a robust and flexible inter-network connection, the networking system may include network connector circuitry having a connector endpoint at the first network and a network connector coupling the connector endpoint to a network element at the second network. A controller for the first network may provide control signals and configuration data to the network connector circuitry to form the connection to the second network and may configure the switch to forward external network traffic to and from the connector endpoint via a switch port directly coupled to the connector endpoint. | 2021-04-15 |
20210111926 | PROCESSING TRAFFIC IN A VIRTUALISED ENVIRONMENT - Traffic is processed in a virtualised environment comprising: (i) a physical underlay network; (ii) a first overlay network (an overlay of the physical underlay network and associated with a first set of network addresses, IP | 2021-04-15 |
20210111927 | METHODS AND APPARATUSES FOR DATA TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM - Embodiments of the present disclosure relate to downlink/uplink data transmission in a wireless communication system. In an embodiment of the present disclosure, there is provided a method for downlink data transmission in a wireless communication system which comprises transmitting an indication for a new-type reference signal to a user equipment, wherein the new-type reference signal has an identical location in frequency domain to a legacy reference signal; and transmitting the new-type reference signal and the legacy reference signal to the user equipment for using in channel estimation. In a case of more than one antenna port, the new-type reference signal may be designed to have a different location in time domain from a legacy reference signal to avoid interference to other antenna ports. With embodiments of the present disclosure, it is possible to perform a channel estimation based on both the legacy reference signal and the new-type reference signal to achieve a higher accuracy of channel estimation, and thus a UE with a low SNR may be also used in LTE networks. | 2021-04-15 |
20210111928 | BEAM SELECTION METHOD AND APPARATUS, AND STORAGE MEDIUM - This application provides a beam selection method and apparatus, and a storage medium. The method includes: separately measuring a sounding reference signal SRS sent by at least one terminal, to determine a first spectral efficiency of each terminal; calculating a second spectral efficiency of each beam group based on the first spectral efficiency of each terminal, where each beam group includes at least one beam, and each beam covers at least one terminal; and determining a target beam group based on the second spectral efficiency of each beam group. | 2021-04-15 |
20210111929 | Systems, Methods and Apparatus for Transmission of Data Using M-ARY Time Reversal Pulse Position Modulation - A system, method and apparatus that includes two or more sensor nodes that obtain sensed data from a structure. A controller receives the sensed data from the sensor nodes, via a network formed by the sensor nodes and the controller. The controller controls functionality of each of the sensor nodes, controls time synchronization among the sensor nodes, detects information collected by the sensor nodes, and communicates, utilizing an M-ary time-reversal based protocol, the detected information using a planar surface of the structure as the transmission medium for elastic waves. | 2021-04-15 |
20210111930 | DISTRIBUTED MINIMUM MEAN-SQUARE ERROR INTERFERENCE REJECTION COMBINING (MMSE-IRC) PROCESSING FOR RADIO ACCESS NETWORKS - Various embodiments herein provide techniques for minimum mean-square error interference rejection combining (MMSE-IRC) processing of a received signal, distributed between a baseband unit (BBU) and a remote radio unit (RRU). The RRU may perform a first phase of processing based on an extended channel that includes a channel of one or more user equipments (UEs) served by the RRU and interference samples that correspond to other cells or additive noise. The first phase may include scaling the interference samples by a scaling coefficient to obtain a modified extended channel, and performing maximum ratio combining (MRC) on the modified extended channel to obtain a processed signal. The RRU may send the processed signal to the BBU for the second phase of processing. The second phase of processing may include regularized zero forcing to remove interference. Other embodiments may be described and claimed. | 2021-04-15 |
20210111931 | HIGH SPEED COMMUNICATIONS SYSTEM - Transmission of baseband and carrier-modulated vector codewords, using a plurality of encoders, each encoder configured to receive information bits and to generate a set of baseband-encoded symbols representing a vector codeword; one or more modulation circuits, each modulation circuit configured to operate on a corresponding set of baseband-encoded symbols, and using a respective unique carrier frequency, to generate a set of carrier-modulated encoded symbols; and, a summation circuit configured to generate a set of wire-specific outputs, each wire-specific output representing a sum of respective symbols of the carrier-modulated encoded symbols and at least one set of baseband-encoded symbols. | 2021-04-15 |
20210111932 | EFFICIENT SIGNALING SCHEME FOR HIGH-SPEED ULTRA SHORT REACH INTERFACES - A multi-chip module (MCM) includes a first integrated circuit (IC) chip to receive first data. The first IC chip includes a first transfer interface to transmit the first data off the first IC chip. A second IC chip includes an input interface to receive the first data from the first IC chip. The second IC chip includes switching circuitry to selectively forward the first data to one of a first output interface or a second output interface. The first output interface is communicatively coupled to a third IC chip, while the second output interface is configured to output the first data from the MCM. | 2021-04-15 |
20210111933 | METHOD FOR ADJUSTING PHY IN FLEXE GROUP, RELATED DEVICE, AND STORAGE MEDIUM - Embodiments of this application provide a method. A receiving device determines that a first PHY needs to be added to a first FlexE group in a working state; performs deskew on the first PHY or each PHY in the first FlexE group based on a received data stream corresponding to the first PHY and a received data stream corresponding to each PHY in the first FlexE group, and restores a data stream corresponding to a client from a PHY in the first FlexE group; and if skew between the data stream corresponding to the first PHY and the data stream corresponding to each PHY in the first FlexE group after the deskew is performed is zero, restores a data stream corresponding to a client from a PHY in a second FlexE group. Flexibility of adjusting a PHY in a FlexE group in a working state is improved. | 2021-04-15 |
20210111934 | PHASE-BASED PRE-CARRIER DETECTION - Methods and apparatus for phased-based pre-carrier signal detection in a communication system are described. In embodiments, inphase and quadrature (IQ) data is generated from a received signal. A current phase delta value is determined from the IQ data and combined with existing phase delta value, such as an averaged phase delta value, which is compared with a threshold value to determine if a pre-carrier signal in the received signal has ended. | 2021-04-15 |
20210111935 | PACKET EXTENSION FOR EXTREMELY HIGH THROUGHPUT (EHT) TRIGGER FRAME - An apparatus of a station (STA) includes memory and processing circuitry coupled to the memory. The processing circuitry is configured to encode a capabilities element for transmission to an access point (AP). The capabilities element including a media access control (MAC) capabilities information field indicating a trigger frame MAC padding duration. The processing circuitry decodes an extremely high throughput (EHT) protocol data unit (PPDU) received in response to the capabilities element. The EHT PPDU includes an EHT trigger frame (EHT-TF) in a data portion of the EHT PPDU, a packet extension (PE) field, and a dummy orthogonal frequency division multiplexing (OFDM) symbol extending the PE field. The processing circuitry performs physical layer (PHY) and MAC processing of the EHT PPDU based on a duration of the dummy OFDM symbol. | 2021-04-15 |
20210111936 | METHOD FOR NON-LINEAR DISTORTION IMMUNE END-TO-END LEARNING WITH AUTOENCODER - OFDM - A new layer tailored for Artificial Intelligence-based communication systems to limit the instantaneous peak power for the signals that relies on manipulation of complementary sequences through neural networks. Disclosed is a method for providing non-linear distortion in end-to-end learning communication systems, the communication system comprising a transmitter and a receiver. The method includes mapping transmitted information bits to an input of a first neural network; controlling, by an output of the neural network, parameters of a complementary sequence (CS) encoder, producing an encoded CS; transmitting the encoded CS through an orthogonal frequency division multiplexing (OFDM) signal; processing, by Discrete Fourier Transform (DFT), the encoded CS, to produce a received information signal in a frequency domain; and processing, by a second neural network, the received information signal. | 2021-04-15 |
20210111937 | POWER AND RESOURCE EFFICIENT UPLINK DMRS SEQUENCES FOR IFDMA - A method of transmitting demodulation reference signals (DMRS) over one, three or five resource blocks (RBs) with Interleaved Frequency Division Multiple Access (IFDMA) from a wireless device to a wireless network node in a wireless network wherein Single Carrier Frequency Division Multiple Access (SC-OFDMA) is deployed in uplink, is provided. At least one of: a set of base sequences including thirty quadrature phase shifting keying, QPSK, sequences of length 6, 18 or 30 is determined, a demodulation reference signal sequence is derived from the determined set of base sequences, the demodulation reference signal sequence is multiplexed, and the multiplexed demodulation reference signal sequence is transmitted, by the wireless device, to the wireless network node. | 2021-04-15 |
20210111938 | SYSTEMS AND METHODS FOR RELIABLE CHIRP TRANSMISSIONS AND MULTIPLEXING - Apparatuses, systems, and methods for transmitting and multiplexing chirp signals for communications are provided. An example apparatus includes an antenna, a radio, and processing circuitry. The radio may be configured to transmit and receive wireless communications via the antenna, and the processing circuitry configured to establish a wireless communications link with a receiving communications device. The signaling transmitted by the antenna via the radio as controlled by the processing circuitry may include a plurality of sequenced chirp signals within an orthogonal frequency division multiplexing (OFDM) framework. | 2021-04-15 |
20210111939 | METHOD AND DEVICE FOR ESTIMATING TIMING LOCATION - Disclosed in the present application is a method and a device of estimating a timing location. The method comprised: for each preamble subsequence, acquiring a detection window in which a peak value of a correlation value power of each preamble subsequence is located; accumulating the correlation value powers of the corresponding locations in the acquired detection window of each preamble subsequence, to obtain a cumulative sum of the correlation value powers corresponding to each location, wherein, in the accumulation, the correlation value powers of the preamble subsequence are within detection window in which peak values of respective correlation value powers are located; determining, according to the cumulative sum of the correlation value powers, peak power and noise power; and estimating, according to the peak power and the noise power, a timing location. The present application can solve the problem of a current M-stage preamble sequence solution. | 2021-04-15 |
20210111940 | Data Transmission Method and Apparatus Based on Probability Non-Uniform Modulation - A data transmission method includes generating a physical layer data frame, where the physical layer data frame includes data on which probability non-uniform modulation is performed and indication information, where the indication information indicates demodulation parameters for performing probability non-uniform demodulation on the data, where the demodulation parameters include a modulation scheme for probability non-uniform modulation, a modulation order for probability non-uniform modulation, and at least one of a probability of each constellation symbol on which probability non-uniform modulation is performed, or a mapping relationship between each constellation symbol on which probability non-uniform modulation is performed and a bit stream, sending the physical layer data frame to a receive end, receiving the physical layer data frame, determining the demodulation parameters based on the indication information, and performing probability non-uniform demodulation on the data based on the demodulation parameters. | 2021-04-15 |
20210111941 | SCALABLE SUBSCRIPTIONS FOR VIRTUAL COLLABORATIVE WORKSPACES - Systems, methods, articles of manufacture, and computer program products for scalable subscriptions for virtual collaborative workspaces. An indication of a process event associated with a computer-implemented process may be received. A population of subscribers subscribed to at least one property of one of the process event or the computer-implemented process may be determined. A virtual collaborative workspace for the process event may be generated, the virtual collaborative workspace operative to present context information associated with the process event to a plurality of subscribers. A message may be sent to the population of subscribers indicating the process event, the message comprising a link to access the virtual collaborative workspace. The virtual collaborative workspace may be generated for display responsive to selection of the link by the at least one of the population of subscribers. | 2021-04-15 |