18th week of 2022 patent applcation highlights part 83 |
Patent application number | Title | Published |
20220140935 | SYSTEM AND METHOD FOR PEAK FLOW DETECTION IN A COMMUNICATION NETWORK - A method includes determining a delivery performance of a data flow being transmitted from a first network equipment to a second network equipment over a network; determining whether the network is congested based on the determined delivery performance of the data flow being transmitted to the second network equipment; and pacing delivery of the data flow to the second network equipment by reducing a rate at which the data flow is delivered to the second network equipment when the network is determined to be congested. | 2022-05-05 |
20220140936 | RATE SELECTION IN MULTIPLE-INPUT MULTIPLE-OUTPUT COMMUNICATION SYSTEMS - Aspects of this disclosure relate to user equipment rate selection. Sum rates can be compared including and excluding a candidate layer. Based on the comparison, the candidate layer can be included in a layer set. Rate selection for user equipments of a cluster can be performed based on the layer set. In certain applications, user equipment rate selection can be performed for multiple clusters of user equipments and network nodes. In such applications, inter-cluster interference can be nulled. | 2022-05-05 |
20220140937 | INFORMATION INDICATION AND DETERMINATION METHODS AND APPARATUSES - Information indication and determination methods and apparatuses. The information indication method includes: issuing joint indication information based on a mapping relationship between quantity of transmission blocks (TB), and at least one of a resource allocation mode and/or a modulation coding strategy (MCS), in which the joint indication information is configured to indicate quantity of scheduled TBs and at least one of the resource allocation mode and the MCS through indicating the mapping relationship. | 2022-05-05 |
20220140938 | Error Correction by Merging Copies of 5G/6G Messages - Disclosed are procedures for measuring the modulation quality of each message resource element in a failed 5G or 6G communication, thereby revealing the most likely fault locations in the message. The types of modulation deviations in the low-quality message elements can provide further guidance as to the correct demodulation. In addition, after receiving a second copy, the copies can be merged by selecting the highest quality message elements from each version, where the quality is related to how far each message element's modulation deviates from the calibrated “states” of the modulation scheme. The receiver may also determine directional information based on the modulation of each message element, and may compare versions to determine the most likely correct state of each message element. Such strategies may directly recover the original message, or may greatly reduce the number of variations that need to be tested. When implemented, fault mitigation as disclosed herein can resolve message failures, improve communication reliability, reduce latency, and improve network operations overall, according to some embodiments. | 2022-05-05 |
20220140939 | METHODS AND APPARATUS FOR ENHANCING WIRELESS LINK THROUGHPUT IN SMALL-CELL WIRELESS SYSTEMS - Methods and apparatus for enhancing data rates in a small-cell wireless communication network. In one embodiment, the methods and apparatus utilize “quasi-licensed” CBRS (Citizens Broadband Radio Service) wireless spectrum in conjunction with 3GPP wireless communication network (e.g. 4G LTE or 5GNR) for the delivery of services to a number of enhanced fixed wireless apparatus (CPEe/FWAe) at user or subscriber premises. The various CPEe/FWAe report Channel Quality Indicator (CQI) data to their respective serving base stations, and each base station maps the CQI value to a prescribed configuration (e.g., to the Modulation and Coding Scheme (MCS)) adaptively for the transmission of the data to the CPEe/FWAe. In one implementation, the base stations update the CQI to MCS values adaptively according to ACK/NACK requests received from the CPEe/FWAe. | 2022-05-05 |
20220140940 | AI-Based Error Detection and Correction in 5G/6G Messaging - Artificial intelligence procedures are disclosed for localizing faults in corrupted messages in 5G and 6G, and for correcting those faults based on measured parameters such as backgrounds and message signals. Message faults can be caused by noise or interference from a variety of sources with a wide range of properties. An AI model with multiple adjustable variables may be “trained” using a large number of message events, including faulted messages, to determine which message elements are likely faulted, based on input parameters such as modulation quality, SNR, and other signal properties. The receiving entity can then attempt a grid search to correct the faulted message elements, or request a retransmission. For field use by base stations and user devices, an algorithm may be developed based on the AI model, and configured to predict which message elements are likely faulted. By detecting and correcting message faults, networks may increase reliability and reduce latency while avoiding most retransmission costs and delays, according to some embodiments. | 2022-05-05 |
20220140941 | FRAME BASED LISTEN BEFORE TALK FOR RADAR ENABLED DEVICES WITH VARIABLE CHIRP LENGTHS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a radar enabled device may perform a plurality of listen before talk (LBT) procedures corresponding to a plurality of chirp lengths. The radar enabled device may transmit a particular signal (e.g., a radar signal) based at least in part on a successful result of an LBT procedure of the plurality of LBT procedures. Numerous other aspects are provided. | 2022-05-05 |
20220140942 | INTERPRETATION OF RESERVED STATES IN WIRELESS PACKETS - This disclosure provides methods, devices and systems for interpreting reserved bits and values associated with different releases of a wireless communication protocol. In some implementations, a wireless communication device may determine whether to terminate or continue reception of a physical layer protocol convergence protocol (PLCP) protocol data unit (PPDU) if it detects a reserved bit in the physical layer preamble set to an unsupported value (such as a value different than what is defined by a version or release of the wireless communication protocol supported by the wireless communication device). In some other implementations, a wireless communication device may determine whether to terminate or continue reception of a PPDU if it detects a field in the physical layer preamble set to a reserved value (such as defined by a version or release of the wireless communication protocol supported by the wireless communication device). | 2022-05-05 |
20220140943 | COMMUNICATION METHOD AND APPARATUS - This application discloses a communication method and apparatus. A terminal device receives first information from a network device. The first information indicates that the terminal device is to skip PDCCH blind detection. The terminal device determines a start moment of a first time period based on the first information. The terminal device stops the PDCCH detection within the first time period from the start moment of the first time period. The terminal device determines a time from which the PDCCH detection is actually stopped, so that the network device and the terminal device can have consistent understanding for the time from which the terminal device actually stops the PDCCH detection, to improve resource utilization and reduce power consumption of the terminal device. | 2022-05-05 |
20220140944 | APPARATUS AND METHOD FOR DETECTING FALSE ALARM OF DECRYPTION IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a 5th (5G) generation) or pre-5G communication system for supporting a higher data transmission rate beyond a 4th (4G) generation communication system such as long term evolution (LTE). The present disclosure relates to false alarm detection of detecting in a wireless communication system, and an operating method of a receiving node may include receiving a signal from a transmitting node, obtaining a plurality of decoding paths by decoding bits contained in the received signal, and determining whether the decoding is successful based on a detection metric determined based on values representing path metrics of the plurality of the decoding paths. | 2022-05-05 |
20220140945 | METHODS AND PROCEDURES FOR POLAR ENCODING AND DECODING WITH LOW LATENCY - A polar code may be initially divided into multiple polar component codes where the features of these component codes, such as the number of component codes and the size of the component codes, are determined based on parameters such as the number of available timing units within a transmission interval, interleaving depth, and decoder capability. For each selected component code, the order of code bit generation and their indexes may be determined. The determined indexes may be assigned into different, unique groups according to the order of code bit generation. An interleaving operation may be configured and then executed according to the determined index grouping. In the transmission phase, the code bits may be transmitted based on the identified order of the bit generation in the component polar codes, such as the determined index grouping. | 2022-05-05 |
20220140946 | RATE-SPLITTING CONSTRUCTION OF POLAR CODED HYBRID AUTOMATIC REPEAT REQUEST (HARQ) SCHEME - Wireless communications systems and methods related to hybrid repeat request (HARQ) with rate splitting are provided. A first wireless communication device communicates, with a second wireless communication device, a first communication signal including a plurality of information bits. The first wireless communication device determines a number of bits in the plurality of information bits to be repeated in a second communication signal based on channel capacity information. The first wireless communication device communicates, with the second wireless communication device, the second communication signal including the plurality of information bits and a repetition of a subset of the plurality of information bits, where the subset of the plurality of information bits includes the determined number of bits. | 2022-05-05 |
20220140947 | USER TERMINAL AND RADIO COMMUNICATION METHOD - To appropriately perform communications even when a random access procedure with less steps than existing steps is performed, an aspect of a user terminal according to the present disclosure includes a transmitting section that transmits a UL signal including a random access preamble and a certain message, a receiving section that receives a DL signal transmitted in response to the UL signal, and a control section that determines whether to retransmit the UL signal, based on at least one of a period since reception of the DL signal, an indication content of the DL signal, and a content of a bit field configured for a downlink control channel included in the DL signal. | 2022-05-05 |
20220140948 | METHOD AND APPARATUS FOR PERFORMING HARQ OPERATION - A receiving STA can receive a first PPDU including a first data block and a second data block in a wireless local area network system according to various embodiments. The first data block and the second data block can be configured by a first index. Afterward, the receiving STA can transmit a retransmission request signal for the first data block. The receiving STA can receive the first data block again. Then, the receiving STA can combine the first and second data blocks configured by the first index. | 2022-05-05 |
20220140949 | METHOD AND APPARATUS FOR HYBRID AUTOMATIC REPEAT REQUEST FEEDBACK IN COMMUNICATION SYSTEM - An operation method of a terminal in a communication system may comprise: receiving, from a base station, a higher layer message including first configuration information of a first HARQ process group and second configuration information of a second HARQ process group; receiving, from the base station, control information including an RV field including first information indicating one HARQ process group used for communication between the terminal and the base station among the first HARQ process group and the second HARQ process group, a HPN field including second information indicating a number of a HARQ process belonging to the one HARQ process group indicated by the first information, and resource allocation information; receiving data from the base station based on the resource allocation information; and determining whether to transmit a HARQ feedback for the data according to the first information included in the control information. | 2022-05-05 |
20220140950 | Wireless Device Control Channel Monitoring - A wireless device comprises one or more processors and memory storing instructions. When executed by the one or more processors, the instructions cause the wireless device to receive messages comprising a downlink hybrid automatic repeat request (HARQ) round-trip-time (RTT) timer value expressed in units of symbols and a downlink discontinuous reception (DRX) retransmission timer value expressed in units of slot lengths, receive a downlink control information indicating downlink transmission of a transport block, start a downlink HARQ RTT timer with the downlink HARQ RTT timer value in response to receiving the downlink control information, start a downlink DRX retransmission timer with the downlink DRX retransmission timer value in response to the downlink HARQ RTT timer expiring and the transport block not being successfully decoded, and monitor a downlink control channel while the downlink DRX retransmission timer is running. | 2022-05-05 |
20220140951 | METHOD AND APPARATUS FOR CONFIGURATION OF RESOURCE SENSING IN NR V2X RESOURCE ALLOCATION - A method for a user equipment (UE) to provide hybrid automatic repeat request acknowledgement (HARQ-ACK) information includes transmitting physical sidelink shared channels (PSSCHs), where each of the PSSCH transmissions provides a transport block (TB); receiving physical sidelink feedback channels (PSFCHs); and generating values for HARQ-ACK information bits from the PSFCH receptions. The PSFCH receptions correspond to the PSSCH transmissions and the values of the HARQ-ACK information bits correspond to the TBs in the PSSCH transmissions. The method further includes generating a HARQ-ACK codeword that includes the values of the HARQ-ACK information bits arranged in a predetermined order and transmitting the HARQ-ACK codeword in a physical uplink control channel (PUCCH). | 2022-05-05 |
20220140952 | SYSTEMS AND METHODS FOR SMART HARQ FOR WIFI - Systems, methods, and instrumentalities are provided to implement a method of communicating a feedback in a wireless local area network (WLAN). A WLAN device may receive a data frame with a hybrid automatic repeat request (HARQ) data indicator in a frame header. The WLAN device may send an acknowledgement frame when the data frame is correctly received and decoded. The WLAN device may send a negative acknowledgement frame when the data frame is not correctly received and decoded. | 2022-05-05 |
20220140953 | TRANSMITTING METHOD AND RECEIVING METHOD FOR FEEDBACK INFORMATION, DEVICE, TERMINAL DEVICE AND MEDIUM - A transmitting method and a receiving method for feedback information, a device, a terminal device, and a medium are provided. The method includes: receiving first signaling, where the first signaling carries N new feedback indicators (NFIs), the N NFIs correspond to N groups in one-to-one, and N is a positive integer; and transmitting a feedback codebook, where the feedback codebook comprises first feedback information corresponding to a first HARQ process, the first HARQ process is transmitted through a physical channel in a first group with a first value of NFI, the first group is one of the N groups, and the first value is the value of NFI corresponding to the first group among the N NFIs. Therefore, understanding ambiguity of the feedback information between the terminal device and the access network equipment is avoided, and utilization efficiency of transmitted resources is improved. | 2022-05-05 |
20220140954 | METHOD AND DEVICE FOR TRANSMITTING/RECEIVING HARQ-ACK INFORMATION IN WIRELESS COMMUNICATION SYSTEM - A method for transmitting and receiving HARQ-ACK information in a wireless communication system and a device therefor are disclosed. Specifically, a method of transmitting, by a user equipment (UE), HARQ-ACK information in a wireless communication system comprises receiving first downlink control information (DCI) based on a first control resource set group and second DCI based on a second control resource set group; determining a physical uplink control channel (PUCCH) resource for a transmission of the HARQ-ACK information; and transmitting the HARQ-ACK information based on the determined PUCCH resource, wherein the first DCI and the second DCI are indexed based on (i) an index of a physical downlink control channel (PDCCH) related monitoring occasion, (ii) a cell index, and (iii) an index associated with each control resource set group, and wherein the PUCCH resource is determined based on a last DCI among the first DCI and the second DCI. | 2022-05-05 |
20220140955 | SIDELINK INFORMATION TRANSMISSION METHOD, TERMINAL, AND CONTROL NODE - Embodiments of this disclosure provide a sidelink information transmission method, a terminal, and a control node. The method includes: mapping sidelink information to target notification information; and transmitting the target notification information on a target resource. | 2022-05-05 |
20220140956 | SIDELINK SIGNAL TRANSMISSION METHOD IN WIRELESS COMMUNICATION SYSTEM - In an embodiment, a sidelink signal transmission or reception method for a first terminal in a wireless communication system comprises the steps of: receiving, from a base station, a signal for assigning one or more first resources; transmitting, to a second terminal, a sidelink signal by using the one or more first resources; receiving, from the second terminal, HARQ non-acknowledgement (NACK) feedback on the sidelink signal; and receiving, from the base station, a signal for assigning a second resource as an initial transmission resource, wherein the second resource is used as a retransmission resource for the sidelink signal. | 2022-05-05 |
20220140957 | HARQ Feedback Technique for Communication Systems - A device receiving a transmission is configured to provide its feedback in a unique resource pattern within a set of resources (a resource pool). The resource pattern used by the device overlaps partially with one or more resource patterns used for feedback transmissions by other devices in the group. The transmitting device is able to identify the device by identifying an activation pattern matching the unique resource pattern of the device in the overall feedback that it receives from the devices of the group. | 2022-05-05 |
20220140958 | FEEDBACK INFORMATION TRANSMISSION METHOD, TERMINAL, AND STORAGE MEDIUM - The present disclosure relates to the technical field of communications, particularly to a feedback information transmission method. The method comprises: sending, by a first terminal, a sidelink hybrid auto repeat request ACK (HARQ-ACK) codebook via a physical uplink channel within a target time unit for sending sidelink HARQ-ACK information within the target time unit, the sidelink HARQ-ACK codebook including sidelink HARQ-ACK information corresponding to at least one sidelink data. | 2022-05-05 |
20220140959 | CLI MEASUREMENT REPORTING IN TELECOMMUNICATION SYSTEMS - According to a first example embodiment, a method may include transmitting, by a network entity, at least one radio resource control (RRC)-based cross link interference (CLI) measurement framework object configured for at least one user equipment (UE) CLI measurement. The method may further include receiving, by the network entity, at least one reporting message. The method may further include resolving at least one inter-UE CLI problem on a semi-dynamic time scale based upon reporting rates associated with RRC measurements and/or pre-defined behavior. | 2022-05-05 |
20220140960 | RESOURCE MANAGEMENT FOR REPORTING SIGNAL-TO-INTERFERENCE-PLUS-NOISE RATIO - Methods, systems, and devices for resource management for reporting signal-to-interference-plus-noise-ratio (SINR) in mobile communication technology are described. An example method for wireless communication includes transmitting, by a network node to a wireless device, a first resource configuration and a second resource configuration, where the first resource configuration comprises one or more first resources related to channel measurement, the second resource configuration comprises one or more second resources related to interference measurement, and at least one first resource is associated with at least one second resource; and receiving, by the network node, a report comprising one or more SINR values, where at least one SINR value is based on the at least one first resource and the at least one second resource. | 2022-05-05 |
20220140961 | BANDWIDTH PART (BWP) AND POWER SCHEDULING METHOD AND APPARATUS FOR INDOOR TERAHERTZ - A bandwidth part (BWP) and power scheduling method and apparatus for indoor terahertz are provided. The BWP and power scheduling method uses an intelligent reflecting surface (IRS) and a non-orthogonal multiple access (NOMA) to compensate for a shortcoming, wherein terahertz waves are not suitable for an indoor transmission, convert an indoor environment of an IRS-assisted terahertz propagation into a channel model, and convert an optimal wireless resource scheduling in an indoor IRS-assisted terahertz system into a functional optimization design with random constraints. Policies and corresponding actions are trained by using a proximal policy optimization (PPO) to schedule a power and a BWP. An actor part generates continuous a power scheduling, and a critic part generates a discrete BWP scheduling. | 2022-05-05 |
20220140962 | METHOD AND APPARATUS FOR RECEIVING EHT PPDU IN WIRELESS LAN SYSTEM - Proposed are a method and an apparatus for receiving an EHT PPDU in a wireless LAN system. Specifically, a reception STA receives an EHT PPDU including an STF signal from a transmission STA through a 320 MHz band or a 160+160 MHz band. The reception STA decodes the EHT PPDU. The STF signal is generated on the basis of an EHT STF sequence for the 320 MHz band or the 160+160 MHz band. The EHT STF sequence for the 320 MHz band is a first sequence in which a preconfigured M sequence is repeated, and is defined as {M −1 −M −1 M −1 M 0 −M 1 −M 1 −M 1 M 0 −M 1 M 1 −M 1 −M 0 M −1 M −1 M −1 −M}*(1+j)/sqrt(2). | 2022-05-05 |
20220140963 | COMMUNICATION METHOD AND APPARATUS - The present invention discloses a communication method and an apparatus, to improve transmission resource utilization. The communication method and the apparatus relate to the field of automatic driving or smart driving technologies. The method includes: obtaining first data and second data; and sending the first data to a second apparatus based on a first period, and sending the second data to the second apparatus based on a second period, where the first period is a sending period of the first data, the second period is a sending period of the second data, and the first period and the second period are different. | 2022-05-05 |
20220140964 | TWO-STAGE PHYSICAL SIDELINK CONTROL CHANNEL (PSCCH) FOR SIDELINK COMMUNICATIONS - A method for sidelink transmission is described. The method can include obtaining a SCI related configuration received from a base station or a pre-configuration, and transmitting from a transmission user equipment (Tx UE) to a reception user equipment (Rx UE) a transport block with two-stage sidelink control information (SCI) including a 1st-stage SCI and a 2nd-stage SCI. The 1st-stage SCI carries information related to channel sensing, and is transmitted over a physical sidelink control channel (PSCCH). The 2nd-stage SCI and/or the transport block are transmitted over a physical sidelink shared channel (PSSCH). The PSSCH is associated with the PSCCH. | 2022-05-05 |
20220140965 | REFERENCE SIGNAL SEQUENCE GENERATION - Methods, systems, and devices for wireless communications are described. A first wireless device may identify a reference signal sequence (e.g., a demodulation reference signal (DMRS) sequence) based on a cyclic shift associated with a control channel for communications with a second wireless device. For example, the first wireless device may identify the cyclic shift associated with transmitting a message to the second wireless device via the control channel. In another example, the first wireless device may estimate the cyclic shift associated with receiving a message from the second wireless device via the control channel. The first wireless device may then communicate with the second wireless device based on the reference signal sequence. For example, the first wireless device may transmit or receive (e.g., via a shared channel) the reference signal sequence to or from the second wireless device. | 2022-05-05 |
20220140966 | METHOD FOR TRANSMITTING AND RECEIVING SOUNDING REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for transmitting and receiving a radio signal in a wireless communication system and a device therefor are disclosed. A method for receiving, by a base station, a sounding reference signal (SRS) in the wireless communication system includes transmitting, to a user equipment (UE), configuration information for transmission of the SRS; and receiving, from the UE, the SRS transmitted based on the configuration information. The configuration information includes group hopping information and sequence hopping information for sequence hopping of the SRS. A sequence length of the SRS is based on a product of a number of candidates of the group hopping information and a number of candidates of the sequence hopping information. The number of candidates of the group hopping information and the number of candidates of the sequence hopping information are configured based on a number of neighboring cells of the base station. | 2022-05-05 |
20220140967 | DESIGN OF NR SIDELINK SYNCHRONIZATION SIGNAL FOR ENHANCED VEHICLE-TO-EVERYTHING USE CASES WITH OPTIMIZED RECEIVER PROCESSING - Systems, apparatuses, methods, and computer-readable media are provided for a user equipment (UE) for a wireless communication system. The UE determines at least one sidelink primary synchronization signal (S-PSS) sequence of at least one S-PSS signal. The at least one S-PSS sequence is different from a primary synchronization signal (PSS) sequence. The EE also determines at least one sidelink secondary synchronization signal (S-SSS) sequence of at least one S-SSS signal. The EE determines a plurality of S-PSS symbols and a plurality of S-SSS symbols corresponding to a sub carrier spacing (SCS). The EE transmits to another EE the determined plurality of S-SSS symbols after the determined plurality of S-PSS symbols. The SCS may be associated with a physical resource block (PRB) allocation size. A maximum of 11 PRBs for a sidelink synchronization signal block (S-SSB) may be set based on the SCS. | 2022-05-05 |
20220140968 | METHOD EXECUTED BY USER EQUIPMENT, AND USER EQUIPMENT - A method executed by a UE comprises: receiving DCI for scheduling a PDSCH transmission; determining, according to an FDRA field in the DCI, a RIV; if a frequency domain resource assignment scaling condition is not satisfied, determining, according to the RIV, a first starting resource block index and a first length of continuous resource blocks; if the frequency domain resource assignment scaling condition is satisfied, determining, according to the RIV, a second starting resource block index and a second length of continuous resource blocks, determining the first starting resource block index by multiplying the second starting resource block index by a scaling factor, and determining the first length of continuous resource blocks by multiplying the second length of continuous resource blocks by the scaling factor; and determining an allocated frequency resource based on the first starting resource block index and the first length of continuous resource blocks. | 2022-05-05 |
20220140969 | POSITIONING METHOD IN WIRELESS COMMUNICATION SYSTEM AND DEVICE SUPPORTING SAME - The present disclosure relates to a positioning method in a wireless communication system and a device supporting same. | 2022-05-05 |
20220140970 | UPLINK NON-CODEBOOK BASED PRECODER SELECTION USING DMRS MEASUREMENT - An apparatus, e.g., a UE, for selecting an uplink precoder using a non-codebook-based procedure is disclosed. The UE may receive, from a base station (BS), at least one downlink reference signal comprising at least one DMRS via at least one downlink channel. The UE may measure, based on the at least one downlink reference signal, the at least one downlink channel. The measuring may be based at least in part on the at least one DMRS. The UE may select at least one first uplink precoder for at least one uplink channel corresponding to the at least one downlink channel based on the measuring of the at least one downlink channel. The UE may transmit, to the BS, at least one uplink reference signal based on the at least one first uplink precoder for the at least one uplink channel. | 2022-05-05 |
20220140971 | TECHNIQUES FOR HYBRIDIZED ULTRA-WIDEBAND AND NARROWBAND SIGNALING - Systems, methods, and computer-readable medium are provided for utilizing a hybrid of ultra-wideband (UWB) and narrowband (NB) signaling to provide more efficient operating range and operating efficiency. For example, a first device may schedule transmission of a packet via a narrowband signal to a second device. The first device may then transmit the packet, whereby the packet conveys synchronization data that is used by the second device to schedule reception of a plurality of fragments, respectively, via an ultra-wideband (UWB) signal. The first device may then schedule and transmit the plurality of segments to the second device via the ultra-wideband signals, each fragment being time-spaced from other fragments of the plurality of fragments by at least a predefined time interval. | 2022-05-05 |
20220140972 | Uplink Reference Signal Sending Method, Uplink Reference Signal Receiving Method, And Apparatus - The present invention provides an uplink reference signal sending method, and the method includes: sending, by a terminal device, an uplink reference signal on N1 second component carriers within a determined uplink reference signal sending time, and prohibiting, on M1 first component carriers in M first component carriers within the sending time, the terminal device from sending an uplink signal, where the first component carriers are carriers on which scheduling of uplink data transmission is allowed, and the second component carriers are carriers on which scheduling of uplink data transmission is prohibited. N1=M1, in other words, within the sending time, a quantity N1 of second component carriers on which the uplink reference signal is sent is less than or equal to a quantity M1 of first component carriers on which sending of the uplink signal is prohibited. | 2022-05-05 |
20220140973 | SIGNAL SENDING AND RECEIVING METHOD, APPARATUS, AND SYSTEM - A signal sending and receiving method includes: receiving, by a terminal device, at least one piece of resource configuration information for determining N reference signal resource groups, and each of the N reference signal resource groups includes at least one reference signal resource; and sending a reference signal on a resource in an i | 2022-05-05 |
20220140974 | TRANSMITTER, RECEIVER, TRANSMISSION METHOD, AND RECEPTION METHOD - In a transmitter, an assignment circuit maps a phase tracking reference signal (PT-RS) onto a subcarrier, and a transmitting circuit transmits a signal containing the phase tracking reference signal. The phase tracking reference signal is mapped onto a different subcarrier for each cell, group, or mobile station. | 2022-05-05 |
20220140975 | SYSTEMS AND METHODS FOR SRS SWITCHING IMPACT CONTROL - Systems and methods for controlling Sounding Reference Signal (SRS) carrier-based switching impact are disclosed. In some embodiments, a method performed by a wireless device for controlling SRS switching impact comprises determining that there is a SRS carrier-based switching from a first carrier on which a first serving cell of the wireless device operates to a second carrier on which a second serving cell of the wireless device operates. The method further comprises determining an amount of impact that the SRS carrier-based switching has on one or more serving cells of the wireless device and utilizing the amount of impact that the SRS carrier-based switching has on the one or more serving cells of the wireless device. Corresponding embodiments of a wireless device are also disclosed. Embodiments of a method performed by abase station and corresponding embodiments of a base station are also disclosed. | 2022-05-05 |
20220140976 | TONE CLASSIFICATION FOR PHYSICAL CHANNELS WITH MULTIPLEXED DATA - Methods, systems, and devices for wireless communications are described. A shared channel may include a set of tones carrying multiple types of control information multiplexed together. A wireless device may perform a tone classification method to determine individual subsets of tones from the set of tones for each type of control information to extract each type of control information. The wireless device may determine multiple subsets of tones correspond to multiple types of control information simultaneously based on different extraction parameters. For example, the wireless device may determine a total number of tones in a set of tones, a distance between any given two tones in the set of tones, an offset value, or any combination thereof for the extraction parameters. The wireless device may then use these extraction parameters to determine or extract two or more subsets of tones for two or more corresponding types of control information. | 2022-05-05 |
20220140977 | Preemption Indications for New Radio - Embodiments of dynamic multiplexing are described, including the transmission of preemption indication (PI) to indicate preemption of time-frequency resources. In some embodiments, a next Generation NodeB (gNB) is configured to transmit PIs in signaling to preempt an enhanced Mobile Broadband (eMBB) communications transmission with an ultra-reliable and low latency communications (URLCC) transmission. In some embodiments, a user equipment (UE) is configured to monitor a region of time-frequency resources, within a bandwidth part (BWP), for a PI. The PI indicates to the UE a portion of time-frequency resources that omit transmissions intended for the UE. In some embodiments, the gNB transmits the PI to the UE within preemption indication downlink control information (PI-DCI) in a physical downlink control channel (PDCCH) in a control resource set (CORESET). In some embodiments, the BWP is defined according to a frequency domain location, a bandwidth, and a subcarrier spacing for a given numerology. | 2022-05-05 |
20220140978 | APERIODIC TRACKING REFERENCE SIGNAL - Certain aspects of the present disclosure provide techniques for determining when to transmit and transmitting an aperiodic tracking reference signal (TRS). Certain aspects provide a method for wireless communication. The method generally includes determining a channel condition change of a downlink channel between a first wireless device and a second wireless device. The method further includes determining whether the channel condition change satisfies a trigger condition. The method further includes triggering transmission of an aperiodic tracking reference signal when the channel condition change satisfies the trigger condition. | 2022-05-05 |
20220140979 | PRECONFIGURED UPLINK RESOURCE CONTROL SIGNALING ENHANCEMENTS - Method, apparatuses, and computer program product for overhead reduction are provided. One method may include receiving an allocation of a preconfigured uplink resource and a preconfigured uplink resource radio network temporary identifier associated with the preconfigured uplink resource. The method may also include receiving an assignment of a control channel search space associated with the preconfigured uplink resource. The method may further include monitoring, according to a specified occasion cycle, the control channel search space for a message. In addition, the message may be received according to a specific receive pattern. | 2022-05-05 |
20220140980 | NESTED COMMON SEQUENCE POOL FOR SEQUENCE BASED NON-COHERENT TRANSMISSIONS - This disclosure provides systems, methods, and devices for wireless communication that support use of common sequence pools for non-coherent transmissions according to one or more aspects. In a first aspect, a method of wireless communication includes converting, by a wireless communication device, an information bit stream to an integer value. The method also includes selecting, by the wireless communication device, a sequence from a common sequence pool based on the integer value. The common sequence pool has a nested structure of sequences which map different length information bit streams with the same most significant bit or bits to the same sequences. The method further includes transmitting, by the wireless communication device, a non-coherent transmission indicating the sequence. Other aspects and features are also claimed and described. | 2022-05-05 |
20220140981 | CHANNEL STATE INFORMATION REPORT CONFIGURATION - Apparatuses, methods, and systems are disclosed for CSI report configuration. One method includes receiving at least one CSI reporting setting. The at least one CSI reporting setting includes at least one CSI RS resource setting, and the CSI reporting setting includes an indication of CSI feedback reporting for multiple transmission points in a mobile communication network. The method includes identifying a set of transmission hypotheses based on the CSI reporting setting. The hypotheses include a combination of single-point transmission from at least one TRP, or multi-point joint transmission from two TRPs. The method includes receiving at least one CSI reference signal resource transmitted from the mobile communication network based on the CSI reference signal resource setting. The method includes generating a set of at least one CSI report based on the CSI reporting setting. | 2022-05-05 |
20220140982 | METHOD FOR CONTROLLING FREQUENCY BAND FOR COMMUNICATION AND ELECTRONIC DEVICE THEREOF - An operation method of an electronic device includes determining whether a first communication module based on a first radio access technology (RAT) and a second communication module based on a second RAT operate in a connected state; determining whether a. combination of a first band used by the first communication. module and a second band used by the second communication module is a combination causing interference; and if the combination of the first band and the second band is a combination causing interference, transmitting a. signal requesting to change one of the first band or the second band. The interference is caused by at least one transmission signal of the first RAT or at least one other signal derived from the at least one transmission signal. | 2022-05-05 |
20220140983 | RETRANSMISSION HANDLING FOR PRECONFIGURED UPLINK RESOURCES - Systems and methods for handling transmissions and retransmissions on a periodic preconfigured uplink resource (PUR) are provided. Respective resources for transmission and retransmission can be determined and configured for a wireless device to prevent blocking of a new data transmission on a PUR opportunity by a retransmission attempt. Responsive to determining that a first transmission on the PUR was unsuccessful, a second resource can be configured for the retransmission. | 2022-05-05 |
20220140984 | TERMINAL APPARATUS, BASE STATION APPARATUS, AND COMMUNICATION METHOD - A terminal apparatus that includes: a receiving portion for receiving a PDSCH including a transport block; and a transmitting portion for transmitting, on a PUCCH, HARQ-ACK information corresponding to the transport block. The PDSCH is allocated to first resources other than second resources. The second resources are used for one or more SS/PBCH blocks when an n | 2022-05-05 |
20220140985 | Joint Optimization of Bandwidth Part, Search Space and Connected Mode Discontinuous Reception Operation in 5G New Radio - Apparatuses, systems, and methods for a user equipment device (UE) to perform a method using a status change of a timer associated with a connected mode discontinuous reception (CDRX) communication session with a base station to trigger a switch from using a first bandwidth part (BWP) to a second BWP as the active BWP for the CDRX communication session. The timer may be an on-duration timer, an inactivity timer, or a retransmission timer. The UE may also alter a monitoring schedule of a physical downlink control channel (PDCCH) in response to detecting the status change of the timer. The second BWP may have a wider or narrower bandwidth than the first BWP, depending on the type of timer and the type of status change. | 2022-05-05 |
20220140986 | METHOD AND SYSTEM FOR SLICING ASSIGNING FOR LOAD SHEDDING TO MINIMIZE POWER CONSUMPTION WHERE GNB IS CONTROLLED FOR SLICE ASSIGNMENTS FOR ENTERPRISE USERS - Systems and methods of adaptive bandwidth (BW) management are provided by a control unit of distribution and central units to monitor power and traffic loads at a plurality of nodes in a network; a BW management unit communicating with the control unit to reassign a set of network slices with a set of smaller bandwidth parts (BWPs); the BW management unit configured to define a smaller BWP from a slice mapping for the slice reassignment during a AC power outage, the slicing mapping includes network slices tied to smaller BWPs in the network; and the BW management unit configured to adapt BW for users at the node by reassigning of at least one network slice with a defined smaller BWP at the node in response to a condition determined by the BW management unit, the condition of at least one of a AC power outage, and reduced traffic load at the node. | 2022-05-05 |
20220140987 | CHANNEL ESTIMATION USING MULTIPLE AP - In a wireless local area network system, a sharing access point (AP) may determine a long training field (LTF) subcarrier pattern for each of multiple streams, wherein an LTF symbol is used for at least one stream among a first to a third stream, the number of the LTF symbols is determined on the basis of the number of antennas of a shared AP having the maximum number of antennas among multiple shared APs associated with the sharing AP, and the first to the third stream are assigned different subcarrier patterns. The sharing AP may transmit information associated with the LTF subcarrier pattern. | 2022-05-05 |
20220140988 | Subcarrier Indices For Distributed-Tone Resource Units In 6GHz Low-Power Indoor Systems - Various schemes pertaining to subcarrier indices for distributed-tone resource units (RUs) in 6 GHz low-power indoor (LPI) systems are described. A communication entity distributes frequency tones of a RU over a distribution bandwidth as a distributed-tone RU (dRU). The communication entity also generates generating a plurality of subcarrier indices for the distributed-tone RU such that a distribution of the distributed-tone RU is symmetric or asymmetric to a direct-current (DC) tone along an axis of subcarrier indices. The communication entity then communicates wirelessly using the distributed-tone RU in a 6 GHz LPI system. | 2022-05-05 |
20220140989 | METHOD FOR CONTROL CHANNEL MONITORING IN WIDEBAND OPERATION - A method for control channel monitoring includes: obtaining the wideband configuration indicating information about a plurality of LBT subbands within the wideband; obtaining a CORESET configuration of multiple CORESETs; obtaining a search space set configuration of multiple search space sets, each configured search space set being associated with a configured CORESET and containing an indication to enable/disable multiple subband monitoring; and determining the CORESET to be monitored based on each search space set configuration, so that when the indication is to enable multiple subband monitoring, monitoring the associated CORESET in the LBT subband within which the associated CORESET is confined, and monitoring frequency shifted CORESET of the associated CORESET, in the other LBT subbands of the plurality of LBT subbands, each frequency shifted CORESET being confined within one other LBT subbands; when the indication is to disable multiple subband, monitoring the associated CORESET in the plurality of LBT subbands. | 2022-05-05 |
20220140990 | RANDOM ACCESS WITH BANDWIDTH PART SWITCH - Various communication systems may benefit from improved random access operations. For example, certain embodiments may benefit from improved random access in which multiple bandwidth parts are configured to a user equipment within one cell. A method, in certain embodiments, may include triggering a random access procedure at a user equipment. The method may also include switching at the user equipment from a first uplink bandwidth part that does not support a random access channel to a second uplink bandwidth part that has the random access channel configured after the triggering of the random access procedure. The switching may be autonomously performed by the user equipment. In addition, the method may include performing the random access procedure at the user equipment using the random access channel configured at the second uplink bandwidth part. | 2022-05-05 |
20220140991 | TIME TRANSMISSION DEVICE AND TRANSMISSION METHOD - [Problem] To reduce a time synchronization error caused by upstream and downstream asymmetry of the transmission path, improve wavelength band utilization efficiency, and reduce the required number of transponders. | 2022-05-05 |
20220140992 | TRANSMISSION DEVICE - A transmission device includes a current transmission right as a node constituting an implicit token-passing network. When receiving a synchronization frame including a synchronization node number for specifying a synchronization node and network live node map information, which is information on nodes present in the network, or a reminder frame including a transmission right node number for specifying a node having a transmission right and network live node map information, which is information on the nodes present in the network, the transmission device is configured to transmit a data frame, and after the transmission of the data frame, transmit a completion frame including a transmission node number for specifying a node of a transmission source and network live node map information, which is information on the nodes present in the network. | 2022-05-05 |
20220140993 | SECURING AUDIO COMMUNICATIONS - Systems and methods include establishing a cryptographically secure communication between an application module and an audio module. The application module is configured to execute on an information-handling machine, and the audio module is coupled to the information-handling machine. The establishment of the cryptographically secure communication may be at least partially facilitated by a mutually trusted module. | 2022-05-05 |
20220140994 | COHERENT DETECTION-BASED HIGH-SPEED CHAOTIC SECURE TRANSMISSION METHOD - A coherent detection-based high-speed chaotic secure transmission method includes: at a transmit terminal in a chaotic secure transmission system, optically coupling an optical chaotic carrier and transmission information by using an orthogonal basis to mask the transmission information by using a noise-like feature of the chaotic carrier, so as to obtain a chaotic masked signal; adding a fast phase disturbance and a fast polarization disturbance to the chaotic masked signal and transmitting the chaotic masked signal over an optical fiber transmission link; and at a receive terminal, obtaining the chaotic masked signal through coherent detection, compensating the chaotic masked signal for linear and nonlinear effects through digital signal processing, and using a polarization orthogonal basis- or phase orthogonal basis-based chaotic decryption algorithm to separate the chaotic carrier from the signal so as to complete decryption. | 2022-05-05 |
20220140995 | Detection of Unauthorized Encryption Using Key Length Evaluation - Techniques are provided for detection of unauthorized encryption in a storage system using key length evaluation. One method comprises determining a key length of an encryption key used to encrypt data associated with one or more write commands in a storage system; evaluating the key length relative to an expected key length; and performing one or more automated remedial actions, such as generating an alert notification, in response to the key length being different than the expected key length. A count of a number of write operations in a given folder can be compared to a number of files in the given folder and an alert notification can be generated in response to the count of the number of write operations in the given folder having a same value as the number of files in the given folder. | 2022-05-05 |
20220140996 | Privacy-Preserving Domain Name Service (DNS) - Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption. | 2022-05-05 |
20220140997 | VALIDATING CONFIDENTIAL DATA USING HOMOMORPHIC COMPUTATIONS - The disclosed exemplary embodiments include computer-implemented apparatuses and methods that validate confidential data based privacy-preserving homomorphic computations involving encrypted data. For example, an apparatus may receive, from a first computing system, encrypted data that includes a first encrypted value representative of at least one of first account data or an element of cryptographic data. Based on the first encrypted value and on second encrypted values, the apparatus may generate encrypted residual values representative of second account data associated with one or more reference accounts, and the apparatus may request and receive a decrypted residual value associated with each of the encrypted residual values from a second computing system. The apparatus may transmit the decrypted residual values to the first computing system, which may validate the first account data based on at least the decrypted residual values and perform operations associated with the validated first account data. | 2022-05-05 |
20220140998 | CIPHER SYSTEM, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, CIPHER METHOD, ENCRYPTION METHOD, DECRYPTION METHOD AND PROGRAM - An encryption system for performing encryption and decryption by a multi-input inner product functional encryption having a function hiding property includes a setup unit configured to generate, taking a vector length m and the number of arguments μ of an inner product function as input, a master secret key msk and a public parameter pp by using a setup algorithm of a single-input inner product functional encryption having a predetermined characteristic and having a function hiding property and a key generation algorithm of a common key encryption satisfying a predetermined condition, an encryption unit configured to generate, taking the master secret key msk, the public parameter pp, an index i of the arguments, and a vector x as input, a ciphertext ct | 2022-05-05 |
20220140999 | SYSTEM AND METHOD FOR SECURELY STORING AND SHARING INFORMATION - The present application generally relates to systems, devices, and methods to conduct the secure exchange of encrypted data using a three-element-core mechanism consisting of the key masters, the registries and the cloud lockboxes with application programming interfaces providing interaction with a wide variety of user-facing software applications. Together the mechanism provides full lifecycle encryption enabling cross-platform sharing of encrypted data within and between organizations, individuals, applications and devices. Further the mechanism generates chains of encrypted blocks to provide a distributed indelible ledger and support external validation. Cross-verification among users, applications and the mechanism deliver both enterprise and business ecosystem cyber security features. Crowdsourcing of anomaly detection extends to users and to subjects of the data. Robust identity masking offers the benefits of anonymization while retaining accountability and enabling two-way communications. The mechanism may also provide high availability through multi-level fail over or operations to multiple instances of the core mechanism. | 2022-05-05 |
20220141000 | INFORMATION PROCESSING APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM - An information processing apparatus that performs bit embedding processing by four-party MPC using 2-out-of-4 replicated secret sharing stores a seed to generate a random number used when performing an operation concerning shares, generates, by using the seed, share reconstruction data for reconstructing a share used when performing bit embedding, and constructs a share for bit embedding by using at least the share reconstruction data. | 2022-05-05 |
20220141001 | SECURE COMMUNICATION IN ACCESSING A NETWORK - Secure communication in accessing a network is described herein. An example apparatus can include a memory and a processor coupled to the memory. The processor can be configured to receive an identity public key from the identity device. The identity public key can be received in response to providing, to the identity device, a request to modify content of the identity device. The processor can be further configured to encrypt data corresponding to subscriber information using the identity public key, provide (to the identity device) the encrypted data to store the subscriber information in the identity device, and access a network operated by a network operator via the data stored in the identity device. | 2022-05-05 |
20220141002 | DATA TRANSMISSION METHOD, COMMUNICATION PROCESSING METHOD, DEVICE, AND COMMUNICATION PROCESSING PROGRAM - A data transmission method includes a first device generating a first encrypted packet addressed to a second device, and transmitting the first encrypted packet from the first device to the second device by P2P. The first device generates a second encrypted packet addressed to a third device serving as a proxy server for the first device. The second encrypted packet includes a packet addressed to a fourth device. The data transmission method includes transmitting the second encrypted packet from the first device to the third device by P2P, and a step in which the third device transmits a normal packet generated by decrypting the second encrypted packet to the fourth device. | 2022-05-05 |
20220141003 | METHOD AND SYSTEM FOR DEVICE LEVEL AUTHENTICATION IN ELECTRONIC TRANSACTIONS - A method for distributing data to a computing device using device level authentication includes: storing, in a memory of a computing device, a single use key encrypted with a first encryption, a server public key, and device data; generating a key pair comprising a device private key and a corresponding device public key; wrapping the device public key using the server public key; transmitting at least the device data, wrapped device public key, and the single use key encrypted with the first encryption to a server; receiving the single use key encrypted with a second encryption from the server; and executing a query on the memory to insert the received single use key encrypted with the second encryption. | 2022-05-05 |
20220141004 | Efficient Internet-Of-Things (IoT) Data Encryption/Decryption - Techniques are disclosed for encrypting internet-of-things (IoT) data of an IoT network only once at its inception until its final consumption without intervening encryption/decryption stages/cycles. The present encrypt-decrypt-once design thus eliminates potential exposure of the IoT data in its plaintext form of a traditional approach employing intervening encryption/decryption cycles. The present design is also efficient and reduces the burden on IoT resources by eliminating the need for encrypting and decrypting the data multiple times. To accomplish these objectives, a number of schemes for device enrollment, authentication, key distribution, key derivation, encryption and encoding are disclosed. A preferred key distribution scheme employs key distribution certificates or KD-certs for distributing key material to the edge devices. KD-certs may be group KD-certs that are shared across a group of edge devices. | 2022-05-05 |
20220141005 | METHODS AND SYSTEMS FOR CRYPTOGRAPHIC KEYS EXCHANGE - Embodiments provide methods, and systems for cryptographic keys exchange where the method can include receiving, by a server system, a client public key being part of a client asymmetric key pair from a client device; sending, by the server system, a server public key being part of a server asymmetric key pair to the client device; generating, by the server system, a random value master key and sending the random value master key encrypted using the client public key to the client device; and generating, by the server system, an initial unique session key and sending the initial unique session key encrypted under the random value master key to the client device. A unique session key from the set of the unique session keys is used by the client device to encrypt a session data for transmission to the server system per session. | 2022-05-05 |
20220141006 | KEY MANAGEMENT FOR ENCRYPTED DATA - Key management for encrypted data includes establishing a cache of key decryption keys and periodically evicting the keys from the cache. A pool of key encryption keys also is created and periodically, selected key encryption keys are removed from service. Notably, the rate of removal of the encryption keys differs from the rate of cache eviction for the decryption keys. Thereafter, clear data is encrypted with a cipher to produce cipher text, and the cipher is encrypted with a selected key encryption key from the pool. Finally, in response to an access request for the clear data, an attempt to locate in the cache a key decryption key for the encrypted cipher is made. If attempt fails, the key decryption key is retrieved from remote memory. Finally, the encrypted cipher is decrypted with the located key, and the cipher text decrypted to produce the clear data. | 2022-05-05 |
20220141007 | QUANTUM COLOR IMAGE ENCRYPTING METHOD AND CIRCUIT BASED ON MODIFICATION DIRECTION - Disclosed are a quantum color image encrypting method based on modification direction and corresponding circuit, respectively providing quantum modular circuits design for a parallel adder, a parallel subtractor, a comparator, a cyclic shift add 1, and a cyclic shift subtract 1; and based on these modular circuits, circuit for implementing quantum color image steganography is provided. From the complexity analysis of implementing quantum circuit for color image steganography, it is seen that for a two-dimensional quantum color image with 2 | 2022-05-05 |
20220141008 | QUANTUM KEY DISTRIBUTION SYSTEM AND OPERATION METHOD THEREOF - Disclosed is a quantum key distribution system using an RFI (reference frame independent) QKD (quantum key distribution) protocol, which includes a first signal processing circuit that generates transmission basis information and transmission bit information, a quantum channel transmitter that generates a single photon or coherent light, and modulates the single photon or the coherent light based on the transmission basis information and the transmission bit information to generate a quantum signal, a quantum channel receiver that receives the quantum signal through a quantum channel and detects reception bit information from the quantum signal based on reception basis information, and a second signal processing circuit that generates the reception basis information, transmits the reception basis information to the first signal processing circuit through a public channel, and receives the transmission basis information from the first signal processing circuit through the public channel. | 2022-05-05 |
20220141009 | METHOD FOR PROVIDING END-TO-END SECURITY OVER SIGNALING PLANE IN MISSION CRITICAL DATA COMMUNICATION SYSTEM - The present disclosure relates to a pre-5 | 2022-05-05 |
20220141010 | Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI) - Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module. | 2022-05-05 |
20220141011 | SPLIT RANDOM NUMBER GENERATOR - A computing system may implement a split random number generator that may use a random number generator to generate and store seed values in a memory for retrieval and use by one or more core processors to generate random numbers for secure processes within each core processor. | 2022-05-05 |
20220141012 | DATA PROTECTION AND RECOVERY SYSTEMS AND METHODS - A method of securely replacing a first data value with a second data value and related systems are disclosed. The method includes generating a first public key and a first private key, generating a cryptographic seed value, and passing the cryptographic seed value through an elliptic curve to generate a second public key and a second private key. The method further includes combining the first public key with the second private key using public key cryptography to create a shared encryption key and passing the shared encryption key through a symmetric algorithm to encrypt the cryptographic seed value. | 2022-05-05 |
20220141013 | ENCRYPTION AT REST USING KMS AND TPM - One example method includes receiving clear text data at a storage system, generating, at the storage system, a clear text data encryption key, requesting a key management system to encrypt the clear text data encryption key with a master key to create an encrypted data encryption key, and the requesting is performed by the storage system, receiving, at the storage system, the encrypted data encryption key from the key management system, encrypting, at the storage system, the clear text data with the clear text data encryption key to create encrypted data, and storing, together, the encrypted data and the encrypted data encryption key. | 2022-05-05 |
20220141014 | STORING SECRET DATA ON A BLOCKCHAIN - Systems, methods, and devices are provided that allow for high-availability, redundant, cryptographically secure storage of secret data and other data on a blockchain. In an embodiment, a plurality of shards of secret data are received from a user and encrypted with shard manager public keys. The encrypted shards are stored on an authoritative blockchain, allowing for secure storage and use of the secret data by the owner and/or the blockchain. | 2022-05-05 |
20220141015 | Secure Apparatus Enabled Secure Platform Integration - In accordance with some embodiments, a secure modular apparatus providing a first platform for secure platform integration includes communication device(s) and a key store for storing encryption keys. The apparatus additionally includes a crypto engine operable to use the encryption keys for cryptographic operations. The apparatus also includes a controller and a housing arranged to at least partially support the communication device(s), the key store, the crypto engine, and the controller. The controller, via the communication device(s), exchanges encrypted messages prepared or processed by the crypto engine with a second platform provided by a personal communication device, where the second platform is distinct from the first platform and has a plurality of layers including at least one layer between a hardware layer and high level layers, and the encrypted messages control one or more of a hardware unit in the hardware layer and a component in the high level layers. | 2022-05-05 |
20220141016 | KEYS FOR ELLIPTIC CURVE CRYPTOGRAPHY - Cryptographic circuitry, in operation, generates N first pairs of elliptic curve cryptography (ECC) keys r(i), R(i), with i varying from 1 to N, using K second pairs of ECC keys p(k), P(k), with k varying from 1 to K, wherein K is smaller than N. Each pair r(i), R(i) of the first pairs of keys is a linear combination of pairs of the second pairs of ECC keys according to: | 2022-05-05 |
20220141017 | Distributed Ledger Systems For Modular Vehicles - The disclosure is directed to, among other things, distributed ledger systems for modular vehicles. The disclosure may involve receiving, at a first ledger associated with a first node, information regarding an interaction between the first node and a second node. The same transaction information may also be received at a second ledger associated with the second node, as well as ledgers associated with any other number of nodes. The first node, second node, and any other number of nodes may be modular vehicle components. Additionally, the first ledger, second ledger, and any other number of ledgers include a set of the same information. The first node, second node, and third node may be nodes on a distributed ledger network. | 2022-05-05 |
20220141018 | METHOD AND SYSTEM FOR AN EFFICIENT CONSENSUS MECHANISM FOR PERMISSIONED BLOCKCHAINS USING AUDIT GUARANTEES - A method for addition of a block to a permissioned blockchain using efficient consensus includes: storing a blockchain; receiving transaction messages having transaction values from consensus nodes; generating a Merkle root for the transactions messages using transaction references; generating a proposed block header having the Merkle root and a hash of the header of the most recently added block in the blockchain; hashing the proposed block header; transmitting a proposal message having a digital signature and the hashed proposed block header to auditing nodes; receiving a response message accepting the digital signature from a majority of auditing nodes; transmitting an accept message to the auditing nodes; transmitting a confirmation message to the consensus nodes including the hashed proposed block header and digital signature; and writing a new block to the blockchain having the transaction values from the transaction messages and a header including the proposed block header and digital signature. | 2022-05-05 |
20220141019 | SYSTEM AND METHOD FOR AUTONOMOUS MAPPING OF ENTERPRISE IDENTITY - The present disclosure may provide methods, systems, and computer-readable instructions for enabling the following operations: generating a secret key based on, at least in part, a target party's public key; encrypting a payload with the secret key, the payload comprising an auth token with a limited time to live (TTL); broadcasting, to a public blockchain, a message comprising the encrypted payload; receiving a request to establish a channel of communication outside of the public blockchain; receiving, with the request, the auth token within the TTL; validating the auth token within the TTL; establishing the channel of communication upon a validation of the auth token; engaging in a data-exchange over the channel of communication; verifying matching properties of the exchanged data with at least one internal system of record; and mapping an internal identifier within the at least one system of record to a decentralized identifier associated with the target party. | 2022-05-05 |
20220141020 | BLOCKCHAIN E-VOTING SYSTEM AND OPERATING METHOD THEREOF - We disclose a blockchain e-voting system, where keeping the basic principles of voting does not require trusted-third parties. The system includes at least two vote nodes each having two sets of private and public keys, a voter management node, two smart contract modules, and a blockchain. A voter management node is configured to provide a cryptographic base for public key generation and to pre-register DIDs of vote nodes. A first smart contract module is configured to perform self-identification of vote nodes, encryption of votes, and generation of zero-knowledge proofs for the validity of their results, and to upload all the outputs to a blockchain. For the purpose, a vote node executes the first smart contract module, taking a voting decision, an asserted DID, the two sets of public and private keys as inputs, where one set of keys is for the self-identification, and another set is for the encryption. A second smart contract module is configured to download the votes from the blockchain, check the validity of proofs, tally up the results without decrypting them, and finally upload the results to blockchain. | 2022-05-05 |
20220141021 | METHODS, SYSTEMS, AND DEVICES FOR CONCEALING ACCOUNT BALANCES IN LEDGERS - Disclosed herein are methods, systems, and devices for concealing account balances of permissionless distributed ledgers using multi-chain and/or directed acyclic graph (DAG) based structures, while maintaining publicly verifiable transactions. According to one embodiment, a computer-based method for recording a transaction in a ledger having a transacted amount, a first account balance associated with a sender and a second account balance associated with a receiver is disclosed. The computer-based method includes encrypting the transacted amount using a first shared key, decreasing the first account balance by the transacted amount, encrypting the first account balance with a first private key, increasing the second account balance by the transacted amount, encrypting the second account balance with a second private key. | 2022-05-05 |
20220141022 | SYSTEM AND METHOD FOR SECURING AND AUTHENTICATING SERIALIZED DATA ASSOCIATED WITH A PRODUCT - A system and a method for securing and authenticating serialized data associated with a product across a supply chain is disclosed. In operation, the present invention provides for generating a Hash ID by associating serialised data and serialisation ID of the product with a blockchain platform. Further, a set of authentication rules are generated for validating access to the serialised data based on the Hash ID. Furthermore, a plurality of identifier elements are generated for integration with one or more levels of product packaging. Yet further, access to the serialized data across the supply chain is authorized on determination of the authenticity of the supply chain participants based on the identifier elements using a decryption technique and the set of authentication rules. A result representative of authentication success or failure is stored in the blockchain platform. | 2022-05-05 |
20220141023 | METHODS FOR GENERATING AN ENCRYPTED SIGNAL SIMULATION WITH A CRYPTOGRAPHIC INTERFACE CARD (GCIC) AND DEVICES THEREOF - A method, non-transitory computer readable medium, and device that transmits a cryptographic variable input to a detachably coupled smart card. Execution of at least one of protected cryptographic algorithm operation by the smart card which requires the cryptographic variable input and a cryptographic constant input stored on the smart card to generate one or more cryptographic products is requested. The one or more generated cryptographic products from the smart card are received. An encrypted signal simulation based on execution of a simulator using the received one or more generated cryptographic products is generated and is output. | 2022-05-05 |
20220141024 | CALL CENTER WEB-BASED AUTHENTICATION USING A CONTACTLESS CARD - Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account. | 2022-05-05 |
20220141025 | METHOD AND SYSTEM FOR BLOCKCHAIN-BASED INFORMATION MANAGEMENT AMONG NETWORK DEVICES - A method, a device, and a non-transitory storage medium are described in which an blockchain-based network information management service is provided. The service provides blockchain mechanisms that allows for the management and disbursement of network information among network devices of a RAN, a core network, and an application layer network. The service may define a structure for the network information that may be used by RAN devices, core devices, and application layer devices of different vendors and third parties. | 2022-05-05 |
20220141026 | GRAPHICS SECURITY WITH SYNERGISTIC ENCRYPTION, CONTENT-BASED AND RESOURCE MANAGEMENT TECHNOLOGY - Methods, apparatuses and system provide for technology that interleaves a plurality of verification commands with a plurality of copy commands in a command buffer, wherein each copy command includes a message authentication code (MAC) derived from a master session key, wherein one or more of the plurality of verification commands corresponds to a copy command in the plurality of copy commands, and wherein a verification command at an end of the command buffer corresponds to contents of the command buffer. The technology may also add a MAC generation command to the command buffer, wherein the MAC generation command references an address of a compute result. | 2022-05-05 |
20220141027 | AUTOMATIC DISTRIBUTION OF DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) KEYS VIA LINK LAYER DISCOVERY PROTOCOL (LLDP) - A method for obtaining information from a server. The method includes a client device receiving a link layer message transmitted by a network node, the link layer message comprising authentication information; and the client device using the authentication information to obtain information from the server. | 2022-05-05 |
20220141028 | SECURE VAULT SYSTEM FOR PRIVATE KEY STORAGE - A vault system provides a signing manager system and a signing system for transferring assets from a vault that are recorded in a distributed ledger. The signing manager system receives an order to transfer an asset from the vault, validates the order in various ways, and sends a signing request containing the order to the signing system. The signing system is implemented at a secure vault location and securely generates and stores vault private keys. Upon receiving the signing request, the signing system performs various validations, signs the transaction, and sends a signing response to the signing manager system. Upon receiving the signing response, the signing manager system validates the signing response and directs that the signed transaction be recorded in the distributed ledger. | 2022-05-05 |
20220141029 | USING MULTI-FACTOR AND/OR INHERENCE-BASED AUTHENTICATION TO SELECTIVELY ENABLE PERFORMANCE OF AN OPERATION PRIOR TO OR DURING RELEASE OF CODE - Techniques are described herein that are capable of using multi-factor and/or inherence-based authentication to selectively enable performance of an operation prior to or during release of code. For example, a user-specific digital signature that identifies a user of a code development service is generated based at least in part on factor(s) obtained from the user as a result of initiating or receiving a request to perform an operation with regard to the code prior to or during the release of the code. Multi-factor and/or inherence-based authentication may be selectively performed based at least in part on the user-specific digital signature. The performance of the operation is selectively enabled based at least in part on whether the user is authenticated. | 2022-05-05 |
20220141030 | POST-COMPLETION ACTION MANAGEMENT IN ONLINE DOCUMENT SYSTEM - A system and a method are disclosed for receiving a set of rules associated with a document type from a supplier entity. Each rule identifies a set of conditions and a set of actions to be taken after a document of a document type is signed if the set of conditions is satisfied. When a supplier entity sends a document of the document type to a signing entity and the signing entity provides an electronic signature, the system determines whether conditions of rules associated with the document type are satisfied. For each rule that is satisfied, the system performs actions identified by the rule. | 2022-05-05 |
20220141031 | METHOD FOR GENERATING A DIGITAL PROOF OF THE TRANSMISSION OF A MESSAGE BY A UWB RADIO TAG, ASSOCIATED SYSTEM - A method for generating a composite signature of a datum transmitted by a UWB radio tag, includes transmission of a message by a UWB radio tag; reception of the transmitted message by at least two reception beacons; generation of an enriched message including a temporal datum calculated from the arrival date of the first message and at least one signature by each of the beacons; and reception of the enriched messages by a calculator to determine a proof from the temporal data and signatures of each enriched message received. | 2022-05-05 |
20220141032 | INFRASTRUCTURE-ENABLED SECURE LEDGER - A method and system for certifying an interaction of an infrastructure component with a device in the course of the device lifecycle are described. The method comprises accessing device identification data that identifies the device, generating validation data on the basis of device identification data and component identification data to certify an interaction of the device with the infrastructure component and communicating a request to store the validation data in a secure ledger. The secure ledger comprises a ledger entry for each interaction of the device with an infrastructure component. | 2022-05-05 |
20220141033 | METHOD OF VERIFYING ORIGIN OF A SIGNED FILE - Methods are provided for generating a certificate, signing files with the certificate and verifying the signing. A first aspect provides, in an electronic data processing device, a method of processing a data file. The method comprises associating a certificate to a data file, the certificate comprising at least one reputation service identifier, signing the data file using a private key associated with the certificate, generating a file identifier based on data comprised by the data file and sending the file identifier to a trusted data vault associated with the certificate. The method further comprises generating a data file token based on the file identifier, signing the data file token with the private key and sending the token to the reputation service for publication associated with the reputation service identifier. | 2022-05-05 |
20220141034 | TRACKING PROVENANCE OF DIGITAL DATA - A data authentication system stores a token representing data distributed from a data source to a data recipient, allowing the data recipient to authenticate the data. The data authentication system receives, from a data source, a first token that represents a digital entity distributed by the data source to a data recipient. A representation of the first token is sent for storage on a blockchain. A request is received from a data recipient to authenticate the digital entity, where the request includes a second token that represents the digital entity as distributed to the data recipient. The data authentication system authenticates the second token against the stored first token to verify that the data recipient received authentic data. | 2022-05-05 |