25th week of 2019 patent applcation highlights part 77 |
Patent application number | Title | Published |
20190190661 | HYBRID AUTOMATIC REPEAT REQUEST METHOD AND TERMINAL DEVICE - Embodiments of the present invention provide a hybrid automatic repeat request method and a terminal device. The method includes: obtaining a first uplink grant (UL grant) sent by a base station, where the first uplink grant is carried in a media access control MAC message; transmitting uplink data based on the first uplink grant, and starting a first timer; starting a second timer after the first timer expires; and listening to a physical downlink control channel PDCCH based on the second timer. According to the hybrid automatic repeat request method and the terminal device in the embodiments of the present invention, electricity can be saved, and a retransmission delay can be reduced. | 2019-06-20 |
20190190662 | METHOD AND APPARATUS FOR IMPROVING DOWNLINK BROADCAST FOR V2V COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM - Uplink (UL) feedback-based hybrid automatic repeat request (HARQ) retransmission may be proposed as an example for improving downlink (DL) broadcast for vehicle-to-everything (V2X) communication, especially for V2V (vehicle-to-vehicle) communication. An eNodeB (eNB) receives, from a neighboring eNB, an HARQ feedback transmitted by a user equipment (UE), and determines whether an HARQ is to be re-transmitted on the basis of the received HARQ feedback. | 2019-06-20 |
20190190663 | Uplink Control Signaling on PUSCH with Shortened Transmission Time Interval (TTI) - According to an aspect, a transmitting device determines, for each of a plurality of transmissions, whether user data to be transmitted within a time transmission interval, TTT, will be closest in time to a DMRS transmitted before the user data or after the user data. If before the user data, all HARQ ACK/NACK data for the transmission is mapped to the earliest in time SC-FDMA symbol carrying user data in the transmission, and to pre-DFT symbols closest in time to the DMRS transmitted before the user data. If after the user data, all HARQ ACK/NACK data for the transmission is mapped to the last in time SC-FDMA symbol carrying user data in the transmission, and to pre-DFT symbols closest in time to the DMRS transmitted after the user data. SC-FDMA signals are formed from user data and control information for the transmission, based on the mapping. | 2019-06-20 |
20190190664 | Beamforming feedback tone/sub-carrier location within wireless communications - An access point (AP) includes at least one processing circuitry configured to support communications with other WDEV(s) and to generate and process signals for such communications. In some examples, the device includes a communication interface and a processing circuitry, among other possible circuitries, components, elements, etc. to support communications with other WDEV(s) and to generate and process signals for such communications. The WDEV transmits a null data packet (NDP) announcement frame that specifies a sub-carrier (SC) or tone grouping factor, a communication channel bandwidth, and other WDEV(s) to respond with beamforming feedback. The WDEV process the NDP announcement frame to determine if it is to respond, and if so, then receives an NDP sounding frame that includes long training fields (LTFs) and pilots at predetermined locations and generates beamforming feedback of communication channel estimates at SCs as determined based on a sub-carrier roster look up table (LUT). | 2019-06-20 |
20190190665 | METHOD AND APPARATUS FOR IMPLEMENTING EFFICIENT SWITCHING ON A SPLIT BEARER - A method and apparatus may include configuring a split bearer. The split bearer is configured with a first data path between a user equipment and a first network node, and the split bearer is also configured with a second data path between the user equipment and a second network node. The split bearer is configured for a switching operation. The switching operation includes an operation where data transmission is restricted to be towards only one of the first data path and the second data path. The method also includes first transmitting on the split bearer towards the first data path. The method also includes performing the switching operation. The transmitting towards the first data path is switched to transmitting towards the second data path. The method also includes second transmitting on the split bearer towards the second data path. | 2019-06-20 |
20190190666 | Multiple user (MU) short feedback response in wireless communications - A wireless communication device (alternatively, device, WDEV, etc.) includes at least one processing circuitry configured to support communications with other WDEV(s) and to generate and process signals for such communications. In some examples, the device includes a communication interface and a processing circuitry, among other possible circuitries, components, elements, etc. to support communications with other WDEV(s) and to generate and process signals for such communications. The WDEV generates a trigger frame that requests feedback responses from other WDEV(s) and transmit the trigger frame to the plurality of other WDEV(s). Then, in response to the trigger frame and based on agreed-upon parameters, the WDEV receives simultaneously the feedback responses that include a first feedback response from a first other WDEV and a second feedback response from a second other WDEV (e.g., within respective orthogonal frequency division multiple access (OFDMA) resource unit(s) (RU(s)) as specified by the agreed-upon parameters. | 2019-06-20 |
20190190667 | LOCALIZED AND DISTRIBUTED TRANSMISSION - The available transmission resources on a downlink-shared channel are divided into resource blocks, each resource block comprising a predetermined number of sub-carriers during a predetermined time period. The resource blocks are subdivided into localized resource blocks and distributed resource blocks. A user requiring sufficient resources can be allocated a plurality of said localized resource blocks. A user who would require only a small number of said localized resource blocks can instead be allocated subunits of a plurality of said distributed resource blocks. | 2019-06-20 |
20190190668 | SUBBAND-BASED RANDOM ACCESS AND SCHEDULING REQUEST FOR NEW-RADIO-SPECTRUM SHARING (NR-SS) - Wireless communications systems and methods related to performing subband-based random access and/or subband-based scheduling request in a network are provided. A first wireless communication device receives a communication configuration indicating one or more subbands for transmitting a signal including at least one of a random access preamble sequence or a scheduling request. The first wireless communication device performs a clear channel assessment (CCA) on each subband of the one or more subbands. The first wireless communication device transmits the signal using at least one subband of the one or more subbands based on a result of the CCA. | 2019-06-20 |
20190190669 | Method of Sounding a Terminal in a Wireless Communication System and Apparatus Therefor - One embodiment according to the present invention, with respect to a sounding method of user equipment (UE) in a wireless communication system, comprises the steps of: receiving configuration of one or more sounding reference signal (SRS) resource sets from a base station; receiving, from the base station, activation command information commanding the SRS transmission activation of a particular SRS resource set from among the one or more SRS resource sets; and transmitting, to the base station, the SRS corresponding to the particular SRS resource set, wherein the reference signal, for which a spatial relationship is assumed for each SRS resource included in the particular SRS resource set, can be determined on the basis of the activation command information. | 2019-06-20 |
20190190670 | SIGNAL TRANSMISSION METHOD AND APPARATUS - Embodiments of this application provide a signal transmission method and apparatus. In the embodiments of this application, a first device exchanges reference signal configuration information with a second device, to implement coordinated transmission of a reference signal sent by CoMP user equipment, so that the first device and the second device do not need to separately configure, for the CoMP user equipment, a resource used to transmit the reference signal. In addition, the CoMP user equipment sends a same reference signal to a plurality of devices (including the first device and the second device), so as to reduce delays in obtaining channel quality by different devices, and improve performance of coordinated transmission. | 2019-06-20 |
20190190671 | WIRELESS COMMUNICATION METHOD AND WIRELESS COMMUNICATION DEVICE - A method includes for a designated pilot symbol of at least one pilot symbol to be inserted into a data sequence, determining a first subcarrier and a second subcarrier adjacent to a position of the designated pilot symbol in a frequency domain; at least separately determining a first position and a second position on the first subcarrier and the second subcarrier; determining a first symbol and a second symbol, so that the first symbol is capable of neutralizing interference on the designated pilot symbol of data symbols in positions other than the first position within a predetermined range of the first subcarrier, and the second symbol is capable of neutralizing interference on the designated pilot symbol of data symbols in positions other than the second position within a predetermined range of the second subcarrier; and respectively inserting the first symbol and the second symbol in the first and second positions. | 2019-06-20 |
20190190672 | METHOD FOR INDICATING QCL INFORMATION FOR APERIODIC CSI-RS IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS FOR SAME - Disclosed herein is a method for receiving a user equipment-specific reference signal-based data signal by a user equipment in a wireless communication system. Particularly, the method comprises the steps of: receiving a control signal for the user equipment-specific reference signal-based data signal from an eNodeB; and receiving the user equipment-specific reference signal-based data signal on the basis of the control signal, wherein the control signal includes information on an antenna port for a channel status information-reference signal, the antenna port being assumed to be quasi-co-located (QCL) with an antenna port for the user equipment-specific reference signal, and the channel status information-reference signal excludes an aperiodic channel status information-reference signal. | 2019-06-20 |
20190190673 | METHOD AND APPARATUS FOR TRANSMITTING REFERENCE SIGNAL IN MOBILE COMMUNICATION SYSTEM - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. | 2019-06-20 |
20190190674 | TERMINAL DEVICE, BASE STATION DEVICE, COMMUNICATION METHOD, AND INTEGRATED CIRCUIT FOR PROCESSING DEMODULATION REFERENCE SIGNALS - There are provided a terminal device, a base station device, and an integrated circuit that enable a base station device and a terminal device to determine parameters related to uplink signals or uplink reference signals and to perform efficient communication. A terminal device that transmits a demodulation reference signal associated with a physical uplink shared channel to a base station device includes determining a sequence group number on the basis of a value of a parameter configured by a higher layer, determining the sequence group number on the basis of a physical layer cell identity, and generating a sequence of the demodulation reference signal on the basis of the sequence group number, wherein the sequence group number is determined on the basis of the physical layer cell identity in a case where a transmission on the physical uplink shared channel corresponding to a downlink control information format to which CRC parity bits scrambled by a Temporary C-RNTI are attached is performed in a random access procedure. | 2019-06-20 |
20190190675 | USER TERMINAL AND RADIO COMMUNICATION METHOD - The present invention is designed so that allocation of signals can be controlled appropriately even when multiple frame configurations are introduced. A control section that controls communication using a plurality of frame configurations that are applied to downlink data transmission, and a receiving section that receives a downlink reference signal are provided, and the receiving section performs reception, assuming that the downlink reference signal is allocated to a common time field and/or frequency field in the plurality of frame configurations. Furthermore, a control section that controls communication using a plurality of frame configurations that are applied to uplink data transmission, and a transmission section that transmits a measurement reference signal are provided, and the transmission section allocates the uplink reference signal to a common time field and/or frequency field in the plurality of frame configurations, and performs transmission. | 2019-06-20 |
20190190676 | Customizing Transmission of a System Information Message - Techniques and apparatuses are described that enable customized transmission of a system information message. One or more transmission characteristics of the system information message are tailored for a particular user equipment (UE) device or a group of UE devices. In one aspect, a response frequency used to transmit the system information message is customized based on a requested frequency of the UE device. In another aspect, a beamform pattern used to transmit the system information message is customized based on an angle to the UE device. In general, these customizations increase an amplitude of the system information message at the UE device, which increases an effective range of the system information message and enables a larger quantity of UE devices to establish communication with a base station. The customization also enables the base station to efficiently transmit the system information message to one or more UE devices. | 2019-06-20 |
20190190677 | METHOD FOR TRANSMITTING AND RECEIVING PHASE NOISE COMPENSATION REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method of transmitting, by a terminal, a phase noise compensation reference signal in a wireless communication system is discussed. The method includes determining a frequency resource and a time resource of a demodulation reference signal (DM-RS); mapping the phase noise compensation reference signal to a frequency resource and a time resource based on the determined frequency resource and the time resource of the DM-RS; and transmitting, to a base station, the phase noise compensation reference signal on the mapped frequency resource and the time resource of the phase compensation reference signal. Further, a location of a phase noise compensation reference signal symbol in the time resource is determined based on a location of a DM-RS symbol in the time resource of the DM-RS. | 2019-06-20 |
20190190678 | METHODS FOR EFFICIENT SIGNALING IN V2X COMMUNICATIONS - A transmitting UE schedules radio frequency resources for use in a data transmission. The transmitting UE determines the transmission bandwidth, subject to certain restrictions, such as allowed DFT sizes for the UE for a data transmission. The determination may be performed through autonomous resource selection operations and/or may be performed using information received through signaling received from the network node as part of a scheduling grant. The UE further determines the ALLOCATED BANDWIDTH. The ALLOCATED BANDWIDTH can be determined based on the TRANSMISSION BANDWIDTH, which has been determined, using a defined rule. Furthermore, the UE generates and transmits toward a receiving UE a scheduling assignment (SA) that indicates the number or the set of subchannels that are within, and conform to, the ALLOCATED BANDWIDTH which was determined. The UE can then perform the data transmission using the SA indicated number or set of subchannels. | 2019-06-20 |
20190190679 | TECHNIQUES FOR ADJUSTING CLEAR CHANNEL ASSESSMENT (CCA) WINDOW FOR TRANSMISSIONS IN A SHARED RADIO FREQUENCY SPECTRUM BAND - Techniques and devices are described for wireless communication. A base station may determine a parameter associated with a transmission such as hybrid automatic repeat request (HARD) feedback, a signal-to-noise ratio, or a determination regarding whether the transmission was successfully decoded. The base station may then determine a contention window adjustment value based on the parameter. The base station may then apply weighting factor (e.g., based on the time of the transmission, a number of devices being served, aspects of the transmission parameter, etc.) to the contention window adjustment value may adjust a contention window size for a second transmission based on the weighted contention window adjustment value (and, in some cases, other weighted adjustments based on other transmissions). The base station may then perform a clear channel assessment (CCA) based on the contention window size. | 2019-06-20 |
20190190680 | METHOD AND DEVICE FOR FEEDING BACK DOWNLINK DATA - Disclosed in the present application are a method and device for feeding back downlink data. When a processing duration of an UE is shortened, feedback timing information for feeding back downlink data may be adaptively changed. The method comprises: determining a processing capability of an UE, the processing capability referring to a processing duration that the UE takes to process the received downlink data to determine whether said downlink data needs to be retransmitted; according to the determined processing capability, determining the feedback timing information of the UE feeding back the downlink data. | 2019-06-20 |
20190190681 | MANAGING RELEASE OF RESOURCES FOR UPLINK GRANT-FREE TRANSMISSIONS ON BANDWIDTH PART DEACTIVATION - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive a bandwidth part configuration for a plurality of bandwidth parts, wherein a first bandwidth part of the plurality of bandwidth parts is identified as being activated and is associated with first resources allocated for uplink grant-free transmissions by the UE on the first bandwidth part. The UE may receive determine to deactivate the first bandwidth part and activate a second bandwidth part, and may determine to reactivate the first bandwidth part. The UE may identify second resources for uplink grant-free transmissions by the UE on the first bandwidth part based at least in part on the bandwidth part configuration. Numerous other aspects are provided. | 2019-06-20 |
20190190682 | CARRIER AGGREGATION SCELL NEW STATE TRANSITION DESIGN - Aspects of the disclosure relate to a method of operating a user equipment (UE) for wireless communication with a network. In some aspects, the UE obtains a medium access control (MAC) control element (CE) from a network. The MAC CE may be configured to indicate any one of a plurality of state transition actions for a secondary cell. The UE transitions to a secondary cell dormant state when a state transition action indicated by the MAC CE includes a transition to the secondary cell dormant state. The UE operates in the secondary cell dormant state. | 2019-06-20 |
20190190683 | Exclusion of Cellular Scheduling to Allow Sharing of Resources Between Cellular and Non-Cellular Radio Access Technologies - Exclusion functionality for License Assisted Access, LAA, in LTE is defined. LAA exclusion is a temporary deactivation or throttling of scheduling on LAA Secondary Cells (SCells), which allows a requesting UE ( | 2019-06-20 |
20190190684 | FULL DUPLEX EXPANDER IN A FULL DUPLEX NETWORK - In one embodiment, a method receives a downstream signal and an upstream signal in a same frequency band. The downstream signal and the upstream signal are separated into a first path and a second path. The downstream signal using the first path and the upstream signal using the second path are amplified in an analog domain. The method isolates the downstream signal and the upstream signal from one another and sends the downstream signal downstream to a subscriber device and sends the upstream signal towards a full duplex node. | 2019-06-20 |
20190190685 | BASE STATION, USER EQUIPMENT AND WIRELESS COMMUNICATION METHOD - Provided are a base station, user equipment and wireless communication method related to RS collision cancellation in full duplex communication. A base station comprises: circuitry operative to perform at least one of a first processing and a second processing on downlink signals to be transmitted on a physical resource unit in a full duplex mode corresponding to one Transmission Time Interval (TTI); a transmitter operative to transmit the processed downlink signals on the physical resource unit to a first user NO equipment in a TTI; and a receiver operative to receive uplink signals on the physical resource unit from a second user equipment, wherein the first processing is use to be performed such that Code Division Multiplexing (CDM) is applied between the downlink signal and the uplink signal assigned on each of at least part of collided resource elements in the physical resource unit, each of the collided resource elements being assigned with both a downlink signal and an uplink signal at least one of which is a reference signal, and the second processing comprises suppressing at least part of the downlink signals assigned on the resource elements assigned with uplink reference signals thereon in the collided resource elements. | 2019-06-20 |
20190190686 | INDICATION TECHNIQUES FOR NARROWBAND SYSTEM INFORMATION BLOCK TYPE 1 (SIB1-NB) TRANSMISSION ON A CARRIER - Embodiments described herein relate to time division duplexing (TDD) support for in-band, guard band, and standalone operation modes of narrowband internet-of-things (NB-IoT) systems. At least one example is directed to an indication technique for transmission of a narrowband system information block type 1 (SIB1-NB) on a carrier. | 2019-06-20 |
20190190687 | METHOD AND APPARATUS FOR SUPPORTING MECHANISMS FOR FLEXIBLE DUPLEX OPERATIONS AT SYMBOL LEVEL IN WIRELESS COMMUNICATION SYSTEM - For fast and dynamic adaptation of downlink (DL) and uplink (UL) resource, DL/UL resource switching at a symbol level or at a sub-symbol level is proposed. In detail, a network node transmits s DL data in a first symbol, and receives UL data in a second symbol, which is the next symbol of the first symbol. | 2019-06-20 |
20190190688 | LATENCY BUFFER CIRCUIT WITH ADAPTABLE TIME SHIFT - Data words are received in parallel in response to an edge of a master clock signal and selected for serial output in response to a select signal. For a detected temporal offset of the serially output data words, the generation of the select signal and the master clock signal are controlled to correct for the temporal offset by shifting timing of the edge of the master clock signal and adjusting a sequence of values for the select signal that are generated within one cycle of the master clock signal. For a backward temporal offset, at least one count value in the sequence of values is skipped and the edge of the master clock signal occurs earlier in time. For a forward temporal offset, at least one count value in the sequence of values is held and the edge of the master clock signal occurs later in time. | 2019-06-20 |
20190190689 | TRANSMISSION APPARATUS, RECEPTION APPARATUS, AND DATA PROCESSING METHOD - The present technology relates to a transmission apparatus, a reception apparatus, and a data processing method capable of efficiently transmitting time information with high accuracy. | 2019-06-20 |
20190190690 | Method and Apparatus for Sending Service, Method and Apparatus for Receiving Service, and Network System - A method and an apparatus for sending a service, a method and an apparatus for receiving a service, and a network system. The method for sending a service includes obtaining, by a transmit end device, an original data stream, inserting a quantity mark k into the original data stream, to generate a first data stream, where the quantity mark k is a quantity of first data units in the original data stream, and k is greater than or equal to 0, and sending the first data stream. | 2019-06-20 |
20190190691 | TIME-ALIGNMENT MEASURMENT FOR HYBRID HD RADIO TECHNOLOGY - A method for processing audio signals in a radio transmitter, includes: receiving an analog audio sample stream and a digital audio sample stream; determining offsets in time between the analog audio stream and the digital audio stream using a normalized cross-correlation of audio envelopes of the analog audio sample stream and the digital audio sample stream; filtering the determined offsets in time to produce filtered offset values; determining an alignment slip adjustment value as a function of the filtered offset values; aligning the analog audio sample stream and the digital audio sample stream using the determined alignment slip adjustment value; and generating a hybrid radio signal for broadcast that includes time-aligned analog audio and digital audio. | 2019-06-20 |
20190190692 | METHOD FOR OBTAINING PHASE DETECTION SIGNAL IN CLOCK RECOVERY CIRCUIT AND PHASE DETECTOR - Embodiments of this application provide a method for obtaining a phase detection signal in a clock recovery circuit and a phase detector, configured to obtain a correct phase detection signal. A phase detector obtains sampling sequences sent by an analog to digital converter ADC, where the sampling sequences are obtained by the ADC by sampling, an electrical signal received by the ADC, and the electrical signal carries a pre-configured training sequence; the phase detector calculates a correlation between the sampling sequences and a comparison sequence, to determine a first location and a second location, where the first location and the second location are locations of a starting point of the training sequence in the sampling sequences; and the phase detector obtains a phase detection signal based on a difference parameter of the first location and the second location. | 2019-06-20 |
20190190693 | APPARATUS AND METHOD FOR CROSS-DOMAIN ANALYSIS OF RADIO SYSTEMS - An apparatus for analyzing one or several radio systems is provided, having: one or several radio-frequency units for generating one or several baseband signals from one or several radio signals, a spectral analysis module for performing spectral analysis, wherein one of the baseband signals is transformed to a time-frequency domain in order to obtain a spectrogram in the time-frequency domain, one or several demodulators for generating several demodulated radio packets of the one or several radio systems from the one or several baseband signals, the demodulators providing additional information for the demodulated radio packets, a spectrogram analyzer for detecting radio packets found in the spectrogram in the time-frequency domain and for establishing one or several characteristics for each radio packet found based on the spectrogram in the time-frequency domain, and a synchronization module configured to determine one or several pairs, wherein each pair has precisely one demodulated radio packet of the demodulated radio packets, having the one or several characteristics of precisely one radio packet found of the radio packets found. | 2019-06-20 |
20190190694 | PRIVACY PRESERVING COMPARISON - A method for performing a secure comparison between a first secret data and a second secret data, including: receiving, by a processor of a first party, | 2019-06-20 |
20190190695 | HALF-PYRAMID DATA ENCRYPTION - One embodiment provides a method, including: receiving, from a data owner, an input string of plaintext data comprising a plurality of characters for storage in a database of a third-party storage provider; arranging the plurality of characters of the input string as a half pyramid, wherein the half pyramid comprises a plurality of rows, each row comprising at least one more character than a preceding row; encrypting, using a secure encryption scheme and based upon a key, each row of the half pyramid independently from each other row of the half pyramid; and storing, in the database of the third-party storage provider, the encrypted rows of the half pyramid. Other aspects are claimed and described. | 2019-06-20 |
20190190696 | Protecting sensitive data in a distributed ledger system using blockchain hierarchies - A blockchain hierarchy comprises an arrangement of blockchains organized in a tree-like manner such that a blockchain at a lower level feeds data to a blockchain at a relatively higher level. At least one blockchain comprises a private autonomous group of peers that are involved in a particular task. Within that particular group of peers, preferably one of the peers is elected as a leader entity, which has the capability of also joining another private or public blockchain, e.g., one at a higher level in the hierarchy. The leader entity includes a capability to enforce a data protection policy within the blockchain that it leads. To this end, the leader filters or declassifies data based on some task-specific (or blockchain-specific) data protection policy, and it then makes that data available to one or more other blockchains in the hierarchy (directly or indirectly). | 2019-06-20 |
20190190697 | BLOCKCHAIN LIFECYCLE MANAGEMENT - An example operation may include one or more of identifying one or more attributes of a blockchain, determining the blockchain should be closed based on the one or more attributes, closing the blockchain, creating a new blockchain, identifying one or more assets from the blockchain, and creating a carry-over transaction based on the one or more assets of the blockchain. | 2019-06-20 |
20190190698 | BLOCKCHAIN VALIDATION SYSTEM - Blockchain validation is provided by receiving a first validation request of a blockchain. A hashing algorithm is applied to a first block of the blockchain to generate a first hash value. In response to the first validation request of the blockchain, a first image from a plurality of images is provided on a display device. The first image is selected to be provided for display on the display device based on the first hash value. The first image may be compared to a second image that was provided for display on the display device prior to the first validation request and that image was provided based on a second hash value to determine whether the first image and the second image are substantially similar, which indicates that no changes have been made to the data in the blockchain. | 2019-06-20 |
20190190699 | EFFICIENT HASH TABLE KEY STORAGE - The present disclosure is directed to a system and method for compressing keys of key-data item pairs for storage in a hash table to reduce power and/or area requirements of the memory used to implement the hash table. The system and method of the present disclosure use the hash function to compress a key of a key-data item pair. More specifically, the system and method of the present disclosure effectively remove information from the key that can be predicted using in the hash value of the key to generate a compressed key. Information in the key that is not predictable using the hash value of the key can be included in the compressed key to allow for recovery of the key. | 2019-06-20 |
20190190700 | REINFORCEMENT LEARNING-BASED ENCRYPTION AND DECRYPTION METHOD AND CLIENT AND SERVER SYSTEM PERFORMING THE SAME - A client and server system that performs a reinforcement learning-based encryption and decryption method according to an aspect of the present invention may include: a key management module configured to manage an encryption key required in performing an encryption and a decryption of data; a secret sharing module configured to perform a secret sharing of a threshold value for a lifetime and availability of the data; and a threshold estimation module configured to perform an estimation of the threshold value; and can improve the availability and security of data to satisfy user demands in a self-destructing environment for privacy protection. | 2019-06-20 |
20190190701 | COOPERATIVE PLATFORM FOR GENERATING, SECURING, AND VERIFYING DEVICE GRAPHS AND CONTRIBUTIONS TO DEVICE GRAPHS - Graphing services are provided to a device cooperative that includes data contributors, e.g., website hosts. Anonymized user data, provided by the data contributors, is accessed, via a blockchain, decrypted, and aggregated. A device graph is generated based on the aggregated user data. Contribution metrics are provided to the data contributors. A first contribution metric for a first data contributor indicates a contribution to the device graph of a first portion of the user data that was provided by the first data contributor. In response to receiving a request for a verification of the first contribution metric, a zero knowledge proof of the first contribution metric is generated and provided to the first data contributor. The first data contributor is enabled to evaluate the zero knowledge proof independent of access to a second portion of the user data that was provided by a second data contributor of the device cooperative. | 2019-06-20 |
20190190702 | DATA EXTRACTION SYSTEM, DATA EXTRACTION METHOD, REGISTRATION APPARATUS, AND PROGRAM - A data extraction system includes a registration apparatus, a data storage apparatus, and a query apparatus. The registration apparatus generates registration data including first information obtained by encrypting secret information, which is information that a user wishes to keep secret, by using a secret key and second information obtained by encrypting the secret key by using at least biological information of the user. The data storage apparatus holds the registration data. The query apparatus acquires the registration data by generating a query for acquiring the registration data from the data storage apparatus, extracts the secret key from the registration data by using biological information of the user, and extracts the secret information from the registration data by using the extracted secret key. | 2019-06-20 |
20190190703 | SYSTEMS AND METHODS FOR USING AN OUT-OF-BAND SECURITY CHANNEL FOR ENHANCING SECURE INTERACTIONS WITH AUTOMOTIVE ELECTRONIC CONTROL UNITS - A method is provided for securely communicating protected data to a vehicle of a vehicle fleet. The method includes encrypting the protected data, which is configured to update the vehicle's automotive control systems, with an encryption key. The encrypted protected data is transmitted to the vehicle over a selected network of one or more data networks based on bandwidth, cost, and geographic access to the vehicle. The data networks provide narrower geographic access to the vehicle than a satellite constellation network. The satellite constellation network operates as an out-of-band side-channel to provide security enhancement to the data networks. The encryption key is also encrypted using a first key of a key-encryption key (KEK) pair and can be decrypted by a second key of the KEK pair which is in the vehicle's possession. The encrypted encryption key is transmitted directly to the vehicle over the out-of-band satellite constellation network. | 2019-06-20 |
20190190704 | METHOD AND SYSTEM FOR DEVICE LEVEL AUTHENTICATION IN ELECTRONIC TRANSACTIONS - A method for distributing data to a computing device using device level authentication includes: storing, in a memory of a computing device, a single use key encrypted with a first encryption, a server public key, and device data; generating a key pair comprising a device private key and a corresponding device public key; wrapping the device public key using the server public key; transmitting at least the device data, wrapped device public key, and the single use key encrypted with the first encryption to a server; receiving the single use key encrypted with a second encryption from the server; and executing a query on the memory to insert the received single use key encrypted with the second encryption. | 2019-06-20 |
20190190705 | SELF-STABILIZING SECURE AND HETEROGENEOUS SYSTEMS - A method for providing self-stabilization of functionality security and privacy to a distributed computer system with self-stabilizing machines, according to which the system periodically and constantly recovers from cyber-attacks performed by an adversary who gained access to the system during a vulnerability window. Then a True Random Number Generator (TRNG) generates a random number from which generating a pair of public and private keys are generated. The public key of the pair is distributed among neighboring machines, to generate a common symmetric secret key. Each machine to exchanges messages with any other machine using messages that are encrypted and decrypted by their established common symmetric secret key, where all keys are generated using random numbers that were generated by the True Random Number Generator. | 2019-06-20 |
20190190706 | QUANTUM KEY DISTRIBUTION INFORMATION LEAKAGE DUE TO BACKFLASHES IN SINGLE PHOTON AVALANCHE PHOTODIODES - A quantum cryptography apparatus and system includes a photon emitter, a photon receiver, a first photodetector, a second photodetector, a first polarization optic, and a second polarization optic. The photon emitter is configured to emit a photon at a wavelength, wherein the photon emitter is coupled to the photon receiver by at least one quantum channel. The photon receiver includes the first polarization optic configured to output a polarization state of the emitted photon. The first photodetector is configured to detect the photon emitted from the output of the first polarization optic. The second photodetector is configured to detect a backflash from the first photodetector. The second polarization optic is between the first photodetector and the second photodetector. The quantum cryptography apparatus may be a quantum key distribution system for characterizing backflashes. | 2019-06-20 |
20190190707 | QUANTUM CRYPTOGRAPHIC KEY OUTPUT APPARATUS, QUANTUM CRYPTOGRAPHIC KEY COMMUNICATION SYSTEM, AND QUANTUM CRYPTOGRAPHIC KEY OUTPUT METHOD - A quantum cryptographic key output apparatus includes a semiconductor laser device that repeatedly generates pulsed laser light, an encoder that encodes the pulsed laser light based on a quantum cryptographic key, an optical branching unit that branches the pulsed laser light, and an attenuator that attenuates a light intensity of first pulsed laser light so that the number of photons of the first pulsed laser light has any one of a plurality of candidate values that are values equal to or smaller than 1. Further, the output apparatus includes a light intensity determination unit that determines whether or not a light intensity of a second pulsed laser light is in a predetermined range, and an information output unit that outputs specifying information for specifying the first pulsed laser light corresponding to second pulsed laser light of which the light intensity is not in the predetermined range to an input apparatus. | 2019-06-20 |
20190190708 | OPTICAL INTERFEROMETER APPARATUS AND METHOD - There is presented optical interferometer apparatus for generating at least a first and a second state for each of at least two different quantum cryptographic basis sets and associated methods for operating the apparatus. First and a second interferometer arm paths and at least two interferometer output paths are provided. Each of the first and second interferometer arm paths; and the first and second optical output paths comprises a controllable phase modulator for controllably changing the phase of light propagating along the respective paths. This maybe a silicon carrier depletion phase modulator. The output from the controllable phase modulators of the first and second optical output paths are used together for defining each of the first and second states for each respective basis set. In some examples at least one of the interferometer arm paths comprises a further controllable phase modulator such as a thermo-optic phase modulator. | 2019-06-20 |
20190190709 | Searchable Symmetric Encryption System and Method of Processing Inverted Index - A searchable symmetric encryption (SSE) system and method of processing inverted index is provided. The SSE system includes genKey, buildSecureIndex, genToken, and search operations. A compress X is integrated into at least one of the buildSecureIndex and search operations. The compress then X takes each entry of an encrypted index, compresses entry of the encrypted index into a compressed entry, and then processes the compressed entry with a function. The function comprises a linked list function and on array function. The search operation decompresses the processed entry and output the decompressed entry. The SSE comprises a client device and a server. The genKey, buildSecureIndex, and genToken operations are integrated into the client device and the search operation is integrated into the server. | 2019-06-20 |
20190190710 | ALLOCATING SECURITY PARAMETER INDEX VALUES USING TIME-BASED ONE-TIME PASSWORDS - The subject matter described herein is generally directed towards generating security parameter index (“SPI”) values at a plurality of endpoints (EP) in a network using time-based one-time passwords (TOTPs). In this manner, the SPI values are generated in a decentralized manner. The SPI values are used for distributed network encryption among the EPs. | 2019-06-20 |
20190190711 | Elliptic Curve Random Number Generation - An elliptic curve random number generator avoids escrow keys by choosing a point | 2019-06-20 |
20190190712 | Carbon Nanotube Physical Entropy Source - A random value generator is provided that comprises a carbon nanotube structure that generates a random output current in response to a voltage input. The random value generator includes a random value output circuit coupled to the carbon nanotube structure that receives the random output current from the carbon nanotube structure and generates a random output value based on the received random output current from the carbon nanotube structure. | 2019-06-20 |
20190190713 | ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUM - A master key generation device generates a master public key and a master secret key. A user key generation device generates a user public key and a user secret key by using the master public key. An administration device acquires an arithmetic procedure. A data save unit saves data encrypted with the user public key as encryption data. The administration device selects, from the data save unit, encryption data which has been encrypted from data to be used for the arithmetic procedure. The administration device performs homomorphic operation on the encryption data based on the arithmetic procedure, and outputs the operation result of the homomorphic operation as an encryption operation result. A master decryption device acquires the encryption operation result, and decrypts the acquired encryption operation result with the master secret key. | 2019-06-20 |
20190190714 | PRIVACY-PRESERVING EVALUATION OF DECISION TREES - A method for performing a secure evaluation of a decision tree, including: receiving, by a processor of a server, an encrypted feature vector | 2019-06-20 |
20190190715 | DIGITAL ASSISTANT WATER MARK - A method and apparatus for providing a watermark within an audible virtual partner transmission is provided herein. During operation, each officer's digital partner will have a uniquely-identifiable watermark embedded within any audible transmission associated with the digital partner. | 2019-06-20 |
20190190716 | SYSTEM AND METHOD FOR VERIFYING USER IDENTITY IN A VIRTUAL ENVIRONMENT - Systems and methods for verifying user identity in a virtual environment are provided that may include the use of a trusted third party to perform identity verification. Devices may be configured such that the device is unalterably bound to a particular user via biometric data stored on the device and/or with the third party. | 2019-06-20 |
20190190717 | ACCESS SECURITY SYSTEM AND METHOD - The present disclosure relates to an access security system and method, for example for securing access to data, objects or locations. According to one aspect there is provided a computer-implemented access security method, the method comprising: receiving, at a processor, a first authentication credential from a near-field communication, ‘NFC’ reader; generating a one-time token, at the processor, in dependence on the first authentication credential, the one-time token being in a form which is capable of reproduction by a user; and outputting the one-time token via an interface for use as an authentication credential in an access procedure. Other aspects relate to a user device for implementing such a method, a computer program product for storing instructions which, when executed, cause such a method to be implemented, and a system in which such a method can be used. | 2019-06-20 |
20190190718 | BIOMETRIC IDENTITY VERIFICATION SYSTEMS, METHODS AND PROGRAMS FOR IDENTITY DOCUMENT APPLICATIONS AND RENEWALS - An automated identity verification computing device, system and method receives an encrypted renewal request from a user computing device including a biometric value, a digital passport object identifier, and request data. The computing device, system and method retrieves trusted biometric data based on the digital passport object identifier from an identity database, determine a verification score based on the trusted biometric data and the biometric value, and generates a renewal package including the verification score, the digital passport object identifier, and the request data. The computing device, system and method transmits the renewal package to a sponsoring authority computing device. | 2019-06-20 |
20190190719 | PRIMARY AND SECONDARY BLOCKCHAIN DEVICE - Some embodiments are directed to a blockchain verification method for a secondary blockchain, the blockchain verification method comprising sending an activation transaction to a primary blockchain management device which is configured to manage the primary blockchain, the primary blockchain management device being configured to execute a smart contract based on input in the activation transaction generating a result, and publish the result on the primary blockchain. | 2019-06-20 |
20190190720 | SECURING AN ITEM OF DEVICE USE INFORMATION OF A DEVICE - Provided is a method for securing an item of device use information of a device, having the following steps: —determining the item of device use information; —generating transaction data depending on the item of device use information; —generating a blockchain data structure which is based on a cryptocurrency and includes the transaction data or a checksum of the transaction data; —sending the generated blockchain data structure to at least one blockchain node. The item of device use information of a device according to the described method is change-protected by a decentralized security structure. Thanks to the distributed blockchain database, the item of device use information of the device cannot be manipulated subsequently. The use of the decentralized blockchain technology also advantageously means that no central trusted point or party is necessary. | 2019-06-20 |
20190190721 | EMAIL VERIFICATION METHOD - The invention is a method of verifying one or more emails sent by a valid sender to an intended recipient. One or more encrypted hash codes are computed from the email content and a private encryption key. The one or more hash codes are stored in an encryption memory, along with the data used to generate the one or more hash codes. The one or more hash codes are sent with the email content to the intended recipient. A verification request email is then received, containing a forwarded copy of the sent email. One or more verification hash codes are recomputed using the forwarded copy, and compared with the one or more hash codes stored in the encryption memory. A verification signal disclosing the verification result is sent to the intended recipient, via a non-email route. | 2019-06-20 |
20190190722 | SCRIPT VERIFICATION USING A HASH - Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: identify, within a data store: a web page including a script tag; a URL in the script tag referencing a location for a second server hosting a script file; and a first hash data in the script tag generated from the script file using a hash function algorithm. The server computer(s) execute a request that accesses the script file and a second hash generated from the script file and stored on the second server computer. If the second hash data does not match the first hash data, execution of the script tag is disabled, and a notification is generated. | 2019-06-20 |
20190190723 | AUTHENTICATION SYSTEM AND METHOD, AND USER EQUIPMENT, AUTHENTICATION SERVER, AND SERVICE SERVER FOR PERFORMING SAME METHOD - Provided are an authentication system and method, and a user terminal, an authentication server, and a service server for performing the authentication method. According to embodiments of the present invention, a complex authentication procedure carried out in the conventional FIDO authentication technology is simplified using a second public key of which the integrity has been checked, so that a transaction occurring in an authentication procedure can be minimized. Such an authentication method is advantageously suitable to provide a service requiring fast authentication, such as security buying and selling or futures trading. | 2019-06-20 |
20190190724 | SYSTEM AND METHOD FOR VERIFYING AN IDENTITY OF A USER USING A CRYPTOGRAPHIC CHALLENGE BASED ON A CRYPTOGRAPHIC OPERATION - A processor-implemented system and method for enabling a relying party device associated with a relying party to verify an identity of a user. The method includes the steps of (i) generating, using a cryptographic processor on a user device associated with the user, a first set of credentials including a public-private key pair associated with the user, (ii) receiving at least one cryptographic challenge from the relying party device associated with the relying party, (iii) verifying at least one of a biometric or a PIN code, (iv) responding to the at least one cryptographic challenge by performing the at least one cryptographic operation on the cryptographic challenge using the user private key to form a result of the at least one cryptographic operation and (v) transmitting the result of the at least one cryptographic operation as a cryptographic challenge response to the relying party device. | 2019-06-20 |
20190190725 | PHYSICALLY UNCLONABLE FUNCTION IMPLEMENTED WITH SPIN ORBIT COUPLING BASED MAGNETIC MEMORY - An apparatus is provided which comprises: an array of physically unclonable function (PUF) devices, wherein an individual device of the array comprises a magnetic junction and an interconnect, wherein the interconnect comprises a spin orbit coupling material; a circuitry to sense values stored in the array, and to provide an output; and a comparator to compare the output with a code. | 2019-06-20 |
20190190726 | AUTHENTICATION SYSTEM AND DEVICE INCLUDING PHYSICAL UNCLONABLE FUNCTION AND THRESHOLD CRYPTOGRAPHY - A device comprising: a physical unclonable function (PUF) device configured to generate an output value based on hardware characteristics of the PUF device; and a processor connected to the PUF device, the processor configured to: execute a cryptographic operation in a sequence of ordered stages including a first stage and a second stage, the executing comprising: in the first stage: recovering a first secret value based on a first output value obtained from the PUF device; executing a first sub-operation using the first secret value; and removing unobscured values from memory prior to execution of a subsequent stage; in the second stage: recovering a second secret value based on a second output value obtained from the PUF device; and executing a second sub-operation using the second secret value to enable execution of a cryptographic operation encoded with at least the first secret value and the second secret value. | 2019-06-20 |
20190190727 | PoE Powered Device with Link Layer Startup Processor - An inventive Power over Ethernet (PoE) Powered Device ( | 2019-06-20 |
20190190728 | Mission Critical Video Policy and Charging Control - A policy and charging rules function (PCRF) receives from a mission critical video (MCVideo) application function, a DIAMETER AA-Request (AAR) command to establish an MCVideo bearer. The DIAMEER AAR command comprises: an attribute value pair (AVP) comprising an MCVideo-identifier identifying an MCVideo service; one or more quality of service (QoS) parameters indicating a QoS of the MCVideo service; and a priority of the MCVideo service. The PCRF determines one or more policy and charging control (PCC) provisions, based on: the MCVideo-identifier, the one or more QoS parameters, and the priority of the MCVideo service. The PCRF transmits a DIAMETER command to a policy charging enforcement function (PCEF). The DIAMETER command comprises the one or more PCC provisions. | 2019-06-20 |
20190190729 | DISTRIBUTING TRAFFIC TO MULTIPLE DESTINATIONS VIA AN ISOLATION NETWORK - In one embodiment, a cloud-based service instructs one or more networking devices in a local area network (LAN) to form a virtual network overlay in the LAN that redirects traffic associated with a particular node in the LAN to the service. The service receives multicast or broadcast traffic sent by the particular node in the LAN and redirected to the service via the virtual network overlay. The service identifies a group of nodes in the network that are to receive the traffic sent by the particular node, based in part by profiling the traffic associated with the particular node. The service sends the traffic sent by the particular node to at least one networking device in the LAN with an indication of the identified group of nodes in the network that are to receive the traffic sent by the particular node. The at least one networking device forwards the traffic sent by the particular node to the nodes in the identified group. | 2019-06-20 |
20190190730 | SYSTEM AND METHOD FOR AN ENHANCED FOCUS GROUP PLATFORM FOR A PLURALITY OF USER DEVICES IN AN ONLINE COMMUNICATION ENVIRONMENT - A system and method for management of an online focus group-style discussion comprising a transformation engine that allows for event-based modification and transformation of content for a discussion group view interface. In a preferred embodiment, multiple interfaces tailored to the specific role of a user device are provided. Moreover, the system can auto-generate translations in real time to accommodate a plurality of language capabilities of a plurality of users associated to a plurality of user devices for conducting focus group systems and method online. | 2019-06-20 |
20190190731 | SYSTEM AND METHOD FOR AN ENHANCED FOCUS GROUP PLATFORM FOR A PLURALITY OF USER DEVICES IN AN ONLINE COMMUNICATION ENVIRONMENT - A system and method for management of an online focus group-style discussion comprising a transformation engine that allows for event-based modification and transformation of content for a discussion group view interface. In a preferred embodiment, multiple interfaces tailored to the specific role of a user device are provided. Moreover, the system can auto-generate translations in real time to accommodate a plurality of language capabilities of a plurality of users associated to a plurality of user devices for conducting focus group systems and method online. | 2019-06-20 |
20190190732 | MEETING INVITEE AS PROXY - An electronic invitation, including invitation proxy information, for a meeting is communicated to at least a first and a second invitee. A response is received from the first invitee including response proxy information indicating that the response to the invitation includes a request to proxy for the second invitee. Updating, in a memory, using the response proxy information, an attendance register to indicate that the first invitee will attend the meeting and that the first invitee may proxy for the second invitee. Communicating a proxy confirmation request to the second invitee and receiving a proxy confirmation response including proxy confirmation information. The attendance register is updated, in the memory, using the proxy confirmation information, to indicate that the second invitee will not attend the meeting and that the first invitee will proxy for the second invitee. | 2019-06-20 |
20190190733 | MEETING INVITEE AS PROXY - An electronic invitation, including invitation proxy information, for a meeting is communicated to at least a first and a second invitee. A response is received from the first invitee including response proxy information indicating that the response to the invitation includes a request to proxy for the second invitee. Updating, in a memory, using the response proxy information, an attendance register to indicate that the first invitee will attend the meeting and that the first invitee may proxy for the second invitee. Communicating a proxy confirmation request to the second invitee and receiving a proxy confirmation response including proxy confirmation information. The attendance register is updated, in the memory, using the proxy confirmation information, to indicate that the second invitee will not attend the meeting and that the first invitee will proxy for the second invitee. | 2019-06-20 |
20190190734 | DISTRIBUTED MULTICAST BY ENDPOINTS - A novel method of conducting multicast traffic in a network is provided. The network includes multiple endpoints that receive messages from the network and generate messages for the network. The endpoints are located in different segments of the network, each segment including one or more of the endpoints. For a source endpoint to replicate a particular message (e.g., a data packet) for all endpoints belonging to a particular replication group (i.e., multicast group) within the network, the source endpoint replicates the particular message to each endpoint within the source endpoint's own segment and to a proxy endpoint in each of the other segments. Each proxy endpoint in turn replicates the particular message to all endpoints belonging to the particular replication group within the proxy endpoint's own segment. | 2019-06-20 |
20190190735 | MULTICAST TO UNICAST CONVERSION TECHNIQUE - A technique allows stations to utilize an equal share of resources (e.g., airtime or throughput). This prevents slow stations from consuming too many resources (e.g., using up too much air time). Fairness is ensured by selective dropping after a multicast packet is converted to unicast. This prevents slow stations from using more than their share of buffer resources. Multicast conversion aware back-pressure into the network layer can be used to prevent unnecessary dropping of packets after multicast to unicast (1:n) conversion by considering duplicated transmit buffers. This technique helps achieve airtime/resource fairness among stations. | 2019-06-20 |
20190190736 | SYSTEMS AND METHODS FOR POWER SAVINGS IN HFC AMPLIFIERS - Methods and systems that reduce power usage in a CATV network. Power usage may be reduced by temporally adjusting the power output of amplifiers in the network. The power output of one or more amplifiers in the network are preferably adjusted based on patterns of temporal usage of the network. | 2019-06-20 |
20190190737 | IOT DEVICE PLUG-IN METHOD AND DEVICE IN DATA ANALYSIS-BASED AUTOMATION SYSTEMS - An automatic configuration device, for an Internet-of-Things (IoT) device, which operates a data analysis-based automation system includes when various types of IoT devices are registered in a system, a data analysis-based automation system for supporting both use of functions of the IoT devices and an effective analysis of collected data. | 2019-06-20 |
20190190738 | SYSTEMS AND METHODS FOR TRANSMITTING AN UPDATED PARTITION STATE TO SENSORS OR DEVICES - Systems and methods for updating a partition state of individual sensors or devices in a system are provided. Such systems and methods may include an access point broadcasting a beacon signal including a partition state change indicator portion and a partition state update portion, the sensors or devices periodically waking up to receive the partition state change indicator portion, and responsive to predetermined content of the partition state change indicator portion, one or more of the sensors or devices remaining awake to receive an updated partition state identified in the partition state update portion. | 2019-06-20 |
20190190739 | NON-INTRUSIVE HARDWARE ADD-ON TO ENABLE AUTOMATIC SERVICES FOR APPLIANCES - A system includes a controller including hardware comprising at least one processor and a memory. The controller receives information from at least one sensor. At least one sensor is constructed and adapted to sense, non-intrusively, real-world physical information associated with at least one appliance. Based at least in part on the information from at least one sensor, the controller determines a current condition of at least one appliance and/or predicts a future condition of at least one appliance. Based at least in part on (i) the current condition of at least one appliance and/or (ii) the predicted future condition of at least one appliance, the controller initiates at least one intervention with at least one appliance. | 2019-06-20 |
20190190740 | HOME AUTOMATION SYSTEM INCLUDING CLOUD SERVER BASED MAINTENANCE OPERATION COMMUNICATION AND RELATED METHODS - A home automation (HA) system may include HA operation devices and HA user interface devices for respective users. Each HA user interface device may be configured to wirelessly communicate with at least one of the HA operation devices. The HA system may also include HA hub devices configured to provide communications for the HA user interface devices and the HA operation devices. A cloud server may be configured to communicate with the HA hub devices, determine a needed maintenance operation for a given one of the HA operation devices, and communicate the needed maintenance operation to the given one of the HA operation devices. The cloud server may also be configured to duplicate communicating the needed maintenance operation to others of the HA operation devices. | 2019-06-20 |
20190190741 | BUILDING AUTOMATION SYSTEM WITH COMMISSIONING DEVICE - An electronic building automation system, comprising multiple electronic building automation devices and a commissioning device. The multiple electronic building automation devices comprising a beacon receiver arranged to receive localizing beacon signals transmitted from multiple beacons installed in the vicinity of the multiple building automation devices. The commissioning device being configured to localize a building automation device using the localization information in a beacon message received from the building automation device to obtain an estimated location of the building automation device to commission the building automation device in the building automation system. | 2019-06-20 |
20190190742 | BUILDING AUTOMATION SYSTEM - Disclosed herein are embodiments of a building automation system. The building automation system includes at least one first appliance device having an actor and/or a sensor. The first appliance device includes a first function module and is configured to operate in accordance with the first function module in order to provide a first function. The building automation system also includes a peer-to-peer network with a peer-to-peer application and a peer-to-peer module assigned to the first appliance device and configured to communicate with the peer-to-peer application. The peer-to-peer application includes a controlling means configured to provide a second function module to the first appliance device by means of the peer-to-peer module assigned to the first appliance device, and the first appliance device is configured to operate in accordance with the second function module in order to provide at least one second function. | 2019-06-20 |
20190190743 | TECHNOLOGIES FOR MONITORING THE PERFORMANCE OF HOME APPLIANCES - Technologies for monitoring the performance of one or more electrical devices at one or more sites include a compute device. The compute device is to obtain data indicative of characteristics of resource usage by a monitored device. The data is usable to identify the monitored device and an operation of the monitored device. The compute device is further to determine, as a function of the identity of monitored device and the operation of the monitored device, an inference indicative of a condition of the monitored device, and send, to another compute device, a notification as a function of the determined inference. Other embodiments are also described and claimed. | 2019-06-20 |
20190190744 | INFORMATION TRANSMISSION NETWORK AND CORRESPONDING NETWORK NODE - The network according to the invention, including functional nodes connected in series by information transmission means, in which the information assumes the form of discrete messages propagating from node to node in the network, is characterized in that the information transmission means between the nodes are bidirectional to allow information to propagate in both circulation directions of the network, and each node includes at least one first and second associated information input/output port, connected by corresponding information transmission means to neighboring nodes and the operation of which is controlled exclusively and sequentially, by means forming a communication automaton, between a mode of operation with asynchronous reception of information from its neighboring nodes and a mode of operation for synchronous transmission of information to its neighboring nodes. | 2019-06-20 |
20190190745 | COMMUNICATION SYSTEM INCLUDING MULTIPLE RING NETWORKS AND ROBOT INCLUDING THE COMMUNICATION SYSTEM - In a communication system including multiple ring networks, each ring network comprises: a host node serving as an upper controller for the other nodes in the own ring network, the host node being configured to be capable of communicating with another ring network; and a switch provided in the ring network and having multiple regular ports and multiple redundant ports, wherein the redundant communication ports of the switch in each ring network are connected to the redundant communication ports of the switch in the other ring network via redundant communication lines. When a communication error is detected in one ring network, the host node of the one ring network controls the switch of the own ring network and the switch of another ring network such that at least one node of the own ring network is incorporated in the other ring network via the switches and the redundant communication lines. | 2019-06-20 |
20190190746 | Controller Based Service Policy Mapping to Establish Different Tunnels for Different Applications - A method implemented by a customer network controller (CNC) in a network comprises storing, by a memory of the CNC, a mapping between a virtual local area network (VLAN) identifier (ID) of a VLAN, an application ID of an application executed in the VLAN, and a service policy associated with the application, the service policy defining a network requirement for the application, the VLAN being associated with a customer edge (CE), transmitting, by a transmitter of the CNC, a tunnel creation request comprising the VLAN ID, the application ID, and the service policy, and storing, by the memory, a tunnel ID of a tunnel established in response to the tunnel creation request, the tunnel defining a path between an ingress provider edge (PE) node and an egress PE node that satisfies the service policy. | 2019-06-20 |
20190190747 | Method and Apparatus for Uplink Transmission and Reception in a Wireless Communication System - Disclosed are a method for transmitting and receiving an uplink in a wireless communication system and an apparatus therefore. Specifically, a method for uplink transmission by a User Equipment (UE) in a wireless communication system may include: receiving, from a base station, Sounding Reference Signal (SRS) configuration information, wherein the SRS configuration information includes a parameter set for power control of SRS for each SRS resource set and the SRS resource set includes one or more SRS resources; determining a transmission power of the SRS, based on the parameter set for power control of the SRS; and transmitting the SRS to the base station. | 2019-06-20 |
20190190748 | EQUALIZATION FOR TRANSMITTER INPUT BUFFER ARRAY - The present invention relates to data communication techniques and integrated circuit devices. More specifically, embodiments of the present invention provide an input buffer module that utilizes one or more equalization elements. The input buffer module includes an array of inverters arranged in a series. An equalization element is configured in series relative to a segment of the array of inverters. The resistance value of the equalization element is predetermined based on a delay associated with the segment of the array of inverters. There are other embodiments as well. | 2019-06-20 |
20190190749 | ACCELERATING ANTENNA RAMP-DOWN AND RELATED SYSTEMS - Various embodiments relate to accelerating ramp-down of a modulated signal. In one embodiment, an antenna driver signal is defined and asserted to accelerate ramp-down. The accelerating ramp-down driver signal may include a series of sinusoidal-like pulses asserted at a driver output. The sinusoidal-like pulse may be synchronized by phase to a declining antenna current. Signal properties—such as phase, amplitude, delay, shape and frequency—of the sinusoidal-like pulse may be adopted to affect the ramp-down of the modulated signal. | 2019-06-20 |
20190190750 | TEST INSTRUMENT FOR TESTING DEVICES INTERNALLY PERFORMING SIGNAL CONVERSIONS - A test instrument measures performance of a transponder without direct access to a line interface of the transponder. The test instrument learns parameters of internal signal conversion processes of the transponder and measures performance of the transponder based on the learned parameters. | 2019-06-20 |
20190190751 | SYSTEM AND METHODS FOR REALISING ADAPTIVE RADIO ACCESS TECHNOLOGY IN 5G WIRELESS COMMUNICATION SYSTEM - An advanced wireless communication system and method for use therein provides adaptive radio access using a plurality of configurable OFDM-based waveforms. The method comprises: receiving, at a UE and on a band-specific fixed system subband, one or more synchronisation signals; determining, at the UE, and according to the synchronisation signals, a base waveform numerology; and receiving, at the UE and according to the base waveform numerology, system information, wherein the system information defines parameters for a service or services. | 2019-06-20 |
20190190752 | PHYSICAL LAYER SHORT FEEDBACK - Apparatuses, computer readable media, and methods for physical layer short feedback. An apparatus of a high efficiency (HE) station is disclosed. The apparatus comprising circuitry configured to: decode a trigger frame for short feedback, the trigger frame comprising an indication of a resource unit (RU) to respond to a short feedback request, where the RU comprises one or more tones and one or more symbols. The circuitry may be further configured to encode a short feedback response to the short feedback request on the RU, where each of the one or more tones of the RU is to be encoded with one or more of: a positive signal, a negative signal, and no signal. The circuitry may be further configured to configure the HE station to transmit the short feedback response to an access point in accordance with orthogonal frequency division multiple access (OFDMA) using resources of the RU. | 2019-06-20 |
20190190753 | METHODS FOR CONFIGURABLE NON-ORTHOGONAL MULTIPLE ACCESS TRANSMISSION - Aspects of the present disclosure provide a scheme for generating a multiple access (MA) signal that include mapping each of at least one stream of bits to generate a set of modulated symbols and transmitting the set of modulated symbols. The spreading signatures that are selected to map the at least one stream of bits are selected, at least in part, based on a set of compatibility rules. The spreading involves mapping each stream of bits using a respective spreading signature from a set of spreading signatures to generate a respective set of modulated symbols, wherein real spreading signature components of the spreading signatures are orthogonal to each other and imaginary spreading signature components of the spreading signatures are orthogonal to each other. | 2019-06-20 |
20190190754 | METHOD FOR TRANSMITTING AND RECEIVING SIGNAL IN WLAN SYSTEM AND DEVICE THEREFOR - The present specification discloses a method for transmitting and receiving a signal in a WLAN system, by a station, and a device therefor. More particularly, the present specification discloses, when a station transmits and receives a signal through a channel on which one or two channels are bonded, a method for constituting an enhanced directional multi gigabit (EDMG) short training field (STF) for an orthogonal frequency division multiplexing (OFDM) packet, and transmitting and receiving a signal comprising the constituted EDMG STF field, and a device therefor. | 2019-06-20 |
20190190755 | TRANSMISSION METHOD, TRANSMITTER APPARATUS, RECEPTION METHOD AND RECEIVER APPARATUS - Transmission quality is improved in an environment in which direct waves dominate in a transmission method for transmitting a plurality of modulated signals from a plurality of antennas at the same time. All data symbols used in data transmission of a modulated signal are precoded by hopping between precoding matrices so that the precoding matrix used to precode each data symbol and the precoding matrices used to precode data symbols that are adjacent to the data symbol in the frequency domain and the time domain all differ. A modulated signal with such data symbols arranged therein is transmitted. | 2019-06-20 |
20190190756 | Distributed Base Station with Frequency Domain Interface on Which Signal Subspace Varies According to Frequency Bin - A method and apparatus are disclosed for determining a signal subspace in a communications system. A remote apparatus obtains signal streams from antenna elements or signal streams from antenna beams. Based on the obtained signal streams, the apparatus selects a signal subspace for a user, the signal subspace having a dimension M. Based on the selected signal subspace, the apparatus transmits, via an interface to a central apparatus, M streams of post-fast-Fourier-transform data, the interface being capable of transmitting a different subspace for different frequency bins. | 2019-06-20 |
20190190757 | TRANSMISSION APPARATUS AND TRANSMISSION METHOD - An transmission apparatus of the present disclosure comprises a transmission signal generator which, in operation, generates a transmission signal that includes a legacy preamble, a non-legacy preamble and a data field, wherein the non-legacy preamble comprises a first signal field and a second signal field, the second signal field comprising a first channel field and a second channel field, each of the first channel field and the second channel field comprising a common field that carries resource unit (RU) allocation information and a user-specific field that carries per-user allocation information for one or more terminal stations, and wherein a part of the user-specific field of one of the first channel field and the second channel field whichever is longer than the other channel field in length before appending padding bits is relocated to the other channel field; and a transmitter which, in operation, transmits the generated transmission signal. | 2019-06-20 |
20190190758 | METHOD FOR RECEIVING NRS AND NB-IOT DEVICE THEREOF - One disclosure of the present specification proposes a method for receiving a Narrowband Reference Signal (NRS) by a Narrow band Internet of Things (NB-IoT) device. The method may comprise receiving the NRS on at least one or more orthogonal frequency division multiplexing (OFDM) symbols. The one or more OFDM symbols are in a time division duplex (TDD) subframe. If the TDD subframe corresponds to a TDD special subframe, the one or more OFDM symbols for receiving the NRS is determined based on which TDD special subframe configuration index among a plurality of TDD special configuration indexes is used by the TDD special subframe. | 2019-06-20 |
20190190759 | METHOD AND DEVICE IN WIRELESS COMMUNICATION SYSTEM THAT SUPPORTS BROADCAST SIGNALS - A method and a device in a User Equipment (UE) and a base station used for wireless communication systems that support broadcast signals. The UE receives a first radio signal on a first time-frequency resource. The first radio signal comprises a first RS sequence, RSs in the first RS sequence are mapped from lower frequency to higher frequency in frequency domain, the first time-frequency resource belongs to a first frequency domain resource. The first frequency domain resource comprises K frequency domain sub-resource(s). (A) Position(s) of the K frequency domain sub-resource(s) in the first frequency domain resource is(are) unfixed, RSs of the first RS sequence in a given frequency domain sub-resource are not related to a position of the given frequency domain sub-resource in the first frequency domain resource. Therefore, the UE is able to correctly receive RSs even without knowing the position of frequency domain resources in the system bandwidth. | 2019-06-20 |
20190190760 | Method and Apparatus for Determining Peak Power, Peak-To-Average Power Ratio - The invention relates to the field of signal processing, and particularly to method and apparatus for determining a peak power, a peak-to-average power ratio. The method for determining the peak power comprises: obtaining a sampling power at a current sampling time; comparing the sampling power at the current sampling time with an estimated peak power at the current sampling time; and when the sampling power at the current sampling time is greater than the estimated peak power at the current sampling time, determining the sampling power at the current sampling time as an actual peak power at the current sampling time. With the present invention, detection efficiency of the peak power is improved, and the peak power can be determined in real time at each sampling time. | 2019-06-20 |