27th week of 2020 patent applcation highlights part 78 |
Patent application number | Title | Published |
20200213043 | HARQ FEEDBACK ON GRANT-LESS UL - In accordance with an example embodiment of the present invention, a method, comprising receiving, by a user equipment, information for configuration with Grant-less Uplink Physical Uplink Shared Channel (GUL PUSCH) resources; attempting to transmit, by the user equipment, Hybrid Automatic Repeat Request (HARQ) feedback on at least one resources; performing a channel access procedure for transmitting Hybrid Automatic Repeat Request Acknowledgement (HARQ-ACK) on the GUL PUSCH resources in response to a determination that the attempting to transmit the HARQ feedback on the at least one resources is unsuccessful; and transmitting HARQ-ACK on the GUL PUSCH resources in response to successfully completing the channel access procedure, is disclosed. | 2020-07-02 |
20200213044 | METHOD AND APPARATUS FOR SENDING HARQ-ACK FEEDBACK CODEBOOK AND DEVICE - This application provides methods and apparatuses for sending a HARQ-ACK feedback codebook. One example method includes detecting DCI in a plurality of time units corresponding to at least one carrier, where a type of the DCI is a first DCI type or a second DCI type, where the first DCI is used to indicate to feed back CBG-level HARQ-ACK information for data scheduled by the first DCI, and where the second DCI is used to indicate to feed back TB-level HARQ-ACK information for data scheduled by the second DCI. A HARQ-ACK feedback codebook is then sent to a network device, where the codebook includes HARQ-ACK information of at least one piece of data scheduled by the DCI, and the HARQ-ACK feedback codebook is determined according to the type of the DCI and a type of the HARQ-ACK feedback codebook. | 2020-07-02 |
20200213045 | METHOD AND APPARATUS FOR CONTROLLING PACKET DUPLICATION - Provided is a method for generating a packet by a user equipment (UE). The method may include: receiving a threshold for packet duplication, from a base station; when a number of duplicated packets for a certain time does not satisfy the threshold for the packet duplication, generating a second packet by duplicating a first packet; and transmitting the generated second packet. | 2020-07-02 |
20200213046 | METHOD AND DEVICE FOR TRANSMITTING UPLINK CONTROL INFORMATION - A method for transmitting uplink control information is provided The method includes receiving a Physical Downlink Shared Channel (PDSCH), determining Physical Uplink Control Channel (PUCCH) resources for feeding back Hybrid Automatic repeat Request Acknowledgement (HARQ-ACK) information of the PDSCH, and transmitting a HARQ-ACK of the PDSCH on the PUCCH resources according to at least one of HARQ-ACK timing information, the time domain duration of scheduling unit in a downlink bandwidth part and an uplink bandwidth part, or PUCCH resource indication information. The embodiments of the application further propose a corresponding user equipment and a corresponding computer storage medium. | 2020-07-02 |
20200213047 | CONTROL CHANNEL PROCESSING LIMITS FOR ASYNCHRONOUS CELLS - The described techniques provide for devices (e.g., a base station, a user equipment (UE)) to determine control channel processing limits for control channels for a CA configuration for a plurality of component carriers (CCs) with mixed numerology and synchronicities (e.g., CCs may have different transmission time interval (TTI) durations, subcarrier spacings, or frame timing). The devices may determine control channel processing limits for numerology groups or synchronization groups of the CA configuration based on a UE capability for processing control channels for a number of CCs, which may be allocated proportionally according to number of cells, allocated equally, or allocated using weighting factors assigned to synchronization or numerology groups. A base station may establish a CA configuration or control channel configuration according to the capability, or may ensure that a per-numerology restraint is not exceeded by determining a combined processing parameter. | 2020-07-02 |
20200213048 | APPARATUS, SYSTEM AND METHOD OF COMMUNICATING A TRANSMISSION ACCORDING TO A SYMBOL BLOCK STRUCTURE AND GUARD INTERVAL (GI) SCHEME - Some demonstrative embodiments include apparatus, system and method of communicating a transmission according to a symbol block structure and Guard Interval (GI) scheme. For example, an apparatus may include logic and circuitry configured to cause a wireless station to generate a plurality of Single Carrier (SC) blocks according to a SC block structure corresponding to a GI type of a plurality of GI types, a SC block of the plurality of SC blocks including a GI followed by a data block, the GI including a Golay sequence having a length based at least on the GI type, a length of the data block is based at least on the GI type; and to transmit a SC transmission over a millimeter Wave (mmWave) frequency band based on the plurality of SC blocks. | 2020-07-02 |
20200213049 | METHOD FOR TRANSMITTING AND RECEIVING REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS FOR THE SAME - A method for transmitting and receiving a Reference Signal in a wireless communication system performed by a UE is disclosed. According to the present invention, a UE receives, from a base station, Downlink Control Information and receives a Demodulation Reference Signal (DMRS) through a plurality of antenna ports based on the Downlink Control Information and downlink data. | 2020-07-02 |
20200213050 | PHASE NOISE PILOT CONFIGURATION, DETERMINATION AND INFORMATION FEEDBACK METHODS AND DEVICES - Provided are phase tracking reference signal (PTRS) configuration, determination and information feedback methods and devices. The PTRS configuration method includes: transmitting, by a first node, the control information to a second node, where the control information is used for indicating a configuration parameter of the PTRS to the second node and the PTRS is transmitted by the first node or the second node. The second node determines the configuration parameter of the PTRS through the control information transmitted by the first node and/or an agreed implicit rule. A third node transmits control information to a fourth node, where the control information is used for feeding received power or quality information of the PTRS back to the fourth node. | 2020-07-02 |
20200213051 | METHOD FOR TRANSMITTING DMRS OF PHYSICAL BROADCAST CHANNEL, NETWORK DEVICE AND TERMINAL - A method for transmitting a DMRS of a physical broadcast channel, a network device and a terminal are provided. The method includes: configuring a demodulation reference signal DMRS sequence of a new radio physical broadcast channel NR-PBCH, where the DMRS sequence is configured to indicate a position relation between a synchronization signal block to which the NR-PBCH belongs and a system frame where the SS block is located; and transmitting the DMRS sequence of the NR-PBCH to a terminal. | 2020-07-02 |
20200213052 | Mobile Communication System, Mobile Device, User Equipment, Network Node, NodeB, Circuits, Apparatuses, Methods, Machine Readable Media and Computer Programs for Mobile Devices, User Equipment, Network Nodes, and NodeBs - Examples provide a mobile communication system, a mobile device, user equipment, a network node, a NodeB, circuits, apparatuses, methods, machine readable media and computer programs for mobile device, user equipment, network nodes, NodeBs. An apparatus ( | 2020-07-02 |
20200213053 | PRECODING AND MULTI-LAYER TRANSMISSION USING REFERENCE SIGNAL RESOURCE SUBSETS - A method performed by a transmitting device is provided. The method includes at least one of: receiving an indication of an aggregation of N reference signal (RS) resources, the N RS resources each comprising a number of RS ports P1 and being selected from a group of M RS resources, N being at least 1, and M being at least 2, Determining a number of RS ports, P2, as a number of RS ports in the aggregation of RS resources, according to the indication of the aggregation of N RS resources, where P2 is greater than or equal to P1, receiving an indication of a precoder to be applied to a physical channel, optionally, the precoder being for use in a P2 port transmission of the physical channel; and transmitting the physical channel using the indicated precoder. Other methods, apparatuses, computer programs are provided. | 2020-07-02 |
20200213054 | METHOD FOR UPLINK TRANSMISSION AND RECEPTION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - Disclosed is a method for uplink transmission and reception in a wireless communication system and an apparatus therefor. Particularly, a method for performing uplink transmission by a user equipment (UE) in a wireless communication system includes: receiving sounding reference signal (SRS) resource configuration information form a base station, in which the SRS resource configuration information includes SRS resource information and association configuration information between a first SRS and a second SRS that is a target of the SRS resource configuration information; and transmitting precoded the second SRS to the base station on an SRS resource indicated by the SRS resource information, and the second SRS may be transmitted based on the precoding applied to the first SRS indicated by the association configuration information. | 2020-07-02 |
20200213055 | UPLINK CHANNEL TRANSMITTING METHOD AND USER DEVICE, AND UPLINK CHANNEL RECEIVING METHOD AND BASE STATION - A first uplink channel and a first uplink reference signal for demodulating the first uplink channel may be transmitted within a first TTI having a predetermined time length. A second uplink channel and a second uplink reference signal for demodulating the second uplink channel may be transmitted within a second TTI having the predetermined time length. The first uplink reference signal may be transmitted in the last symbol among symbols in the first TTI, and the first uplink channel may be transmitted in the symbols remaining after excluding the last symbol of the first TTI from the symbols in the first TTI, and the second uplink reference signal may be transmitted in the first symbol among symbols in the second TTI symbols, and the second uplink channel may be transmitted in the symbols remaining after excluding the first symbol of the second TTI from the symbols in the second TTI. The last symbol of the first TTI and the first symbol of the second TTI may be the same symbol. | 2020-07-02 |
20200213056 | METHOD, DEVICE, AND SYSTEM FOR DETERMINING TRANSMISSION INFORMATION - Provided are a method, a device, and a system for determining transmission information. The method includes determining, by a first node, transmission information according to a predetermined information combination in downlink control information, DCI, transmitted by a second node. The transmission information includes a modulation coding scheme, joint information of a modulation coding scheme and a sub-carrier position, or sub-carrier position information. The predetermined information combination includes one of the following: a combination of a modulation-coding-scheme indicator domain I | 2020-07-02 |
20200213057 | METHODS, APPARATUS, SYSTEMS, ARCHITECTURES AND INTERFACES FOR UPLINK CONTROL INFORMATION (UCI) TRANSMISSION VIA UPLINK SHARED DATA CHANNEL - A method implemented in a transmitter/transceiver, the method including mapping any number of elements of an uplink control information (UCI) signal sequence (SS) to available subcarriers for transmitting an OFDM symbol for carrying information associated with a Physical Uplink Shared Channel (PUSCH), each of the subcarriers having at least two layers, precoding the mapped elements as a function of the layer of the subcarrier to which the elements are mapped, wherein a first precoding applied to a mapped element of a first layer of a subcarrier is different than a second precoding applied to a mapped element of a second layer of the same subcarrier, feeding the mapped elements of the UCI SS to an IDFT unit and transforming the mapped elements into an IDFT transformed signal that includes the mapped elements of the UCI SS carried by a plurality of resources for transmission. | 2020-07-02 |
20200213058 | APPARATUS AND METHOD FOR TRANSMITTING DOWNLINK CONTROL CHANNEL IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a higher data transmission rate beyond a 4th generation (4G) communication system such as long term evolution (LTE). The present disclosure is to transmit a downlink control channel in a wireless communication system. An operation method of a base station comprises the steps of: transmitting information on a configuration of a control channel using a plurality of transmission beams; transmitting control information through the control channel, using the plurality of transmission beams; and transmitting data through a data channel allocated by the control information, using at least one of the plurality of transmission beams. | 2020-07-02 |
20200213059 | Scheduling Request on a Secondary Cell of a Wireless Device - Systems, apparatuses, and methods are described for wireless communications. A wireless device may receive configuration parameters of a plurality of cells. A secondary cell may have configured scheduling request (SR) resources and a primary cell may not have configured SR resources. The wireless device may determine that configured SR resources for the secondary cell are invalid, based on one or more conditions in a time interval. | 2020-07-02 |
20200213060 | TRANSMISSION METHOD AND TRANSMISSION APPARATUS - This application provides a transmission method and a transmission apparatus, so that a receive end can correctly demodulate data. A transmission method may include performing a phase compensation operation of a corresponding frequency value on each of m first signals in k signals, to obtain m second signals, where each of the m first signals is located at a non-center frequency of a current carrier, each first signal is a synchronization signal or data, m and k each are a positive integer, and m≤k. The method may also include performing sending processing on the m second signals. | 2020-07-02 |
20200213061 | METHOD, APPARATUS AND SYSTEM FOR ACK/NACK REPORTING - The objective of the present disclosure is to provide a method, apparatus and system of ACK/NACK reporting for Cat-M mechanism. Here, a user equipment feeds back an ACK/NACK message to an eNB on PUSCH based on received downlink data, wherein when computing the number of resource elements occupied by the ACK/NACK message on PUSCH, the number of OFDM symbols in a guard period is ruled out. This may effectively lower the UE's PUSCH data code rate, and meanwhile enhance the eNB's decoding performance on PUSCH. | 2020-07-02 |
20200213062 | WIRELESS COMMUNICATION DEVICE, WIRELESS COMMUNICATION METHOD, AND WIRELESS COMMUNICATION SYSTEM - [Overview] [Problem to be Solved] To enable achievement of a reduction in power consumption by wireless communication devices, a reduction in impact of interference, and a reduction in the number of base stations at the same time. [Solution] Provided is a wireless communication device including a reception controller that controls reception of a plurality of data frames provided by another device through repeated transmission, the plurality of data frames including the same data, and a transmission controller that controls transmission of a confirmation response signal to the other device on a per-data frame basis, on a per-repeated transmission basis, or both. | 2020-07-02 |
20200213063 | BASE STATION CAPABLE OF ALLOCATING CHANNEL-STATE REPORT AND METHOD FOR ALLOCATING CHANNEL-STATE REPORT - A base station capable of allocating channel status reports includes a memory, a communication module and a processor. The processor is configured to send RRC configuration messages each including a periodic CSI parameter set and a discontinuous reception parameter set to user devices respectively. The periodic CSI parameter set includes a report period, a report time shift and a piece of PUCCH resource information. The RRC configuration messages include the same report period, the same report-time shift and the same PUCCH resource information. The processor is configured to determine one of a plurality of conflicting user devices among the user devices will report a CSI when predicting that the plurality of conflicting user devices will report the CSI simultaneously. The processor is configured to send a sleep instruction to the conflicting user devices except the conflicting user device determined to report the CSI. | 2020-07-02 |
20200213064 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A communication apparatus comprises a generator that generates frequency resource position information corresponding to a first information which is based on the communication quality information received from user equipments, the frequency resource position information indicating validity or invalidity of the first information for each frequency resource, and a transmitter that transmits the first information, the frequency resource position information and a cell ID which the frequency resource position is applied, to another communication apparatus via a backhaul. | 2020-07-02 |
20200213065 | USER TERMINAL AND RADIO COMMUNICATION METHOD - A terminal is disclosed including a receiver that receives configuration information for a downlink bandwidth part (DL BWP), the configuration information including a control resource set (CORESET) configuration and a search space configuration; and a processor that determines a CORESET related to a DL BWP based on the configuration information for the DL BWP, wherein, upon detection of a downlink control information in the CORESET, the receiver receives a physical downlink shared channel (PDSCH) in the DL BWP, based on the configuration information for the DL BWP. In other aspects, a radio communication method for a terminal is also disclosed. | 2020-07-02 |
20200213066 | BANDWIDTH PART CONFIGURATION METHOD, NETWORK DEVICE AND USER EQUIPMENT - A BWP configuration method, a network device and a UE are provided. The BWP configuration method includes: receiving UE capability information carrying BWP capability information reported by a UE; and configuring an air interface parameter set of at least one BWP for the UE in accordance with the UE capability information. The air interface parameter set includes at least one air interface parameter of the BWP. | 2020-07-02 |
20200213067 | Simultaneous Bandwidth Parts Switching - A wireless device receives one or more first radio resource control (RRC) messages. The first RRC messages comprise one or more configuration parameters of a first cell and a second cell. A second RRC message is received. The second RRC message indicates a first change of a first active bandwidth part (BWP) of the first cell. Processing of the second RRC message is completed. A determination is made that the completing occurs during a time duration of a second change of a second active BWP of the second cell. Based on the determining, the first change of the first active BWP is delayed until the second change of the second active BWP is completed. | 2020-07-02 |
20200213068 | METHOD FOR TRANSMITTING OR RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for receiving, by a terminal, downlink control information in a wireless communication system according to one embodiment of the present invention comprises the steps of: receiving information on a reference subcarrier spacing (SCS) from among a plurality of SCS numerologies; receiving downlink control information through a terminal group common physical downlink control channel (PDCCH); and obtaining information on a slot format from the downlink control information, wherein the downlink control information indicates the slot format on the basis of the reference SCS, and when the SCS of the terminal is different from the reference SCS, the terminal may convert the slot format of the reference SCS according to the SCS of the terminal. | 2020-07-02 |
20200213069 | METHOD FOR CONTROLLING BWP, RELEVANT DEVICE AND SYSTEM - The present disclosure provides a method for controlling BWP, a relevant device and a system. The method includes: notifying a UE to activate or deactivate a target BWP by transmitting DCI at least once which includes information of the target BWP for activating or deactivating the target BWP. | 2020-07-02 |
20200213070 | CONTROL INFORMATION SENDING METHOD AND RECEIVING METHOD, BASE STATION, AND TERMINAL - A method of sending control information, a method of receiving control information, a base station, and a terminal are provided. The method of sending control information is applied to a base station and includes: acquiring an index, in a preset DMRS configuration table, of DMRS configuration information of a PDSCH; and sending the index to a terminal through downlink control information. | 2020-07-02 |
20200213071 | METHOD AND DEVICE FOR SERVICE TIME DIVISION MULTIPLEXING - A method and device for transmitting a service are disclosed. A terminal device receives position information of specific radio frames in a time unit, and position information of a specific subframe in each of the specific radio frames in the time unit from a base station. Every 2 | 2020-07-02 |
20200213072 | METHOD AND DEVICE FOR TRANSMITTING AND RECEIVING SIGNAL ON BASIS OF FULL DUPLEX COMMUNICATION - Disclosed are a method and a device for transmitting and receiving a signal, the method including: identifying a downlink signal-only transmission section in which a first electronic device transmits a downlink signal to a second electronic device, and transmitting the signal in the downlink signal-only transmission section; detecting at least one symbol that has a power value relatively higher than a predetermined threshold value; estimating, on the basis of the detected at least one symbol, an interference channel in which a self-interference signal occurs; detecting the self-interference signal; and identifying an FDX transmission section in which an uplink signal is received from the second electronic device and the downlink signal is transmitted simultaneously, and processing transmission of the downlink signal and reception of the uplink signal in the FDX transmission section, wherein the reception of the uplink signal is processed by removing the self-interference signal occurring in the interference channel. | 2020-07-02 |
20200213073 | HIGH-SPEED DECISION DEVICE - The invention relates to a high-speed decision device that comprises a first branch and a second branch that are connected in parallel between a power supply end and a clock signal input end; wherein the first branch is used for providing a normal-phase input end, and the second branch is used for providing an inverted-phase input end; a first adjusting point and a second adjusting point are arranged; and an adjusting branch is arranged between the first adjusting point and the second adjusting point, and the adjusting branch is used for adjusting the response speed when the clock signal changes. The benefit of the invention is that the response time of the circuit is further improved, the resolution of the high-speed decision device is improved, and the clock and data recovery performance of the high-speed decision device is further improved. | 2020-07-02 |
20200213074 | TRANSMISSION APPARATUS AND COMMUNICATION SYSTEM - There is provided a transmission apparatus including a clock signal generator that generates a clock signal and a transmitter that operates on the basis of the clock signal and transmits data in which the clock signal is embedded or a synchronization signal for maintaining CDR synchronization, in which during a period of data transmission, the clock signal generator generates a first clock signal for data transmission and the transmitter transmits data in which the first clock signal is embedded on the basis of the first clock signal, and during a pause period of data transmission, the clock signal generator generates a second clock signal having a frequency lower than that of the first clock signal and the transmitter transmits the synchronization signal on the basis of the second clock signal. | 2020-07-02 |
20200213075 | HIGH PERFORMANCE PHASE LOCKED LOOP - Methods and systems are described for receiving N phases of a local clock signal and M phases of a reference signal, wherein M is an integer greater than or equal to 1 and N is an integer greater than or equal to 2, generating a plurality of partial phase error signals, each partial phase error signal formed at least in part by comparing (i) a respective phase of the M phases of the reference signal to (ii) a respective phase of the N phases of the local clock signal, and generating a composite phase error signal by summing the plurality of partial phase error signals, and responsively adjusting a fixed phase of a local oscillator using the composite phase error signal. | 2020-07-02 |
20200213076 | DATA RECEPTION DEVICE AND DATA TRANSMISSION/RECEPTION DEVICE - A data reception device that can improve communication quality when transmitting/receiving serial data is to be provided. There is provided the data reception device including: a signal generation unit that generates, from serial data received, a first signal whose value is inverted at a rising timing of the serial data and a second signal whose value is inverted at a falling timing of the serial data; and a clock recovery unit that performs clock recovery using the first signal and the second signal generated by the signal generation unit. | 2020-07-02 |
20200213077 | PHASE INTERPOLATOR - A phase interpolator includes a phase adjusting circuit. The phase adjusting circuit includes a first phase adjusting module and a second phase adjusting module, the first phase adjusting module outputs a first clock signal, and the second phase adjusting module outputs a second clock signal; the first phase adjustment module and the second phase adjustment module are connected in parallel to output an interpolation signal. Through the first phase adjustment module and the second phase adjustment module the first clock signal and the second clock signal with the same frequency and different phases are mixed in proportion by adopting a voltage mode to generate an interpolation so as to achieve the purpose of phase adjustment, and meanwhile, the circuit can be carried out under lower voltage, so that the power consumption of the phase adjusting circuit is further reduced. | 2020-07-02 |
20200213078 | EFFICIENT FREQUENCY DETECTORS FOR CLOCK AND DATA RECOVERY CIRCUITS - A system and method for a frequency detector circuit includes: a transition detector configured to receive a data input and provide a first edge output based on transitions in the data input; a first circuit configured to generate a second edge output; a second circuit configured to generate a third edge output; and a combinational logic configured to output an UP output when at least two of the first edge output, the second edge output, and the third edge output are high and configured to output a DOWN output when the first edge output, the second edge output, and the third edge output are all low. | 2020-07-02 |
20200213079 | Method and Apparatus for Configuring a Reduced Instruction Set Computer Processor Architecture to Execute a Fully Homomorphic Encryption Algorithm - Systems and methods for configuring a reduced instruction set computer processor architecture to execute fully homomorphic encryption (FHE) logic gates as a streaming topology. The method includes parsing sequential FHE logic gate code, transforming the FHE logic gate code into a set of code modules that each have in input and an output that is a function of the input and which do not pass control to other functions, creating a node wrapper around each code module, configuring at least one of the primary processing cores to implement the logic element equivalents of each element in a manner which operates in a streaming mode wherein data streams out of corresponding arithmetic logic units into the main memory and other ones of the plurality arithmetic logic units. | 2020-07-02 |
20200213080 | METHOD FOR SEQUENTIALLY ENCRYPTING AND DECRYPTING DOUBLY LINKED LISTS BASED ON DOUBLE KEY STREAM CIPHERS - A method for sequentially encrypting and decrypting doubly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file. | 2020-07-02 |
20200213081 | METHOD FOR CRYPTOLOGICALLY SECURING AN ADDITIVE PRODUCTION PROCESS - The invention relates to a method for cryptologically securing an additive production process, wherein a data stream ( | 2020-07-02 |
20200213082 | Blockchain Management Platform for Performing Asset Adjustment, Cross Sectional Editing, and Bonding - Aspects of the disclosure relate to processing systems perform dynamic asset adjustment. A computing platform may split a parent element of a stored element chain into sub-elements, containing a fixed parameter and a variable parameter and each linked to the parent element through the stored element chain. The computing platform may determine a change in the variable parameter, resulting in a modified variable parameter. Based on a comparison of the modified variable parameter to a plurality of predetermined discrepancy thresholds, the computing platform may determine a number of quorum approvers for approval of the change to the variable parameter. The computing platform may receive quorum approval inputs corresponding to the number of quorum approvers for the approval of the change to the variable parameter. Based on the plurality of quorum approval inputs received, the computing platform may determine that a quorum approval threshold is satisfied. | 2020-07-02 |
20200213083 | Blockchain Management Platform for Performing Asset Adjustment, Cross Sectional Editing, and Bonding - Aspects of the disclosure relate to processing systems for performing cross-sectional asset editing. A computing platform may receive permission to perform a first subset of event processing steps. The computing platform may delegate permission to an external event processor to perform a second subset of event processing steps and to an external resource management platform to perform a third subset of event processing steps. The computing platform may generate an element chain corresponding to the account. In response to receiving a request to process an event, the computing platform may add a sub-element to the element chain containing a fixed parameter corresponding to an expected value associated with the event and a variable parameter corresponding to an actual value associated with the event. In response to receiving a request to write the actual value to the element chain, the computing platform may modify the variable parameter of the sub-element accordingly. | 2020-07-02 |
20200213084 | METHOD FOR DATA STORAGE, DEVICE, AND COMPUTER READABLE DATA STORAGE MEDIUM - A method for storing data establishes a blockchain network, a plurality of data blocks being stored on nodes of the blockchain network. The plurality of data blocks is stored in batches to form a plurality of data segments according to a preset storage period. Each data segment written to the blockchain network is encrypted and newly added data blocks are synchronized with the data blocks which are not stored in the data segment. The newly added data blocks, together with the data blocks not yet stored as the data segment are stored after the commencement of the storage period. A data storage device is also provided. | 2020-07-02 |
20200213085 | SYSTEMS AND METHODS FOR ADDRESSING SECURITY-RELATED VULNERABILITIES ARISING IN RELATION TO OFF-BLOCKCHAIN CHANNELS IN THE EVENT OF FAILURES IN A NETWORK - A method in accordance with the invention includes: providing to a hub, from an enclave associated with a TEE at a node, an enclave public key; establishing a channel with the hub by broadcasting to a blockchain network a funding transaction which encumbers a digital asset with a first public key, a second public key and a third public key such that the encumbrance of the digital asset may be removed by: 1) both a first signature generated from a first private key corresponding to the first public key and a second signature generated from a second private key corresponding to the second public key; or 2) a third signature, valid for the third public key, the third public key associated with a group; receiving a commitment transaction encrypted with the enclave public key; detecting a failure; and issuing a failsafe activation request to the group using data from the enclave. | 2020-07-02 |
20200213086 | CCTV video data distribution processing device and method thereof - A closed circuit television (CCTV) image data distribution processing apparatus includes a CCTV image data receiver configured to receive CCTV image data from a CCTV camera, an encryption processor configured to perform encryption-processing on the CCTV image data, a data splitter configured to split the CCTV image data into chunk data, an index processor configured to perform index-processing on the chunk data with an index generated through the encryption, and a controller configured to distribute and store the index-processed chunk data in a plurality of storage servers corresponding to corresponding indexes, respectively, or to decode chunk data to restore original CCTV image data when receiving the chunk data stored in the storage server. | 2020-07-02 |
20200213087 | CONSENSUS-BASED VOTING FOR NETWORK MEMBER IDENTIFICATION EMPLOYING BLOCKCHAIN-BASED IDENTITY SIGNATURE MECHANISMS - A communication method and a method for operating the communication network are disclosed. The method includes: obtaining a network identifier (NI) for a first member of the communication network, where the first member is un-validated and associated with a first user; obtaining a vote value regarding the first user from a second user of a second member in the communication network, where the second member is validated; generating a trust score for the NI based on the vote value; and validating the first member, in response to the trust score satisfying a trust score threshold, by inserting a first validated member identity hash block (MIHB) based on the NI into a master blockchain ledger for the communication network. | 2020-07-02 |
20200213088 | CROSS-BLOCKCHAIN INTERACTION METHOD, APPARATUS, SYSTEM, AND ELECTRONIC DEVICE - A subscription request initiated by a blockchain node associated with a first blockchain is received by a cross-blockchain interaction end, where the subscription request includes a subscription condition. A message that satisfies the subscription condition is obtained by the cross-blockchain interaction end and from a publishing client that corresponds to a second blockchain. The message is sent to a subscribing client that corresponds to the blockchain node a from the cross-blockchain interaction end, where the blockchain node calls a first smart contract associated with the first blockchain to trigger a corresponding contract operation based on the message. | 2020-07-02 |
20200213089 | DATA STORAGE METHOD, APPARATUS, SYSTEM AND DEVICE - Computer-implemented methods, non-transitory, computer-readable media, and computer-implemented systems for data storage are provided. A routing relationship between a data block and a data node is established by using a block hash of the data block. A blockchain-type ledger is stored in a distributed manner with a level of granularity of data block. Metadata such as block header information is stored in a coordinator node. The data block or a block body in the data block is stored in the data node. | 2020-07-02 |
20200213090 | MULTI-LAYERED BLOCKCHAIN FOR DIGITAL ASSETS - An item is cryptographically encrypted to create a unique hash-value for the item. From this hash-value, an item can be uniquely identified. The hash-value for the item is stored in a first blockchain. When the item is included in a transaction, a transaction entry is stored in a block of the first blockchain. When an item participates in a group of items, a group of items is formed. The group of items is cryptographically encrypted to create a unique hash-value for the group of items. The hash-value for the group of items may be based on hash-values from the items included in the group of items. From this hash-value the group of items can be uniquely identified. The hash-value for the group of items is stored in a second blockchain that is distinct from the first blockchain. When the group of items is included in a transaction, a transaction entry is stored in a block of a second blockchain. By decrypting hash-values for groups of items, groups of items can be traced back to individual items stored in different blockchains. The mechanism of using multiple blockchains and multiple layers of hashing ensures that data in a group of digital items can not be tampered. | 2020-07-02 |
20200213091 | CIRCUIT AND METHOD FOR OVERCOMING MEMORY BOTTLENECK OF ASIC-RESISTANT CRYPTOGRAPHIC ALGORITHMS - An application-specific integrated circuit (ASIC) and method are provided for executing a memory-hard algorithm requiring reading generated data. A processor or state machine executes one or more steps of the memory-hard algorithm and requests the generated data. At least one specialized circuit is provided for generating the generated data on demand in response to a request for the generated data from the processor. Specific embodiments are applied to memory-hard cryptographic algorithms, including Ethash and Equihash. | 2020-07-02 |
20200213092 | APPARATUS AND METHOD FOR FORGERY PREVENTION OF DIGITAL INFORMATION - Provided are an apparatus and method for forgery prevention of digital information. The apparatus for forgery prevention of digital information includes: a digital information obtaining unit configured to obtain digital information in real time; a seed value generator configured to generate a seed value carrying characteristics of the digital information obtained using the digital information obtaining unit; an information piece generator configured to divide the digital information obtained using the digital information obtaining unit, into continuous information pieces with a sequence; and a hash value generator configured to generate a hash value of a first information piece from the seed value and the first information piece and generate a hash value of a subsequent information piece by using a hash value of a previous information piece and the subsequent information piece as inputs. | 2020-07-02 |
20200213093 | BLOCKCHAIN-TYPE DATA STORAGE - This disclosure relates to blockchain-type storage of receipt data. In one aspect, a method includes obtaining a to-be-stored data record including a first service attribute. Execution information of the to-be-stored data record is determined. A previous data record is obtained from a blockchain-type ledger. The previous data record includes a second service attribute that is the same as the first service attribute. Each data block in the blockchain-type ledger includes a block header and a block body. A hash value of the previous data record is determined. A receipt record is generated. The receipt record includes the hash value of the previous data record and the execution information of the to-be-stored data record. The to-be-stored data record and the receipt record are written into a same block body in the blockchain-type ledger. | 2020-07-02 |
20200213094 | LEDGER VERIFICATION METHOD AND APPARATUS, AND DEVICE - Computer-implemented methods, non-transitory, computer-readable media, and computer-implemented systems for ledger verification are provided. If a user needs to audit or verify a block-chain type ledger, a time service certificate can be used as an anchor to verify a segment of a ledger corresponding to the anchor. Because a timestamp of the segment of the ledger uses the time service certificate as trustworthiness attestation, verification based on the time service certificate can ensure time validity and correctness of the segment of the ledger. | 2020-07-02 |
20200213095 | METHOD AND DEVICE FOR THE COMPUTER AIDED PROCESSING OF A RANDOM BIT PATTERN - A method for the computer-aided processing of a random bit pattern, the random bit pattern being provided in a traceable and secure manner and high flexibility of the random bit pattern being ensured is provided. Embodiments of the invention is advantageous over conventional methods because embodiments of the invention defines, in particular at a first point in time, all degrees of freedom or parameters (e.g., which data source should be used, cryptographic methods for the first cryptographic checksum, number of measurement values, data format of the measurement values, a length of the random bit pattern, a data format of the random bit pattern (32-bit numbers, 64 bit numbers)) for the random bit pattern in the first method data set and/or format data set. In particular, it is no longer possible to freely select the parameters at the second point in time. | 2020-07-02 |
20200213096 | DATA CONVERSION SYSTEMS AND METHODS - In various embodiments, a computer-readable memory medium coupled to a processor is disclosed. The memory medium is configured to store instructions which cause the processor to retrieve a seed value, receive a digital bit stream, receive a digital bit stream, generate a stream of random bits, using the seed value as a seed to a pseudo random number generator (PRNG), wherein the stream of random bits contains at least as many bits as the digital bit stream, shuffle bits of the stream of random bits to create a random bit buffer, generate an obfuscated digital bit stream by applying a first exclusive OR (XOR) to the digital bit stream and the random bit buffer, wherein the obfuscated digital bit stream has the same number of bits as the digital bit stream, and provide the obfuscated digital bit stream to the communications interface. | 2020-07-02 |
20200213097 | SECURE COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND RECORDING MEDIUM | 2020-07-02 |
20200213098 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - [Problem] It is desirable to provide a technology for performing the flexible access control to permit the decoding of secret information exclusively with a specific user in a case where secret splitting is hierarchially executed. [Solution] There is provided an information processing apparatus including a control unit that generates, from a first key with which first data is decodable, a plurality of shares based on the first key in response to a first-key generation request, restores the first key from the shares based on the first key in response to a second-key generation request, encrypts, with the first key, a part of a plurality of shares based on a part or all of the first key as a second key with which second data is decodable, and generates a plurality of shares based on the second key. | 2020-07-02 |
20200213099 | COMPUTER-IMPLEMENTED METHOD OF GENERATING A THRESHOLD VAULT - A method and devices for securely and privately generating a threshold vault address and distributed individual key shares reliant upon individually selected polynomial functions, without revealing the key shares and without ever reconstructing the private key. A digital asset stored at the threshold vault address may be used as an input to a transaction through generating a digital signature corresponding to the threshold vault address. Methods and devices are described for collaboratively generating the digital signature without reconstructing the private key or revealing individual key shares. Methods and devices are described for refreshing the distributed private key shares. | 2020-07-02 |
20200213100 | MULTI-CHAIN INFORMATION MANAGEMENT METHOD, STORAGE MEDIUM AND BLOCKCHAIN IDENTITY PARSER - In the present disclosure, it is provided a multi-chain information management method, apparatus, storage medium, and blockchain identity parser, including: acquiring application information submitted by a user, where the application information includes identity information; creating a management account for the user according to the application information and generating account information of the management account; acquiring account information of a blockchain account of the user corresponding to the identity information in a blockchain; and storing the account information of the blockchain account and the account information of the management account in a correlated manner, enabling the user to manage the blockchain account according to the management account. The present disclosure can facilitate the user to manage the account information in multiple blockchains, reduce the burden of the user to memorize the account information on each blockchain, and improve the efficiency of the operation of the user to multiple blockchains. | 2020-07-02 |
20200213101 | SYSTEM AND METHOD FOR SECURELY CONFIGURING A NEW DEVICE WITH NETWORK CREDENTIALS - A system, apparatus, and method for sharing network credentials. One embodiment of a method comprises: establishing a Bluetooth connection between a first Internet of Things (IoT) device and a mobile device of a first user having an IoT app installed, the mobile device to couple the first IoT device to an IoT service; receiving a request from a user from the mobile device to configure the first IoT device using network credentials from a second IoT device, the second IoT device registered with an account of the user on the IoT service and configured to connect to a secure network of the user with the network credentials; establishing a communication channel between the first IoT device and the second IoT device through the IoT service and the mobile device to obtain the network credentials; and using the network credentials at the first IoT device to securely connect to the secure network. | 2020-07-02 |
20200213102 | TECHNIQUES FOR USING LOCAL KEY MANAGEMENT IN A DATA STORAGE SYSTEM - A technique for providing data security for a data storage system using local key management includes in response to connection of an external storage device to a port of the data storage system, retrieving an authentication key encryption key (AKEK) for the data storage system from the external storage device to the data storage system. A random wrapper key (RWK) is generated based on the AKEK and an encrypted random wrapper key (ERWK) for the data storage system (retrieved from a first key repository of the data storage system). The ERWK is retrieved from a first key repository of the data storage system. A master key (retrieved from a second key repository of the data processing system) is decrypted for the data storage system using the RWK. A device access key (DAK) is derived based on the master key. The DAK is used to encrypt/decrypt data for a drive associated with the DAK. | 2020-07-02 |
20200213103 | BLOCKCHAIN TRANSACTION PROCESSING METHOD AND APPARATUS - Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing blockchain transactions. One of the methods includes: obtaining, by a blockchain node of a consortium blockchain network, a blockchain transaction associated with a service; invoking a smart contract corresponding to the service; determining presentation information based on the smart contract and the service, wherein the presentation information is presented to a user through a client device in response to receiving a query from the client device; recording the presentation information into a blockchain transaction log based on the smart contract; and recording the blockchain transaction and the blockchain transaction log of the blockchain transaction into a blockchain. | 2020-07-02 |
20200213104 | Blockchain Management Platform for Performing Asset Adjustment, Cross Sectional Editing, and Bonding - Aspects of the disclosure relate to processing systems for performing bonding of asset approvers. A computing platform may generate a sub-element based on a parent element, associated with a first list of quorum approvers, in a stored element chain. The computing platform may determine that the sub-element should be associated with a second list of quorum approvers. The computing platform may generate authentication keys for the second list of quorum approvers by generating authentication keys for those included in the second list of quorum approvers that were not included in the first list of quorum approvers, and revoking authentication keys from those included in the first list of quorum approvers that are not included in the second list of quorum approvers. The computing platform may direct a database to store the authentication keys for the second list of quorum approvers and to concatenate authorization keys accordingly. | 2020-07-02 |
20200213105 | Continuous-Variable Quantum Key Distribution Device and Method - This application discloses a continuous-variable quantum key distribution (CV-QKD) device and method. The device includes a light source, a modulation unit, a first random number generator, and a processor, where the processor is configured to obtain a first data sequence based on a preset quantity of modulation format symbols, a distribution probability of each symbol, and a first random number sequence generated by the first random number generator, and obtain a second data sequence based on the first data sequence; and the modulation unit is configured to modulate, based on to the first data sequence, a signal emitted by the light source to output a second optical signal, where the second optical signal does not need to include quantum states with a quantity in an order of magnitude of 2 | 2020-07-02 |
20200213106 | SECURITY SERVICE PROVIDING APPARATUS AND METHOD FOR SUPPORTING LIGHTWEIGHT SECURITY SCHEME - The present invention relates to security service providing apparatus and method for supporting lightweight security which provides lightweight security by using an error coefficient and a hash of a chain block used for time synchronization with the terminal for generation of an encryption key to improve security complexity while securing security for communication with terminals and also securing security for an encryption key through the blockchain. According to the present invention, for security for the communication session between the service providing apparatus and the terminal, the encryption key of the terminal is generated as the hash through the hash algorithm by combining the time difference generated in the time synchronization process with the terminal and the hash generated based on the information related to the encryption key of the other terminal stored in the blockchain to generate a symmetrical encryption key which cannot be inferred and has high security. | 2020-07-02 |
20200213107 | METHOD OF AND DEVICE FOR PERFORMING AUTHENTICATION USING HARDWARE SECURITY MODULE IN ONEM2M ENVIRONMENT - Provided are a method and device for performing authentication using a hardware security module (HSM) in a one machine-to-machine (oneM2M) environment. The method of performing authentication using an HSM in a oneM2M environment includes extracting a symmetric key stored in the HSM using a security application programming interface (API), generating a first value and a second value using the extracted symmetric key, and performing mutual authentication with an M2M enrolment function (MEF) server through transport layer security pre-shared key ciphersuites (TLS-PSK) using the first value and the second value. | 2020-07-02 |
20200213108 | SUPPORTING A FIXED TRANSACTION RATE WITH A VARIABLY-BACKED LOGICAL CRYPTOGRAPHIC KEY - A request to perform a cryptographic operation is received, the request including a first identifier assigned to a key group, the key group comprising a plurality of second identifiers, with the plurality of second identifiers corresponding to a plurality of cryptographic keys. A second identifier is determined, according to a distribution scheme, from the plurality of second identifiers, and the cryptographic operation is performed using a cryptographic key of the plurality of cryptographic keys that corresponds to the second identifier that was determined. | 2020-07-02 |
20200213109 | DEDUPLICATION OF CLIENT ENCRYPTED DATA - Plaintext data is encrypted to produce ciphertext which is transmitted along with a hash of the plaintext data and corresponding metadata comprising an initialization vector and information about the encryption key version used to encrypt the plaintext data to a backend storage system. The encrypted ciphertext is deduplicated at the backend storage system (without first decrypting it) using the hash and stored based upon the metadata. | 2020-07-02 |
20200213110 | Systemized Blockchain Reconciliation in a Hybrid Distributed Network Ecosystem - A method for use in a hybrid network ecosystem comprising an enterprise network and a reconciliation network is presented. The method comprises generating, by at least one first computing node in the enterprise network or the reconciliation network, a first digital facilitator, wherein the first digital facilitator provides one or more parameters for accessing or distributing data on a distributed ledger in the enterprise network, and wherein a private key is used for performing a computing operation, based on the data, in the enterprise network. The method also comprises generating, by the at least one first computing node in the enterprise network or the reconciliation network or at least one second computing node in the enterprise network or the reconciliation network, a second digital facilitator, wherein the second digital facilitator provides the one or more parameters for accessing or distributing the data in the reconciliation network. | 2020-07-02 |
20200213111 | Two-Way Handshake for Key Establishment for Secure Communications - The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device initializes a secure communication session with at least one second device. Initializing the secure communication session includes transmitting an invitation to a secure communication session to the at least one second device. The at least one second device may generate a transmission root key, which may be used to derive a first key for encrypting data transmitted to the first device and a second key for decrypting received data from the first device. The at least one second device may transmit the transmission root key to the first device, which may use the transmission root key to derive a first key to encrypt data transmitted to the at least one second device and a second key to decrypt data received from the at least one second device. | 2020-07-02 |
20200213112 | Tracking Tainted Connection Agents - Methods and systems for tracking tainted connection agents, such as without a trusted central authority, are described herein. During a server outage, a client device may verify that a connection agent is untainted based on a public-key encryption or certificate-based system. If the connection agent is untainted, a server may sign a public key or certificate associated with the connection agent. The server may provide, to the client device, a lease, a public key associated with the server. The connection agent may sign data generated by the client device. The client device may verify a signature of the signed public key, such as based on the public key associated with the server. The client device may verify a signature of the signed data, such as based on the verified public key associated with the connection agent. | 2020-07-02 |
20200213113 | THRESHOLD DIGITAL SIGNATURE METHOD AND SYSTEM - A method of sharing a secret value is disclosed. The method comprises distributing respective first shares of a first secret value, known to a first participant (P | 2020-07-02 |
20200213114 | TOKEN MANAGEMENT LAYER FOR AUTOMATING AUTHENTICATION DURING COMMUNICATION CHANNEL INTERACTIONS - There is provided systems and method for a token management layer for automating authentication during communication channel interactions. A user may contact an organization, such as an online service or payment provider through a first communication channel. During communications with the service provider, the user may provide authentication and/or personal information to step-up the users authentication and identity verification with the service provider. The service provider may provide a token management layer that stores the provided information with a tokenization system and allows the information to be provided for future authentication step-ups when the token is access and/or received. This may be due to additional communications by the user with the service provider, or may occur when the user contacts another service provider that is enrolled with the token management layer. The service provider may also issue other authentication tokens, such as voice authentication. | 2020-07-02 |
20200213115 | TRUST DOMAIN ISOLATION MANAGEMENT IN SECURED EXECUTION ENVIRONMENTS - An established root of trust supports a secure execution environment (SEE) that supports execution of validated software instructions on behalf of trust domains that operate within the SEE to implement functions and to support hardware supported by the IHS. Embodiments support isolated operation of such trust domains within the SEE while avoiding the overhead of isolation within separate software environment enclaves. Signed instructions for the operation of a trust domain are retrieved and authenticated based on a signing token associated with the trust domain. If authenticated, the trust domain is granted access to resources set forth in a privilege policy token linked to the signing token of the trust domain. The privileges assigned to a trust domain may be modified by linking the trust domain's signing token to a new privilege policy token. | 2020-07-02 |
20200213116 | Actively Monitoring Encrypted Traffic by Inspecting Logs | 2020-07-02 |
20200213117 | PRODUCING PROOF OF RECEIPT, EXISTENCE AND OTHER DATA PROVENANCE EVIDENCE - A method of integrating a distributed ledger represented by a blockchain with a distributed storage network (DSN) begins by sending a proof of existence request to the DSN, the proof of existence request including an object name, an object version, a start time and an end time. The method continues by reading the object metadata for the sent object name. The method continues by checking a revision history from object metadata associated with the sent object name to ensure the object existed by the start time through the end time with no deletions and, if the object did not exist by the start time through the end time with no deletions, rejecting the proof of existence request and returning an error response. If the object did exist by the start time on through the end time with no deletions, the method continues by producing and returning an attestation comprising verification information related to the object. | 2020-07-02 |
20200213118 | BLOCKCHAIN-BASED SECURE CREDENTIAL AND TOKEN MANAGEMENT ACROSS MULTIPLE DEVICES - An embodiment herein provides a processor implemented method for blockchain-based secure credential and token management for open identity management that enables a first device to provision at least one additional device to present tokens issued to the first device, that includes i) creating, using a hardware-based cryptographic processor on a first device associated with an end user, a first set of credentials; ii) obtaining and caching at least one attestation token from one or attestation issuing parties, the at least one attestation token is restricted by default to be unusable from any device other than the first device; (iii) providing the at least one attestation token to at least one relying party that is interested in receiving attestations about the end user; and iv) signing a trust record on the blockchain using the first device associated with the end user. | 2020-07-02 |
20200213119 | ENABLING SECURE INTERNET TRANSACTIONS IN AN UNSECURE HOME USING IMMOBILE TOKEN - This specification discloses devices and methods for a security concept that includes an immobile hardware token (e.g., a “wall token” that is fixed within a wall) which ensures that the more sensitive actions of electronic banking (e.g., money transfers of large sums to foreign bank accounts) can only be done from the account owner's home, but not from a remote place. However, other less sensitive (and lower security risk) actions can still be done from anywhere else. In some embodiments, the hardware token includes sensors to ensure that the token is not moved or tampered with, interfaces to provide distance bounding, and a crypto-processor to provide secure authentication. The distance bounding can be used to determine if the authentication device is in close proximity to the hardware token, which can in turn ensure that the authentication device is within the account owner's home. | 2020-07-02 |
20200213120 | MONITORING AND PREVENTING USE OF WEAK CRYPTOGRAPHIC LOGIC - A runtime application self protection (RASP) plug-in monitors for, and prevents, invocation of unacceptably weak cryptographic processing requested by an application. Since the RASP plug-in is linked to the application, the RASP plug-in has access to information regarding an execution state of the application logic, including interaction with shared libraries, to determine what component of the application requests use of unacceptable cryptographic techniques. Such enables owners/operators of an application to easily detect requests for unacceptable cryptographic techniques, even if such requests originate in a portion of the application that is not under the control of the owners/operators. | 2020-07-02 |
20200213121 | TOKEN MANAGEMENT SYSTEM AND TOKEN MANAGEMENT METHOD - A token management system includes a generation unit that generates a non-fungible token associated with a product identifier in a distributed ledger, a management unit that associates the non-fungible token with a first public key, and a second public key for licensing processing in the distributed ledge, and a transfer unit that performs transaction processing of changing the first public key associated with the non-fungible token on the basis of a first private key is realized. | 2020-07-02 |
20200213122 | DATA PROTECTION USING SPORADICALLY GENERATED UNIVERSAL TAGS - Universal tags linked to the content of a data file are sporadically/periodically generated for protecting the authenticity of the data file and/or the owner/creator of a digital file. New universal tags are generated by altering one or more keys/seeds used to generate the universal tag. Once a current universal key is generated, the current universal tag is registered on a distributed ledger of at least on distributed trust computing network, thus superseding the registration of a last-in-time/previous universal tag to thereby become the effective validation means for (i) an authenticity of the data file, and/or (ii) the user associated with the data file (e.g., rightful possessor and/or creator of the digital file). | 2020-07-02 |
20200213123 | TRUSTED CLIENT SECURITY FACTOR-BASED AUTHORIZATIONS AT A SERVER - Trusted client security factor-based authorizations at a server. The techniques allow the server to authorize client requested operations to access a protected resource or service based on trusted client security factors that are obtained at client machines and provided to the server. | 2020-07-02 |
20200213124 | DATA PROTECTION USING UNIVERSAL TAGGING - A universal tag linked to the content of a data file for protecting the authenticity of the data file and/or the owner/creator of a digital file. The universal tag is linked to the content in the data file via one or more input keys/seeds that are used to generate the universal tag and rely on data associated with the content. Once generated, the universal tag is registered on a distributed ledger of at least on distributed trust computing network, which acts as a source of truth to validate the universal tag and, as such, validate (i) an authenticity of the data file, and/or (ii) the user associated with the data file (e.g., rightful possessor and/or creator of the digital file). | 2020-07-02 |
20200213125 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD ENABLING SECURE STORAGE OF A LARGE BLOCKCHAIN OVER A PLURALITY OF STORAGE NODES - A protocol is described which: (i) allows storage nodes to be rewarded for maintaining a public blockchain; and (ii) verifies the integrity of the blockchain with the help of a Proof-of-Blockchain Storage (PoBS) scheme. The protocol provides a way to cryptographically check if a data file stored on a remote server is intact using a challenge-response method. The protocol is secured against a man-in-the-middle attack. A malicious peer cannot pass the challenge to a third party which is storing the data and give back the response. The scheme is also publicly verifiable. | 2020-07-02 |
20200213126 | A DRIVER ASSISTANCE APPARATUS AND METHOD - A driver assistance apparatus and method for a driver assistance apparatus for verifying the safe operation of the apparatus. It is important to verify that operating instructions that dictate the operation of a driver assistance system are verified. The apparatus includes a safety electronic control unit and the safety electronic control unit includes operating instructions stored thereon that dictate the operation of the safety electronic control unit. The safety electronic control unit further includes a verified hash storage for storing a verified hash value of at least a portion of the operating instructions. The safety electronic control unit is configured to implement a verification routine, which includes calculating, using a hash function, a test hash value of the at least a portion of the operating instructions; comparing the test hash value with the verified hash value, and if the test hash value is not equal to the verified hash value, performing a safety routine. | 2020-07-02 |
20200213127 | BLOCKCHAIN MANAGEMENT SYSTEM - According to one or more aspects of the present disclosure, operations may include obtaining a token transaction request of a token transaction that includes a transfer of assignment of a crypto-token of a crypto-medium from a first entity to a second entity. The token transaction request may be a request to initiate the token transaction. The operations may further include generating a transaction signature in response to obtaining the token transaction request. The operations may include validating the token transaction using the digital signature and blocks of a private blockchain that includes a blockchain record of all transactions of the crypto-medium. In these or other embodiments, the operations may include generating a new block for the private blockchain, the new block including an update to the blockchain record that indicates the token transaction details. The generating of the new block may be triggered by the token transaction being validated. | 2020-07-02 |
20200213128 | METHOD AND SYSTEM FOR TWO FACTOR AUTHENTICATION FOR BLOCKCHAIN TRANSACTIONS - A method for two factor authentication for a blockchain transaction includes: storing a data pair including a public key of a first cryptographic key pair and an expected data value; receiving a transaction request including a first digital signature, one or more input addresses, one or more output addresses, and at least one transaction amount; identifying a processed transaction in a sidechain including a destination address and a transaction data value, wherein the destination address is generated using the public key of the first cryptographic key pair; performing a first authentication by validating the first digital signature using the public key of the first cryptographic key pair; performing a second authentication by validating the transaction data value using the expected data value; and transmitting the received transaction request to a plurality of other nodes in a blockchain network. | 2020-07-02 |
20200213129 | AUTHENTICATING A USER AND REGISTERING A WEARABLE DEVICE - An authentication request including at least one of a user identifier and a wearable device identifier of a user is received at a server from a terminal. The server stores a relationship between the user identifier, the wearable device identifier, and a server authentication key. Downlink authentication information is acquired by the server. A detection instruction including the downlink authentication information and the wearable device identifier is issued to the terminal. A detection acknowledgment returned by the terminal is received by the server. The detection acknowledgment includes uplink authentication information generated by a wearable device designated in the detection instruction, according to a device authentication key and the downlink authentication information. The device authentication key is the same as, or corresponds to, the server authentication key. The user is authenticated by the server, including matching the downlink authentication information with the uplink authentication information by using the server authentication key. | 2020-07-02 |
20200213130 | RING SIGNATURE-BASED ANONYMOUS TRANSACTION - This disclosure relates to anonymous transactions based on ring signatures. In one aspect, a method includes receiving a remittance transaction. The remittance transaction is generated by a client device of a remitter by assembling unspent assets in an account corresponding to the remitter and masked assets in an account corresponding to a masked participant. Key images are obtained from a linkable spontaneous anonymous group (LSAG) signature of the remittance transaction. Values of the key-images are based on a private key, a public key, and unspent assets of the remitter. The LSAG signature is verified. The LSAG signature is generated by the client device of the remitter based on the private key and the public key of the remitter, and a second public key of the masked participant. The remittance transaction is executed when a transaction execution condition is met. | 2020-07-02 |
20200213131 | MULTIPLE AUTHORIZATION MODULES FOR SECURE PRODUCTION AND VERIFICATION - The invention relates to a system of obtaining authorization where there are multiple authorization modules. When an authorization is provided by a module, it is combined with a security token, digital signature or encryption identifying which module provided the authorization. To obtain a full authorization, multiple authorization modules may be required and these modules can be connected in parallel and or in series with each other. | 2020-07-02 |
20200213132 | SYSTEMS AND METHODS OF SECURE PROVENANCE FOR DISTRIBUTED TRANSACTION DATABASES - An electronic resource tracking and storage computer system is provided that communicates with a distributed blockchain computing system that includes multiple computing nodes. The system includes a storage system, a transceiver, and a processing system. The storage system includes an resource repository and transaction repository that stores submitted blockchain transactions. A new resource issuance request is received, and a new resource is added to the resource repository in response. A new blockchain transaction is generated and published to the blockchain. In correspondence with publishing to the blockchain, the transaction storage is updated with information that makes up the blockchain transaction and some information that was not included as part of the blockchain transaction. The transaction storage is updated when the blockchain is determined to have validated the previously submitted blockchain transaction. | 2020-07-02 |
20200213133 | SECURE DEVICE PAIRING - Techniques are disclosed relating to the secure communication of devices. In one embodiment, a first device is configured to perform a pairing operation with a second device to establish a secure communication link between the first device and the second device. The pairing operation includes receiving firmware from the second device to be executed by the first device during communication over the secure communication link, and in response to a successful verification of the firmware, establishing a shared encryption key to be used by the first and second devices during the communication. In some embodiments, the pairing operation includes receiving a digital signature created from a hash value of the firmware and a public key of the second device, and verifying the firmware by extracting the hash value from the digital signature and comparing the extracted hash value with a hash value of the received firmware. | 2020-07-02 |
20200213134 | CONFIDENTIAL BLOCKCHAIN TRANSACTIONS - A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction. | 2020-07-02 |
20200213135 | SYSTEM AND METHOD FOR SECURE MANUFACTURING OF ARTICLES - The claimed subject matter discloses system for securing a process of manufacturing an article, comprising a facility security node located in a manufacturing facility where the article is manufactured, a security server located remotely from the manufacturing facility, said security server communicates with the facility security node and comprises a key generation module configured to generate a certificate authority (CA) private key in a split manner, one share of the CA private key is stored at the security server and another share of the CA private key is stored at the manufacturing facility. The server also comprises a server Multi-Party Computation (MPC) module configured to perform an MPC process with an article MPC module stored at the article, the output of the MPC process is signing the certificate without reconstructing the entire CA private key. | 2020-07-02 |
20200213136 | MONITORING TIME CERTIFICATE GENERATION REQUESTS - Implementations of this specification provide for monitoring time certificate generation requests. An example method performed by a database service that stores data in a blockchain includes, in response to receiving a time certificate generation request, determining a starting block height H | 2020-07-02 |
20200213137 | SYSTEMS AND METHODS FOR MANAGING A COMPROMISED AUTONOMOUS VEHICLE SERVER - Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key. | 2020-07-02 |
20200213138 | PHYSICAL UNCLONABLE FUNCTION WITH NAND MEMORY ARRAY - Various examples described herein are directed to systems and methods for generating data values using a NAND flash array. A memory controller may read a number of memory cells at the NAND flash array using an initial read level to generate a first raw string. The memory controller may determine that a difference between a number of bits from the first raw string having a value of logical zero and a number of bits from the first raw string having a value of logical one is greater than a threshold value and read the number of memory cells using a second read level to generate a second raw string. The memory controller may determine that a difference between a number of bits from the second raw string having a value of logical zero and a number of bits from the second raw string having a value of logical one is not greater than a threshold value and applying a cryptographic function using the second raw string to generate a first PUF value. | 2020-07-02 |
20200213139 | CLASSIFYING COMPARATORS BASED ON COMPARATOR OFFSETS - Various embodiments relate to classifying comparators based on comparator offsets. A method may include applying, via a strobe, a first voltage to each of a first input and a second input of a comparator to generate a number of output signals from the comparator, wherein each output signal has one of a first polarity and a second polarity. The method may further include in response to each of the number of output signals being the first polarity, applying, via a strobe, an external offset voltage having the second polarity to the comparator to generate a second number of output signals. Further, the method may include in response to each of the second number of output signals being the same polarity, identifying the comparator as a reliable comparator. | 2020-07-02 |
20200213140 | KEYLESS ENCRYPTING SCHEMES USING PHYSICAL UNCLONABLE FUNCTION DEVICES - Systems and methods of encrypted communication between a server and client devices using keyless encryption schemes are disclosed. Client devices with arrays of physical-unclonable-function devices respond to challenges from a server. Characteristics of the arrays are stored by the server during a secure enrollment process. Subsequently, the server issues challenges to the clients. The clients derive a ciphertext according to a variable cipher scheme determined using responses to the challenges issued by the server using characteristics of portions of the arrays specified by the challenges. The server and clients may independently determine encryption and decryption procedures using characteristics of the arrays. | 2020-07-02 |
20200213141 | OPTICAL FIBRE ENHANCED POE NETWORK - The present invention relates to a Power over Ethernet system ( | 2020-07-02 |
20200213142 | Power Adapter with Networking - Methods and systems are described for a power adapter. The power adapter may provide power to a computing device. The power adapter may comprise a wireless access point or other communication system. The computing device may be configured to access the wireless access point or other communications systems in the power adapter. | 2020-07-02 |