30th week of 2018 patent applcation highlights part 64 |
Patent application number | Title | Published |
20180212704 | METHOD AND APPARATUS FOR MANAGING A FREQUENCY SPECTRUM IN A WAVELENGTH DIVISION MULTIPLEXING NETWORK - A wavelength division multiplexing, WDM, network comprising an apparatus adapted to manage a frequency spectrum in the wavelength division multiplexing, WDM, network, the apparatus comprising an adjustment unit adapted to adjust a frequency offset between carriers for each individual carrier depending on performance characteristics of the individual carriers. | 2018-07-26 |
20180212705 | OPTICAL NETWORK UNIT REGISTRATION METHOD, APPARATUS, AND SYSTEM - Embodiments of the present invention provide an optical network unit (ONU) registration method, an apparatus, and a system. The ONU registration method includes: scanning, by an ONU port, a downstream wavelength channel, where the ONU port is one of a plurality of ONU ports on an ONU; receiving, by the ONU port, a discovery grant message from an optical line terminal (OLT), where the discovery grant message includes a channel identifier of a downstream wavelength channel on which the discovery grant message is being transmitted; sending, by the ONU port, a register request message to the OLT, where the register request message includes a port number of the ONU port; and receiving, by the ONU port, a register message from the OLT, where the register message includes the port number of the ONU port and an ONU logical identifier allocated by the OLT to the ONU port. | 2018-07-26 |
20180212706 | OPTICAL COMUNICATIONS MODULE LINK, SYSTEMS, AND METHODS - This disclosure describes devices and methods related to multiplexing optical data signals. A method may be disclosed for multiplexing one or more optical data signals. The method may comprise receiving, by a dense wave division multiplexer (DWDM), one or more optical data signals. The method may comprise combining, by the DWDM, the one or more optical data signals. The method may comprise outputting, by the DWDM, the combined one or more optical data signals to one or more wave division multiplexer (WDM). The method may comprise combining, by the one or more WDM, the combined one or more optical data signals and one or more second optical data signals, and outputting an egress optical data signal comprising the combined one or more optical data signals and one or more second optical data signals. | 2018-07-26 |
20180212707 | ROUTE SWITCHING DEVICE, ROUTE SWITCHING SYSTEM, AND ROUTE SWITCHING METHOD - A route switching device includes a first selection section for outputting a first main signal, a second selection section for outputting a first switching command signal, a first transmitter transmitting an inputted signal, a second transmitter, a first receiver, a second receiver, a first monitor for outputting an abnormality notification if an abnormality in a second main signal is detected, and outputting a first switching command notification if second information is included in a second switching command signal, a second monitor, and a third selection section for obtaining a second main signal from a selected receiver. The first selection section and the second selection section switches a selection destination when a first switching command notification is input. The second selection section outputs a switching command signal including second information when an abnormality notification is input. The third selection section switches a selection source when an abnormality notification is input. | 2018-07-26 |
20180212708 | MULTI-CHANNEL OPTICAL MULTIPLEXERS AND DEMULTIPLEXERS, OPTICAL TRANSMITTER, RECEIVER AND TRANSCEIVER COMPRISING THE SAME, AND METHODS OF MAKING AND USING THE SAME - Optical multiplexers, optical demultiplexers, optical modules including the same, and methods of making and using the same are disclosed. The optical multiplexers include first and second structural blocks and a beam combiner. The first and second structural blocks each include at least one mirror and at least one filter, and are configured to combine a plurality of individual optical signals into a multi-channel optical signal. The beam combiner includes one or more mirrors and one or more filters, and is configured to combine the multi-channel optical signals into a further multi-channel optical output signal having the same number of channels as the multi-channel optical signals. The optical demultiplexers are structurally similar to the optical multiplexers, but provide a complementary or reverse function. The present multiplexers and demultiplexers reduce skew and/or accumulation of the geometric error over the channels in the multi-channel optical signal output from the multiplexer or input into the demultiplexer. | 2018-07-26 |
20180212709 | SYSTEM AND METHOD FOR POLARIZATION MULTIPLEXED OPTICAL COMMUNICATIONS - A transmitter modulates a first polarization signal at a wavelength with a first data signal using intensity modulation. The transmitter modulates a second polarization signal at the same wavelength with a second data signal using intensity modulation. The transmitter combines the modulated, polarization signals and generates an output signal. A receiver includes a photodetector that receives the output signal and generates an electrical output signal including components of both modulated, polarization signals. A signal processing circuit implements correlation techniques or matching filters to recover the first and second data signal from the electrical output signal. | 2018-07-26 |
20180212710 | SYSTEM, METHODS, AND APPARATUSES FOR MANAGING DATA RATE FOR CONTROL PLANE OPTIMIZATION - In one aspect, an MME throttles (or otherwise controls) the amount or frequency of UL data that a UE transmits in the control plane, such as by communicating to the UE rate control information (e.g., a throttling factor or throttling delay). For instance, the MME may throttle NAS messages with user data (i.e., NAS Data PDUs) sent using control plane CIoT EPS optimization by adding a throttling factor and/or a throttling delay in a NAS message sent to the UE. | 2018-07-26 |
20180212711 | CHANNEL STATE INFORMATION ACQUISITION IN A WIRELESS COMMUNICATION SYSTEM - This invention presents a method for uplink SRS transmission in MU-MIMO wireless communication systems comprising the BS reserving resources for SRS transmission and multiplexing the reserved resources among neighboring cells and among multiple UEs allocated to the same SRS transmission resource; the BS estimating the CQI of each UE through the uplink channel; and the BS allocating the same resource to a group of UEs to transmit uplink SRSs based on the estimated CQI and the QoS requirement. | 2018-07-26 |
20180212712 | CLOSED LOOP MODULE CONTROL FOR COMMUNICATION - The present invention is directed to communication systems and methods. According to an embodiment, a receiving optical transceiver determines signal quality for signals received from a transmitting optical transceiver. Information related to the signal quality is embedded into back-channel data and sent to the transmitting optical transceiver. The transmitting optical transceiver detects the presence of the back-channel data and adjusts one or more of its operating parameters based on the back-channel data. There are other embodiments as well. | 2018-07-26 |
20180212713 | SYSTEMS AND METHODS TO OPTIMIZE PARTITIONING OF A DATA SEGMENT INTO DATA PACKETS FOR CHANNEL ENCODING - Systems and methods to transmit data over multiple communication channels in parallel with forward error correction. An optimized number is determined to partition a data segment of a given size into the optimized number of original packets of the same size, by reducing the cost of transmitting dummy data added to the original packets due to the partition, the data fields added to communication packets to support decoding, and redundant packets that are expected to be transmitted via a plurality of parallel channels before the termination of the transmission, as well as the computation cost that increases as a function of the number of original packets. Copies of packets are generated by distributing the original packets to the copies as initial packets and generating each subsequent channel-encoded packet by rejecting useless channel-encoded packets in view of packets assumed to have been received prior to the transmission of the subsequent channel-encoded packet. | 2018-07-26 |
20180212714 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - Data communication is performed appropriately. | 2018-07-26 |
20180212715 | METHOD AND DEVICE FOR OPERATING UNDER EXTREMELY LOW SIGNAL-TO-NOISE RATIO - A method and a device are provided for use at one or more links of a communication network along which communications are exchanged under extremely low SNR conditions. The method comprises a step of transmitting an extended communication frame, which comprises a plurality of basic frames, wherein each of the plurality of basic frames included in the extended frame, comprises the same payload as all other basic frames included in the plurality of basic frames. | 2018-07-26 |
20180212716 | PACKET DATA CONVERGENCE PROTOCOL FOR CELLULAR/WIRELESS LOCAL AREA NETWORK AGGREGATION - Apparatuses, systems and methods associated with long term evolution (LTE) and wireless local area network aggregation are disclosed herein. In embodiments, an evolved NodeB (eNB) for requesting feedback from a packet data convergence protocol (PDCP) receiver may include radio frequency (RF) circuitry and baseband circuitry coupled with the RF circuitry. The baseband circuitry may identify a packet data unit (PDU) to be transmitted to the PDCP receiver, the PDCP receiver to aggregate a first group of PDUs transmitted via a LTE link and a second group of PDUs transmitted via a wireless local area network (WLAN) link. The baseband circuitry may further embed, within the PDU, a poll request for a status of aggregation by the PDCP receiver and cause the RF circuitry to transmit the PDU embedded with the poll request to the PDCP receiver. | 2018-07-26 |
20180212717 | BROADCAST SIGNAL TRANSMITTING DEVICE, BROADCAST SIGNAL RECEIVING DEVICE, BROADCAST SIGNAL TRANSMITTING METHOD AND BROADCAST SIGNAL RECEIVING METHOD - The present invention presents a method for transmitting a broadcast signal. The method for transmitting the broadcast signal, according to the present invention, presents a system capable of supporting next-generation hybrid broadcast using a terrestrial broadcast network and the internet network. In addition, presented is an efficient signaling method capable of covering both the terrestrial broadcast network and the internet network in the environment supporting the next-generation hybrid broadcast. | 2018-07-26 |
20180212718 | USER TERMINAL, RADIO BASE STATION AND RADIO COMMUNICATION METHOD - A user terminal is disclosed. The user terminal has a transmitter that transmits uplink control information (UCI) and a processor executes control to transmit at least a part of the UCI by using a specific Physical Uplink Control Channel (PUCCH) format (PF). When the UCI includes multiple periodic channel state information (P-CSI) and multiple Hybrid Automatic Repeat reQuest Acknowledgments (HARQ-ACKs), the processor controls to transmit the UCI by using a resource designated by downlink control information and a second PF having a greater capacity than PF. | 2018-07-26 |
20180212719 | TCP ENHANCEMENTS IN REDUCED RADIO LINK QUALITY CONDITIONS - Performance in a communications system is improved by determining whether an application executing over a data bearer is using transmission control protocol (TCP). A TCP ACK reduction request is received and at least one redundant TCP ACK is filtered out. | 2018-07-26 |
20180212720 | METHOD AND DEVICE FOR PROCESSING HARQ FEEDBACK IN A MOBILE COMMUNICATION SYSTEM - A device and method for handling HARQ feedback in a mobile communication system are disclosed. The HARQ feedback handling method includes: analyzing a control message from a base station to recognize presence of HARQ feedback relationships between downlink carriers and uplink carriers; determining an uplink carrier (a downlink carrier) to support HARQ feedback in response to downlink traffic (uplink traffic) sent through a downlink carrier (an uplink carrier); and sending (receiving) HARQ feedback through the determined uplink carrier (downlink carrier). | 2018-07-26 |
20180212721 | PACKET TRANSMISSION METHOD AND USER EQUIPMENT - The present invention discloses a packet transmission method and user equipment. The method includes: transmitting, by a sending node, multiple packets to a receiving node; receiving multiple acknowledgement packets from the receiving node; after determining, based on the received multiple acknowledgement packets, that a first packet is lost, retransmitting the first packet; and if it is detected that the retransmitted packet is lost, continuously retransmitting, by the sending node, the first packet to the receiving node in a preset time interval for at least twice. According to the solutions of the present invention, the retransmitted packet can be detected and recovered in time after the retransmitted packet is lost, thereby reducing a quantity of times of timeout retransmission, improving a transmission rate, moreover, reducing a packet loss probability of a retransmitted packet, and further reducing a probability of timeout retransmission. | 2018-07-26 |
20180212722 | TELECOMMUNICATIONS APPARATUS AND METHODS - A wireless telecommunications system comprising network infrastructure equipment and a terminal device operable to communicate over a radio interface that supports a downlink channel for conveying a message from the network infrastructure equipment to the terminal device, wherein the network infrastructure equipment is operable to selectively transmit the message with a number of repetitions to enhance the likelihood the terminal device will successfully decode the message, wherein the message is transmitted on radio resources selected by the network infrastructure equipment from a plurality of candidates for radio resources that define a search space for the terminal device to search for the message; wherein the plurality of candidates comprise candidates associated with a number, N, of different repetition levels for the transmission of a message, wherein the different repetition levels correspond with different numbers of repetitions for the transmission of a message; wherein the candidates that define the search space are arranged within a search space grid of radio resources extending in frequency and time, wherein the extension in frequency is sufficient to span a range of frequencies over which the message may be transmitted and the extension in time is sufficient to span a transmission of a message at a highest repetition level associated with the highest number of repetitions; wherein the terminal device comprises a number, M, of message buffers, each message buffer having a size sufficient to store data associated with one message, wherein the number of message buffers M is less than the number of repetition levels N, and wherein the arrangement of candidates defining the search space within the search space grid for the terminal device is determined in dependence on the number of message buffers M for the terminal device and the number of repetition levels N. | 2018-07-26 |
20180212723 | ERROR MONITORING APPARATUS, METHOD, AND RECORDING MEDIUM - In order to enable to estimate whether the bit error occurs steadily or instantaneously, an error monitoring method according to an exemplary aspect of the invention includes: detecting number of error bits of received data per bits whose number is predetermined, comparing the number of error bits with a threshold value which is predetermined, and counting and outputting number of times of continuous occurrence of the comparison result's indicating being large, and number of times of continuous occurrence of the comparison result's indicating being small. | 2018-07-26 |
20180212724 | SYSTEM AND METHOD OF TRACKING AND COMPENSATING FOR FREQUENCY AND TIMING OFFSETS OF MODULATED SIGNALS - According to an embodiment of the present disclosure, a receiver of modulated signals comprises a signal sampling unit configured to sample a signal, a zero-crossing demodulator, and a timing offset tracking unit. The zero-crossing demodulator includes: a zero-crossing counter configured to determine a number of zero crossings for each pulse of the signal, and a symbol selector configured to decode a sequence of pulses as a symbol based on the number of zero crossings in the sequence of pulses. The timing offset tracking unit is configured to: calculate a metric based on an accumulation of the number of zero crossings and corresponding pulse values of the decoded symbol, compare the metric to a predetermined threshold value, and compensate a timing offset of the signal by causing the signal sampling unit to sample the signal at an earlier interval or a later interval in response to the comparison. | 2018-07-26 |
20180212725 | METHOD FOR TRANSMITTING/RECEIVING PPDU IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - The present invention relates to a method for transmitting and receiving a Physical Protocol Data Unit (PPDU) and an apparatus for supporting the same. Particularly, a method for transmitting a Physical Protocol Data Unit (PPDU) performed by an apparatus in a wireless communication system may include generating a High Efficiency-Short Training Field (HE-STF) sequence in a frequency domain throughout a transmission bandwidth of the PPDU and transmitting the PPDU that includes an HE-STF field which is constructed based on the HE-STF sequence, wherein the HE-STF sequence may be mapped to a data tone except a direct current tone and a guard tone, and wherein a non-zero value may be mapped to all data tones that include a tone index which is a multiple of a predetermined value in the data tone. | 2018-07-26 |
20180212726 | METHOD AND DEVICE FOR OPERATING MACHINE TYPE DEVICE IN WIRELESS COMMUNICATION SYSTEM - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method by a terminal for transmitting and receiving a signal in a mobile communication system according to an embodiment of the present disclosure includes receiving at least one of information related to a sequence corresponding to a first reference signal, information related to an antenna port corresponding to the first reference signal, and information related to transmission power corresponding to the first reference signal; and receiving the first reference signal based on at least one of the received information. | 2018-07-26 |
20180212727 | METHODS, APPARATUSES, AND SYSTEMS FOR MULTI-POINT, MULTI-CELL SINGLE-USER BASED MULTIPLE INPUT AND MULTIPLE OUTPUT TRANSMISSIONS - Methods, systems, and storage media for providing multi-cell, multi-point single user (SU) multiple input and multiple output (MIMO) operations are described. In embodiments, an apparatus may receive and process a first set of one or more independent data streams received in a downlink channel from a first transmission point. The apparatus may receive and process a second set of one or more independent data streams received in a downlink channel from a second transmission point. The apparatus may process control information received from the first transmission point or the second transmission point. The control information may include an indication of a quasi co-location assumption to be used for estimating channel characteristics for reception of the first set of one or more independent data streams or the second set of one or more independent data streams. Other embodiments may be described and/or claimed. | 2018-07-26 |
20180212728 | FLEXIBLE COMB-BASED REFERENCE SIGNALS - Multiple-input, multiple-output (MIMO) devices and non-MIMO devices may implement a flexible comb-based design for transmission of reference signals, such as demodulation reference signals (DMRSs). User equipment (UEs) of different ranks may use the flexible comb-based design to transmit the reference signals in a common comb pattern within an allocated bandwidth. UEs using as many antenna ports as combs in the common comb pattern may transmit a different reference signal using a different antenna port over each comb, while UEs using fewer antenna ports than combs may concatenate combs, so that the UEs may transmit a reference signal using a single antenna port over multiple combs. Using the flexible comb-based design, a base station may be capable of better manage inter-cell interference and multiplexing of different rank UEs in shared resource blocks (RBs) may be supported. | 2018-07-26 |
20180212729 | Communication Protocol for Low Energy Communication links - A method comprising, at a mobile station, transmitting a pilot message to a base station in response to determining that no signal has been received at the mobile station within a predetermined time period or that a received signal has been below a predetermined intensity within a predetermined time period, said pilot message comprising a pilot tone sent at reduced bandwidth, and receiving a response from the base station, said response beamsteered towards the receive direction and/or power of the pilot message. | 2018-07-26 |
20180212730 | PILOT ALLOCATION METHOD AND APPARATUS - The present invention discloses a pilot allocation method and apparatus, and relates to the field of wireless communications technologies, so as to resolve a problem that relatively strong pilot interference is generated between users on which MUBF pairing is performed. In the embodiments of the present invention, a base station determines user equipments UEs requiring multi-user beam forming MUBF pairing and to-be-allocated ports, sets a quantity of orthogonal cover codes OCCs according to a quantity of the to-be-allocated ports, and determines a pilot allocation result according to the quantity of the to-be-allocated ports, the quantity of the OCCs, and a quantity of the UEs. The solutions provided in the embodiments of the present invention are applicable to pilot allocation. | 2018-07-26 |
20180212731 | PILOT PATTERNS FOR OFDM SYSTEMS WITH MULTIPLE ANTENNAS - The present invention relates to orthogonal frequency-division multiplexing (OFDM) communication systems with four transmit antennas and one or more receive antennas, and in particular to methods for inserting scattered pilots (SPs) into the transmit signals of such OFDM systems, for estimating channel properties on the basis of the scattered pilots, a multi-antenna OFDM transmitter, and an OFDM receiver. In this context, it is the particular approach of the present invention to keep the same SP pattern like in the single-transmitter case, to partition the pilots into as many subsets as there are transmitters (transmit antennas), and to interleave these subsets both in time and in frequency. In this manner, the granularity of pilots of the same subset is reduced. This offers increased flexibility in designing the scattered pilot patterns and greater accuracy of the estimated channel properties. | 2018-07-26 |
20180212732 | DOWNLINK SIGNAL RECEPTION METHOD, USER EQUIPMENT, DOWNLINK SIGNAL TRANSMISSION METHOD AND BASE STATION - Provided are method and device for transmitting/receiving a downlink signal. A user equipment-specific reference signal (UE-RS) can be transmitted to a user equipment. A downlink control channel and a downlink data channel for the user equipment can share the UE-RS. Antenna port information about a transmission antenna port of the downlink control channel and/or a transmission antenna port of the downlink data channel is provided to the user equipment. The user equipment receives UE-RS(s) corresponding to the antenna port information and thus receives the downlink control channel and the downlink data channel. | 2018-07-26 |
20180212733 | DEMODULATION IN WIRELESS COMMUNICATIONS - A wireless communication device is configured to perform demodulation of device-to-device (D2D) communication signals or LTE uplink signals in a User Equipment. In a transmitter, demodulation reference signal (DMRS) generation circuitry is provided for selective insertion of DMRS signals in resource elements of resource blocks of the signal for transmission using a pattern of resource elements spanning at least one of the resource blocks such that a minimum temporal spacing between consecutive symbols of the demodulation reference signal pattern is less than one slot. In a receiver the DMRS signals are used to perform channel estimation. A user equipment having the DMRS generation circuitry is provided. A computer program product is also provided. Other embodiments may be described and claimed. | 2018-07-26 |
20180212734 | METHOD, APPARATUS, AND DEVICE FOR CONTROL SIGNALING PROCESSING - The invention relates to device-to-device (D2D) communications technologies, and in particular, to a method, apparatus, and device for control signaling processing. A method of receiving a control signaling is applied to a D2D communication process. The method receives, by a second device, a control signaling sent by a first device, where the control signaling carries attribute identification information of service data that the first device needs to send. The method determines, by the second device according to the attribute identification information, whether the service data is data required by the second device. The method receives, by the second device, the service data if the service data is the data required by the second device. The method, apparatus, and device for control signaling processing of the invention are applied to selectively receive or demodulate service data, and reduce reception complexity and power consumption of a receiver user equipment (UE). | 2018-07-26 |
20180212735 | TTI SWITCHING FOR MULTICARRIER HSUPA - It is presented a method for control of Transmission Time Interval (TTI) combinations in multicarrier High Speed Uplink Packet Access (HSUPA). The method is performed in a serving node of a communication network and comprises sending a single High Speed Signalling Control Channel (HS-SCCH) order for TTI switching of a primary Uplink (UL) frequency and for TTI switching of a secondary uplink frequency to a user equipment. It is also presented a serving node, a user equipment, a computer program and a computer program product thereof. | 2018-07-26 |
20180212736 | CONFIGURATION OF NON-UE-SPECIFIC SEARCH SPACE FOR M-PDCCH - This disclosure relates to implementations to support non-UE-specific (i.e. common) and UE-specific search spaces (SS) for M-PDCCH. One implementation relates to a UE comprising RF circuitry to receive, from an eNB, configuration information of one or a plurality of common Search Spaces (CSSs) for M-PDCCH; and baseband circuitry to monitor the one or more configured CSS for M-PDCCH transmissions; wherein the RF circuitry and/or baseband circuitry is adapted to support a reduced bandwidth (BW). Another implementation relates to an eNB comprising RF circuitry to transmit configuration information of a plurality of CSSs for M-PDCCH to one or more UEs supporting a reduced BW, wherein the plurality of CSSs for M-PDCCH are differentiated by “based on functionality”-differentiation that includes the type of use case and/or an EC level of the UE. | 2018-07-26 |
20180212737 | Method for Slicing K-Best Detection in Multiple-Input Multiple-Output Wireless Communications System - In a MIMO detector, a slicing list detection scheme employs a complex plane to represent symbols in an alphabet, in which all decision regions are bounded by either vertical lines or horizontal lines. A K-best scheme accesses the complex plane and an offline-generated lookup table to detect elements of a received vector. At each level, the system prunes all but the K-best candidates from each surviving node through the slicing list detector. | 2018-07-26 |
20180212738 | METHOD FOR TRANSMITTING DATA IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for performing an uplink (UL) multi-user (MU) transmission performed by a station (STA) device in a Wireless LAN (WLAN) system according to an embodiment of the present invention may include receiving a Downlink (DL) MU Physical Protocol Data Unit (PPDU) including a physical preamble and a data field; and where the data field includes at least one Mac Protocol Data Unit (MPDU), where the at least one MPDU includes a trigger frame or a MAC header, where the trigger frame or the MAC header includes trigger information for a UL MU transmission of an ACK (Acknowledge) frame, and performing a UL MU transmission of the ACK frame in response to the DL MU PPDU based on the trigger information. | 2018-07-26 |
20180212739 | METHOD FOR TRANSMITTING AND RECEIVING CHANNEL STATE INFORMATION IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREFOR - A method for a machine type communication (MTC) terminal to report a channel state information (CSI) in a wireless communication system, according to an embodiment of the present invention, comprises the steps of: selecting a set of M downlink subframes as a CSI reference resource for the MTC terminal; measuring a channel quality indicator (CQI) through the CSI reference resource; and transmitting a CSI report including the CQI to a base station through an uplink subframe, wherein the MTC terminal is configured to repeatedly receive an MTC signal by frequency-hopping N sub-bands among a plurality of sub-bands. The number ‘M’ of the downlink subframes to be included in the CSI reference resource is determined on the basis of an upper layer parameter received from the base station. Further, the MTC terminal may measure the CQI on the basis of a cell-specific reference signal (CRS) received through the M downlink subframes selected from a reference downlink subframe located before the uplink subframe. | 2018-07-26 |
20180212740 | METHODS FOR CQI FEEDBACK AND RRM MEASUREMENTS WITH DYNAMIC POWER SHARING AMONG MULTIPLE LAA SCELLS FOR DL-ONLY TRANSMISSION - Described are mechanisms and methods for supporting Channel State Information (CSI) measurement and reporting, and for supporting Radio Resource Management (RRM) measurement and reporting, under License Assisted Access (LAA) with dynamic power sharing. An eNB may comprise one or more processors to generate a maximum number of Component Carriers (CCs) and a number of active CCs to a UE. The eNB may then be operable to process a reported quality rating from the UE and generate a scaled quality rating based upon the reported quality rating, the maximum number of CCs, and the number of active CCs. A UE may comprise one or more processors to process a reference signal transmission from an eNB, to generate an unfiltered reference signal transmission based upon the reference signal transmission, and to calculate a quality rating based upon the unfiltered reference signal transmission. | 2018-07-26 |
20180212741 | Server, Wireless Device, Methods and Computer Programs - A server receives sensor information from a wireless device and provides control signals based on the sensor information to the wireless device for enabling the device to perform a control task. The server receives an estimate of imminent connection state of the wireless device. Upon the state indicating a connection quality parameter to have a quality below a first threshold, the server provides an information package to be sent to the wireless device for enabling the device to perform an increased part of the control task locally at the device. Upon the state indicating the connection quality parameter to have a quality above a second threshold, the server provides an information package to be sent to the wireless device for enabling the device to be relieved from performing at least a part of the control task by the server providing increased aid in performing the control task. | 2018-07-26 |
20180212742 | USER TERMINAL, RADIO BASE STATION AND RADIO COMMUNICATION METHOD - A user terminal is disclosed including a transmitter that communicates with a first cell group (CG) including a first secondary cell (Scell) and transmits uplink control information using an uplink control channel of the first Scell. The user terminal includes a processor that deactivates the first Scell within a predetermined period from a subframe in which a deactivation command for the first Scell is reported or a subframe in which a deactivation timer applied to the first Scell expires. | 2018-07-26 |
20180212743 | Secondary Cell Deactivation in a Wireless Device and a Base Station - A wireless device receives from a base station at least message that comprises configuration parameters of a plurality of cells. The plurality of cells comprises a plurality of secondary cells. The plurality of cells are grouped into a plurality of groups that comprise a primary group comprising a primary cell with a primary control channel, and a secondary group comprising a plurality of secondary cells. The plurality of secondary cells comprise a first secondary cell with a secondary control channel, and a deactivation timer value for a deactivation timer of the first secondary cell. The wireless device keeps the first secondary cell active in response to: the deactivation timer with the deactivation timer value being expired in a subframe, and a secondary cell in the secondary group being activated in the subframe. | 2018-07-26 |
20180212744 | Full-Duplex Mesh Networks - Systems and methods relating to full duplex mesh networks are disclosed. In one embodiment, a mesh network comprising a first base station may be disclosed, the first base station comprising: a first transceiver for transmitting and receiving to and from the first base station on the single frequency band; and a second transceiver for transmitting and receiving to and from a second base station on the single frequency band, each transceiver of each transceiver node performing self-interference cancellation to send and receive full duplex data on the single frequency band at substantially the same time, thereby enabling the creation of a mesh network with at least one transceiver node having both access and backhaul using only the single frequency band. | 2018-07-26 |
20180212745 | Downlink Subframe Shortening in Time-Division Duplex (TDD) Systems - A guard period for switching between uplink and downlink subframes is created by shortening a downlink subframe, i.e., by not transmitting during one or more symbol intervals at the end of the subframe. A grant message includes signaling indicating when a shortened sublimate is being transmitted. An example method is implemented in a receiving node configured to receive data from a transmitting node in subframes having a predetermined number of symbol intervals. In an LTE system, this receiving node may be a UE, and the subframes are downlink subframes. This example method includes determining that a received subframe is to be shortened, relative to the predetermined number of symbol intervals and, in response to this determination, disregarding a last part of the received subframe by disregarding one or more symbols at the end of the received subframe when processing the received subframe. | 2018-07-26 |
20180212746 | METHOD OF DETERMINING A MODE OF OPERATION FOR A WIRELESS TERMINAL - A method of determining a mode of operation for a wireless terminal comprises determining a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal. The method further comprises determining a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. | 2018-07-26 |
20180212747 | Dynamic Adjustment of Wait Time Values - Examples disclosed herein relate to a mechanism for dynamically adjusting wait time values. Some disclosed examples enable transmitting, by a source entity, a request for an action to a target entity. The action may be generated by the source entity. Some examples enable identifying a first wait time value for the source entity that indicates an amount of time that the source entity is allowed to wait for a response from the target entity between the transmission of the request and a timeout state. Some examples may enable dynamically adjusting the first wait time value based on an entity specification of the source or target entity to generate a second wait time value. Some examples may enable allowing the source entity to wait for the response from the target entity for at least the amount of time indicated in the second wait time value. | 2018-07-26 |
20180212748 | Synchronization Error Reduction in Common Public Radio Interface (CPRI) Passive Optical Networks (PONs) - A first apparatus comprises: a processor configured to generate a first synchronization message; a transmitter coupled to the processor and configured to transmit the first synchronization message to a second apparatus at a first wavelength; and a receiver coupled to the processor and configured to receive a second synchronization message from the second apparatus at a second wavelength and in response to the first synchronization message, the first wavelength and the second wavelength are based on a reduction of a latency difference between the second synchronization message and the first synchronization message, and the processor is further configured to calculate a TO between the first apparatus and the second apparatus based on the reduction. | 2018-07-26 |
20180212749 | SYSTEM AND METHOD OF PERFORMING INITIAL TIMING SYNCHRONIZATION OF RECEIVERS OF MODULATED SIGNALS - According to an embodiment of the present disclosure, a receiver of modulated signals comprises a signal mixer, a synchronization detector, and a data demodulator. The signal mixer is configured to perform baseband down-conversion of a signal according to a mixer frequency, the signal including a synchronization header and a data payload. The synchronization detector is configured to: generate a differential signal based on the signal, perform cross-correlation of the differential signal with a reference differential signal to generate a cross-correlation output, and analyze the cross-correlation output to detect an end of the synchronization header. The data demodulator is configured to demodulate the data payload in response to detection of the end of the synchronization header. | 2018-07-26 |
20180212750 | HOMOMORPHIC ENCRYPTION - Systems, methods, and computer-readable storage devices storing instructions for homomorphic encryption via finite ring isomorphisms are provided. An example method includes selecting a polynomial f(x) of exact degree n with small coefficients in a ring F | 2018-07-26 |
20180212751 | End-To-End Secure Operations Using a Query Matrix - Systems and methods for an end-to-end secure operation using a query matrix Q_M having dimensions d×s. Exemplary methods include: extracting a set of term components {T} of the operation using a term generation function; partitioning a range of a keyed hash function H(T) into a set of vectors {c_T}; setting Q_M (j,m)=E(B_j,m) when c_T[j]=m for j=0, . . . , (d−1) and for m=0, . . . , (s−1), E(B_j,m) being a non-zero bitmask corresponding to element T from the set of term components {T} encrypted using a homomorphic encryption scheme E; and setting Q_M (j,m)=E(0) when c_T[j]≠m for j=0, . . . , (d−1) and for m=0, . . . , (s−1), E(0) being a zero bitmask encrypted using the homomorphic encryption scheme E. | 2018-07-26 |
20180212752 | End-To-End Secure Operations from a Natural Language Expression - Systems and methods for an end-to-end secure operation from an expression in natural language. Exemplary methods include: receiving a set of queries from a natural language processor, the set of queries being produced by a method including: getting data schemas associated with a target data source; obtaining the expression in natural language; performing natural language processing on the expression to determine a desired operation; and generating the set of queries using at least one of matching and inference techniques over the desired operation with respect to the data schemas; encrypting the set of queries using a homomorphic encryption technique; providing the encrypted set of queries to a server, the server including the target data source; acquiring encrypted results, the encrypted results being responsive to the encrypted set of queries; and decrypting the encrypted results using a decryption key to produce desired results. | 2018-07-26 |
20180212753 | End-To-End Secure Operations Using a Query Vector - Systems and methods for an end-to-end secure operation using query vector Q_V having size s. Exemplary methods include: extracting a set of term components {T} of the operation using a term generation function; setting Q_V, j=E(B_j) when H(T)=j for j=0, . . . , (s−1), E(B_j) being a non-zero bitmask corresponding to element T from the set of term components {T} encrypted using a homomorphic encryption scheme E; and setting Q_V, j=E(0) when H(T)≠j for j=0, . . . , (s−1), E(0) being a zero bitmask encrypted using the homomorphic encryption scheme E. | 2018-07-26 |
20180212754 | Secure Analytics Using Homomorphic Encryption - Provided are methods and systems for performing a secure analytic over a data source. An example method includes acquiring, by a client, an analytic, at least one analytic parameter associated with the analytic, and an encryption scheme. The encryption scheme can include a public key for encryption and a private key for decryption. The method further includes generating, using the encryption scheme, at least one analytical vector based on the analytic and analytic parameter, and sending the analytical vector and the encryption scheme to at least one server. The method includes extracting, by the at least one server based on the encryption scheme, a set of terms from a data set, and evaluating the analytical vector over the set of terms to obtain an encrypted result. The method further includes sending, by the server, the encrypted result and the error to the client where the encrypted result is decrypted. | 2018-07-26 |
20180212755 | Secure Analytics Using an Encrypted Analytics Matrix - Systems and methods of secure analytics using an encrypted analytics matrix are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a homomorphic analytic matrix; transmitting a processing set to a server system, the processing set including at least the homomorphic analytic matrix and a keyed hashing function; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and the keyed hashing function to evaluate the homomorphic analytic matrix over a datasource. | 2018-07-26 |
20180212756 | Secure Web Browsing via Homomorphic Encryption - Systems and methods for end-to-end encryption of a web browsing process are described herein. A web query is encrypted at a client using a homomorphic encryption scheme. The encrypted query is sent to a server where the encrypted query is evaluated over web content to generate an encrypted response without decrypting the encrypted query and without decrypting the response. The encrypted response is sent to the client where it is decrypted to obtain the results of the query without revealing the query or results to the owner of the web content, an observer, or an attacker. | 2018-07-26 |
20180212757 | Compression and Homomorphic Encryption in Secure Query and Analytics - Systems and methods for end-to-end encryption and compression are described herein. A query is encrypted at a client using a homomorphic encryption scheme. The encrypted query is sent to a server where the encrypted query is evaluated over target data to generate encrypted response without decrypting the encrypted query. The result elements of the encrypted response are grouped, co-located, and compressed, without decrypting the encrypted query or the encrypted response. The compressed encrypted response is sent to the client where it is decrypted and decompressed to obtain the results of the query without revealing the query or results to the owner of the target data, an observer, or an attacker. | 2018-07-26 |
20180212758 | Secure Probabilistic Analytics Using an Encrypted Analytics Matrix - Provided are methods and systems for performing a secure probabilistic analytic using an encrypted analytics matrix. An example method includes acquiring, by a client, an analytic, analytic parameters associated with the analytic, and a homomorphic encryption scheme including a public key for encryption and a private key for decryption. The method further includes generating, using the encryption scheme, an analytic matrix based on the analytic and analytic parameters, and sending the analytic matrix and the encryption scheme to at least one server. The method includes generating, by the server and based on the encryption scheme, set of terms from a data set, evaluating the analytic matrix over the set of terms to obtain an encrypted result, and estimating a probabilistic error of the encrypted result. The method further includes sending, by the server, the encrypted result and the probabilistic error to the client where the encrypted result is decrypted. | 2018-07-26 |
20180212759 | Secure Probabilistic Analytics Using Homomorphic Encryption - An example method for performing a secure probabilistic analytic includes acquiring, by a client, an analytic, at least one analytic parameter associated with the analytic, and an encryption scheme. The encryption scheme can include a public key for encryption and a private key for decryption. The method further includes generating, using the encryption scheme, at least one analytical vector based on the analytic and analytic parameter, and sending the analytical vector and the encryption scheme to at least one server. The method includes generating, by the server based on the encryption scheme, a set of terms from a data set, evaluating the analytical vector over the set of terms to obtain an encrypted result; estimating, by the server, a probabilistic error of the encrypted result; and sending, by the server, the encrypted result and the probabilistic error to the client where the encrypted result is decrypted. | 2018-07-26 |
20180212760 | NESTED ENCLAVE IDENTITY - A nested enclave identity is presented. A nested identity is indicative of one or more possible enclave instantiations according to one or more identity types. Enclave identities may be nested such that a lower level identity type corresponds to a subset of the possible enclave instantiations that a higher level identity type corresponds to. Techniques disclosed include instantiating an enclave with a nested identity at a software interface to an enclave platform, and performing an operation related to the instantiated enclave using the nested identity. | 2018-07-26 |
20180212761 | HARDWARE CIRCUIT TO PERFORM ROUND COMPUTATIONS OF ARX-BASED STREAM CIPHERS - Systems and methods for efficient computation of stream ciphers. An example system for implementing a stream cipher, may comprise: a sub-round computation circuit of a first type configured to perform a subset of transformations of a cipher computation round on a round input state, each transformation of the subset of transformations including at least one of: a bitwise addition operation, a bitwise exclusive disjunction operation, or a bitwise rotation operation. The sub-round computation circuit of the first type may comprise: one or more of sub-round computation circuits of a second type, wherein each sub-round computation circuit of the second type is configured to perform the subset of transformations of the cipher computation round on a respective part of the round input state. | 2018-07-26 |
20180212762 | SECURE INTERNAL USER AUTHENCATION LEVERAGING PUBLIC KEY CRYPTOGRAPHY AND KEY SPLITTING - In a computing system, methods for secure OS level login authentication for internal users to access servers. Some or all servers in a group each utilize a local ID Service for generating and validating a challenge responsive to an OS login request. The challenge is processed in a centralized secure server HSM. Rather than copying individual user public keys to each host in the data center, we need only copy the public key of the HSM to each host in the group. When a user attempts OS level login to a host, it encrypts the challenge using the public key of the HSM and forwards the request for processing in the HSM. There, it decrypts the challenge using the private key in the HSM and re-encrypts the challenge with the public key of the individual user. The user's mobile device, previously registered, is required to complete the authentication process. | 2018-07-26 |
20180212763 | REFRESH OF SHARED CRYPTOGRAPHIC KEYS - One of n≥2 servers, connectable via a network, implements a cryptographic protocol using a secret key K which is shared between the n servers, and includes first and second server compartments. The first is connectable to the network, adapted to implement the cryptographic protocol, and stores a current key share of the secret key K. The second is inaccessible from the network in the operation of the server, stores a set of master keys, and is adapted, for each of successive time periods, to unilaterally generate a new key share of the secret key K and to supply it to the first as the current key share for that time period. The new key share includes a random share of a predetermined value p which is shared between the n servers, and the random share includes a function of the set of master keys. | 2018-07-26 |
20180212764 | Secure Network Coding for Multi-Description Wireless Transmission - Described herein is a method and system for wireless data transmission with network coding which limits encryption operations to a critical set of network coding coefficients in combination with multi-resolution and/or multi-description video coding. Such a method and system achieves hierarchical fidelity levels, robustness against wireless packet loss and efficient security by exploiting the algebraic structure of network coding. | 2018-07-26 |
20180212765 | CONFIDENTIAL INFORMATION SETTING METHOD, CONFIDENTIAL INFORMATION SETTING SYSTEM, AND CONFIDENTIAL INFORMATION SETTING APPARATUS - A confidential information setting apparatus includes: a communication unit that acquires an encryption key and condition information, which is a condition for setting a secret key to a terminal, from a memory unit of a server and acquires a terminal ID, which is an identifier for uniquely identifying the terminal, and the secret key associated with the terminal ID and encrypted from a memory unit of a user apparatus; an encryption processing unit that decrypts the encrypted secret key with the encryption key; and a control unit that judges whether the decrypted secret key can be set to the terminal or not, based on the condition information and sets the secret key to the terminal when a result of the judgment indicates that the secret key can be set to the terminal. | 2018-07-26 |
20180212766 | ASYMMETRIC CONTENT PROTECTION OF LARGE DATASTREAMS - A content protection system includes an encrypter to encrypt fragments of a datastream, each with one of a multiplicity of related encryption keys, so as to require a decrypter to use limited exhaustive key searches to determine the corresponding decryption keys. The encrypter includes a key generator to generate the encryption keys and an individual key encrypter to encrypt each the fragment with its associated encryption key. Each encryption key is a function of a disclosed key and an additional random parameter. | 2018-07-26 |
20180212767 | METHOD OF GENERATING CRYPTOGRAPHIC KEY PAIRS - A method is provided for performing elliptic curve cryptography that reduces the number of required computations to produce, for example, a key pair. The number of computations is reduced by changing how a random nonce used in the computations is selected. In an embodiment, a look-up table is generated having pre-computed scalar values and elliptic curve points. Every time a new pseudo-random value is created for use in the ECDSA, a combination of the look-up table values is used to create multiple intermediate values. One of the multiple intermediate values is randomly chosen as a replacement value for one of the existing table entries. Each time the look-up table is used, multiple entries in the look-up table are updated to new look-up table values as described. In this manner, new randomness is provided in every step to more e□ciently generate the next pseudo-random nonce as a combination of multiple internally stored temporary look-up table values. Alternately, another mathematical group may be used. | 2018-07-26 |
20180212768 | SECURITY SYSTEM AND METHOD FOR INTERNET OF THINGS INFRASTRUCTURE ELEMENTS - A security system and method are provided that manage the security of a plurality of internet of things (IoT) devices that are part of an enterprise infrastructure. The security system and method may use unspoofable tags wherein each unspoofable tag may be assigned to a category of IoT devices and each unspoofable tag may have a security policy rule assigned to the unspoofable tag (and thus the category of IoT devices) so that IoT devices that are part of the enterprise infrastructure are secured by the security policy rule. | 2018-07-26 |
20180212769 | ADDRESSING A TRUSTED EXECUTION ENVIRONMENT - Methods, systems, and devices are described herein for delivering protected data to a trusted execution environment (TrEE) associated with a potentially untrusted requestor. In one aspect, a targeting protocol head may receive a request for protected data from a potentially untrusted requestor associated with a TrEE, and an attestation statement of the TrEE. The targeting protocol head may retrieve the protected data, and obtain a targeting key of the TrEE from, for example, the request in the case of clean room provisioning, or the attestation statement. The targeting protocol head may generate targeted protected data by encrypting the protected data with the targeting key, and provide the targeted protected data to the potentially untrusted requestor, where a private targeting key of the TrEE is required to decrypt the targeted protected data. | 2018-07-26 |
20180212770 | KEY VAULT ENCLAVE - Techniques for implementing a key vault as an enclave are presented. The techniques include securely storing, in a key vault enclave, a key for an encryption system according to a key use policy; sending an vault attestation report of a key vault enclave to a vault client; and performing an operation in the key vault enclave with the key. Some embodiments further include receiving, at the key vault enclave, a client attestation report of the vault client wherein the vault client and key vault enclave are hosted on different native enclave platforms. | 2018-07-26 |
20180212771 | Securely Transferring User Information Between Applications - The present disclosure describes a system, method, and non-transitory computer readable medium for provisioning multiple instances of a secure communication application on multiple devices. A secure communication application on a first device generates a first set of private keys that are associated with the user and a second set of keys that are associated with the secure communication application executing on the first device. The first set of private keys establishes a set of root identifying keys for the user that are identical for all installations of the secure communication application, while the second set of keys will vary from device to device. In this regard, the first set of root identifying keys must be securely transferred from the first device to any subsequent installations of the secure communication application on one or more second devices. This establishes a high degree of trust since each installation of the secure communication application is linked to the first set of root identifying keys and allows the user to send and receive encrypted communications on multiple devices from the same trusted root keys. | 2018-07-26 |
20180212772 | Securely Provisioning an Application With User Information - The present disclosure describes a system, method, and non-transitory computer readable medium for provisioning multiple instances of a secure communication application on multiple devices. A secure communication application on a first device generates a first set of private keys that are associated with the user and a second set of keys that are associated with the secure communication application executing on the first device. The first set of private keys establishes a set of root identifying keys for the user that are identical for all installations of the secure communication application, while the second set of keys will vary from device to device. In this regard, the first set of root identifying keys must be securely transferred from the first device to any subsequent installations of the secure communication application on one or more second devices. This establishes a high degree of trust since each installation of the secure communication application is linked to the first set of root identifying keys and allows the user to send and receive encrypted communications on multiple devices from the same trusted root keys. | 2018-07-26 |
20180212773 | CLOSE PROXIMITY INNER CIRCLE DISCOVERY - Systems, methods, and computer-readable storage media are provided for enabling discovery of a user by a member of an inner circle of the member when the user is in close proximity to the member. An indication is received from a user device indicating members of an inner circle of the user. A private key is sent to the mobile devices of each member of the inner circle. When the user device broadcasts an encrypted identifier, member devices with the private key can decrypt the encrypted identifier, allowing the member to discover that the user is in close proximity The user can also update membership of the inner circle so that only members presently in the inner circle can discover that the user is in close proximity. | 2018-07-26 |
20180212774 | ALIGN SESSION SECURITY FOR CONNECTED SYSTEMS - Granting an aligned secured access to a resource for a client system. A first authentication token and a first validity time period value are received from a first server. The first authentication token includes an authorization for accessing the system resource and the predefined session time. The first authentication token including the predefined session time is sent from the client system to a second server. A second validity period value of a second validity period of a second authentication token for a service provided by the second server to the client system is set equal to the received predefined session time. The second authentication token for the second validity period is sent from the second server to the client system such that an aligned secured access is granted for the client system to the resource. | 2018-07-26 |
20180212775 | Secure Analytics Using Homomorphic and Injective Format-Preserving Encryption - Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors; transmitting the set of homomorphic analytic vectors to a server system; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and a first injective, format-preserving encryption scheme to evaluate the set of homomorphic analytic vectors over a datasource. | 2018-07-26 |
20180212776 | SYSTEM AND METHOD FOR PERFORMING SECURE COMMUNICATIONS - A server and method for providing a content selection is provided. The server receives content targeting parameters and obtains content items from at least one content site based on the content targeting parameters. The server can further identify content descriptors for the content items and generate a first content cluster from a subset of the content items based on the content descriptors. The server can further generate a second content cluster from a second subset of the content items based on the content descriptors and rank the first and the second content clusters in an order of usefulness. The ranking of the content clusters can be based on at least one of an importance of content, a recentness of the content items and a size of the content cluster. | 2018-07-26 |
20180212777 | SYSTEM AND METHOD FOR PERFORMING SECURE COMMUNICATIONS - A server and method for providing a content selection is provided. The server receives content targeting parameters and obtains content items from at least one content site based on the content targeting parameters. The server can further identify content descriptors for the content items and generate a first content cluster from a subset of the content items based on the content descriptors. The server can further generate a second content cluster from a second subset of the content items based on the content descriptors and rank the first and the second content clusters in an order of usefulness. The ranking of the content clusters can be based on at least one of an importance of content, a recentness of the content items and a size of the content cluster. | 2018-07-26 |
20180212778 | ADDRESSING A TRUSTED EXECUTION ENVIRONMENT USING CLEAN ROOM PROVISIONING - Methods, systems, and devices are described herein for delivering protected data to a trusted execution environment (TrEE) associated with an untrusted requestor. In one aspect, a targeting protocol head, or other intermediary between a requestor and a key management system or other store of protected data may register a public encryption key of a TrEE that corresponds to a private encryption key held by the TrEE or a symmetric key of the TrEE. The targeting protocol head may receive a request for protected data from a requestor associated with the TrEE, and retrieve the protected data for example, from a key management system or store of protected data. The targeting protocol head may generate targeted protected data by encrypting the protected data with the public encryption key or symmetric key of the TrEE. The targeting protocol head may then send the targeted protected data to the requestor. | 2018-07-26 |
20180212779 | GENERATING PSEUDO RANDOM NUMBERS FOR QUANTUM COMPUTING SECURE AUTHENTICATION - A generator device being configured for generating pseudo random numbers, the generator device comprising a computing device operable for (i) calculating a first hash chain from an initial hash value (H_ | 2018-07-26 |
20180212780 | CONTROL INTERFACE FOR AUTONOMOUS VEHICLE - A system includes a control computer that is programmed to perform an authentication based on an encryption key, upon being connected to a vehicle communication network. The computer is programmed to control vehicle operation including at least one of propulsion, braking, and steering, upon authentication by a vehicle computer that is physically attached to the communication network. | 2018-07-26 |
20180212781 | SECURED DAISY CHAIN COMMUNICATION - An intermediate servant device connected in a daisy chain configuration with a set of devices is described. The intermediate servant device may be configured to receive, from a previous servant device of the set of servant devices, a request for data, a first response to the request for data, and authentication information for the first response to the request for data. The intermediate servant device may be further configured to generate a second response to the request for data and determine authentication information for the second response based on the authentication information for the first response, the second response, and a key assigned to the intermediate servant device. The intermediate servant device may be further configured to output at least the authentication information for the second response, the first response, and the second response. | 2018-07-26 |
20180212782 | Methods For Digitally Signing An Electronic File And Authentication Method - The invention is a method for digitally signing an electronic file ( | 2018-07-26 |
20180212783 | METHOD AND SYSTEM BLOCKCHAIN VARIANT USING DIGITAL SIGNATURES - A method for using digital signatures for signing blockchain transactions includes: generating a domain key pair comprising a domain private key and a domain public key, wherein the domain public key is signed after generation; receiving a plurality of member public keys, wherein each member public key is received from an associated member of a blockchain network and is a public key in a key pair comprising the member public key and a member private key corresponding to the associated member; signing each member public key using the domain private key; receiving a transaction block from a specific member of the blockchain network, wherein the transaction block includes a plurality of blockchain transaction values and a hash signed using the member private key corresponding to the specific member; signing the received transaction block using the domain private key; and transmitting the signed transaction block. | 2018-07-26 |
20180212784 | METHOD TO SECURE AN APPLICATIVE FUNCTION IN A CLOUD-BASED VIRTUAL SECURE ELEMENT IMPLEMENTATION - The present invention relates to a method to secure an applicative function in a cloud-based virtual secure element implementation, said virtual secure element being intended to be used by a dedicated emulated secure element application to perform said applicative function, said implementation being supported by a user device comprising the emulated secure element application and a local secure element comprising a Public Key Infrastructure applet and by a cloud remote server having an emulated virtual secure element corresponding to the user of the user device, said user device and cloud remote server further respectively having a secure cloud library and a secure cloud front-end. | 2018-07-26 |
20180212785 | SECURE REMOTE USER AUTHENTICATION LEVERAGING PUBLIC KEY CRYPTOGRAPHY AND KEY SPLITTING - An ID service on an app server interacts with a corresponding identity app installed on a user device such as a smart phone. At setup, the ID service receives the user's public key and only a segment of the corresponding private key. A special challenge message is created and partially decrypted using the private key segment on the server side, and then decryption is completed on the client app using the remaining segment(s) of the private key to recover the challenge. A token authenticator based on the result of the decryption is sent back to the identity service, for it to verify validity of the result and, if it is valid, enable secure login without requiring a password. | 2018-07-26 |
20180212786 | CIRCUIT DEVICE, OSCILLATION DEVICE, PHYSICAL QUANTITY MEASURING DEVICE, ELECTRONIC APPARATUS, AND VEHICLE - A circuit device includes an oscillation circuit that generates an oscillation signal by using an oscillator, a processing unit that controls the oscillation circuit, and an interface unit that outputs authentication information to an external device. The authentication information being information based on specific information of the circuit device and is used to authenticate the circuit device. | 2018-07-26 |
20180212787 | OPERATING METHOD OF SEMICONDUCTOR DEVICE PERFORMING INTELLIGENCE NEGOTIATION - Provided are methods of operating a gateway and a server, performing an intelligent negotiation in an Internet of Things (IoT) network. According to an example embodiment, a method of operating the gateway of an IoT system includes receiving status information from at least one of a plurality of end devices included in a local network, determining whether to start a negotiation based on a status of the local network that is analyzed based on the status information, transmitting a negotiation request to an external device, receiving a suggestion corresponding to the negotiation request from the external device, and transmitting a reply indicating whether to accept the suggestion to the external device. | 2018-07-26 |
20180212788 | MULTICAST HELPER TO LINK VIRTUAL EXTENSIBLE LANS - Computerized aspects monitor listening virtual local area network ports for multicast packets from hypervisor virtual machines that meet a multicast group definition, and retrieve source addresses for original hypervisor sources of detected ones of the multicast packets, bind the retrieved addresses to the multicast packets to generate encapsulated packets, and forward the encapsulated packets as user datagram protocol unicast packets to a destination address of a virtual extensible helper daemon defined for a destination hypervisor of a second virtual local area network. The destination address meets the multicast group definition for the first virtual local area network, and the second virtual local area network is geographically remote from and different from the first virtual local area network, and thus the aspects send the first user datagram protocol unicast packet through an internet protocol router to the designated receiving port. | 2018-07-26 |
20180212789 | Communication Method and Storage Medium Storing Communication Program - A communication method includes: connecting the server with a client; receiving a participation request from the client, the participation request including a conference ID; executing a conference process; determining a port number corresponding to the conference ID; transmitting the port number from the server to the conference process; in response to reception of the port number, activating the conference process as a conference server; connecting the server with the conference process; transmitting the participation request from the server to the conference process; in response to reception of the participation request and to transmission of a participation permission to the server, receiving the participation permission; transmitting the participation permission from the server to the client, the participation permission including the port number; in response to reception of the participation permission, connecting the client with the conference process; and performing communication for performing the teleconference between the client and the conference process. | 2018-07-26 |
20180212790 | Data Processing System with Machine Learning Engine to Provide Automated Collaboration Assistance Functions - Aspects of the disclosure relate to implementing and using a data processing system with a machine learning engine to provide automated collaboration assistance functions. A computing platform may receive, from a teleconference hosting computer system, a content stream associated with a teleconference. Responsive to receiving the content stream associated with the teleconference, the computing platform may generate, based on a machine learning dataset, real-time transcript data comprising a real-time textual transcript of the teleconference. The computing platform may receive a request for a summary of the teleconference. Responsive to receiving the request for the summary of the teleconference, the computing platform may generate, based on the real-time transcript data comprising the real-time textual transcript of the teleconference, a summary report of the teleconference. Based on generating the summary report of the teleconference, the computing platform may send the summary report of the teleconference to one or more recipient devices. | 2018-07-26 |
20180212791 | CONTEXTUAL APPLICATION INTERACTIONS WITH CONNECTED DEVICES - Systems and methods for providing contextual interaction with connected devices are described. A mobile device having a display that presents a user interface enabling access to functionalities provided by connected devices. The user interface may be updated as various contextually-related data is received. For example, data representing a current position of the mobile device, such as Bluetooth low energy beacon signals, WiFi signals, and the like, may be monitored. In response to determining that the current position is within a threshold proximity of a first location, the user interface may be updated to emphasize a first location interface corresponding to the first location over interfaces corresponding to other locations. | 2018-07-26 |
20180212792 | METHOD AND SYSTEM FOR SYNCHRONIZATION AND REMOTE CONTROL OF CONTROLLING UNITS - Systems and methods for controlling devices, including controller and actuators are disclosed. Actuators may be devices where remote control of the device or devices is convenient, such as lights, window shades, fans and similar items. In one method, controllers are adapted to send commands from a first controller to an actuator and to a second controller, and from the second controller to the actuator and to the first controller, where the controllers store a state of the actuator as a result of the actuator executing the command. | 2018-07-26 |
20180212793 | COMMISSIONING DEVICE FOR COMMISSIONING INSTALLED BUILDING TECHNOLOGY DEVICES - The invention provides a commissioning device for commissioning building technology devices, in particular operating devices for lighting means, the commissioning device comprising at least one optical sensor, in particular a 3D camera, configured to obtain images containing spatial information of three dimensions and to receive optical communication signals emitted from a building technology device, at least one processing unit configured to process received optical communication signals and to process the spatial images. The at least one processing unit is configured to compute spatial position of the building technology device by processing the produced spatial images and by evaluating the spatial information, wherein the at least one processing unit is configured to process the optical communication signals received from the building technology device in order to obtain information identifying the building technology device, and wherein the at least one processing unit is configured to associate the computed spatial position of the building technology device with the processed visual signals. | 2018-07-26 |
20180212794 | LAYOUT CREATION METHOD AND LIGHT POSITION REGISTRATION SYSTEM - Provided is a layout creation method for creating a layout of apparatuses disposed in a space (such as lighting devices, air conditioners, and switches). The layout creation method includes: obtaining reference coordinates through a portable terminal having a position sensing function; and for each of the apparatuses, obtaining position coordinates corresponding to the apparatus as coordinates relative to the reference coordinates through the portable terminal, and storing the position coordinates on the portable terminal in association with a type of the apparatus. | 2018-07-26 |
20180212795 | DISTRIBUTED FILE SYSTEM USING TORUS NETWORK AND METHOD FOR OPERATING THE SAME - Disclosed herein is a distributed file system using a torus network. The distributed file system includes multiple servers. The location of a master server may be determined to shorten the latency of data input/output. The location of the master server may be determined such that the distance between the master server and a node farthest away from the master server, among nodes, is minimized. When the location of the master server is determined, the characteristics of the torus network and the features of a propagation transmission scheme may be taken into consideration. | 2018-07-26 |
20180212796 | CIRCUIT DEVICE, ELECTRONIC DEVICE, AND CABLE HARNESS - A circuit device includes: a first physical layer circuit to which a first bus compliant with a USB standard is connected; a second physical layer circuit to which a second bus compliant with the USB standard is connected; a processing circuit that performs transfer processing in which a packet received from the first bus via the first physical layer circuit is transferred to the second bus via the second physical layer circuit, and a packet received from the second bus via the second physical layer circuit is transferred to the first bus via the first physical layer circuit; a bus monitor circuit that performs a monitor operation with respect to the first and second buses; and a bus switch circuit that switches on or off a connection between the first bus and the second bus based on a monitor result from the bus monitor circuit. | 2018-07-26 |
20180212797 | BUS SYSTEM, SUBSCRIBER STATION THEREFOR, AND METHOD FOR CONFIGURING A STATIC BUS SYSTEM FOR A DYNAMIC COMMUNICATION - A bus system, a subscriber station, and a method for configuring a static bus system for a dynamic communication are provided. The bus system has at least two subscriber stations, a communications link for connecting the subscriber stations to each other, and at least one device for the dynamic communication between the subscriber stations of the bus system; the subscriber stations and the communications link are developed for the static communication, which is directed to messages to be transmitted on the bus system that are known when the bus system is made available and are configured according to specified transmitters and receivers, and the dynamic communication is directed to messages to be transmitted on the bus system that have become known only after the subscriber stations and the communications link have been made available and are configured according to specified transmitters and receivers. | 2018-07-26 |
20180212798 | Path Detection Method and Apparatus - A path detection method and apparatus, where the method includes generating M virtual extensible local area network (VXLAN) probe packets according to a source User Datagram Protocol (UDP) port number, a destination UDP port number, and a probe identifier when there are multiple equivalent paths between a source VXLAN tunnel endpoint (VTEP) and a destination VTEP, sending the M VXLAN probe packets to the source VTEP to forward the M VXLAN probe packets to the destination VTEP, receiving VXLAN advertisement packets from the source VTEP, the destination VTEP, and intermediate nodes in the multiple equivalent paths according to the M VXLAN probe packets, and detecting, according to the VXLAN advertisement packets, whether a fault occurs in a path of the multiple equivalent paths between the source VTEP and the destination VTEP. | 2018-07-26 |
20180212799 | MULTICARRIER COMMUNICATION SYSTEM AND CHANNEL ESTIMATION METHOD THEREOF - This invention discloses a multicarrier communication system that includes a transmitter equipment and a receiver equipment. According to a timing scheme, the transmitter equipment processes multiple original symbols for transmission on multiple subcarrier channels, and the receiver equipment processes and detects multiple received symbols from the multiple subcarrier channels. During a time frame of data transmission, the initial three of the original symbols for each of the subcarrier channels are three pilot symbols, forming a preamble. The three preambles of every consecutive three of the subcarrier channels form a preamble unit. All the pilot symbols of the preamble unit are expressed as a 3×3 matrix. When the center pilot symbol of the preamble unit is normalized to 1 or j (i.e., the imaginary unit), the matrix is | 2018-07-26 |
20180212800 | OPERATION METHOD OF USER EQUIPMENT IN RELATION TO CSI-RS IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS SUPPORTING THE SAME - The present invention provides an operation method of an user equipment in relation to CSI-RS in a wireless communication system. | 2018-07-26 |
20180212801 | Wireless Receiver For Multiuser Detection Incorporating Residual Estimation Errors - An improved receiver design implements a practical method for modeling users in SIC turbo loop multiuser detection architectures, wherein in each loop unsubtracted estimation errors from previous loops are used to appropriately scale the error covariance matrix for each user, thereby accurately representing the remaining residual interference in the data stream for each desired user. The effect of estimation errors in previous interference cancellation operations is thereby minimized, and symbol estimations in successive turbo loops are improved, for example during multiuser MMSE, multiuser MMSE with interference rejection combining (MMSE-IRC), sample matrix inversion (SMI), or any of their adaptive variants (least mean-square, recursive least square, Kalman filter etc.). The estimated residual symbol energy can be computed per symbol, and then applied to entire data streams, to groups of symbols, or to each symbol separately. | 2018-07-26 |
20180212802 | DOWNLINK CONTROL SIGNALING SENDING METHOD AND DEVICE - The present disclosure provides a downlink control signaling sending method and device. The method includes: determining, by a base station, a first transmission type of a first terminal device and a second transmission type of a second terminal device; and sending demodulation information to the first terminal device according to the first transmission type and the second transmission type by using downlink control signaling, where the demodulation information is used to instruct the first terminal device to demodulate a transmission signal of the first terminal device that is received by the first terminal device. In this way, content of the demodulation information to be sent is specifically determined, so as to effectively resolve a problem that, during pairing at a plurality of layers, when different power ratios are configured on different subbands, a large amount of signaling needs to be consumed for notification to the first terminal device. | 2018-07-26 |
20180212803 | SYSTEM FOR INCREASING BANDWIDTH AVAILABLE FOR DATA COMMUNICATION - System for increasing bandwidth available for data communication is provided. The system ( | 2018-07-26 |