31st week of 2022 patent applcation highlights part 72 |
Patent application number | Title | Published |
20220247540 | Physical Broadcast Channel Design - Briefly, in accordance with one or more embodiments, apparatus of an evolved NodeB (eNB) comprises circuitry to configure one or more parameters for a 5G master information block (xMIB). The xMIB contains at least one of the following parameters: downlink system bandwidth, system frame number (SFN), or configuration for other physical channels, or a combination thereof. The apparatus of the eNB comprises circuitry to transmit the xMIB via a 5G physical broadcast channel (xPBCH) on a predefined resource, the xPBCH comprising a xPBCH. The xPBCH may use a DM-RS based transmission mode, and a beamformed xPBCH may be used for mid band and high band. | 2022-08-04 |
20220247541 | FEEDBACK TECHNIQUES IN WIRELESS COMMUNICATIONS - Methods, systems, and devices for wireless communications are described in which a user equipment (UE) may provide a feedback message to a base station that includes a feedback report that indicates successful or unsuccessful receipt of multiple downlink transmissions, and also includes an indication of a number of unsuccessful receipts that are due to unsuccessful receipt of data channel communications. The indication of the number of unsuccessful receipts of data channel transmissions may be provided as a binary representation of the total number, or may be provided as a quantized value in which each quantized point is associated with a certain number of unsuccessfully received data channel transmissions. | 2022-08-04 |
20220247542 | RESOURCE ACTIVATION METHOD AND APPARATUS, STORAGE MEDIUM AND ELECTRONIC APPARATUS - Provided are a resource activation method and apparatus, a storage medium and an electronic apparatus. The method includes: receiving an activation message transmitted by a network device, the activation message being configured to trigger activation, by a UE, of a downlink semi-persistent resource; and transmitting a response message to the network device after the downlink semi-persistent resource is activated, the response message being configured to indicate that the downlink semi-persistent resource has been activated. | 2022-08-04 |
20220247543 | METHOD AND APPARATUS FOR TRANSMITTING UPLINK SIGNAL IN A COMMUNICATION SYSTEM - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The present application provides a method for transmitting hybrid automatic retransmission request response (HARQ-ACK) comprising: determining a PUCCH resource occupied by transmitting the HARQ-ACK, according to a PRI of the HARQ-ACK in a PDCCH scheduling a PDSCH and an LBT sub-band where a PDCCH resource is located; performing the HARQ-ACK transmission on the PUCCH resource occupied by transmitting the HARQ-ACK according to the PUCCH resource occupied by transmitting the HARQ-ACK. | 2022-08-04 |
20220247544 | METHOD AND DEVICE FOR RECEIVING EHT PPDU ON BASIS OF TONE PLAN IN WIRELESS LAN SYSTEM - Proposed is a method and device for receiving an EHT PPDU on the basis of a tone plan in a wireless LAN system. Specifically, a reception STA receives an EHT PPDU from a transmission STA via a 320 MHz band. The reception STA decodes the EHT PPDU. The EHT PPDU includes a control field and a data field. The control field includes information on a tone plan. The information on the tone plan includes allocation information indicating that a tone plan for the 320 MHz band is configured by four iterations of a tone plan for an 80 MHz band, which is defined in an 802.11ax wireless LAN system. The data field is received via an RU configured based on the allocation information. | 2022-08-04 |
20220247545 | RECEIVING STATE FEEDBACK METHOD AND DEVICE - A receiving state feedback method, comprising: receiving, by a receiving terminal in a Wi-Fi network, data frames simultaneously sent by a transmission terminal in n frequency bands, n>1; generating a feedback information frame according to the receiving states of receiving respective data frames in n frequency bands, the feedback information frame including at least n sets of preset bits, and the n sets of preset bits being used for indicating receiving states of receiving the respective the data frames in the n frequency bands; and sending the feedback information frame to the transmission terminal. | 2022-08-04 |
20220247546 | WAVEFORM CONSTRUCTION USING INTERPOLATION OF DATA POINTS - A method of constructing a waveform from N sampled data captured at N successive points in time, includes, in part, applying the N sampled data, K data at a time, to each of M delayed replicas of a filter that includes K taps so to generate N×M interpolated data. The waveform is then constructed from the N sampled data and the N×M interpolated data. | 2022-08-04 |
20220247547 | LOW POWER EDGE AND DATA SAMPLING - An integrated circuit receiver is disclosed comprising a data receiving circuit responsive to a timing signal to detect a data signal and an edge receiving circuit responsive to the timing signal to detect a transition of the data signal. One of the data or edge receiving circuits comprises an integrating receiver circuit while the other of the data or edge sampling circuits comprises a sampling receiver circuit. | 2022-08-04 |
20220247548 | EFFICIENT DISTRIBUTED PRIVACY-PRESERVING COMPUTATIONS - Aspects of the current subject matter are directed to performing privacy-preserving analytics over sensitive data without sharing plaintext data. According to an aspect, a system includes at least one data processor and at least one memory storing instructions which, when executed by the at least one data processor, result in operations including: receiving, from each of a plurality of clients, a utility score and a partial noise value; performing, based on the received utility scores and the partial noise values, a secure multi-party computation of a privacy-preserving statistic, the performing of the secure multi-party computation of the privacy-preserving statistic further comprising determining a noisy utility score for each data value in a domain of output values and selecting a highest noise utility score from the determined noisy utilities scores; and providing, based on the selected highest utility score, an output value for the privacy-preserving statistic. | 2022-08-04 |
20220247549 | INSTANTANEOUS KEY INVALIDATION IN RESPONSE TO A DETECTED EAVESDROPPER - Instantaneous key invalidation in response to a detected eavesdropper. A quantum computing system that includes a plurality of qubits and a quantum channel uses a quantum key distribution protocol to generate a key. The quantum computing system determines that an eavesdropper has eavesdropped on the quantum channel. In response to determining that the eavesdropper has eavesdropped on the quantum channel, the quantum computing system sends a key-revocation message to a designated destination. | 2022-08-04 |
20220247550 | FULLY HOMOMORPHIC ENCRYPTION FROM ERROR CANCELING SET SYSTEMS - A homomorphic encryption system evaluates homomorphically encrypted data, including receiving ciphertext input homomorphically encrypted from a plaintext input using a set-system including sets having an intersection property. An arithmetic function is evaluated on the ciphertext input to generate a ciphertext output, the arithmetic function including one or more additive gates and one or more multiplicative gates, wherein the evaluating operation generates errors during evaluation of the arithmetic function and the intersection property of the sets cancel out the errors during the evaluating operation. The ciphertext output is transmitted for homomorphic decryption to generate a plaintext result. | 2022-08-04 |
20220247551 | METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELS - Methods and systems are provided for evaluating Machine Learning models in a Machine-Learning-As-A-Service context, whereby the secrecy of the parameters of the Machine Learning models and the privacy of the input data fed to the Machine Learning model are preserved as much as possible, while requiring the exchange between a client and an MLaaS server of as few messages as possible. The provided methods and systems are based on the use of additive homomorphic encryption in the context of Machine Learning models that are equivalent to models that are based on the evaluation of an inner product of on the one hand a vector that is a function of extracted client data and on the other hand a vector of model parameters. In some embodiments the client computes an inner product of extracted client data and a vector of model parameters that are encrypted with an additive homomorphic encryption algorithm. In some embodiments the server computes an inner product of extracted client data that are encrypted with an additive homomorphic encryption algorithm and a vector of model parameters. | 2022-08-04 |
20220247552 | SYSTEM AND METHOD FOR IMPROVING THE EFFICIENCY OF ADVANCED ENCRYPTION STANDARD IN MULTI-PARTY COMPUTATION WITH PRECOMPUTED DATA - A distributed computer network utilizing cryptography that includes one or more processors, wherein the one or more processors are programmed to receive a secret input state and one or more tuples, mask the secret input state with the one or more tuple and utilize a reveal to compute a masked input, compute six multiplications on the masked input, compute multiplication of two secret values to output an intermediate output, mask a third secret value from the intermediate output and reveal the third secret value to compute an interaction, compute a multiparty-computation multiplication with the interaction, and output a final secret value in response to computing the multiparty-computation multiplication. | 2022-08-04 |
20220247553 | CYPHERGENICS-BASED NOTARIZATION BLOCKCHAINS - A method for maintaining a material data blockchain (MDC) is disclosed. The method includes receiving a material data block (MDB), wherein the MDB includes a metadata portion and a payload portion. The method further includes extracting a first sequence from the metadata portion and generating a genomic engagement factor (GEF) based on the sequence, a genomic differentiation object assigned to the creator VDAX, and genomic regulation instructions (GRI) that are maintained by the creator VDAX. The method further includes generating a creator value corresponding to the MDB based on the first GEF and the MDB and digitally signing the MDB with the creator value. The method includes providing the unnotarized MDB to one or more notary cohorts; and receiving a respective notary value from each of the notary cohorts, wherein each notary value is generated using respective GRI and genomic differentiation object maintained by a respective notary. | 2022-08-04 |
20220247554 | TENANT-BASED DATABASE ENCRYPTION - Methods and systems for securing customer data in a multi-tenant database environment are described. A security module running on a database server may generate a private key-public key pair in response to receiving a request to store client data in a database. The security module may then transmit a request to derive a symmetric key to a key server, the request including the generated public key. The key server may derive a symmetric key, using key agreement and a key derivation function, based on the received public key and a private key managed by the key server. The security module may then receive the symmetric key from the key server and encrypt the client data. To facilitate decryption, the public key used to generate the symmetric key and an identifier for the private key managed by the key server may be stored in metadata associated with the client data. | 2022-08-04 |
20220247555 | METHOD FOR SECURING AN EXECUTION OF A LOCAL APPLICATION AND CORRESPONDING FIRST AND SECOND USER DEVICE AND SYSTEM - A method for securing an execution of a local application is provided and includes the steps of requesting, from the first user device, to execute, by the local application, at least one operation; generating, by the first user device, by executing the local application, a first challenge; sending, from the local application, to a second user device, the first challenge and a predetermined identifier relating to an associated key pair; and retrieving, by the second user device, based on the key pair identifier, a private key; generating by the second user device, a first response, by using the first challenge and the private key; and sending from the second user device to the local application, the first response. Other embodiments are disclosed. | 2022-08-04 |
20220247556 | METHOD AND SYSTEM FOR LICENSING AND DELIVERING KEYS FOR SENSORS AND RECEIVERS - A method for licensing a sensor at a central body, a method for licensing a receiver at a central body, a method for providing a list of sensor keys by using a central body, a method for registering a licensed sensor on a licensed receiver and a system for transmitting data from a licensed sensor to a licensed receiver, allow sensors and receivers to be licensed while also simultaneously ensuring secure delivery of the transmission key for communication purposes or for data exchange between the sensors and the receivers. The transmission key can be transmitted in an encrypted matter and there is no need to transmit the transmission key in an unencrypted manner. It is also possible to establish a licensing model for sensors and receivers by virtue of the secure delivery of the transmission key. | 2022-08-04 |
20220247557 | QUANTUM KEY DISTRIBUTION DEVICE CAPABLE OF BEING CONFIGURED WITH MULTIPLE PROTOCOLS - The present invention relates to the field of quantum communication, especially a quantum key distribution device that can be configured with multiple protocols. It uses the simplified Faraday-Michelson interference ring in combination with the intensity modulator to perform timestamp encoding in a chopping manner. The phase modulation is completed with a Sagnac ring device composed of a single-polarization phase modulator, a polarization beam splitter and a Faraday rotator, so as to achieve the purpose of composite encoding and decoding, thus realizing a quantum key distribution device which can be configured with multiple protocols and multiple decoy state schemes. This device can be compatible with multiple protocols including BB84 protocol, the reference frame-independent protocol, the six-state protocol and SARG protocol and is characterized with polarization-independent phase modulation and low system complexity. | 2022-08-04 |
20220247558 | METHOD AND SYSTEM FOR QUANTUM KEY DISTRIBUTION - A system method for quantum key includes providing an initial key in a first data processing device and a second data processing device; providing, in the second data processing device, a quantum signal comprising a plurality of quantum states; determining, in the second data processing device, a plurality of quantum measurement parameters, a raw signal by quantum measuring the plurality of quantum states employing the plurality of quantum measurement parameters; generating with the initial key, in the second data processing device, an encrypted signal; determining, in at least one of the first data processing device and the second data processing device, a reconciled signal from the encrypted signal; determining, in at least one of the first data processing device and the second data processing device, a shared key from the reconciled signal by correcting the first reconciled signal. | 2022-08-04 |
20220247559 | PUF ID AND PUF ID READER - A physically unclonable function (PUF) identifier (ID) includes a random fibrous medium and a frame configured to support the random fibrous medium. According to the present disclosure, it is possible to implement a PUF ID that is inexpensive and excellent in encryption performance, and PUF ID reader that reads the PUF ID. | 2022-08-04 |
20220247560 | KEY-MANAGEMENT FOR ADVANCED METERING INFRASTRUCTURE - A method for replacing an existing key derivation key in a utility meter arranged in a meter communication infrastructure in a secure way. The method provide a secure mechanism for exchange of symmetric keys without the need for transferring keys across the meter communication infrastructure. From the head-end system to the utility meter is transmitted a command data message comprising a request for replacing the existing key derivation key with the new key derivation key, the key-generation information and a activation key or an authentication code calculated based on the activation key. The utility meter receiving the command data message is arranged to derive the new key derivation key based on a copy of a disaster recovery key stored in the utility meter and on the key-generation information comprised in the received command data message. Further, the utility meter is arranged for deriving a activation key from the new key derivation key. The activation key is used for verifying the command data message. If the command data message is verified the existing key derivation key is replaced by a new key derivation key. | 2022-08-04 |
20220247561 | PROCESSOR HARDWARE AND INSTRUCTIONS FOR LATTICE BASED CRYPTOGRAPHY - A method comprises fetching, by fetch circuitry, an encoded butterfly instruction comprising an opcode, a first source identifier, a second source identifier, a third source identifier, and two destination identifiers, decoding, by decode circuitry, the decoded butterfly instruction to generate a decoded butterfly instruction, and executing, by execution circuitry, the decoded butterfly instruction to retrieve operands representing a first input polynomial-coefficient from the first source, a second input polynomial-coefficient from the second source, and a primitive n | 2022-08-04 |
20220247562 | PHYSIMETRIC-BASED DATA SECURITY FOR CODED DISTRIBUTED TEMPERATURE SENSING - Physimetric-based data security for coded distributed temperature sensing (DTS) in which physimetric information is extracted from a coded-DTS interrogator which is unique for each interrogator at each operating run time—and used to reconstruct a final temperature determination from DTS data. The physimetric information includes coded-DTS pulse code and coded-DTS pulse profile information as a key to permit secure sharing with authorized users. The pulse code and pulse profile information are encrypted and made available to an authorized user. The authorized user can then decrypt the pulse code and pulse profile information and subsequently use this key information (pulse profile and pulse code files) to retrieve temperature information from for example, a remote computer providing a continuous raw data feed—without being susceptible to eavesdropping. The pulse profile and pulse code files permit reconstruction of temperature from DTS continuous raw data feed which have no meaningful informational value to an eavesdropper who has no access to the unencrypted pulse profile and pulse code information. | 2022-08-04 |
20220247563 | PARALLEL TOKENIZATION OF DECIMAL INFORMATION IN A DISTRIBUTED NETWORK ENVIRONMENT - Data in various formats can be protected in a distributed tokenization environment. Examples of such formats include date and time data, decimal data, and floating point data. Such data can tokenized by a security device that instantiates a number of tokenization pipelines for parallel tokenization of the data. Characteristics of such data can be used to tokenize the data. For instance, token tables specific to the data format can be used to tokenized the data. Likewise, a type, order, or configuration of the operations within each tokenization pipeline can be selected based on the data format or characteristics of the data format. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The tokenization pipeline outputs are combined, producing tokenized data, which can be provided to a remote system for storage or processing. | 2022-08-04 |
20220247564 | PARALLEL TOKENIZATION OF FLOATING POINT INFORMATION IN A DISTRIBUTED NETWORK ENVIRONMENT - Data in various formats can be protected in a distributed tokenization environment. Examples of such formats include date and time data, decimal data, and floating point data. Such data can tokenized by a security device that instantiates a number of tokenization pipelines for parallel tokenization of the data. Characteristics of such data can be used to tokenize the data. For instance, token tables specific to the data format can be used to tokenized the data. Likewise, a type, order, or configuration of the operations within each tokenization pipeline can be selected based on the data format or characteristics of the data format. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The tokenization pipeline outputs are combined, producing tokenized data, which can be provided to a remote system for storage or processing. | 2022-08-04 |
20220247565 | SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS - Example embodiments of systems and methods for data transmission between a contactless card and a client application are provided. A card key may be generated using a master key and identification number. A first and second session key may be generated using the card key and portions of the. A cryptographic result including the counter may be generated using one or more cryptographic algorithms and the card key. A cryptogram may be generated using the first session key and encrypted using the second session key. The application may be transmit one or more messages to the first applet of the contactless card. The first applet may be configured to establish one or more communication paths to the second applet based on receipt of the one or more messages from the client device. The second applet may be deactivated by the first applet via the one or more communication paths. | 2022-08-04 |
20220247566 | SYSTEM AND METHOD FOR AN IMPROVED CLOUD BASED E-SIGNATURE PLATFORM - A method executed by an engine of a computing device is described. Login credentials are received by the engine from a user via a graphical user interface (GUI) of the computing device. The engine then queries a database to identify a user profile based on the login credentials and grants the user access to a cloud-based electronic signature platform. The user is prompted to upload a document. The engine receives an action from the user on a module of the cloud-based electronic signature platform and executes the action on the document. The module may be: an in-person signing module, a secure documentation module, an e-notarization module, a capture module, a secure documentation transmission module, a fingerprint recognition module, a retina recognition module, and/or a facial recognition module, among others. | 2022-08-04 |
20220247567 | SECURELY TRANSMITTING COMMANDS TO VEHICLE DURING ASSEMBLY - A system includes a control module and a local server. The server is programmed to transmit a command to perform an operation to a plurality of vehicles including a vehicle including the control module. The command including a digital signature that is common across the vehicles. The control module is programmed to receive a temporary value; receive the command; decrypt the digital signature in the command with the temporary value; upon verifying the decrypted digital signature, perform the operation; and upon a metric incrementing to a threshold value, prevent decryption of the digital signature with the temporary value. | 2022-08-04 |
20220247568 | DATA STORAGE DEVICE, SYSTEM, AND METHOD FOR DIGITAL SIGNATURE - The invention discloses a digital signature system. The digital signature system comprises an electronic device and a data storage device. The electronic device generates a specific data by executing a specific operation, and calculates the specific data via a hash algorithm to generate a hash data. The data storage device comprises a controller, a plurality of flash memories, and a data transmission interface. The electronic device transmits the hash data to the data storage device via the transmission interface. The controller comprises a firmware. The firmware reads an unclonable function, and generates a private key according to the unclonable function, and encrypts the hash data by the private key to obtain a digital signature. The data storage device transmits the digital signature to the electronic device via the transmission interface. | 2022-08-04 |
20220247569 | SIGNATURE VERIFICATION SYSTEM, VERIFICATION KEY MANAGEMENT APPARATUS, VERIFICATION KEY MANAGEMENT METHOD AND PROGRAM - A signature verification system includes a signature generation server, a signature verification server, and a verification key management server that are connected to one another via a communication network. The signature generation server includes: reporting means for, when a signing key and a verification key are generated by a publisher, reporting the verification key and publisher identification information that identifies the publisher to the verification key management server; and signature generation means for signing a bid request issued by the publisher with use of the signing key. The verification key management server includes: registration means for registering the publisher identification information and the verification key that were reported by the reporting means in a storage unit in association with information that enables specifying a version of the verification key; verification means for, upon receiving publisher identification information and a name indicating a verification key from the signature verification server, verifying whether or not a verification key that corresponds to the received publisher identification information and name and that is a latest version is registered in the storage unit; and first transmission means for, if the verification means verified that the verification key that is the latest version is registered in the storage unit, transmitting the latest-version verification key to the signature verification server. The signature verification server includes: second transmission means for, upon receiving the bid request, transmitting publisher identification information and a name indicating a verification key that are included in the bid request to the verification key management server; and signature verification means for, if the publisher identification information and the name were transmitted by the second transmission means and the latest-version verification key was received from the verification key management server in response, performing verification of the bid request with use of the latest-version verification key. | 2022-08-04 |
20220247570 | CONTENT USE SYSTEM, PERMISSION TERMINAL, BROWSING TERMINAL, DISTRIBUTION TERMINAL, AND CONTENT USE PROGRAM - A permission terminal | 2022-08-04 |
20220247571 | LABELING METHOD, APPARATUS, AND DEVICE, AND READABLE STORAGE MEDIUM - A labeling method is provided. In the method, target image data of a target image is acquired from an offline storage device. The target image data is encrypted based on a first target account. A permission to load the target image data is verified based on a second target account logged in to a labeling client. The target image is loaded in the labeling client in response to the permission to load the target image being verified when the second target account logged in to the labeling client matches the first target account. A label for the target image is received. Further, the label for the target image is transmitted to a server. The server is configured to store the label in association with the target image. Apparatus and non-transitory computer-readable storage medium counterpart embodiments are also contemplated. | 2022-08-04 |
20220247572 | SECURE DYNAMIC THRESHOLD SIGNATURE SCHEME EMPLOYING TRUSTED HARDWARE - Embodiments of the invention provide enhanced security solutions which are enforced through the use of cryptographic techniques. It is suited for, but not limited to, use with blockchain technologies such as the Bitcoin blockchain. Methods and devices for generating an elliptic curve digital signature algorithm signature (r, w) are described. In one embodiment, a method includes: i) forming, by a node, a signing group with other nodes; ii) obtaining, by the node, based on a secure random number: a) a multiplicative inverse of the secure random number; and b) the first signature component, r, wherein the first signature component is determined based on the secure random number and an elliptic curve generator point; iii) determining, by the node, a partial signature based on a private secret share, the multiplicative inverse of the secure random number and the first signature component; iv) receiving, by the node, partial signatures from other nodes of the signing group; and v) generating, by the node, the second signature component, w, based on determined and received partial signatures. | 2022-08-04 |
20220247573 | DIGITAL SIGNATURE GENERATION METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM - This application relates to a digital signature generation method and apparatus, a computer device, and a storage medium. The method includes: obtaining a message, and calculating a message hash value of the message; obtaining a signature private key, stitching the signature private key and the message hash value to obtain stitched information, calculating a hash value corresponding to the stitched information, and generating a digital signature corresponding to the message by using the hash value corresponding to the stitched information, the message hash value, and the signature private key. That is, generating a digital signature corresponding to a message by using a hash value corresponding to stitched information, a message hash value of the message, and a signature private key can improve security of the generated digital signature. This application can improve security in a blockchain consensus process. | 2022-08-04 |
20220247574 | ANONYMOUS SIGNATURE SYSTEM, SIGNATURE GENERATION APPARATUS, ANONYMOUS SIGNATURE GENERATION APPARATUS, VERIFICATION APPARATUS, ANONYMOUS SIGNATURE METHOD AND PROGRAM - An anonymous signature system in which a signature σ is anonymized by an agent specified by a signer, includes computers each including a memory and a processor configured to, from a security parameter, generate a system parameter ρ independent of the agent; from ρ, generate an agent secret key w and an agent public key g | 2022-08-04 |
20220247575 | USAGE RESTRICTIONS FOR DIGITAL CERTIFICATES - A method, a computer program product, and a system for usage restrictions on digital certificates. The method includes selecting a digital certificate relating to a user and determining a usage restriction policy for the digital certificate based on the user. The method also includes populating an extension field of the digital certificate with the usage restriction policy. The method further includes providing the digital certificate including the usage restriction policy to the user. The method also includes gathering parameters relating to the digital certificate, determining usage patterns based on the parameters, inputting the usage patterns into a machine learning model, outputting a risk assessment, and updating the usage restriction policy based on the risk assessment. | 2022-08-04 |
20220247576 | ESTABLISHING PROVENANCE OF APPLICATIONS IN AN OFFLINE ENVIRONMENT - A platform identifier for a first node may be determined based on hardware characteristics of the first node. The platform identifier may be sent to a certification service via non-network communication. Certificate information associated with the platform identifier may be received from the certification service via non-network communication. A key pair may be generated at a first node application enclave of the first node. The key pair may include a public key of the first node and an associated private key of the first node. A request to generate a signed digital certificate may be sent to a digital certificate manager, the request including the public key of the first node and the certificate information. A signed digital certificate including the public key and the certificate information may be received from the digital certificate manager, and the signed digital certificate may be stored at the first node application enclave. | 2022-08-04 |
20220247577 | PROVISIONING SYSTEM AND METHOD - A method of provisioning a device to use a data service provided by a data service provider comprises maintaining a list of unique identifiers of devices to which a trusted certificate has been issued and receiving a data service request for a device. The request will include a unique identifier for the device and a certificate. In response to the data service request, the list of device unique identifiers is consulted in order to verify that the certificate contained in the data service request is a trusted certificate. If the certificate contained in the service request is a trusted certificate, the certificate may then be forwarded to the data service provider. | 2022-08-04 |
20220247578 | ATTESTATION OF DEVICE MANAGEMENT WITHIN AUTHENTICATION FLOW - An organization uses an independent separate authentication system to authenticate users or the organization for access to resources of the organization. The organization also uses an MDM system independent both of the organization and of the authentication system to administer the client devices of the organization's users and to ensure that the client devices handle the resources of the organization in a secure manner. In order to allow the authentication system to consider MDM management status of a client device when authenticating a user, the authentication system and the organization cooperate to establish a mechanism whereby the authentication system can securely determine whether a particular client device requesting access to an organization resource is in fact managed by an MDM system. | 2022-08-04 |
20220247579 | SYSTEM AND METHOD FOR IDENTIFYING A BROWSER INSTANCE IN A BROWSER SESSION WITH A SERVER - A system and method are provided for identifying a browser instance in a browser session between a server hosting a web domain and the browser instance executing on a user computing device. The method conducted at the browser instance includes obtaining a private key and a public key of a key pair unique to a combination of a web domain and the browser instance being used to access the web domain. The method includes obtaining a browser certificate issued for the key pair and storing the private key at a storage provided by the browser instance for use by the browser instance during an active browser session with the web domain. The private key is stored as unextractable from the storage and with configuration for use by the browser instance during an active browser session with the web domain in signing or cryptographic operations without the private key being revealed. | 2022-08-04 |
20220247580 | CERTIFICATE REVOCATION CHECK - There is provided mechanisms for certificate revocation check during a subscription related procedure for a subscriber entity. A method is performed by the subscriber entity. The method comprises receiving a message from a subscription management entity during the subscription related procedure for the subscriber entity. The message comprises a certificate and an OCSP response for the certificate. The OCSP response indicates a revocation state of the certificate. The method comprises determining whether the certificate has been revoked or not by checking the revocation state as indicated in the OCSP response. | 2022-08-04 |
20220247581 | ESTABLISHING SECURE COMMUNICATION WITHOUT LOCAL TIME INFORMATION - Methods and devices are provided for establishing secure communication between the devices without relying on local time information. According to the methods, a client device, which is going to establish the secure communication to a server device, is provided by the server device with a proof of its integrity. The proof of integrity of the server device is issued by a trusted third party (TTP) to which both devices have a trust relation. | 2022-08-04 |
20220247582 | DATA MANAGEMENT METHOD, DATA DISTRIBUTION SYSTEM, COMPUTER PROGRAM AND RECORDING MEDIUM - A data management method is a data management method in a data distribution system that manages, by using a blockchain, a distribution of data provided by a data provider. The data management method includes: receiving a token that is included in a second transaction and that indicates a result of determination of “permitted”, after a first transaction is registered in the blockchain and after the second transaction is registered in the blockchain, the first transaction indicating a use request for the data by a data user, the second transaction including the token that indicates a result of determination by the data provider with respect to the use request indicated by the first transaction; and providing the data to the data user on condition that the token is received. | 2022-08-04 |
20220247583 | METHOD FOR THE EXECUTION OF AN INSTANCE OF A SMART CONTRACT BY MEANS OF A BLOCKCHAIN - A method of executing an instance of a smart contract through a blockchain shared among a plurality of nodes including the following first step of serializing in the blockchain of the instance of the smart contract, and the following steps in cyclical succession: a second step of serializing a plurality of status files each containing a state defined only by internal variables of the instance at an end of a respective plurality of executions of the instance, the plurality of status files are temporally ordered according to the respective plurality of executions of the instance, a third step of deserializing in a RAM of a last state of the instance by deserializing at least one last state file from the blockchain, and a fourth step of deserializing the instance by valuing a second state of the instance as a last state, a fifth step including further execution of the instance. | 2022-08-04 |
20220247584 | CYPHERGENICS-BASED VERIFICATIONS OF BLOCKCHAINS - A method for verifying a material data chain (MDC) that is maintained by a creator is disclosed. The method includes receiving an unverified portion of the MDC from the creator including a set of consecutive material data blocks (MDBs). Each respective MDB includes respective material data, respective metadata, and a creator verification value. The method includes modifying a genomic differentiation object assigned to the verification cohort based on first genomic regulation instructions (GRI) that were used by the creator to generate the creator verification value. For each MDB in the unverified portion, the method includes determining a verifier verification value based on the MDB, a preceding MDB in the MDC, and a genomic engagement factor (GEF) determined with respect to the MDB. The GEF corresponding to an MDB is determined by extracting a sequence from the metadata of a MDB and mapping the sequence into the modified genomic differentiation object. | 2022-08-04 |
20220247585 | UPSTREAM MULTICAST HOP (UMH) EXTENTIONS FOR ANYCAST DEPLOYMENTS - An example egress network device includes at least one computer processor and a memory. The memory includes instructions that cause the at least one computer processor to receive messages from each of a plurality of ingress network devices. Each message specifies a multicast source as an anycast address that belongs to two or more sources, a multicast group, and a customer site identifier that uniquely identifies a customer network device via which the anycast address is reachable. The instructions cause the at least one computer processor to select, based on the customer site identifiers, one of the plurality of ingress network devices to which to send a multicast join message of a plurality of multicast join messages for the multicast source and multicast group. The instructions cause the at least one computer processor to send the multicast join message to the selected one of the plurality of ingress network devices. | 2022-08-04 |
20220247586 | MULTICAST-ONLY THIN DODAG IN LOW POWER AND LOSSY NETWORK - In one embodiment, a method comprises: generating, by a constrained low power and lossy network (LLN) device that is localized within a subregion of an LLN, a thin destination oriented directed acyclic graph (DODAG) having up to a prescribed limit of attached LLN devices at each hop of the thin DODAG based on generating a DODAG information object (DIO) message specifying an instruction for limiting attachment at each hop of the thin DODAG to the prescribed limit; and causing, by the constrained LLN device, multicast-only transmissions via the thin DODAG based on inserting into the DIO message a multicast-only transmission mode via the thin DODAG and outputting the DIO message, the DIO message causing each neighboring LLN device to selectively attach to the constrained LLN device as an attached child LLN device based on the instruction and execute the multicast-only transmissions via the thin DODAG. | 2022-08-04 |
20220247587 | SYSTEMS AND METHODS FOR CONTROLLING MEETING ATTENDANCE - One example method for controlling online meeting attendance includes obtaining meeting information associated with a meeting, the meeting information comprising a meeting identifier; receiving, by a video conferencing system from a client device, a request to join the meeting, the request comprising the meeting identifier; receiving a user identifier corresponding to a user; accessing a set of guest identifiers corresponding to a plurality of meeting guests invited to the meeting; determining that the user is a meeting guest of the plurality of meeting guests based on the user identifier and a correspondence to a guest identifier of the set of guest identifier, wherein the user identifier is not in the set of guest identifiers; and responsive to determining that the user is a meeting guest of the plurality of meeting guests, connecting the client device to the meeting. | 2022-08-04 |
20220247588 | SYSTEMS AND METHODS FOR IDENTIFYING AT-RISK MEETINGS - One example method for identifying at-risk meetings includes receiving, by a video conferencing system, access data potentially associated with a virtual meeting and a source of the access data, identifying the virtual meeting associated with the access data, determining a risk score based at least in part on the access data, the source of the access data, and a meeting property associated with the virtual meeting, the risk score indicating a likelihood of meeting disruption based at least in part on the risk score, and responsive to determining that the likelihood of meeting disruption exceeds a risk threshold, generating a notification message. | 2022-08-04 |
20220247589 | Merging A Call With A Virtual Meeting - A call is merged with a virtual meeting to allow an audio-only caller to join the virtual meeting while bypassing one or more security checks configured for the virtual meeting. After the virtual meeting is initiated, a call is established between a phone device of the audio-only caller and a customer endpoint. A request is received from the customer endpoint to join the phone device with a virtual meeting. A channel is opened between the phone device and a web service associated with the virtual meeting. The phone device is then joined to the virtual meeting over the channel. To facilitate a seamless transition from the call to the virtual meeting, the call may be maintained as an audio channel of the virtual meeting for the audio-only caller. | 2022-08-04 |
20220247590 | ELECTRONIC CONFERENCING - Aspects of the subject technology provide for secure, privacy-preserving access to electronic conferencing. In one or more implementations, an electronic device may receive a request to join a call with a second device, the request including components of a uniform resource locator (URL). The electronic device may assemble the URL using the components, and join the call using the assembled URL. | 2022-08-04 |
20220247591 | MULTI-POINT VIDEO PRESENTATIONS WITH LIVE ANNOTATION - Methods, systems, and apparatus, including computer programs encoded on computer storage media relate to a method for providing multi-point video presentations with live annotations within a communication platform. First, the system receives video feeds depicting imagery of a number of users. The system then determines a boundary about each user in the video feeds, with the boundaries each having an interior portion and an exterior portion. The system provides a media background for the exterior portions, then generates a composite video for each of the feeds. The system then determines that one or more client devices have annotation permissions, and receives one or more annotation inputs corresponding to at least one of the composite videos. Finally, the system updates at least one of the composite videos to additionally depict the annotation inputs within a third layer. | 2022-08-04 |
20220247592 | NETWORK INFORMATION TRANSMISSION METHOD AND NETWORK INFORMATION TRANSMISSION SYSTEM - A network information transmission method, comprising the following steps: receiving a first media information by a first terminal device; processing the first media information to obtain a processed first media information; integrating the processed first media information into a second media information to generate an integrated second media information; outputting the integrated second media information to a second terminal device through the network; decompressing the integrated second media information through the second terminal device; capturing the integrated second media information through the second terminal device; obtaining the first media information based on the integrated second media information; and playing the first media information by the second terminal device. | 2022-08-04 |
20220247593 | SYSTEMS, METHODS, AND APPLIANCES THAT ENABLE REGIONAL CONTROL OF REFRIGERATION APPLIANCES - Systems and methods of managing appliances distributed throughout a geographic area enable control of the appliances in response to regionally localized events. An asset management server determines the location of the appliances throughout the geographic area and issues commands to appliances in a specified region which cause the appliances to change local control parameters to address the event. An asset management server also receives operating data from the appliances and uses the operating data to determine when regional events are occurring based on localized anomalies in the operating data. Refrigeration appliances have GPS receivers so that the locations of the appliances in the geographic area can be verified. Further, refrigeration appliances have primary and secondary operating modes. Secondary operating modes may be address certain regional events that can occur from time to time. | 2022-08-04 |
20220247594 | APPARATUS, SYSTEM, AND METHOD FOR PROVIDING SIMULTANEOUS DELIVERY OF OUTPUT COMMUNICATIONS - An apparatus, system, and method are provided herein to provide simultaneous delivery of output communications to a client device and a secondary client device are discussed herein. Some embodiments may include an apparatus including processing circuitry configured to: receive one or more electronic communications; configure the one or more electronic communications for presentation to the client device and the secondary client device based on the delivery identifier; and provide the one or more electronic communications to the client device via a wide area network to facilitate simultaneous delivery of the one or more output communications corresponding to the one or more electronic communications on the client device and the secondary client device. The one or more output communications may be provided to the secondary client device via the client device and a personal area network that is separate from the wide area network. | 2022-08-04 |
20220247595 | COMMUNICATION CONVERTERS OF DRY PUMPS - Provided is a communication converter of a dry pump, including: a first communication module, a memory module, a second communication module, and a processing module. The first communication module receives a sensor data packet from a communication port of the dry pump. The memory module has stored a program that can interpret the sensor data packet, an access address and an identification code of a sensor data. The second communication module is connected to a monitoring host via a first network. The processing module interprets the sensor data packet to retrieve the sensor data, transcodes a coding of the sensor data according to a Modbus protocol, and complies the transcoded sensor data to generate a data packet of SECS/GEM protocol. The second communication module transmits the data packet of SECS/GEM protocol to the monitoring host. | 2022-08-04 |
20220247596 | SENSOR HUB, SENSOR SYSTEM, METHOD FOR TRANSMITTING SENSOR SIGNALS AND COMPUTER-READABLE STORAGE MEDIUM - A sensor hub may be used to address complex cabling issues. Such sensor hub may include at least one sensor communication device designed to receive sensor signals from at least two sensors and/or to output signals to the at least two sensors; a computer device communicatively connected to the at least one sensor communication device and designed to generate sensor data using the sensor signals; and a transmitting device designed to transmit the sensor data to a user device via a single communications medium. The sensor data indicate addresses which are each assigned to one of the at least two sensors. | 2022-08-04 |
20220247597 | ON-BOARD NETWORK SYSTEM - An on-board network system includes an arithmetic unit and a plurality of control devices connected to the arithmetic unit via a communication network. The communication network is configured such that each of the control devices are communicative with the arithmetic unit and/or other one(s) of the control devices via at least two communication paths. In each of the communication paths, a priority order of communications is determined according to a type of communication data. If a communication disturbance is detected in one of the communication paths, the arithmetic unit or one(s) of the control devices adjusts the traffic of the communication data in accordance with the priority of the other one of the communication paths. | 2022-08-04 |
20220247598 | Packet Detection Method, Connectivity Negotiation Relationship Establishment Method, and Related Device - A packet detection method includes a first provider edge (PE) that sends a detection packet to a second PE, where the detection packet is used to enable the second PE to generate a response packet, and the detection packet includes a bypass virtual extensible local area network (VXLAN) tunnel source Internet Protocol (IP) address; the first PE receives, through a bypass VXLAN tunnel, a response packet for the detection packet, where the response packet includes the bypass VXLAN tunnel source IP address; and the first PE obtains a detection result from the response packet. The first PE may receive the response packet, so that the first PE can obtain the detection result. | 2022-08-04 |
20220247599 | SYSTEMS AND METHODS FOR SUBSCRIPTION BASED SELECTIVE EVPN ROUTE DISTRIBUTION - In one embodiment, a method includes receiving, by a route reflector, a subscription request from a first provider edge node in a network and generating a subscription policy for the first provider edge node. The method also includes receiving a first Ethernet Virtual Private Network (EVPN) Type 2 Route from a second provider edge node, assigning a sequence number to the first EVPN Type 2 Route, and communicating the first EVPN Type 2 Route with the sequence number to the first provider edge node. The method further includes receiving a second EVPN Type 2 Route from a third provider edge node, generating an updated sequence number in response to receiving the second EVPN Type 2 Route from the third provider edge node, and communicating the second EVPN Type 2 Route with the updated sequence number to the first provider edge node and the second provider node. | 2022-08-04 |
20220247600 | Cloud-Based Private Branch Exchange - A system includes a customer network and a telephony server. The customer network is associated with an independent carrier (IC), a native carrier, or both. The customer network includes a call manager, a telephone gateway, an internet gateway, a first device associated with the IC, and a second device associated with the native carrier. The first device communicates with the telephone gateway via the call manager. The second device communicates with the internet gateway. The telephony server is associated with the native carrier. The telephony server supports traffic from the first device and the second device. The telephony server includes a PBX and a session border controller (SBC). The SBC communicates with the telephone gateway via a session initiation protocol (SIP) trunk. | 2022-08-04 |
20220247601 | INDICATING WHETHER DEMODULATION REFERENCE SIGNAL BUNDLING IS APPLIED BY A USER EQUIPMENT - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive a request to apply demodulation reference signal (DMRS) bundling to uplink transmissions. The UE may transmit multiple uplink transmissions. The UE may transmit an indication of whether the UE is able to comply with the request based at least in part on whether the UE is able to maintain phase coherence across the multiple uplink transmissions. Numerous other aspects are provided. | 2022-08-04 |
20220247602 | METHOD AND SYSTEM FOR ADJUSTING LINE WIDTH AND LINE GAP OF DIFFERENTIAL SIGNAL PAIR - A method for adjusting a line width and a line gap of a differential signal pair includes performing a new parameter setting step, a distance difference of center calculating step, a reference polygon generating step and a differential signal pair adjusting step. The new parameter setting step is performed to set a new line width and a new line gap of the new differential signal line pair. The distance difference of center calculating step is performed to calculate a difference between an original center distance of the original differential signal line pair and a new center distance of the new differential signal line pair. The reference polygon generating step is performed to generate a reference polygon from an original center line of the original differential signal line pair. The differential signal pair adjusting step is performed to adjust the reference polygon to the new differential signal line pair. | 2022-08-04 |
20220247603 | Method and Apparatus for Training a Full-Duplex Communication Link - During a training procedure for communicating via a full-duplex communication link, a first communication device receives training information from a second communication device. The training information corresponds to first signal processing parameters developed at the second communication device for use by the second communication device to process signals received by the second communication device via the full-duplex communication link. After receiving the training information from the second communication device, the first communication device develops second signal processing parameters to be used by the first communication device to process signals received by the first communication device via the full-duplex communication link. The second signal processing parameters are developed using the training information received from the second communication device. | 2022-08-04 |
20220247604 | TRANSCEIVING METHOD FOR PHASE NOISE COMPENSATION IN SC-FDE SCHEME, AND APPARATUS THEREFOR - An operation method of a receiving apparatus may comprise: receiving an N-th data block belonging to a frame including a plurality of data blocks from a transmitting apparatus, each of the plurality of data blocks including a data period and a UW period; storing a first UW received in a UW period of the N-th data block in a buffer; receiving an (N+1)-th data block belonging to the frame from the transmitting apparatus; estimating a phase noise in a time domain by combining the first UW with a second UW received in a UW period of the (N+1)-th data block; and applying time-domain compensation according to the estimated phase noise to the (N+1)-th data block, and demodulating data of the (N+1)-th data block, wherein the first UW and the second UW are configured with a same sequence. | 2022-08-04 |
20220247605 | DEVICES AND METHODS FOR MACHINE LEARNING ASSISTED SPHERE DECODING - A decoder for decoding a signal received through a transmission channel represented by a channel matrix using a search sphere radius. The decoder comprises a radius determination device for determining a search sphere radius from a preliminary radius. The radius determination device is configured to: i. apply a machine learning algorithm to input data derived from the received signal, the channel matrix and a current radius, the current radius being initially set to the preliminary radius, which provides a current predicted number of lattice points associated with the current radius; ii. compare the current predicted number of lattice points to a given threshold; iii. update the current radius if the current predicted number of lattice points is strictly higher than the given threshold, the current radius being updated by applying a linear function to the current radius; Steps i to iii are iterated until a termination condition is satisfied, the termination condition being related to the current predicted number, the radius determination device being configured to set the search sphere radius to the current radius in response to the termination condition being satisfied. | 2022-08-04 |
20220247606 | Systems, Devices, and Methods Employing Instantaneous Spectral Analysis in the Transmission of Signals - Systems, devices, methods, and computer readable medium for transmitting data using polynomials and instantaneous spectral analysis. In and/or prior to the transmitter, a signal may be formed by fitting the data with a polynomial, which is projected onto Cairns series functions. The Cairns series functions are converted into Cairns exponential functions, which are combined based on frequency information to produce the set of sinusoidals with continuously time-varying amplitude, each of the sinusoidals having a different frequency. | 2022-08-04 |
20220247607 | SYSTEM AND METHOD FOR HIGH-ENTROPY GAUSSIAN MINIMUM SHIFT KEYING (HE-GMSK) MODULATION - A system and method for generating a high entropy (HE) constant-envelope Gaussian minimum shift keying (GMSK) modulated signal with suppressed cyclostationary features is disclosed. In embodiments, the system includes a primary GMSK modulator for generating an initial GMSK signal based on a received data stream for transmission. The system includes a sequence of secondary GMSK modulators for generating a sequence secondary GMSK signals based on pseudorandom number sequences based on distinct chip rates. The initial GMSK signal is multiplied by the first secondary GMSK signal to generate an initial composite GMSK signal, which is sequentially multiplied by each subsequent secondary GMSK signal until a final composite GMSK signal is achieved, the final composite GMSK signal being a HE-GMSK constant-envelope signal with suppression of cyclic and cyclostationary features that might otherwise cause detection or interception of the signal. | 2022-08-04 |
20220247608 | Wireless Uplink Resource Allocation - A wireless device may receive configuration parameters of cells comprising a primary cell that is not configured with scheduling request (SR) resources and a secondary cell that is configured with SR resources and that is in a secondary timing advance group (sTAG). A wireless device may determine to perform an SR process. Based on the wireless device not having an uplink data channel resource available in a time interval and not having a valid timing advance for the secondary cell in the time interval, the wireless device may initiate a random access procedure. | 2022-08-04 |
20220247609 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING REFERENCE SIGNAL FOR SIDELINK DATA IN WIRELESS COMMUNICATION SYSTEM - The disclosure relates to a communication technique and a system for fusing a 5th generation (5G) communication system with Internet of Things (IoT) technology to support a higher data rate after a 4G system. The disclosure can be applied to intelligent services (e.g., a smart home, a smart building, a smart city, a smart car or a connected car, healthcare, digital education, retail, security- and safety-related services, or the like), based on 5G communication technology and IoT-related technology. The disclosure provides a method and an apparatus for assigning frequency and time resources for data transmission in a wireless communication system. | 2022-08-04 |
20220247610 | METHOD AND DEVICE FOR TRANSMITTING MEASUREMENT REFERENCE SIGNAL - Disclosed are a method for for sending and receiving signaling information. The method includes: sending, by a base station, signaling information; where the signaling information includes: information about a correspondence between a sequence parameter and a time domain symbol. The correspondence between the sequence parameter and the time domain symbol includes: the sequence parameter hopping once every R3 time domain symbols; where R3 is an integer, each of the R3 time domain symbols includes an uplink channel or an uplink signal. R3 satisfies at least one of the following: R3 is equal to a length of a time domain orthogonal cover code (OCC) corresponding to the uplink channel or the uplink signal, or R3 is equal to a frequency domain repeated sending parameter R; where R is a positive integer. | 2022-08-04 |
20220247611 | Systems and Methods for Phase Noise Tracking Reference Signal Sequence Generation Using Demodulation Reference Signals - A user equipment ( | 2022-08-04 |
20220247612 | TRANSMITTER, RECEIVER, TRANSMITTING METHOD, AND RECEIVING METHOD - A transmitter includes a mapping circuit and a framing circuit. The mapping circuit is configured to combine and map a first data sequence and a second data sequence onto orthogonal frequency division multiplexing (OFDM) subcarriers which include first subcarriers and second subcarriers. The framing circuit is configured to generate an OFDM signal from the OFDM subcarriers. The mapping circuit is configured to: map first data included in the first data sequence and second data included in the second data sequence onto the first subcarriers; and map the second data onto the second subcarriers. The first data are not mapped on the second subcarriers. | 2022-08-04 |
20220247613 | REFERENCE SIGNAL SEQUENCE MAPPING AND DE-MAPPING METHODS, AND APPARATUS - Reference signal sequence mapping and de-mapping methods, and an apparatus are provided, to resolve a problem in a conventional technology that time-domain overheads of a reference signal of a single-carrier waveform are relatively large. In this application, a sending device maps a reference signal sequence to a modulation symbol set, to obtain a multiplexing set, where the multiplexing set occupies one single-carrier time domain symbol. Compared with a solution in which a reference signal sequence occupies one single-carrier time domain symbol, the solution in this application reduces time-domain overheads of the reference signal. In addition, to correctly perform channel estimation or channel sounding for the reference signal, different reference signal sequences meet conditions such as orthogonality or conjugate orthogonality, and locations of the reference signal sequences in different multiplexing sets further meet corresponding conditions, and so on. | 2022-08-04 |
20220247614 | LEARNING IN COMMUNICATION SYSTEMS - An apparatus, method and computer program is described comprising: initialising trainable parameters of a transmission system having a transmitter, a channel and a receiver; generating training symbols on the basis of a differentiable distribution function; transmitting modulated training symbols to the receiver over the channel in a training mode; generating a loss function based on the generated training symbols and the modulated training symbols as received at the receiver of the transmission system; and generating updated parameters of the transmission system in order to minimise the loss function. | 2022-08-04 |
20220247615 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A communication apparatus includes a generation unit that generates the first I signal and the first Q signal as signals that allow a carrier wave to undergo frequency shift keying with predetermined modulated data and inputs the first I signal and the first Q signal to a quadrature modulation unit. A first demodulation unit and the first decoding unit demodulate and decode first data that undergoes amplitude shift keying and is transmitted from the wireless tag. A second demodulation unit and the second decoding unit demodulate and decode second data that undergoes frequency shift keying from a wireless signal output from the wireless tag. A comparison unit compares the second data and the modulated data to each other. The processor executes, when matching between the second data and the modulated data is confirmed by the comparison unit, data processing on the first data. | 2022-08-04 |
20220247616 | SYSTEM AND METHOD FOR PLACESHIFTING MEDIA PLAYBACK - Systems and methods of placeshifting media playback between two or more devices are provided. For example, a method for placeshifting media may include downloading onto a first device an index of files accessed or modified on a second device via a data storage server, at least one of the files being a media file played on the second device. The first device may display a user selectable list of the files on the first device before issuing a request for the media file to the data storage server. The data storage server may send the media file to the first device from the data storage server, and the first device may play back the media file where the second device left off. | 2022-08-04 |
20220247617 | FLEXIBLE PIPELINE PROCESSING METHOD AND SYSTEM - A reprogrammable software defined network device is disclosed which allows at any time the selection of a desired subset of features from all possible features, without the requirement of making available all possible features that might otherwise be programmed into the programmable switch, and without the requirement of reprogramming the interface which is used to access the features. The device comprises a standardized control API and a programmable switch capable of implementing only a subset of said plurality of switch features, each accessible via a runtime API and a control library interconnecting the control API and the runtime API such that each of the subset is accessible by the external controller using said standardized control API via said runtime API. The subset changes from time to time in response user requirements. A change in the subset of features gives tise to a change in the runtime API. | 2022-08-04 |
20220247618 | Action Recommendation Engine (ARE) for Network Operations Center (NOC) solely from raw un-labeled data - Systems, methods, and computer-readable media are provided for recommending actions to be taken in a network for optimizing or improving the operability of the network. A method, according to one implementation, includes a first step of receiving raw, unprocessed data that is obtained directly from one or more network elements of a network. The method includes second step of determining one or more remedial actions using a direct association between the raw, unprocessed data and the one or more remedial actions. | 2022-08-04 |
20220247619 | LONGEST PATH FIRST ROUTE SELECTION - Presented herein are techniques to manage a data network. A method includes receiving, at a first network device, a request to establish a path through a network from the first network device to a second network device, in response to the request, determining, from among a plurality of potential paths between the first network device and the second network device, a longest acceptable path between the first network device and the second network device, and sending data from the first network device to the second network device via the longest acceptable path between the first network device and the second network device. Because the longest acceptable path is first selected by default, if and when that longest acceptable path fails, a failover path will likely be shorter than the longest acceptable path thus likely improving, e.g., overall latency for the data being sent. | 2022-08-04 |
20220247620 | Identification of Clusters of Elements Causing Network Performance Degradation or Outage - An embodiment involves obtaining a tabular data set with columns that characterize items relating to behavior of components of a communication network; constructing a frequent-pattern tree, each node being associated with: (i) an item-name for representing an item, (ii) a count of transactions from a root node of the tree to the respective node, and (iii) node-links that refer to other nodes in the tree that represent items having the same item-name; traversing the tree to identify a set of nodes with counts greater than a predefined support threshold; generating, from the nodes, association-rules that are based on antecedent items associated with a target item; reducing the association-rules by (i) removing the association-rules in which the antecedent items thereof are a superset or subset of the antecedent items of a further association-rule, or (ii) combining the association-rules that have antecedent items that are at least partially disjoint and conditionally dependent. | 2022-08-04 |
20220247621 | METHOD, APPARATUS, AND SYSTEM FOR DISTRIBUTED SENSOR MONITORING AND MANAGEMENT IN A SYSTEM-ON-CHIP - Apparatuses, systems, and methods for collecting and managing data from a plurality of sensors across a system-on-a-chip (SoC). In exemplary aspects, an apparatus comprises an external memory and a system management processor coupled to external memory and configured to be programmed by external memory. The apparatus further comprises a plurality of sensor circuits coupled to the system management processor and the external memory and configured to be programmed by the external memory. The external memory stores configuration information for programming each of the plurality of sensor circuits to collect and provide data concurrently with each of the others of the plurality of sensor circuits to be analyzed by a management firmware program and a management firmware program configured to analyze data received at the system management processor from the plurality of sensor circuits. The external memory is configured to program the system management processor and the plurality of sensor circuits. | 2022-08-04 |
20220247622 | WIRELESS COMMUNICATION NETWORK OPERATOR DEFINED DNS SERVER SELECTION - Systems and methods discussed herein are directed to method for connecting a communication device to a data network via a network, e.g., a wireless communication network, and preventing the communication device from overriding a DNS selection by an operator of the network. The method includes receiving, from a communication device, e.g., an electronic device, a request to connect to a data network, e.g., the Internet, via a wireless communication network. A response message may be provided to the communication device, where the response message comprises (i) a configuration setting for the communication device to use domain name system (DNS) internet protocol (IP) addresses provided by an operator of the wireless communication network when accessing the data network and (ii) a data bit disabling the communication device from overriding the configuration setting. Connection of the communication device to the data network is then facilitated via the wireless communication network. | 2022-08-04 |
20220247623 | NETWORK NODE AND METHOD PERFORMED THEREIN FOR HANDLING COMMUNICATION IN A WIRELESS COMMUNICATION NETWORK - Embodiments herein relate to a network node ( | 2022-08-04 |
20220247624 | MANAGING NETWORK CONNECTED DEVICES - Methods, systems, and computer program products for managing Internet of Things (IoT) network-connected devices. | 2022-08-04 |
20220247625 | PLATFORM FOR ESTABLISHING COMPUTING NODE CLUSTERS IN DIFFERENT ENVIRONMENTS - In some implementations, a device may obtain a first set of information for establishing a computing node cluster that is applicable to multiple environments. The device may receive, from a client device, an indication of a second set of information for establishing the computing node cluster, wherein the second set of information is associated with a user of the client device and an environment associated with the user. The device may compile a third set of information for establishing the computing node cluster based on the first set of information and the second set of information. The device may transmit, to a server device, an indication of the third set of information to cause the server device to establish the computing node cluster. The device may monitor the computing node cluster using one or more monitoring techniques to determine a status of the computing node cluster. | 2022-08-04 |
20220247626 | Method For Generating Backbone Network, Apparatus For Generating Backbone Network, Device, And Storage Medium - The present disclosure provides a method for generating a backbone network, an apparatus for generating a backbone network, a device, and a storage medium. The method includes: acquiring a set of a training image, a set of an inference image, and a set of an initial backbone network; training and inferring, for each initial backbone network in the set of the initial backbone network, the initial backbone network by using the set of the training image and the set of the inference image, to obtain an inference time and an inference accuracy of a trained backbone network in an inference process; determining a basic backbone network based on the inference time and the inference accuracy of the trained backbone network in the inference process; and obtaining a target backbone network based on the basic backbone network and a preset target network. | 2022-08-04 |
20220247627 | CREATING A USER PRIVATE NETWORK BASED ON 802.11ay WI-FI TECHNOLOGY - Certain embodiments disclose systems and methods for creating a user private network (UPN) based on 11ay technology. Methods of the present disclosure include creating a personal basic service set (PBSS) having a service device and one or more flay devices, the service device configured to wirelessly communicate with the one or more flay devices in the PBSS, creating a UPN having an access point located in communicative proximity with the service device, and associating at least one 11ay device of the one or more 11ay devices with the UPN, wherein the at least one flay device is configured to establish a wireless connection with the one or more flay devices using the service device when within a coverage area of the PBSS, and to establish a wireless connection with the one or more flay devices using the access point when outside the coverage area of the PBSS. | 2022-08-04 |
20220247628 | SYSTEMS AND METHODS FOR SECURE PROVISIONING OF SSH CREDENTIALS - Embodiments relate to systems and methods for securely provisioning login credentials to an electronic device on a network, e.g., a consumer premises device (CPE) device, such as, among other devices, a modem. The login credential may be used, for example, for securely provisioning and configuring a CPE device. | 2022-08-04 |
20220247629 | Method And Apparatus For Device Management - A telephony device includes a memory that stores firmware to operate the telephony device. The telephony device includes a network interface that transmits a first command to establish a connection with a telephony server. The telephony device includes a receiver that receives a second command from a device manager. The second command includes an instruction to upgrade the firmware of the telephony device. The telephony device includes a processor that upgrades the firmware of the telephony device based on the second command. The processor establishes a connection to a virtual meeting room platform based on the upgraded firmware. | 2022-08-04 |
20220247630 | IDENTIFICATION OF NETWORK DEVICE CONFIGURATION CHANGES - In one example, a logical representation of a first graph is generated. The first graph indicates a configuration of a network device in a network at a first time. The first graph includes a first node representative of a first configuration block of the network device, a second node representative of a second configuration block of the network device, and a first link that indicates, by connecting the first node and the second node, that the first configuration block is associated with the second configuration block. The logical representation of the first graph is compared to a logical representation of a second graph that indicates an actual or planned configuration of the network device at a second time subsequent to the first time. In response, one or more changes in the configuration of the network device from the first time to the second time are identified. | 2022-08-04 |
20220247631 | NETWORK MANAGEMENT APPARATUS AND METHOD - A network management device according to an aspect includes a processing circuitry configured to perform acquiring a network configuration of a logical layer concerning a communication network having a redundant configuration in a communication section between a first network device and a second network device, the network configuration being a network configuration of a logical layer including a plurality of logical entities including a first logical entity corresponding to a first virtual port set in the first network device and a second logical entity corresponding to a second virtual port set in the second network device and, in response to occurrence of a failure of the communication network, retrieving a communicable path leading from the first logical entity to the second logical entity. | 2022-08-04 |
20220247632 | CONTROL SYSTEM, CONTROL DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM RECORDING PROGRAM - According to the present invention, when there is a change in a network configuration, timers of a changed network configuration are synchronized with a timer having high accuracy among the timers. This control system has a network configuration in which one or more control devices each for controlling a target can be communicably connected to a network, and each of the one or more control devices has: a timer for managing time with accuracy; a communicator for transmitting a control command to a target corresponding to said control device on the basis of the time managed by the timer; and a timer synchronizer that, when the network configuration is changed, time-synchronizes, among timers of each control device of a changed network configuration, timers with another timer having higher accuracy than the timers. | 2022-08-04 |
20220247633 | METHODS, SYSTEMS AND APPARATUS TO IMPROVE CLUSTER EFFICIENCY - Methods, apparatus, systems and articles of manufacture are disclosed to improve cluster efficiency. An example apparatus includes a cluster manager to identify cluster resource details to execute a workload, a workload manager to parse the workload to identify services to be executed by cluster resources, and an optimization formula manager to identify service optimization formulas associated with respective ones of the identified services, and improve cluster resource efficiency by generating a cluster formula configuration to calculate cluster parameter values for the cluster resources. | 2022-08-04 |
20220247634 | INFORMATION PROCESSING METHOD, APPARATUS, DEVICE AND COMPUTER READABLE STORAGE MEDIUM - A method, an apparatus, device, and a computer-readable storage medium for processing information are provided. The method is used in a first network device, and includes receiving information related to a second network device, determining a first resource configuration corresponding to a coverage classification related to the second network device based on the information, and transmitting the first resource configuration to the second network device. The method may obtain the first resource configuration through making prediction and calculation analysis based on the information, which may achieve dynamic configurations of different coverage classifications, save energy consumption, and improve system capacity and performance at the same time. | 2022-08-04 |
20220247635 | METHODS AND APPARATUS TO CONTROL PROCESSING OF TELEMETRY DATA AT AN EDGE PLATFORM - Methods, apparatus, systems and articles of manufacture are disclosed to control processing of telemetry data at an edge platform. An example apparatus includes an orchestrator interface to, responsive to an amount of resources allocated to an orchestrator to orchestrate a workload at the edge platform meeting a first threshold, transmit telemetry data associated with the orchestrator to a computer to obtain a first orchestration result at a first granularity; a resource management controller to determine a second orchestration result at a second granularity to orchestrate the workload at the edge platform, the second granularity finer than the first granularity; and a scheduler to schedule a workload assigned to the edge platform based on the second orchestration result. | 2022-08-04 |
20220247636 | SECURE MANAGEMENT OF DEVICES - This document relates to a process for supporting the management of a variety of types of deployed devices. Administrators utilizing enterprise services can provide generic configuration data using configuration templates, which can be provided to a management server. The management server can then precompute device-specific configuration settings and resolve any conflicts that may arise based on the configuration templates. The configuration templates can also include placeholders for secret values, and once a managed device checks in to the management server, the secret values can be retrieved from an applicable enterprise service and provided to the managed device at the time of applying the configuration template. | 2022-08-04 |
20220247637 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR FACILITATING SYNCHRONIZATION OF SETTING CONFIGURATIONS - A method, apparatus, and computer program product are provided for facilitating synchronization of setting configurations. An apparatus may include a processor and a memory storing instructions that when executed by the processor cause the apparatus to configure a setting on the apparatus. The instructions when executed by the processor may further cause the apparatus to generate a settings data package comprising the setting configuration. The instructions when executed by the processor may additionally cause the apparatus to send the settings data package to a settings management service for synchronization of the setting configuration to at least one of a service or a user device. The settings management service may be configured to synchronize the setting configuration by distributing the settings data package to the at least one of the service or the user device. Corresponding methods and computer program products are also provided. | 2022-08-04 |
20220247638 | AUTOMATED GENERATION OF STANDARD NETWORK DEVICE CONFIGURATIONS - Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration. | 2022-08-04 |
20220247639 | TECHNIQUES FOR NETWORK POLICIES ANALYSIS IN CONTAINER FRAMEWORKS - Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system. | 2022-08-04 |