35th week of 2022 patent applcation highlights part 60 |
Patent application number | Title | Published |
20220278796 | CONTROLLING DL MIMO TRANSMISSIONS IN A COMMUNICATION SYSTEM - To control transmissions to a user equipment (UE) over a downlink (DL) multiple-input, multiple-output (MIMO) channel, a base station determining that the UE is configured to support N DL MIMO layers and transmit reference signals over L antenna chains ( | 2022-09-01 |
20220278797 | METHOD AND APPARATUS FOR TRANSMITTING SL PRS IN NR V2X - According to an embodiment of the present disclosure, a method in which a first apparatus performs sidelink communication is provided. The method may comprise: receiving a PSCCH from a second apparatus; receiving a PSSCH related to the PSCCH from the second apparatus; transmitting an SL PRS for sidelink positioning to the second apparatus; determining a PSFCH resource for transmitting a PSFCH to the second apparatus based on the PSCCH and the PSSCH; and transmitting the PSFCH to the second apparatus based on the PSFCH resource, wherein a time interval in which the SL PRS is transmitted and a time interval in which the PSFCH is transmitted may overlap each other. | 2022-09-01 |
20220278798 | METHOD AND DEVICE FOR CONTROLLING TRANSMISSION OF SOUNDING REFERENCE SIGNAL IN WIRELESS ACCESS SYSTEM SUPPORTING MACHINE TYPE COMMUNICATION - The present invention provides methods for controlling transmission of a sounding reference signal (SRS) in a wireless access system supporting machine type communication (MTC) and devices for supporting same. A method for controlling transmission of an SRS by an MTC terminal in a wireless access system supporting MTC, according to an embodiment of the present invention, can comprise the steps of: receiving an upper layer signal comprising information about an SRS which is to be repeatedly transmitted; configuring the SRS on the basis of the information about the SRS; and transmitting the SRS by means of a subband to which a physical uplink shared channel (PUSCH) is allocated and which is being frequency hopped. The subband comprises six physical resource blocks (PRB), and the SRS can be sequentially transmitted to the subband being frequency hopped. | 2022-09-01 |
20220278799 | METHOD AND DEVICE FOR WIRELESS COMMUNICATION - A method and device for wireless communications. A first node receives a first radio signal, first information and second information; transmits a second radio signal in a first target slot; herein, the first radio signal is used to indicate a synchronization timing of a first time window, and the first information indicates a first slot out of the first time window; the second information indicates a first time offset; the first target slot is advanced by a second time offset compared with the first slot; the second time offset is related to a first residual time offset, a sum of the first residual time offset plus L1 first time length(s) is equal to the first time offset, L1 being a positive integer; the first residual time offset does not exceed the first time length. The application can avoid interferences incurred by inconsistent understanding of time-domain resources. | 2022-09-01 |
20220278800 | METHOD AND DEVICE FOR WIRELESS COMMUNICATION - Disclosed are a method and device in wireless communication. As one embodiment, a UE receives a first signalling, and subsequently receives a first wireless signal on a target time-frequency resource, wherein the first signalling is used for determining at least the former of (a sub-carrier interval corresponding to the first wireless signal, and the target time-frequency resource), and the first signalling is a physical layer signalling. The present invention can dynamically configure a plurality of sub-carrier intervals on the same frequency band, thereby ensuring that different bandwidth requirements corresponding to different applications are satisfied on the same bandwidth. In addition, the present invention prevents a UE from determining a sub-carrier interval by blind detection, thereby reducing the complexity of the UE. | 2022-09-01 |
20220278801 | DEVICE AND METHOD FOR DETECTING INTERFERENCE BETWEEN BASE STATIONS IN WIRELESS COMMUNICATION SYSTEM - Disclosed is a 5th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4th generation (4G) communication system, such as long term evolution (LTE). The purpose of the disclosure is to detect interference between base stations in a wireless communication system, and a base station operating method can comprise the steps of: receiving signals through a resource allocated for reference signals (RSs) for interference measurement; detecting at least one RS on the basis of the signals; and determining that at least one among the RSs has been received on the basis of cross-correlation values between candidate RSs. | 2022-09-01 |
20220278802 | METHOD AND APPARATUS FOR SETTING OCCUPATION TIME OF CHANNEL STATE INFORMATION PROCESSING UNIT OF TERMINAL IN WIRELESS COMMUNICATION SYSTEM - A method, performed by a terminal, of determining a channel state information processing unit (CPU) occupation time in a wireless communication system, according to an embodiment of the present disclosure, includes: receiving, from a base station, information indicating activation of a semi-persistent channel state information (CSI) report; receiving, from the base station, at least one CSI-reference signal (RS) for the semi-persistent CSI report; and determining a CPU occupation time for the semi-persistent CSI report based on at least one of a reception time point of the information indicating the activation of the semi-persistent CSI report or a reception time point of the at least one CSI-RS. The information indicating the activation of the semi-persistent CSI report is transmitted by being included in downlink control information (DCI) or a media access control control element (MAC CE). | 2022-09-01 |
20220278803 | AIR-TO-GROUND COMMUNICATION SCHEDULING - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a base station associated with a cell of a time division duplex communication system may determine a guard interval that is less than a maximum time delay, based at least in part on a radius of the cell, for air-to-ground communications; and transmit a scheduling configuration to a user equipment that identifies the guard interval. Numerous other aspects are provided. | 2022-09-01 |
20220278804 | INFORMATION INDICATION METHOD AND APPARATUS, TERMINAL DEVICE, AND NETWORK DEVICE - Embodiments of the present disclosure provide an information indication method and apparatus, a terminal device and a network device, the method includes: a terminal device receives first indication information sent by a network device, where the first indication information is used to indicate at least one of the following: a first MBMS service requiring to be received by a connected-state terminal device; a first MBMS service requiring HARQ feedback to be performed; a first MBMS service requiring CSI reporting to be performed; or a first MBMS service requiring beam management to be performed. | 2022-09-01 |
20220278805 | WIRELESS COMMUNICATION METHOD, ENHANCED NODE B AND USER EQUIPMENT - An integrated circuit includes reception circuitry and demodulation circuitry. The reception circuitry, in operation, controls receiving one or more repetitions of control information in a search space region. The search space region includes a first plurality of sub-regions of different lengths for a largest repetition number of the control information. The search space region includes a second plurality of sub-regions of different lengths for a second-largest repetition number of the control information. An interval of subframes to which the first plurality of sub-regions are mapped is greater than an interval of subframes to which the second plurality of sub-regions are mapped. The demodulation circuitry, in operation, controls performing a demodulation process of the one or more repetitions of the control information. | 2022-09-01 |
20220278806 | CHANNEL STATE INFORMATION PROCESSING CRITERIA - Some aspects of the present disclosure provide channel state information (CSI) processing criteria. A method that may be performed by a user equipment (UE) generally includes receiving, from a base station via a first bandwidth part (BWP), control signaling that triggers reporting at least one of a first channel state information (CSI) report associated with the first BWP or a second CSI report associated with a second BWP that is non-active, determining, based on an indication of an active downlink (DL) BWP change, at least one occupation time of one or more CSI processing units (CPUs) associated with the first CSI report or the second CSI report, and taking one or more actions based at least in part on the at least one occupation time. | 2022-09-01 |
20220278807 | TARGET PARAMETER DETERMINATION METHOD, COMMUNICATION NODE AND STORAGE MEDIUM - Provided are a target parameter determination method, a communication node and a storage medium. The target parameter determination method includes determining N types of information, where N is a positive integer, and a mapping relationship exists between the N types of information and a first-type set; and determining a target parameter according to the N types of information, where the target parameter includes at least one of a hybrid automatic repeat request (HARQ-ACK) parameter or a channel parameter. | 2022-09-01 |
20220278808 | UPLINK ACK/NACK AND SR IN SHORT DURATIONS - Systems, methods, computer-readable medium, and apparatus are disclosed that allow for control information to be provided in an efficient manner during short burst transmission. For example, an apparatus may be configured to receive downlink control information (DCI) that indicates an allocated resource from a base station. The apparatus may also receive data from the base station. The apparatus may generate a cyclically shifted sequence that corresponds to a sequence that is cyclically shifted based on at least one of an ACK or NACK for the received data and a SR. The apparatus may then transmit the cyclically shifted sequence in the allocated resource within one symbol period of a slot of a subframe to the base station. Thus, by transmitting the SR and the ACK/NACK in one symbol, control information for short burst transmissions can be provided in a more temporally efficient manner without adding excessive complexity to the UE. | 2022-09-01 |
20220278809 | METHOD AND APPARATUS FOR DETERMINING RESOURCES FOR PUCCH TRANSMISSION WITH ACKNOWLEDGMENT INFORMATION - Methods and apparatuses for determining and multiplexing acknowledgment information. A method for operating a user equipment includes receiving: information for first resources for physical uplink control channel (PUCCH) transmissions to provide hybrid automatic repeat request acknowledgement (HARQ-ACK) information in response to semi-persistently scheduled (SPS) physical downlink shared channel (PDSCH) receptions associated with a first radio network temporary identifier (RNTI) from a first set of RNTIs, and information for second resources for PUCCH transmissions to provide HARQ-ACK information in response to SPS PDSCH receptions associated with a second RNTI from a second set of RNTIs. The method further includes determining a first resource from the first resources for a first PUCCH to provide only: first HARQ-ACK information in response to first SPS PDSCH receptions associated with the first RNTI, and second HARQ-ACK information in response to second SPS PDSCH receptions associated with the second RNTI; and transmitting the first PUCCH. | 2022-09-01 |
20220278810 | METHOD OF UPLINK ACKNOWLEDGMENT FOR DOWNLINK DATA RECEIVED ON AN UNLICENSED BAND IN A RADIO ACCESS NETWORK - Upon receiving a first DCI that does not contain explicit indication about a group identifier and/or a new feedback indicator, the UE determines whether group-based acknowledgement feedback is active. If so, the allocates the first DCI to a default group. The UE determines whether to toggle a new feedback indicator value for the default group based on a comparison of field values in the first DCI and those in the default group. The UE then transmits on an uplink channel acknowledgement feedback of the first group to the base station for the downlink data according on the new feedback indicator. | 2022-09-01 |
20220278811 | DETERMINING CHANNEL STATE INFORMATION IN 5G OR OTHER NEXT GENERATION WIRELESS COMMUNICATION SYSTEMS WITH MULTIPLE TRANSMISSION POINTS - The described technology is generally directed towards using demodulation reference signal (DMRS)-based channel state information (CSI) reporting in a wireless communications network with multiple transmit-receive points (TRPs). A user equipment computes joint CSI based on received DMRS data, e.g., received with downlink data traffic from two TRPs, such as co-located or backhaul connected TRPs. The DMRS-based joint CSI is reported to the multiple TRPs for use in scheduling subsequent data traffic, which can increase data throughput, and can reduce the frequency of CSI-RS reporting, increasing overall efficiency. The network can activate and deactivate DMRS-based CSI reporting. | 2022-09-01 |
20220278812 | CELL SPECIFIC REFERENCE SIGNAL (CRS) MUTING FOR EVEN FURTHER ENHANCED MACHINE TYPE COMMUNICATION (EFEMTC) - A network device such as an evolved NodeB (eNB) or next generation NodeB (gNB) can configure a set of user equipment (UE) for cell reference signal (CRS) muting in order to provide better channel quality and power efficiency in communications. Where an eNB mutes CRS transmissions that are not needed by any UE, an improvement in downlink throughput and reduce connection drop rate can be generated. A CRS muting capability can be determined based on a user equipment (UE) capability information. According to the CRS muting capability of a UE, the CRS can be transmitted at frequency locations based on CRS muting configuration parameters. | 2022-09-01 |
20220278813 | CONFIGURING GUARD INTERVALS FOR MULTIPLE UPLINK CARRIERS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive a configuration that identifies a carrier that is to include a guard interval when transitioning between a first carrier and a second carrier for uplink transmissions. The UE may transmit the uplink transmissions according to the configuration. Numerous other aspects are provided. | 2022-09-01 |
20220278814 | WIRELESS SYSTEM WIDER BANDWIDTH CARRIER INDICATION - Methods and apparatuses for indicating carrier are disclosed. A method comprises transmitting a candidate carrier configuration, wherein the candidate carrier configuration includes at least one of a frequency position, a frequency offset, an operation mode, NRS information, CRS information, power offset and EUTRA system bandwidth of at least one candidate carrier. | 2022-09-01 |
20220278815 | METHOD AND DEVICE FOR CONFIGURING REFERENCE SIGNAL - Provided are a reference signal configuring method and device. The method includes: configuring a first-type parameter set of a first-type reference signal indicator, where the first-type parameter set includes N indicator elements, N is an integer greater than or equal to 1; generating first-type signaling according to the first-type parameter set, where the first-type signaling carries the first-type parameter set; and sending the first-type signaling to a second communication node. | 2022-09-01 |
20220278816 | METHOD FOR CONFIGURING BANDWIDTH FOR SUPPORTING BROADBAND CARRIER IN COMMUNICATION SYSTEM - Disclosed is a method for configuring a bandwidth for supporting a broadband carrier in a communication system. An operation method of a base station comprises the steps of: configuring a first bandwidth part and a second bandwidth part for a terminal; configuring a reserved resource for the first bandwidth part in a resource area in which the first bandwidth part and the second bandwidth part overlap; and performing an operation of transmitting or receiving a second data channel, which is scheduled to the second bandwidth part, together with the terminal by using the reserved resource. Therefore, the performance of the communication system can be improved. | 2022-09-01 |
20220278817 | REPEATER AND METHOD OF OPERATION THEREOF - Provided is a method of operating a repeater operating in a time division duplex (TDD) mode which comprises detecting a synchronization signal from a received signal, determining a type of a communication period based on the detected synchronization signal and controlling an operation of a signal linearizer based on the determined type of the communication period. | 2022-09-01 |
20220278818 | TIME SYNCHRONIZATION OF CONTROLLER - A controller includes circuitry configured to: synchronize a master clock with an external global clock and set a master time based on the master clock; synchronize a controller clock with the master clock and perform time synchronization to synchronize a controller time based on the controller clock with the master time; transmit controller time data indicating the synchronized controller time to at least one local device; set a plurality of time windows corresponding to a plurality of clock cycles of a clock signal for the time synchronization; determine whether one clock cycle of the plurality of clock cycles has started within one time window of the plurality of time windows, the one time window corresponding to the one clock cycle; and suspend the time synchronization corresponding to the one clock cycle, in response to determining that the one clock cycle has not started within the one time window. | 2022-09-01 |
20220278819 | TIMING DETECTION AND CORRECTION METHOD FOR A SLAVE DEVICE IN AN IO-LINK COMMUNICATION AND SLAVE DEVICE OF AN IO-LINK COMMUNICATION - A slave device for IO-Link communication with a master device, wherein the master device and the slave device operate on a common basic timing, the slave device including at least one Universal Asynchronous Receiver Transmitter (UART) module configured to detect an INIT request sent from the master device during communication setup, calculate an actual timing of the master device from the INIT request and correct an initial timing of the slave device to an actual timing of the slave device based on the actual timing of the master device. | 2022-09-01 |
20220278820 | TIME SYNCHRONIZATION OF LOCAL DEVICE - A controller includes circuitry configured to: receive global time data indicating a global time associated with an external global clock; synchronize an internal controller clock of the controller with the global clock based on the global time; set a controller time based on the synchronized controller clock; and transmit controller time data indicating the controller time to at least one local device through periodic communication. | 2022-09-01 |
20220278821 | Performance Aided Data Migration in a Distributed Storage Network - A method begins by a processing module of a storage unit of a storage network identifying a first storage format used to store a plurality of encoded data slices in a first memory of the storage unit and continues with the processing module determining to utilize another storage format for storage of the plurality of encoded data slices. The method then continues, with the storage unit selecting a second storage format for storage of the plurality of encoded data slices and initiating migration of the plurality of encoded data slices from the first storage format to storage using the second storage format. Finally, the method continues with updating a performance metric for at least a portion of the storage network while initiating migrating the plurality of encoded data slices. | 2022-09-01 |
20220278822 | LOW DEPTH AES SBOX ARCHITECTURE FOR AREA-CONSTRAINT HARDWARE - A substitution box, SBox, circuit that performs an SBox computational step when comprised in cryptographic circuitry. The SBox circuit comprises: a first circuit part comprising digital circuitry that generates a 4-bit first output signal (Y) from an 8-bit input signal (U); a second circuit part, configured to operate in parallel with the first circuit part and to generate a 32-bit second output signal (L) from the 8-bit input signal (U), wherein the 32-bit second output signal (L) consists of four 8-bit sub-results; and a third circuit part configured to produce four preliminary 8-bit results (K) by scalar multiplying each of the four 8-bit sub-results by a respective one bit of the 4-bit first output signal (Y), and to produce an 8-bit output signal (R) by summing the four preliminary 8-bit results (K). The first circuit part is configured to generate the 4-bit first output signal (Y) from the input signal (U) by performing a calculation that comprises a first linear matrix operation, a Galois Field (GF) multiplication, and a GF inversion (311); and the second circuit part is configured to generate the second output signal (L) from the input signal (U) by performing a calculation that comprises a second linear matrix operation. | 2022-09-01 |
20220278823 | A ROUND-FREE CRYPTOGRAPHIC HASHING DEVICE FOR SECURE AND LOW-LATENCY COMMUNICATIONS - A hashing circuit includes gates or combinations of gates, each being configured to asynchronously output a state value in response to a respective input to the gate or combination of gates. Each of a plurality of bit inputs is asynchronously coupled to one or more of the inputs to the gates or combinations of gates, and each of one or more of the outputted state values is asynchronously coupled to one or more inputs of other gates or combinations of gates, in combination with one or more of the bit inputs and/or one or more other outputted state values. All or some of the state values, or output bits from a logical function of all or some of the state values, or a combination of a first subset of the state values and a logical function of a second subset of state values, are provided as hash-circuit output bits. | 2022-09-01 |
20220278824 | Calculating Hash Values - Determining hash values based on at least two types of hash functions, utilizing a memory that is arranged to store at least one state to be used to determine hash values pursuant to a SHA-3 function, wherein hash values pursuant to any of a SHA-2 function or a SHA-1 function are determined based on the state. | 2022-09-01 |
20220278825 | Key Diversification in a Tracking Device Environment - A tracking device can use a permanent encryption key pair to encrypt a temporary private key that corresponds to a set of diversified temporary public keys. When a community mobile device subsequently detects the tracking device, the central tracking system provides a diversified temporary public key to the community mobile device. The community mobile device uses the diversified temporary public key to encrypt location data representative of a location of the community mobile device, and provides the encrypted location data to the central tracking system. When a user subsequently requests a location of the tracking device from the central tracking system, the central tracking system provides the encrypted temporary private key and the encrypted location data to a device of the user, and the device can decrypt the encrypted temporary private key using the permanent encryption key pair, and decrypt the encrypted location data using the decrypted temporary private key. | 2022-09-01 |
20220278826 | ENCRYPTED COMMUNICATION USING COUNTER MODE ENCRYPTION AND SECRET KEYS - A secret key is communicated to a receiver system. A one-time pad is generated using the secret key and a counter. An encrypted message is generated by performing an XOR operation on a first message using the one-time pad. The encrypted message and the counter are sent to the receiver system | 2022-09-01 |
20220278827 | KEY BROKER FOR A NETWORK MONITORING DEVICE, AND APPLICATIONS THEREOF - A key broker monitors network traffic metadata and determines which decryption keys are required at one or more packet brokers in order to decrypt relevant traffic required by various network monitoring devices. The key broker retrieves the required keys from a secure keystore distributes them, as needed, to the network packet brokers, and dynamically updates the decryption keys stored in the network packet brokers in response to changes in network traffic. | 2022-09-01 |
20220278828 | ONLINE PRIVACY PRESERVING TECHNIQUES - This document describes techniques that prevent the sharing or leakage of user information. In one aspect, a method includes receiving, by a first MPC server, a request for a selection criterion of at least one interest group to which a user of a client device belongs. The received request does not reveal an identifier of the client device to the first MPC server. In response to receiving the request, the first MPC server determines a set of ordered selection criterion of the at least one interest group retrieved from a cache of the first MPC server. The set of ordered selection criterion is transformed into a set of key/value pairs secured from being revealed by the second MPC server. The first MPC server transmits the set of key/value pairs to the second MPC server with data that enables the second MPC server to identify a key having a highest value. | 2022-09-01 |
20220278829 | SHARE GENERATING DEVICE, SHARE CONVERTING DEVICE, SECURE COMPUTATION SYSTEM, SHARE GENERATION METHOD, SHARE CONVERSION METHOD, PROGRAM, AND RECORDING MEDIUM - A share generating device obtains N seeds s | 2022-09-01 |
20220278830 | SECURE INFORMATION SHARING SYSTEMS AND METHODS - Some embodiments relate to systems and method for secure information sharing using an information sharing engine. The information sharing engine configured to manage data access keys and data access control configuration, store the data access keys and data access control configuration on a distributed ledger network and selectively retrieve the data access keys from the distributed ledger network based on the data access control configuration. | 2022-09-01 |
20220278831 | Discovery Method and Apparatus Based on Service-Based Architecture - A discovery method and apparatus based on a service-based architecture, where the method includes a control network element sending a discovery response to a first functional network element, where the discovery response includes a determined security parameter and an access address or an identifier of a second functional network element. The first functional network element receives the discovery response from the control network element, and sends an access request to the second functional network element based on the address or the identifier of the second functional network element, where the access request includes the received security parameter. The second functional network element receives the access request from the first functional network element, verifies correctness of the security parameter, and determines, based on the correctness of the security parameter, whether the access request is authorized by the first functional network element. | 2022-09-01 |
20220278832 | COMPUTER NETWORK APPARATUS - A first computer network | 2022-09-01 |
20220278833 | PUBLIC KEY EXCHANGE WITH AUTHENICATED ECDHE AND SECURITY AGAINST QUANTUM COMPUTERS - Elliptic Curve Cryptography (ECC) can provide security against quantum computers that could feasibly determine private keys from public keys. A server communicating with a device can store and use PKI keys comprising server private key ss, device public key Sd, and device ephemeral public key Ed. The device can store and use the corresponding PKI keys, such as server public key Ss. The key use can support all of (i) mutual authentication, (ii) forward secrecy, and (iii) shared secret key exchange. The server and the device can conduct an ECDHE key exchange with the PKI keys to mutually derive a symmetric ciphering key K | 2022-09-01 |
20220278834 | LONG-DISTANCE QUANTUM KEY DISTRIBUTION - A system and method for determining a secret cryptographic key shared between a sending unit and a receiving unit by using a communication channel comprising spatially separated amplifiers for secure long-distance communication includes transmitting a sequence of electromagnetic pulses via the communication channel through the amplifiers for establishing a shared secret cryptographic key, wherein each electromagnetic pulse corresponds to a bit of a random bit sequence according to a ciphering protocol, and at least one ciphering parameter is determined by maximizing the expected key generation rate using an information theory model, wherein a measured signal loss and at least one amplification parameter are taken into account as input parameters to the information theory model. | 2022-09-01 |
20220278835 | Application Function Key Derivation and Refresh - Apparatuses, systems, and methods for application function (AF) key generation and AF key renewal. A user equipment device (UE) may communicate with an application function (AF) via a radio access network (RAN) using a first AF key and determine that the first AF key has expired. The UE may derive a second AF key based on at least an Architecture for Authentication and Key Management for Applications (AKMA) anchor key (KAKMA) and a counter parameter and communicate with the AF via the RAN using the second AF key. At least one of the UE, the AF, and/or an AKMA Anchor Function (AAnF) may be configured to monitor expiration of the first AF key based on an associated lifetime of the first AF key. The first and second AF keys may be derived using a key derivation function that includes at least one variable parameter. | 2022-09-01 |
20220278836 | Device ID for Memory Protection - There is disclosed in one example a computing system, including: a processor; a memory; and a memory encryption engine (MEE) including circuitry and logic to: allocate a protected isolated memory region (IMR); encrypt the protected IMR; set an access control policy to allow access to the IMR by a device identified by a device identifier; and upon receiving a memory access request directed to the IMR, enforce the access control policy. | 2022-09-01 |
20220278837 | SYSTEM AND METHOD FOR TRUSTED CONTROL FLOW ENFORCEMENT USING DERIVED ENCRYPTION KEYS - A system includes a communication channel monitor configured to calculate a hash value of a first encrypted code segment based on a measurement. A security module may derive a first encryption key using a key decryption function operation from the hash value of the first encrypted code segment. A processor decrypts the first encrypted code segment with a seed key retrieved from a storage device, and if the decryption is successful then executes the first decrypted code segment. The processor may retrieve a second one of the encrypted code segments, wherein the second encrypted code segment is a next encrypted code segment for execution after the first encrypted code segment according to a sequence of execution, decrypt the second encrypted code segment with the first encryption key, and if the decryption is successful then execute the second decrypted code segment. | 2022-09-01 |
20220278838 | SYSTEM AND METHODS FOR ENCRYPTION BASED ON ENVIRONMENTAL FACTORS - A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to measure one or more environmental factors; convert the one or more environmental factors to entropy values by truncation or rounding of the one or more environmental factors to a selected number of bits; and combine the entropy values to generate an encryption key. The one or more environmental factors may include a location of the computer system, a current date and time, parameters of a network environment to which the computer system is connected, or an identification of a server to which the computer system is connected. The at least one processor is further configured to encrypt and/or decrypt at least a portion of a data file and/or at least a portion of a binary executable application using the encryption key. | 2022-09-01 |
20220278839 | Privacy Solutions for Cyber Space - Developing a cyber security protocol to enable two members of a community to conduct a conversation without revealing neither their identity, nor the fact that a conversation took place. Secret randomized matching is used to allow people to claim certain personal attributes like age, place of residence, having a license, but without exposing their individual identity. | 2022-09-01 |
20220278840 | UTILIZATION MANAGEMENT SYSTEM, MANAGEMENT DEVICE, UTILIZATION CONTROL DEVICE, USER TERMINAL, UTILIZATION MANAGEMENT METHOD, AND PROGRAM - The present invention reduces security risks while improving the convenience of use management technology for a usage target object. A utilization control device ( | 2022-09-01 |
20220278841 | METHODS AND SYSTEMS FOR DISTRIBUTED CRYPTOGRAPHICALLY SECURED DATA VALIDATION - Methods and systems for cryptographically secured data validation. The system includes a first validator. The first validator is designed and configured to receive a first instance of an immutable sequential data structure containing at least a first digitally signed textual element containing at least a first physical asset transfer field populated with a at least a first physical asset transfer datum and at least a second digitally signed textual element generated by a second validator. The first validator authenticates the first instance of the immutable sequential data structure. The first validator generates at least a second validity indicating a determination by the first validator as to the accuracy of the at least a first physical asset transfer field. The first validator detects a conflict between the first validity flag and the second validity flag. The first validator transmits to the at least a second validator an indication of the conflict. | 2022-09-01 |
20220278842 | TECHNIQUES FOR USING SIGNED NONCES TO SECURE CLOUD SHELLS - Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure shell instance and may configure the secure shell instance, being described by a shell identifier of the secure shell instance. The techniques also include generating, by the session manager service, a nonce token and providing the shell identifier, and a router address of the secure shell router to the user device. The techniques also include generating, by the session manager service, a signed nonce token using the nonce token; and providing the signed nonce token and the shell identifier to a user device. | 2022-09-01 |
20220278843 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR KNOWLEDGE PROOF IN BLOCKCHAIN TRANSACTIONS - A method of enabling knowledge proof in a blockchain transaction is disclosed. The method comprises sending, from a verifier to a prover, a blockchain transaction redeemable by means of data including (i) first data (y) based on a combination of an ephemeral key (r), second data (c) and a private key of a public-private key pair of a cryptography system, wherein the public key (v) is based on an integer generator raised to a first power, wherein the first power is based on the private key, and wherein knowledge of the private key is required in order to determine the ephemeral key from the first data, and (ii) third data (x) based on the integer generator raised to a second power, wherein the second power is based on the ephemeral key. | 2022-09-01 |
20220278844 | SYSTEMS AND METHODS PROVIDING SPECIALIZED PROOF OF CONFIDENTIAL KNOWLEDGE - Systems and methods for verifying proofs generated from shared data without revealing the shared data are provided. In one aspect, a method comprises receiving, from a first node, a first proof generated from a first private key associated with the first node and data shared between the first node and a second node; receiving, from the second node, a second proof generated from a second private key associated with the second node and the shared data; verifying, without revealing the shared data, the first proof and the second proof were both generated from the shared data with a first public key mathematically related to the first private key, and a second public key mathematically related to the second private key; and preforming an action based on the verification of the first proof and the second proof both being generated from the shared data. | 2022-09-01 |
20220278845 | HONEST BEHAVIOR ENFORCEMENT VIA BLOCKCHAIN - An example operation may include one or more of establishing a communication channel between a sending system and a receiving system, executing an oblivious transfer protocol between the sending system and the receiving system via the established communication channel, wherein the oblivious transfer protocol provides the receiving system with a functional encryption key based on a data vector of the receiving system without the sending system learning the data vector, committing to the functional encryption key using a cryptographic commitment and signing the functional encryption key commitment with a digital key of the receiving system, and storing the signed functional encryption key commitment to a blockchain. | 2022-09-01 |
20220278846 | SYSTEMS AND METHODS FOR VERIFYING OR ENSURING COMMUNICATION PATHS - In some instances, a method for verifying communication paths is provided. The method comprises: obtaining, from a first user device, a request to access content associated with a relying party system, wherein the request indicates user credentials and a first session identifier (ID); obtaining one or more quick response (QR) codes and a second session ID associated with a first QR code of the one or more QR codes, wherein the relying party system generates and provides the first QR code to the first user device; and verifying the first session ID and the second session ID, wherein the relying party system grants the first user device access to the requested content based on the verification. | 2022-09-01 |
20220278847 | HASH CONTRACT GENERATION AND VERIFICATION SYSTEM - A hash contract is disclosed herein. A hash contract may be a value generated by a device using a hash function. The hash contract itself may represent a legally enforceable contract. The hash contract may be structured in a manner such that a device operated by a contracting party can transmit a legally enforceable contract over a network using a smaller file size than is possible with conventional secure transaction techniques. In addition, the manner in which the hash contract is generated allows a receiving device to verify that the contract elements of the contract are as expected and to verify an identity of a user that allegedly accepted the contract. Thus, even if a malicious user attempts to alter contract elements or perform other fraudulent activity, the receiving device can use the hash contract to identify such activity and prevent a transaction from being completed. | 2022-09-01 |
20220278848 | CERTIFYING AUTHENTICITY OF DATA MODIFICATIONS - An example operation may include one or more of receiving, at a data provider, a data file from a data modifier which comprises a modification to an initial content state of a data file, generating a hash value of the initial content state of the data file prior to modification and generating a hash value of a modified content state of the data file after the modification, and transmitting the generated hash values to a blockchain peer node for inclusion within one or more data blocks among a hash-linked chain of data blocks. | 2022-09-01 |
20220278849 | HASH SUBTREES FOR GROUPING COMPONENTS BY COMPONENT TYPE - A system for generating a hash tree with components grouped by component type is provided. Each non-leaf node of the hash tree has a hash of the hashes of its child nodes, and a leaf node has a hash of a component of the hash tree. The system generates, for each component type, a component subtree for that component type based on the leaf nodes that have hashes of the components of that component type. The system then generates a root subtree of the hash tree based on leaf nodes that are the root nodes of the component subtrees. The combination of the root subtree and the component subtrees form the hash tree. | 2022-09-01 |
20220278850 | SYSTEMS AND METHODS FOR SECURE DATA TRANSMISSION - The present disclosure relates to systems and methods for transmitting data. The methods may include obtaining, by a first module, a first packet, wherein the first packet includes a first random code, first data, and a first signature, wherein the first signature is generated by a second module by encryption based on an original random code and original data; generating, by the first module a second signature by encryption based on the first random code and a checksum of the first data; and generating, by the first module, a first response to the first packet upon determining whether the second signature matches the first signature. | 2022-09-01 |
20220278851 | SYSTEMS AND METHODS FOR MANAGING DIGITAL RIGHTS - Systems and methods are described for managing digital rights. A transaction may be generated and may comprise an identifier and a decryption key. The decryption key may be configured to decrypt at least a portion of an encrypted content asset accessible by one or more user devices. The transaction may be caused to be stored in a distributed database. | 2022-09-01 |
20220278852 | A DIALYSIS MACHINE, A FLUID PREPARATION DEVICE, AND METHODS FOR ESTABLISHING SECURE COMMUNICATION BETWEEN A DIALYSIS MACHINE AND A FLUID PREPARATION DEVICE - The present disclosure relates to establishing secure communication between a dialysis machine and a fluid preparation device. In an example, a dialysis machine includes a control unit configured to establish a short-range wireless connection with an external fluid preparation device. The control unit establishes the short-range wireless connection by causing a user interface to display a prompt to enter a passkey associated with a fluid preparation device, using the received passkey to pair with the fluid preparation device, and creating a new bonding table or write to an empty bonding table using the passkey. The control unit is also configured to generate a shared key using the passkey and at least one predetermined criterion and use the shared key to authenticate with the fluid preparation device. When authentication with the fluid preparation device is successful, the control unit enables data communication using the short-range connection with the fluid preparation device. | 2022-09-01 |
20220278853 | DECENTRALIZED PROTOCOL FOR MAINTAINING CRYPTOGRAPHICALLY PROVEN MULTI-PARTY-STATE-CHAINS UTILIZING AGGREGATED SIGNATURES - Systems and methods are disclosed for a decentralized protocol for maintaining cryptographically proven multi-party state chains utilizing aggregated signatures. In one implementation, a first link is received, the first link including a first private key generated with respect to a first user. A second private key is generated with respect to a second user. Using the second private key, a cryptographic signature of the first private key is computed. A second link is generated, the second link including the second private key, the cryptographic signature of the first private key, and one or more public keys. | 2022-09-01 |
20220278854 | Unity Protocol Consensus - A novel structured random sample consensus protocol to greatly improve blockchain and distributed ledger technology throughput and scalability, while maintaining decentralization and high levels of security. The invention leverages small committees of fixed sizes, called “Clans,” threshold cryptography, and logical virtual districts, called “Tribes,” in order to deterministically random sample disparate nodes for sentiment analysis on a transactions validity, thereby only requiring a relatively small subset of nodes to validate any particular transaction or batch of transactions thus enabling much greater concurrency and parallel processing compared to other more linearized consensus algorithms, while maintaining high security. | 2022-09-01 |
20220278855 | SECURE PROVISIONG OF BASEBOARD MANAGEMENT CONTROLLER IDENTITY OF A PLATFORM - Example implementations relate to a method and system for provisioning an identity certificate for a BMC of a platform. Based on the certificate signing request (CSR) received from the BMC, a certificate authority (CA) associated with the platform manufacturer may verify the identity of the security processor and private key of BMC. A cryptographic audit session log between a provisioning service of the platform and the security coprocessor of the platform is received along with the CSR at the CA implemented in a cloud system. The CA verifies the signature on the received cryptographic audit session log. After verification, validation tools at the cloud system determine a first time and second time associated with the security coprocessor. When the difference between the first time and the second time is below an expected time of cryptographic communication, the CSR is considered as a valid request and an identity certificate for the BMC is generated and transmitted to the platform. | 2022-09-01 |
20220278856 | 3D PRINTED PHYSICALLY UNCLONABLE WIRELESS SYSTEMS (PUWS) - Three-dimensional (3D) printing is implemented to introduce randomness into systems and devices that are being manufactured. 3D printed physically unclonable wireless systems (PUWS) provide flexibility in system package complexity, number of physically unclonable function (PUF) based security measures/types, and customization of the PUF parameters. Using flexibility and economics of 3D printing, PUWS can combine multiple PUF measures in a 3D package for cryptographic secret keys and introduce PUFs at the physical layer of the communication system. A 3D printed wireless system packaging concept is described herein where 3D printing parameters are randomized to 1) generate new physically unclonable functions (at the physical layer), 2) generate new physically unclonable functions within the system package (rather than at integrated circuit (IC) level), and 3) combine multiple physically unclonable functions (such as optical and electrical/VIA based ones) within single device structure. | 2022-09-01 |
20220278857 | COMMUNICATION NETWORK NODE, METHOD, AND MOBILE TERMINAL - The present disclosure provides a communication network node for providing data to a distributed ledger, wherein the node has circuitry configured to provide a special condition for a smart contract, and verify whether the special condition is met. | 2022-09-01 |
20220278858 | LEDGER VERIFIABLE-PRUNING SYSTEM - A ledger verifiable pruning system includes a skewed Merkle tree production module in which according to a linked list scheme, root hash value R | 2022-09-01 |
20220278859 | DIGITAL CONTRACTS USING BLOCKCHAIN TRANSACTIONS - A computer-implemented method of encoding a digital contract between first and second parties of a blockchain network, the digital contract being for transferring an amount of a digital asset from the first to the second party based on a condition being fulfilled; the method comprising: obtaining a plurality of data elements, each representing a different contract condition, wherein at least one of the conditions is linked to the second party; generating a hash tree based on the data elements, wherein the hash tree comprises: i) first leaf hashes generated by hashing a respective data element, and second leaf hashes comprising at least one hash key generated by hashing a secret value known only to the trusted third party, ii) internal hashes, and iii) a root hash; and making the root hash available to the first party for inclusion in a transaction of the blockchain. | 2022-09-01 |
20220278860 | SYSTEM, METHOD AND APPARATUS FOR DEVELOPING SMART CONTRACT - A system, a method and a device for developing a smart contract are provided. A particular embodiment of the system comprises a specification acquisition module configured to acquire specification of a target smart contract interface, a client development module configured to generate, on the basis of the specification of the target smart contract interface, a smart contract client side interface and a smart contract client side agent, the smart contract client side interface and the smart contract client side agent being used to construct a client smart contract application, and a server development module configured to generate, on the basis of the interface specification of the target smart contract, a smart contract server interface and a smart contract server skeleton, the smart contract server interface and the smart contract server skeleton being used to construct a server smart contract. | 2022-09-01 |
20220278861 | PERMISSION-CONTROLLED SMART CONTRACT UPGRADE METHOD AND SYSTEM BASED ON SMART CONTRACT, BLOCKCHAIN NODE, AND STORAGE MEDIUM - The present disclosure provides a permission-controlled smart contract upgrade method. The method first deploys a contract upgrade smart contract, and then deploys a smart contract to be upgraded including information of a required minimum number of agreements on passing a proposal related to the contract. Then, any of the blockchain nodes receives a contract upgrade proposal submitted by one of the plurality of user clients. After the contract upgrade smart contract determines to pass the proposal, a proposing event is generated and then is forwarded to each user client participating in the contract. After the user client receives the proposing event, the user client receives user's vote and feeds it back to the contract upgrade smart contract. If the number of agreements exceeds the required minimum number of agreements, the proposal is passed and employed, and a binary replacement is performed to complete upgrade of the smart contract. | 2022-09-01 |
20220278862 | SYSTEM FOR COMMUNICATION ON A NETWORK - Systems for communicating over a network and between two or more network connected devices. In particular, the disclosure reveals systems which may utilize multicast communication protocols to facilitate secure communication among one or more network connected devices. A system for secured messaging may include a network system including a first server, a second server and a first node. Further, the first server is configured to authenticate the first node for secure multicast messaging, and the second server is configured to authenticate the first node for secure multicast messaging. | 2022-09-01 |
20220278863 | GROUP OPERATION PROCESSING METHOD, APPARATUS, AND SYSTEM, DEVICE, AND STORAGE MEDIUM - A server system receives a group operation request transmitted by a client. The group operation request is generated by the client in response to a trigger operation of a target group chat function, and includes a target identity and a target group chat function identifier. The server system determines a target group chat function use permission corresponding to the target identity. In accordance with a determination, based on the target group chat function use permission and the target group chat function identifier, that a user corresponding to the target identity has a permission to use the target group chat function, the server system transmits group operation result information to the client. | 2022-09-01 |
20220278864 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - To provide an information processing system, an information processing device, an information processing method, and a recording medium capable of distributing special content for relieving a user's negative circumstances. | 2022-09-01 |
20220278865 | RULE-BASED MODELING FOR BUILDING CONTROL SYSTEMS - Rule-based modeling for building control systems is described herein. One device includes a memory, a user, interface, and a processor configured to execute executable instructions stored in the memory to display, in a single view on the user interface, a listing of all components of a facility controlled by a building control system, display, in an additional view on the user interface, a number of rules for mapping the components of the facility to a common model of the building control system, map the components of the facility to the common model by applying the number of rules to the components of the facility, and display, in the additional view on the user interface, the components of the facility that have been mapped to the common model. | 2022-09-01 |
20220278866 | HOSPITALITY PROPERTY MANAGEMENT TOOL AND SYSTEM AND METHOD FOR USE OF SAME - A hospitality property management tool and system and method for use of the same are disclosed. In one embodiment of the system, set-top boxes are located in respective rooms at a hospitality establishment. The set-top boxes are joined in network communication with environmental amenities, such as lights and a thermostat that respectively control lighting and temperature. The set-top boxes utilize an unoccupied room profile and occupied room profile to set the environmental conditions, such as lighting and temperature, in the rooms. A guest preference profile may be activated within a room to provide guest-specific environmental conditions in the room associated with the guest. | 2022-09-01 |
20220278867 | METHOD AND APPARATUS FOR LINKING AND CONTROLLING IOT DEVICES BASED ON APP TO APP COMMUNICATION IN WIRELESS LAN SYSTEM IN SMART HOME ENVIRONMENT - Provided are a method and apparatus for controlling an IoT controlee through a connection between applications in a wireless LAN system in a smart home environment. Specifically, the controller generates a control command message based on a first application. The controller transmits the control command message to a controlee based on a connection between the first application and the second application. The first and second applications are installed on the controller. The controlee is controlled by the second application. | 2022-09-01 |
20220278868 | LOAD CONTROL SYSTEM HAVING AUDIO OUTPUT DEVICES - A control system may comprise a plurality of audio output devices (e.g., controllable speakers), and a remote control device having at least one button for selecting a preset, where the preset defines different commands for at least two of the audio output devices. The at least two audio output devices may be configured to be controlled according to the different commands (e.g., starting, pausing, or stopping playback, adjusting volume, etc.) in response to an actuation of the button of the remote control device. The control system may also comprise a load control device, such as a dimmer configured to control an intensity of a lighting load to a predetermined intensity in response to the actuation of the button of the remote control device to select the preset. The audio output device may be configured to play a feedback signal indicating an operational characteristic of the dimmer. | 2022-09-01 |
20220278869 | VEHICLE INNER COMMUNICATION SYSTEM AND VEHICLE INCLUDING SAME - A vehicle inner communication system according to one embodiment can comprise: a plurality of electronic device groups provided in a vehicle; and a control unit, which uses bus communication individually connected to the electronic devices within the electronic device group and series communication by which the electronic devices inside the electronic device group are connected, so as to sense electronic devices within the electronic device group and control operations. | 2022-09-01 |
20220278870 | VEHICLE CONTROL DEVICE, VEHICLE CONTROL METHOD AND RECORDING MEDIUM IN WHICH VEHICLE CONTROL PROGRAM IS RECORDED - A vehicle control device including a communication section, a first microcomputer that can communicate with an exterior via the communication section and a second microcomputer that cannot communicate directly with the exterior and can communicate with the first microcomputer. The communication section receives a control signal from the exterior, based on the control signal received by the communication section, the first microcomputer controls operation of an object of control, and outputs the control signal to the second microcomputer. In a case in which a state of the object of control that corresponds to the control signal and a state exhibited by the object of control differ, the second microcomputer effects control so as to stop operation of the communication section. | 2022-09-01 |
20220278871 | METHOD, SYSTEM, AND GATEWAY FOR LINKING TIME-SENSITIVE FIELDBUSES - A method for linking a first time-sensitive fieldbus to a second time-sensitive fieldbus, wherein the first time-sensitive fieldbus includes a first subscriber device and has its own first time domain and wherein the second time-sensitive fieldbus includes a second subscriber device and has its own second time domain. The first time domain and the second time domain are frequency-synchronized, wherein the first and the second fieldbuses are connected to one another by a gateway for data transmission, wherein the method determines a first cycle duration of the first time domain and a second cycle duration of the second time domain by the gateway at a reference time. A time offset is determined between the first time domain and the second time domain by the gateway at the reference time. | 2022-09-01 |
20220278872 | METHOD, SYSTEM, AND GATEWAY FOR LINKING TIME-SENSITIVE FIELDBUSES - A method and system for networking a first time-sensitive field bus with a second time-sensitive field bus, the first time-sensitive field bus comprising a first subscriber device and having a first dedicated time domain and the second time-sensitive field bus comprising a second subscriber device and having a second dedicated time domain, the first and the second field buses being connected to each other with the aid of a gateway for data transmission. | 2022-09-01 |
20220278873 | METHOD, SYSTEM, AND GATEWAY FOR LINKING TIME-SENSITIVE FIELDBUSES - A method for networking a first time-sensitive field bus with a second time-sensitive field bus, the first time-sensitive field bus comprising a first subscriber device and having a first dedicated time domain, and the second time-sensitive field bus comprising a second subscriber device and having a second dedicated time domain. The first time domain and the second time domain being frequency-synchronized. The first and second field buses being connected to each other via a gateway. The method includes: storing a first subscriber device identifier in the memory of the gateway; storing a second subscriber device identifier in the memory of the gateway; determining a first cycle duration of the first field bus and a second cycle duration of the second field bus by the gateway at a reference time; and determining a time offset between the first and second time domain by the gateway at the reference time. | 2022-09-01 |
20220278874 | Autoconnect Virtual Private Network - Systems, apparatuses, and methods are described for automatically establishing a virtual private network (VPN) based on detecting a connection to a public network. A computing device may detect a connection to a public network. The computing device may determine whether the connection to the public network is secured and/or may determine a quality of that connection. If the connection is unsecure and/or if the quality satisfies a quality threshold, the computing device may establish a VPN session. | 2022-09-01 |
20220278875 | METHOD AND SYSTEM FOR RECIPROCITY-BASED CHANNEL ESTIMATION - Aspects of the subject disclosure may include, for example, receiving, via a combination of coherent modular antenna panels, pilot signals from a user equipment (UE) in single-user (Su)-multiple-input-multiple-output (MIMO) mode, wherein each modular antenna panel of the combination of coherent modular antenna panels comprises a group of antenna elements, resulting in multiple groups of antenna elements, and estimating an UL channel for the UE and a DL channel for the UE using channel vectors derived from the pilot signals, resulting in reciprocity-based channel estimation, wherein the estimating the DL channel using the channel vectors derived from the pilot signals reduces or eliminates a need to transmit, using each antenna element in the multiple groups of antenna elements, DL pilot signals for DL channel estimation, thereby reducing or eliminating overhead for the UE. Other embodiments are disclosed. | 2022-09-01 |
20220278876 | CHANNEL ESTIMATION METHOD AND APPARATUS - This disclosure provides channel estimation methods and apparatuses. One method includes: determining Ps initial sample channel matrices that indicate channel states, where the Ps initial sample channel matrices include P1 first sample channel matrices and Ps-P1 second sample channel matrices, the P1 first sample channel matrices are determined based on a previous sample channel matrix or a given reference signal, and Ps is an integer greater than 1, and determining a channel matrix based on the Ps initial sample channel matrices, and obtaining a channel estimation result. Because the P1 initial sample channel matrices in the Ps initial sample channel matrices are determined based on the previous sample channel matrix or the given reference signal, an initial channel estimation result may be provided as an iterative initial sample channel matrix. | 2022-09-01 |
20220278877 | METHOD AND APPARATUS FOR RECEIVING PPDU THROUGH BROADBAND IN WIRELESS LAN SYSTEM - Proposed are a method and an apparatus for receiving a PPDU in a wireless LAN system. Specifically, a reception STA receives a PPDU from a transmission STA through a broadband and decodes the PPDU. The broadband is a 320 MHz band or a 160+160 MHz band. The PPDU includes a first field and a second field. The first field includes an L-STF and an L-LTF. The first field is generated on the basis of a first phase rotation value. The first phase rotation value is generated on the basis of a second phase rotation value and a third phase rotation value. The second phase rotation value is obtained by repeating a phase rotation value for a 160 MHz band, defined in an 802.11ax wireless LAN system. | 2022-09-01 |
20220278878 | COMMUNICATION OF MOBILE STATION-SPECIFIC INFORMATION BEFORE A CYCLIC PREFIX - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, an mobile station (MS) may receive an indication of a cyclic prefix (CP) length for one or more subsequent communications and an indication that MS-specific information is to be transmitted before the CP for the one or more subsequent communications. The MS may receive the one or more subsequent communications having the MS-specific information transmitted before the CP. Numerous other aspects are described. | 2022-09-01 |
20220278879 | TRANSMISSION METHOD, TRANSMITTER APPARATUS, RECEPTION METHOD AND RECEIVER APPARATUS - Transmission quality is improved in an environment in which direct waves dominate in a transmission method for transmitting a plurality of modulated signals from a plurality of antennas at the same time. All data symbols used in data transmission of a modulated signal are precoded by hopping between precoding matrices so that the precoding matrix used to precode each data symbol and the precoding matrices used to precode data symbols that are adjacent to the data symbol in the frequency domain and the time domain all differ. A modulated signal with such data symbols arranged therein is transmitted. | 2022-09-01 |
20220278880 | TERMINAL AND RADIO COMMUNICATION METHOD - A terminal according to one aspect of the present disclosure includes: a control section that assumes that a frequency domain orthogonal cover code (FD-OCC) having a sequence length of a number larger than two is applied to a demodulation reference signal mapped to a pair of resource elements the number of which is greater than two and that are being different in frequency; and a transmitting/receiving section that performs transmission processing or reception processing of the demodulation reference signal, based on the FD-OCC. According to one aspect of the present disclosure, even when there are terminals according to different releases, each of the terminals can appropriately perform communication. | 2022-09-01 |
20220278881 | SOUNDING REFERENCE SIGNAL CONFIGURATION FOR FULL BANDWIDTH TRANSMISSION - A method, wireless device and network node for sounding reference signal (SRS) configuration for full bandwidth transmission are disclosed. According to one aspect, a method includes determining a sounding reference signal, SRS, pattern within a resource, the SRS pattern being based at least in part on at least one of a comb size, at least one comb offset, at least one cyclic shift and a number of orthogonal frequency division multiplexing, OFDM, symbols within the resource; and optionally, sending a configuration specifying the SRS pattern. | 2022-09-01 |
20220278882 | OPERATION METHOD OF SIDELINK TERMINAL RELATED TO CONSTELLATION SHIFT IN WIRELESS COMMUNICATION SYSTEM - According to an embodiment, an operation method of a terminal in a wireless communication system comprises the steps of: generating a first waveform from a signal related to a physical sidelink control channel (PSCCH) and generating a second waveform from a signal related to a physical sidelink shared channel (PSSCH); generating a third waveform on the basis of a peak to average power ratio (PAPR) and a constellation shift and transmitting the second waveform and the third waveform, wherein the constellation shift is applied only to the first waveform. | 2022-09-01 |
20220278883 | METHOD AND APPARATUS FOR RECEIVING PPDU VIA BROADBAND IN WIRELESS LAN SYSTEM - Proposed are a method and apparatus for receiving PPDU in a wireless LAN system. Specifically, a receiving STA receives a PPDU from a transmitting STA via broadband and decodes the PPDU. The broadband is a 320 MHz or 160+160 MHz bandwidth that is not preamble punctured. The PPDU includes a first field and a second field. The first field includes L-LTF. The PPDU includes a first signal field and a second signal field. The first field includes L-LTF. The first field is generated on the basis of one of a first, second, third or fourth phase rotation value. The first phase rotation value is a phase rotation value that obtains PAPR of the L-LTE optimized for the broadband on the basis of a first combination of RFs used for transmitting the PPDU. The first combination of RFs is a combination of 160 MHz-capable RFs or 320 MHz-capable RFs. | 2022-09-01 |
20220278884 | METHOD FOR D2D SIGNAL TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM, AND TERMINAL USING SAME - Provided is a method for device-to-device (D2D) signal transmission performed by a terminal in a wireless communication system, and a terminal device using the method. The method is characterized by: receiving measurement carrier (MEA_CARRIER) indication information which indicates a single downlink carrier to be used in downlink measurement and synchronization for D2D operation; and using, for the downlink measurement and synchronization for D2D operation, the single downlink carrier indicated by the measurement carrier (MEA_CARRIER) indication information. | 2022-09-01 |
20220278885 | METHOD AND APPARATUS FOR INITIAL CELL SEARCH AND SELECTION - A method performed by a base station may include transmitting a configuration message including at least information indicating a subset of a plurality of transmit beams to be used for transmitting a set of synchronization signals. The set of synchronization signals including a primary synchronization signal and a secondary synchronization signal may be transmitted. A random access channel (RACH) transmission may be received using a receive beam associated with one of the subset of the plurality of transmit beams used by the base station to transmit the set of synchronization signals. The transmitted set of synchronization signals transmitted may have a signal quality above a signal quality threshold. A reference signal may be transmitted along with a physical broadcast channel (PBCH) transmission. The reference signal may have a sequence derived from a beam index associated with the one of the subset of the plurality of transmit beams. | 2022-09-01 |
20220278886 | SIGNAL TRANSMISSION METHOD AND APPARATUS, REFLECTOR, AND RECEIVER - This application provides a signal transmission method and apparatus, a reflector, and a receiver. In one example method, a reflector receives W excitation signals, where W exciters may be configured to carry data and a reference signal that are reflected by the reflector; and the reflector reflects data and L reference signals to a receiver, where the L reference signals are respectively carried in L excitation signals in the W excitation signals, where W and L are both integers greater than or equal to 1, and L is less than or equal to W. | 2022-09-01 |
20220278887 | Pervasive Realtime Framework - A pervasive realtime framework supports the execution of realtime software applications with high-level functions that significantly reduce the effort and time needed to develop realtime software applications in a new operating environment paradigm in which realtime connections between network nodes are pervasive. The pervasive realtime framework handles the complex tasks of connecting to communicants, virtual areas, and other network resources, as well as switching those connections in response to user inputs and thereby enables software application developers to focus on developing high-level realtime software application functionality. | 2022-09-01 |
20220278888 | Pervasive Realtime Framework - A pervasive realtime framework supports the execution of realtime software applications with high-level functions that significantly reduce the effort and time needed to develop realtime software applications in a new operating environment paradigm in which realtime connections between network nodes are pervasive. The pervasive realtime framework handles the complex tasks of connecting to communicants, virtual areas, and other network resources, as well as switching those connections in response to user inputs and thereby enables software application developers to focus on developing high-level realtime software application functionality. | 2022-09-01 |
20220278889 | Automatic analysis of user experience issues to reduce resolution time - Systems and methods include monitoring user experience of one or more users accessing any of the Internet, cloud applications, and private applications; determining a user experience score for the one or more users; responsive to detecting a low user experience score for a user, performing one or more analyses on the user experience of the user; and determining a root cause of the low user experience score based on the one or more analyses. The systems and methods can include determining a remedial action for the user based on the root cause. | 2022-09-01 |
20220278890 | Method for Establishing High Resilient Active Recovery for BGP Route Reflectors - A recovery route reflector with a monitoring module and a BGP state establishment module is peered with a plurality of primary route reflectors. Each of the plurality of primary route reflectors is peered with a set of provider edge devices. The BGP state between the recovery route reflector and the plurality of primary route reflectors is periodically monitored. When a primary route reflector fails the BGP state between the recovery route reflector and the failed primary route reflectors is idle, and the recovery route reflector establishes a peer session with the provider edge devices that had been peered with the failed route reflector. | 2022-09-01 |
20220278891 | TECHNIQUES FOR ACTIVATING AND DEACTIVATING USER EQUIPMENT RELAYS - Methods, systems, and devices for wireless communications are described. A first user equipment (UE) may receive, via a communication link between the first UE and a base station, radio resource control (RRC) signaling which configures a relay communication sidelink for communicating message traffic between the first UE and a second UE for relay to the base station. The first UE may receive a control message via layer one (L1) signaling or layer two (L2) signaling which activates the relay communication sidelink configured by the RRC signaling. The first UE may then communicate, via the relay communication sidelink, a message for relay to or from the base station by the first UE or the second UE based on the control message. | 2022-09-01 |
20220278892 | DEVICE AND METHOD FOR CONTROLLING COMMUNICATION OF INFORMATION - An electronic device is provided that includes a housing that has a sensor mounting panel, and first and second sensors mounted in the housing and oriented to extend through the sensor mounting panel to face an environment of interest. The electronic device is operable to change an operating state, of the first sensor, between first, second and third operating states. The first operating state represents a network sharing state in which the first type of information collected by the first sensor is shared with the network resource through the communications interface. The second operating state represents a local state in which the first type of information is maintained locally on, and is solely accessible to, the one or more processors of the electronic device and is not shared with the network resource. | 2022-09-01 |
20220278893 | SENSOR DEVICE FOR THE TRANSMISSION OF A SENSOR PARAMETERIZATION - A sensor device for transmitting a sensor parameterization between sensors. The sensor device includes a first sensor with a sensor parameterization and a second sensor. The first sensor and the second sensor communicate with each other via a communication link. The first sensor sends the sensor parameterization to the second sensor via the communication link. The second sensor receives and accepts the sensor parameterization. The second sensor further provides the first sensor with the energy required to transmit the sensor parameterization via the communication link. | 2022-09-01 |
20220278894 | HARDWARE DEVICE ONBOARDING - A handover node may receive a first hardware device identifier transmitted by a hardware device and a second hardware device identifier transmitted by a manager node. The handover node may determine whether the first and second hardware device identifiers match and, as a result of determining that the first and second hardware device identifiers match, transmit contact information for the manager node to a hardware device. A manager node may receive a hardware device identifier that identifies a hardware device, transmit the hardware device identifier to a handover node, and transmit contact information for the manager node to the handover node. The contact information may include a port number of the manager node different than a port number used to communicate with the handover node. The manager node may receive a request to establish a communication session between the hardware device and the manager node. | 2022-09-01 |
20220278895 | NETWORK RESOURCE ACCESS INTERMEDIARY SYSTEM BASED ON RESOURCE PLUG-INS AND PROCESSING METHOD THEREFOR - The disclosure relates to a network resource access intermediary system based on resource plug-ins and a processing method therefor. The network resource access intermediary system based on resource plug-ins comprises an access intermediary base module and a resource plug-in in a communication connection with the access intermediary base module, wherein the access intermediary base module is used for receiving a resource access request, selecting a corresponding resource plug-in according to a target resource corresponding to the resource access request, and accessing the target resource through the selected resource plug-in; and the resource plug-in is adaptable to the target resource to complete access to the target resource. The workload of adapting an access intermediary to new resources is reduced for access intermediary developers, and an access intermediary that has been deployed and is in continuous operation can be upgraded and updated without affecting existing resource access. | 2022-09-01 |