42nd week of 2021 patent applcation highlights part 73 |
Patent application number | Title | Published |
20210328762 | VERIFIABLE SECRET SHUFFLE PROTOCOL FOR ENCRYPTED DATA BASED ON HOMOMORPHIC ENCRYPTION AND SECRET SHARING - The present disclosure involves systems, software, and computer implemented methods for a verifiable communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations, different blinding values, and use of random secret-shares. A protocol step includes homomorphic operations to shuffle encrypted secret input values so that resulting encrypted secret input values are rerandomized and in a shuffled sequence that is unmapped to an order of receipt by the service provider of the encrypted secret input values. | 2021-10-21 |
20210328763 | COMPUTATION-EFFICIENT SECRET SHUFFLE PROTOCOL FOR ENCRYPTED DATA BASED ON HOMOMORPHIC ENCRYPTION - The present disclosure involves systems, software, and computer implemented methods for a communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption. A service provider and multiple clients participate in a secret shuffle protocol of randomly shuffling encrypted client-specific secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a client-specific rerandomized encrypted secret input value. As a result, the client-specific rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values. | 2021-10-21 |
20210328764 | APPARATUS AND METHOD FOR DATA ANALYSIS - A method for data analysis according to an embodiment includes acquiring, from a client device, a ciphertext for a precomputation result generated by applying some of a plurality of operations for performing an analysis algorithm based on target data to the target data, and generating an encrypted computation result for remaining operations of the plurality of operations by using the ciphertext. | 2021-10-21 |
20210328765 | APPARATUS AND METHOD FOR ENCRYPTION, APPARATUS AND METHOD FOR CONVERTING CIPHERTEXT - A method for encryption according to an embodiment includes generating a ciphertext for a secret key that is an integer vector by using an integer-based first homomorphic encryption algorithm, generating a key stream that is the integer vector from a nonce and the secret key by using a key stream generator, encoding the key stream by using a message encoding function of the first homomorphic encryption algorithm, encoding a message that is a real vector by using a message encoding function of a real number-based second homomorphic encryption algorithm, generating a ciphertext for the message by using a result of the encoding of the key stream and a result of the encoding of the message, and transmitting the nonce, the ciphertext for the secret key, and the ciphertext for the message to an apparatus for converting a ciphertext. | 2021-10-21 |
20210328766 | METHOD AND APPARATUS FOR PROCESSING CIPHERTEXT BASED ON HOMOMORPHIC ENCRYPTION - A method and apparatus for processing a ciphertext based on homomorphic encryption. The method includes determining an approximate polynomial corresponding to a modulus reduction for bootstrapping a ciphertext based on samples extracted from the modulus reduction, and bootstrapping the ciphertext based on the approximate polynomial. | 2021-10-21 |
20210328767 | HASH UPDATING METHODS AND APPARATUSES OF BLOCKCHAIN INTEGRATED STATION - A cryptographic acceleration card included in a blockchain integrated station sends negotiation information to a provider of a new disk image, where the negotiation information is used by the provider to determine a deployment key, and where the new disk image is used to update an old disk image included in the blockchain integrated station. The cryptographic acceleration card receives a new hash value encrypted by the provider using the deployment key, where the new hash value corresponds to the new disk image. The cryptographic acceleration card replaces an old hash value corresponding to the old disk image with the new hash value, where the new hash value is compared with a current hash value of a disk image included in the blockchain integrated station to determine whether the disk image matches the new disk image. | 2021-10-21 |
20210328768 | OPTIMIZED CONVOLUTION FOR RECEIVED XOR ENCRYPTED DATA STREAMS - A receiver apparatus and method for optimized decryption and despreading of a very low frequency (VLF) bitstream is disclosed. In embodiments, the receiver includes antenna elements for receiving a transmission security (TRANSEC) encoded bitstream associated with an uncertainty window size and a spread factor. The receiver includes cryptographic processors that, when the spread factor is sufficiently large, select key section numbers A and data section numbers B based on the window size and spread factor. The cryptographic processors generate an output sequence of correlation windows, each correlation window associated with a symbol of the bitstream, via pipelined sectional mirrored-key convolution based on a key section number A and data section number B chosen to optimize performance (e.g., processor performance, memory performance). | 2021-10-21 |
20210328769 | SERVICE PROCESSING METHODS, APPARATUSES, DEVICES AND SYSTEMS - A message processing request is received from a channel partner device, where the message processing request includes a ciphertext message encrypted in a trusted execution environment (TEE) of a service provider device based on a service processing request that includes a plaintext message of the ciphertext message, and where the service processing request requests at least a portion of the plaintext message to be sent to a target user. A first smart contract deployed in a blockchain of the blockchain network is invoked using a TEE of a blockchain node of a blockchain network. The ciphertext message is decrypted based on the first smart contract to obtain the plaintext message. The plaintext message is sent to an operator device to forward the at least a portion of the plaintext message to the target user. | 2021-10-21 |
20210328770 | TRUST-VARIED RELATIONSHIP BETWEEN BLOCKCHAIN NETWORKS - An example operation includes one or more of establishing, by a first blockchain trust anchor node, a trusted connection to a trust anchor node of a second blockchain, detecting, by the first blockchain trust anchor node, changes of the first blockchain, and executing a smart contract to reflect the detected changes on the second blockchain. | 2021-10-21 |
20210328771 | GENERATING CRYPTOGRAPHIC RANDOM DATA FROM RAW RANDOM DATA - A device may store raw random data in a raw random data store. The raw random data may include a first plurality of data strings. The device may generate, using a quotient ring transform (QRT), cryptographic random data based on the raw random data. The cryptographic random data includes a second plurality of data strings that is transformed from the first plurality of data strings based on an extraction state stored in an extraction state store. The device may store the cryptographic random data in a cryptographic random data store and may use the cryptographic random data for various purposes. | 2021-10-21 |
20210328772 | Blockchain Management Platform for Performing Asset Adjustment, Cross Sectional Editing, and Bonding - Aspects of the disclosure relate to processing systems for performing cross-sectional asset editing. A computing platform may receive permission to perform a first subset of event processing steps. The computing platform may delegate permission to an external event processor to perform a second subset of event processing steps and to an external resource management platform to perform a third subset of event processing steps. The computing platform may generate an element chain corresponding to the account. In response to receiving a request to process an event, the computing platform may add a sub-element to the element chain containing a fixed parameter corresponding to an expected value associated with the event and a variable parameter corresponding to an actual value associated with the event. In response to receiving a request to write the actual value to the element chain, the computing platform may modify the variable parameter of the sub-element accordingly. | 2021-10-21 |
20210328773 | TRUSTED STARTUP METHODS AND APPARATUSES OF BLOCKCHAIN INTEGRATED STATION - A blockchain integrated station receives a startup instruction. The blockchain integrated station computes a current hash value of a disk image included in the blockchain integrated station. The blockchain integrated station sends the current hash value to a cryptographic acceleration card included in the blockchain integrated station. The blockchain integrated station receives, from the cryptographic acceleration card, a comparison result between a hash value stored in the cryptographic acceleration card and the current hash value. In response to determining that the comparison result indicates that the current hash value matches the hash value stored in the cryptographic acceleration card, the blockchain integrated station executes the disk image. | 2021-10-21 |
20210328774 | DEVICE UPDATE TRANSMISSION USING A BLOOM FILTER - A system includes a campaign management service to detect a campaign initiation request indicating a number of computerized devices to be updated for a campaign and store data corresponding to the computerized devices to be updated. The campaign management service can generate a bloom filter data structure comprising hash values based on the data for each of the computerized devices to be updated and transmit the bloom filter data structure to a network edge. The system can include the network edge that can use the bloom filter data structure from the campaign management service to determine whether a computerized device is to obtain a device update from the campaign management service. The network edge can retrieve the device update and modify the computerized device by transmitting the device update to the computerized device, which then installs it. | 2021-10-21 |
20210328775 | Method and Arrangement in a Telecommunication System - A method in a User Equipment (UE) of an Evolved Packet System (EPS) establishes a security key (K_eNB) for protecting Radio Resource Control/User Plane (RRC/UP) traffic exchanged with a serving eNodeB. The method comprises sending a Non-Access Stratum (NAS) Service Request to a Mobility Management Entity (MME), the request indicating a NAS uplink sequence number (NAS_U_SEQ). The method further comprises receiving an indication of the NAS_U_SEQ of the NAS Service Request sent to the MME, back from the MME via the eNodeB. The method further comprises deriving the K_eNB from at least the received indication of the NAS_U_SEQ and from a stored Access Security Management Entity-key (K_ASME) shared with said MME. | 2021-10-21 |
20210328776 | PROCESSING PERSONALLY IDENTIFIABLE INFORMATION FROM SEPARATE SOURCES - A method for data security including receiving a first recordset, said first recordset including a first poly-identifier representing a first personally identifiable information (PII), and a first contextual information, said first poly-identifier associated with a name field of a record in a PII structured data store. Also receiving at the server a second recordset, said second recordset including a second poly-identifier representing a second personally identifiable information (PII) and a second contextual information, said second poly-identifier comprised of unique characters associated with the name field of a record in the PII structured data store. Then comparing the first and second contextual information to calculate a correlation score to create a match table entry as a result of said comparing, said match table entry including both an internal ID and an external anonymous ID. The IDs may associate the contextual information between records to a single person. | 2021-10-21 |
20210328777 | MANAGEMENT OF ACCESS AUTHORIZATION USING AN IMMUTABLE LEDGER - The system can be for the management of access authorization using an immutable ledger comprising and can include a server having a computer readable medium in communications with an immutable ledger. A set of computer readable instructions can be included in the server and can be configured for: receiving a set of data, encrypting the set of data with a data-encryption-key and storing the encrypted data on the immutable ledger, creating a key tree having a node associated with a user, creating a key-encryption-key associated with the node and the user, and, distributing the key-encryption-key to the user wherein the key-encryption-key is configured to decrypt the data-encryption-key thereby providing access to the data for the user. | 2021-10-21 |
20210328778 | VERIFYING A RESULT USING ENCRYPTED DATA PROVIDER DATA ON A PUBLIC STORAGE MEDIUM - The present disclosure involves systems, software, and computer implemented methods for verifying encrypted data provider data on a public storage medium. One example method includes receiving a verification request to verify encrypted data provider data stored on a public storage medium. Public storage medium entries relevant to the verification request are identified and retrieved. A homomorphic cryptosystem is used to homomorphically calculate a first encrypted target function result based on encrypted data provider data. The homomorphic cryptosystem and a verifying entity cryptosystem are used to re-encrypt the first encrypted target function result to generate a second encrypted target function result that is encrypted under the verifying entity cryptosystem and not encrypted under the homomorphic cryptosystem. The second encrypted target function result is provided to the verifying entity, to enable the verifying entity to decrypt the second encrypted target function result and verify a target function result. | 2021-10-21 |
20210328779 | METHOD AND APPARATUS FOR FAST SYMMETRIC AUTHENTICATION AND SESSION KEY ESTABLISHMENT - The disclosure provides method, system and apparatus to provide authentication between one or more endpoints during an initial and subsequent boot cycles. In an exemplary application, an asymmetric-key cryptography is used only once to set up a persistent seed between the host and the device. After the initial setup, symmetric-key cryptography may be used with the agreed seed for authentication and session key establishment. The device wraps the persistent seed with device secrets and stores it on the host, hence secure NVM is not required on the device. The disclosed embodiments are particularly advantageous over the art of record as they provide authentications speeds of over 20,000 times faster than asymmetric-key cryptography. | 2021-10-21 |
20210328780 | TRUSTED DATA TRANSMISSION METHODS, APPARATUSES, AND DEVICES - Embodiments of the present specification disclose trusted data transmission methods, apparatuses, and devices. One method comprising: identifying a data use request of a data requestor; identifying authorization information of a data owner; generating a data use authorization claim based on the authorization information, wherein the data use authorization claim indicates that the data owner authorizes the data requestor to use data; obtaining initial data based on the data use authorization claim; verifying the initial data to obtain target data that is successfully verified, wherein the target data comprises a data validity claim indicating a validity of the target data; and sending the target data to the data requestor. | 2021-10-21 |
20210328781 | SECURE VEHICULAR COMMUNICATION - Secure vehicular communication is described herein. An example apparatus can include a processor and a vehicular communication component. The vehicular communication component can be configured to generate a vehicular private key and a vehicular public key, provide the vehicular public key to a plurality of external communication components wherein each respective one of the plurality of external communication components is positioned on a different transportation assistance entity, provide data to at least one of the plurality of external communication components, receive, in response to providing the data, additional data from the at least one of the plurality of external communication components, wherein the additional data is encrypted using the vehicular public key, and decrypt the additional data using the vehicular private key. | 2021-10-21 |
20210328782 | END-TO-END COMMUNICATION SECURITY - In one implementation, a method for providing end-to-end communication security for a controller area network (CANbus) in an automotive vehicle across which a plurality of electronic control units (ECU) communicate is described. Such an automotive vehicle can include, for example, a car or truck with multiple different ECUs that are each configured to control various aspects of the vehicle's operation, such as an infotainment system, a navigation system, various engine control systems, and/or others. | 2021-10-21 |
20210328783 | DECENTRALIZED KEY GENERATION AND MANAGEMENT - System and techniques for decentralized key generation and management are described herein. An information centric network (ICN) node receives a first ICN interest packet for public encryption parameters of an identity based encryption (IBE) key generation center (KGC). Public encryption parameters for the KGC are received in a first ICN data packet in response to the first ICN interest packet. The public encryption parameters are cached and used to respond a second ICN interest packet for the public parameters. A third ICN data packet may be received from the KGC in response to a key generation request. Here, the third data packet includes an indication that the third ICN data packet is part of a one-time session. Then, the third ICN data packet is transmitted without caching the third ICN data packet content based on the indication. | 2021-10-21 |
20210328784 | QUANTUM CRYPTOGRAPHIC DEVICE, QUANTUM CRYPTOGRAPHIC COMMUNICATION FEE CALULATION SYSTEM, AND QUANTUM CRYPTOGRAPHIC COMMUNICATION FEE CALCULATION METHOD - According to an embodiment, a quantum cryptographic device includes a memory and one or more processors coupled to the memory. The one or more processors are configured to: tabulate information on an application key transmitted and received by using a quantum cryptographic key and output an application-key information tabulation result; calculate a unit price of the application key based on the application-key information tabulation result; and display information that is display information including the unit price of the application key. | 2021-10-21 |
20210328785 | DOCUMENT CONTROL SYSTEM FOR BLOCKCHAIN - An example operation includes one or more of initiating a transaction of a blockchain by a contributing member of a group to assign a digital data based document to itself or to at least one other member of the group, validating a block of the blockchain associated with the transaction by the contributing member or the at least one other member that are verified, sending an ephemeral location of the document to the contributing member or the at least one other member that are verified, and modifying the document in the ephemeral location by the contributing member or the at least one other member that is verified. | 2021-10-21 |
20210328786 | BLOCKCHAIN INTEGRATED STATION AND CRYPTOGRAPHIC ACCELERATION CARD, KEY MANAGEMENT METHODS AND APPARATUSES - A cryptographic acceleration card generates, using an attribute unique to a blockchain integrated station that comprises the cryptographic acceleration card, an identity private key for the blockchain integrated station. The cryptographic acceleration card generates a private key ciphertext by encrypting the identity private key. The cryptographic acceleration card stores the private key ciphertext. | 2021-10-21 |
20210328787 | PROTECTING SECRET SOFTWARE AND CONFIDENTIAL DATA IN A SECURE ENCLAVE - A method of receiving and executing a secret software (G) on data in a secure enclave of a first device (DO) includes the following steps implemented in the secure enclave, that is to say a step of generating a public key (B), a step of receiving the encrypted secret software (G | 2021-10-21 |
20210328788 | SYSTEMS AND METHODS FOR DETECTING DATA INSERTIONS IN BIOMETRIC AUTHENTICATION SYSTEMS UTILIZING A SECRET - Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a Secret embedded into the data stream is compared to a Replica Secret upon receipt to confirm data transmission integrity. | 2021-10-21 |
20210328789 | CACHE MANAGEMENT FOR ENCRYPTION KEY ROTATION - Disclosed techniques relate to caching tenant encryption keys for a multi-tenant database. In some embodiments, a computing system encrypts data for a database in a multi-tenant database system using encryption keys assigned to respective tenants that are using the database. The computing system may store the encryption keys in a cache and, in response to a key rotation request for a first tenant, invalidate an entry in the cache for the first encryption key of the first tenant. The computing system may block writes for the first tenant until a new key is cached (e.g., based on retrieval from a key management system). In various embodiments, disclosed techniques may reduce encryption latency. | 2021-10-21 |
20210328790 | KEY ENCRYPTION HANDLING - An apparatus comprises an encryption key generator to generate a media encryption key to encrypt data in number of memory components, where the encryption key generator is configured to wrap the media encryption key to generate an encrypted media encryption key, The encrypted media encryption key is stored in a non-volatile memory. The apparatus comprises firmware having instructions to transition the apparatus to and from a secure state using the encrypted media encryption key. | 2021-10-21 |
20210328791 | BLOCKCHAIN DATA PROCESSING METHODS AND APPARATUSES BASED ON CLOUD COMPUTING - A blockchain integrated station initiates a ciphertext request to a server, where the ciphertext request includes first information associated with input data of an off-chain contract. The blockchain integrated station obtains, from the server, an execution result, where the execution result is obtained by the server by executing the off-chain contract using the input data. | 2021-10-21 |
20210328792 | PRIME NUMBER GENERATION FOR ENCRYPTION - A device may select a first pseudorandom integer within a range of integers. The device may generate a first candidate prime, based on the first pseudorandom integer, for primality testing. Based on determining that the first candidate prime fails a primality test, the device may select a second pseudorandom integer within the range of integers. The device may generate a second candidate prime, based on the second pseudorandom integer, for primality testing. The device may determine whether the second candidate prime satisfies the primality test. The device may selectively: re-perform, based on the second candidate prime failing the primality test, the selecting the second pseudorandom integer, the generating the second candidate prime, and the determining whether the second candidate prime satisfies the primality test, or using, based on the second candidate prime satisfying the primality test, the second candidate prime as a prime integer in a cryptographic protocol. | 2021-10-21 |
20210328793 | KEYLESS AUTHENTICATION SCHEME OF COMPUTING SERVICES - Techniques of keyless authentication of computing services in distributed computing systems are disclosed herein. One example technique includes upon receiving a command to instantiate a computing service, transmitting a request to an authentication service for an identity assertion token corresponding to an application execution of which instantiates the computing service. The example technique can also include upon receiving the requested identity assertion token, storing the received identity assertion token in the container and modifying an entry of a configuration file in the container that allows the instantiated computing service to access the stored identity assertion token and authenticate to the authentication service using the identity assertion token. | 2021-10-21 |
20210328794 | Applying Attestation Tokens to Multicast Routing Protocols - In one embodiment, method includes receiving, by a first network apparatus, a first multicast message from a second network apparatus. The first multicast message includes attestation-capability information associated with the second network apparatus and an attestation token. The attestation token is for proving that the second network apparatus is in a known safe state. The method also includes determining, by the first network apparatus, that the attestation-capability information satisfies a pre-determined attestation capability requirement and determining, by the first network apparatus, that the attestation token is valid for the second network apparatus at a current time. The method further includes establishing, by the first network apparatus, an adjacency to the second network apparatus. | 2021-10-21 |
20210328795 | PROVISIONING CONTROL APPARATUS, SYSTEM AND METHOD - A provisioning control apparatus is configured for coupling to a provisioning equipment server electrically connectable with an electronic device(s) for provisioning the electronic device(s) with a program code. The apparatus comprises: a communication interface configured to receive an electronic provisioning token including a provisioning counter indicating a total of transmissions of the program code towards the provisioning equipment server; and a processor configured to retrieve the provisioning counter from the received token. The interface can transmit the program code towards server; the processor can update a value of the counter for each transmission of the program code towards the server for an updated counter. The processor prohibits transmission of the program code towards the server if the updated counter indicates a total number of transmissions has been reached. A provisioning control system includes the provisioning control apparatus and a corresponding method for provisioning includes one or more electronic devices. | 2021-10-21 |
20210328796 | PROVISIONING CONTROL APPARATUS, SYSTEM AND METHOD - A provisioning control apparatus is configured for coupling to a provisioning equipment server electrically connectable with electronic device(s) for provisioning the electronic device(s) with a program code according to a first provisioning service tier of provisioning service tiers. The provisioning control apparatus comprises a communication interface for receiving an electronic provisioning token and a processor for determining the basis of the electronic provisioning token a second provisioning service tier afforded by the electronic provisioning token. The communication interface can transmit the program code towards the provisioning equipment server; the processor prohibits a transmission of the program code towards the provisioning equipment server if the second provisioning service tier afforded by the electronic provisioning token is insufficient for provisioning of the electronic device(s) by the provisioning equipment server in accordance with the first provisioning service tier. A provisioning control system comprises the apparatus and a method involves provisioning the electronic device(s). | 2021-10-21 |
20210328797 | SYSTEMS AND METHODS FOR USER-BASED AUTHENTICATION - A device that includes a secure element or a secure environment receives a token for authenticating a user that has an account with a service provider. The device generates, based on the token, a set of keys that include at least a private key and a public key. The device performs a key authentication procedure to compare the set of keys and a configured set of keys and selects a public key, of the set of keys or the configured set of keys, based on a result of the key authentication procedure. The device causes a device identifier of the device and the public key to be provided to another device that uses the device identifier and the public key to perform an authentication procedure to authenticate the user. The device receives, from the other device, an indication of whether the device is connected to a network. | 2021-10-21 |
20210328798 | Secure Compute Network Devices And Methods - The disclosure relates to technology for secure compute. One aspect includes a network device, comprising a non-transitory memory comprising instructions; and one or more processors in communication with the non-transitory memory storage. The one or more processors execute the instructions to receive and process routing requests in a network; send an indication into the network that the network device is able to perform secure computes; perform a secure compute based on an input received via the network from an input device; ensure that a result of the secure compute is trusted as a correct result of the secure compute; and provide the trusted result of the secure compute to a result device connected to the network. | 2021-10-21 |
20210328799 | AUTOMATED AUTHENTICATION OF A NEW NETWORK ELEMENT - The technology presented herein enables a new network element to be authenticated to other network elements automatically. In a particular embodiment, a method provides determining a current time relative to a first time. The first time is known to the new network element and a provisioning network element. The method further provides generating first beacon data using seed data stored on the new network element and the current time and generating keying data using the first beacon data and identification information associated with the new network element. The method also provides identifying a first one-time pad (OTP) from the keying data and using the first OTP to encrypt an authentication request for transfer from the new network element to the provisioning network element. | 2021-10-21 |
20210328800 | SYSTEM AND METHOD FOR AUTHORIZING CREDENTIALS VIA A VOICE ENABLED DEVICE - A method and a system are provided for secure authorization of credentials using a voice enabled device. The user device encodes encrypted authorization credentials into an inaudible soundwave and emits the soundwave via a speaker to the voice enabled device. The voice enabled device, while in a listening state, detects the inaudible soundwave via a microphone. The voice enabled device decodes the inaudible soundwave and transmits the cryptographically secured authorization information by the payment card system. | 2021-10-21 |
20210328801 | Systems and Methods to Verify Identity of an Authenticated User using a Digital Health Passport - The technology disclosed relates to authenticating users using a plurality of non-deterministic registration biometric inputs. During registration, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate sets of feature vectors. The non-deterministic biometric inputs can include a plurality of face images and a plurality of voice samples of a user. A characteristic identity vector for the user can be determined by averaging feature vectors. During authentication, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate a set of authentication feature vectors. The sets of feature vectors are projected onto a surface of a hyper-sphere. The system can authenticate the user when a cosine distance between the authentication feature vector and a characteristic identity vector for the user is less than a pre-determined threshold. | 2021-10-21 |
20210328802 | SYSTEM AND METHOD FOR PRE-AUTHENTICATION OF CUSTOMER SUPPORT CALLS - A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication to reduce the potential for malicious third-party impersonation of the client. Pre-authorized customer support calls are intelligently and efficiently routed in a manner that reduces the opportunity for malicious call interference and information theft. | 2021-10-21 |
20210328803 | BLOCKCHAIN-POWERED LEDGER FOR A DATA SUPPLY CHAIN - Aspects of the subject disclosure may include, for example, a device with a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including receiving a first record of sending a file and a hash for the file from a sender of the file; recording the first record on a blockchain; providing the first record to a receiver of the file; and monitoring a predetermined time period in which to receive a second record of receiving the file and the hash for the file. Other embodiments are disclosed. | 2021-10-21 |
20210328804 | Artificial Intelligence Modifying Federated Learning Models - Data verification in federate learning is faster and simpler. As artificial intelligence grows in usage, data verification is needed to prove custody and/or control. Electronic data representing an original version of training data may be hashed to generate one or more digital signatures. The digital signatures may then be incorporated into one or more blockchains for historical documentation. Any auditor may then quickly verify and/or reproduce the training data using the digital signatures. For example, a current version of the training data may be hashed and compared to the digital signatures generated from the current version of the training data. If the digital signatures match, then the training data has not changed since its creation. However, if the digital signatures do not match, then the training data has changed since its creation. The auditor may thus flag the training data for additional investigation and scrutiny. | 2021-10-21 |
20210328805 | CONSENSUS METHODS AND SYSTEMS IN CONSORTIUM BLOCKCHAIN - A consensus method and system in a consortium blockchain is provided. An example method includes, when a first consensus node in a consensus network of the consortium blockchain does not complete a consensus operation on target data on which a consensus is to be reached within a predetermined time period, the first consensus node broadcasts a ViewChange message in the consensus network based on a P set and a Q set constructed from an ECHO message. For a received ViewChange message, a second consensus node sends a ViewChangeACK message corresponding to the received ViewChange message to a second consensus primary node. When the second consensus primary node receives N−f−2 ViewChangeACK messages from consensus nodes, the second consensus primary node obtains identical P sets and a identical Q sets in the received ViewChange message. The second consensus primary node makes a view change decision based on the received ViewChange message. | 2021-10-21 |
20210328806 | DATA VERIFICATION METHODS, APPARATUSES, AND DEVICES - Examples in this application disclose data verification methods, media, and systems. One example method includes receiving, from a blockchain network by a trusted execution environment (TEE) in a blockchain node, a trigger instruction based on a timed starting logic identifying a starting time to execute a smart contract, where the timed starting logic is comprised in a chain code which comprises information of a blockchain account and is executable by the blockchain node to determine the information of the blockchain account, retrieving first encrypted data from a first institution, decrypting the first encrypted data, receiving a data sharing request comprising a user identity corresponding to user basic data from a second institution, retrieving the user basic data based on the user identity, performing verification processing of the user basic data based on the trigger instruction to obtain a verification result, and sending the verification result to the second institution. | 2021-10-21 |
20210328807 | STATELESS MUTUAL AUTHENTICATION BETWEEN SERVICES - A server computing system generates a universally unique identifier (UUID) associated with a first application, the UUID to be encrypted using a private key associated with the first application to generate a first digital signature. The server computing system generates a first session key associated with the first application, the first digital signature to be encrypted using the first session key to generate a first encrypted digital signature. The server computing system encrypts the first session key using a public key associated with a second application to generate a first encrypted session key, wherein the first application and the second application are deployed with the PaaS associated with the server computing system. The server computing system transmits the UUID, the first encrypted digital signature, and the first encrypted session key to the second application using hypertext transfer protocol (HTTP) to enable the second application to authenticate the first application. | 2021-10-21 |
20210328808 | DIGITAL SIGNATURE MANAGEMENT METHOD AND DIGITAL SIGNATURE MANAGEMENT SYSTEM - A digital signature management method includes generating an item of milestone data as a new item of signature target data every time the number of items of signature target data inputted reaches a predetermined value. Each item of signature record data includes a hash value of a corresponding item of signature target data, a hash value of an item of signature target data inputted immediately previously, and a signature for the hash value of the corresponding item of signature target data and the hash value of the item of signature target data inputted immediately previously. Each item of milestone data includes a hash value of at least one item of milestone data generated earlier, and hash values of items of signature record data corresponding to all items of signature target data inputted after generation of an immediately previous item of milestone data. | 2021-10-21 |
20210328809 | GENERATING A DOMAIN NAME SYSTEM CONTAINER IMAGE TO CREATE AN INSTANCE OF A DOMAIN NAME SYSTEM CONTAINER - A method is provided for storing at least one domain name system container image, wherein the domain name system container image is configured to create at least one domain name system container instance in a domain name system infrastructure. The method includes: creating at least one item of signed domain name system information, wherein the at least one item of signed domain name system information is created by a cryptographic signature of an item of domain name system information, wherein the cryptographic signature is created outside the domain name system server infrastructure; creating at least one domain name system container image, wherein the at least one domain name system container image has the signed domain name system information and at least one item of domain name system server software; and storing the at least one domain name system container image in a container registry. | 2021-10-21 |
20210328810 | METHODS AND APPARATUSES FOR PROCESSING TRANSACTIONS BASED ON BLOCKCHAIN INTEGRATED STATION - Computer-implemented methods, apparatuses, and system for processing transactions using a blockchain integrated station are provided. The blockchain integrated station includes a central processing unit (CPU) and a smart network card, wherein the smart network card comprises a processor different from the CPU. The smart network card is configured to receive a transaction of a blockchain network, wherein the blockchain integrated station is a blockchain node of the blockchain network; write the transaction into a cache; in a process that the blockchain integrated station participates in a blockchain consensus of the blockchain network, perform consensus interactions with other blockchain nodes of the blockchain network based on the transaction in the cache; determine, based on a result of the blockchain consensus, a to-be-executed transaction list; and send the to-be-executed transaction list to the CPU. | 2021-10-21 |
20210328811 | RECURSIVE TOKEN BINDING FOR CASCADED SERVICE CALLS - The present disclosure describes techniques that improve upon the use of authentication tokens as a means of verifying a user identify. A server is described that receives a service request to access a secure service provided by another service provider. The server may determine whether an additional secure service is required from a third-party server, and if so, generate a recursive authentication token for delivery to the third-party server. The recursive authentication token is intended to authenticate an identity of the server to the third-party server. | 2021-10-21 |
20210328812 | MESSAGE TRANSMISSION METHODS AND APPARATUSES - This specification provides a message transmission methods and apparatuses. One method includes: receiving a digital certificate sent by each blockchain node of a plurality of blockchain nodes in a blockchain relay communication network, wherein the digital certificate comprises identity information of each blockchain node of the plurality of blockchain nodes and a network identifier of a blockchain network of the blockchain relay communication network that comprises a corresponding blockchain node of the plurality of blockchain nodes; verifying that a digital signature of the digital certificate is authentic based on a public key of a certification authority (CA) issuing the digital certificate; and recording a mapping relationship between the identity information of each blockchain node of the plurality of blockchain nodes and the network identifier. | 2021-10-21 |
20210328813 | BLOCKCHAIN INTEGRATED STATIONS AND AUTOMATIC NODE ADDING METHODS AND APPARATUSES - A blockchain integrated station receives a configuration instruction after accessing a blockchain network. The blockchain integrated station configures, based on the configuration instruction, a first network address corresponding to a certificate authority center and a second network address corresponding to a first blockchain node in the blockchain network. The blockchain integrated station initiates an authentication request to the certificate authority center based on the first network address. The blockchain integrated station receives, from the certificate authority center, a digital certificate after the certificate authority center determines that the authentication request passes verification. The blockchain integrated station sends, based on the second network address, the digital certificate to the first blockchain node, where the digital certificate is used by the first blockchain node to add the blockchain integrated station as a new blockchain node in the blockchain network. | 2021-10-21 |
20210328814 | BLOCKCHAIN INTEGRATED STATIONS AND AUTOMATIC BLOCKCHAIN CONSTRUCTION METHODS AND APPARATUSES - A blockchain integrated station initiates a certificate authority service to generate a root certificate. The blockchain integrated station broadcasts the root certificate in a network that includes the blockchain integrated station. The blockchain integrated station receives an authentication application initiated by a node in the network. In response to a determination that the authentication application passes verification, a certificate is issued to the node based on the certificate authority service. | 2021-10-21 |
20210328815 | Secure Communication System And Software Architecture For A Digital License Plate - A digital license plate has a secure communication system able to initialize the digital license plate, support external communications, and have various antitheft features. In some embodiments, a communication module can transmit both vehicle identification number and digital license plate identifier to a central server. The central server is able to act in the event of a security mismatch to modify operation of the digital license plate. | 2021-10-21 |
20210328816 | BLOCKCHAIN INTEGRATED STATIONS AND AUTOMATIC NODE ADDING METHODS AND APPARATUSES - A blockchain integrated station receives a first configuration instruction after accessing a certificate authority network. The blockchain integrated station initiates an authentication application to a certificate authority center of the certificate authority network based on a first network address indicated in the first configuration instruction. The blockchain integrated station receives a digital certificate from the certificate authority center after the certificate authority center determines that the authentication application passes verification. The blockchain integrated station receives a second configuration instruction after accessing a blockchain network. The blockchain integrated station sends the digital certificate to a first blockchain node in the blockchain network based on a second network address indicated in the second configuration instruction, where the digital certificate is used to trigger the first blockchain node to add the blockchain integrated station as a new blockchain node in the blockchain network. | 2021-10-21 |
20210328817 | PHYSICALLY UNCLONABLE FUNCTION WITH PRECHARGE THROUGH BIT LINES - A physically unclonable function (PUF) includes a bit cell that includes a latch and a switch to selectively couple the latch to a supply voltage node. A first transmission gate couples a first bit line to a first internal node of the latch and a second transmission gate couples a second bit line to a second internal node of the latch. A digital to analog converter (DAC) circuit is selectively coupled to the first internal node through the first bit line and the first transmission gate and to the second internal node through the second bit line and the second transmission gate, to thereby precharge the latch before the first bit cell is read. The latch regenerates responsive to the switch being closed to connect the latch to the supply voltage node. The first and second bit lines are used to read the regenerated value of the latch. | 2021-10-21 |
20210328818 | SURVEY MECHANISM FOR A PHYSICALLY UNCLONABLE FUNCTION - A plurality of physically unclonable function (PUF) bit cells are surveyed by supplying a plurality of threshold control values to the PUF bit cells. Survey results associated with each of the threshold control values are evaluated to determine a threshold control pair having a positive threshold control value and a negative threshold control value among the plurality of threshold control values that results in a desired number PUF bit cells that are strong ones and that are strong zeros. | 2021-10-21 |
20210328819 | ADAPTIVE ENERGY EFFICIENT ETHERNET - An Ethernet transceiver is disclosed. The Ethernet transceiver includes transceiver circuitry having receiver circuitry to receive refresh signals during corresponding refresh cycles from a link partner during a low-power idle mode of operation. Each refresh signal has a refresh period, and where a quiet period is interposed between successive refresh cycles. Signal quality detection circuitry, during the low-power idle mode, determines a measure of signal quality associated with the received refresh signals. Subsequent refresh cycles exhibit at least one of an adjusted refresh period or an adjusted quiet period based on the measure of signal quality. | 2021-10-21 |
20210328820 | Capability Signaling In Wireless Communications - Wireless communications for capability signaling are described. A device may receive one or more parameters associated with capabilities of a wireless device. The device may determine one or more policy control provisions associated with a quality of service of wireless communication for the wireless device. | 2021-10-21 |
20210328821 | COMMUNICATION STATION AND INTERCOM NETWORK - A first communication station of an intercom network is used in combination with a second communication station of the intercom network. The first and second communication stations are configured for carrying out real-time audio communication with other communication stations of the intercom network. The first communication station and the second communication station each comprise operating elements actuatable to provide direct audio communication with at least one of the other communication stations of the network, an audio input and a connection port or a communication module for connecting the communication station with another communication station of the intercom network The first and second communication stations each have a functionality including at least one of display brightness, speaker volume, programming of the operating elements, and microphone sensitivity that can be set as respective parameters. | 2021-10-21 |
20210328822 | METHOD AND APPARATUS FOR PROVIDING DATA PRODUCED IN A CONFERENCE - A method for providing data produced in a conference, in which voice signals from participants in the conference are mixed in a conference bridge, can include provision of a time base that runs concurrently over the duration of the conference and setup of automatic identification of each participant when this participant speaks in the conference. The method also comprises capture of conversation contribution by each speaking participant to a conversation by the participants which is conducted during the conference as speaking time associated with each speaking participant at the conference, association of a time stamp with the speaking time, and production of statistical data by virtue of statistical evaluation of the speaking times of the participants. | 2021-10-21 |
20210328823 | MULTIFUNCTION CONTROL MODULE AND CORRESPONDING METHOD - A multifunction control module including a housing having a flat tabletop surface on an upper side and a channel defined by a sidewall extending downwardly from an opening through the flat tabletop surface. A movable section may be positioned within the channel and movable within the channel between a first position forming a part of the flat tabletop surface and a second position below the flat tabletop surface. A drive module may control the movement of the moveable section between the first position and the second position, and a position detection module may determine a position of the movable section. | 2021-10-21 |
20210328824 | VOICE ASSISTANT - Present teachings relate to a method for controlling a service running at least partially on an electronic device, the method comprising the steps of: —Determining, using a proximity sensor in the electronic device, a first parameter indicative of the physical distance between the electronic device and a user; and—Adapting at least one operation of the electronic device dependent upon the first parameter. | 2021-10-21 |
20210328825 | ADAPTIVE SUPERVISION SIGNALS - Systems and techniques are described for dynamically configuring and/or adjusting intervals for exchanging supervision signals between a control panel and an associated server system of a monitoring system located in a property. In some implementations, sensor data generated by one or more sensors of a monitoring system is obtained. A status of the property is determined based on the sensor data. A pinging frequency of the monitoring system is adjusted based on the status of the property. The pinging frequency specifies a frequency of communications between the server system and the control unit. The control unit is then configured to communicate with the server system according to the adjusted pinging frequency. | 2021-10-21 |
20210328826 | SYSTEMS AND METHODS FOR MODIFYING PLAYBACK OF A MEDIA ASSET IN RESPONSE TO A VERBAL COMMAND UNRELATED TO PLAYBACK OF THE MEDIA ASSET - Systems and methods are described for translating a non-playback command into a playback modification to encourage a recipient of the command to execute on the command. A media guidance application may determine a command from a first user to a second user. The media guidance application may compare the command to a set of playback operation commands for a media asset that is currently being played back. The media guidance application may determine that the command is not contained within the set of playback operation commands. In response to determining that the command is not contained within the set of commands, the media guidance application may determine whether the second user executes a desired outcome of the command. And in response to determining that the second user does not execute the desired outcome of the command, the media guidance application may determine whether to modify playback of the media asset. | 2021-10-21 |
20210328827 | BUS COUPLER FOR A NETWORK AND METHOD FOR OPERATING A BUS COUPLER - A bus coupler for a network, in particular for an optical ring network, includes: a bus participant interface for data connection to at least one bus participant device; a bus receiving interface for receiving bus input data via a bus line; a bus transmitting interface for transmitting bus output data via the bus line; and a control unit for generating bus output data based on participant input data received via the bus participant interface, the bus transmission data including bus control data, and to transfer the bus output data to a further bus coupler by the bus transmitting interface. The control unit specifies a control signal based on the bus input data received by the bus receiving interface and performs a relaying of the bus input data to the further bus coupler based on the specified control signal. | 2021-10-21 |
20210328828 | A System and Method for Establishing an Intervehicle Communication for at Least a First and Second Commercial Vehicle - A system for establishing an intervehicle communication for at least first and second commercial vehicles includes at least one wireless, wired, and/or physical communication line, wherein the communication line is bidirectional. At one point of the communication line, a first authentication code generation module is provided, which is dedicated to the first vehicle. At another point of the communication line, a second code processing module is provided, which is dedicated to the second vehicle. The first authentication code generation module is configured to send identification information, authentication information, and/or encryption keys. The second code processing module is configured to process and send back identification information, authentication information, and/or encryption keys, especially processed and/or modified identification information, authentication information, encryption keys. | 2021-10-21 |
20210328829 | MANAGING A SECOND RING LINK FAILURE IN A MULTI-RING ETHERNET NETWORK - Examples disclosed herein relate to managing a second ring link failure in a multi-ring Ethernet network. In an example, an inter-connection network node in a multi-ring Ethernet network comprising a major ring and a sub-ring may propagate a signal failure (SF) event, received in response to a second ring link failure in the major ring, to one or more nodes in the sub-ring. In response to receiving the SF event, a Ring Protection Link (RPL) on the sub-ring may be unlocked to allow network traffic through the RPL and avoid loop formation on the multi-ring Ethernet network. The sub-ring may be moved to the ring protection switching state; including performing a filtering database (FDB) flush at every node on the multi-ring Ethernet network whereby all MAC addresses and related port associations for traffic forwarding are cleared from the FDB. | 2021-10-21 |
20210328830 | System For Controlling Network Access Of Terminal Based On Tunnel And Method Thereof - A node includes: a communication circuit; a processor operatively connected to the communication circuit; and a memory operatively connected to the processor and storing a target application and an access control application, wherein the memory stores instructions that when executed by the processor, cause the node to: detect a network access event of the target application to a destination network through the access control application, identify whether a tunnel corresponding to identification information of the target application and the destination network and authorized by an external server exists, transmit a data packet of the target application through the authorized tunnel using the communication circuit, when the authorized tunnel exists, and drop the data packet of the target application, when the authorized tunnel does not exist. | 2021-10-21 |
20210328831 | MESSAGE TRANSMISSION METHODS AND APPARATUSES - One or more embodiments of this specification provide a message transmission method and apparatus applied to a relay node in a blockchain relay communication network. The method includes: receiving, by a relay node in a blockchain relay communication network, a plurality of message packets, each message packet configured to record a partial message content of a message to be transmitted; parsing, by the relay node, the plurality of message packets to obtain encapsulation information of the message to be transmitted, the encapsulation information configured to indicate a type of a blockchain message within the encapsulation information in the message to be transmitted; determining, by the relay node, that the encapsulation information indicates that the blockchain message is a block synchronization message; and forwarding, by the relay node, at least one of the plurality of message packets without receiving all of the plurality of message packets corresponding to the message to be transmitted. | 2021-10-21 |
20210328832 | Multi-part TCP connection over VPN - A method for improving VPN service transmission quality is disclosed where end-to-end TCP connections, occurring over a VPN tunnel, are terminated at the VPN concentrator and converted into multi-part TCP connections with MSS parameter set independently for each part of the connectivity. To facilitate the termination and multi-part connection management a packet processing software may be implemented as part of the VPN concentrator functionality or as an independent component. | 2021-10-21 |
20210328833 | COMMUNICATION SYSTEM AND METHOD OF CHANGING A SETTING - A communication system comprises a plurality of network elements and a management apparatus. Each of the network elements transfers a data signal. The management apparatus manages a line service provided by a network element as management object among the plurality of network elements. The management apparatus generates an authentication code corresponding to the network element as management object and notifies the generated authentication code to the network element as management object. The network element as management object, using the notified authentication code, judges whether or not to accept a change concerning the line service of the own network element. | 2021-10-21 |
20210328834 | PROGRAMMABLE INFRASTRUCTURE GATEWAY FOR ENABLING HYBRID CLOUD SERVICES IN A NETWORK ENVIRONMENT - An example method for a programmable infrastructure gateway for enabling hybrid cloud services in a network environment is provided and includes receiving an instruction from a hybrid cloud application executing in a private cloud, interpreting the instruction according to a hybrid cloud application programming interface, and executing the interpreted instruction in a public cloud using a cloud adapter. The method is generally executed in the infrastructure gateway including a programmable integration framework allowing generation of various cloud adapters using a cloud adapter software development kit, the cloud adapter being generated and programmed to be compatible with a specific public cloud platform of the public cloud. In specific embodiments, identical copies of the infrastructure gateway can be provided to different cloud service providers who manage disparate public cloud platforms; each copy of the infrastructure gateway can be programmed differently to generate corresponding cloud adapters compatible with the respective public cloud platforms. | 2021-10-21 |
20210328835 | METHOD AND SYSTEM OF OVERLAY FLOW CONTROL - In one aspect, A computerized method of a gateway distributing routes learned through routing protocols (RP) into a Border Gateway Protocol (BGP) includes the step of providing a first gateway that receives a route over a routing protocol. The method includes the step of with the first gateway, redistributing the route to one or more peer routers as a BGP route based on one or more specified criteria. The method includes the step of setting a gateway precedence based on the redistribution of the route to the one or more peer routers as the BGP route. The method includes the step of, based on the gateway precedence, setting a second gateway to automatically redistribute the route with different priorities to influence steering of traffic to a preferred gateway. | 2021-10-21 |
20210328836 | SMART GATEWAY DEVICES, SYSTEMS AND METHODS FOR PROVIDING COMMUNICATION BETWEEN HVAC SYSTEM NETWORKS - A smart gateway device for a first network associated with a building management system (BMS) is configured to discover a physical device and generate a new virtual device responsive to a determination that a device identifier of the physical device does not match any device identifiers in a virtual device registry. The virtual device registry provides mapping between the new virtual device and the physical device. One or more data points of the new virtual device correspond to one or more data points of the physical device. The smart gateway device is configured to receive data values for the one or more data points of the physical device and update the one or more data points of the new virtual device with the data values for the one or more data points of the physical device. The virtual device is configured to represent the physical device on the first network. | 2021-10-21 |
20210328837 | INPHASE AND QUADRATURE MISMATCH ESTIMATION PILOT SIGNALING - Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive pilot signaling associated with inphase and quadrature (IQ) mismatch estimation for a set of antennas of a base station. The UE may measure pilot signals for each of the set of antennas based on a pilot signal pattern of the pilot signaling, and calculate an estimation of an IQ mismatch for each antenna of the set of antennas of the base station based on measuring the pilot signals. The base station may receive, from the UE, a report including an indication of the estimation of the IQ mismatch for each antenna of the set of antennas of the base station based on the pilot signals. | 2021-10-21 |
20210328838 | REFERENCE SIGNAL CHANNEL ESTIMATION - Aspects of this disclosure relate to reference signal channel estimation. A wireless communication channel between two nodes can be estimated based on a received reference signal, such as a Sounding Reference Signal. Techniques are disclosed to improve performance of reference signal channel estimation and make channel estimates more robust in the presence of one or more of a variety of impairments. Frequency domain processing and/or time domain processing can be performed to reduce distortion in channel estimates. | 2021-10-21 |
20210328839 | PULSE-SHAPING FOR HIGH FREQUENCY RADIO NETWORKS - There is disclosed a method of operating a radio node in a wireless communication network. The method includes communicating utilising signaling, wherein communicating utilising signaling is based on performing pulse-shaping pertaining to the signaling. The disclosure also pertains to related devices and methods. | 2021-10-21 |
20210328840 | ALL DIGITAL NON-CONVENTIONAL CHAOTIC COMMUNICATION SYSTEMS FOR RESILIENT COMMUNICATIONS AND SIGNALING - An all-digital spread-spectrum type communications system employing chaotic symbol modulation. The system includes a transmitter having a symbol mapper that converts a series of information bits to a series of bit symbols, a digital chaos modulator employing an M-ary chaotic shift keying (M-CSK) architecture for chaotically spreading the bit symbols in the digital domain, where the chaos modulator includes a separate chaos generator for each of the M-CSK symbols, and a digital-to-analog converter (DAC) for converting the chaotic modulated bit symbols to an analog signal for transmission. The system also includes a receiver responsive to the analog signal from the transmitter and generating a received signal therefrom. The receiver performs signal acquisition and tracking on the received signal using a look-up table, a transmitter ID and a receiver ID in the received signal, de-spreading and de-modulation on the received signal and bit removal from the symbols in the received signal. | 2021-10-21 |
20210328841 | MILLIMETER WAVE TRANSMITTER - A millimeter wave (MMW) circuitry includes a phase modulation circuitry, a plurality of amplifier multiplier chain circuitries and a power combiner circuitry. The phase modulation circuitry is configured to receive input data and a plurality of divided input signals and to provide as output a plurality of phase modulation circuitry output signals. Each phase modulation circuitry output signal corresponds to a respective divided input signal. At least one phase modulation circuitry output signal has a nonzero phase relative to the divided input signals that is related to the input data. Each amplifier multiplier chain circuitry is configured to amplify and frequency multiply and phase multiply the respective phase modulation circuitry output signal to yield a respective power combiner input signal. The power combiner circuitry is configured to sum a plurality of power combiner input signals to yield an output signal. A modulation of the output signal is related to the input data. | 2021-10-21 |
20210328842 | SEQUENCE-BASED SIGNAL PROCESSING METHOD AND APPARATUS - This application provides a sequence-based signal processing method and apparatus. An example signal processing method includes: determining a sequence {x | 2021-10-21 |
20210328843 | NUMEROLOGIES FOR DISTRIBUTING AN EXCESS CYCLIC PREFIX DURING ORTHOGONAL FREQUENCY-DIVISION MULTIPLEXING - Orthogonal frequency-division multiplexing (OFDM) numerologies that maintain symbol boundary alignment while distributing excess cyclic prefixes (CPs) among OFDM symbols. Communication is established using a first sub-carrier spacing (SCS) and a first OFDM numerology, such as an exemplary numerology that distributes excess CP duration among a set of symbols that occupy a time interval within or equal to a corresponding time interval of a symbol of a second OFDM numerology with a second lower SCS. The first SCS may be, e.g., 960 kHz. The second SCS may be, e.g., 120 kHz. Another exemplary OFDM numerology described herein distributes the excess CP as prefix and postfix portions to one of the symbols, such as the first symbol of a set. Communication then proceeds using the first OFDM numerology at the first SCS and, in illustrative examples, using the second OFDM numerology at the second SCS or other OFDM numerologies at other SCSs. | 2021-10-21 |
20210328844 | METHOD AND APPARATUS FOR DOWNLINK CONTROL PHYSICAL STRUCTURE IN REDUCED LATENCY OPERATION - Control channel candidates can be transmitted in at least one shortened transmission time interval in a subframe and set of resource blocks corresponding to control channel candidates in the at least one shortened transmission time interval. A determination can be made about whether at least one resource block of the set of resource blocks at least partially overlaps with a broadcast control channel or signal. A determination can be made about control resource elements for transmission of a control channel candidate based on the determination about whether the at least one resource block of the set of resource blocks at least partially overlaps with the broadcast control channel or signal. The control channel candidate can be transmitted in the at least one shortened transmission time interval according to the determined control resource elements. | 2021-10-21 |
20210328845 | TRANSMISSION METHOD AND FIRST COMMUNICATION DEVICE - This disclosure provides a transmission method and a first communication device. The method includes: transmitting, by a first communication device, a target reference signal that belongs to a first type of reference signal in a case that the first communication device receives indication information from a second communication device and the indication information indicates transmission of the first type of reference signal, where a reference signal sequence of the first type of reference signal is generated based on a first characteristic. | 2021-10-21 |
20210328846 | Method for Peak to Average Power Reduction of DM-RS Signals - A user equipment (UE) ( | 2021-10-21 |
20210328847 | MULTI-USER MULTIPLE-INPUT MULTIPLE-OUTPUT (MU-MIMO) PEAK-TO-AVERAGE-POWER RATIO (PAPR) REDUCTION - Methods related to wireless communication systems and reducing peak-to-average-power ratio (PAPR) in MU-MIMO transmissions are provided. A base station (BS) generates a plurality of communication signals including data for a plurality of user equipment (UE) devices in a plurality of serving beam subspaces. The BS may also generate a peak-to-average-power ratio (PAPR) reduction signal for one or more of the plurality of communication signals. A first portion of the PAPR reduction signal is in a first serving beam subspace of the plurality of serving beam subspaces based on a first error vector magnitude (EVM) associated with a first UE of the plurality of UEs. A second portion of the PAPR reduction signal is in a non-serving beam subspace. The BS may also transmit, to the plurality of UEs, the plurality of communication signals and the PAPR reduction signal. Other features are also claimed and described. | 2021-10-21 |
20210328848 | TRANSMISSIONS USING DISCRETE SPECTRA - Methods, apparatus, and systems for efficiently utilizing scattered narrow spectra without introducing interreference among adjacent frequency bands are described. In one example aspect, a wireless communication method includes determining a set of time-domain symbols by applying an inverse Fourier transform to data modulated on multiple subcarrier groups. Each subcarrier group comprises one or more subcarriers and adjacent subcarrier groups are separated by one or more unused subcarriers, and each symbol has a symbol length of T0. The method includes determining a set of modulated time-domain symbols each having a length of N×T1 by modulating the set of time-domain symbols using a waveform function, where N is a real number greater than 1. The method includes transmitting the set of modulated time-domain symbols. | 2021-10-21 |
20210328849 | DATA TRANSMISSION METHOD AND APPARATUS IN WIRELESS LOCAL AREA NETWORK - An HE-LTF transmission method is provided, including: determining, based on a total number N | 2021-10-21 |
20210328850 | USER EQUIPMENT INITIATED DATA AIDED PHASE TRACKING REFERENCE SIGNALS - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may transmit a request, for an uplink transmission or a downlink transmission, for data aided phase tracking reference signals (PT-RSs); and communicate the uplink transmission or the downlink transmission based at least in part on the request. Numerous other aspects are provided. | 2021-10-21 |
20210328851 | FREQUENCY DIVISION MULTIPLE ACCESS COMMUNICATION METHOD BASED ON HARMONIC MODULATION TECHNOLOGY - A method is disclosed that divide a total frequency band of a communication system into several equally spaced non-overlapping information channels, which are allocated to different users; the information channels are in one-to-one correspondence with the users; user signals from different addresses are distinguished based on frequency, thereby completing the multiple access connection; and duplex communication between two users uses a fundamental frequency and harmonics for information transmission. A process of the information transmission is as follows: different information is first modulated and then is separately loaded on different harmonic components, different information is transmitted through different harmonic components or component combinations so that each pair of information channels can transmit N groups of different information at the same time, and finally the fundamental frequency and harmonic information received by a receiving end is demodulated to obtain all the transmitted information. | 2021-10-21 |
20210328852 | Systems and Methods for Supporting Both Pulse Amplitude Modulation and Quadrature Amplitude Modulation - Systems and devices are provided for receiving or transmitting IQ data (e.g., suitable for passband quadrature amplitude modulation (QAM)) over a wireline using pairs of baseband pulse amplitude modulation (PAM-n) signals. Encoding circuitry may map data from an input bit stream to IQ data that includes an in-phase component and a quadrature-phase component. Modulator circuitry may determine an in-phase PAM-n signal based on the in-phase component and a quadrature-phase PAM-n signal based on the quadrature-phase component. Driver circuitry may transmit the in-phase PAM-n signal and the quadrature-phase PAM-n signal across a wireline channel. The in-phase PAM-n signal may be different by 90° from the quadrature-phase PAM-n signal. This may enable a remote receiver on the wireline channel to detect the in-phase PAM-n signal independently of the quadrature-phase PAM-n signal. | 2021-10-21 |
20210328853 | DEVICE PROGRAMMING WITH SYSTEM GENERATION - A secure programming system and method for provisioning and programming a target payload into a programmable device mounted in a programmer. The programmable device can be authenticated before programming to verify the device is a valid device produced by a silicon vendor. The authentication process can include a challenge-response validation. The target payload can be programmed into the programmable device and linked with an authorized manufacturer. The programmable device can be verified after programming the target payload by verifying the silicon vendor and the authorized manufacturer. The secure programming system can provision different content into different programmable devices simultaneously to create multiple final device types in a single pass. | 2021-10-21 |
20210328854 | METHOD AND SYSTEM FOR SHARING STATE BETWEEN NETWORK ELEMENTS - A method for processing state information updates. The method includes receiving, by a coordination point, a plurality of state information from a plurality of network elements; processing at least one of the plurality of state information to generate a result; and applying the result to at least one of the plurality of network elements in order to modify an operation of the at least one of the plurality of network elements. | 2021-10-21 |
20210328855 | CONTEXTUAL GENERATION OF EPHEMERAL NETWORKS - A method, system, and computer program product for contextual generation of an ephemeral network are provided. The method detects an initiating event for network generation associated with a user of a first computing device. The method determines a duration of the initiating event. A set of network members is determined based on the initiating event and the duration. The method establishes an ephemeral network, connecting at least a portion of computing devices associated with the set of network members. The ephemeral network is terminated in response to detecting a completion event. In response to terminating the ephemeral network, member information for the set of network members is removed from the portion of the computing devices. | 2021-10-21 |
20210328856 | SCALABILITY, FAULT TOLERANCE AND FAULT MANAGEMENT FOR TWAMP WITH A LARGE NUMBER OF TEST SESSIONS - The disclosed methods and systems of using TWAMP measurement architecture for testing a large network include a control-client running on a first network host initializing memory for test session parameters used to originate a test, parsing a configuration file to populate the memory with IP addresses, ports and QoS parameters for control-servers and session-reflectors; and originating test sessions using the test session parameters. The method includes extending to thousands of control-clients, each originating respective test sessions with control-servers in a mesh network using respective test session parameters; and while the test is running, optionally sending an updated configuration file to at least one control-client that introduces a new control-server or replaces a control-server; and the control-client parsing the updated configuration file and updating memory to include the new control-server IP address, port numbers and QoS parameters; and expanding the test and monitoring the running test sessions for results. | 2021-10-21 |
20210328857 | USER EQUIPMENT, BASE STATION AND METHODS IN A RADIO COMMUNICATIONS NETWORK - According to a first aspect of embodiments herein, the object is achieved by a method performed by a User Equipment (UE) for monitoring a beam transmitted by a base station in a radio communications network. The base station is serving the UE. The UE monitors a reference signal related to the beam, from the base station. Each time a quality of the reference signal is below a first threshold, the UE generates an Out-Of-Synchronization (OOS) event. When the number of OOS events reaches an OOS Beam Failure Detection (BFD) threshold, the UE triggers a beam recovery preparation procedure, and when the number of OOS events reaches an OOS Radio Link Monitoring (RLM), threshold, the UE starts an RLF timer. | 2021-10-21 |
20210328858 | COMMUNICATIONS METHODS AND APPARATUS FOR MIGRATING A NETWORK INTERFACE AND/OR IP ADDRESS FROM ONE POD TO ANOTHER POD IN A KUBERNETES SYSTEM - The present invention relates to methods and apparatus for migrating and/or changing the allocation of network interface(s) or Internet Protocol address(es) of network interface(s) from one Pod, e.g., a failed Pod, to another Pod, e.g., a live Pod, in a Kubernetes system. An exemplary method of operating a Kubernetes system in accordance with an embodiment of the invention includes: establishing, by the Kubernetes system, a first service including a first Pod located on a first node and a second Pod located on a second node, allocating by the Kubernetes system an external network interface including an Internet Protocol address for use by the first Pod, the allocation of said external network interface for use by the first Pod being unknown to a first Kubelet managing the first node; and upon failure of the first Pod, changing allocation of the external network interface from the first Pod to the second Pod. | 2021-10-21 |
20210328859 | Forwarding Fault Location Determining Method and Device - In a forwarding fault location determining method, a controller receives a plurality of table search statistical results of a plurality of forwarding tables for a first service from one or more forwarders. The plurality of forwarding tables include a first forwarding table and a second forwarding table, and the first forwarding table is prior to the second forwarding table in terms of a search sequence. Subsequently, the controller determines that table search behavior of the first forwarding table for the first service is normal and table search behavior of the second forwarding table for the first service is abnormal. The controller determines, based on the determining result, that the second forwarding table is a faulty forwarding table for the first service. | 2021-10-21 |
20210328860 | Operation, Administration, and Maintenance IOAM Packet Transmission Method and Related Apparatus - Embodiments of this application disclose an iOAM packet transmission method and related apparatus. In the method, a tail node device in a measurement domain receives a first iOAM packet, and determines whether the first iOAM packet includes an important data identifier. If the first iOAM packet includes the important data identifier, the tail node device generates, based on the first iOAM packet, a notification message that includes first node information, and sends the notification message to a management device in an iOAM network. According to the solution in the embodiments of this application, only when the received first iOAM packet includes the important data identifier, the tail node device generates the notification message based on the first iOAM packet and reports the notification message. | 2021-10-21 |
20210328861 | DIAGNOSTIC APPARATUS - A fault diagnosis unit ( | 2021-10-21 |