45th week of 2020 patent applcation highlights part 62 |
Patent application number | Title | Published |
20200351063 | APPARATUS AND METHOD - [Object] To enable interference of directional beams between cells to further decrease. | 2020-11-05 |
20200351064 | TIMER-BASED BANDWIDTH PART SWITCHING METHOD, TERMINAL DEVICE, AND NETWORK DEVICE - Provided are a timer-based bandwidth part (BWP) switching method, a terminal device, and a network device. The method is applied to a terminal device. A BWP and a non-dynamic scheduling resource are configured for the current serving cell of the terminal device, and a BWP deactivation timer is configured for the currently activated BWP. The method includes: after receiving indication information, the terminal device determines whether to stop, start, or adjust the BWP deactivation timer, the indication information being used for indicating that the terminal device activates or deactivates the non-dynamic scheduling resource. | 2020-11-05 |
20200351065 | INTERFERENCE SUPPRESSION - Various communication systems may benefit from improved reduction of cross link interference. For example, certain embodiments may benefit from cross link interference suppression. A method, in certain embodiments, may include receiving, by a first network entity, at least one downlink precoder map from a second network entity over at least one interface. The method may also include estimating, by the first network entity, at least one basis of at least one common spatial sub-space associated with at least one, or all, identified BS-BS CLI source. In addition, the method may include for each reception associated with the first network entity, spatially projecting, by the first network entity, at least one interference rejection combining estimated interference covariance matrix into at least one orthogonal projector sub-space. | 2020-11-05 |
20200351066 | Beam Failure Recovery Procedure for Bandwidth Parts - A wireless device receives one or more messages comprising one or more configuration parameters of a plurality of cells. The plurality of cells comprise: a first cell comprising a first bandwidth part (BWP); and a second cell comprising a second BWP and a third BWP. The first BWP and the second BWP are bundled. A beam failure recovery (BFR) procedure for the third BWP is initiated. A switch is made to the first BWP as an active BWP of the first cell during the BFR procedure. Based on the switching: the BFR procedure is aborted; and a switch is made to the second BWP as an active BWP of the second cell. | 2020-11-05 |
20200351067 | Bandwidth Part Operations - A wireless device receives one or more RRC messages comprising configuration parameters of a cell. The configuration parameters indicate uplink BWPs of an uplink carrier of the cell. The uplink BWPs comprise a first uplink BWP and a second uplink BWP. The configuration parameters further indicate a sidelink BWP of the uplink carrier of the cell. A numerology of the second uplink BWP is different than a numerology of the sidelink BWP. The wireless device activates the first uplink BWP. The wireless device activates the sidelink BWP. The wireless device switches from the first uplink BWP to the second uplink BWP as an active uplink BWP. The wireless device deactivates, based on the switch, the sidelink BWP. | 2020-11-05 |
20200351068 | INSERTING VIRTUAL CARRIER IN CONVENTIONAL OFDM HOST CARRIER IN COMMUNICATIONS SYSTEM - A base station communicating data to/from plural mobile terminals over plural OFDM sub-carriers within a coverage area. The base station allocates transmission resources provided by a first group of the plural OFDM sub-carriers within a first frequency band to mobile terminals of a first type and allocates transmission resources provided by a second group of the plural OFDM sub-carriers within a second frequency band to terminals of a second type, the second group being smaller than the first group and the second frequency band selected from within the first frequency band. The base station transmits control information including resource allocation information for terminals of the first type over a first bandwidth corresponding to the combined first and second groups of OFDM sub-carriers and transmits control information including resource allocation information for terminals of the second type over a second bandwidth corresponding to the second group of OFDM sub-carriers. | 2020-11-05 |
20200351069 | Cross-Carrier Spatial Relation Indication for Semi-Persistent Sounding Reference Signal (SP-SRS) Resources - Exemplary embodiments include methods for activating or deactivating reference signal (RS) resources usable for management of transmit and/or receive beams for communication with a user equipment (UE) in a wireless communication network. Embodiments include sending, to the UE, one or more control messages comprising configuration of a plurality of RS resources associated with a particular bandwidth part (BWP) of a particular component carrier (CC) in the network. Embodiments also include sending, to the UE, a further control message comprising identification of at least one RS resource, of the plurality, to be activated or deactivated. The further control message can also include, for each identified RS resource, an indication of the identified RS resource's spatial relation with a further resource that is not associated with the particular BWP of the particular CC. Embodiments also include complementary methods performed by a UE, and apparatus configured to perform the exemplary methods. | 2020-11-05 |
20200351070 | LOW PAPR COMPUTER GENERATED SEQUENCE PAIRING - A UE receives an indication for transmitting a first DMRS sequence having a first length in an uplink transmission. The first DMRS sequence is time domain based. The first DMRS sequence is associated with one or more other DMRS sequences each having a different length. The UE generates the first DMRS sequence and modulates the first DMRS sequence to obtain a set of modulation symbols. The UE maps the set of modulation symbols to a first set of resource elements. An interference, to a first modulation symbol of the set of modulation symbols and mapped to a first resource element of the first set of resource elements, that would be caused by a respective modulation symbol, obtained from a respective one of the one or more other DMRS sequences and mapped to the first resource element if generated, is in a predetermined relationship with the first modulation symbol. | 2020-11-05 |
20200351071 | METHOD AND APPARATUS FOR SENDING SIGNAL, METHOD AND APPARATUS FOR RECEIVING SIGNAL, AND STORAGE MEDIUM - Provided in the present disclosure are a method and apparatus for sending a signal, a method and apparatus for receiving a signal, and a storage medium. The method for sending the signal includes: configuring or appointing multiple sending manners or conflict processing manners for a first signal; when there is a second signal conflicting with the first selecting a sending manner or a conflict processing manner for the first signal according to determination information; and sending the first signal according to the sending manner or the conflict processing manner. | 2020-11-05 |
20200351072 | FULL DUPLEX WIRELESS TRANSMISSION WITH SELF-INTERFERENCE CANCELLATION - Two-way (full-duplex) wireless communications. Various embodiments measure interference channels and provide for interference cancellation in both analog and digital domains to mitigate self-interference. The system supports multiple clients wherein new clients can join the network asynchronously, and also supports Multiple-Input Multiple-Output (MIMO) antennas. | 2020-11-05 |
20200351073 | MASKING METHOD AND SYSTEM FOR CRYPTOGRAPHY - An integrated circuit including a set of security modules configured to implement an asymmetric cryptography operation, the set of modules including a conditional exchange module configured to exchange first and second vectors used to manipulate input bits of a secret key, the conditional exchange module being suitable for applying an exchange formula including a combination of a condition of the input bit with the first and second vectors so that the latter are interchanged only if the condition of the input bit is equal to ‘1’, the conditional exchange module including a masking module suitable for making use of at least one random number to mask said exchange formula before it is applied. | 2020-11-05 |
20200351074 | SYSTEM FOR SYNCHRONIZING A CRYPTOGRAPHIC KEY STATE THROUGH A BLOCKCHAIN - In one embodiment, an apparatus comprising a memory to store a first value of a cryptographic key state; and a processor to generate a request to commit the first value of the cryptographic key state into a block of a blockchain, the blockchain to synchronize the cryptographic key state for a plurality of security modules; and generate a one-time cryptographic key based on the first value of the cryptographic key state responsive to a determination that the first value of the cryptographic key state has been committed to the blockchain. | 2020-11-05 |
20200351075 | MULTI-LAYERED IMAGE ENCODING FOR DATA BLOCK - An example operation may include one or more of retrieving a predefined image from a storage, encoding data attributes to be stored on a blockchain into one or more image layers of the predefined image to generate an encoded image, generating a data block comprising the encoded image including the data attributes which are encoded into the one or more image layers, and storing the data block via a hash-linked chain of data blocks on a distributed ledger. | 2020-11-05 |
20200351076 | SYSTEMS AND METHODS FOR HASH CHAIN MIGRATION - A method for hash chain migration includes detecting a version update of an object that includes a hash chain that stores fields of the object. Sub chains are identified from the hash chain. Migration sub chains are generated from the plurality of sub chains using a plurality of processes. Container blocks are generated from the plurality of migration sub chains. A migration chain is generated from the plurality of container blocks. The object is accessed using the migration chain. | 2020-11-05 |
20200351077 | SYSTEMS AND METHODS FOR CONTROL-DATA PLANE PARTITIONING IN VIRTUAL DISTRIBUTED LEDGER NETWORKS - The present disclosure relates to systems and methods for control-data plane partitioning in virtual distributed ledger networks. In one embodiment, a processor-implemented method is disclosed, comprising receiving a request for a microservice at a virtual distributed ledger technology node associated with a virtual distributed ledger technology network; identifying operations on user data to be performed related to the request for the microservice; retrieving the user data from a data storage memory external to the virtual distributed ledger technology network; performing the identified operations on the user data; executing the microservice based on performing the identified operations on the user data, to generate user data and control information; storing the generated user data in the data storage memory external to the virtual distributed ledger technology network; and committing the generated control information to a distributed ledger associated with the virtual distributed ledger technology network. | 2020-11-05 |
20200351078 | SYSTEM AND METHOD FOR ADDING AND COMPARING INTEGERS ENCRYPTED WITH QUASIGROUP OPERATIONS IN AES COUNTER MODE ENCRYPTION - An encryption system and method that addresses private computation in public clouds and provides the ability to perform operations of encrypted data are provided. | 2020-11-05 |
20200351079 | COMPUTER-IMPLEMENTED METHOD OF REPLACING A DATA STRING - A computer-implemented method of replacing a security-relevant unencrypted data string by a placeholder. The steps involved include: providing a plurality of mutually different replacement tables, wherein specified in each of the plurality of replacement tables for each character of the alphabet is precisely one replacement character from the same alphabet and wherein the replacement characters in each of the plurality of replacement tables are all different from each other; receiving the security-relevant unencrypted data string, wherein the data string is formed from a plurality of characters of an alphabet; and generating the placeholder replacing the unencrypted data string, and outputting the placeholder. To provide a method which is distinguished by enhanced performance with comparable cryptographic security it is proposed. Generation of the placeholder includes the specifically identified steps. | 2020-11-05 |
20200351080 | METHOD OF END TO END SECURING OF A COMMUNICATION - The aim of the invention is to strengthen the security of secure voice and/or video communications established through a network of Internet type. The security of these communications, which are based on the use of the SRTP protocol, is strengthened by the invention which makes it possible, without significantly modifying the protocols, to use better quality session keys produced by a security server of HSM type. These keys are configured by an intermediate server of SIP proxy type when establishing the communication. | 2020-11-05 |
20200351081 | REGISTRATION APPARATUS, SEARCH OPERATION APPARATUS, DATA MANAGEMENT APPARATUS - A registration apparatus generates a data random number tuple R that is a tuple of random numbers whose quantity is the same as a level quantity L of a hierarchy that a user attribute forms, and that is also a tuple of uniformly random numbers. Also, the registration apparatus accepts a plaintext M and attribute information B. The registration apparatus executes a function F_2 by taking as input a concatenated value of an attribute value of each level j in the attribute information B and a number of each level j, executes a function F_3 by taking as input a function value of the function F_2, calculates an attribute element C_{j, 0, 0} that is an exclusive-or of a function value of the function F_3 and a jth random number of the data random number tuple R, executes a function F_4 by taking as input the plaintext M and an exclusive-or of the data random number tuple R, and generates encrypted data C that includes the attribute element C_{j, 0, 0} and a ciphertext C_{L+1} which is a function value of the function F_4. Then, the registration apparatus registers the encrypted data C in a data management apparatus. | 2020-11-05 |
20200351082 | KEY DISTRIBUTION METHOD AND SYSTEM, AND APPARATUS - This application provides a key distribution method, an apparatus, and a system, includes: determining, by an identity management server based on AAA authentication information, whether AAA authentication on the terminal succeeds; if the AAA authentication succeeds, sending the ID of the terminal to a key management server; and generating, by the key management server, a private key of the terminal and returning the private key to the management server. After negotiating with the terminal to generate a first key, the identity management server encrypts the ID and the private key of the terminal, and sends an encrypted ID and an encrypted private key to the terminal. The terminal obtains the ID and the private key of the terminal. According to the key distribution method, apparatus, and system provided in this application, communication security performance of the terminal during ID-based registration authentication is improved. | 2020-11-05 |
20200351083 | SYSTEMS AND METHODS FOR COMMUNICATION, STORAGE AND PROCESSING OF DATA PROVIDED BY AN ENTITY OVER A BLOCKCHAIN NETWORK - A computer-implemented method of making a decision on a blockchain is provided. The method comprises providing a blockchain voting commitment transaction ( | 2020-11-05 |
20200351084 | METHOD AND SYSTEM FOR SECURELY REPLICATING ENCRYPTED DEDUPLICATED STORAGES - A method and system for securely replicating encrypted deduplicated storages. Specifically, the method and system disclosed herein entail the replication and migration of encrypted data between storage systems that support deduplication. More specifically, a first encrypted data, which may have been encrypted using a first public cryptographic key and consolidated on a source storage system, may be translated into an interim (yet still encrypted) state using a first split private cryptographic key. Thereafter, using a compound conversion key, the interim state data may be further translated into a second encrypted data, which may be characterized as being encrypted by a second public cryptographic key. Therefore, substantively, the method and system disclosed herein may be directed to the translation of encrypted data from one encryption scheme to another while in-flight from a source storage system to a target storage system. | 2020-11-05 |
20200351085 | EXTENSIBLE SYSTEM FOR AUTHENTICATED AND PROTECTED KEY AGREEMENT IN LARGE MESH LAYER 2 ETHERNET NETWORKS - A large-scale Ethernet mesh network is provided, which includes a group connectivity association (CA) including at least thirty-one authenticated supplicant nodes. An authenticator module authenticates each of the authenticated supplicant nodes, and distributes a shared group encryption key to each of the authenticated supplicant nodes. Each of the authenticated supplicant nodes encrypt data using the shared group encryption key, and exchange the encrypted data with any other remaining authenticated supplicant node. | 2020-11-05 |
20200351086 | METHOD OF OPERATION OF A QUANTUM KEY CONTROLLER - A quantum communication system has a plurality of trusted nodes. Each trusted node has a quantum key controller, and a quantum transmitter or a quantum receiver. The trusted nodes are configurable as first and second endpoint trusted nodes and middle-trusted nodes between endpoint trusted nodes. The first endpoint trusted node encrypt data comprising a first key, using a first quantum key. Each middle-trusted node decrypts, using a preceding quantum key, and re-encrypts using a succeeding quantum key. The second endpoint trusted node decrypts using a quantum key, so that the first and second endpoint trusted nodes each have the first key. | 2020-11-05 |
20200351087 | SECURE MEMORY TAMPER DETECTION IN A QUANTUM KEY COMPUTER - A tamper detecting component for a quantum communication system is a trusted node, configurable as a first endpoint trusted node, a middle-trusted node and a second endpoint trusted node. The trusted node has a tamper detection module and a secure memory. The tamper detection module deletes critical system parameters responsive to detecting physical tampering. The trusted node, as the first endpoint trusted node, exchanges a quantum key, encrypts data and transmits encrypted data. The trusted node as the middle-trusted node exchanges a quantum key, exchanges another quantum key, decrypts and re-encrypts data and transmits encrypted data. The trusted node as the second endpoint trusted node exchanges a quantum key, and decrypts data. | 2020-11-05 |
20200351088 | SYSTEM AND METHOD FOR MANAGING CERTIFICATION FOR WEBPAGE SERVICE SYSTEM - A managing system and a managing method, according to the invention, are for managing certification for a webpage service system. When a user operates a data processing apparatus to execute a browser application to link to the webpage service system, a security agent device randomly generates a key in accordance with at least one characteristic data associated with the data processing apparatus, encrypts an original cookie data into an encrypted cookie data by using the key, writes the encrypted cookie data into an HTTP information to replace the original cookie data, and then transmits the HTTP information including the encrypted cookie data to the browser application. | 2020-11-05 |
20200351089 | METHODS AND SYSTEMS FOR EFFICIENT CRYPTOGRAPHIC THIRD-PARTY AUTHENTICATION OF ASSET TRANSFERS USING TRUSTED COMPUTING - A system for efficient third-party authentication of asset transfers using trusted computing includes a process authentication node configured to receive transfer data relating to an asset transfer, wherein the transfer data includes at least a first authentication datum, retrieve, from an instance of a secure listing, a first digitally signed assertion including at least a second authentication datum, wherein the first digitally signed assertion is generated by a data validator device as a function of information of a transferring entity, compare the at least a first authentication datum to the at least a second authentication datum, and authenticate the transfer data as a function of the comparing of the at least a first authentication datum to the at least a second authentication datum. | 2020-11-05 |
20200351090 | SYSTEMS AND METHODS FOR ASSOCIATING A USER WITH A TASK EXECUTED IN A COMPUTING SYSTEM - It is desired to try to increase the security of a computing system running computer applications that may access data in a data storage system. In some embodiments, a token associates a user with a task that is being executed by a computing node. It may therefore be possible to determine which user executed which tasks. In some embodiments, the validity of a token is tied to the lifespan of a task associated with the token, rather than to a fixed amount of time. Therefore, if the task associated with the token is complete, the token may become invalid, rather than remaining valid for a duration of time that possibly exceeds the lifespan of the associated task. In some embodiments, a token is used to enforce data access control, e.g. to deny certain users access to certain data in the data storage system. | 2020-11-05 |
20200351091 | SYSTEMS AND METHODS FOR TYING TOKEN VALIDITY TO A TASK EXECUTED IN A COMPUTING SYSTEM - It is desired to try to increase the security of a computing system running computer applications that may access data in a data storage system. In some embodiments, a token associates a user with a task that is being executed by a computing node. It may therefore be possible to determine which user executed which tasks. In some embodiments, the validity of a token is tied to the lifespan of a task associated with the token, rather than to a fixed amount of time. Therefore, if the task associated with the token is complete, the token may become invalid, rather than remaining valid for a duration of time that possibly exceeds the lifespan of the associated task. In some embodiments, a token is used to enforce data access control, e.g. to deny certain users access to certain data in the data storage system. | 2020-11-05 |
20200351092 | REUSABLE TEMPLATE FOR ASSET TOKEN - A computer system comprises a logic system, and, operatively coupled to the logic system, a computer-memory system holding instructions that, when executed by the logic system, cause the computer system to: receive a token-behavior selection corresponding to a real-world asset to be tracked on a virtual ledger; receive a virtual-ledgerarchitecture selection identifying a provider-defined architecture of the virtual ledger; construct a template for registration of a token class on the virtual ledger according to the provider-defined architecture of the virtual ledger, wherein each new token instantiated from the token class exhibits a set of behaviors determined by the token-behavior selection; and provide access to the template to a client computer device. | 2020-11-05 |
20200351093 | CUSTOMIZABLE TEMPLATE FOR ASSET TOKEN - A computer system comprises a logic system, and, operatively coupled to the logic system, a computer-memory system holding instructions that, when executed by the logic system, cause the computer system to: receive a token-behavior selection corresponding to a real-world asset to be tracked on a virtual ledger; construct a template for registration of a token class on the virtual ledger according to a provider-defined architecture of the virtual ledger, wherein each new token instantiated from the token class exhibits a set of behaviors determined by the token-behavior selection; receive client metadata for assignment to a variable property of each new token of the token class; assign the client metadata to the variable property within the token class; and provide access to the template to a client computer device. | 2020-11-05 |
20200351094 | BIOSIGNATURE-BASED TOKENIZATION OF ASSETS IN A BLOCKCHAIN - An apparatus includes a tester to detect a biological signature of a biological sample, a processor, and a memory operably coupled to the processor. The memory stores instructions to cause the processor to receive an indication of the biological signature from the tester, and to generate, using a smart contract and through communication with a distributed ledger, a cryptographic token including a digital identifier based on the biological signature. The cryptographic token is transmitted to a remote processor for verification of the biological sample, in response to receiving the cryptographic token. The tester can detect the biological signature within a predetermined test duration that is less than a DNA sequencing duration associated with the biological sample, and the biological signature has a data precision sufficient to uniquely identify the biological sample from a plurality of biological samples. | 2020-11-05 |
20200351095 | DECENTRALIZED TRUST USING BLOCKCHAIN FOR TRACKING AND VALIDATION OF VOICE COMMUNICATIONS - Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger. | 2020-11-05 |
20200351096 | WEARABLE IDENTITY DEVICE FOR FINGERPRINT BOUND ACCESS TO A CLOUD SERVICE - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere. | 2020-11-05 |
20200351097 | SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING - In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network (“DNN”) on those one-way homomorphic encryptions (i.e., each biometrics' feature vector) can determine matches or execute searches on encrypted data. Each biometrics' feature vector can then be stored and/or used in conjunction with respective classifications, for use in subsequent comparisons without fear of compromising the original biometric data. In various embodiments, the original biometric data is discarded responsive to generating the encrypted values. In another embodiment, the homomorphic encryption enables computations and comparisons on cypher text without decryption. This improves security over conventional approaches. Searching biometrics in the clear on any system, represents a significant security vulnerability. In various examples described herein, only the one-way encrypted biometric data is available on a given device. Various embodiments restrict execution to occur on encrypted biometrics for any matching or searching. | 2020-11-05 |
20200351098 | METHODS AND SYSTEMS FOR UTILIZING HARDWARE-SECURED RECEPTACLE DEVICES - A system for using hardware-secured receptacle devices includes a transfer processing device configured to store transfer method data associated with user on at least a cryptographically secured receptacle device, receive user authentication credentials from a user, authenticate user identity as a function of the user authentication credentials, retrieve a transfer authorization from the at least a cryptographically secured receptacle device as a function of the transfer method data, generate a transfer as a function of the transfer authorization. | 2020-11-05 |
20200351099 | SYSTEM AND METHOD FOR PROVIDING AND MAINTAINING IRREFUTABLE PROOF OF THE BUILDING, TESTING, DEPLOYMENT AND RELEASE OF SOFTWARE - A system and method for providing and maintaining irrefutable proof of the building, testing, deployment and release of a software product. The system and method provide a secure, immutable electronic ledger to be accessed by various services and systems during the software product's development and release cycle. The ledger may be implemented using electronic blocks linked together via cryptography. | 2020-11-05 |
20200351100 | CRYPTOGRAPHIC METHOD FOR VERIFYING DATA - Cryptographic method for verifying data method, implemented by at least one apparatus, for comparing a first dataset and a second dataset, in particular with a view to determining whether these two datasets are identical, this method not requiring the presence of these two datasets in the apparatus, and comprising the following steps: a) mixing a number, called the mixer number, with the first dataset, using a mixing function in order to obtain mixed data, b) hashing the mixed data using a hash function, and c) comparing the hash thus obtained in step b) with a third dataset assumed to be the hash of the second dataset mixed with the same mixer number as that used in step a) and with the same mixing function. | 2020-11-05 |
20200351101 | FACILITATION OF IDENTIFICATION OF INTERNET-OF-THINGS HOST DEVICES - A more efficient internet-of-things (IoT) manufacturing process can be achieved using hash functions to authenticate and identify IoT devices. Device data comprising manufacturer name data, device name data, software version data, and/or hardware version data can be feed through a hash function to generate hashed data. Additionally, same and/or similar data can be hashed via a manufacturing process. The two outputs from both sets of data can then be matched to determine the authentication of a device. Based on the authenticity of the device being verified, the IoT device can undergo a certification process as a part of the manufacturing process. This manufacturing process comprising hashed data can eliminate current manufacturing processes and allow for a unique identifier to be associated with the IoT device. | 2020-11-05 |
20200351102 | SECURE DATA TRANSMISSION METHOD - In a secure end-to-end transmission of data between a first device and a second device via a message broker, the following are performed: a sharing of an entropy pool between the first device and the second device via the message broker, by means of signalling messages, any payload of which is encrypted asymmetrically and which comprise a message signature; and a transmission of subsequent messages between the first device and the second device via the message broker, each said subsequent message comprising a header and a payload, the header comprising an identifier of an authentication key obtained from the shared entropy pool and an identifier of a symmetrical encryption key obtained from the shared entropy pool, the payload being encrypted symmetrically by means of the symmetrical encryption key, and the whole formed by the header and the payload being authenticated by means of a message authentication code obtained by means of the authentication key and inserted in the header. Thus, the subsequent messages benefit from the non-repudiation afforded by the way in which the entropy pool was previously shared. | 2020-11-05 |
20200351103 | SYSTEM AND METHOD USING DISTRIBUTED BLOCKCHAIN DATABASE - A content distribution system includes content receivers that provide a plurality of blockchain databases that store transaction records associated with subscriber requests for content, and a computer system that processes those transaction records and enables authorized content receivers to output requested content. | 2020-11-05 |
20200351104 | EFFICIENT AND SECURE DISTRIBUTED LEDGER MAINTENANCE - An apparatus in one embodiment includes at least one processing device comprising a processor coupled to a memory. The processing device is configured to implement a first ledger maintenance node. The first ledger maintenance node is configured to communicate over one or more networks with a plurality of additional ledger maintenance nodes, to identify a block for proposed addition to a distributed ledger collectively maintained by the first and additional ledger maintenance nodes, to apply a digital signature of the first ledger maintenance node to the block, and to receive digital signatures on the block from at least a subset of the additional ledger maintenance nodes. Responsive to receipt of sufficient digital signatures from respective ones of the additional ledger maintenance nodes to meet a specified quorum of digital signatures required for addition of the block to the distributed ledger, the first ledger maintenance node adds the block to the distributed ledger. | 2020-11-05 |
20200351105 | USER AUTHENTICATION WITH SELF-SIGNED CERTIFICATE AND IDENTITY VERIFICATION - In embodiments, an authentication server interfaces between a user device with a self-signed certificate and a verifying computer that accepts a user name and password. The user device generates a self-signed certificate signed by a private key on the user device. The self-signed certificate is transmitted to a verifying party computer over a network. The verifying party stores the self-signed certificate with user identification data, including at least one of a user name, user address, user email, user phone number, user tax identification (ID), user social security number and user financial account number. In subsequent communications, the verifying party receives a certificate chain including the self-signed certificate, and matches that with the user identification data stored in a database. | 2020-11-05 |
20200351106 | METHOD FOR CHECKING THE DATA TRANSPORT ACROSS A FIRST COMMUNICATION CONNECTION BETWEEN TWO DATA PROCESSING DEVICES, SAID FIRST COMMUNICATION CONNECTION BEING REALIZED BETWEEN TWO FIRST INTERFACE UNITS, AND MOTOR VEHICLE - The application relates to a method for checking the data transport across a first communication connection between two data processing devices, said first communication connection being realized between two first interface units, wherein the payload to be transferred can be divided into payload blocks and there is at least one second communication connection between the data processing devices, which is established by means of second interface units, and wherein, in order to implement a challenge-response authentication, a request requiring retrieval of randomly selected data units from identifiable, randomly selected payload blocks of the payload is sent as a challenge by an authentication unit to the first interface units by means of the second communication connection, an authentication assembly of each of the first interface units extracts the requested response data from the payload and transmits the same back to the authentication unit and a successful check is determined if the response data match. | 2020-11-05 |
20200351107 | SECURE AUTHENTICATION OF REMOTE EQUIPMENT - An authentication server may use secure messaging with a remote device prior to authorizing non-secure communications between the remote device and a content server, thereby preventing unauthorized access to the content server. The secure messaging uses such security features as encryption, signatures with authentication certificates, a realm, and/or a nonce. Once non-secure communication is authorized, the remote device may act as a proxy between the content server and a user device connected to the remote device. The authentication server sends timeout notices to the remote device containing an interval and a key. To continue non-secure communications with the content server, the remote device must respond prior to the expiration of the interval by sending a keep-alive message containing the key to the authentication server. | 2020-11-05 |
20200351108 | SEMICONDUCTOR DEVICE, UPDATE DATA-PROVIDING METHOD, UPDATE DATA-RECEIVING METHOD, AND PROGRAM - A semiconductor device includes a memory, a random number generation circuit, and a control circuit. The memory stores key information, and the random number generation circuit generates first and second random number signals. The control circuit generates sixth and seventh random number signals from the first random number signal and the key information, generates encrypted update data from update data using the seventh random number signal, transmitts the first and second random number signals as request signals to an external terminal device, receives, from the external device, first and second response signals as response signals in response to the request signals, generates an eighth random number signal using the first response signal, the second and the sixth random number signals as input signals, and provides the encrypted update data for the external terminal device when the second response signal coincides with the eighth random number signal. | 2020-11-05 |
20200351109 | SYSTEM AND METHOD FOR INVISIBLE CHAT MEMBER REAL-TIME CHAT EVENT PROCESSING - A system and method for generating real-time notification based on events within a chat engine using an invisible chat member for readily capturing a plurality of chat events in at least one chat room and processing the chat events substantially on a real-time basis thereby creating an out-of-chat event. | 2020-11-05 |
20200351110 | REMOTE AUTOMOBILE DIAGNOSTIC METHOD, APPARATUS, AND SYSTEM - The present invention provides a remote automobile diagnostic method, apparatus, and system. The method includes: receiving a diagnosis joining request sent by a remote terminal, and adding the remote terminal to a diagnostician group; sending, to a remote terminal in the diagnostician group, diagnostic information uploaded by a diagnostic device; and determining, as a control terminal, the remote control with control permission in the diagnostician group, so that the control terminal controls, according to the diagnostic information, the diagnostic device to perform an automobile diagnosis operation. Accordingly, a plurality of remote terminals can collaboratively diagnose an automobile, so that diagnosis efficiency of an automobile is improved. | 2020-11-05 |
20200351111 | MESSAGING TO ENFORCE OPERATION SERIALIZATION FOR CONSISTENCY OF A DISTRIBUTED DATA STRUCTURE - Disclosed embodiments provide for collaborative access to a distributed data structure. Operations such as inserting, deleting, and annotating are performed by various clients participating in the collaboration. A serialization service enforcing a single order of these operations and ensures the operations and order are communicated to all of the clients participating in the collaboration. Once all clients have acknowledged particular operations, this information is also communicated to all of the clients, such that the clients may perform maintenance activities on the collaboration data structures. The result is a rolling collaboration window shared by all of the clients of the collaboration, with a bottom of the collaboration window defined by a lowest ordered operation not yet acknowledged by all clients of the collaboration, and a highest ordered operation as assigned by the serialization service. | 2020-11-05 |
20200351112 | CONFERENCING ENVIRONMENT MONITORING - Example implementations relate to conferencing environment monitoring. An example monitoring device can include a processor to monitor a physical aspect and an audio aspect of a conferencing environment in which a conferencing device is located, wherein the conferencing device is communicatively coupled to the monitoring device. The monitoring device can detect, based on the monitoring, an issue impacting a conferencing session associated with the conferencing device and the conferencing environment. In response to the detection, the monitoring device can determine a correction for the issue and perform the correction. | 2020-11-05 |
20200351113 | METHOD AND SYSTEM OF CONTROLLING DEVICE USING REAL-TIME INDOOR IMAGE - A device and a method for controlling a device using a real-time image are provided. The method includes: receiving an image captured by an image capturing device connected to a network to display the image in real-time; searching for the device that is connected to the network and is controllable; designating, within the image, a setting zone corresponding to the device; receiving a user input; and controlling the device selected according to the user input. A location of the setting zone within the image may be updated according to a change in the image. The user may receive immediate visual feedback on how the devices are being controlled. The user may control a device displayed on the screen on which the real-time indoor image is displayed without having to navigate through different sub-menus for different devices. | 2020-11-05 |
20200351114 | SYSTEMS AND METHODS FOR TRAINING NETWORK-CONNECTED OBJECTS TO PROVIDE CONFIGURATIONS IN ASSOCIATION WITH EVENTS WITHIN MEDIA ASSETS - Systems and methods for training network-connected objects to provide configurations in association with events within media assets. A respective configuration setting of a network-connected object and a baseline biometric state of a user may be stored in a database for each event within a media asset. An event within a media asset (for display) may be detected. In response, a command may be sent to the network-connected object to implement the respective configuration setting. A determination may be made whether the user adjusts the respective configuration setting to a new configuration setting within a predefined time of the event. A biometric state of the user may be retrieved from a biometric device in response to the adjustment to a new configuration setting. If the biometric state does not correspond to the baseline biometric state, the respective configuration setting may be replaced with the new configuration setting. | 2020-11-05 |
20200351115 | ACCESS NETWORK WITH REMOTE ACCESS SERVERS - A method includes: a controller node receiving, via a message sent on a first segment of a control session path, identity information of at least one specific network termination node, or of an access node port of a specific line termination node used by the at least one specific network termination node; upon a lookup request message being sent to at least one repository node or repository functionality by the controller node, a lookup response message being sent by the at least one repository node or repository functionality, based on the identity information, the lookup response message comprising an indication of a specific external service edge node; and based on the indication of the specific external service edge node, set up or establishment of a second segment of the control session path towards the specific external service edge node being performed. | 2020-11-05 |
20200351116 | METHOD AND CONTROL SYSTEM FOR CONTROLLING AND/OR MONITORING DEVICES - The following allows complex control instruction chains to be performed in an (automation) network, in which nodes and/or device nodes and/or blockchain-external devices are networked to one another, in a simple manner even if different operators of the individual nodes and devices do not trust one another. | 2020-11-05 |
20200351117 | Adaptive Network Access System for Existing Infrastructure - Novel tools and techniques for a network access system are provided. A system includes a distribution point unit coupled to an access network on an upstream side, and one or more copper wire drops on a downstream side, wherein the one or more copper wire drops are terminated at a respective one or more customer premises. The system further includes a bridge coupled to the distribution point unit via at least one of the one or more copper wire drops, the bridge configured to interface with existing customer premises wiring. The bridge further includes a G.now client interface coupled to the distribution point unit, a G.hn master interface coupled to a G.hn client coupled to the existing customer premises wiring, and a reverse power section including a reverse power powered device. | 2020-11-05 |
20200351118 | Cascaded Distribution Point Unit Architecture for an Adaptive Network Access System - A system includes a first distribution point unit comprising a first backhaul interface coupled to an access network via a backhaul connection, a first distribution interface coupled to a downstream distribution point unit, one or more first drop cable interfaces coupled to at least one first customer premises via at least one first drop cable, and a first reverse power section. The system further includes a second distribution point unit communicatively coupled to the first distribution point unit, the second distribution point unit comprising a second backhaul interface coupled to the first distribution interface of the first distribution point unit, a second distribution interface configured to be coupled to a subsequent downstream distribution point unit, one or more second drop cable interfaces coupled to at least one second customer premises via at least one second drop cable, and a second reverse power section. | 2020-11-05 |
20200351119 | MEDIA ACCESS FOR TIME-SENSITIVE AND BEST EFFORTS DATA PACKETS, AND RELATED SYSTEMS, METHODS AND DEVICES - Disclosed embodiments relate, generally, to traffic shaping at a network segment having a shared bus. Some embodiments relate to performing aspects of the traffic shaping at a physical layer device. In some cases, transmit timeslot signaling may be tuned at a physical layer device to create transmit timeslots that are aligned with the traffic shaping profile. | 2020-11-05 |
20200351120 | System and Method for VNF Termination Management - An apparatus and method for terminating a virtual network function (VNF) instance according to termination requirements of the VNF instance. The termination requirements may be defined in a VNF descriptor corresponding to the VNF instance. A network function virtualization (NFV) management entity may obtain the termination requirements and initiate termination of the VNF instance based on the obtained termination requirements. | 2020-11-05 |
20200351121 | ETHERNET INTERCONNECTION CIRCUIT AND APPARATUS - Disclosed are an Ethernet interconnection circuit and apparatus. A physical interface exchanger of the circuit has a first physical interface, a second physical interface and a third physical interface, wherein a first board-level processor realizes communication between the first board-level processor and an external Ethernet by means of the first physical interface, the third physical interface, and a network interface connected to the third physical interface; a second board-level processor realizes communication between the second board-level processor and the external Ethernet by means of the second physical interface, the third physical interface, and the network interface connected to the third physical interface; and the first-board-level processor and the second-board-level processor realize communication between the first board-level processor and the second-board-level processor by means of the first physical interface and the second physical interface. | 2020-11-05 |
20200351122 | INFORMATION PROCESSING APPARATUS CAPABLE OF EASILY CONFIGURING SETTING ON INFRASTRUCTURE TO BE USED AND NOTIFYING ERRORS ACCORDING TO THE SETTING ON INFRASTRUCTURE, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus in which a user is able to intuitively configure setting on an interface to be used. An interface to be enabled in the information processing apparatus is set in accordance with an instruction by a user. Statuses of a wired interface and a wireless interface are sets as any one of followings: enabling the wired interface without enabling a wireless interface, enabling the wireless interface without enabling the wired interface, and enabling both the wired interface and the wireless interface is set. An error corresponding to the setting is notified. | 2020-11-05 |
20200351123 | GATEWAY DEVICE, VEHICLE NETWORK SYSTEM, TRANSFER METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM - A network system includes a first network through which a frame of a first type is transmitted in accordance with a first communication protocol and includes a second network in which a frame of a second type is transmitted in accordance with a second communication protocol. A gateway device is connected to the first network and the second network. The gateway device sequentially receives frames of the first type from the first network and determines whether to transmit data regarding the received frames of the first type to the second network. The gateway device transmits, to the second network, a frame of the second type including data regarding a plurality of the frames of the first type determined to be transmitted to the second network when a condition relating to a number of frames of the first type received by the gateway device is satisfied. | 2020-11-05 |
20200351124 | CHANNEL ESTIMATION FOR SYSTEMS WITH PLL PHASE DISCONTINUITIES - Channel estimation performance depends on the amount of averaging performed by a channel impulse response coherent filter. For half-duplex UEs, which use a single phase locked loop (PLL) for both downlink transmissions and uplink transmissions, averaging may not be performed across downlink subframes before and after uplink subframes if the PLL's phase changes and locks to a random initial value when switching transmission directions. Techniques disclosed herein facilitate estimating the PLL's random initial phase and enable correcting the phase of symbols accordingly. By correcting the phase of the symbols, it is possible to average across symbols before and after a frequency re-tune and/or a transmission direction switch based on the phase correction. This may serve to improve the accuracy of channel estimation. Further techniques disclosed herein may improve the accuracy of Doppler estimations by enabling the inclusion of symbols before and after a frequency re-tuning when performing the Doppler estimation. | 2020-11-05 |
20200351125 | DEMODULATION REFERENCE SIGNAL AND CHANNEL STATE INFORMATION-REFERENCE SIGNAL RESOURCE INDICATION SYSTEM - Aspects of the present disclosure disclose techniques for the indication of the allocation of the downlink (DL) demodulation reference signal (DM-RS) ports for the data channel in NR communications. In some examples, the channel state information (CSI) reference signal (CSI-RS) may be associated with a corresponding DM-RS for a DL data channel. The transmitting device, in some examples, may further transmit a notification that provides resource allocations (e.g., port allocations) that minimize the redundant information that is required to be transmitted from the base station to the user equipment (UE) when the DM-RS port allocation is the same as the CSI-RS port allocation received by the UE in an earlier time slot. | 2020-11-05 |
20200351126 | SYSTEMS AND METHODS FOR CONFIGURING A RADIO LINK MONITORING EVALUATION PERIOD - A wireless device or network node determines an evaluation period that is common to at least a portion of reference signal resources in a set of reference signal resources that are transmitted by the network node, with at least one of the reference signal resources in the set being of a different type or configuration than another of the reference signal resources in the set. | 2020-11-05 |
20200351127 | BASE STATION APPARATUS, TERMINAL APPARATUS, COMMUNICATION METHOD, AND INTEGRATED CIRCUIT - The present invention includes a receiver configured to receive a physical downlink control channel, and a transmitter configured to transmit a physical uplink control channel, wherein the receiver receives downlink control information carried on the physical downlink control channel, a downlink control information format of the downlink control information is used for scheduling of a physical downlink shared channel, the downlink control information format includes information indicating a resource of a sounding reference signal, and the physical uplink control channel is transmitted, based on the information indicating the resource of the sounding reference signal. | 2020-11-05 |
20200351128 | SRS BASED DISCOVERY FOR DEVICE TO DEVICE COMMUNICATION - Systems and methods establishing and maintain a direct User Equipment to User Equipment communication link are disclosed. A User Equipment (UE) may receive a Sounding Reference Signal (SRS) from a neighboring UE. The UE may determine from the SRS that the UE is a good candidate for a direct link. The UE may also determine from the SRS an ID associated with the neighboring UE. The UE may send a direct link request to the UE serving gNB. The serving gNB may forward the request to a gNB serving the neighboring UE. The gNBs may negotiate a joint schedule for a beam a UE to UE beam search. The beam search may be conducted using SRS resources. The results of the beam search may be sent to the gNB and the gNB may determine a beam pair for a direct link. | 2020-11-05 |
20200351129 | Uplink Operations of Multi-Transmission Reception Points and Panel - A wireless device receives radio resource control (RRC) message(s) indicating a plurality of control resource set (coreset) groups for a cell and a plurality of sounding reference signal (SRS) resource sets for the cell. Each of the plurality of coreset groups correspond with a respective one of the plurality of SRS resource sets. The wireless device receives, via a coreset group of the plurality of coreset groups, a downlink control information (DCI) comprising resource assignments and an SRS resource indication (SRI) index for an uplink channel of the cell. The wireless device determines an SRS resource set, from the plurality of SRS resource sets, corresponding to the coreset group. The wireless device determines an SRS resource from the SRS resource set based on the SRI and the wireless device may transmit the uplink channel with a spatial domain filter determined based on the SRS resource. | 2020-11-05 |
20200351130 | SOUNDING REFERENCE SIGNAL TRANSMISSION METHOD, NETWORK DEVICE AND TERMINAL DEVICE - Provided are an SRS transmission method and device capable of realizing SRS transmission in a 5G system. The method comprises: receiving downlink control information (DCI) sent by a network device, wherein the DCI comprises SRS trigger information; and according to a transmission latency K, at or after a Kth time-domain resource unit after receiving the DCI, transmitting an SRS on an SRS resource in an SRS resource set indicated by the SRS trigger information, wherein K is an integer greater than or equal to zero. | 2020-11-05 |
20200351131 | SYSTEMS AND METHODS FOR AUTOMATIC LEVEL CONTROL - Systems and methods for automatic level control (ALC) are provided. In one embodiment, an ALC system for communications signals comprises: a multi-threshold programmable ALC controller; and at least one signal path that includes: a digital step attenuator configured to receive an analog communications signal and attenuate the analog communications signal in response to an attenuation adjustment signal from the ALC controller; and an analog-to-digital converter configured to receive the analog communications signal as attenuated by the digital step attenuator and generate samples of the attenuated analog communications signal, wherein the ALC controller receives the samples. The ALC controller comprises a plurality of clip detectors that function in parallel. Each of the clip detectors are programmed with a respective amplitude and time threshold. Based on which of the plurality of clip detectors determine that the samples exceed their respective amplitude and time threshold, the ALC controller generates the attenuation adjustment signal. | 2020-11-05 |
20200351132 | MATCHED-FILTER RADIO RECEIVER - A digital radio receiver has a matched filter bank of filter modules for receiving phase- or frequency-modulated radio signals. Each module cross-correlates a sampled signal with a respective multi-symbol filter sequence, using a plurality of samples in each symbol period. The matched filter bank calculates first values (z | 2020-11-05 |
20200351133 | PACKET MODE AUTO-DETECTION IN MULTI-MODE WIRELESS COMMUNICATION SYSTEM, SIGNAL FIELD TRANSMISSION FOR THE PACKET MODE AUTO-DETECTION, AND GAIN CONTROL BASED ON THE PACKET MODE - A method for automatically detecting a packet mode in a wireless communication system supporting a multiple transmission mode includes: acquiring at least one of data rate information, packet length information and channel bandwidth information from a transmitted frame; and determining the packet mode on the basis of the phase rotation check result of a symbol transmitted after a signal field signal and at least one of the data rate information, the packet length information and the channel bandwidth information acquired from the transmitted frame. | 2020-11-05 |
20200351134 | METHOD AND APPARATUS FOR CONFIGURING AND DETECTING CYCLIC PREFIX LENGTH IN CELL SUPPORTING MULTIPLE SUBCARRIER SPACINGS - The present embodiments relate to a method for configuring a cyclic prefix for a next generation/5G radio access network (referred to as new radio (NR)) about which 3GPP has begun discussions. According to the present embodiments, a base station configures cyclic prefix (CP) lengths for secondary numerology except for reference numerology and sets, through RRC signaling, the values of the CP lengths configured for the secondary numerology, thereby enabling a terminal to detect the CP lengths for the secondary numerology in a cell supporting mixed numerology. | 2020-11-05 |
20200351135 | RADIO TRANSMISSION APPARATUS AND RADIO RECEPTION APPARATUS - A radio transmission apparatus may include transmission section ( | 2020-11-05 |
20200351136 | METHOD AND APPARATUS FOR TRANSMITTING SIDELINK REFERENCE SIGNAL IN NR V2X - Provided herein is a method for performing, by a first apparatus, wireless communication and an apparatus for supporting the same. The method may include the steps of generating a Phase Tracking-Reference Signal (PT-RS), transmitting a Physical Sidelink Control Channel (PSCCH) to a second apparatus, mapping, based on a Cyclic Redundancy Check (CRC) on the PSCCH, the PT-RS to a subcarrier on a Physical Sidelink Shared Channel (PSSCH) resource related to the PSCCH, and transmitting the PT-RS to the second apparatus. | 2020-11-05 |
20200351137 | SCRAMBLING OF PHYSICAL CHANNELS AND REFERENCE SIGNALS IN WIRELESS COMMUNICATION NETWORKS - Radio network nodes, wireless devices, and related methods are provided in which a pseudo-random sequence initialization value, which is used during the generation of pseudo-random and/or scrambling sequences, is based, at least in part, on a first identifier, wherein the first identifier is equal to a first parameter if the first parameter has been configured and if a second identifier corresponds to a wireless-device-specific identifier. | 2020-11-05 |
20200351138 | DISCRETE FOURIER TRANSFORM SIZE DECOMPOSITION - Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may determine, based at least in part on a decomposition rule for a discrete Fourier transform (DFT) block, a plurality of decomposition groups for tones, corresponding to a plurality of antenna ports of the UE, of a transmission. The UE may map the tones to the plurality of decomposition groups for transmission processing, and transmit, using the plurality of antenna ports, the transmission based at least in part on transmission processing. Numerous other aspects are provided. | 2020-11-05 |
20200351139 | METHOD AND DEVICE FOR TRANSMISSION OF SYNCHRONIZATION SIGNAL BY DEVICE-TO-DEVICE TERMINAL IN WIRELESS COMMUNICATION SYSTEM - One embodiment of the present invention is a method by which a D2D terminal transmits a synchronization signal in a wireless communication system, the synchronization signal transmission method comprising: generating a primary sidelink synchronization signal (PSSS); and transmitting the PSSS, wherein the transmission power of the PSSS is the same as the transmission power of a channel in which system and synchronization-related information is transmitted. | 2020-11-05 |
20200351140 | DATA PROCESSING METHOD AND INTELLIGENT TERMINAL BASED ON OFDM SYSTEM - The invention discloses a data processing method and an intelligent terminal based on an OFDM system. The method comprises: a communication base station inserting equally spaced frequency domain reference signals to frequency domain data; obtaining frequency domain signals by equivalently transforming the frequency domain data being inserted with the frequency domain reference signals, wherein the frequency domain signals comprise the frequency domain reference signals superimposed with the frequency domain data; obtaining time domain signals by performing IFFT on the frequency domain signals, wherein the time domain signals comprise time domain reference signals superimposed with the time domain data; and transmitting the time domain signals to the intelligent terminal. | 2020-11-05 |
20200351141 | LINK ADAPTATION METHOD USING A POLAR MODULATION CONSTELLATION - The present invention relates to a method for adapting a link using a polar-modulation (PQAM) constellation. It applies in particular to the communications in the sub-THz band, in which the oscillator of the receiver has phase fluctuations. In a PQAM-modulation constellation, the modulation symbols are distributed on concentric circles equidistant in the complex plane, each circle including the same number of symbols, the angular distribution of the symbols on a circle being uniform and identical regardless of the circle. The adaptation of the link is carried out by taking into account the thermal noise as well as the phase noise. | 2020-11-05 |
20200351142 | INFORMATION PROCESSING DEVICE, METHOD, AND PROGRAM FOR IQ BALANCE CORRECTION - [Object] To realize IQ imbalance correction in a more preferable aspect. | 2020-11-05 |
20200351143 | DATA PROCESSING METHOD AND DEVICE, CONTROLLER, AND MOVABLE DEVICE - A data processing method includes determining a target amount according to a first amount indicating an amount of obtained data that a sensor has currently obtained and a second amount calculated according to the first amount and a preset calculation rule, reading sensor data from the sensor according to the target amount, and transmitting the read sensor data. | 2020-11-05 |
20200351144 | MULTIPLEXERS WITH PROTECTION SWITCHING - The present invention is directed to data communication. In certain embodiments, the present invention provides switching mechanism for choosing between redundant communication links. Data received from a first set of communication links are processed to have alignment markers removed, and first figure of merit value is determined based on the data without alignment markers. Similarly, a second figure of merit value is determined for the data received from the second set of communication links. A switch selects between the first set of communication links and the second set of communication links based on their respective figure of merit values. Alignment markers are inserted into the data transmitted through the selected set of data links. There are other embodiments as well. | 2020-11-05 |
20200351145 | SYSTEMS AND METHODS FOR SELECTIVE DISCOVERY OF SERVICES - A system and a process are disclosed for selective discovery of services. Present embodiments include a graphical user interface (GUI) that enables a designer to create and configure a discovery schedule that includes one or more filters. These filters enable the designer to define particular attributes and attribute values of services or service groups. Each time the discovery schedule is executed, the discovery scheduler again determines which currently defined services satisfy the conditions of the filters, and then instructs a discovery server to discover only the qualifying services associated with a client network. | 2020-11-05 |
20200351146 | ENHANCING NATIVE SERVICE LAYER DEVICE MANAGEMENT FUNCTIONALITY - Enhancements to the device management functionality within service layer architecture of a Gateway node are described. The SL application registration procedure can be enhanced for devices in support of device management. Functionality can be added to the service layer to initiate automated request notification for DM purposes. Lightweight SL Transport Protocol bindings can support sending multiple DM commands called DM Action Scripts with a specific focus on the Constrained Application Protocol (CoAP) Protocol. | 2020-11-05 |
20200351147 | DESCRIPTOR ARCHITECTURE FOR A REMOTE NETWORK MANAGEMENT PLATFORM - Systems and methods for mapping and managing interrelationships between data resources, application programs, and infrastructure components of a managed network are disclosed. A configuration management data database may contain configuration item (CI) records associated with CIs of the network. Each CI may correspond to configurable entities of the network, such as infrastructure components, application programs, and the data resources. A request relating to data resources of a data domain hierarchy of information object (IO) CIs may be received, where each IO CI is associated with a data resource of the network. A first look-up may identify one or more application programs that use the respective data resource associated with the given IO CI, and a second look-up may identify a resource database that stores the data resource associated with the given IO CI. A mapping list including the identities from the look-ups may be returned in response to the request. | 2020-11-05 |
20200351148 | SELF-ADJUSTING CONTROL LOOP - In one embodiment, a method includes monitoring, by a control loop including a processor and a memory, a first environment. The control loop includes one or more predetermined control loop parameters. The method also includes receiving, by the control loop and in response to monitoring the first environment, first data from the first environment and receiving, by the control loop, information from an adaptation control loop. The method also includes determining, by the control loop, to automatically adjust at least one of the one or more predetermined control loop parameters based at least in part on the information received from the adaptation control loop and automatically adjusting, by the control loop, the one or more predetermined control loop parameters. The method further includes determining, by the control loop, to initiate an action based on the first data collected from the first environment and the one or more adjusted control loop parameters. | 2020-11-05 |
20200351149 | Automatic Integrated Control Loop For Fault, Performance And Service Quality Management - A method includes collecting operational data from a system, segregating the data into a first component comprising one or more service quality anomalies and a second component comprising one or more network-based events, correlating the first component and the second component to determine whether the one or more network-based events have an impact on service quality, and prioritizing a resolution of the network-based events that have an impact on service quality. | 2020-11-05 |
20200351150 | INTENTION-BASED DEVICE COMPONENT TRACKING SYSTEM - A component tracking system includes a plurality of devices that each include a device component monitoring subsystem that monitors for and records the addition and/or removal of device components to/from that device. A device component manager system that is coupled to each of the plurality of devices identifies, via a recording by a first device monitoring subsystem in a first device included in the plurality of devices, the removal of a first device component from the first device. The device component manager system then determines, via a recording by a second device component monitoring subsystem in a second device included in the plurality of devices, that the first device component has been added to the second device within a time period and, in response, the device component manager device prevents a removed first device component alarm. | 2020-11-05 |
20200351151 | ALERT INTELLIGENCE INTEGRATION - An enterprise platform may include a time series database that may include time series data related to a plurality of configuration items associated with an enterprise. The enterprise platform may also include one or more instance data tables having instance data associated with the plurality of configuration items. The enterprise platform may also include an alert interface that may receive an indication of an alert associated with a configuration item of the plurality of configuration items and determine a subset of a plurality of metrics associated with the alert based on the configuration item and the time series data, the instance data, or both. The alert interface may then generate a plurality of visualizations for display via a user interface based on the subset of the plurality of metrics. | 2020-11-05 |
20200351152 | METHOD AND DEVICE MANAGER FOR CONTROLLING PROGRAM COMPONENTS IN A NETWORK DEVICE - A method and device manager for controlling program components in a network device, wherein the network device is used for handling data traffic in a communication network. First, the device manager identifies, out of a set of predefined policies, a policy comprising rules which determine how the network device should operate when handling data traffic. Then, program components required to fulfil the identified policy are identified and existing program components present in the network device are determined. The device manager further pushes any of the required program components being absent in said existing program components, to the network device. Thereby, any network device(s) can be configured and/or upgraded automatically according to appropriate predefined policies, requiring a minimum of manual work. The predefined policies can also easily be modified or extended to deploy new and/or upgraded functions. | 2020-11-05 |
20200351153 | Anima Network Information Processing Method, Device, and System - A method including sending, by a first network device, to a second network device, a first objective locally stored in the first network device to a second network device, wherein an autonomic networking integrated model and approach (ANIMA) protocol is run on both the first network device and the second network device, determining, by the first network device, whether the first objective locally stored in the first network device is changed, and sending, by the first network device, a first objective change packet to the second network device in response to the first network device determining that the first objective locally stored in the first network device is changed, the first objective change packet instructing the second network device to change the first objective locally stored in the second network device. | 2020-11-05 |
20200351154 | METHOD, APPARATUS, AND SYSTEM FOR CONTROLLING SELF-OPTIMIZATION SWITCH - Embodiments of the present disclosure provide a method, an apparatus, and a system for controlling a self-optimization switch. By using technical solutions provided in embodiments of the present disclosure, enabling and disabling of self-optimization can be controlled, and a state of the self-optimization switch can be obtained. A technical solution provided in embodiments of the present disclosure is as follows: a method for controlling a self-optimization switch includes: obtaining a target state of a self-optimization switch; and sending a setting command that includes the target state to a managed unit, where the setting command instructs the managed unit to change the state of the self-optimization switch to the target state. | 2020-11-05 |
20200351155 | BASE STATION CONFIGURATION METHOD AND APPARATUS - A base station configuration method and apparatus. During implementation of the base station configuration method, a management request sent by a network management unit to a network function management unit includes configuration information of a base station, and the configuration information may include at least one of a deployment mode and a virtualization mode. The network function management unit receives the management request sent by the network management unit, and configures the base station based on the configuration information included in the management request, so that the configuration information of the base station is sent by using the management request, and the management request may be transmitted by using a same interface between the NMF and the NFMF. | 2020-11-05 |
20200351156 | METHOD AND SYSTEM FOR FAST ONBOARDING NEW DEVICE INTO EXISTING IOT NETWORK - A method of fast onboarding a new device to an existing network having one or more existing devices includes discovering one or more new devices by the one or more existing devices, selecting the new device from the discovered one or more new devices, selecting an existing device from the one or more existing devices to initiate an onboarding process for the selected new device, encoding configuration information for the new device to join the existing network, broadcasting the encoded configuration information, capturing the encoded configuration information by the new device. and join the new device into the existing network. | 2020-11-05 |
20200351157 | OPTIMISTIC AND FAILSAFE NETWORK CONFIGURATION - An optimistic and failsafe technique validates network configurations of storage and compute nodes deployed as a cluster. An optimistic aspect of the technique, saves an initial network configuration state of each node as a “failsafe” state and an expected network end-stale is applied to each node. According to a validation aspect of the technique, each node employs a test to validate connectivity with other nodes in the cluster. In response to every validating node responding to a coordinating node that the validation test succeeded, an “all-clear” message is sent to all of the nodes instructing each node to maintain the applied expected network end-state. If any node is unreachable due to a configuration validation failure, then a failsafe aspect of the technique is invoked wherein the all-clear message is not sent and the remaining nodes of the cluster automatically “roll-hack” to the initial failsafe network state after a timeout. | 2020-11-05 |
20200351158 | SYSTEMS AND METHODS FOR NETWORK DISCOVERY FOR ZERO CONFIGURATION BASED-CLUSTERED SYSTEMS - Embodiments included herein may be configured for supplementary network discovery of one or more zero-configuration-based clustered systems. Embodiments may include providing, via one or more client machines, at least a first cluster node and a second cluster node. Each of the first cluster node and the second cluster node may include at least one of a link-local internet protocol (IP) address, a primary cluster and a secondary cluster. One or more floating link-local IP addresses may be included within the secondary cluster. A discovery host configured to be connected to the local-area network may be provided. The first cluster node and the second cluster node may be configured concurrently. An IP address conflict between one or more of the link-local IP address of the first cluster, the link-local IP address of the second cluster, and the one or more floating link-local IP addresses of the secondary cluster may be detected. | 2020-11-05 |
20200351159 | METHOD AND DEVICE FOR DETERMINING TRANSMISSION DIRECTION INFORMATION - Aspects of the disclosure are directed to a method for determining transmission direction information. The method can include acquiring direction configuration information dynamically transmitted by a base station, the direction configuration information being used to indicate transmission direction information of an information transmission resource. Further the method can include determining, according to the direction configuration information, a target information transmission unit whose transmission direction indication is ambiguous, and determining, according to a preset rule, transmission direction information of the target information transmission unit. | 2020-11-05 |
20200351160 | CLOUD MANAGEMENT CONNECTIVITY ASSURANCE - The disclosed technology relates a system is configured to generate a protected configuration for a network device based on network connectivity data for a plurality of devices in a managed network associated with a cloud management system. The system is further configured to receive a configuration change for the managed network, determine that the configuration change is incompatible with the protected configuration, and generate a notification that the configuration change is incompatible with the protected configuration. | 2020-11-05 |
20200351161 | PROVISIONAL MODES FOR MULTI-MODE NETWORK DEVICES - Techniques for implementing a provisional mode in a multi-mode network device (i.e., a network device that supports at least first and second modes of operation) are provided. According to one embodiment, the network device can receive, while running in the first mode, a request to enter the second mode. In response to the request, the network device can enter a third mode that is a provisional version of the second mode. Then, while running in the third mode, the network device can accept one or more configuration commands or settings for the second mode while simultaneously processing live network traffic according to the first mode. | 2020-11-05 |
20200351162 | Network Resource Management Devices Methods and Systems - A method of managing a configuration of a computer network system includes creating of an instance of a server by a user through an interface of a public cloud service. A management process detects the existence of the instance by regularly polling the cloud service for infrastructure data and analyzing the infrastructure data to determine that the newly created instance exists. The method also includes testing parameters of the server indicated in the infrastructure data, which parameters are fully determined by the request, against predefined one or more infrastructure policies, whereby the parameters are available and testable against the policies during the generating, but are tested after the request is enacted to create the instance without creating policy enforcement encumbrance on the user when the user creates the new instance of the server. | 2020-11-05 |