52nd week of 2021 patent applcation highlights part 84 |
Patent application number | Title | Published |
20210409175 | USER TERMINAL AND RADIO COMMUNICATION METHOD - A user terminal according to one aspect of the present disclosure includes a reception section that receives a plurality of aperiodic channel state information-reference signals (AP CSI-RS) and a control section that determines, when a time offset between reception of corresponding downlink control information and reception of the AP CSI-RS is smaller than a given threshold for each AP CSI-RS, a default QCL (Quasi-Co-Location) assumption of the AP CSI-RS based on a specific signal or channel of a given panel ID (Identifier). According to one aspect of the present disclosure, DL communication can be preferably performed even when a multi-panel/TRP is used. | 2021-12-30 |
20210409176 | CHANNEL STATE INFORMATION REFERENCE SIGNAL PARAMETER LINKAGE - Some techniques and apparatuses described herein enable a base station to configure a CSI-RS resource set with one or more parameters that are linked to one or more parameters of least one of a message that triggers CSI-RS monitoring, a physical channel associated with the CSI-RS monitoring, or an uplink reference signal associated with the CSI-RS monitoring. This allows the one or more parameters of the CSI-RS resource set to be dynamically set and/or adjusted based at least in part on the one or more parameters to which the one or more parameters of the CSI-RS resource set are linked. As a result, scheduling flexibility for beam management, downlink communications, and/or uplink communications may be increased. This may reduce delays and increase network speed, reliability, and/or beam management efficiency. Numerous other aspects are provided. | 2021-12-30 |
20210409177 | REMOTE INTERFERENCE MANAGEMENT METHOD AND APPARATUS - A remote interference management method and an apparatus are provided. The method includes: A first network device receives a reference signal (RS) sent by a second network device, where the RS is used to indicate that the second network device is subject to remote interference. The first network device determines first auxiliary information, and sends the first auxiliary information to the second network device. The first auxiliary information includes at least one of the following information: frequency domain information of a downlink transmission resource of the first network device, time domain information of the downlink transmission resource of the first network device, or beam information of downlink transmission of the first network device. | 2021-12-30 |
20210409178 | IMPLICIT SOUNDING REFERENCE SIGNAL APERIODIC TRIGGERING OFFSET - A method is performed by a wireless device for transmitting a Sounding Reference Signal, SRS. The method comprises receiving downlink control information triggering an aperiodic SRS transmission, and identifying a slot indicated by the downlink control information. If the slot indicated by the downlink control information is a downlink slot, the wireless device transmits the SRS in a slot that is not a downlink slot. | 2021-12-30 |
20210409179 | COMMUNICATION METHOD AND COMMUNICATION APPARATUS APPLIED TO WIRELESS COMMUNICATION SYSTEM - Embodiments of this application disclose a communication method and a communication apparatus applied to a wireless communication system, to provide a signaling design solution applicable to a scenario of multi-AP coordinated transmission. An embodiment of this application provides a communication method, including: a first access point (AP) generates notification information, where the notification information indicates a station (STA) that is to send a channel sounding physical layer protocol data unit (PPDU), the notification information includes identification information of the STA and identification information of a second AP, the identification information of the STA indicates the STA, and the identification information of the second AP indicates the second AP. The first AP sends the notification information to the second AP and to the STA. | 2021-12-30 |
20210409180 | RESOURCE ALLOCATION CONSTRAINT MITIGATION - Methods, systems, and devices for time domain single carrier (SC) waveform communications are described. A user equipment (UE) may generate an SC waveform by resampling (e.g., up-sampling) mapped information bits prior to insertion of a cyclic prefix (CP) or guard interval (GI). Performing resampling prior to CP/GI insertion allows for resource allocation flexibility and a base station may allocate resources for the SC waveform in accordance with this flexibility. For example, a base station may not be limited or restricted to a certain number of resources for SC waveform communications and may therefore determine a resource allocation for the UE based on the capability of the UE to perform resampling prior to CP/GI insertion. The resampling may be performed according to a set of parameters including a resampling ratio, which may be indicated to the UE via control signaling (e.g., from the base station). | 2021-12-30 |
20210409181 | PREAMBLE FOR EXTREMELY HIGH THROUGHPUT TRIGGER BASED PHYSICAL LAYER PROTOCOL DATA UNIT - This disclosure describes systems, methods, and devices related to extremely high throughput (EHT) trigger based (TB) preamble. A device may receive a trigger frame from an associated access point (AP), wherein the trigger frame comprises one or more resource unit (RU) bandwidths (BWs) allocated to the device. The device may generate an EHT physical layer protocol data unit (PPDU) based on receiving the trigger frame from the access point, wherein the PPDU comprises an EHT preamble that includes a signaling (U-SIG) field. The device may encode the U-SIG field with an indication of one or more resource unit (RU) bandwidth (BW) allocations to be used for sending the PPDU to the AP, wherein the indication is a value associated with a first option of one or more options of selectable RU BWs. The device may cause to send the PPDU to the AP and an uplink data transmission direction. | 2021-12-30 |
20210409182 | METHOD FOR TRANSMITTING HARQ-ACK INFORMATION, AND COMMUNICATION DEVICE - The present specification relates to a wireless communication system and to a method for multiplexing first HARQ-ACK information on the fastest physical uplink shared channel (PUSCH) satisfying a specific condition from among M PUSCHs (M>0), in a state in which a physical uplink control channel (PUCCH) for the first HARQ-ACK information on a first physical downlink channel overlaps with the M PUSCHs in a time domain; and an apparatus for said method. | 2021-12-30 |
20210409183 | Reduction of TTI Bundling in View of Proactive Imposition of Air-Interface Resource Reservation for a Device Class - A method and system for controlling application of TTI bundling on a carrier on which an access node provides service, the carrier defining air-interface resources. An example method includes detecting that at least a predefined threshold number of devices of a predefined class (e.g., IoT devices) are connected with the access node on the carrier. Further, the example method includes, responsive to the detecting that at least the predefined threshold number of devices of the predefined class are connected with the access node on the carrier, proactively reserving a portion of the air-interface resources for use to serve communications between the access node and the devices of the predefined class and, in view of the proactive reserving of the portion of the air-interface resources, imposing a reduction in the application of the TTI bundling by the access node on the carrier. | 2021-12-30 |
20210409184 | METHOD AND DEVICE FOR PERFORMING INITIAL CONNECTION IN WIRELESS COMMUNICATION SYSTEM - Provided are a method and device for receiving remaining minimum system information (RMSI) in a wireless communication system. User equipment (UE) receives a synchronization signal (SS)/physical broadcast channel (PBCH) block from a network, receives information about an offset between the SS/PBCH block and the RMSI from the network, and receives the RMSI from the network on the basis of the information about the offset between the SS/PBCH block and the RMSI. The offset between the SS/PBCH block and the RMSI can be based on the numerology having a smaller subcarrier interval among the numerology of the SS/PBCH block and the numerology of the RMSI, and, more generally, the numerology having the smaller subcarrier interval among the numerology of the SS/PBCH block and the numerology of the RMSI can be the numerology having the smallest subcarrier interval in each frequency range (FR). | 2021-12-30 |
20210409185 | SYSTEMS AND METHODS FOR CONJUGATE DATA MODULATION - This disclosure relates generally to wireless communications and, more particularly, to systems and methods for modulating user data with conjugate data for time domain communications. In one embodiment, a method performed by a device includes: modulating user data into modulated user data elements; determining conjugate data elements, wherein each conjugate data element is a conjugate or opposite conjugate of different modulated user data elements; and transmitting, over a time domain, a user data sequence comprising the modulated user data elements interleaved with the conjugate data elements. | 2021-12-30 |
20210409186 | COMMUNICATION METHOD AND NETWORK DEVICE - Embodiments of this application provide a communication method and a network device. The method includes: determining, by a network device, that a resource corresponding to at least one DMRS port of a plurality of DMRS ports of the network device is not used to transmit a DMRS in a first time segment; determining, by the network device, a first resource used to carry, in the first time segment, first data information to be sent to a terminal device, where the first resource includes the resource that is corresponding to the at least one DMRS port and that is not used to transmit the DMRS; sending, by the network device, indication information of the first resource to the terminal device; determining, by the terminal device based on the received indication information of the first resource, the first resource used to carry the first data information in the first time segment. | 2021-12-30 |
20210409187 | METHOD FOR ESTABLISHING COMMUNICATION IN AN OPTICAL ACCESS NETWORK - An item of ONU equipment configures itself to communicate by a first transport system with OLT equipment in an optical access network, and starts a synchronisation for the first transport system and transmits by means of the first transport system. The ONU equipment transmits, via a protocol layer supervising any transport system of the optical access network, without waiting for the end of the synchronisation for the first transport system, information dependent on identifiers of the user equipment and the first transport system. When the transport system to be used is not the first transport system, the protocol layer supervising any transport system of the optical access network interrupts the synchronisation at the OLT equipment, and the ONU equipment reattempts the synchronisation with a second transport system; otherwise the synchronisation continues for the first transport system until the ONU equipment is put in communication in the optical access network. | 2021-12-30 |
20210409188 | COUNTERMEASURES FOR SIDE-CHANNEL ATTACKS ON PROTECTED SIGN AND KEY EXCHANGE OPERATIONS - Embodiments are directed to countermeasures for side-channel attacks on protected sign and key exchange operations. An embodiment of storage mediums includes instructions for commencing a process including an elliptic curve scalar multiplication (ESM) operation including application of a secret scalar value; splitting the secret scalar value into two random scalar values; counting a number of leading ‘0’ bits in the scalar value and skipping the number of leading ‘0’ bits in processing; performing an ESM iteration for each bit of the secret scalar value beginning with a most significant ‘1’ bit of the scalar value including a Point Addition operation and a Point Double operation for each bit on randomized points; performing ESM operation dummy iterations equal to the number of leading ‘0’ bits; and returning an output result for the ESM operation. | 2021-12-30 |
20210409189 | METHOD AND DEVICE FOR COMPARING MOVEMENT PATHS BASED ON HOMOMORPHIC ENCRYPTION - A method and device for comparing movement paths based on homomorphic encrypted is disclosed, where a server includes a processor configured to collect first encrypted movement path information of a comparison target encrypted by a common key, receive, from a user device, second encrypted movement path information of a user of the user device encrypted by a private key, compare the first encrypted movement path information and the second encrypted movement path information, decrypt a portion of a result of the comparison by the common key to generate a partially decrypted comparison result, and provide the partially decrypted result of the comparison to the user. | 2021-12-30 |
20210409190 | ANONYMIZED GENERATING AND PROVING OF PROCESSED DATA - A computer-implemented method is for providing processed data. In an embodiment, the method includes receiving, by a first encryption entity, first plaintext data including a matrix of numbers; determining, by the first encryption entity, an encryption key including an integer matrix; homomorphically encrypting, by the first encryption entity, the first plaintext data based on a matrix multiplication of the first plaintext data and the encryption key, to generate first encrypted data; sending, by the first encryption entity, the first encrypted data to a processing entity; receiving, by a decryption entity, encrypted processed data from the processing entity, the encrypted processed data being based on the first encrypted data; decrypting, by the decryption entity, the encrypted processed data based on a matrix multiplication of the processed data and an inverse of the encryption key, to generate processed data; and providing, by the decryption entity, the processed data. | 2021-12-30 |
20210409191 | Secure Machine Learning Analytics Using Homomorphic Encryption - Provided are methods and systems for performing a secure machine learning analysis over an instance of data. An example method includes acquiring, by a client, a homomorphic encryption scheme, and at least one machine learning model data structure. The method further includes generating, using the encryption scheme, at least one homomorphically encrypted data structure, and sending the encrypted data structure to at least one server. The method includes executing a machine learning model, by the at least one server based on the encrypted data structure to obtain an encrypted result. The method further includes sending, by the server, the encrypted result to the client where the encrypted result is decrypted. The machine learning model includes neural networks and decision trees. | 2021-12-30 |
20210409192 | DATA ACCESS CONTROL WITH A CONFIDENTIAL BLOCKCHAIN NETWORK - Technologies are disclosed herein for secure data access. A client device accesses a slice of data using a ticket retrieved from a permissioned blockchain. To obtain the ticket, the client device submits ticket requests to multiple nodes of the permissioned blockchain. Each request identifies the slice of data, e.g. a particular row in a particular database table. Each request also includes parameters describing the circumstances of the request, such as the requesting user account, the geographic location of the computing device, etc. The permissioned blockchain stores each authorized combination of request parameters and data slices in a different access level block. If an access level block can be found that is associated with the requested slice of data and with all of the supplied parameters, and if that access level block grants permission, then the requested ticket is returned to the client device. | 2021-12-30 |
20210409193 | MODULATION-AGNOSTIC TRANSFORMATIONS USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM) - A method for implementing a fast UBDM transform includes receiving a first, input vector via a processor, and partitioning the first vector to produce a magnitude vector and a sign vector. A second vector, including a modified magnitude vector and a modified sign vector, is generated by: applying a permutation to the magnitude vector to produce the modified magnitude vector, converting the sign vector, based on an algorithm, into an intermediate sign vector, and applying nonlinear layers to the intermediate sign vector. Each nonlinear layer includes a permutation, an S-box transformation, a diffusive linear operation and/or an Xor operation. Multiple linear layers are applied to the second vector to produce a third vector, the third vector being a transformed version of the first vector. A first signal representing the third vector is sent to at least one transmitter for transmission of a second signal representing the transformed data vector. | 2021-12-30 |
20210409194 | CRYPTOGRAPHY METHOD - A method for encrypting digital data (A, E) by conversion, comprising the steps of accessing first digital data (D), wherein the first digital data (D) consist of at least one first unit, which has a data value and a data arrangement; accessing second digital data (A, E), wherein the second digital data (A, E) consist of at least one second unit which has a data value and a data arrangement; establishing a start condition, wherein the start condition has at least one start position based on the data arrangement of the first digital data; persistently retaining the data of the start condition; forming a first temporary data stream (B) from the first digital data (D) as a function of the start condition; and forming a cipher (C) by converting the second digital data (A, E), wherein the at least one second unit (a∈A) is converted using at least one predetermined function (⊕) as a function of at least one third unit (b∈B) selected from the first temporary data stream (a⊕b=c). | 2021-12-30 |
20210409195 | METHOD AND APPARATUS WITH MOBILE PAYMENT AND VERIFICATION - A processor-implemented mobile payment method includes: receiving a one-time pad (OTP) key generated based on a plurality of true random numbers; encrypting a payment token based on the OTP key; and performing a payment based on the encrypted payment token. | 2021-12-30 |
20210409196 | Secure Key Storage Systems Methods And Devices - The disclosure is related to systems and methods for obfuscating keys. In one step the system divides a storage root key into at least two chunks. In another step the system processes each of the at least two chunks with at least one obfuscation algorithm to create at least two obfuscated chunks. In a further step the system stores each of the at least two obfuscated chunks in a storage file. In a further step, user keys are encrypted with the storage root key. | 2021-12-30 |
20210409197 | PRIVATE AND FEDERATED LEARNING - Techniques regarding privacy preservation in a federated learning environment are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a plurality of machine learning components that can execute a machine learning algorithm to generate a plurality of model parameters. The computer executable components can also comprise an aggregator component that can synthesize a machine learning model based on an aggregate of the plurality of model parameters. The aggregator component can communicate with the plurality of machine learning components via a data privacy scheme that comprises a privacy process and a homomorphic encryption process in a federated learning environment. | 2021-12-30 |
20210409198 | MULTI-ENCRYPTED MESSAGE RESPONSE MANAGER - An apparatus configured to generate responses to a multi-encrypted email message. The apparatus is configured to receive an email message comprising a first portion having a first level of encryption and a second portion having a second level of encryption. The apparatus is configured to receive an indication that a first portion of a reply message is in response to the first portion of the received email message. The apparatus is further configured to receive an indication that a second portion of the reply message is in response to the second portion of the received email message. The apparatus encrypts the first portion of the reply message using a first encryption key. The apparatus further encrypts the second portion of the reply message using a second encryption key. Finally, the apparatus transmits the reply message to a server. | 2021-12-30 |
20210409199 | SECURE RELIABLE TRUSTED EXECUTION ENVIRONMENTS - A system includes an application TEE and a first cloud service of a trusted cloud provider. The first cloud service is configured to receive an encrypted disk image and to launch the application TEE. The system also includes a second cloud service of a first alternate cloud provider, which is configured to launch a first attestation service instance from an attestation disk image that includes a secret and to provide the secret to the application TEE instance. Additionally, the system includes a third cloud service of a second alternate cloud provider, which is configured to launch a second attestation service instance and to provide the secret to the application TEE instance when the second cloud service is unavailable. | 2021-12-30 |
20210409200 | IMMOBILIZER TOKEN MANAGEMENT SYSTEM - The present disclosure relates to an immobilizer token management system, and an embodiment may include generating immobilizer token indices, generating a digital key according to a request for the issuance of a digital key received from a digital key sharing device, mapping the digital key to one of the immobilizer token indices, and transmitting, to the digital key sharing device, the digital key and the immobilizer token index mapped to the digital key. | 2021-12-30 |
20210409201 | REMOTELY MANAGING DEVICES USING BLOCKCHAIN AND DICE-RIOT - Disclosed are techniques for remotely managing computing devices using blockchain and DICE-RIoT. In one embodiment, a method is disclosed comprising scanning a network to obtain a list of devices on the network; classifying the devices as either controlled or uncontrolled devices; establishing a secure channel with the controlled devices; issuing one or more control commands to the controlled devices over the secure channel, the one or more control commands included within a signed message, the signed message signed using a private key of the sender and verified using a public key of the receiver, the private key and public key generated during the establishing of the secure channel; receiving a response to the control commands; and logging the control commands and the response in a blockchain. | 2021-12-30 |
20210409202 | APPLICATION-KEY MANAGEMENT SYSTEM, APPLICATION-KEY MANAGEMENT DEVICE, APPLICATION-KEY MANAGEMENT METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, an application-key management system includes a plurality of application-key management devices and a comprehensive management device. The application-key management devices each include: a first memory configured to store an application key in one or more separated logical drives for each sharing destination of the application key shared by quantum cryptographic communication; and a first processor coupled to the first memory. The first processor is configured to: receive, from the comprehensive management device, a deletion request of specifying a logical drive storing the application key to be deleted among the logical drives; and delete the application key stored in the logical drive specified by the deletion request. | 2021-12-30 |
20210409203 | MUTABLE ENCRYPTED SYSTEM - Security of network traffic may be increased by utilizing a mutable password to encrypt and decrypt content stored inside an executable utilizing a mutable password (e.g., where a password changes based on an equation when the executable is run). For example, the present password may be associated with a variable, the variable may be modified when the executable is run using the present password, and a subsequent password may be generated based on the modified variable. | 2021-12-30 |
20210409204 | ENCRYPTION OF PROTECTED DATA FOR TRANSMISSION OVER A WEB INTERFACE - Aspects of the disclosure relate to encryption of protected data for data transmission over a web interface. A computing platform may submit, via a first computing device, a query for data associated with a user. The computing platform may receive a search result comprising an attribute of the user. Then, the computing platform may generate, based on the attribute of the user, a data file comprising an attribute identifier associated with the attribute of the user. Then, the computing platform may upload, via a web interface and to a second computing device, the data file comprising the attribute identifier. Subsequently, the computing platform may receive, via the web interface and from the second computing device, an encryption key corresponding to the attribute identifier. Then, the computing platform may store, via the first computing device and in a database, an association between the attribute, the attribute identifier, and the encryption key. | 2021-12-30 |
20210409205 | STATELESS SERVICE-MEDIATED SECURITY MODULE - Secure operations can be performed using security module instances offered as a web service through a resource provider environment. State data and cryptographic material can be loaded and unloaded from the instance as needed, such that the instance can be reused for operations of different customers. The material and data can be stored as a bundle encrypted using a key specific to the hardware security module and a key specific to the resource provider, such that the bundle can only be decrypted in an instance of that type of security module from the associated manufacturer and operated by that particular resource provider. The customer is then only responsible for the allocation of that instance during the respective cryptographic operation(s). | 2021-12-30 |
20210409206 | TRUSTED ENVIRONMENT REMOTE VERIFICATION METHOD AND APPARATUS, DEVICE, SYSTEM, AND MEDIUM - Provided are a trusted environment remote verification method and apparatus, a device, a system, and a medium. The implementation is as follows: in response to a remote verification request of a verification demander, performing local verification on a target enclave through a verification program of the verifier; and signing a local verification result through a first key of the verification program, and feeding back the signed local verification result to the verification demander to enable the verification demander to perform the following operations: performing signature verification on the signed local verification result according to a second key associated with the first key, and determining a remote verification result of the target enclave according to a signature verification result. | 2021-12-30 |
20210409207 | DISTRIBUTED ENTROPY SYSTEM AND METHOD - A method is disclosed. The method includes receiving, by a computer node in a network including a plurality of computer nodes, a plurality of data values from the plurality of computer nodes. Each computer node can create a data value based on a time that the computer node in the plurality of computer nodes takes to perform a function. The computer node can then provide the data values or derivatives thereof as random values to an entropy pool of random values. The computer node can then select a random value from the entropy pool and initiate use of the random value in an operation. | 2021-12-30 |
20210409208 | CRYPTOGRAPHIC PROCESSING METHOD, RELATED ELECTRONIC DEVICE AND COMPUTER PROGRAM - A cryptographic processing method comprises the following steps:
| 2021-12-30 |
20210409209 | GENERATING KEYS FOR PERSISTENT MEMORY - An apparatus includes a processor, persistent memory coupled to the processor, and a memory protection logic. The processor may include multiple processing engines. The persistent memory may include a persistent storage portion and a memory expansion portion. The memory protection logic is to: obtain a first ephemeral component associated with the persistent storage portion; generate a persistent key using the first ephemeral component; obtain a second ephemeral component associated with the memory expansion portion; and generate a non-persistent key using the second ephemeral component. Other embodiments are described and claimed. | 2021-12-30 |
20210409210 | Hardware Security Module - According to one exemplary embodiment, a hardware security module is described, having a receiver, which is configured to receive instructions for performing cryptographic operations, and a control device, which is configured to take an instruction load of the hardware security module as a basis for deciding whether one or more instructions should be relocated and, if one or more instructions should be relocated, to determine another hardware security module for relocating the one or more instructions, to authenticate the other hardware security module and to request the execution of the one or more instructions by the other hardware security module. | 2021-12-30 |
20210409211 | MITIGATING SERVICE DISRUPTIONS IN KEY MAINTENANCE - Embodiments of the present invention provide systems and techniques for changing cryptographic keys in high-frequency transaction environments to mitigate service disruptions or loss of transactions associated with key maintenance. In various embodiments, a server device can employ a working key encrypted with a first master key to decrypt messages being communicated from a client device, whereby each message is encrypted with a first cryptogram that was generated based on the working key encrypted with the first master key. While the working key encrypted with the first master key is being employed, the server device can generate a notification including a second cryptogram generated based on the working key encrypted with a second master key for transmission to the client device. The transmitted notification can cause the client device to encrypt the messages being communicated with the second cryptogram. The server device can concurrently employ the working key encrypted with one of the first and second master keys to decrypt messages received from the client device, whether encrypted with the first cryptogram or the second cryptogram. | 2021-12-30 |
20210409212 | CONTROL DEVICE, INDUSTRIAL CONTROL SYSTEM, AND ENCRYPTION KEY LIFE EXTENSION METHOD - The control device is configured to communicate with another device via a communication network, and comprises: a key acquisition unit configured to acquire, from a key distribution server via the communication network, an encryption key with a life period for performing encrypted communication with the another device; an encrypted communication processing unit configured to perform the encrypted communication with the another device using the encryption key within the life period; a server state detection unit configured to detect a key acquisition disabled state where acquisition of the encryption key by the key acquisition unit is disabled; and a life extension unit configured to perform extension processing for extending the life period if the key acquisition disabled state is detected. | 2021-12-30 |
20210409213 | METHOD FOR REALIZING OFF-LINE INITIALIZATION OF HARDWARE WALLET AND EQUIPMENT THEREOF - A method for realizing off-line initialization of a hardware wallet, including: generating a key seed according to a mnemonic phrase length when receiving information of building hardware wallet, generating multiple mnemonic word identifications according to the mnemonic phrase length and the key seed, searching for a corresponding mnemonic word from a preset dictionary according to the mnemonic word identification, jointing the mnemonic words to obtain a mnemonic phrase, generating a master key according to the key seed and storing the master key; searching for a corresponding mnemonic word from the preset dictionary according to a letter of a word when receiving information of restoring hardware wallet, obtaining a key seed according to a length of selection information, generating a master key according to the key seed and authenticating the master key, storing the master key if the master key is authenticated successfully; and setting the hardware wallet state as initialized. | 2021-12-30 |
20210409214 | Subscription Concealed Identifier (SUCI) Supporting Post-Quantum Cryptography - A device and a network can authenticate using a subscription concealed identifier (SUCI). The device can store (i) a plaintext subscription permanent identifier (SUPI) for the device, (ii) a network static public key, and (iii) a key encapsulation mechanism (KEM) for encryption using the network static public key. The network can store (i) a device database with the SUPI, (ii) a network static private key, and (iii) the KEM for decryption using the network static private key. The device can (i) combine a random number with the SUPI as input into the KEM to generate a ciphertext as the SUCI, and (ii) transmit the ciphertext/SUCI to the network. The network can (i) decrypt the ciphertext using the KEM to read the SUPI, (iii) select a key K from the device database using the SUPI, and (iv) conduct an Authentication and Key Agreement (AKA) with the selected key K. | 2021-12-30 |
20210409215 | ERROR-CORRECTING KEY AGREEMENT FOR NOISY CRYPTOGRAPHIC SYSTEMS - A system, method, and computer program product are provided for sending and receiving messages using a noisy cryptographic system. To send a message, N secret keys are negotiated using a noisy cryptographic system, where K secret keys are expected to be noiseless. A secret polynomial that includes the N secret keys is generated, and K points on the secret polynomial are derived. For each of the N secret keys, a secret key MAC key is derived and a secret key MAC is calculated using the derived secret key MAC key. A secret key MAC header is generated that includes an array of each of the secret key MACs and possibly a corresponding public key. Message integrity plaintext is generated that includes an encrypted message, the secret key MAC header, and an array of the K points on the secret polynomial. A final message that includes the message integrity plaintext is generated for being sent. | 2021-12-30 |
20210409216 | SYSTEM AND METHOD FOR PROVIDING CONTROLLED ACCESS TO PERSONAL INFORMATION - Systems and methods for managing verification and identity information comprises a private blockchain configured to be accessed by a user associated with a first entity. The private blockchain comprises an immutable ledger. Information associated with the first entity is stored on the private blockchain. A digital passport is generated containing blocks corresponding to the private blockchain that are associated with the first entity. The user causes to be transmitted attestation information verifying that the user is associated with the first entity. | 2021-12-30 |
20210409217 | SYSTEM AND METHOD FOR SECURE AUTHENTICATION AND AUTHORIZATION - Embodiments herein relate to system and method for secure authentication and authorization between a user device and an Internet of Things (IoT) device that is associated with an asset. The method includes onboarding, using a centralized computing device having one or more processors that are operatively associated with a distributed ledger, the user device with a user at least based on a public key identity of the user device; onboarding the user of the user device with the user device; onboarding an identity of the IoT device and the asset such that association between the asset and the IoT device is endorsed on the distributed ledger; and facilitating, through the centralized computing device, the user device to retrieve a first set of data packets representative of any of a relevant electronic authoritative document(s), associated consensus proof(s), and block header(s) from the distributed ledger. | 2021-12-30 |
20210409218 | ACCESS CONTROL FOR SHORT-LIVED RESOURCE PRINCIPALS - Techniques are described for enabling resources within a cloud computing system to interact with each other. In certain embodiments, a resource is assigned a digital token that provides certain access privileges for the duration in which the digital token is valid. The digital token permits the resource to have access for a duration sufficient to perform some operation (e.g., run one-time code or the same code periodically on a scheduled basis), but without extending the level of access for significantly longer than necessary to complete the operation. Each time the resource principal is to perform the operation, the token can be reissued to the resource to provide the resource with time-limited access privileges. The use of this short-lived token avoids having to create permanent credentials for the resource. | 2021-12-30 |
20210409219 | ACCESS CONTROL FOR LONG-LIVED RESOURCE PRINCIPALS - Techniques are described for enabling resources within a cloud computing system to interact with each other. In certain embodiments, a token renewal mechanism is provided for extending the duration in which a first resource can access another resource. The token renewal mechanism can involve the first resource periodically causing a new credential to be generated for itself and then communicating the new credential to an identity and access management (IAM) system. The new credential may be generated for compliance with a credential rotation policy specifying that credentials should be changed after a certain period of time. The IAM system may associate a digital access token with the new credential so that for subsequent requests, the IAM system will only recognize the resource principal based upon the new credential. The digital token can be invalidated if a new credential is not changed within the specified period of time. | 2021-12-30 |
20210409220 | DISTRIBUTED MACHINE LEARNING VIA SECURE MULTI-PARTY COMPUTATION AND ENSEMBLE LEARNING - Systems and methods for combining input data and machine learning models that remain secret to each entity are described. This disclosure can allow groups of entities to compute predictions based on datasets that are larger and more detailed collectively than individually, without revealing their data to other parties. This is of particular use in artificial intelligence (AI) tasks in domains which deal with sensitive data, such as medical, financial, or cybersecurity. | 2021-12-30 |
20210409221 | Portable Biometric Identity on a Distributed Data Storage Layer - A distributed data storage layer supports biometric identification systems. The biometric identity system includes hardware and software improvements for capturing, retrieving, and verifying identity based on securely stored biometric data in the distributed data storage layer. As a result, the biometric identity system provides increased individual security and reliable identification. | 2021-12-30 |
20210409222 | METHODS AND APPARATUS FOR PERFORMING ATTESTATION - Aspects of the present disclosure relate to an apparatus comprising first interface circuitry to communicate with relying party circuitry, the first interface circuitry being configured to receive, from the relying party circuitry, an attestation request in respect of a processing operation requested by attester circuitry to be performed by the relying party circuitry; second interface circuitry to communicate with the attester circuitry, the second interface circuitry being configured to: transmit the attestation request to the attester circuitry; and receive, from the attester circuitry, evidence data associated with the processing operation, and third interface circuitry to communicate with verifier circuitry, the third interface circuitry being configured to: transmit the evidence data to the verifier circuitry; and receive, from the verifier circuitry, attestation result data indicative of a verification of the evidence data, wherein the first interface circuitry is configured to transmit the attestation result data to the relying party circuitry. | 2021-12-30 |
20210409223 | REMOTE ATTESTATION BASED ON RUNTIME CONFIGURATION - A method of attestation of a host machine based on runtime configuration of the host machine is provided. The method receives, at an attestation machine, a request from the host machine for attestation of a software executing on the host machine, the request including at least one security-related configuration of the software at launch time and a corresponding runtime behavior of the software when the security-related configuration changes. The method then generates a claim based on evaluating a value associated with the at least one security-related configuration and the corresponding runtime behavior of the software when the value changes. The method also generates an attestation token after a successful attestation of the software and include in the attestation token the generated claim. The method further transmits the attestation token to the host machine. | 2021-12-30 |
20210409224 | METHOD AND APPARATUS FOR CREATING BLOCKS IN BLOCKCHAIN SYSTEM - A block production method and a block producing node including creating an entangled transaction list by combining a plurality of transactions received through the communication unit and producing a block using the entangled transaction list are provided. | 2021-12-30 |
20210409225 | CONTRACT APPARATUS AND METHOD OF BLOCKCHAIN USING LOCATION INFORMATION - Disclosed are blockchain type contract terminal and method using position information. There are provided: an input module that is inputted with a contract term regarding an object of contract; a position information collection module that collects, in real time, position information of the object at the time of contract; a contract creation module that creates a contract by using the contract term inputted by the input module and the position information at the time of contract collected in real time by the position information collection module; a blockchain creation module that encrypts the contract created by the contract creation module to create a blockchain; and a blockchain distributed storage control module that transmits the blockchain created at the blockchain creation module to another terminal in a P2P manner for storing on a network in a distributed manner. | 2021-12-30 |
20210409226 | REVERSIBLE BLOCKCHAIN TRANSACTION TECHNIQUES - A system and method for creating reversible blockchain transactions. A method includes determining a hidden address for a transaction to be uploaded to a blockchain, wherein the hidden address is an internal address of a device indicating at least one parameter that causes the hidden address to be inaccessible to a blockchain-utilizing application installed on the device; and generating a reversible transaction based on the determined hidden address. | 2021-12-30 |
20210409227 | SECURELY AUTHORIZING SERVICE LEVEL ACCESS TO A BACKUP SYSTEM USING A SPECIALIZED ACCESS KEY - Described is a system (and method) for securely authorizing service level access to a backup system using an access key. The service level access (or access via a service account) may provide a user with an enhanced set of privileges to perform troubleshooting operations on the backup system. Such privileges may be unlocked by allowing a user to perform operations using an unrestricted interface of the backup system such as an operating system shell. To authorize such access, the system may provide a limited (or specialized) access key. The access key may be narrowly tailored to only provide access to a particular backup system and only remain viable for a limited duration. Accordingly, the access key may be configured to embed a system identifier, a timestamp, and a digital signature, which may be independently verifiable by the backup system before granting service level access. | 2021-12-30 |
20210409228 | VALIDATING AND SECURING CALLER IDENTIFICATION TO PREVENT IDENTITY SPOOFING - A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device. | 2021-12-30 |
20210409229 | GENERIC CODE SIGNING CLIENT WITH DOWNLOADABLE MODULES - A method for signing data such as software images is provided that uses modules executable by a generic client to sign hashes of the software images rather than the images themselves. The method avoids both the requirement for new or updated client software and the uploading of full software images to the signing system. This approach uses a generic client that requests and downloads processing modules from the signing system to perform the pre-processing operations in signing software images, as well as optionally for post-processing operations. | 2021-12-30 |
20210409230 | SIGNATURE VERIFICATION USING BLOCKCHAIN - A package management system to initiate a transaction in a blockchain system. The transaction comprises an indication of the signature for the software package and is to be stored in a blockchain. The package management system distributes the software package to a computing device with an indication of a location of the signature in the blockchain. | 2021-12-30 |
20210409231 | FACILITATING AUTHENTICATION OF ROUTING MODULES ASSOCIATED WITH ONE OR MORE NETWORK DEVICES TO ALLOW ZERO TOUCH PROVISIONING - A network device may receive a redundant identifier certificate associated with a redundant routing module, and may provide, to a bootstrap device, a primary identifier certificate associated with a primary routing module associated with the network device. The network device may establish a secure connection with the bootstrap device based on the bootstrap device verifying an authenticity of the primary routing module via the primary identifier certificate. The network device may provide, to the bootstrap device via the secure connection, a redundant routing module identifier associated with the redundant routing module and may receive, from the bootstrap device via the secure connection, a signed certificate chain associated with the redundant routing module. The network device may verify the signed certificate chain and may verify the redundant identifier certificate, associated with the redundant routing module, based on verifying the signed certificate chain. | 2021-12-30 |
20210409232 | SECURITY CONTEXT DISTRIBUTION SERVICE - Techniques for configuring a device with a security context using a security context distribution service are provided. One embodiment receives, from a first device operating on a first network, a request for a security context for the first device, where the request includes a public certificate for the first device. The request is decrypted, and the public certificate is validated. A set of device requirements are determined based on a unique identifier for the first device and device claim information associated with the first device. Embodiments generate a response message that contains at least one Transport Layer Security (TLS) certificate associated with the first network, based on the set of device requirements, where the response message is encrypted using a public key associated with the first device. The response is message is transmitted to the first device. | 2021-12-30 |
20210409233 | PUF METHOD AND STRUCTURE - Disclosed herein is related to physical unclonable function (PUF) with enhanced security based on one time programmable (OTP) memory device. In one aspect, indirection process, hashing or a combination of them can be employed to hide a key for allowing access to an integrated circuit. Each indirection process may include identifying a subsequent address of the OTP memory device based on content stored by the OTP memory device at an address, and obtaining subsequent content stored by the OTP memory device at the subsequent address. Through a number of indirection processes, hidden content stored by the OTP memory device can be obtained. In one approach, hashing can be applied to input bits to obtain an address of the OTP memory device to apply. In one approach, hashing can be applied to the hidden content stored by the OTP memory device to generate the key. | 2021-12-30 |
20210409234 | Using A Single Request for Multi-Person Calling in Assistant Systems - In one embodiment, a method includes receiving a user request to call a plurality of second users simultaneously from a client system associated with a first user via an assistant xbot, wherein the user request comprises one or more references referring the plurality of second users, identifying the plurality of second users by resolving the one or more references to a plurality of entity identifiers associated with the plurality of second users, respectively, and initiating a group call to the plurality of second users simultaneously based on the plurality of entity identifiers by the assistant xbot. | 2021-12-30 |
20210409235 | FACILITATION OF PREDICTIVE ASSISTED ACCESS TO CONTENT - Edge node networks can be utilized to facilitate predictive access to content for a wide variety of applications. For example, predictive data can be generated based on historical patterns, audio data, calendar invites, etc. The predictive data can include predicted locations, persons present based on usage of their mobile device, edge node and access point usage, etc. The predicted data can be used to facilitate more efficient access to content by proactively sending mobile application and/or content usage data to edge node equipment that is predicted to be used in accordance with a predicted a predicted event. Furthermore, the predictive analysis can be used to modify mobile screens for quicker access to content and/or mobile applications. | 2021-12-30 |
20210409236 | Port Mode Adaptation Method and Apparatus - A port mode adaptation method includes a network device determining a status of a port on the network device. The method includes the network device setting a mode of the port to an Ethernet interface mode if the status of the port satisfies a first condition. In this way, when the network device identifies the mode of the port on the network device as the FlexE interface mode, and there is no link at the FlexE shim of the port, the network device may determine that a mode used by a port interconnected with the port is not a FlexE interface mode. In this case, the network device may adaptively set the mode of the port to the Ethernet interface mode, to ensure that the port on the network device can use a same mode as another port interconnected with the port. | 2021-12-30 |
20210409237 | COMMAND INPUT DEVICE AND CONTROLLING METHOD THEREOF - Disclosed is a method for controlling a command input device. The method includes: sensing contact between a home appliance and the command input device; based on sensing the contact between the home appliance and the command input device, determining the home appliance as a target home appliance to be controlled by the command input device; and based on the determination of the home appliance as the target home appliance to be controlled by the command input device, activating a remote controller provided by the command input device and configured to control the target home appliance. | 2021-12-30 |
20210409238 | Smart Energy Hub - Systems, apparatuses, and methods are described for a smart energy home. The smart energy home may promote optimization of consumption of electricity by appliances and other consumer devices. Prioritization of where and when electricity may be provided to various appliances, chargers, or other devices which draw electrical power may be managed by the smart energy home. Information concerning prevailing weather conditions and contemporaneous electrical tariffs may be utilized in processes executed by the smart energy home. Related systems, apparatuses, and methods are also described. | 2021-12-30 |
20210409239 | SYSTEM AND METHOD FOR PROVIDING NETWORK SUPPORT SERVICES AND PREMISES GATEWAY SUPPORT INFRASTRUCTURE - A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g. by selectively activating/deactivating service logic modules in the gateway. The service management system also may selectively provide secure communications and exchange of information among gateway devices and among associated endpoint devices. An exemplary service management system includes a router connected to the network and one or more computer platforms, for implementing management functions. Examples of the functions include a connection manager for controlling system communications with the gateway devices, an authentication manager for authenticating each gateway device and controlling the connection manager and a subscription manager for managing applications services and/or features offered by the gateway devices. A service manager, controlled by the subscription manager, distributes service specific configuration data to authenticated gateway devices. | 2021-12-30 |
20210409240 | WIRELESS INTERNET OF THINGS, CLIMATE CONTROL AND SMART HOME SYSTEM - Systems and methods for an Internet of Things (IoT), smart home climate control and communication system are provided. The IoT, smart home climate control and communication system includes a first smart home device that receives signal sources from a wide area network, transmits signals, data and commands to one or more smart home devices in a home or building in an IoT LAN. The first smart home device also receives signals, data and commands from the one or more smart home devices in the home or building on the IoT LAN, and transmits signals, data and/or commands to the wide area network. The IoT LAN is distinct from a residential wireless LAN. | 2021-12-30 |
20210409241 | METHOD AND APPARATUS FOR PROVIDING A HIGH SECURITY MODE IN A NETWORK - Systems and methods systems and methods for efficiently and securely forming a communication network. As a non-limiting example, various aspects of the present disclosure provide systems and methods, for example utilizing a plurality of different security modes, for forming a premises-based network (e.g., a MoCA network). | 2021-12-30 |
20210409242 | BIER Packet Sending Method and Apparatus - A bit index explicit replication (BIER) packet sending method includes receiving, by a first node in a first BIER domain, a packet from a second node in a second BIER domain, where the packet carries an identifier of the second BIER domain, determining a BIER packet sending policy corresponding to the identifier of the second BIER domain based on the identifier of the second BIER domain and according to a preconfigured BIER packet sending policy, and encapsulating and sending a BIER packet according to the BIER packet sending policy. | 2021-12-30 |
20210409243 | Method and Device for Implementing Gateway Cooperation, IoT Gateway and Storage Medium - Embodiments of the present disclosure provide a method and device for implementing gateway cooperation, a gateway and a storage medium. The method for implementing the gateway cooperation includes: selecting, from gateways in an IoT network, at least one cooperative gateway for a target gateway; notifying the target gateway of the at least one cooperative gateway, wherein the at least one cooperative gateway is used for establishing cooperation with the target gateway and performing cooperative management. | 2021-12-30 |
20210409244 | CONTROL CHANNEL MONITORING AGGREGATION WITH BLENDED RESOURCE ELEMENT GROUP (REG) BUNDLES - Certain aspects of the subject matter described in this disclosure can be implemented in a method for wireless communication. The method generally includes generating a resource element group (REG) bundle for channel estimation, the REG bundle having a plurality of REGs to be transmitted in a plurality of monitoring occasions; and transmitting, to a user equipment (UE), the REG bundle using the plurality of monitoring occasions. | 2021-12-30 |
20210409245 | SLIDING BLOCK DECISION EQUALIZER - A method and apparatus for signal equalization are provided. Multiple decision components are arranged in a sequence, beginning with a history portion and ending with a decode portion. Each decision component performs a decode decision on a symbol. Decode decisions are passed forward to other decision components where they can be used to compensate for intersymbol interference. Decode decision output by the history portion are otherwise discarded, while decode decisions output by the decode portion are output as a decoded signal. In the next decode cycle, input previously provided to the decode portion is again provided to the history portion, in a sliding, overlapping block manner. | 2021-12-30 |
20210409246 | ENHANCED DISCRETE-TIME FEEDFORWARD EQUALIZER - An N-tap feedforward equalizer (FFE) comprises a set of N FFE taps coupled together in parallel, a filter coupled between the (N−1)th FFE tap and the Nth FFE tap, and a summer coupled to an output of the set of N FFE taps. Each FFE tap includes a unique sample-an-hold (S/H) circuit that generates a unique time-delayed signal and a unique transconductance stage that generates a unique transconductance output based on the unique time-delayed signal. The filter causes the N-tap FFE to have the behavior of greater than N taps. In some examples, the filter is a first order high pass filter that causes coefficients greater than N to have an opposite polarity of the Nth coefficient. In some examples, the filter is a first order low pass filter that causes coefficients greater than N to have the same polarity as the Nth coefficient. | 2021-12-30 |
20210409247 | HIGH SPEED COMMUNICATIONS SYSTEM - Transmission of baseband and carrier-modulated vector codewords, using a plurality of encoders, each encoder configured to receive information bits and to generate a set of baseband-encoded symbols representing a vector codeword; one or more modulation circuits, each modulation circuit configured to operate on a corresponding set of baseband-encoded symbols, and using a respective unique carrier frequency, to generate a set of carrier-modulated encoded symbols; and, a summation circuit configured to generate a set of wire-specific outputs, each wire-specific output representing a sum of respective symbols of the carrier-modulated encoded symbols and at least one set of baseband-encoded symbols. | 2021-12-30 |
20210409248 | SAMPLE-AND-HOLD-BASED RETIMER SUPPORTING LINK TRAINING - A linear retimer includes an equalizer, a clock recovery circuit, a sample and hold (S/H) circuit, and a linear driver. The equalizer receives an input signal and outputs an equalized signal. The clock recovery circuit receives the equalized signal and outputs a clock signal. The S/H circuit receives the equalized signal and the clock signal and outputs a retimed signal. The linear driver receives the retimed signal and outputs a recovered signal. The S/H circuit is configured to preserve a voltage of the equalized signal in the retimed signal. In some examples, the S/H circuit is part of a linear three-tap feedforward equalizer, and the linear driver receives an output of the feedforward equalizer. The linear retimer can be placed between a transmitter and a channel or after the channel. | 2021-12-30 |
20210409249 | TRANSMISSION OF PUNCTURED NULL DATA PACKETS AND PARTIAL BANDWIDTH FEEDBACK - A technique for wireless communication of a punctured null data packet with a long training field sequence is disclosed. The long training field (LTF) sequence is generated for the null data packet (NDP) for transmission over a channel having a bandwidth that is an integer multiple of 80 MHz. The LTF sequence is modulated onto a plurality of tones of the channel excluding tones within a punctured subchannel of a plurality of subchannels of the channel. The modulation may be based on a size and location of the punctured subchannel and a symbol duration associated with transmitting the LTF sequence. The NDP is transmitted including the LTF sequence to a second wireless communication device via the channel. A partial bandwidth feedback may be received in response to the LTF in the punctured NDP. | 2021-12-30 |
20210409250 | MAXIMUM POWER REDUCTION FOR NON-CONTIGUOUS ALLOCATION - Apparatuses, methods, and systems are disclosed for determining a maximum power reduction for non-contiguous radio resource allocations. One apparatus includes a processor that receives a non-contiguous resource allocation and calculates a fraction of resource block punctured from a smallest containing contiguous allocation (“SCCA”). Here, the SCCA is the smallest set of contiguous resource blocks that encompasses the non-contiguous resource allocation. The processor determines a first additional maximum power reduction for the non-contiguous resource allocation in response to the fraction of punctured resource blocks being less than a threshold value. The apparatus includes a transceiver that transmits an uplink signal on the non-contiguous resource allocation using the first additional maximum power reduction in response to the fraction of punctured resource blocks being less than the threshold value. | 2021-12-30 |
20210409251 | SELECTING THE LOCATION OF PEAK REDUCTION TONES FOR REDUCING A PEAK-TO-AVERAGE POWER RATIO OF A WIRELESS TRANSMISSION - Aspects of the disclosure relate to techniques for peak-to-average power ratio (PAPR) reduction based on a tone reservation (TR) algorithm. For a TR algorithm, a suitable subset of tones from among a full set of tones in a given resource allocation are reserved for use as peak reduction tones (PRT). An apparatus, such as a wireless communication device, selects a set of PRTs based on a deterministic pseudo-random tone selection algorithm, such as quadratic sampling, cubic sampling, or Fibonacci-type sampling. The apparatus determines a PAPR reduction waveform for transmission on the PRTs and transmits a data waveform multiplexed with the PAPR reduction waveform on resources corresponding to the resource allocation. Other aspects, embodiments, and features are also claimed and described. | 2021-12-30 |
20210409252 | ELECTRONIC DEVICE AND COMMUNICATION METHOD - An electronic device and communication method are disclosed. The electronic device comprises a processing circuit configured to perform a pre-processing operation on a first one-dimensional sequence of modulation symbols, the pre-processing operation including: performing a dimension-increasing conversion to convert the first one-dimensional sequence of modulation symbols into a first multi-dimensional modulation symbol block; transforming the first multi-dimensional modulation symbol block into a second multi-dimensional modulation symbol block with a first transformation, wherein the first transformation couples each symbol in the first multi-dimensional modulation symbol block with each other; and performing a dimension-decreasing conversion to convert the second multi-dimensional modulation symbol block into a second one-dimensional sequence of modulation symbols, wherein the dimension-decreasing conversion is an inverse process of the dimension-increasing conversion. The processing circuit is also configured to transmit the second one-dimensional sequence of modulation symbols. | 2021-12-30 |
20210409253 | FAST SCAN OF NB-IoT SIGNALS IN NETWORKS - The invention discloses a method for fast detection scan of NB-IoT signals in networks. The object of the invention to provide a scanning procedure which is reliable and very fast in order to reduce the search time and hence the power consumption will be solved by a method for fast detection scan of NB-IoT signals in a network by applying a higher sampling rate than 240 kHz and observing a received signal at a receive bandwidth around a magnitude wider than the NB-IoT signal bandwidth of 180 kHz, wherein a set of 2M+1 NB-IoT signals each having a different E-UTRA absolute radio frequency channel number (EARFCN) can be observed simultaneously, whereas M is a natural number and 2M+1 indicates the number of concurrently observed channels. | 2021-12-30 |
20210409254 | OFDM MODULATOR FOR BLOCK-FILTERED OFDM TRANSMITTER, RELATED BLOCK-FILTERED OFDM TRANSMITTER AND TRANSCEIVER SYSTEM - An OFDM modulator including a predistortion module configured to receive the N consecutive data carriers and configured to compensate for distortion subsequently introduced by a polyphase filter bank connectable to the output of the OFDM modulator, a transformation module configured to apply a discrete inverse Fourier transform of constant size N | 2021-12-30 |
20210409255 | CALIBRATION METHOD AND CALIBRATION SYSTEM - A calibration method for calibrating an electronic device is described. The method comprises: generating a test signal having a predefined bandwidth, said test signal comprising an asymmetric signal component being asymmetric in frequency domain, and said test signal further comprising a symmetric signal component being symmetric in frequency domain; processing said test signal via said electronic device, thereby generating a response signal of said electronic device to said test signal; analyzing said response signal, thereby generating measurement data comprising information on impairments due to at least one of a frequency selective channel of said electronic device and an IQ mismatch of said electronic device; and adapting at least one operational parameter of said electronic device based on said measurement data in order to calibrate the electronic device. Further, a calibration system is described. | 2021-12-30 |
20210409256 | Dormant Mode Measurement Optimization - Methods performed by a wireless device operating in a dormant mode comprise performing a measurement on each of a plurality of resources from a predetermined set of resources or demodulating and decoding information from each of a plurality of resources from a predetermined set of resources, such as a set of beams. The methods further include evaluating the measurement or the demodulated and decoded information for each of the plurality of resources against a predetermined criterion, and then discontinuing the performing and evaluating of measurements, or discontinuing the demodulating and decoding and evaluation of information, in response to determining that the predetermined criterion is met, such that one or more resources in the predetermined set of resources are neither measured nor demodulated and decoded. The methods further comprise deactivating receiver circuitry, further in response to determining that the predetermined criterion is met. | 2021-12-30 |
20210409257 | MANAGING DATA SCHEMA DIFFERENCES BY PATH DETERMINISTIC FINITE AUTOMATA - A method for migrating a data schema comprising combining a first deterministic finite automaton with a second deterministic finite automaton to generate a modified deterministic finite automation. Identifying a state of the modified deterministic finite automaton without computed followers. Computing a new vector of original states for each state of the modified deterministic finite automaton corresponding to the identified state. | 2021-12-30 |
20210409258 | DATA CENTER MANAGEMENT OVER A POWER PLANE - Data center management over a power plane, including: coupling, via a plurality of power planes, a management hub to one or more servers; and transferring, via the plurality of power planes, data between the management hub and the one or more servers. | 2021-12-30 |
20210409259 | High -Volume Time-Series Data Processing While Live-Monitoring Agent Instances to Trigger Automation - A system may include one or more processors disposed within a management network, where the management network has computing resources dedicated to an end-user network. The end-user network may include agent instances and one or more servers associated with the end-user network. The one or more servers are operable to: (i) receive communications to the end-user network, and (ii) assign agent instances to service the communications. The one or more processors may be configured to perform one or more tasks. These tasks may include receiving data associated with the processes of the one or more servers, where the processes relate to the end-user network. The tasks may also include determining, based on a specification, an operation to be performed by the one or more servers, where the specification is defined by the end-user network and comprises a logical directive including at least one condition that, if satisfied by the received data, define the operation. The tasks may also include providing, to the one or more servers, the operation. | 2021-12-30 |
20210409260 | SOFTWARE-DEFINED NETWORK RESOURCE PROVISIONING ARCHITECTURE - Embodiments are directed to an overlay network for an industrial Internet of Things. The overlay network has multiple main components: (1) a security component, such as a cloaked network, (2) a digital twin component that operates as digital simulations of the physical devices, (3) a communications mesh, and (4) a resource provisioning matrix for adjusting the resources used by the digital twin. The overlay network is a virtual network that is Software Defined—it sits on top of the existing Internet physical hardware of servers, routers, etc. The overlay network is sometimes referred to herein as a Software Defined Secure Content/Context Aware Network (SD-SCAN). | 2021-12-30 |
20210409261 | RESIDENTIAL GATEWAY WITH TRAFFIC SCHEDULING - The stability and reliability of broadband service connectivity improved by utilizing both wireline and wireless connections. For example, a residential gateway may continue to provide stable broadband connectivity to a service provider network (e.g., exceeding minimum quality of service thresholds) when subjected to a broadband fault (e.g., loss or degradation of data) by managing or utilizing both a wireline broadband connection and a wireless broadband connection. | 2021-12-30 |
20210409262 | AUTOMATED NETWORK LINK REPAIR - A system may identify, by a first service, one or more faulted data links associated with a network device of the datacenter and update, by a second service, a configuration of the network device to remove data traffic from the identified one or more faulted data links based on a redundancy threshold associated with the network device. The system may also generate a repair ticket message associated with the identified one or more faulted data links and transmit test traffic across the identified one or more faulted data links while monitoring for a repair ticket resolution message associated with repairing the identified one or more faulted data links. | 2021-12-30 |
20210409263 | METHOD AND APPARATUS FOR HANDLING SIDELINK RADIO LINK FAILURE IN A WIRELESS COMMUNICATION SYSTEM - A method and device are disclosed from the perspective of a User Equipment-to-User Equipment (UE-to-UE) Relay. In one embodiment, the method includes the UE-to-UE Relay establishing a first PC5 unicast link with a first UE and establishes a second PC5 unicast link with a second UE. The method further includes the UE-to-UE Relay initiating a Layer-2 link release procedure to release the second PC5 unicast link if a sidelink radio link failure is detected on the first PC5 unicast link. | 2021-12-30 |
20210409264 | ADAPTIVE TIME WINDOW-BASED LOG MESSAGE DEDUPLICATION - Example techniques for adaptive time window-based log message deduplication are described. In an example, message values are obtained from received log messages. Further, the number of log messages received in a time window having a message value is counted. A log message from which the message value is obtained and the counted number are transmitted upon expiry of the time window. A length of a time window in which a subsequent counting of log messages is to be performed is determined based on various parameters. | 2021-12-30 |
20210409265 | IN-NETWORK MULTICAST OPERATIONS - Examples described herein relate to a first group of core nodes to couple with a group of switch nodes and a second group of core nodes to couple with the group of switch nodes, wherein: a core node of the first or second group of core nodes includes circuitry to execute one or more message passing instructions that indicate a configuration of a network to transmit data toward two or more endpoint core nodes and a switch node of the group of switch nodes includes circuitry to execute one or more message passing instructions that indicate the configuration to transmit data toward the two or more endpoint core nodes. | 2021-12-30 |
20210409266 | CORRELATION OF VIRTUAL NETWORK TRAFFIC ACROSS BARE METAL SERVERS - This disclosure describes techniques that include collecting flow data associated with communications between network devices, and determining, based on the flow data, one or more virtual networks over which the communications are taking place. In one example, this disclosure describes a system configured to perform operations comprising: storing virtual network configuration information associated with a first virtual network and a second virtual network established within a network; collecting underlay flow data associated with communications between a first server and a second server, wherein each of the first server and the second server are implemented as bare metal servers; determining, based on the underlay flow data and the stored virtual network configuration information, that the first server and the second server have communicated over the first virtual network; and generating a user interface. | 2021-12-30 |
20210409267 | CUSTOMER SELF-SERVICE CLOUD APPLICATION PROVISIONING - Techniques for self-service provisioning and activation of cloud services are disclosed. In some embodiments, a self-service user interface is generated through which a cloud service subscriber may input configuration parameters to customize an instance of the cloud service. The configuration parameters may define topology, deployment, and/or operational configurations for the cloud service. Responsive to receiving configuration parameters through the self-service user interface, a set of instructions may be automatically generated and executed to perform one or more provisioning operations. | 2021-12-30 |
20210409268 | SYSTEMS AND METHODS FOR DYNAMICALLY ALLOCATING RESOURCES BASED ON CONFIGURABLE RESOURCE PRIORITY - A system described herein may provide a technique for the dynamic selection of configurable resources in an environment that includes a hierarchical or otherwise differentiated arrangement of configurable resources. The environment may include, or may be implemented by, a Distributed Resource Network (“DRN”), which may include hardware or virtual resources that may be configured, including the instantiation of containers, virtual machines, Virtualized Network Functions (“VNFs”), or the like. The DRN may be hierarchical in that some resources of the DRN may provide services to, and/or may otherwise be accessible to, a greater quantity of elements of the DRN or some other network. | 2021-12-30 |
20210409269 | OPERATION-BASED SYNCHRONIZING OF SUPERVISORY MODULES - An electronic device that selectively performs an action is described. During operation, the electronic device may receive a high-level operation from a second electronic device, where the electronic device provides a standby supervisory module for a computer network device (such as a switch or a router) and the second electronic device provides an active supervisory module for the computer network device, and where the high-level operation includes one or more sub-operations (such as primitive operations). Then, the electronic device may store the high-level operation in memory, where the high-level operation is associated with an identifier in a sequential set of identifiers. Moreover, the electronic device may receive information indicating an occurrence of an event. In response, the electronic device may perform the action. | 2021-12-30 |
20210409270 | Dynamic Configuration in Cloud Computing Environments - Virtual machines, virtualization servers, and other physical resources in a cloud computing environment may be dynamically configured based on the resource usage data for the virtual machines and resource capacity data for the physical resources in the cloud system. Based on an analysis of the virtual machine resource usage data and the resource capacity data of the virtualization servers and other physical resources in the cloud computing environment, each virtual machine may be matched to one of a plurality of virtualization servers, and the resources of the virtualization servers and other physical resources in the cloud may be reallocated and reconfigured to provide additional usage capacity to the virtual machines. | 2021-12-30 |
20210409271 | TELEMETRY-BASED NETWORK SWITCH CONFIGURATION VALIDATION - Methods, apparatuses, and computer program products for telemetry-based network switch configuration validation are disclosed. An analytics engine captures a first network snapshot including telemetry data received from one or more network switches in a first state. Upon receiving a notice indicating that a network configuration change has been applied, the analytics engine initiates a timer in response to receiving the notice. The analytics engine captures, in response to expiration of the timer, a second network snapshot including telemetry data received from the one or more network switches in a second state and compares the first network snapshot and the second network snapshot. In dependence upon the comparison of the first network snapshot to the second network snapshot, the analytics engine validates the network configuration change. | 2021-12-30 |
20210409272 | METHOD AND SYSTEM FOR AUTOMATIC CONFIGURATION OF A COMMUNICATIONS INTERFACE FOR A SPECIALIZED DATA NETWORK OF AN AIRCRAFT - A method of automatic configuration of a communications interface of an unknown data network, the method comprising connecting an Electronic Flight Bag (EFB) to the unknown data network, attempting to open communication ports, in response to attempting to open communication ports, receiving data from the unknown data network, determining, by a controller module, if the selected communications interface can interpret the received data, and operating the communications interface of the EFB in accordance with the selected communications interface. | 2021-12-30 |
20210409273 | SYSTEM AND METHOD FOR COMMISSIONING A NETWORK ELEMENT - Systems, methods, and non-transitory computer-readable storage media which have instructions stored for execution on a processor, for automating the commissioning of a transport network element within a network. A system configured according to this disclosure can be an Automated Commissioning Tool which can initiate communications with a network element on the network. The Automated Commissioning Tool can then retrieve updated firmware corresponding to the network element and configure the network element to have the updated firmware. Finally, the Automated Commissioning Tool can determine, from a network plan, a first port on the network element which is to be connected via a cross-connect to a second port on the network element and establish the cross-connect on the network element. At this point the network element may be commissioned to operate as a transport network element within the network. | 2021-12-30 |
20210409274 | TRANSPARENT AUTO-NEGOTIATION OF ETHERNET - A system for negotiating Ethernet link settings between interconnected nodes in a network having an Ethernet protocol stack that includes a PCS sub-layer with an auto-negotiation function. The system comprises connecting an intermediate device coupled between two network nodes via optical or copper interfaces, with the link settings between each node and the connected intermediate device being the same, thereby bypassing the auto-negotiation of the PCS sub-layer in the intermediate device. The intermediate device may transparently send negotiation messages from each node to the other during the link negotiation phase without interacting with those messages. Instead of the intermediate device, a single form pluggable (SFP) device may be connected between the two network nodes via optical or copper interfaces on the network side and via an SFP slot on the device side. | 2021-12-30 |