Patents Issued in August 17, 2017
-
Publication number: 20170237545Abstract: A method and apparatus for (a) operating a first full-duplex transceiver to exchange radio-frequency signals with a second full-duplex transceiver, (b) determining at the first full-duplex transceiver that a residual self-interference signal exceeds a threshold, (c) in response to the determination that the residual self-interference signal exceeds the threshold, performing a self-training operation.Type: ApplicationFiled: February 13, 2017Publication date: August 17, 2017Inventor: Amir Keyvan Khandani
-
Publication number: 20170237546Abstract: The present invention relates to a wireless communication system, particularly, to a method and a device therefor, the method comprising: configuring an FDD PCell and a TDD SCell; configuring a first UL-DL SF pattern to the TDD SCell according to pattern indication information received through an L1 signal; and transmitting, through an SR PUCCH, HARQ-ACK information related to an SF in which transmission direction of the TDD SCell is UL based on the first UL-DL SF pattern, wherein the HARQ-ACK information includes HARQ-ACK responses for both the PCell and the SCell when transmission direction of the TDD SCell is DL in the SF based on a reference UL-DL SF pattern configured to the TDD SCell regarding HARQ-ACK feedback and the HARQ-ACK information includes an HARQ-ACK response for only the PCell when transmission direction of the TDD SCell is UL in the SF based on the reference UL-DL SF pattern.Type: ApplicationFiled: September 1, 2015Publication date: August 17, 2017Applicant: LG ELECTRONICS INC.Inventors: Suckchel YANG, Joonkui AHN, Seungmin LEE
-
Publication number: 20170237547Abstract: Embodiments of transceivers with one or more reconfigurable antennas are described. In one embodiment, a reconfigurable antenna transceiver includes a transmit chain, a receive chain, and a reconfigurable antenna having a plurality of reconfigurable modes. The transceiver may also include an antenna controller configured to set a mode of the reconfigurable antenna. According to other aspects, the transceiver may also include a signal processor configured to transmit a set of training symbols during a training interval. The antenna controller may be further configured to select a respective mode of the reconfigurable antenna for each training symbol in the set of training symbols. Additionally, the antenna controller may be configured to calculate a received Signal-of-Interest to Interferer Ratio (SIR) for each training symbol of the set of training symbols. In this context, a system utilizing a reconfigurable antenna may achieve significant rate improvement compared to half-duplex systems.Type: ApplicationFiled: May 4, 2017Publication date: August 17, 2017Inventors: Ahmed Mohamed Eltawil, Elsayed A. Ahmed
-
Publication number: 20170237548Abstract: A circuit arrangement for clock and data recovery comprises a control unit, a phase-locked loop circuit and a sampling unit. The control unit is configured to derive a first reference signal and a second reference signal from an input signal. Furthermore, the control unit is configured to derive a common reference signal from one of the first reference signal and the second reference signal, selected depending on a mode of operation of the circuit arrangement. The phase-locked loop circuit is configured to generate an oscillator signal based on the common reference signal. The sampling unit is configured to extract a recovered data signal from the input signal.Type: ApplicationFiled: July 30, 2015Publication date: August 17, 2017Inventor: Tibor KEREKES
-
Publication number: 20170237549Abstract: This application discusses, among other things, apparatus and methods for sharing a local oscillator between multiple wireless devices. In certain examples, an apparatus can include a central frequency synthesizer configured to provide a central oscillator signal having a first frequency, a first transmitter, the first transmitter including a first transmit digital-to-time converter (DTC) configured to receive the central oscillator signal and to provide a first transmitter signal having a second frequency, and a first receiver, the first receiver including a first receive DTC configured to receive the central oscillator signal and to provide a first receiver signal having a first receive frequency.Type: ApplicationFiled: May 4, 2017Publication date: August 17, 2017Inventors: Hasnain Lakdawala, Ashoke Ravi, Ofir Degani, Bernd-Ulrich Klepser, Zdravko Boos, Georgios Palaskas, Stefano Pellerano, Paolo Madoglio
-
Publication number: 20170237550Abstract: A clock data recovery circuit may include: a phase comparison unit suitable for comparing input data with a phase of a multi-phase clock, and for generating an up/down signal corresponding to the comparison result; a filtering unit suitable for counting the up/down signal based on an upper threshold value and a lower threshold value, for setting, when an overflow occurs, the lower threshold value to an initial value for the count of the up/down signal, or when a underflow occurs, the upper threshold value to the initial value for the count of the up/down signal, and for generating a control code corresponding to one of the underflow and the overflow; and a phase rotating unit suitable for adjusting the phase of the multi-phase clock in response to the control code outputted from the filtering unit.Type: ApplicationFiled: July 8, 2016Publication date: August 17, 2017Inventors: Woo-Yeol SHIN, Myeong-Jae PARK, Kyu-Young KIM, Han-Kyu CHI, Sung-Eun LEE, Kyung-Hoon KIM
-
Publication number: 20170237551Abstract: A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a first software client: obtaining a transformed version of the at least one decryption key; performing a decryption operation on the encrypted at least part of the item of content based on the at least one decryption key to obtain an intermediate version of the at least part of the item of content, wherein said performing the decryption operation uses a white-box implementation of the decryption operation that forms part of the first software client and that operates using the transformed version of the at least one decryption key; and performing an encryption operation on at least a portion of the intermediate version based on at least one encryption key to obtain re-encrypted content, wherein said performing the encryption operationType: ApplicationFiled: October 15, 2015Publication date: August 17, 2017Applicant: Irdeto B.V.Inventors: Arnoud Evert Van Foreest, Martin Soukup
-
Publication number: 20170237552Abstract: A method for at least partially updating encrypted data stored on one or more servers includes dividing the encrypted data into equal sized chunks; encrypting each chunk using an all-or-nothing encryption scheme (AONE) with an encryption key, wherein an additional randomness per chunk is embedded into the AONE; outputting a plurality of ciphertext blocks for each chunk; storing the encrypted chunks on the one or more servers such that an i-th ciphertext block of each encrypted chunk is stored on an i-th server, wherein a result of a predetermined function performed on the randomness for all encrypted chunks is stored with each encrypted chunk; determining one or more chunks to update; reverting the predetermined function by accessing all the encrypted chunks; decrypting the one or more Chunks to update based on the result of, updating the decrypted chunks; re-encrypting the updated decrypted chunks, and storing the re-encrypted chunks.Type: ApplicationFiled: September 30, 2014Publication date: August 17, 2017Inventor: Ghassan Karame
-
Publication number: 20170237553Abstract: A cryptographic representation of value is adapted to goods in production and products at various stages through a supply chain as represented by their stock keeping units or SKU's that refer to a unique identifier or code for the particular stock keeping unit. Embodiments of the invention disclose the generation of a universal unique, yet deterministic, key-pair for all SKUs, shipping cartons, and items, i.e. for every single SKU, shipping carton and item on the globe.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Inventors: Srinivasan SRIRAM, Zaki N. MANIAN
-
Publication number: 20170237554Abstract: A method and system are provided for transferring digital assets in a digital asset network. Network users can be centrally enrolled and screened for compliance. Standardized transfer processes and unique identifiers can provide a transparent and direct transfer process. Digital assets can include sufficient information for ensuring that a value will be provided, including one or more digital signatures, such that value can be made immediately available to recipients.Type: ApplicationFiled: October 3, 2016Publication date: August 17, 2017Inventors: Mondo Jacobs, Ajith Thekadath, Lidia Daldoss, David Henstock
-
Publication number: 20170237555Abstract: A method and system for bringing together online and offline advertising uses anonymous links that are associated with consumer data. The anonymous links allow processing without personally identifiable information (PII) in a secure environment. Data is matched using the anonymous links, and further using identifiers that are encrypted for use in connection with individual match distribution partners. The method and system allows a marketer to utilize offline data to precisely target advertisements without the use of PII, and to perform analytics concerning the use of the online advertisements to more precisely determine the effectiveness of multichannel marketing efforts.Type: ApplicationFiled: April 28, 2017Publication date: August 17, 2017Inventors: Thierry Roullier, Dana S. Robbins, Linda Young, Scott Jones, Mike Zukerman
-
Publication number: 20170237556Abstract: Access to digital data is controlled by encrypting the data in such a manner that it can be decrypted only at a specified location, within a specific time frame, and with a secret key. Data encrypted in such a manner is said to be geo-encrypted. This geo-encryption process comprises a method in which plaintext data is first encrypted using a data encrypting key that is generated at the time of encryption. The data encrypting key is then encrypted (or locked) using a key encrypting key and information derived from the location of the intended receiver. The encrypted data encrypting key is then transmitted to the receiver along with the ciphertext data. The receiver both must be at the correct location and must have a copy of the corresponding key decrypting key in order to derive the location information and decrypt the data encrypting key.Type: ApplicationFiled: June 24, 2013Publication date: August 17, 2017Inventors: Dorothy E. DENNING, Barry J. Glick, Ronald S. Karpf, Mark E. Seiler
-
Publication number: 20170237557Abstract: An optical line terminal (OLT) including a processor coupled to a transmitter. The processor is configured to send a first encrypted fiber to coax unit (FCU) message containing an optical domain multicast key to an FCU via an optical network. The optical domain multicast key is associated with encryption in an optical domain associated with the optical network. The processor is also configured to send a second encrypted FCU message containing an electrical domain multicast key to the FCU, and to send an encrypted coax network unit (CNU) message containing the electrical domain multicast key to a CNU via the FCU and a coaxial network. The electrical domain multicast key is associated with encryption in an electrical domain associated with the coaxial network. The first and second encrypted FCU messages and the encrypted CNU message may be operations, administration and maintenance (OAM) messages.Type: ApplicationFiled: May 4, 2017Publication date: August 17, 2017Inventors: Yanbin Sun, Guangsheng Wu, Li Zhang, Fanglin Sun, Jim Chen
-
Publication number: 20170237558Abstract: One embodiment provides a system for facilitating distribution of quantum keys. During operation, the system receives, from a requester, a first request for a key, wherein the first request indicates a requested length for the key and identifying information of the requester. The system determines whether a subset pool of a general pool of keys is allocated to the requester based on the identifying information of the requester, wherein the keys in the general pool are generated by a quantum engine. In response to determining that a subset pool is not allocated to the requester, the system allocates a subset pool to the requester. The system obtains from the allocated subset pool a key with a length matching the requested length, and the system returns the obtained key to the requester.Type: ApplicationFiled: December 27, 2016Publication date: August 17, 2017Applicant: Alibaba Group Holding LimitedInventors: Peng Yuan, Zhiqiang Wang, Shuanlin Liu
-
Publication number: 20170237559Abstract: One embodiment of the present application provides a system for key management. During operation, the system determines a key block from a key sequence obtained based on Quantum Key Distribution (QKD) and a time sequence identifier for the key block. The system synchronizes the key block with a corresponding key block of a partner key management system based on a hash of the key block and the time sequence identifier. If the synchronization is successful, the system stores the key block and the time sequence identifier in a key pool. If the system receives a request for a key from an application, the system acquires the key block from the key pool and validates the key block with the partner key management system based on a hash of the key block and the time sequence identifier. If the validation is successful, the system provides the key block to the application.Type: ApplicationFiled: January 9, 2017Publication date: August 17, 2017Applicant: Alibaba Group Holding LimitedInventors: Peng Yuan, Zhiqiang Wang, Shuanlin Liu
-
Publication number: 20170237560Abstract: Methods, media, and systems for secure provisioning of servers within a cloud computing environment are provided for herein. In some embodiments, a management service can delegate provisioning of a server of the cloud computing environment to an imaging service. In response, the imaging service can generate an operating system image for the server and can utilize disk encryption to protect to operating system image. In embodiments, a volume encryption key of the disk encryption can be encrypted utilizing a public key of a trusted platform manager of the server, to produce an encrypted volume encryption key that is protected by the trusted platform module of the server. The encrypted operating system image and the encrypted volume encryption key can then be transmitted to the server to cause the server to be provisioned with the operating system image. Other embodiments may be described and/or claimed herein.Type: ApplicationFiled: February 12, 2016Publication date: August 17, 2017Inventors: Ulrich Mueller, Aleksandr Mikhailovich Gershaft, Christopher W. McCarron, Marwan E. Jubran
-
Publication number: 20170237561Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20170237562Abstract: A network service packet (NSP) header security method includes receiving an NSP on a communication interface, analyzing, by a processor, the NSP in order to identify a plurality of service functions and an associated service function path for the plurality of service functions, identifying, by the processor, which security function or functions may be performed by each of the plurality of service functions on an NSP header to be generated for the NSP, requesting, by the processor, at least one key for securing at least part of the NSP header, receiving the at least one key on the communication interface, generating, by the processor, the NSP header for the NSP, securing, by the processor, the NSP header based on the at least one key, and sending, on the communication interface, the NSP with the NSP header to one of the plurality of service functions.Type: ApplicationFiled: February 27, 2017Publication date: August 17, 2017Inventors: Paul QUINN, Scott FLUHRER, Jim GUICHARD, Tirumaleswar REDDY, Prashanth PATIL, David WARD
-
Publication number: 20170237563Abstract: A method for securely accessing a hardware storage device connected to a computer system, the hardware storage device having a unique hardware identifier and the computer system including a processor, the method comprising: an agent software component receiving the identifier of the storage device to authenticate the storage device, wherein the agent executes in an unrestricted mode of operation of the processor such that the agent is a trusted software component; in response to the authentication, the agent accessing a secure data key for encrypting and decrypting data on the storage device, wherein the data key is accessible only to trusted agents executing in the unrestricted mode of the processor such that software executing in a user mode of the processor stores and retrieves data on the storage device only via the agent.Type: ApplicationFiled: November 13, 2014Publication date: August 17, 2017Inventors: Fadi EL-MOUSSA, Theo DIMITRAKOS, Georgios VAFIADIS
-
Publication number: 20170237564Abstract: The event of [Probability that the two-parts-become-one]=1.0 is “Two-parts-are-one password”. The event of probability<<1.0 is “Two-parts-are-not-one password”. Even if a password of the service side leaks, it is harmless. The maintenance cost of the password is unnecessary. There exists the decomposition point of responsibility within “Two-parts-are-one password” itself so that it becomes disadvantageous to bring up a lawsuit. No password file and no password backup required in an authentication server segment. The core that has produced these innovative effects is the implementation of Split Knowledge and Dual Control of an active key data; it satisfies PCI DSS version 1.2.1 for the first time in the world.Type: ApplicationFiled: January 16, 2017Publication date: August 17, 2017Inventors: Eiji WATANABE, Yoshihiro SEKIGUCHI
-
Publication number: 20170237565Abstract: The invention relates to a method for logging a service technician into an electrical device (20), comprising the following steps: production (3, 4) of a secret key (SKY) as an encrypted login password (LPW) by the electrical device (20), displaying (5) of the secret key (SKY) on a display unit (23) of the electrical device (20) as a QR code (QRC), optical sensing (6) of the QR code (QRC) by means of a mobile device (22), decryption (9) of the login password (LPW) from the secret key (SKY) of the sensed QR code (QRC) by the mobile device (22), displaying of the login password (LPW) on a screen unit (24) of the mobile device (22), entering of the login password (LPW) into the electrical device (20) by the service technician, comparison (10) of the entered login password (LPW) with the produced login password (LPW) by the electrical device (20), release of the login by the electrical device (20) if the two login passwords (LPW) match. The invention further relates to an associated apparatus.Type: ApplicationFiled: October 12, 2015Publication date: August 17, 2017Inventor: Michael Rommel
-
Publication number: 20170237566Abstract: A server receives a piece of data for encryption. The server encrypts the piece of data such that no single key can decrypt the encrypted piece of data and any combination of a first multiple of unique keys taken a second multiple at a time are capable of decrypting the encrypted piece of data. Each of the first multiple of unique keys is tied to account credentials of a different user. The second multiple is less than or equal to the first multiple. The encrypted piece of data is returned.Type: ApplicationFiled: May 2, 2017Publication date: August 17, 2017Inventor: Nicholas Thomas Sullivan
-
Publication number: 20170237567Abstract: A file protection method may include receiving a package that includes files for installing and executing an application, adding a protection file for an operation of a file protection module to the package, and providing the package to which the protection file is added over a network. In response to execution of a control command for a desired file that is controlled by the application through a service code of the application at an electronic device on which the application is installed and executed through the package, a protection command included in the file protection module is called and control of the desired file and integrity verification associated with data stored in the desired file are processed in response to the called protection command.Type: ApplicationFiled: February 7, 2017Publication date: August 17, 2017Applicant: LINE CorporationInventors: SUNGBEOM AHN, SangHun JEON, Myungju CHUNG, Dongpil SEO, Seong Yeol LIM, Wang Jin OH, Kwang-Hee HAN
-
Publication number: 20170237568Abstract: The present invention relates to the secure identification, authentication, protection and transfer of personal and computing device identifying information between computing devices. Specifically the present invention is a method that removes the need to expose personal or computing device identifying information, while such information is in transit between computing devices.Type: ApplicationFiled: February 16, 2016Publication date: August 17, 2017Inventor: Kenneth Wayne Morris
-
Publication number: 20170237569Abstract: Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.Type: ApplicationFiled: February 16, 2016Publication date: August 17, 2017Inventor: David R. Vandervort
-
Publication number: 20170237570Abstract: Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.Type: ApplicationFiled: February 16, 2016Publication date: August 17, 2017Inventor: David R. Vandervort
-
Publication number: 20170237571Abstract: A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake procedure, the server receives a premaster secret that has been encrypted using a public key bound with a domain for which the client device is attempting to establish a secure session with. The server transmits the encrypted premaster secret to the different server for decryption along with other information necessary to compute a master secret. The different server decrypts the encrypted premaster secret, generates the master secret, and transmits the master secret to the server. The server receives the master secret and continues with the handshake procedure including generating one or more session keys that are used in the secure session for encrypting and decrypting communication between the client device and the server.Type: ApplicationFiled: September 20, 2016Publication date: August 17, 2017Inventors: Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Nicholas Thomas Sullivan, Albertus Strasheim
-
Publication number: 20170237572Abstract: A new approach is proposed that contemplates systems and methods to support bulk authentication of a device associated with a user to all cloud-based services the device intends to access in one transaction instead of authenticating the device against each of the services individually. First, the device generates and transmits to one or more authentication service clusters an authentication request that includes its identification and authentication credentials in order to access to a plurality of services. Upon receiving the authentication request, the authentication service cluster(s) authenticate the device for all of the services to be accessed based on the information in the authentication request. Once the device is authenticated, the authentication service cluster(s) then retrieve entitlement information of the services to be accessed by the device, and identify the service clusters/nodes that the device will connect to for the services with the fastest response time.Type: ApplicationFiled: May 3, 2017Publication date: August 17, 2017Inventors: Fleming SHI, Luo WANG
-
Publication number: 20170237573Abstract: A data processing device includes a Physical Unclonable Function value source which is set up to provide a reference Physical Unclonable Function value and a plurality of subsequent Physical Unclonable Function values, the reference Physical Unclonable Function value and each subsequent Physical Unclonable Function value having a multiplicity of binary components, a determination device which is set up to determine a set of components, the value of which is identical in the plurality of subsequent Physical Unclonable Function values, and a Physical Unclonable Function reconstruction device which is set up to reconstruct the reference Physical Unclonable Function value from the subsequent Physical Unclonable Function values assuming that the values of the determined components in the subsequent Physical Unclonable Function value match the values of the determined components in the reference Physical Unclonable Function value.Type: ApplicationFiled: February 10, 2017Publication date: August 17, 2017Inventor: Rainer Goettfert
-
Publication number: 20170237574Abstract: A PoDL system includes a PSE connected via a wire pair to a PD, where differential data and DC power are transmitted over the same wire pair. Typically, low voltage/current detection and classification routines are required upon every powering up of the system to allow the PD to convey its PoDL requirements to the PSE. Various techniques are described that simplify or obviate such start-up routines or enable increased flexibility for the PoDL system. Such techniques include: ways to specify a particular PD operating voltage; ways to disable the PD's UVLO circuit during such routines; using opposite polarity voltages for the two routines; using voltage limiters or surge protectors to convey the PoDL information; detecting loop resistance; using a PSE memory to store previous results of the routines; and powering the PD communication circuit using the wire pair while the PD load is powered by an alternate power source.Type: ApplicationFiled: May 4, 2017Publication date: August 17, 2017Inventors: Jeffrey Heath, David Dwelley
-
Publication number: 20170237575Abstract: A PoDL system includes a PSE connected via a wire pair to a PD, where differential data and DC power are transmitted over the same wire pair. Typically, low voltage/current detection and classification routines are required upon every powering up of the system to allow the PD to convey its PoDL requirements to the PSE. Various techniques are described that simplify or obviate such start-up routines or enable increased flexibility for the PoDL system. Such techniques include: ways to specify a particular PD operating voltage; ways to disable the PD's UVLO circuit during such routines; using opposite polarity voltages for the two routines; using voltage limiters or surge protectors to convey the PoDL information; detecting loop resistance; using a PSE memory to store previous results of the routines; and powering the PD communication circuit using the wire pair while the PD load is powered by an alternate power source.Type: ApplicationFiled: May 4, 2017Publication date: August 17, 2017Inventors: Jeffrey Heath, David Dwelley
-
Publication number: 20170237576Abstract: The present disclosure relates generally to systems, methods and tools for coordinating the activities of a contractor and a user during a setup process of a building control system. In some instances, a contractor may install a building device and then partially configure the building device. The contractor may then send an invite, such as an electronic invite, to a customer that invites the customer to complete the configuration of the installed building device.Type: ApplicationFiled: February 16, 2016Publication date: August 17, 2017Inventors: Riley Gerszewski, David Quam, George Mcleod, Sriharsha Putrevu, Preston Gilmer
-
Publication number: 20170237577Abstract: A method for providing wireless access to one or more wireless devices using an automation system control panel is described. In one embodiment, a communication link is established between an automation system control panel and one or more automation components. Settings are applied to configure the automation system control panel for use as a wireless access point providing two-way communication with one or more electronic devices. Applying settings includes receiving input directly at a graphical user interface of the automation system control panel, the graphical user interface further providing access to control the one or more automation components. The automation system control panel is wirelessly connected to one or more electronic devices via a wireless access point interface using the settings applied at the graphical user interface.Type: ApplicationFiled: February 27, 2017Publication date: August 17, 2017Inventors: Alex J. Dunn, Christopher Lee Harris, Bruce Ehlers, Todd M. Santiago, James E. Nye
-
Publication number: 20170237578Abstract: This disclosure provides systems, methods and apparatus for fixture data over a powerline network. In one aspect, fixture interfaces can receive control data on a powerline network and provide the control data to a fixture on a fixture network.Type: ApplicationFiled: April 28, 2017Publication date: August 17, 2017Inventor: Patrick J. Kelsey
-
Publication number: 20170237579Abstract: This disclosure provides systems, methods and apparatus for fixture data over a powerline network. In one aspect, fixture interfaces can receive control data on a powerline network and provide the control data to a fixture on a fixture network.Type: ApplicationFiled: April 28, 2017Publication date: August 17, 2017Inventor: Patrick J. Kelsey
-
Publication number: 20170237580Abstract: The present invention relates to a powered device (331a, 331b, 531a) with two interfacing connections. The powered device (331a, 331b, 531a) comprises power switching units (350a, 350b, 550a1, 550a2) for forwarding the data signal as well the power received on the input to the output. Forwarding may be based on a detection of the powering state of the PD. In another embodiment, the Power-over-Ethernet input/output ports function bi-directionally, thereby allowing the user to daisy-chain devices in any direction. As power switching units, relays or solid-state power switches may be used.Type: ApplicationFiled: June 30, 2015Publication date: August 17, 2017Inventors: Harald Josef Günther RADERMACHER, Matthias WENDT, Dave Willem VAN GOOR, Lennart YSEBOODT
-
Publication number: 20170237581Abstract: The present document discloses a method, apparatus and system for managing a TRILL network by a layer-3 network manager. Herein, the method includes: associating a target RB in the TRILL network with an interface of a layer-3 VLAN, publishing the layer-3 VLAN as a participant VLAN of the target RB, and calculating and issuing a broadcast decapsulation flag for the layer-3 VLAN, then an ingress RB encapsulating a layer-2 Ethernet frame which is sent by the layer-3 network manager to the target RB and includes a layer-3 IP message into a TRILL data message for sending to the target RB, and the target RB decapsulating the TRILL to obtain the original layer-2 Ethernet frame for processing. By the present document, the problem of incapability in managing an RB running TRILL by the layer-3 network manager in the related technology is solved, and the TRILL network is conveniently planned and configured.Type: ApplicationFiled: October 21, 2014Publication date: August 17, 2017Inventor: Qiang WU
-
Publication number: 20170237582Abstract: The present disclosure generally relates to the support of optical connection setup. More specifically, the present disclosure relates to a technique of supporting provision of a connection via a data communication network of an optical network between packet network islands. A method embodiment comprises establishing a Border Gateway Protocol-Link State, BGP-LS, connection via the DCN between a first edge node of the first packet network island and a BGP-LS node in the optical network.Type: ApplicationFiled: September 3, 2014Publication date: August 17, 2017Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Balázs Peter Gerö, Daniele Ceccarelli, András Kern
-
Publication number: 20170237583Abstract: A method of controlling a codec negotiation of a gateway (1) providing a codec capability offer, e.g. OLC according to the standard H.Type: ApplicationFiled: May 3, 2017Publication date: August 17, 2017Inventor: Antonios Tsoutsaios
-
Publication number: 20170237584Abstract: Apparatuses, methods, and systems are disclosed for cell-specific reference signal generation. One apparatus includes a processor that determines a NB-IoT CRS frequency offset. The processor may determine a first CRS sequence based on the NB-IoT CRS frequency offset. The processor may also determine a first time-frequency resource set. The apparatus may also include a transmitter that transmits the first CRS sequence on the first time-frequency resource set.Type: ApplicationFiled: January 9, 2017Publication date: August 17, 2017Inventors: Zhi Yan, Zukang Shen
-
Publication number: 20170237585Abstract: Provided is a method of blindly estimating WCDMA OVSF of a signal analyzer, which includes: (a) setting SF to 512 and an index thereof to 0; (b) calculating a power average value of a symbol obtained by despreading descrambled data with an OVSF code set by increasing the index from ‘0’ by ‘1’; (c) determining an OVSF code by which the power average value is equal to or greater than a power reference value as a used OVSF code candidate and determining an OVSF code by which the power average value is less than the power reference value as an unused OVSF code; (d) comparing a zero crossing rate of a symbol with a reference value to determine whether the OVSF code candidate is the used OVSF code; and (e) repeating (b) to (d) while reducing the SF half by half until the SF is equal to 4.Type: ApplicationFiled: January 26, 2017Publication date: August 17, 2017Inventors: Jin Soup JOUNG, Joo Hyeong LEE, Yong Hoon LIM, Kyoung Hwan JU
-
Publication number: 20170237586Abstract: A method and a device for scrambling sequence configuration, a user equipment and a base station are provided. The method includes: obtaining a search space and/or a transmission mode corresponding to an enhanced control channel; performing a scrambling initialization operation according to the search space and/or the transmission mode, and determining an initialization value of a scrambling sequence; determining the scrambling sequence according to the initialization value of the scrambling sequence; and scrambling a transmission signal transmitted by the enhanced control channel according to the scrambling sequence and then transmitting, so that a user equipment which receives the transmission signal performs a descrambling operation according to the scrambling sequence in the transmission signal. Randomization of interferences between different cells or terminals can be guaranteed as far as possible.Type: ApplicationFiled: May 2, 2017Publication date: August 17, 2017Inventors: Jianqin LIU, Yongxing ZHOU, Qiang WU
-
Publication number: 20170237587Abstract: A transmitter for transmitting an output signal includes first and second filter structures. The first filter structure includes a first combiner to extend a first data signal by a first reference signal to obtain a first extended data signal, and a first IIR filter for filtering the first extended data signal to obtain a first filtered data signal. The second filter structure includes a second combiner to extend a second data signal by a second reference signal, and a second IIR filter for filtering the second extended data signal. The transmitter includes a multiplexer for combining the first and second filtered data signals to obtain the output signal. A system response of the first IIR filter based on the first reference signal corresponds to a system response of the second IIR filter based on the second reference signal.Type: ApplicationFiled: May 3, 2017Publication date: August 17, 2017Inventors: Rainer HILDINGER, Andreas TASCH, Shahram ZAREI, Conrad ZERNA, Matthias DAEUMLER, Carlos RUIZ CABRERA, Robert KOCH
-
Publication number: 20170237588Abstract: The present technology relates to a signal processing apparatus and method which can suppress increase in power consumption. In an aspect of the present technology, control data, which is for controlling frequency modulation to a carrier signal using digital data to be transmitted, and for suppressing a time average of a fluctuation amount of a frequency modulation amount more than a case of controlling the frequency modulation to the carrier signal using the digital data is generated, the frequency modulation is performed to the carrier signal on the basis of the generated control data, and the carrier signal to which the frequency modulation is performed is transmitted as a transmission signal. The present technology can be applied to, for example, a signal processing apparatus, a transmission apparatus, a reception apparatus, a communication apparatus, or an electronic apparatus having a transmission function, a reception function, or a communication function, or a computer which controls these.Type: ApplicationFiled: August 11, 2015Publication date: August 17, 2017Applicant: Sony CorporationInventors: Seiji Kobayashi, Toshiyuki Hiroi, Katsuyuki Tanaka, Tamotsu Ikeda, Hitoshi Tomiyama, Makoto Sato, Hiroyuki Mita
-
Publication number: 20170237589Abstract: Embodiments disclosed herein relate to methods and systems for pilot grouping, route protocols, and scheduling in multi-carrier communication systems. In an embodiment, an access terminal may group a plurality of pilot signals characterized by different frequencies into one or more pilot groups, each pilot grouping being identified by a plurality of parameters (e.g., a PN offset and a group ID). Each pilot group may include pilot signals having substantially the same coverage area. The access terminal may further select a representative pilot signal from each pilot group for pilot strength reporting. The access terminal may also use the pilot grouping for effective set management.Type: ApplicationFiled: May 2, 2017Publication date: August 17, 2017Inventor: Peter John Black
-
Publication number: 20170237590Abstract: A method and apparatus for configuring a DM-RS resource and a communication system, applicable to a 3D MIMO system. The method includes: configuring, by a base station, resources for transmitting DM-RSs for multiple pieces of UE performing MU-MIMO; wherein resource elements in a subframe for transmitting DM-RSs are divided into multiple groups, so that a density of resource elements transmitting DM-RSs for at least one piece of UE or at least one stream is lowered. Hence, not only the UE is enabled to support high-dimension MU-MIMO, but also a DM-RS density of a center UE may be lowered, so as to improve resource utilization.Type: ApplicationFiled: May 4, 2017Publication date: August 17, 2017Applicant: FUJITSU LIMITEDInventors: Yi ZHANG, Hua ZHOU
-
Publication number: 20170237591Abstract: A transmitter transmits payload data using Orthogonal Frequency Division Multiplexed (OFDM) symbols, the transmitter comprising frame builder circuitry configured to receive the payload data to be transmitted and to receive signalling information for use in detecting and recovering the payload data at a receiver, and to form the payload data into frames with the signalling information as a preamble to each of the frames for transmission. Modulator circuitry is configured to modulate one or more first OFDM symbols with the signalling information to form the preamble of each frame and to modulate one or more second OFDM symbols with the payload data to form post preamble waveform of each frame. Transmission circuitry is configured to transmit the one or more first OFDM symbols as a preamble and the second OFDM symbols as the post preamble waveform.Type: ApplicationFiled: January 11, 2017Publication date: August 17, 2017Applicant: Sony CorporationInventors: Samuel Asangbeng ATUNGSIRI, LachIan Bruce MICHAEL
-
Publication number: 20170237592Abstract: A method of uplink transmission to reduce peak-to-average power ratio (PAPR) in enhanced licensed assisted access (eLAA) is proposed. New design of Physical Uplink Control Channel (PUCCH) and Physical Uplink Shared Channel (PUSCH) is proposed. Across frequency domain of the channel bandwidth, multiple resource interlaces are allocated for different UEs for uplink PUCCH/PUSCH transmission to satisfy the occupied channel bandwidth requirement for unlicensed carrier access. In addition, uplink transmission with co-phasing terms are applied to reduce PAPR of the resulted waveform.Type: ApplicationFiled: February 3, 2017Publication date: August 17, 2017Inventors: Weidong Yang, Chien-Chang Li, Bo-Si Chen
-
Publication number: 20170237593Abstract: A broadcast signal transmitter is presented. The broadcast signal transmitter includes a Forward Error Correction (FEC) encoder configured to perform error correction processing on Physical Layer Pipe (PLP) data, a bit interleaver configured to bit-interleave the PLP data, a mapper configured to perform constellation mapping on the PLP data, a framer configured to generate a signal frame comprising the PLP data, and a waveform generator configured to generate a transmission signal comprising the signal frame. The signal frame of the transmission signal comprises a bootstrap, a preamble, and a data part. The bootstrap comprises preamble structure information about the preamble. The preamble comprises at least one preamble symbol. The at least preamble symbol carries Layer 1 (L1) signaling data for the signal frame. The first preamble symbol comprises preamble_symbol_number information, and the preamble_symbol_number information indicates a number of preamble symbols other than the first preamble symbol.Type: ApplicationFiled: May 3, 2017Publication date: August 17, 2017Applicant: LG Electronics Inc.Inventors: Jaehyung KIM, Woosuk KO, Sungryong HONG
-
Publication number: 20170237594Abstract: A method for controlling a combined waveform, representing a combination of at least two signals having orthogonal frequency multiplexed signal components, comprising: receiving information defining the at least two signals; transforming the information defining each signal to a representation having orthogonal frequency multiplexed signal components, such that at least one signal has at least two alternate representations of the same information, and combining the transformed information using the at least two alternate representations, in at least two different ways, to define respectively different combinations; analyzing the respectively different combinations with respect to at least one criterion; and outputting a respective combined waveform or information defining the waveform, representing a selected combination of the transformed information from each of the at least two signals selected based on the analysis.Type: ApplicationFiled: April 28, 2017Publication date: August 17, 2017Inventor: John David Terry