Patents Issued in October 12, 2017
  • Publication number: 20170295008
    Abstract: A configurable transceiver includes a first transmitter, an edge rate controller, a second transmitter, a subtractor, a bandwidth controller and a main controller. The first transmitter is configured to generate a first signal for transmission via a transmission link. The second transmitter is configured to generate a replica signal associated with the first signal. The edge rate controller is communicatively coupled to the first and/or second transmitter and is configured to control an edge rate parameter of the first and/or second signal. The subtractor is configured to subtract the replica signal from a signal received via the transmission link. The bandwidth controller is configured to control a bandwidth parameter of a difference signal received from the output of the subtractor. The main controller chooses edge rate and bandwidth control words per desired link rates. It can also automatically find the maximum possible link speed.
    Type: Application
    Filed: April 4, 2017
    Publication date: October 12, 2017
    Inventors: Caglar Yilmazer, Arda K. Bafra, Umut Yilmazer
  • Publication number: 20170295009
    Abstract: A phase lock loop (PLL) includes: a binary phase detector configured to generate a first and second polarity signals that respectively indicating whether an incoming data stream is leading a feedback signal, or whether the feedback signal is leading the incoming data stream, wherein a difference between the first and second polarity signals does not represent an amount of phase difference between the incoming data stream and the feedback signal; a digital filter configured to: generate filtered first polarity signal on a first path and a second path that are different; and generate filtered second polarity signal on a third path and a fourth path that are different; a charge pump coupled to the digital filter and configured to: integrate the filtered first polarity signal and the filtered second polarity signal; and an oscillator configured to generate the synthesized clock signal serving as the feedback signal.
    Type: Application
    Filed: April 8, 2016
    Publication date: October 12, 2017
    Inventors: Alan C. Rogers, Kowshik Murali, Raghunand Bhagwan
  • Publication number: 20170295010
    Abstract: A cipher processing configuration, of which the resistance against various attacks is improved, having a high security level is realized. In a cipher processing configuration in which a nonlinear transformation process and a linear transformation process are repeatedlyperformed for state data formed from a plurality of elements, a linear transformation unit performs a matrix operation applying a quasi-MDS matrix and a substitution process. As the substitution process, a substitution process is performed which satisfies the following (Condition 1) and (Condition A).
    Type: Application
    Filed: August 20, 2015
    Publication date: October 12, 2017
    Inventors: KYOJI SHIBUTANI, TAKANORI ISOBE
  • Publication number: 20170295011
    Abstract: The invention relates to the field of computer engineering and cryptography and, in particular, to methods for implementing linear transformations which operate with a specified speed and require minimum amount of memory, for further usage in devices for cryptographic protection of data. The technical result relates to enabling to select inter-related parameters (performance and required amount of memory) for a particular computing system when implementing a high-dimensional linear transformation. The use of the present method allows to reduce the amount of consumed memory at a given word size of processors employed. To this end, based on a specified linear transformation, a modified linear shift register of Galois-type or Fibonacci-type is generated according to the rules provided in the disclosed method, and the usage thereof enables to obtain the indicated technical result.
    Type: Application
    Filed: July 26, 2016
    Publication date: October 12, 2017
    Applicant: Joint Stock Company "InfoTeCS"
    Inventors: Nikolay Pavlovich BORISENKO, Alexey Viktorovich URIVSKIY
  • Publication number: 20170295012
    Abstract: In order to have a completely secure cryptographic system, it has been looked for a system unconditionally secure as the One Time Pad, but without its key distribution problem. It is herein disclosed a cryptographic system, which implements a cryptographic process based on a random sequence generating process (1), generating a random key as long as the data to process, for a ciphering process (2) or a deciphering process (3). The random sequences generated by the random sequence generating process (1), being perfectly random, are perfectly reproducible for those who have the correct random-transfer maps (4) and seeds (5). Therefore, we have a very strong cryptographic system without the problem of the key distribution. It even allows to implement an unconditionally secure communication channel over a network. Such cryptographic system can be implemented on very different hardwares, even with limited computing power like smart cards.
    Type: Application
    Filed: September 14, 2014
    Publication date: October 12, 2017
    Inventor: Alexandre Andre DURAND
  • Publication number: 20170295013
    Abstract: Method for fulfilling a cryptographic request requiring a value of a private key. Code portions are sent from a server to a computing unit running a web browser. The code portions are executed directly in the web browser in such a way that it automatically performs a cryptographic process including the steps of: receiving a cryptographic request requiring a value of a private key; requesting an encrypted value of the private key; receiving the encrypted value of the private key; requesting an unlocking entity; receiving the unlocking entity; decrypting the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and fulfilling the cryptographic request using the obtained value of the private key.
    Type: Application
    Filed: April 5, 2017
    Publication date: October 12, 2017
    Inventor: LUC CLAES
  • Publication number: 20170295014
    Abstract: Methods and apparatuses for authenticating communication devices and securely transmitting and/or receiving encrypted voice and data information. A biometric scanner, for example a fingerprint scanner, is utilized for authenticating the communication device and for generating the encryption key. The fingerprint scanner can be an area or swipe type of scanner is registered to a particular user and has unique intrinsic characteristics (the scanner pattern) that are permanent over time and can identify the scanner even among scanners of the same manufacturer and model. The unique scanner pattern of the scanner generates a unique encryption key that cannot be reproduced using another fingerprint scanner.
    Type: Application
    Filed: April 8, 2017
    Publication date: October 12, 2017
    Inventors: John S. BARAS, Vladimir Iankov IVANOV
  • Publication number: 20170295015
    Abstract: An integrated circuit having a Physically Unclonable Function (PUF) circuit is provided. The PUF circuit may reside as part of a secure subsystem, which also includes a random number generator, a syndrome generator, non-volatile memory, and control circuitry. A predetermined syndrome of a desired PUF response is stored in the non-volatile memory. During normal operation, a current PUF response may be read out from the PUF circuit. The current PUF response may include erroneous bits that differ from the desired PUF response. The random number generator may generator a random number that masks the current PUF response, whereas the syndrome generator outputs a syndrome of the current PUF response. This information may then be passed to a separate error-correcting code (ECC) processor. The ECC processor may return information back to the secure subsystem, and the control circuitry may then obtain a corrected PUF response that matches the desired PUF response.
    Type: Application
    Filed: June 26, 2017
    Publication date: October 12, 2017
    Inventor: Bruce Pedersen
  • Publication number: 20170295016
    Abstract: A system for generating a symmetric encryption key, said system comprising a first terminal, a second terminal and a server, wherein the server is configured to generate a first processing file for the first terminal based on a combination of key data for the first terminal and key data for the second terminal and the key data for the first terminal; generate a second processing file for the second terminal based on a combination of key data for the first terminal and key data for the second terminal and the key data for the second terminal; and send the first processing file to the first terminal and the second processing file to the second terminal; wherein the first terminal is configured to receive the first processing file; extract the combined key data; generate a first random key seed and send it to the second terminal; receive a second random key seed from the second terminal; wherein the second terminal is configured to receive the second processing file; extract the combined key data; generate the s
    Type: Application
    Filed: October 8, 2015
    Publication date: October 12, 2017
    Inventor: Elise Revell
  • Publication number: 20170295017
    Abstract: The present invention relates to a system and a method for mobile cross-authentication comprising: generating an online authentication code (Ocode) and a mobile authentication code (Mcode) from an authentication server when performing online authentication, providing the online authentication code (Ocode) and the mobile authentication code (Mcode) to a computer terminal and a mobile terminal of the user respectively, receiving and verifying the online authentication code and the mobile authentication code received by the computer terminal and the mobile terminal to the authentication server through the mobile terminal and the computer terminal respectively.
    Type: Application
    Filed: October 13, 2015
    Publication date: October 12, 2017
    Inventors: Seung Eun HONG, Paul HONG
  • Publication number: 20170295018
    Abstract: When a user requests root-level access to a device, the device generates a random public and private key pair and encrypts the public key into a request message using a remote server's public key. The encrypted request message is transmitted to the server. The server decrypts the request message using the server's private key. The server encrypts an enable code into a response message using the device's public key. The encrypted response message is transmitted to the device. The device decrypts the response message containing the enable code using the device's private key. The device then enables root-level access using the enable code.
    Type: Application
    Filed: April 8, 2016
    Publication date: October 12, 2017
    Inventor: John Malcolm Whitehouse
  • Publication number: 20170295019
    Abstract: A communication device includes, a plurality of authentication generation processing units, which are respectively associated with different sequence number groups each including successive sequence numbers and which execute, in parallel, authentication generation processes for generating authentication information included in the packets based on sequence numbers allocated to the packets, a transmitting unit which transmits packets including the allocated sequence numbers to another communication device in an order in which authentication generation processes by the plurality of authentication generation processing units are completed, a receiving unit which receives a packet from the other communication device, and an authentication processing unit which executes a first authentication process in which the reception packet is authenticated based on a relationship between a sequence number of the reception packet and a sequence number of a preceding reception packet.
    Type: Application
    Filed: March 28, 2017
    Publication date: October 12, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Isamu Fukuda, Tetsuta SAKABE, Katsuhiko Negoto, KIYOHISA HOSHINO, Akihiro KAMEDA, Kazuhiro Yasuno
  • Publication number: 20170295020
    Abstract: A method for verifying a target computer file with respect to a reference computer file, including defining a first area delimiting a portion of a reference file, and a second area delimiting a portion of a target file, the second area exhibiting the same size as the first area and being situated, inside the target file, at the same relative position with respect to the origin of this target file as the first area with respect to the origin of the reference file; calculating a first digital imprint, by applying a hash function solely to that portion of the reference file which is contained inside the first area to be tested; calculating a second digital imprint, by applying the same hash function solely to that portion of the target file which is contained inside the second area to be tested; comparing the first and second digital imprints.
    Type: Application
    Filed: January 6, 2017
    Publication date: October 12, 2017
    Applicant: SCHNEIDER ELECTRIC INDUSTRIES SAS
    Inventors: Michel MOULIN, Osman KOCOGLU, Theo DELETANG
  • Publication number: 20170295021
    Abstract: The method comprising, in a network based on a chain of individual Service Functions, SFs, that are composed to implement Network Services, NSs: assigning, at an ingress node of a network architecture, to at least one data packet received by said ingress node from the network, a unique cryptographic tag; processing said assigned unique cryptographic tag using a cryptographic function specific to each Service Function, SF; and verifying, at a given point of the network architecture, said processed unique cryptographic tag by applying a cryptographic verification function composed by the inverse functions of the cryptographic functions associated to the SFs traversed by the at least one data packet.
    Type: Application
    Filed: April 6, 2017
    Publication date: October 12, 2017
    Applicant: Telefonica, S.A.
    Inventors: Pedro A. ARANDA GUTIÉRREZ, Diego R. LOPEZ, Norisy C. OREA BARRIOS
  • Publication number: 20170295022
    Abstract: A method for file conversion that includes receiving a first file in a computer; wherein the first file is of a first format; wherein the computer has a memory having a boot sector, a quarantine sector and a non-quarantine sector; storing the first file at the quarantine sector; wherein the quarantine sector is isolated from the boot sector and the non-quarantine sector, where code in the quarantine sector is prevented from performing write actions on other memory sectors of the memory; checking whether the first file fulfills a set of criteria that comprise: (a) the first file is associated with a valid first digital signature that was generated by a first certificate authority and is of a known format; (b) the first file is about to be converted to a second file of a second format that supports digital signatures; and (c) the first file successfully passed at least one security check; converting the first file to the second file of the second format; generating, by a second certificate authority, a second d
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Inventor: Oren Shnitzer
  • Publication number: 20170295023
    Abstract: A computer implemented method for implementing a real time reconciling shared data structure is disclosed. The shared data structure may be stored in a memory, and a portion of the shared data structure may be coupled with a processor. The computer implemented method may be used for interacting with the shared data structure. The method may comprise the exchange of messages, requesting to change data in the shared data structure, between selected participants, wherein some of the participants must validate requested changes to the shared data. If all participants validate the requests to change data the changes to the data are made, and if less than all participants validate the requests then the changes are not made.
    Type: Application
    Filed: May 27, 2016
    Publication date: October 12, 2017
    Inventors: Ajay Madhavan, Stanislav Liberman, Kireeti Reddy
  • Publication number: 20170295024
    Abstract: The present invention discloses a method and a system for protecting root CA certificates in a virtualization environment. The method installs a root CA certificate security manager on a host computer. The root CA certificate security manager stores the lists of root CA certificates and provides certificate validation service to virtual machines via a read-only interface. When a virtual machine needs the verification of a certificate, it sends a certificate validation service request to the root CA security manager. The root CA certificate security manager provides certificate validation services to the virtual machine in response to the request.
    Type: Application
    Filed: January 16, 2015
    Publication date: October 12, 2017
    Inventors: Jingqiang Lin, Jiwu Jing, Le Guan, Bingyu Li, Jing Wang, Wuqiong Pan, Yuewu Wang
  • Publication number: 20170295025
    Abstract: A method of generating a shortcut certificate for authenticating a user digital certificate generated by an issuing certification authority; the method comprising: authenticating the digital certificate of the issuing certification authority; creating the shortcut certificate for the digital certificate of the issuing certification authority when the digital certificate of the issuing certification authority is authenticated; wherein the shortcut certificate comprises a signed entry of an authentication of the issuing certification authority.
    Type: Application
    Filed: September 22, 2015
    Publication date: October 12, 2017
    Inventors: Milosch MERIAC, Geraint LUFF
  • Publication number: 20170295026
    Abstract: There is provided a method for testing a Physically Unclonable Function (PUF) implemented in a device, said PUF being configured to receive at least one challenge, each challenge comprising a set of bits, and to produce a set of responses, each response comprising at least one bit and corresponding to one challenge, said PUF comprising a circuitry including a set of PUF elements, each PUF element being controlled by at least one input bit corresponding to at least one bit of said challenge, wherein the method comprises the steps of: applying at least one bit of the challenge to the PUF instance; determining (300) identifiers for at least some of the PUF elements, the identifier of each PUF element being determined from the response output by said PUF element in response to said at least one bit of the challenge; applying a statistical randomness test (304) to a group of identifiers comprising at least some of the identifiers determined for said PUF elements, which provides a test indicator; and testing sai
    Type: Application
    Filed: April 6, 2017
    Publication date: October 12, 2017
    Applicant: SECURE-IC SAS
    Inventors: Sylvain GUILLEY, Jean-Luc DANGER
  • Publication number: 20170295027
    Abstract: Provided is an information processing apparatus including a physical unclonable function (PUF) to generate a unique key using a process variation in a semiconductor manufacturing process, and an encryption unit to encrypt a password and/or bio-information received from a user using the unique key.
    Type: Application
    Filed: June 27, 2017
    Publication date: October 12, 2017
    Inventors: Dong Kyue Kim, Byong Deok Choi, Dong Hyun Kim, Kwang Hyun Jee
  • Publication number: 20170295028
    Abstract: A portable information handling system selectively accepts power transferred from an external device through a port, such as USB Type C port, with one of a first or second power configuration. The first power configuration accepts power regulated by a charger of an external device and routed directly to a system bus and battery of the portable information handling system. The second power configuration accepts power regulated by an internal charger of the portable information handling system, such as a narrow voltage direct current charger.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Applicant: Dell Products L.P.
    Inventors: Gerald R. Pelissier, Kevin M. Turchin, III, Lawrence E. Knepper
  • Publication number: 20170295029
    Abstract: The present disclosure discloses a data transmission method and apparatus. User equipment (UE) measures and transmits a transmission delay to a group communication service application server (GCS AS), or the GCS AS itself determines a transmission delay, so that the GCS AS may determine, according to the transmission delay, a time of sending a packet on a multicast path or a unicast path. Therefore, a problem of out of order of packets or a loss of a packet due to a transmission delay is resolved, and continuity of a communication service is maintained.
    Type: Application
    Filed: June 23, 2017
    Publication date: October 12, 2017
    Inventors: Zhiming Li, Longyu Cao
  • Publication number: 20170295030
    Abstract: A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session.
    Type: Application
    Filed: June 16, 2017
    Publication date: October 12, 2017
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Douglas M. Nortz, Mark W. Altom, Robert J. Sayko
  • Publication number: 20170295031
    Abstract: In general, certain embodiments of the present disclosure provide techniques or mechanisms for automatically filtering network messages in an aviation network for an aircraft based on a current system context. According to various embodiments, a method is provided comprising receiving a network message transmitted from a source avionic device to a destination avionic device via one or more network packets within the aviation network. A current system context, indicating an aggregate status of avionic devices within the aviation network, is determined based on monitoring the avionic devices. The network message is analyzed by identifying a plurality of attributes corresponding to header and data fields of the one or more network packets corresponding to the network message. The acceptability of the network message within the current system context is determined based on one or more filter rules that specify what attributes are allowed within a particular system context.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Applicant: The Boeing Company
    Inventors: John E. Bush, Steven L. Arnold, Arun Ayyagari
  • Publication number: 20170295032
    Abstract: An electronic apparatus is disclosed, the electronic apparatus including a communicator comprising communication circuitry configured to communicate with an external apparatus, a memory configured to store knowledge information including information regarding the external apparatus and a plurality of action templates that define an operation of the external apparatus and a controller configured to receive identification information of the external apparatus through the communication circuitry of the communicator, to acquire knowledge information and an action template corresponding to the external apparatus based on the identification information from the memory, to generate a command to operate the external apparatus based on the knowledge information and the action template and to transmit the command to the external apparatus through the communication circuitry of the communicator.
    Type: Application
    Filed: March 13, 2017
    Publication date: October 12, 2017
    Inventors: Seung-min SHIN, Je-youn DONG, Hae-rim SON, In-jee SONG
  • Publication number: 20170295033
    Abstract: A method for offloading packet encapsulation for an overlay network is provided. The method, at a virtualization software of a host, sends a mapping table of the overlay network to a physical network interface controller (NIC) associated with the host. The mapping table maps the identification of each of a set of virtual machine (VM) of a tenant on the host to an identification of a tunnel on the overlay network. The method, at the virtualization software, receives a packet from a VM of the tenant. The method sends the packet to the physical NIC. The method, at the physical NIC, encapsulates the packet for transmission over the overlay network by using the mapping table. The method of claim also tags the packet by the virtualization software as a packet that requires encapsulation for transmission in the overlay network prior to sending the packet to the physical NIC.
    Type: Application
    Filed: June 26, 2017
    Publication date: October 12, 2017
    Inventors: Shoby Cherian, Raghavendra Subbarao Narahari Venkata, Tanuja Ingale
  • Publication number: 20170295034
    Abstract: An onboard communication network of an aircraft and communication system. The onboard communication network of an aircraft is a deterministic switched Ethernet network including a set of subscribers and at least one switch. It uses virtual links, each defined between a transmitting subscriber and one or more receiving subscribers.
    Type: Application
    Filed: March 31, 2017
    Publication date: October 12, 2017
    Inventors: Jean-François SAINT-ETIENNE, Juan LOPEZ
  • Publication number: 20170295035
    Abstract: Examples disclosed herein relate to selecting an optimal network device for reporting flow table misses upon expiry of a flow in a software defined network, comprising. An SDN enabled device is selected, from a plurality of software defined network (SDN) enabled devices, for reporting a flow table miss upon expiry of a flow to an SDN controller, based on a pre-defined factor.
    Type: Application
    Filed: August 25, 2014
    Publication date: October 12, 2017
    Inventors: Subin Cyriac Mathew, Sugesh Chandran, Celestian Kaniampady Sebastian
  • Publication number: 20170295036
    Abstract: An anti-aliasing channel estimation apparatus and method and a receiver where the anti-aliasing channel estimation method includes: performing clock recovery and data synchronization on a received multicarrier signal with channel aliasing, to obtain a synchronized time-domain signal and a sampling phase; calculating an estimation signal after passing through a channel and being aliased based on a training sequence and the sampling phase, and obtaining a channel response and an aliasing signal response of each subcarrier of the multicarrrier signal based on the estimation signal and the frequency-domain signal. Therefore, channel estimation may be performed on the multicarrier signal with channel aliasing, influence of the channel aliasing on the bit error rate may be lowered, and transmission quality of the system may be improved.
    Type: Application
    Filed: April 6, 2017
    Publication date: October 12, 2017
    Applicant: Fujitsu Limited
    Inventors: Bo LIU, Lei LI
  • Publication number: 20170295037
    Abstract: Embodiments of the invention provide a decoder for decoding a signal received through a transmission channel in a communication system, said signal comprising a vector of information symbols, said transmission channel being represented by a channel matrix comprising column vectors, said information symbols carrying information bits, wherein the decoder comprises: a transformation unit (401) configured to determine a set of auxiliary channel matrices, each auxiliary channel matrix being determined by performing a linear combination of at least one of the column vectors of said channel matrix; a decomposition unit (407) configured to determine a decomposition of each auxiliary channel matrix into an upper triangular matrix and an orthogonal matrix; a matrix selection unit (409) configured to select at least one auxiliary channel matrix among said set of auxiliary channel matrices depending on a selection criterion related to the components of said upper triangular matrices.
    Type: Application
    Filed: March 31, 2017
    Publication date: October 12, 2017
    Applicant: INSTITUT MINES-TELECOM
    Inventors: Asma MEJRI, Mohamed-Achraf KHSIBA, Ghaya REKAYA BEN-OTHMAN
  • Publication number: 20170295038
    Abstract: An improved receiver design implements a method for modeling users in SIC turbo loop multiuser detection architectures that reduces the number of implementation cycles, and thereby reduces the computational overhead associated with computing the inverse of the received signal covariance matrix, by efficiently reusing components of a QR decomposition. By reusing some of the computational results from the previous turbo loop's equalizer calculation, the disclosed receiver significantly reduces the computational burden of updating the linear equalizer on each turbo loop. Depending on the embodiment, this reduction can be accomplished in at least two different ways, depending on the dimensionality and other aspects of the implementation.
    Type: Application
    Filed: April 8, 2016
    Publication date: October 12, 2017
    Inventors: Brandon Hombs, Sayak Bose
  • Publication number: 20170295039
    Abstract: A decision feedback equalizer may include an input node, first and second paths, and a summation circuit. The input node may be configured to receive an input signal with an input symbol rate. The first and second paths may receive the input signal. The first path may include a first register configured to output a first signal based on the input signal such that the first signal has a sample symbol rate less than the input symbol rate. The second path may include a second register configured to output a second signal at the sample symbol rate based on the input signal. The summation circuit may be positioned between the input node and the first and second paths. The summation circuit may subtract the first and seconds signals at the sample symbol rate from the input signal before the input signal is provided to the first and second paths.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Applicant: FUJITSU LIMITED
    Inventor: Yasuo HIDAKA
  • Publication number: 20170295040
    Abstract: A decision-feedback equalizer (DFE) samples an analog input signal against M references during the same symbol time to produce M speculative samples. Select logic in the DFE then decodes N bits resolved previously for previous symbol times to select one of the M speculative samples as the present resolved bit. The present resolved bit is then stored as the most recent previously resolved bit in preparation for the next symbol time. The select logic can be can be programmable to accommodate process, environmental, and systematic variations.
    Type: Application
    Filed: April 27, 2017
    Publication date: October 12, 2017
    Inventors: Brian S. Leibowitz, Jaeha Kim
  • Publication number: 20170295041
    Abstract: A method of transmitting a frame is provided by a device in a WLAN. The device sets as additional data subcarriers some of subcarriers which are not set as data subcarriers in at least part of fields included in a frame of a legacy frame format, and allocates information to the additional data subcarriers.
    Type: Application
    Filed: June 19, 2017
    Publication date: October 12, 2017
    Inventors: Heejung YU, Minho CHEONG, Hyoung Jin KWON
  • Publication number: 20170295042
    Abstract: A driver circuit device using driver equalization in power and ground terminated transmission line channels. The driver circuit device can include a weaker pull-up driver, which is needed to pre-emphasize the pull-up signal for driver equalization in power terminated transmission line channels. The driver circuit device can also include a weaker pull-down driver, which is needed to pre-emphasize the pull-down signal for driver equalization in ground terminated transmission line channels. In the transmission line channels with power terminations, a weaker pull-up Ron is implemented. In the transmission line channels with ground terminations, a weaker pull-down Ron is implemented. Drivers implemented in power and/or ground terminated transmission line channels can be used to improve device performance, such as in signal eye opening.
    Type: Application
    Filed: June 22, 2017
    Publication date: October 12, 2017
    Inventors: Liang Leon ZHANG, Friedel GERFERS, Carl POBANZ, Myoung Joon CHOI, Vivek GURUMOORTHY, Chienhsin LEE
  • Publication number: 20170295043
    Abstract: Digital video signals are transmitted from a transmitter to a receiver via a digital video interface including shielded twisted pair cables that are surrounded by an over-braid shield. The over-braid shield is connected to a chassis ground at a transmitting end and the receiving end. An interface conveys the received signals to receiver processing circuitry. The interface is connected to an isolated ground, isolating the receiver processing circuitry. The twisted pairs are also connected to the isolated ground, such that a return current is forced back through the twisted pair cable shields rather than the over-braid shield. This reduces electromagnetic emissions and confines transients primarily to the over-braid shield.
    Type: Application
    Filed: April 6, 2016
    Publication date: October 12, 2017
    Applicant: L-3 COMMUNICATIONS CORPORATION
    Inventors: Michael G. ABERNATHY, Nathaniel Flournoy LOVELACE, III
  • Publication number: 20170295044
    Abstract: A PLC modem (131-133) is prompted to increase, starting from a predetermined minimum transmit power, a transmit power of data transmission on a PLC channel (112) at a given time or time period defined with respect to a mutual time reference of a DSL channel (111) and the PLC channel (112). A DSL modem (121) is prompted to measure a signal-to-noise value at the given time or time period defined with respect to the mutual time reference. Mitigation of interference 190 between the PLC channel (112) and the DSL channel (111) becomes possible.
    Type: Application
    Filed: June 23, 2017
    Publication date: October 12, 2017
    Inventor: Vladimir Oksman
  • Publication number: 20170295045
    Abstract: A method for simultaneously transmitting data bits and a clock signal includes converting the combination of the data bits and the clock signal to analog voltages by a digital-to-analog converter. The clock signal are the most significant bit of the digital-to-analog conversion and the data bits are the least significant bit of the digital-to-analog conversion.
    Type: Application
    Filed: June 27, 2017
    Publication date: October 12, 2017
    Inventor: Robert Floyd Payne
  • Publication number: 20170295046
    Abstract: Provided are a method and a device for controlling transmission power in a wireless communication system. The device conducts an adjustment such that the transmission power of an UL (uplink) signal, with respect to a serving cell in an unlicensed band, does not exceed the maximum PSD (power spectral density) of the unlicensed band.
    Type: Application
    Filed: September 14, 2015
    Publication date: October 12, 2017
    Applicant: LG ELECTRONICS INC.
    Inventors: Joonkui AHN, Byounghoon KIM, Hanbyul SEO
  • Publication number: 20170295047
    Abstract: Methods, systems, and devices for wireless communications are described. A transmitting device may modulate a first binary sequence using binary phase shift keying on a first axis of a complex plane. The device may modulate a second binary sequence using binary phase shift keying on a second plane of a complex axis. The first axis and the second axis may be orthogonal. The device may transmit the first binary sequence and the second binary sequence according to the modulation of the first binary sequence and the second binary sequence.
    Type: Application
    Filed: February 10, 2017
    Publication date: October 12, 2017
    Inventors: Wei Zeng, Joseph Binamira Soriaga, Tingfang Ji
  • Publication number: 20170295048
    Abstract: A method for controlling a combined waveform, representing a combination of at least two signals having orthogonal frequency multiplexed signal components, comprising: receiving information defining the at least two signals; transforming the information defining each signal to a representation having orthogonal frequency multiplexed signal components, such that at least one signal has at least two alternate representations of the same information, and combining the transformed information using the at least two alternate representations, in at least two different ways, to define respectively different combinations; analyzing the respectively different combinations with respect to at least one criterion; and outputting a respective combined waveform or information defining the waveform, representing a selected combination of the transformed information from each of the at least two signals selected based on the analysis.
    Type: Application
    Filed: June 16, 2017
    Publication date: October 12, 2017
    Inventor: John David Terry
  • Publication number: 20170295049
    Abstract: A communication device maps a plurality of bits to a first set of transmission symbols corresponding to a first set of subcarriers within a component communication channel. Transmission symbols among the first set of transmission symbols correspond to respective subsets of one or more bits, and transmission symbols among the first set of transmission symbols are single carrier transmission symbols. The communication device maps the plurality of bits to a second set of transmission symbols corresponding to a second set of subcarriers within the component communication channel. At least a subset of multiple transmission symbols in the second set of transmission symbols correspond to phase adjusted versions of transmission symbols in a corresponding at least a subset of multiple transmission symbols in the first set of transmission symbols. The communication device generates a transmission signal using the first set of transmission symbols and the second set of transmission symbols.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 12, 2017
    Inventors: Yakun SUN, Hongyuan ZHANG, Yan ZHANG
  • Publication number: 20170295050
    Abstract: A method and an apparatus for generating a synchronization signal in the Internet of things. In the method for generating a synchronization signal, subcarrier mapping may be performed by exchanging a signal allocated to an upper subcarrier group and a signal allocated to a lower subcarrier group among all subcarriers allocated for the synchronization signal with each other, in an in-band operation mode or a guard band operation mode of the Internet of things.
    Type: Application
    Filed: April 6, 2017
    Publication date: October 12, 2017
    Inventors: Kapseok CHANG, Moon-Sik LEE, Ohyun JO
  • Publication number: 20170295051
    Abstract: A method and an apparatus for receiving broadcast signals thereof are disclosed. The apparatus for receiving broadcast signals, the apparatus comprises a receiver to receive the broadcast signals, a demodulator to demodulate the received broadcast signals by an OFDM (Orthogonal Frequency Division Multiplex) scheme, a frame parser to parse a signal frame from the demodulated broadcast signals, wherein the signal frame includes service data corresponding to each of a plurality of physical paths, a time deinterleaver to time deinterleave service data in each physical path by a TI (Time Interleaving) block, wherein the time deinterleaver further performs inserting at least one virtual FEC block into at least one TI block of the service data, wherein each TI block includes a variable number of FEC blocks of the service data, wherein a number of the at least one virtual FEC block is defined based on a maximum number of FEC blocks of a TI block and a decoder to decode the time deinterleaved service data.
    Type: Application
    Filed: February 17, 2017
    Publication date: October 12, 2017
    Inventors: Jongseob BAEK, Woosuk KO, Sungryong HONG
  • Publication number: 20170295052
    Abstract: Embodiments of the present application provide a cache method, the cache method includes: receiving, from the cache core server, information about a Transmission Control Protocol (TCP) flow; determining, according to the information, whether the cache edge server stores content corresponding to the information; sending a migrate-out request to the cache core server based on that the cache edge server stores the content corresponding to the information; receiving a migrate-out response from the cache core server upon the sending of the migrate-out request; performing a TCP connection to user equipment according to the migrate-out response; and reading content corresponding to the connection from storage of the cache edge server according to a byte quantity, sent by the cache core server, of the content, and sending the content to the user equipment.
    Type: Application
    Filed: June 25, 2017
    Publication date: October 12, 2017
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Zanfeng Yang, Tao Song, Xinyu Ge, Pinhua Zhao, Jianzhong Yu, Bo Zhou, Wentao Wang
  • Publication number: 20170295053
    Abstract: Systems, methods, and computer-readable media for managing nodes through virtual rack management modules. A system can have a first rack that includes a first top-of-rack (ToR) switch and a first group of nodes. The first ToR switch can be connected to the first group of nodes. The system can also have a second rack that includes a second ToR switch and a second group of nodes. The second ToR switch can be connected to the second group of nodes, and the second ToR switch can be connected to the first ToR switch. Furthermore, the system can include a rack management node that executes a hypervisor. The hypervisor can run a first virtual rack management module (vRMM) and a second vRMM. The first vRMM and the second vRMM can manage the first group of nodes and the second group of nodes, respectively.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Inventor: Yen-Ping TUNG
  • Publication number: 20170295054
    Abstract: A method and apparatus for transmitting a report message in a wireless communication system is provided. A user equipment (UE) receives a configuration of measurement, i.e. minimization of drive tests (MDT) configuration, via system information or broadcast/multicast control channel, i.e. multicast control channel (MCCH). If the UE detects a problem for reception of a broadcast/multicast service, the UE immediately transmits a report message.
    Type: Application
    Filed: January 29, 2015
    Publication date: October 12, 2017
    Applicant: LG ELECTRONICS INC.
    Inventors: Youngdae LEE, Sunghoon JUNG, Sangwon KIM
  • Publication number: 20170295055
    Abstract: Aspects of the disclosure provide a network switch having a plurality of physical ports, a detector and a packet processing pipeline. Each of plurality of physical ports is associated with one or more network paths in a transport network to transmit/receive traffic of the network paths. The detector is configured to detect loss of continuity (LOC) on the network paths. The packet processing pipeline is configured to identify first two or more logical interfaces mapped to a first network path, determine second two or more logical interfaces mapped to a second network path that is an alternate network path for the first network path, and use the second two or more logical interfaces in forwarding decisions in response to a detection of LOC on the first network path, such that traffic to the first network path is sent to a physical port associated with the second network path.
    Type: Application
    Filed: June 26, 2017
    Publication date: October 12, 2017
    Applicant: MARVELL ISTRAEL (M.I.S.L) LTD.
    Inventor: David MELMAN
  • Publication number: 20170295056
    Abstract: Techniques for managing configuration of virtual switches in a virtual machine network are disclosed. In an embodiment, a virtual machine network that includes virtual switches is configured to revert back to a saved network configuration if a configuration change causes the connection between the VM management system and a managed node to be lost. For example, before any configuration changes are made, the active configuration is saved. If the new configuration supports a working connection between the managed node and the VM management system, then the saved configuration is no longer needed and can be flushed from memory. If, however, the new configuration causes the managed node to be disconnected from the VM management system, then the system reverts back to the saved configuration that was previously known to work. The saved configuration is used to reestablish the connection so that the network continues to function.
    Type: Application
    Filed: June 13, 2017
    Publication date: October 12, 2017
    Inventors: Piyush KOTHARI, Mukesh BAPHNA, ChiHsiang SU
  • Publication number: 20170295057
    Abstract: A system includes at least one hardware processor and a memory storing a plurality of service configurations and a plurality of configuration programs, including a first configuration program, and a first service configuration identifying at least one conditional element and the first configuration program. The system also includes a customization engine configured to receive a REST call from a requesting device, the REST call identifying an IIoT machine, the IIoT machine executing a service exposing a REST-ful API.
    Type: Application
    Filed: April 7, 2016
    Publication date: October 12, 2017
    Inventors: Richard Dost, Eric Steele