Patents Issued in October 12, 2017
-
Publication number: 20170295008Abstract: A configurable transceiver includes a first transmitter, an edge rate controller, a second transmitter, a subtractor, a bandwidth controller and a main controller. The first transmitter is configured to generate a first signal for transmission via a transmission link. The second transmitter is configured to generate a replica signal associated with the first signal. The edge rate controller is communicatively coupled to the first and/or second transmitter and is configured to control an edge rate parameter of the first and/or second signal. The subtractor is configured to subtract the replica signal from a signal received via the transmission link. The bandwidth controller is configured to control a bandwidth parameter of a difference signal received from the output of the subtractor. The main controller chooses edge rate and bandwidth control words per desired link rates. It can also automatically find the maximum possible link speed.Type: ApplicationFiled: April 4, 2017Publication date: October 12, 2017Inventors: Caglar Yilmazer, Arda K. Bafra, Umut Yilmazer
-
Publication number: 20170295009Abstract: A phase lock loop (PLL) includes: a binary phase detector configured to generate a first and second polarity signals that respectively indicating whether an incoming data stream is leading a feedback signal, or whether the feedback signal is leading the incoming data stream, wherein a difference between the first and second polarity signals does not represent an amount of phase difference between the incoming data stream and the feedback signal; a digital filter configured to: generate filtered first polarity signal on a first path and a second path that are different; and generate filtered second polarity signal on a third path and a fourth path that are different; a charge pump coupled to the digital filter and configured to: integrate the filtered first polarity signal and the filtered second polarity signal; and an oscillator configured to generate the synthesized clock signal serving as the feedback signal.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventors: Alan C. Rogers, Kowshik Murali, Raghunand Bhagwan
-
Publication number: 20170295010Abstract: A cipher processing configuration, of which the resistance against various attacks is improved, having a high security level is realized. In a cipher processing configuration in which a nonlinear transformation process and a linear transformation process are repeatedlyperformed for state data formed from a plurality of elements, a linear transformation unit performs a matrix operation applying a quasi-MDS matrix and a substitution process. As the substitution process, a substitution process is performed which satisfies the following (Condition 1) and (Condition A).Type: ApplicationFiled: August 20, 2015Publication date: October 12, 2017Inventors: KYOJI SHIBUTANI, TAKANORI ISOBE
-
Publication number: 20170295011Abstract: The invention relates to the field of computer engineering and cryptography and, in particular, to methods for implementing linear transformations which operate with a specified speed and require minimum amount of memory, for further usage in devices for cryptographic protection of data. The technical result relates to enabling to select inter-related parameters (performance and required amount of memory) for a particular computing system when implementing a high-dimensional linear transformation. The use of the present method allows to reduce the amount of consumed memory at a given word size of processors employed. To this end, based on a specified linear transformation, a modified linear shift register of Galois-type or Fibonacci-type is generated according to the rules provided in the disclosed method, and the usage thereof enables to obtain the indicated technical result.Type: ApplicationFiled: July 26, 2016Publication date: October 12, 2017Applicant: Joint Stock Company "InfoTeCS"Inventors: Nikolay Pavlovich BORISENKO, Alexey Viktorovich URIVSKIY
-
Publication number: 20170295012Abstract: In order to have a completely secure cryptographic system, it has been looked for a system unconditionally secure as the One Time Pad, but without its key distribution problem. It is herein disclosed a cryptographic system, which implements a cryptographic process based on a random sequence generating process (1), generating a random key as long as the data to process, for a ciphering process (2) or a deciphering process (3). The random sequences generated by the random sequence generating process (1), being perfectly random, are perfectly reproducible for those who have the correct random-transfer maps (4) and seeds (5). Therefore, we have a very strong cryptographic system without the problem of the key distribution. It even allows to implement an unconditionally secure communication channel over a network. Such cryptographic system can be implemented on very different hardwares, even with limited computing power like smart cards.Type: ApplicationFiled: September 14, 2014Publication date: October 12, 2017Inventor: Alexandre Andre DURAND
-
Publication number: 20170295013Abstract: Method for fulfilling a cryptographic request requiring a value of a private key. Code portions are sent from a server to a computing unit running a web browser. The code portions are executed directly in the web browser in such a way that it automatically performs a cryptographic process including the steps of: receiving a cryptographic request requiring a value of a private key; requesting an encrypted value of the private key; receiving the encrypted value of the private key; requesting an unlocking entity; receiving the unlocking entity; decrypting the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and fulfilling the cryptographic request using the obtained value of the private key.Type: ApplicationFiled: April 5, 2017Publication date: October 12, 2017Inventor: LUC CLAES
-
Publication number: 20170295014Abstract: Methods and apparatuses for authenticating communication devices and securely transmitting and/or receiving encrypted voice and data information. A biometric scanner, for example a fingerprint scanner, is utilized for authenticating the communication device and for generating the encryption key. The fingerprint scanner can be an area or swipe type of scanner is registered to a particular user and has unique intrinsic characteristics (the scanner pattern) that are permanent over time and can identify the scanner even among scanners of the same manufacturer and model. The unique scanner pattern of the scanner generates a unique encryption key that cannot be reproduced using another fingerprint scanner.Type: ApplicationFiled: April 8, 2017Publication date: October 12, 2017Inventors: John S. BARAS, Vladimir Iankov IVANOV
-
Publication number: 20170295015Abstract: An integrated circuit having a Physically Unclonable Function (PUF) circuit is provided. The PUF circuit may reside as part of a secure subsystem, which also includes a random number generator, a syndrome generator, non-volatile memory, and control circuitry. A predetermined syndrome of a desired PUF response is stored in the non-volatile memory. During normal operation, a current PUF response may be read out from the PUF circuit. The current PUF response may include erroneous bits that differ from the desired PUF response. The random number generator may generator a random number that masks the current PUF response, whereas the syndrome generator outputs a syndrome of the current PUF response. This information may then be passed to a separate error-correcting code (ECC) processor. The ECC processor may return information back to the secure subsystem, and the control circuitry may then obtain a corrected PUF response that matches the desired PUF response.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Inventor: Bruce Pedersen
-
Publication number: 20170295016Abstract: A system for generating a symmetric encryption key, said system comprising a first terminal, a second terminal and a server, wherein the server is configured to generate a first processing file for the first terminal based on a combination of key data for the first terminal and key data for the second terminal and the key data for the first terminal; generate a second processing file for the second terminal based on a combination of key data for the first terminal and key data for the second terminal and the key data for the second terminal; and send the first processing file to the first terminal and the second processing file to the second terminal; wherein the first terminal is configured to receive the first processing file; extract the combined key data; generate a first random key seed and send it to the second terminal; receive a second random key seed from the second terminal; wherein the second terminal is configured to receive the second processing file; extract the combined key data; generate the sType: ApplicationFiled: October 8, 2015Publication date: October 12, 2017Inventor: Elise Revell
-
Publication number: 20170295017Abstract: The present invention relates to a system and a method for mobile cross-authentication comprising: generating an online authentication code (Ocode) and a mobile authentication code (Mcode) from an authentication server when performing online authentication, providing the online authentication code (Ocode) and the mobile authentication code (Mcode) to a computer terminal and a mobile terminal of the user respectively, receiving and verifying the online authentication code and the mobile authentication code received by the computer terminal and the mobile terminal to the authentication server through the mobile terminal and the computer terminal respectively.Type: ApplicationFiled: October 13, 2015Publication date: October 12, 2017Inventors: Seung Eun HONG, Paul HONG
-
Publication number: 20170295018Abstract: When a user requests root-level access to a device, the device generates a random public and private key pair and encrypts the public key into a request message using a remote server's public key. The encrypted request message is transmitted to the server. The server decrypts the request message using the server's private key. The server encrypts an enable code into a response message using the device's public key. The encrypted response message is transmitted to the device. The device decrypts the response message containing the enable code using the device's private key. The device then enables root-level access using the enable code.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventor: John Malcolm Whitehouse
-
Publication number: 20170295019Abstract: A communication device includes, a plurality of authentication generation processing units, which are respectively associated with different sequence number groups each including successive sequence numbers and which execute, in parallel, authentication generation processes for generating authentication information included in the packets based on sequence numbers allocated to the packets, a transmitting unit which transmits packets including the allocated sequence numbers to another communication device in an order in which authentication generation processes by the plurality of authentication generation processing units are completed, a receiving unit which receives a packet from the other communication device, and an authentication processing unit which executes a first authentication process in which the reception packet is authenticated based on a relationship between a sequence number of the reception packet and a sequence number of a preceding reception packet.Type: ApplicationFiled: March 28, 2017Publication date: October 12, 2017Applicant: FUJITSU LIMITEDInventors: Isamu Fukuda, Tetsuta SAKABE, Katsuhiko Negoto, KIYOHISA HOSHINO, Akihiro KAMEDA, Kazuhiro Yasuno
-
Publication number: 20170295020Abstract: A method for verifying a target computer file with respect to a reference computer file, including defining a first area delimiting a portion of a reference file, and a second area delimiting a portion of a target file, the second area exhibiting the same size as the first area and being situated, inside the target file, at the same relative position with respect to the origin of this target file as the first area with respect to the origin of the reference file; calculating a first digital imprint, by applying a hash function solely to that portion of the reference file which is contained inside the first area to be tested; calculating a second digital imprint, by applying the same hash function solely to that portion of the target file which is contained inside the second area to be tested; comparing the first and second digital imprints.Type: ApplicationFiled: January 6, 2017Publication date: October 12, 2017Applicant: SCHNEIDER ELECTRIC INDUSTRIES SASInventors: Michel MOULIN, Osman KOCOGLU, Theo DELETANG
-
Publication number: 20170295021Abstract: The method comprising, in a network based on a chain of individual Service Functions, SFs, that are composed to implement Network Services, NSs: assigning, at an ingress node of a network architecture, to at least one data packet received by said ingress node from the network, a unique cryptographic tag; processing said assigned unique cryptographic tag using a cryptographic function specific to each Service Function, SF; and verifying, at a given point of the network architecture, said processed unique cryptographic tag by applying a cryptographic verification function composed by the inverse functions of the cryptographic functions associated to the SFs traversed by the at least one data packet.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Applicant: Telefonica, S.A.Inventors: Pedro A. ARANDA GUTIÉRREZ, Diego R. LOPEZ, Norisy C. OREA BARRIOS
-
Publication number: 20170295022Abstract: A method for file conversion that includes receiving a first file in a computer; wherein the first file is of a first format; wherein the computer has a memory having a boot sector, a quarantine sector and a non-quarantine sector; storing the first file at the quarantine sector; wherein the quarantine sector is isolated from the boot sector and the non-quarantine sector, where code in the quarantine sector is prevented from performing write actions on other memory sectors of the memory; checking whether the first file fulfills a set of criteria that comprise: (a) the first file is associated with a valid first digital signature that was generated by a first certificate authority and is of a known format; (b) the first file is about to be converted to a second file of a second format that supports digital signatures; and (c) the first file successfully passed at least one security check; converting the first file to the second file of the second format; generating, by a second certificate authority, a second dType: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: Oren Shnitzer
-
Publication number: 20170295023Abstract: A computer implemented method for implementing a real time reconciling shared data structure is disclosed. The shared data structure may be stored in a memory, and a portion of the shared data structure may be coupled with a processor. The computer implemented method may be used for interacting with the shared data structure. The method may comprise the exchange of messages, requesting to change data in the shared data structure, between selected participants, wherein some of the participants must validate requested changes to the shared data. If all participants validate the requests to change data the changes to the data are made, and if less than all participants validate the requests then the changes are not made.Type: ApplicationFiled: May 27, 2016Publication date: October 12, 2017Inventors: Ajay Madhavan, Stanislav Liberman, Kireeti Reddy
-
Publication number: 20170295024Abstract: The present invention discloses a method and a system for protecting root CA certificates in a virtualization environment. The method installs a root CA certificate security manager on a host computer. The root CA certificate security manager stores the lists of root CA certificates and provides certificate validation service to virtual machines via a read-only interface. When a virtual machine needs the verification of a certificate, it sends a certificate validation service request to the root CA security manager. The root CA certificate security manager provides certificate validation services to the virtual machine in response to the request.Type: ApplicationFiled: January 16, 2015Publication date: October 12, 2017Inventors: Jingqiang Lin, Jiwu Jing, Le Guan, Bingyu Li, Jing Wang, Wuqiong Pan, Yuewu Wang
-
Publication number: 20170295025Abstract: A method of generating a shortcut certificate for authenticating a user digital certificate generated by an issuing certification authority; the method comprising: authenticating the digital certificate of the issuing certification authority; creating the shortcut certificate for the digital certificate of the issuing certification authority when the digital certificate of the issuing certification authority is authenticated; wherein the shortcut certificate comprises a signed entry of an authentication of the issuing certification authority.Type: ApplicationFiled: September 22, 2015Publication date: October 12, 2017Inventors: Milosch MERIAC, Geraint LUFF
-
Publication number: 20170295026Abstract: There is provided a method for testing a Physically Unclonable Function (PUF) implemented in a device, said PUF being configured to receive at least one challenge, each challenge comprising a set of bits, and to produce a set of responses, each response comprising at least one bit and corresponding to one challenge, said PUF comprising a circuitry including a set of PUF elements, each PUF element being controlled by at least one input bit corresponding to at least one bit of said challenge, wherein the method comprises the steps of: applying at least one bit of the challenge to the PUF instance; determining (300) identifiers for at least some of the PUF elements, the identifier of each PUF element being determined from the response output by said PUF element in response to said at least one bit of the challenge; applying a statistical randomness test (304) to a group of identifiers comprising at least some of the identifiers determined for said PUF elements, which provides a test indicator; and testing saiType: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Applicant: SECURE-IC SASInventors: Sylvain GUILLEY, Jean-Luc DANGER
-
Publication number: 20170295027Abstract: Provided is an information processing apparatus including a physical unclonable function (PUF) to generate a unique key using a process variation in a semiconductor manufacturing process, and an encryption unit to encrypt a password and/or bio-information received from a user using the unique key.Type: ApplicationFiled: June 27, 2017Publication date: October 12, 2017Inventors: Dong Kyue Kim, Byong Deok Choi, Dong Hyun Kim, Kwang Hyun Jee
-
Publication number: 20170295028Abstract: A portable information handling system selectively accepts power transferred from an external device through a port, such as USB Type C port, with one of a first or second power configuration. The first power configuration accepts power regulated by a charger of an external device and routed directly to a system bus and battery of the portable information handling system. The second power configuration accepts power regulated by an internal charger of the portable information handling system, such as a narrow voltage direct current charger.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Applicant: Dell Products L.P.Inventors: Gerald R. Pelissier, Kevin M. Turchin, III, Lawrence E. Knepper
-
Publication number: 20170295029Abstract: The present disclosure discloses a data transmission method and apparatus. User equipment (UE) measures and transmits a transmission delay to a group communication service application server (GCS AS), or the GCS AS itself determines a transmission delay, so that the GCS AS may determine, according to the transmission delay, a time of sending a packet on a multicast path or a unicast path. Therefore, a problem of out of order of packets or a loss of a packet due to a transmission delay is resolved, and continuity of a communication service is maintained.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Inventors: Zhiming Li, Longyu Cao
-
Publication number: 20170295030Abstract: A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session.Type: ApplicationFiled: June 16, 2017Publication date: October 12, 2017Applicant: AT&T Intellectual Property I, L.P.Inventors: Douglas M. Nortz, Mark W. Altom, Robert J. Sayko
-
Publication number: 20170295031Abstract: In general, certain embodiments of the present disclosure provide techniques or mechanisms for automatically filtering network messages in an aviation network for an aircraft based on a current system context. According to various embodiments, a method is provided comprising receiving a network message transmitted from a source avionic device to a destination avionic device via one or more network packets within the aviation network. A current system context, indicating an aggregate status of avionic devices within the aviation network, is determined based on monitoring the avionic devices. The network message is analyzed by identifying a plurality of attributes corresponding to header and data fields of the one or more network packets corresponding to the network message. The acceptability of the network message within the current system context is determined based on one or more filter rules that specify what attributes are allowed within a particular system context.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Applicant: The Boeing CompanyInventors: John E. Bush, Steven L. Arnold, Arun Ayyagari
-
Publication number: 20170295032Abstract: An electronic apparatus is disclosed, the electronic apparatus including a communicator comprising communication circuitry configured to communicate with an external apparatus, a memory configured to store knowledge information including information regarding the external apparatus and a plurality of action templates that define an operation of the external apparatus and a controller configured to receive identification information of the external apparatus through the communication circuitry of the communicator, to acquire knowledge information and an action template corresponding to the external apparatus based on the identification information from the memory, to generate a command to operate the external apparatus based on the knowledge information and the action template and to transmit the command to the external apparatus through the communication circuitry of the communicator.Type: ApplicationFiled: March 13, 2017Publication date: October 12, 2017Inventors: Seung-min SHIN, Je-youn DONG, Hae-rim SON, In-jee SONG
-
Publication number: 20170295033Abstract: A method for offloading packet encapsulation for an overlay network is provided. The method, at a virtualization software of a host, sends a mapping table of the overlay network to a physical network interface controller (NIC) associated with the host. The mapping table maps the identification of each of a set of virtual machine (VM) of a tenant on the host to an identification of a tunnel on the overlay network. The method, at the virtualization software, receives a packet from a VM of the tenant. The method sends the packet to the physical NIC. The method, at the physical NIC, encapsulates the packet for transmission over the overlay network by using the mapping table. The method of claim also tags the packet by the virtualization software as a packet that requires encapsulation for transmission in the overlay network prior to sending the packet to the physical NIC.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Inventors: Shoby Cherian, Raghavendra Subbarao Narahari Venkata, Tanuja Ingale
-
Publication number: 20170295034Abstract: An onboard communication network of an aircraft and communication system. The onboard communication network of an aircraft is a deterministic switched Ethernet network including a set of subscribers and at least one switch. It uses virtual links, each defined between a transmitting subscriber and one or more receiving subscribers.Type: ApplicationFiled: March 31, 2017Publication date: October 12, 2017Inventors: Jean-François SAINT-ETIENNE, Juan LOPEZ
-
Publication number: 20170295035Abstract: Examples disclosed herein relate to selecting an optimal network device for reporting flow table misses upon expiry of a flow in a software defined network, comprising. An SDN enabled device is selected, from a plurality of software defined network (SDN) enabled devices, for reporting a flow table miss upon expiry of a flow to an SDN controller, based on a pre-defined factor.Type: ApplicationFiled: August 25, 2014Publication date: October 12, 2017Inventors: Subin Cyriac Mathew, Sugesh Chandran, Celestian Kaniampady Sebastian
-
Publication number: 20170295036Abstract: An anti-aliasing channel estimation apparatus and method and a receiver where the anti-aliasing channel estimation method includes: performing clock recovery and data synchronization on a received multicarrier signal with channel aliasing, to obtain a synchronized time-domain signal and a sampling phase; calculating an estimation signal after passing through a channel and being aliased based on a training sequence and the sampling phase, and obtaining a channel response and an aliasing signal response of each subcarrier of the multicarrrier signal based on the estimation signal and the frequency-domain signal. Therefore, channel estimation may be performed on the multicarrier signal with channel aliasing, influence of the channel aliasing on the bit error rate may be lowered, and transmission quality of the system may be improved.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Applicant: Fujitsu LimitedInventors: Bo LIU, Lei LI
-
Publication number: 20170295037Abstract: Embodiments of the invention provide a decoder for decoding a signal received through a transmission channel in a communication system, said signal comprising a vector of information symbols, said transmission channel being represented by a channel matrix comprising column vectors, said information symbols carrying information bits, wherein the decoder comprises: a transformation unit (401) configured to determine a set of auxiliary channel matrices, each auxiliary channel matrix being determined by performing a linear combination of at least one of the column vectors of said channel matrix; a decomposition unit (407) configured to determine a decomposition of each auxiliary channel matrix into an upper triangular matrix and an orthogonal matrix; a matrix selection unit (409) configured to select at least one auxiliary channel matrix among said set of auxiliary channel matrices depending on a selection criterion related to the components of said upper triangular matrices.Type: ApplicationFiled: March 31, 2017Publication date: October 12, 2017Applicant: INSTITUT MINES-TELECOMInventors: Asma MEJRI, Mohamed-Achraf KHSIBA, Ghaya REKAYA BEN-OTHMAN
-
Publication number: 20170295038Abstract: An improved receiver design implements a method for modeling users in SIC turbo loop multiuser detection architectures that reduces the number of implementation cycles, and thereby reduces the computational overhead associated with computing the inverse of the received signal covariance matrix, by efficiently reusing components of a QR decomposition. By reusing some of the computational results from the previous turbo loop's equalizer calculation, the disclosed receiver significantly reduces the computational burden of updating the linear equalizer on each turbo loop. Depending on the embodiment, this reduction can be accomplished in at least two different ways, depending on the dimensionality and other aspects of the implementation.Type: ApplicationFiled: April 8, 2016Publication date: October 12, 2017Inventors: Brandon Hombs, Sayak Bose
-
Publication number: 20170295039Abstract: A decision feedback equalizer may include an input node, first and second paths, and a summation circuit. The input node may be configured to receive an input signal with an input symbol rate. The first and second paths may receive the input signal. The first path may include a first register configured to output a first signal based on the input signal such that the first signal has a sample symbol rate less than the input symbol rate. The second path may include a second register configured to output a second signal at the sample symbol rate based on the input signal. The summation circuit may be positioned between the input node and the first and second paths. The summation circuit may subtract the first and seconds signals at the sample symbol rate from the input signal before the input signal is provided to the first and second paths.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Applicant: FUJITSU LIMITEDInventor: Yasuo HIDAKA
-
Publication number: 20170295040Abstract: A decision-feedback equalizer (DFE) samples an analog input signal against M references during the same symbol time to produce M speculative samples. Select logic in the DFE then decodes N bits resolved previously for previous symbol times to select one of the M speculative samples as the present resolved bit. The present resolved bit is then stored as the most recent previously resolved bit in preparation for the next symbol time. The select logic can be can be programmable to accommodate process, environmental, and systematic variations.Type: ApplicationFiled: April 27, 2017Publication date: October 12, 2017Inventors: Brian S. Leibowitz, Jaeha Kim
-
Publication number: 20170295041Abstract: A method of transmitting a frame is provided by a device in a WLAN. The device sets as additional data subcarriers some of subcarriers which are not set as data subcarriers in at least part of fields included in a frame of a legacy frame format, and allocates information to the additional data subcarriers.Type: ApplicationFiled: June 19, 2017Publication date: October 12, 2017Inventors: Heejung YU, Minho CHEONG, Hyoung Jin KWON
-
Publication number: 20170295042Abstract: A driver circuit device using driver equalization in power and ground terminated transmission line channels. The driver circuit device can include a weaker pull-up driver, which is needed to pre-emphasize the pull-up signal for driver equalization in power terminated transmission line channels. The driver circuit device can also include a weaker pull-down driver, which is needed to pre-emphasize the pull-down signal for driver equalization in ground terminated transmission line channels. In the transmission line channels with power terminations, a weaker pull-up Ron is implemented. In the transmission line channels with ground terminations, a weaker pull-down Ron is implemented. Drivers implemented in power and/or ground terminated transmission line channels can be used to improve device performance, such as in signal eye opening.Type: ApplicationFiled: June 22, 2017Publication date: October 12, 2017Inventors: Liang Leon ZHANG, Friedel GERFERS, Carl POBANZ, Myoung Joon CHOI, Vivek GURUMOORTHY, Chienhsin LEE
-
Publication number: 20170295043Abstract: Digital video signals are transmitted from a transmitter to a receiver via a digital video interface including shielded twisted pair cables that are surrounded by an over-braid shield. The over-braid shield is connected to a chassis ground at a transmitting end and the receiving end. An interface conveys the received signals to receiver processing circuitry. The interface is connected to an isolated ground, isolating the receiver processing circuitry. The twisted pairs are also connected to the isolated ground, such that a return current is forced back through the twisted pair cable shields rather than the over-braid shield. This reduces electromagnetic emissions and confines transients primarily to the over-braid shield.Type: ApplicationFiled: April 6, 2016Publication date: October 12, 2017Applicant: L-3 COMMUNICATIONS CORPORATIONInventors: Michael G. ABERNATHY, Nathaniel Flournoy LOVELACE, III
-
Publication number: 20170295044Abstract: A PLC modem (131-133) is prompted to increase, starting from a predetermined minimum transmit power, a transmit power of data transmission on a PLC channel (112) at a given time or time period defined with respect to a mutual time reference of a DSL channel (111) and the PLC channel (112). A DSL modem (121) is prompted to measure a signal-to-noise value at the given time or time period defined with respect to the mutual time reference. Mitigation of interference 190 between the PLC channel (112) and the DSL channel (111) becomes possible.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Inventor: Vladimir Oksman
-
Publication number: 20170295045Abstract: A method for simultaneously transmitting data bits and a clock signal includes converting the combination of the data bits and the clock signal to analog voltages by a digital-to-analog converter. The clock signal are the most significant bit of the digital-to-analog conversion and the data bits are the least significant bit of the digital-to-analog conversion.Type: ApplicationFiled: June 27, 2017Publication date: October 12, 2017Inventor: Robert Floyd Payne
-
Publication number: 20170295046Abstract: Provided are a method and a device for controlling transmission power in a wireless communication system. The device conducts an adjustment such that the transmission power of an UL (uplink) signal, with respect to a serving cell in an unlicensed band, does not exceed the maximum PSD (power spectral density) of the unlicensed band.Type: ApplicationFiled: September 14, 2015Publication date: October 12, 2017Applicant: LG ELECTRONICS INC.Inventors: Joonkui AHN, Byounghoon KIM, Hanbyul SEO
-
Publication number: 20170295047Abstract: Methods, systems, and devices for wireless communications are described. A transmitting device may modulate a first binary sequence using binary phase shift keying on a first axis of a complex plane. The device may modulate a second binary sequence using binary phase shift keying on a second plane of a complex axis. The first axis and the second axis may be orthogonal. The device may transmit the first binary sequence and the second binary sequence according to the modulation of the first binary sequence and the second binary sequence.Type: ApplicationFiled: February 10, 2017Publication date: October 12, 2017Inventors: Wei Zeng, Joseph Binamira Soriaga, Tingfang Ji
-
Publication number: 20170295048Abstract: A method for controlling a combined waveform, representing a combination of at least two signals having orthogonal frequency multiplexed signal components, comprising: receiving information defining the at least two signals; transforming the information defining each signal to a representation having orthogonal frequency multiplexed signal components, such that at least one signal has at least two alternate representations of the same information, and combining the transformed information using the at least two alternate representations, in at least two different ways, to define respectively different combinations; analyzing the respectively different combinations with respect to at least one criterion; and outputting a respective combined waveform or information defining the waveform, representing a selected combination of the transformed information from each of the at least two signals selected based on the analysis.Type: ApplicationFiled: June 16, 2017Publication date: October 12, 2017Inventor: John David Terry
-
Publication number: 20170295049Abstract: A communication device maps a plurality of bits to a first set of transmission symbols corresponding to a first set of subcarriers within a component communication channel. Transmission symbols among the first set of transmission symbols correspond to respective subsets of one or more bits, and transmission symbols among the first set of transmission symbols are single carrier transmission symbols. The communication device maps the plurality of bits to a second set of transmission symbols corresponding to a second set of subcarriers within the component communication channel. At least a subset of multiple transmission symbols in the second set of transmission symbols correspond to phase adjusted versions of transmission symbols in a corresponding at least a subset of multiple transmission symbols in the first set of transmission symbols. The communication device generates a transmission signal using the first set of transmission symbols and the second set of transmission symbols.Type: ApplicationFiled: April 12, 2017Publication date: October 12, 2017Inventors: Yakun SUN, Hongyuan ZHANG, Yan ZHANG
-
Publication number: 20170295050Abstract: A method and an apparatus for generating a synchronization signal in the Internet of things. In the method for generating a synchronization signal, subcarrier mapping may be performed by exchanging a signal allocated to an upper subcarrier group and a signal allocated to a lower subcarrier group among all subcarriers allocated for the synchronization signal with each other, in an in-band operation mode or a guard band operation mode of the Internet of things.Type: ApplicationFiled: April 6, 2017Publication date: October 12, 2017Inventors: Kapseok CHANG, Moon-Sik LEE, Ohyun JO
-
Publication number: 20170295051Abstract: A method and an apparatus for receiving broadcast signals thereof are disclosed. The apparatus for receiving broadcast signals, the apparatus comprises a receiver to receive the broadcast signals, a demodulator to demodulate the received broadcast signals by an OFDM (Orthogonal Frequency Division Multiplex) scheme, a frame parser to parse a signal frame from the demodulated broadcast signals, wherein the signal frame includes service data corresponding to each of a plurality of physical paths, a time deinterleaver to time deinterleave service data in each physical path by a TI (Time Interleaving) block, wherein the time deinterleaver further performs inserting at least one virtual FEC block into at least one TI block of the service data, wherein each TI block includes a variable number of FEC blocks of the service data, wherein a number of the at least one virtual FEC block is defined based on a maximum number of FEC blocks of a TI block and a decoder to decode the time deinterleaved service data.Type: ApplicationFiled: February 17, 2017Publication date: October 12, 2017Inventors: Jongseob BAEK, Woosuk KO, Sungryong HONG
-
Publication number: 20170295052Abstract: Embodiments of the present application provide a cache method, the cache method includes: receiving, from the cache core server, information about a Transmission Control Protocol (TCP) flow; determining, according to the information, whether the cache edge server stores content corresponding to the information; sending a migrate-out request to the cache core server based on that the cache edge server stores the content corresponding to the information; receiving a migrate-out response from the cache core server upon the sending of the migrate-out request; performing a TCP connection to user equipment according to the migrate-out response; and reading content corresponding to the connection from storage of the cache edge server according to a byte quantity, sent by the cache core server, of the content, and sending the content to the user equipment.Type: ApplicationFiled: June 25, 2017Publication date: October 12, 2017Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Zanfeng Yang, Tao Song, Xinyu Ge, Pinhua Zhao, Jianzhong Yu, Bo Zhou, Wentao Wang
-
Publication number: 20170295053Abstract: Systems, methods, and computer-readable media for managing nodes through virtual rack management modules. A system can have a first rack that includes a first top-of-rack (ToR) switch and a first group of nodes. The first ToR switch can be connected to the first group of nodes. The system can also have a second rack that includes a second ToR switch and a second group of nodes. The second ToR switch can be connected to the second group of nodes, and the second ToR switch can be connected to the first ToR switch. Furthermore, the system can include a rack management node that executes a hypervisor. The hypervisor can run a first virtual rack management module (vRMM) and a second vRMM. The first vRMM and the second vRMM can manage the first group of nodes and the second group of nodes, respectively.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: Yen-Ping TUNG
-
Publication number: 20170295054Abstract: A method and apparatus for transmitting a report message in a wireless communication system is provided. A user equipment (UE) receives a configuration of measurement, i.e. minimization of drive tests (MDT) configuration, via system information or broadcast/multicast control channel, i.e. multicast control channel (MCCH). If the UE detects a problem for reception of a broadcast/multicast service, the UE immediately transmits a report message.Type: ApplicationFiled: January 29, 2015Publication date: October 12, 2017Applicant: LG ELECTRONICS INC.Inventors: Youngdae LEE, Sunghoon JUNG, Sangwon KIM
-
Publication number: 20170295055Abstract: Aspects of the disclosure provide a network switch having a plurality of physical ports, a detector and a packet processing pipeline. Each of plurality of physical ports is associated with one or more network paths in a transport network to transmit/receive traffic of the network paths. The detector is configured to detect loss of continuity (LOC) on the network paths. The packet processing pipeline is configured to identify first two or more logical interfaces mapped to a first network path, determine second two or more logical interfaces mapped to a second network path that is an alternate network path for the first network path, and use the second two or more logical interfaces in forwarding decisions in response to a detection of LOC on the first network path, such that traffic to the first network path is sent to a physical port associated with the second network path.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Applicant: MARVELL ISTRAEL (M.I.S.L) LTD.Inventor: David MELMAN
-
Publication number: 20170295056Abstract: Techniques for managing configuration of virtual switches in a virtual machine network are disclosed. In an embodiment, a virtual machine network that includes virtual switches is configured to revert back to a saved network configuration if a configuration change causes the connection between the VM management system and a managed node to be lost. For example, before any configuration changes are made, the active configuration is saved. If the new configuration supports a working connection between the managed node and the VM management system, then the saved configuration is no longer needed and can be flushed from memory. If, however, the new configuration causes the managed node to be disconnected from the VM management system, then the system reverts back to the saved configuration that was previously known to work. The saved configuration is used to reestablish the connection so that the network continues to function.Type: ApplicationFiled: June 13, 2017Publication date: October 12, 2017Inventors: Piyush KOTHARI, Mukesh BAPHNA, ChiHsiang SU
-
Publication number: 20170295057Abstract: A system includes at least one hardware processor and a memory storing a plurality of service configurations and a plurality of configuration programs, including a first configuration program, and a first service configuration identifying at least one conditional element and the first configuration program. The system also includes a customization engine configured to receive a REST call from a requesting device, the REST call identifying an IIoT machine, the IIoT machine executing a service exposing a REST-ful API.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Richard Dost, Eric Steele