Patents Issued in November 9, 2017
-
Publication number: 20170324527Abstract: Time tracking in current communication systems may be traditionally based on common reference signals (CRS). However, in certain communication systems, CRS-based time tracking may be impossible to implement due to an absence of CRS in certain subframes or carriers. CRS-based time tracking may also be inappropriate to implement in certain communication systems such as a coordinated multipoint (CoMP) system where control and data may arrive from different cells, and therefore, a UE may assume a wrong cell for CRS-based time tracking. Accordingly, methods, apparatuses, and computer program products for wireless communication are provided in which additional UE specific reference signals (UE-RS) and/or channel state information reference signals (CSI-RS) are made available to the UE so that the UE may have improved channel estimation and/or time tracking performance.Type: ApplicationFiled: October 28, 2015Publication date: November 9, 2017Inventors: Wanshi CHEN, Tao LUO, Yi HUANG, Peter GAAL
-
Publication number: 20170324528Abstract: An apparatus may use inactive uplink portions of a downlink CC to transmit SRS to an eNB. At times there may be a collision between the SRS transmission and uplink transmissions or downlink transmissions on another CC. The apparatus receives a carrier aggregation configuration for a first downlink CC and a second CC, determines to transmit an uplink transmission on the second CC or to receive a downlink transmission on the second CC, determines that the SRS would at least partially collide with the uplink transmission or the downlink transmission, and determines to adjust at least one of the uplink transmission, the SRS transmission, or reception of the downlink transmission based on the determination of the collision and an interruption time to transmit the SRS in the uplink portion of the first CC.Type: ApplicationFiled: April 4, 2017Publication date: November 9, 2017Inventors: Alberto RICO ALVARINO, Wanshi CHEN, Peter GAAL, Jing SUN, Hao XU, Srinivas YERRAMALLI
-
Publication number: 20170324529Abstract: The present invention provides methods for transmitting and receiving a control channel, a base station, and a user equipment. The method for transmitting a control channel includes: determining m PRB pairs used for transmitting a control channel to be transmitted; when a distributed transmission mode is used for transmission, determining an aggregation level L of the control channel to be transmitted; determining, according to the aggregation level L, a first control channel candidate at the aggregation level L; and placing, on physical resources to which the first control channel candidate is mapped, control information of the control channel to be transmitted, and transmitting the control information. The present invention improves multiplexing efficiency of control channels of different modes.Type: ApplicationFiled: April 19, 2017Publication date: November 9, 2017Inventors: Qiang Wu, Chi Gao, Jianqin Liu, Jianghua Liu
-
Publication number: 20170324530Abstract: A method is provided for uplink transmission in a wireless communication system. A user equipment (UE) determines whether to transmit both a physical uplink shared channel (PUSCH) and a sounding reference signal (SRS), or drop the SRS and transmit only the PUSCH but dropping the SRS when the UE determines satisfaction of all of at least three conditions including: a first condition specifying that a plurality of timing advance groups (TAGs) including a first TAG and a second TAG are configured, a second condition specifying that at least one symbol of a subframe n which is used to transmit the SRS toward a first cell belonging to the first TAG is overlapped with a subframe n+1 on which the PUSCH is transmitted toward a second cell belonging to the second TAG and a third condition specifying that a total uplink transmission power exceeds a maximum value.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Applicant: LG ELECTRONICS INC.Inventors: Joon Kui AHN, Suck Chel YANG, Yun Jung YI, Dong Youn SEO
-
Publication number: 20170324531Abstract: The present invention relates to orthogonal frequency-division multiplexing (OFDM) communication systems with four transmit antennas and one or more receive antennas, and in particular to methods for inserting scattered pilots (SPs) into the transmit signals of such OFDM systems, for estimating channel properties on the basis of the scattered pilots, a multi-antenna OFDM transmitter, and an OFDM receiver. In this context, it is the particular approach of the present invention to keep the same SP pattern like in the single-transmitter case, to partition the pilots into as many subsets as there are transmitters (transmit antennas), and to interleave these subsets both in time and in frequency. In this manner, the granularity of pilots of the same subset is reduced. This offers increased flexibility in designing the scattered pilot patterns and greater accuracy of the estimated channel properties.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Inventors: Mihail PETROV, Tomohiro KIMURA, Mikihiro OUCHI
-
Publication number: 20170324532Abstract: Provided are a radio communication terminal apparatus and a radio transmission method by which intersymbol interference of DM-RS of a CoMP terminal and a Non-CoMP terminal can be reduced. A CoMP set setting unit (102) sets the cell IDs of all cells in the CoMP set in a cell selection unit (104), and a serving cell setting unit (103) sets the cell ID of the serving cell in the cell selection unit (104). The cell selection unit (104) selects the cell ID having a number closest to the cell ID of the serving cell from the cells in the CoMP set. A sequence information calculation unit (106) derives a sequence group number from the selected cell ID, and the sequence information calculation unit (106) calculates a sequence number from the derived sequence group number and a transmission bandwidth of the DM-RS.Type: ApplicationFiled: July 27, 2017Publication date: November 9, 2017Inventors: Takashi IWAI, Akihiko NISHIO, Yoshihiko OGAWA, Seigo NAKAO, Masayuki HOSHINO
-
Publication number: 20170324533Abstract: The present invention provides a method and apparatus for performing an uplink Hybrid Automatic Repeat Request (HARQ) operation in an asymmetric multicarrier communication network environment. In one embodiment, a method includes transmitting a HARQ packet to a base station in a transmit time interval of one of a plurality of partitions of an uplink allocation interval on a first carrier by a mobile station. Then, the method includes determining a partition of the uplink allocation interval in which the HARQ packet is transmitted, and determining a HARQ feedback region in the subsequent downlink subframe corresponding to the determined partition. The method further includes receiving HARQ feedback information in the determined HARQ feedback region in the subsequent downlink subframe on a second carrier from the base station.Type: ApplicationFiled: May 22, 2017Publication date: November 9, 2017Inventors: Anshuman Nigam, Anil Agiwal
-
Publication number: 20170324534Abstract: This application provides a method and apparatus for feeding back channel information for an unlicensed band and a communication system, wherein, a method includes: UE determines a subframe for feeding back channel information by UE according to configuration of an eNB; the UE detects whether there exists a predefined reference signal in the subframe for measuring channel quality; and when there exists the predefined reference signal in the subframe for measuring channel quality, the UE reports a channel quality measurement result of the subframe for measuring channel quality at the subframe for feeding back channel information. With the embodiments of this disclosure, errors of CQI measurement and report in using the LTE technology at an unlicensed band may be avoided.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Applicant: FUJITSU LIMITEDInventors: Hua ZHOU, Yi ZHANG, Haibo XU
-
Publication number: 20170324535Abstract: There is provided a method performed by a wireless node for determining when to use full duplex in the wireless node for communicating in a wireless communication network. The method comprises the step of estimating an influence on neighbouring wireless nodes of using full duplex in the wireless node. The method further comprises the step of deciding whether to use full duplex in the wireless node or not, based on the estimated influence.Type: ApplicationFiled: December 17, 2014Publication date: November 9, 2017Inventors: Anders Furuskär, Magnus Frodigh, Erik Dahlman, Mikael Höök, Stefan Parkvall, Claes Tidestav
-
Publication number: 20170324536Abstract: A processing system for simultaneous bidirectional transmissions, the processing system comprising a non-transitory memory storage comprising instructions and one or more processors in communication with the memory, wherein the one or more processors execute the instructions to: determine first transmission time slots for downlink (DL) and uplink (UL) transmissions for a first plurality of user equipment (UEs); assign a DL transmission to a first shared time slot of said first transmission time slots for a first UE in said first plurality of UEs; and assign an UL transmission to said first shared time slot for a second UE in said first plurality of UEs.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Inventors: Keyvan Zarifi, Mohammadhadi Baligh, Jianglei Ma
-
Publication number: 20170324537Abstract: A method for optimizing data communications includes receiving a plurality of data and comparing a size of the plurality of data to a preset fixed data packet size. The method also includes transmitting the plurality of data within the preset fixed data packet size in response to the size of the plurality of data corresponding to the preset fixed data packet size. The method additionally include dynamically, autonomously adjusting a clock frequency for formatting data packets to format one or more data packets that accommodate the size of the plurality of data with minimal fill data in response to the size of the plurality of data being different from the preset fixed data packet size. The method further includes formatting the one or more data packets in response to dynamically, autonomously adjusting the clock frequency.Type: ApplicationFiled: May 3, 2016Publication date: November 9, 2017Inventors: Amir L. Liaghati, Mahsa L. Liaghati, Chen Jye Chang
-
Publication number: 20170324538Abstract: An apparatus comprises: a first clock; a receiver configured to: receive a first packet via a first channel corresponding to a first wavelength, and receive a third packet via a third channel corresponding to a third wavelength; and a processor coupled to the receiver and configured to: implement channel bonding using the first channel and the third channel, synchronize the first clock based on the first packet, and calculate a channel skew between the first channel and the third channel based on the first clock.Type: ApplicationFiled: April 27, 2017Publication date: November 9, 2017Inventors: Frank Effenberger, Duane Remein
-
Publication number: 20170324539Abstract: The present application relates to an optical communication transmitting apparatus and receiving apparatus. The optical communication transmitting apparatus includes: an encoder, configured to encode and shunt an input signal, to generate multiple synchronous encoded signals; a driver, configured to amplify the multiple encoded signals, to generate multiple drive signals; and multiple light sources, configured to generate multiple synchronous optical signals when driven by the multiple drive signals. The optical communication transmitting apparatus and receiving apparatus provided in the present application make full use of advantages of visible light communication, achieving a rapid communication speed and high security.Type: ApplicationFiled: July 27, 2017Publication date: November 9, 2017Applicant: KUANG-CHI INTELLIGENT PHOTONIC TECHNOLOGY LTD.Inventors: Ruopeng LIU, Weizi HUANG, Weicheng XU, Linyong FAN, Zhiwei PAN
-
Publication number: 20170324540Abstract: A serializer may be provided. The serializer may include a first data output circuit and a second data output circuit. The first data output circuit may provide first data to an output node in synchronization with a first phase clock and a second phase clock. The second data output circuit may provide second data to the output node in synchronization with the second phase clock and a third phase clock. The first data output circuit may perform a precharge operation or an emphasis operation for the second data output circuit, in synchronization with a third phase clock.Type: ApplicationFiled: September 29, 2016Publication date: November 9, 2017Inventor: Hae Kang JUNG
-
Publication number: 20170324541Abstract: Disclosed are a method for acquiring synchronization in a cable network, and a physical (PHY) transmitter and PHY receiver. The method for acquiring synchronization in a cable network according to an embodiment includes receiving, by a PHY receiver, a signal from a PHY transmitter, and acquiring, by the PHY receiver, channel synchronization when a symbol in which a channel preamble exists is detected from the received signal and a position of a frequency in which a channel subcarrier exists is detected from the detected symbol by performing a cross correlation operation on the received signal and the channel preamble.Type: ApplicationFiled: February 24, 2017Publication date: November 9, 2017Applicant: Electronics and Telecommunications Research InstituteInventors: Jae Hwui BAE, Sang Jung RA, Jin Hyuk SONG, Dong Joon CHOI, Nam Ho HUR
-
Publication number: 20170324542Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon that is white-box-masked by a function f The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. The affine mapping A is constructed by a construction method coordinated with the invertible mappings c1, c2, and etc.Type: ApplicationFiled: October 30, 2015Publication date: November 9, 2017Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
-
Publication number: 20170324543Abstract: The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping A, which is so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.Type: ApplicationFiled: October 30, 2015Publication date: November 9, 2017Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
-
Publication number: 20170324544Abstract: An electronic calculating device (100) for performing obfuscated arithmetic in a commutative ring (Zn; Zn[x]/f(x)) is presented. The calculating device comprising a storage (110) arranged to store an increment table (T) defined for an increment ring element (1; ut), the increment table mapping an input ring element (k=uk1?uk2) to an output integer-list (T((k1,k2))=(l1, l2)) encoding an output ring element (I=ul1?ul2), such that the output ring element equals the increment ring element ring-added to the input ring element (I=k+1). Using the increment table, a ring addition unit (130) adds a first addition-input integer-list ((a1, a2)) encoding a first addition-input ring element and a second addition-input integer list ((b1, b2)) encoding a second addition-input ring element. The device may comprise a ring multiplication unit (140) also using the increment table.Type: ApplicationFiled: November 25, 2015Publication date: November 9, 2017Inventors: LEANDRO MARIN, ALPHONS ANTONIUS MARIA LAMBERTUS BRUEKERS, PAULUS MATHIAS HUBERTUS MECHTILDIS ANTONIUS GORISSEN
-
Publication number: 20170324545Abstract: In a computer-implemented method for signing a message by a user device of a public key infrastructure (PKI) system, the message and a user public key are sent to at least one attestation server and a server signature on the message is received from the attestation server. The server signature attests the validity of the user public key and is bound to the user public key and the message. The message and the server signature are signed with a user private key, thereby providing a user signature on the message. An attestation server and a related computer program product are also provided.Type: ApplicationFiled: May 4, 2016Publication date: November 9, 2017Inventors: Marcus Brandenburger, Franz-Stefan Preiss, Kai Samelin, Dieter M. Sommer
-
Publication number: 20170324546Abstract: An electronic generation device (100) arranged to generate parameters for digital obfuscated arithmetic is provided. The generation device includes a prime number unit (110) arranged to generate a prime modulus (p) a base element unit (120) arranged to generate a prime modulus and a base element such that each ring-element modulo the prime modulus may be expressed as a difference between two powers of the potential base element.Type: ApplicationFiled: December 11, 2015Publication date: November 9, 2017Applicant: KONINKLIJKE PHILIPS N.V.Inventors: LEANDRO MARIN, ALPHONS ANTONIUS MARIA LAMBERTUS BRUEKERS, PAULUS MATHIAS HUBERTUS MECHTILDUS GORISSEN
-
Publication number: 20170324547Abstract: Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise while processing the machine commands of the white-box implementation stepwise; (c) repeating the steps (a) and (b) with a further plaintext of the plurality of plaintexts N-times; and (d) statistically evaluating the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts by searching for correlations between the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts to establish the secret key.Type: ApplicationFiled: November 9, 2015Publication date: November 9, 2017Applicant: GIESECKE & DEVRIENT GMBHInventors: Hermann DREXLER, Sven BAUER
-
Publication number: 20170324548Abstract: Systems and methods for producing shared secret data are generally described. A first device may receive a public key from a second device. The public key may be based on a first secret element. The first device may generate a first ephemeral private key based on a second secret element, and may generate a second ephemeral private key based on a third secret element. The first device may generate a first element based on the public key and the first ephemeral private key, and may generate a second element based on the public key and the second ephemeral private key. The second element may relate to the shared secret data. The first device may generate a session public key based on the first element, the second secret element, and the third secret element. The shared secret data may be derivable, by the second device, from the session public key.Type: ApplicationFiled: May 3, 2017Publication date: November 9, 2017Applicant: SECURERF CORPORATIONInventors: Iris Anshel, Dorian Goldfeld
-
Publication number: 20170324549Abstract: Computing readable media, apparatuses, and methods for secure time of flight measurements are disclosed. An apparatus comprising processing circuitry is disclosed. The processing circuitry configured to encode a fine time measurement (FTM) request. The processing circuitry further configured to decode a FTM response from the responder, where the FTM response is to be received at the wireless device at a time t2, and generate a symmetric key from a private encryption key of the wireless device and the public encryption key of the responder. The processing circuitry further configured to transmit an acknowledgement to the FTM response, the acknowledgement is transmitted at time t3, and decode an encrypted FTM frame from the responder with the symmetric key, the decrypted FTM message comprising a time t1 when the FTM response was to be transmitted and a time t4 when the acknowledgement to the FTM response was to be received.Type: ApplicationFiled: September 26, 2016Publication date: November 9, 2017Inventors: Benny Abramovsky, Gaby Prechner, Elad Eyal
-
Publication number: 20170324550Abstract: One embodiment of the present invention provides a system for facilitating storage encryption and decryption. During operation, the system receives a first request to encrypt data which is to be stored on a remote device, wherein the first request indicates the data. The system updates a key based on a dynamic key refreshment protocol. The system determines a key label for the updated key. The system encrypts the data based on the updated key, and transmits the encrypted data and the key label to the remote device, thereby facilitating secure encryption and decryption of data on the remote device.Type: ApplicationFiled: April 6, 2017Publication date: November 9, 2017Applicant: Alibaba Group Holding LimitedInventors: Peng Yuan, Zhiqiang Wang
-
Publication number: 20170324551Abstract: Disclosed herein are technologies regarding a communication device and server which are capable of cryptographic communication based on quantum cryptography. A communication device for quantum cryptography authentication includes: an optical communication unit configured to receive a series of first quantum signals generated by passing through a first quantum filter of the communication device; a quantum signal generation unit configured to generate the first quantum signals by setting up the first quantum filter in a reception path for a series of second quantum signals generated and sent by a server; and a processor configured to select the setup of the first quantum filter based on a series of randomly generated first quantum states, and to control the quantum signal generation unit to generate the first quantum signals by using the first quantum filter.Type: ApplicationFiled: July 20, 2017Publication date: November 9, 2017Inventor: Do Yeol Ahn
-
Publication number: 20170324552Abstract: Disclosed herein are technologies regarding a communication device and server which are capable of cryptographic communication based on quantum cryptography. The communication device includes: a quantum signal generation unit configured to generate a series of first quantum signals by using a first quantum filter; an optical transmission unit configured to send the series of first quantum signals to a server; and a processor configured to select the first quantum filter based on a series of randomly generated first quantum states, and to control the quantum signal generation unit to generate the series of first quantum signals by using the first quantum filter.Type: ApplicationFiled: July 20, 2017Publication date: November 9, 2017Inventor: Do Yeol Ahn
-
Publication number: 20170324553Abstract: Disclosed herein are a quantum cryptography-based cryptographic communication system and an authentication, payment and transaction system via a relay device between a communication device and a server. A relay device for quantum cryptography authentication includes an optical receiver unit, an optical transmission unit, and a processor. The processor includes a quantum signal control unit, a user authentication unit, and a random number generation unit. The optical receiver unit receives a series of second quantum signals generated in such a manner that a series of first quantum signals generated by a first quantum filter and sent from a communication device pass through the second quantum filter of the relay device or a reception side, and the optical transmission unit transfers the series of second quantum signals to a server.Type: ApplicationFiled: July 20, 2017Publication date: November 9, 2017Inventor: Do Yeol Ahn
-
Publication number: 20170324554Abstract: A post-quantum, public key cryptosystem is described which is polynomial based and where the private key polynomial has coefficients from a sub-set of Galois field elements and plain text message polynomials have coefficients from a second sub-set of Galois field elements. The public key polynomial is constructed using the inverse of the private key polynomial and a randomly chosen polynomial having coefficients chosen from a third sub-set of Galois field elements. Cipher texts are constructed using the public key and randomly chosen session key polynomials. Other more complicated embodiments are described. For implementation a small prime base field such as 2, 3 or 5 will usually be used in constructing the prime power Galois field. The system has the advantage of relatively small public key sizes.Type: ApplicationFiled: May 5, 2017Publication date: November 9, 2017Inventors: Martin Tomlinson, Cen Jung Tjhai
-
Publication number: 20170324555Abstract: The present system and method allow for preemptive, self-healing computer security. The system includes a user device processor and a PSS server processor. The two processors perform an initial Data Structure & Key Mutation (DSKM) method and an interval DSKM method at a given interval to protect secret information and prevent its exposure by attackers. When a user requests a site or service that is an attractive target for attackers, such as a bank site or monetary transfer service, the processors perform a Man in the Browser attack prevention method. When a packet is received or generated, the processors perform a Deep Protocol and Stateful Inspection and Prevention method to prevent receipt of malicious packets or the loss of sensitive information. Various forensics modules allow accurate forensic examination of the type, scope, and method of attack, as well as real-time protection of cloud-based services.Type: ApplicationFiled: May 5, 2017Publication date: November 9, 2017Applicant: Auburn UniversityInventors: Chwan-Hwa Wu, J. David Irwin, Daoqi Hou
-
Publication number: 20170324556Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.Type: ApplicationFiled: May 3, 2016Publication date: November 9, 2017Inventor: Daniel Richard L. BROWN
-
Publication number: 20170324557Abstract: An information processing apparatus includes a shared information generation unit for generating shared information via a network, a communication unit configured to receive a message, a shared information verification unit configured to compare shared information in the message with the information generated by the shared information generation unit, and verify validity of the shared information in the message based on the comparison, a security code generation unit for generating a security code based on the shared information, a security code verification unit configured to compare a security code in the message with the security code generated by the security code generation unit, and verify correctness of the shared information in the message based on the comparison, and a processing determination control unit configured to determine normality of the message on the based on the verification by the shared information verification unit and the verification by the security code verification unit.Type: ApplicationFiled: November 11, 2015Publication date: November 9, 2017Applicant: HITACHI AUTOMOTIVE SYSTEMS, LTD.Inventors: Nobuyoshi MORITA, Keisuke HAKUTA, Toru OWADA
-
Publication number: 20170324558Abstract: An automobile is equipped with a management device including a communication part for communicating with an ECU mounted on an automobile, an encryption processor for generating an encrypted key by encrypting a key, a key generation part for generating the key, and a key storage unit for storing the key generated by the key generation part. The communication part transmits the encrypted key to the ECU, while the encryption processor encrypts the key generated by the key generation part.Type: ApplicationFiled: December 14, 2015Publication date: November 9, 2017Applicant: KDDI CORPORATIONInventors: Keisuke TAKEMORI, Hideaki KAWABATA
-
Publication number: 20170324559Abstract: To automate establishment of an ad hoc connection between a user apparatus and a device, username-password pairs and identifying information-code pairs are maintained in a database server, and the user apparatus sends an inquiry comprising identifying information of the device and a username and a password of a user of the user apparatus, and receives in a response a code for establishing the ad hoc connection.Type: ApplicationFiled: May 9, 2017Publication date: November 9, 2017Inventors: Zhongliang Hu, Teemu Tanila, Mikko Kohvakka
-
Publication number: 20170324560Abstract: A method and a server for providing transaction keys for a transaction system includes transaction units which use pre-delivered transaction keys, and are provided by a key provisioning server and wherein the transaction key usage is checked by a transaction checking server. A transaction key is derived from a master key of a transaction unit, wherein a varying derivation parameter is used in the step of deriving. The step of deriving comprises a first sub step of deriving a key from the master key and a second sub step of deriving the transaction key from the derived key. The first sub step or the second sub step of deriving is performed dependent on a security level of the transaction unit.Type: ApplicationFiled: November 9, 2015Publication date: November 9, 2017Inventors: Lauri PESONEN, Ulrich WEINERT, Jarmo Mikael KAIKKONEN, Jay GRAVER
-
Publication number: 20170324561Abstract: To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token is received. A certificate with a public key and a private key is created and the public key is sent to the application. An application token that is encrypted using the public key is received from the application. The application token is unencrypted using the private key and compared to the client token. In response to the unencrypted application token matching the client token, an approval message is sent to the client to establish the communication session. The application can then establish a secure communication session with the client.Type: ApplicationFiled: May 4, 2016Publication date: November 9, 2017Inventor: Rifaat Shekh-Yusef
-
Publication number: 20170324562Abstract: Examples include sending and receiving recovery agents and recovery plans over networks. Some examples include receiving a recovery request over a network from a requestor, sending a response to the requestor over the network, sending an executable copy of a recovery agent with a validation measure to the requestor, establishing an encrypted connection with the requestor, receiving a second request from the requester over the encrypted connection, determining a recovery plan that includes a command executable by the recovery agent, and sending the recovery plan to the requester over the encrypted connection. In some examples, the recovery request includes data that identifies the requester and the response and the recovery plan are based on the data identifying the requester.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventor: Thomas M. Laffey
-
Publication number: 20170324563Abstract: In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.Type: ApplicationFiled: October 26, 2015Publication date: November 9, 2017Applicants: NEC CORPORATIONInventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI, Satoshi OBANA
-
Publication number: 20170324564Abstract: Systems and methods are described that enable trusted communications between two entities. In one implementation, a server for communicating with a device may include one or more processors configured to receive data and a device signature from the device. The device signature may be generated based on at least a first portion of the data. One or more processors may be further configured to transmit the data and the device signature to a second server and receive a second server signature from the second server. The second server signature may be generated based on at least a second portion of the data and transmitted to the server after the second server verified the device signature. Further, one or more processors may be configured to verify the second server signature and process the data.Type: ApplicationFiled: May 5, 2017Publication date: November 9, 2017Inventor: Brian R. Knopf
-
Publication number: 20170324565Abstract: Systems, methods, and software can be used to access an enterprise resource. In some aspects, configuration information for an enterprise application is received at an enterprise mobility management (EMM) client on a mobile device. A certificate that includes at least a portion of the configuration information is generated. The certificate is installed in an enterprise workspace on the mobile device. A configuration application is executed in the enterprise workspace on the mobile device to configure the enterprise application.Type: ApplicationFiled: May 6, 2016Publication date: November 9, 2017Applicant: BlackBerry LimitedInventor: Balasubrahmanyam GATTU
-
Publication number: 20170324566Abstract: The present technology relates to the field of configuration and setup of encrypted computer network transmission systems. In particular, the present technology relates to setting up and configuring network encryption systems, including MACsec, Internet Protocol Security (IPsec), and TLS protocols, in heterogeneous networks over Wireless Area Networks (WAN), Wireless Local Area Network (WLAN) or cellular links. In some embodiments, the present technology includes a method for setting up, configuring, and monitoring of encryption equipment providing encrypted links over WAN connections (typically IPsec VPN gateways and clients or TLS applications). The method includes communicating with encryption and PKI equipment necessary to automate the generation of encryption keys, digital certificates, and digital certificate signing requests.Type: ApplicationFiled: December 5, 2016Publication date: November 9, 2017Inventors: Charles Nobuo Kawasaki, Rodney James Snell, Bryan Kelly Armstrong
-
Publication number: 20170324567Abstract: A signature verification device includes a communicator that receives a second server certificate including a second public key and receives signature data which is generated by encrypting a hash value derived from the second server certificate using a secret key forming a key pair with the first public key, a signature processor that decrypts the signature data by using the first public key stored in the storage to acquire a first hash value, a unidirectional function deriver that derives a second hash value from the second server certificate, and a signature verifier that determines a signature generation device generating the signature data to be correct in a case of the first hash value and the second hash value matching. Decrease of accuracy of signature verification is reduced with reduced cost and secured security.Type: ApplicationFiled: December 4, 2015Publication date: November 9, 2017Applicant: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LT D.Inventor: Masakatsu MATSUO
-
Publication number: 20170324568Abstract: An escrow platform is described that can be used to enable access to devices. The escrow platform can be used to sign cryptographic network protocol challenges on behalf of clients so that the secrets used to sign cryptographic network protocol challenges do not have to be exposed to the clients. The escrow platform can store or control access to private keys, and the corresponding public keys can be stored on respective target platforms. A client can attempt to access a target platform and in response the target platform can issue a challenge. The client platform can send the challenge to the escrow platform, which can use the corresponding private key to sign the challenge. The signed challenge can be sent back to the client, which can forward it to the target platform. The target platform can verify the expected private key and grant access.Type: ApplicationFiled: July 17, 2017Publication date: November 9, 2017Applicant: Amazon Technologies, Inc.Inventors: Gregory Branchek Roth, Graeme David Baer
-
Publication number: 20170324569Abstract: At least one method, apparatus and system disclosed involves providing a restricted access protocol for accessing a memory device. A first memory portion of a memory device is selected for providing an access confirmation. At least one of setting or resetting of memory cells of the first memory portion is performed. A first voltage is provided for switching the memory cells. The first voltage is associated with a predetermined switching probability. A first input signal comprising at least one address associated with the memory cells is provided. A first responsive signal is received in response to the input signal. The first responsive signal comprises data relating to the state of the memory cells. An access key is provided for the access confirmation based upon a relationship between the first input signal and the first responsive signals for providing an access key.Type: ApplicationFiled: July 18, 2017Publication date: November 9, 2017Applicant: GLOBALFOUNDRIES INC.Inventor: AN CHEN
-
Publication number: 20170324570Abstract: Embodiments of the present disclosure relate to the field of computer and Internet technologies, and disclose a group management method, apparatus, and system. The method includes: obtaining an interface address corresponding to a group management operation; generating an interface call request carrying the interface address, the interface call request being used to call a group management interface provided by an open platform server, and the group management interface being used to perform a group management operation on a follower account following a target user account; and sending the interface call request to the open platform server. By means of group management, the follower account is properly and effectively managed, and moreover it is convenient for a user account operator to develop and implement services such as a group bulk messaging service.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Inventors: HAO CHEN, MAOWEI YANG
-
Publication number: 20170324571Abstract: The present disclosure relates to a Multimedia Broadcast Multicast Service (MBMS), and in particular to a method, system and network entity for configuring transmission parameters for providing MBMS service(s). In one embodiment, a network entity in communication with a plurality of network nodes within a geographical area is provided. The network entity includes a communication interface configured to receive a representation of signal quality measurement data associated with a plurality of non-Multimedia Broadcast Multicast Service, non-MBMS, user equipments, UEs. Each UE is served by at least one of the plurality network nodes. The network entity includes a processor communicatively coupled to the communication interface. The processor is configured to determine a combined signal quality data of a plurality of MBMS UEs based at least in part on the received representation of signal quality measurement data associated with the plurality of non-MBMS UEs.Type: ApplicationFiled: November 21, 2014Publication date: November 9, 2017Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Chandra Sekhar BONTU, Prabaharan KANESALINGAM
-
Publication number: 20170324572Abstract: Examples disclosed herein relate to a conference call host. Examples include to establishing, by a first computing system, a first secure connection to a second computing system via a wireless network in response to receiving a secure connection request from the second computing system; the first computing system and the second computing system are in physical proximity to each other. Examples include to provide an operating system session to the second computing system through the secure connection while the first computing system and the second computing system remain in physical proximity to each other; the operating system is stored on and executable by the first computing system. Examples include to provide a connection to a conferencing platform to the second computing system via the first secure connection, the conference call at least among the first computing system, the second computing system, and a remote user.Type: ApplicationFiled: December 17, 2014Publication date: November 9, 2017Inventors: Kent E Biggs, Yolanda Rivas, Robert C Brooks, Richard E Hodges, Harold Merkel, James M Mann, Lorri L Jefferson, Derek Labron Everett, Thomas Bonola
-
Publication number: 20170324573Abstract: An information presentation method for resolving the problem of low sharing efficiency of a file operation process between a local user and a remote user in a teleconference process. The method mainly includes: obtaining screen projection information of a local terminal, wherein the screen projection information is information currently displayed on a display screen of the local terminal; and combining the screen projection information and multimedia information collected by an information collection device into a data stream, and then sending the data stream to a receiving end for presentation. The present disclosure also provides an information presentation apparatus and system.Type: ApplicationFiled: July 25, 2017Publication date: November 9, 2017Inventor: Jun Peng
-
Publication number: 20170324574Abstract: AT commands are used for controlling Mobile Termination (MT) functions and GSM/UMTS network services from a Terminal Equipment (TE) through Terminal Adaptor (TA). Application specific access control is an application/service specific access control mechanism for the operator to allow/prevent new access attempts from particular, operator-identified applications/services in the UE in idle mode. However, a TE does not always know the applicability of application specific access control. In accordance with one novel aspect, a new AT command interface that can report application specific access control status to the TE is proposed. It reduces wasteful signaling overhead by retries from the TE. Through the new AT command interface, the TE can query application specific access control status. Via unsolicited result code (URC), the MT can detect application specific access control applicability status change and report updated status to the TE.Type: ApplicationFiled: May 2, 2017Publication date: November 9, 2017Inventors: Chien-Chun Huang-Fu, Yu-Tien Yeh, Cheng-Hsiao Ko
-
Publication number: 20170324575Abstract: Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string. The node traverses the bit string and selects an entry in a bit indexed forwarding table (BIFT). The entry includes a forwarding bit mask. Based on the forwarding bit mask and the bit string, the node forwards the packet.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Inventors: Ijsbrand Wijnands, Gregory J. Shepherd, John H.W. Bettink
-
Publication number: 20170324576Abstract: A master module includes a processor and a memory. The memory includes executable code that, when executed by the processor: provides a number of computational resources to a number of device modules. The device modules are vendor-sourced device modules. The vendors are entities that provide services associated with an internet-of-things device.Type: ApplicationFiled: July 28, 2014Publication date: November 9, 2017Inventors: Alok Jain, Niraj Agrawal