Patents Issued in December 7, 2017
  • Publication number: 20170353267
    Abstract: Certain aspects of the present disclosure relate to techniques and apparatus for improving decoding latency and performance of Polar codes. An exemplary method generally includes generating a codeword by encoding information bits using a first code of length K to obtain bits for transmission via K channels, wherein the first code comprises a polar code, further encoding the bits in each of the K channels using a second code of length M, and transmitting the codeword.
    Type: Application
    Filed: December 30, 2016
    Publication date: December 7, 2017
    Inventors: Shrinivas KUDEKAR, Thomas Joseph RICHARDSON
  • Publication number: 20170353268
    Abstract: The present invention relates to an optical transceiver using FEC, an optical transceiving system comprising the same, and a remote optical wavelength control method and, specifically, to an optical transceiver using FEC, the optical transceiver comprising: a laser diode driver (LDD) for driving a laser diode (LD) for outputting light; a transmitter optical sub-assembly (TOSA) for transmitting an optical signal received from the LD driver; a receiver optical sub-assembly (ROSA) for receiving the optical signal from the transmitter optical sub-assembly; a micro controller unit (MCU) for controlling the transmitter optical sub-assembly and the receiver optical sub-assembly and analyzing the optical signal; and a forward error correction (FEC) which is controlled by the micro controller unit and generates the optical signal by including, in an overhead excess data frame, control or monitoring request information of a subscriber-side base station.
    Type: Application
    Filed: December 11, 2015
    Publication date: December 7, 2017
    Inventors: Kang-Yong JUNG, Jeong-Hwan CHO, Soo YUK, Young Jae NAM
  • Publication number: 20170353269
    Abstract: Certain aspects of the present disclosure relate to techniques and apparatus for increasing decoding performance and/or reducing decoding complexity. An exemplary method generally includes obtaining a payload to be transmitted, partitioning the payload into a plurality of payload sections, deriving redundancy check information for each respective payload section of the plurality of payload sections, merging the redundancy check information for each payload section with the plurality of payload sections to form a sequence of bits, and generating a codeword by encoding the sequence of bits using an encoder. Other aspects, embodiments, and features are also claimed and described.
    Type: Application
    Filed: May 26, 2017
    Publication date: December 7, 2017
    Inventors: Jamie Menjay LIN, Yang YANG, Joseph Binamira SORIAGA
  • Publication number: 20170353270
    Abstract: A particular overall architecture for transmission over a bonded channel system consisting of two interconnected MoCA (Multimedia over Coax Alliance) 2.0 SoCs (Systems on a Chip) and a method and apparatus for the case of a “bonded” channel network. With a bonded channel network, the data is divided into two segments, the first of which is transported over a primary channel and the second of which is transported over a secondary channel.
    Type: Application
    Filed: June 26, 2017
    Publication date: December 7, 2017
    Inventors: David Barr, Michail Tsatsanis, Arndt Mueller, Na Chen
  • Publication number: 20170353271
    Abstract: Certain aspects of the present disclosure relate to techniques and apparatus for improving decoding latency and performance of Polar codes. An exemplary method generally includes generating a codeword by encoding information bits, using a multi-dimensional interpretation of a polar code of length N, determining, based on one or more criteria, a plurality of locations within the codeword to insert error correction codes generating the error correction codes based on corresponding portions of the information bits, inserting the error correction codes at the determined plurality of locations, and transmitting the codeword. Other aspects, embodiments, and features are also claimed and described.
    Type: Application
    Filed: December 30, 2016
    Publication date: December 7, 2017
    Inventors: Shrinivas KUDEKAR, Thomas Joseph RICHARDSON
  • Publication number: 20170353272
    Abstract: The present invention is designed so that the efficiency of use of UL resources is prevented from decreasing even when the band to use is limited to partial narrow bands in the system band. According to one aspect of the present invention, a user terminal, in which the band to use is limited to partial narrow bands in the system band, has a receiving section that receives downlink control information that relates to a resource to allocate to a PDSCH (Physical Downlink Shared Channel), in an EPDCCH (Enhanced Physical Downlink Control Channel), and receives the PDSCH based on the downlink control information, a transmission section that transmits a PUCCH (Physical Uplink Control Channel) in response to the PDSCH, and a control section that controls a PUCCH resource based on a PRB (Physical Resource Block) index that corresponds to the PDSCH.
    Type: Application
    Filed: October 21, 2015
    Publication date: December 7, 2017
    Applicant: NTT DOCOMO, INC.
    Inventors: Kazuaki Takeda, Shimpei Yasukawa, Kazuki Takeda, Satoshi Nagata
  • Publication number: 20170353273
    Abstract: A method, an apparatus, and a computer-readable medium for wireless communication are provided. In one configuration, the apparatus may be a UE. The UE receives PTM data from a base station. The UE attempts to decode the PTM data based on an identifier. The UE determines whether to transmit feedback information to the base station based on the attempt to decode the PTM data. In another configuration, the apparatus may be a base station. The base station transmits PTM data to a UE. The base station retransmits the PTM data to the UE based on feedback information associated with the transmitted PTM data.
    Type: Application
    Filed: December 30, 2015
    Publication date: December 7, 2017
    Inventors: Xiaoxia ZHANG, Peter GAAL, Xipeng ZHU, Jun WANG
  • Publication number: 20170353274
    Abstract: A communication apparatus comprises: a controller, a sender and a receiver. The controller determines, among data units provided with reference numbers, a first group that includes data units to be sent to another communication apparatus. The sender sends the data units to another communication apparatus. The receiver receives, from another communication apparatus, information that indicates a reception situation regarding the data units. The sender execute a re-sending process of the data unit corresponding to the reception error when the reception situation indicates a reception error The controller either prevent the sender from sending a data unit in a second group when the sender is executing the re-sending process or stop the re-sending process when the receiver receives a report of arrival of the data unit corresponding to the reception error from the another communication apparatus while the sender is executing the re-sending process.
    Type: Application
    Filed: May 2, 2017
    Publication date: December 7, 2017
    Applicant: NEC Corporation
    Inventor: Masahiro Komatsu
  • Publication number: 20170353275
    Abstract: The present invention relates to an apparatus and method for controlling an uplink (UL) scheduling and Hybrid Automatic Repeat reQuest (HARQ) timing supported in a TDD-FDD CA environment. According to aspects of the present invention, in a TDD-FDD carrier aggregation deployment environment, an efficient UL scheduling/HARQ operation may be performed for a UE in which a cross-carrier scheduling is configured.
    Type: Application
    Filed: August 25, 2017
    Publication date: December 7, 2017
    Inventor: Jungkil Nam
  • Publication number: 20170353276
    Abstract: Embodiments are provided for WLAN Orthogonal Frequency Division Multiple Access (OFDMA) design of subcarrier groups and corresponding frame format. An embodiment method includes grouping a plurality of subcarriers for OFDMA transmissions into a plurality of subcarrier groups in accordance with a pre-defined grouping structure for subcarriers. The method further includes allocating the subcarrier groups to a plurality of corresponding users, and signaling, to the users, a map of the subcarrier groups to the corresponding users. According to the pre-defined grouping structure, each one of the subcarrier groups includes a plurality of consecutive subcarriers, a plurality of non-consecutive subcarriers, or a combination of consecutive and non-consecutive subcarriers according to a deterministic structure.
    Type: Application
    Filed: August 24, 2017
    Publication date: December 7, 2017
    Inventors: Osama Aboul-Magd, Jung Hoon Suh, Kwok Shum Au
  • Publication number: 20170353277
    Abstract: A method is provided for assisting data transmission on a first carrier by indicating a termination point of data transmission in a transmitting device and apparatus thereof, wherein the method comprises the steps of: A. transmitting data on the carrier to a receiving device in a first subframe; and B. transmitting downlink control information to the receiving device; wherein the downlink control information includes a termination point indication for indicating a termination point of the data in the first subframe. The method and apparatus could improve the utilization of subframe and transmission capacity, and enable LTE to satisfy the regulations for unlicensed operation with high spectral efficiency.
    Type: Application
    Filed: November 7, 2014
    Publication date: December 7, 2017
    Applicant: Alcatel Lucent
    Inventors: Matthew P.J. BAKER, Sigen YE, Teck HU, Shin Horng WONG, Feng HAN, Mohammed R. KHAWER
  • Publication number: 20170353278
    Abstract: Techniques are described for wireless communication. In one method, a positioning reference signal (PRS) may be generated. The PRS may be configured in at least one downlink subframe among a plurality of downlink subframes. The PRS may be transmitted in the at least one downlink subframe using an unlicensed radio frequency spectrum band.
    Type: Application
    Filed: August 23, 2017
    Publication date: December 7, 2017
    Inventors: Shimman Arvind Patel, Wanshi Chen, Tao Luo
  • Publication number: 20170353279
    Abstract: The present invention relates to methods and apparatus in a RBS and a UE for reference signal (RS) measurements in an OFDM system, that enable having a configurable RS transmission bandwidth which is smaller than the system bandwidth. This allows for better interference coordination of RS, which in turn improves the UE RS measurements used for different services such as positioning. The RBS retrieves the RS transmission bandwidth, determines a RS measurement bandwidth based on this RS transmission bandwidth, and transmits the determined bandwidth to the UE. The UE receives the RS measurement bandwidth and measures the RS in a bandwidth determined based on the received measurement bandwidth and the UE capability.
    Type: Application
    Filed: August 25, 2017
    Publication date: December 7, 2017
    Inventors: Iana Siomina, Dirk Gerstenberger, Daniel Larsson
  • Publication number: 20170353280
    Abstract: The present disclosure relates to an apparatus and a method for transmitting muting information in a wireless communication system, and to an apparatus and a method for acquiring channel state using same. In an exemplary embodiment, muting information includes: a first data field, having a serving cell for receiving from peripheral cells in a multi-cell environment, at least one of a CSI-RS pattern, the number of CSI-RS antenna ports, a CSI-RS duty cycle, and CSI-RS transmission subframe offset information, and using same for expressing the cycle and the offset of muting subframes, which pertain to information on a resource block that can generate interference between the peripheral cells and CSI-RS; and a second data field for to expressing a specific muting pattern, which must be muted within the muting subframes, having either 12 bits or 28 bits that display muting application in a bitmap format.
    Type: Application
    Filed: August 22, 2017
    Publication date: December 7, 2017
    Inventors: Sungjun YOON, Kyoungmin PARK, Sungjin SUH
  • Publication number: 20170353281
    Abstract: Methods and apparatus to enable an extensible and scalable control channel for wireless networks. In one embodiment, an Enhanced Physical Downlink Control Channel (ePDCCH) is disclosed that is implemented with a flexible number of Physical Resource Blocks (PRBs). Advantages of the ePDCCH include, for example: more efficient spectral utilization, better frequency management across multiple serving entities (e.g., base stations and remote radio heads), and extensible payload capabilities that can scale to accommodate higher or lower control information payloads, as compared to prior art PDCCH solutions.
    Type: Application
    Filed: July 7, 2017
    Publication date: December 7, 2017
    Inventor: Sassan Ahmadi
  • Publication number: 20170353282
    Abstract: A method for channel measurement based on a channel state information (CSI)-reference signal (RS) in a wireless communication system including receiving, by a terminal, CSI-RS resource configuration information through higher layer signaling and receiving, by the terminal, the CSI-RS according to the CSI-RS resource configuration information; wherein the CSI-RS resource configuration information includes information on one or more cell specific-RS (CRS) antenna ports assumed to be quasi-co-located with one or more antenna ports used to transmit the CSI-RS, and deriving, by the terminal, CSI based on the CSI-RS using the information on the one or more CRS antenna ports.
    Type: Application
    Filed: August 24, 2017
    Publication date: December 7, 2017
    Applicant: LG ELECTRONICS INC.
    Inventors: Jonghyun PARK, Illsoo SOHN, Kijun KIM, Hanbyul SEO
  • Publication number: 20170353283
    Abstract: A data transfer method for a wireless access point with a Multi-User Multiple-Input Multiple-Output (MU-MIMO) function is disclosed. The data transfer method includes: receiving support function information and a data transfer request from each of electronic devices; determining whether each of the electronic devices supports MU-MIMO function according to the support function information; dividing the electronic devices into a first group supporting the MU-MIMO function and a second group without supporting the MU-MIMO function; allocating a first transferring time frame to the first group and allocating a second transferring time frame to the second group according to the data transfer requests; transferring data requested by the first group within the first transferring time frame via the MU-MIMO function; transferring data requested by the second group within the second transferring time frame.
    Type: Application
    Filed: March 16, 2017
    Publication date: December 7, 2017
    Inventors: HSIAO-HAO HSU, WEI-CHE HSIEH, YI-CHANG CHEN
  • Publication number: 20170353284
    Abstract: This invention relates to a proposal of an uplink resource assignment format and a downlink resource assignment format. Furthermore, the invention relates to the use of the new uplink/downlink resource assignments in methods for (de)activation of downlink component carrier(s) configured for a mobile terminal, a base station and a mobile terminal. To enable efficient and robust (de)activation of component carriers, while minimizing the signaling overhead, the invention proposes a new uplink/downlink resource assignment format that allow the activation/deactivation of individual downlink component carriers configured for a mobile. The new uplink or downlink resource assignment comprises an indication of the activation state of the configured downlink component carriers, i.e., indicate which downlink component carrier(s) is/are to be activated or deactivated.
    Type: Application
    Filed: August 25, 2017
    Publication date: December 7, 2017
    Inventors: Joachim Loehr, Alexander Golitschek Edler von Elbwart, Martin Feuersaenger
  • Publication number: 20170353285
    Abstract: At least some embodiments of disclosure include a method and device for transmitting downlink data, and a device for acquiring downlink data. In the method, DCI corresponding to downlink data on a first carrier is configured in a preset manner; and the downlink data on the first carrier is transmitted according to the DCI corresponding to the downlink data on the first carrier. According to the technical solution provided by at least some embodiments of the disclosure, DCI corresponding to downlink data on a FDD uplink carrier is effectively configured in flexible duplex, complexity of a terminal is not increased, and performance of the DCI is ensured.
    Type: Application
    Filed: March 20, 2015
    Publication date: December 7, 2017
    Applicant: ZTE Corporation
    Inventors: Weiwei YANG, Bo DAI, Chunli LIANG
  • Publication number: 20170353286
    Abstract: The disclosure relates to a cancellation device for cancelling interference caused by a non-linear device, the cancellation device comprising: an adaptive filter coupled in parallel to the non-linear device, wherein the adaptive filter is configured to filter an input signal of the non-linear device to generate an approximation signal approximating an output signal of the non-linear device; an error signal generator configured to generate an error signal based on a function of the output signal and the approximation signal; and a controller configured to adjust the adaptive filter based on the error signal and a phase and magnitude relation of the output signal and the input signal.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 7, 2017
    Inventors: Venkatesan Nallampattiekambaram, Yang-Seok Choi
  • Publication number: 20170353287
    Abstract: Transmission paths correspond to frequency bands, respectively, and transmission signals of the four bands are transmitted through the transmission paths. Reception paths correspond to the frequency bands, respectively, and reception signals of the four bands are transmitted through the reception bands. A Tx switch selects a transmission path corresponding to one of the frequency bands so that a transmission signal corresponding to the frequency band is emitted from an antenna. An Rx switch selects a reception path corresponding to the frequency band so that a reception signal of the frequency band received by the antenna is extracted. A tunable filter is a filter whose frequency band is adjusted in a variable manner so that reception band noise of the frequency band is attenuated, and is provided between each of the antenna and the Rx switch, and the Tx switch.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 7, 2017
    Inventors: Kengo ONAKA, Hidenori OBIYA
  • Publication number: 20170353288
    Abstract: The present application describes a self-interference channel estimation system. The system includes a signal generator configured to generate a swept tone having a frequency ranging from an upper edge of a reception band to a lower edge of the reception band, and configured to generate a message signal. The system includes an infinite impulse response (IIR) filter configured to determine an infinite impulse response of a self-interference channel based upon the swept tone. The system includes a processor configured to characterize the self-interference channel based upon the infinite impulse response.
    Type: Application
    Filed: August 24, 2017
    Publication date: December 7, 2017
    Inventors: Alan Scott Brannon, Riley Nelson Pack, Benjamin Joseph Baker
  • Publication number: 20170353289
    Abstract: The present invention relates to a wireless communication system. More specifically, the present invention relates to a method and a device for counting a DRX (Discontinuous Reception) timer in a carrier aggregation system, the method comprising: configuring a plurality of cells including at least one FDD (Frequency Division Duplex) serving cell and at least one TDD (Time Division Duplex) serving cell; and counting a DRX timer in a subframe, wherein the subframe is an uplink subframe for all TDD serving cells.
    Type: Application
    Filed: August 23, 2017
    Publication date: December 7, 2017
    Applicant: LG ELECTRONICS INC.
    Inventors: Sunyoung LEE, Seungjune YI
  • Publication number: 20170353290
    Abstract: Methods, systems, and devices for wireless communication are described. A wireless communications system operating in millimeter wave (mmW) spectrum may utilize synchronization signals for beam tracking. A synchronization signal (e.g., primary synchronization signals (PSS), secondary synchronization signals (SSS), etc.), beam reference signal, and/or control signal may be designed to facilitate beam tracking. A synchronization signal structure based on a repeated sequence in the time domain may facilitate searching for different beams in a timely manner. In some cases, the repeated synchronization signal structure may be achieved by using a larger tone spacing, and hence having shorter symbol duration and repeating the short symbols in the time domain. The repeated structure may be further used to encode additional information (e.g., facilitated by the resulting additional degrees of freedom). Additionally or alternatively, a synchronization signal (e.g.
    Type: Application
    Filed: December 2, 2016
    Publication date: December 7, 2017
    Inventors: Navid Abedini, Sundar Subramanian, Junyi Li, Muhammad Nazmul Islam, Juergen Cezanne, Bilal Sadiq, Tao Luo
  • Publication number: 20170353291
    Abstract: Circuits, methods, and apparatus that may reconstruct a data signal in the presence of ground drift and high-frequency signal coupling. An illustrative embodiment of the present invention may reconstruct a received data signal by taking an finite difference of the received data signal, detecting edges of the received data signal by detecting positive and negative peaks of the finite difference of the received signal, and reconstructing the received data signal using the detected edges. Taking a finite difference of the received data signal removes the DC component of the received data signal, as well as the ground drift that may cause the DC component of the received data signal to change over time. Additional filtering may be used to reduce high-frequency signal coupling and power supply inductive coupling.
    Type: Application
    Filed: June 6, 2017
    Publication date: December 7, 2017
    Applicant: Apple Inc.
    Inventors: Hsiao-Ping Tsai, William P. Cornelius
  • Publication number: 20170353292
    Abstract: In one embodiment, a method comprises receiving, by a network device, one or more advertisement messages comprising timing information describing a quality of a network clock that is originated by a master clock device at a root of a directed acyclic graph (DAG); the network device executing an objective function for the DAG providing an optimized loopless time topology for the network clock, synchronized to the master clock device, based on the timing information; and the network device attaching to a parent device in the DAG based on the objective function, for optimized generation of the network clock by the network device.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 7, 2017
    Inventors: PASCAL THUBERT, LAURENT MONTINI
  • Publication number: 20170353293
    Abstract: A method of detecting transient changes in the distribution of a discrete time series includes: operating in a sparse mode wherein, at sniff periods successively repeated at a first rate, at most K test phases are performed, K being an integer superior or equal to two, each test phase consisting of analyzing, by a sampling stopping time determination unit, samples of the time series captured by a sampler at sampling times according to a second rate which is higher than the first rate to provide a positive or negative result of the test phase. If the results of K successive test phases of a sniff period are each positive, the method switches to operate in a dense mode wherein the sampler is operated to continuously capture samples of the time series at sampling times according to the second sampling rate.
    Type: Application
    Filed: December 24, 2014
    Publication date: December 7, 2017
    Inventors: Venkat Chandar, Aslan Tchamkerten
  • Publication number: 20170353294
    Abstract: An electronic calculating device (100) arranged to perform obfuscated arithmetic in a commutative ring (ZM; Zn[x]/M(x)) defined by a combined modulus (M; M(x)) in a residue number system, the residue number system being defined for a series of moduli (m1, m2, . . . , mN), each modulus defining a commutative ring (ZM1; Zn[x]/m1(x)), for each modulus (mi) of the series there exists an associated base element (ui) satisfying the condition that each ring element (xj) modulo the modulus (mj) may be expressed as an integer-list ((aj, bj)) such that the ring elements equal a linear combination of powers of the base element (xj=uiaj?uibj), wherein the powers have exponents determined by the integer-list.
    Type: Application
    Filed: December 21, 2015
    Publication date: December 7, 2017
    Inventors: LEANDRO MARIN, ALPHONS ANTONIUS MARIA LAMBERTUS BRUEKERS, PAULUS MATHIAS HUBERTUS MECHTILDUS ANTONIUS GORISSEN
  • Publication number: 20170353295
    Abstract: A cracking method for cracking a secret key of an encrypting device includes: building up a leakage model for the encrypting device; performing a mathematical calculation on the leakage model, according to a plurality of sets of input data, to generate a mathematical model; generating a plurality of sets of hypothesized keys; generating a plurality of sets of simulation data corresponding to the hypothesized keys using the mathematical model; providing the input data for the encrypting device and detecting a plurality of sets of leakage data generated by the encrypting device; performing the mathematical calculation on the leakage data to generate calculated data; determining a correlation between each of the simulation data and the calculated data; and determining one of the hypothesized keys to be consistent with the secret key according to the correlation.
    Type: Application
    Filed: May 17, 2017
    Publication date: December 7, 2017
    Inventors: Sung-Shine LEE, Szu-Chi CHUNG, Chun-Yuan YU, Hsi-Chia CHANG, Chen-Yi LEE
  • Publication number: 20170353296
    Abstract: A computing apparatus outputs ?1 and ?2 corresponding to a ciphertext x, a capability providing apparatus uses ?1 to correctly compute f(?1) with a probability greater than a certain probability and sets the result of the computation as z1, uses ?2 to correctly compute f(?2) with a probability greater than a certain probability and sets the result of the computation as z2, the computing apparatus generates a computation result u=f(x)bx1 from z1, generates a computation result v=f(x)ax2 from z2, and outputs ub?va? if the computation results u and v satisfy a particular relation, where G and H are groups, f(x) is a function for obtaining an element of the group G for x?H, X1 and X2 are random variables having values in the group G, x1 is a realization of the random variable X1, and x2 is a realization of the random variable X2.
    Type: Application
    Filed: August 23, 2017
    Publication date: December 7, 2017
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Go YAMAMOTO, Tetsutaro KOBAYASHI
  • Publication number: 20170353297
    Abstract: The present disclosure relates to a method and a system for encrypting data by a data protection system. The data protection system receives one or more dataset and calculates the number of binary digit ‘1’ in each byte of the one or more dataset. The data protection system determines a slot value for each byte of the one or more dataset based on location of the each byte in a table of the plurality of tables. The data protection system identifies a pattern index for the each byte based on the location of the each byte in the one or more slots and generates an encrypted byte for the each byte of the one or more dataset. In an embodiment, the data protection system decrypts the encrypted dataset by receiving one or more encrypted byte.
    Type: Application
    Filed: July 21, 2016
    Publication date: December 7, 2017
    Inventor: Pratik JOSHI
  • Publication number: 20170353298
    Abstract: One embodiment provides an apparatus. The apparatus includes a cryptographic engine to encrypt or decrypt a 64-bit input data block based, at least in part, on a 128-bit input key. The cryptographic engine includes an input stage; a first group of rounds; a middle stage; a second group of inverse rounds and an output stage. Each round includes a first substitution box (“sbox”) stage, a first matrix multiplication stage, a row permutation stage and a first plurality of mixers. Each inverse round includes a second plurality of mixers, an inverse row permutation stage, a second matrix multiplication stage and a second inverse sbox stage. Each sbox stage includes a plurality of sbox portions. Each sbox portion includes a first number of combinational logic gates. Each inverse sbox stage includes a plurality of inverse sbox portions. Each inverse sbox portion includes a second number of combinational logic gates.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 7, 2017
    Applicant: Intel Corporation
    Inventor: SANTOSH GHOSH
  • Publication number: 20170353299
    Abstract: An information processing apparatus for encrypting or decrypting data by AES scheme, includes a processor; and a memory storing a first table including mixed components based on exclusive OR of first random components and key data, a second table, and a third table. The processor executes selecting four bytes of sub-round data from the data; a first transformation based on the first table, for each of one-byte data items of the sub-round data, to generate first data by taking exclusive OR of the one-byte data items and the mixed components; a second transformation based on the second table to transform the first data into second data; a third transformation based on the third table to transform the second data into multiple items of third data; calculating exclusive OR of the third data.
    Type: Application
    Filed: April 21, 2017
    Publication date: December 7, 2017
    Inventor: Kenji TAKATSUKASA
  • Publication number: 20170353300
    Abstract: A data processing apparatus for rearranging multiple items of data to be input, includes a processor; a memory; and an input unit configured to receive as input a rearrangement number with which a rearrangement pattern of the data can be identified. The processor executes calculating a rearrangement destination for each of the items of the data based on the rearrangement number; and rearranging the data based on the rearrangement destinations.
    Type: Application
    Filed: April 24, 2017
    Publication date: December 7, 2017
    Inventor: Kenji TAKATSUKASA
  • Publication number: 20170353301
    Abstract: A method for tracking relationships between binaries and their associated characteristics using a universal identifier applicable to innumerable verticals (eg. health care, manufacturing, IT, multimedia, genomics, etc.) and storing said universal identifier in a cryptographic currency block chain.
    Type: Application
    Filed: June 1, 2016
    Publication date: December 7, 2017
    Inventor: Jesse Burton Gregg
  • Publication number: 20170353302
    Abstract: In various embodiments, a computer-readable memory medium coupled to a processor is disclosed. The memory medium is configured to store instructions which cause the processor to retrieve a seed value, receive a digital bit stream, receive a digital bit stream, generate a stream of random bits, using the seed value as a seed to a pseudo random number generator (PRNG), wherein the stream of random bits contains at least as many bits as the digital bit stream, shuffle bits of the stream of random bits to create a random bit buffer, generate an obfuscated digital bit stream by applying a first exclusive OR (XOR) to the digital bit stream and the random bit buffer, wherein the obfuscated digital bit stream has the same number of bits as the digital bit stream, and provide the obfuscated digital bit stream to the communications interface.
    Type: Application
    Filed: June 5, 2017
    Publication date: December 7, 2017
    Applicant: AgilePQ, Inc.
    Inventors: Sergio A. FERNANDEZ, Bruce CONWAY, Drew CONWAY, David J. GOTRIK, Ayman IBAIDA, Dhiah AL-SHAMMARY, Alsharif ABUADBBA, Mark CONWAY
  • Publication number: 20170353303
    Abstract: The invention relates to a method of authentication of a contactless communication circuit, PICC, by a contactless communication terminal, PCD. Within the PICC, a first number is generated by encryption of a second random number, and the first number is sent to the PCD. Within the PCD, a third number is generated by decryption of the first number. Also within the PCD, a fourth number is determined and encrypted to generate a fifth number. The fifth number has first and second portions. Back within the PICC, a sixth number is determined, which is used in the determination of a seventh number. The seventh number is determined by encryption by a cipher block chaining operating mode of the sixth number with an initialization vector equal to the first portion. If the seventh number is different from the second portion, the authentication is interrupted.
    Type: Application
    Filed: October 24, 2016
    Publication date: December 7, 2017
    Inventor: Frank Cuypers
  • Publication number: 20170353304
    Abstract: Present system relates to a method for getting a user validation of a key stored on a user equipment using a graphical user interface (GUI), the method being carried out by a processor of the user equipment controlling the GUI and comprising the acts of associating to one or more graphical sub-elements to be rendered in a first graphical element of the GUI a parameter set at an initial value function of the key, generating the first graphical element comprising the one or more graphical sub-elements, each one of the graphical sub-elements being displayed with a parameter set to an altered value different from its initial value, the parameter being editable through one or more user inputs on said graphical sub-element, receiving user inputs on the one or more graphical sub-elements to edit its parameter, so as to generate a second graphical elements on the GUI and wherein the validation of the key corresponds to the matching of the first and second graphical elements.
    Type: Application
    Filed: December 17, 2015
    Publication date: December 7, 2017
    Inventors: Lishoy Francis, Luke Hebbes
  • Publication number: 20170353305
    Abstract: A key generator including a low-power key adjust circuit, and a high-power key adjust circuit. The low-power key adjust circuit including a storage location to store an original key, a shifter to shift the original key by a number of steps to shift to create a first key, and an output to provide the first key. The high-power key adjust circuit including an input coupled to the output of the low-power key adjust circuit to receive the first key, a scrambler to scramble the first key to create a scrambled key, and select circuitry to select either the first key or the scrambled key to output from the high-power key adjust circuit based on a bit in a configuration register.
    Type: Application
    Filed: June 1, 2016
    Publication date: December 7, 2017
    Inventors: Eran Glickman, Ron M. Bar, Omer Sharon
  • Publication number: 20170353306
    Abstract: A method for pairing a first device with a second device is disclosed. A salient idea is to generate a discriminant and visually differentiable visual representation from a unique identifier of a device, to make it available for example together with the unique identifier on a printed package of the device, and to regenerate it for display as part of the pairing process. A user checking the displayed visual representation matches the printed visual representation of the package can successfully terminate a pairing process.
    Type: Application
    Filed: May 30, 2017
    Publication date: December 7, 2017
    Inventors: Frederic LEFEBVRE, Alain Verdier, Christophe Vincent, Olivier Heen, Cyrille Gandon
  • Publication number: 20170353307
    Abstract: This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. Without knowledge of (a) the physical object itself, (b) how the physical object characteristic is converted (to a digital representation), and (c) the uniqueness value, an attacker cannot reproduce the key generator seed (or the key(s) generated from that seed).
    Type: Application
    Filed: August 8, 2017
    Publication date: December 7, 2017
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Publication number: 20170353308
    Abstract: Method, server, and communication device for updating identity-based cryptographic private keys of compromised communication devices. One method includes receiving, at a server, a security status indicating that the security of a first communication device has been compromised. The first communication device is associated with a user and includes a first identity-based cryptographic private key and a first user identifier. The method also includes, responsive to receiving the security status, determining, with the server, a second user identifier based on the first user identifier. The method further includes determining, with the server, a second identity-based cryptographic private key based on the second user identifier. The method also includes distributing, via the server, the second identity-based cryptographic private key to a second communication device. The second communication device is associated with the user.
    Type: Application
    Filed: June 6, 2016
    Publication date: December 7, 2017
    Inventors: Katrin Reitsma, Michael F. Korus
  • Publication number: 20170353309
    Abstract: A method is provided for delegating behavior of a smart contract associated with a blockchain to code that is not part of the blockchain. A system directs execution by a virtual machine of the smart contract. During execution of the smart contract, the smart contract sends to a cryptlet container service, via a cryptodelegate, a request to delegate a behavior to a cryptlet that executes on an attested host. During execution the cryptlet container service identifies a host for executing code of the cryptlet in an appropriate cryptlet container. The cryptlet container service directs the identified host to execute the code of the cryptlet to perform the delegated behavior. After the delegated behavior is performed, the cryptlet container service receives from the cryptlet a response to the requested behavior. The cryptlet container service sends the response to the smart contract on the blockchain that is verified by the cryptodelegate.
    Type: Application
    Filed: October 18, 2016
    Publication date: December 7, 2017
    Inventor: John Marley Gray
  • Publication number: 20170353310
    Abstract: The method comprising: a) receiving, by an encoding module computer device (103), from a user (100), a message (101) including a content to be encoded; b) generating, by the encoding module (103), a generated encoding (104) of the content of the provided message (101) using encoding information (112); c) sending, by the encoding module computer device (103), the generated encoding (104) to a reception module computer device (106) and verifying, by the reception module computer device (106), that the generated encoding (104) corresponds to the encoding of the content of the message (101) by using a generated verification information (105) and public information (107), wherein the at least one code (102) having a cryptographic relationship with the public information (107) and the message (101), and the public information (107) and the message (101) having a cryptographic or a public relationship.
    Type: Application
    Filed: December 29, 2015
    Publication date: December 7, 2017
    Inventors: Sandra GUASCH CASTELLÓ, Alex ESCALA RIBAS, Jordi PUIGGALÍ ALLEPUZ
  • Publication number: 20170353311
    Abstract: An embodiment of a method of providing identity services includes receiving identity data from an identity user, the identity data related to an identity of the identity user; receiving validation data from an identity provider, the validation data related to the identity data; if the validation data indicates that the identity data is valid, generating a transaction to store data related to the identity of the identity user on a blockchain of a blockchain system, the data to be stored including a representation of at least one of: the identity data, or the validation data; and transmitting the transaction to at least one distributed node of the blockchain system.
    Type: Application
    Filed: February 14, 2017
    Publication date: December 7, 2017
    Applicant: THOMSON REUTERS GLOBAL RESOURCES
    Inventors: Robert Joseph SCHUKAI, Scott Ryan MANUEL
  • Publication number: 20170353312
    Abstract: The invention relates to a method of authentication of a contactless communication circuit, PICC, by a contactless communication terminal, PCD. Within the PCC, a first number is generated and without encryption, transmitted to the PCD. Within the PCD a second number is determined by decryption of the first number with a first key. The determination of a third number is based on the second number, and the determination of a fourth number is by encryption of the third number with the first key. Decryption of the fourth number with the first key to obtain the third number and an interruption of the authentication if a sixth number obtained from the third number is different from a seventh number, is performed by the PICC.
    Type: Application
    Filed: October 24, 2016
    Publication date: December 7, 2017
    Inventor: Frank Cuypers
  • Publication number: 20170353313
    Abstract: Controlling execution of software is provided. In response to receiving an input to execute a software module on a data processing system, a set of measurements are performed on the software module performing a process to prepare the software module for execution on the data processing system. In response to determining that the set of measurements meets a predetermined criterion, an authorization to proceed with the process of preparing the software module for execution on the data processing system is requested from a trusted third party computer. In response to receiving the authorization to proceed with the process of preparing the software module for execution on the data processing system from the trusted third party computer, the software module is executed.
    Type: Application
    Filed: June 1, 2016
    Publication date: December 7, 2017
    Inventor: Kenneth A. Goldman
  • Publication number: 20170353314
    Abstract: A system and method are described in which a document transaction management platform coordinates performance of trust actions across a plurality of trust service providers. For example, a method can include operations executing on a connector module in communication with a digital transaction management platform and a trust service provider, such as the following. Receiving, from the digital transaction management platform, a transaction request including a token and a requested trust action. Accessing user information for a recipient involved in the requested trust action using the token. Obtaining, from the digital transaction management platform, transaction data associated with the requested trust action. Coordinating, with the trust service provider, performance of the trust action on at least a portion of the transaction data. Transmitting, to the digital transaction management platform, a proof received from the trust service provider confirming performance of the trust action.
    Type: Application
    Filed: July 21, 2016
    Publication date: December 7, 2017
    Inventors: David Steeves, Gregory J. Alger, Joshua D. Wise, Jayson C. McCleery, Peleg Atar, Ezer Farhi, Ryan J. Cox
  • Publication number: 20170353315
    Abstract: Disclosed is a secure electronic entity including a memory unit storing data in the form of multiplets and a processing module designed to receive data from an electronic device. The processing module is designed to determine a proof-of-integrity element in accordance with the data received and at least one portion of the stored multiplets, and to transmit the proof-of-integrity element to the electronic device. Also disclosed is a method for verifying the integrity of data stored in such a secure electronic entity.
    Type: Application
    Filed: December 17, 2015
    Publication date: December 7, 2017
    Applicant: OBERTHUR TECHNOLOGIES
    Inventors: Emmanuelle DOTTAX, Florian GALDO, Christophe GIRAUD, Jean-Philippe VALLIERES
  • Publication number: 20170353316
    Abstract: A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device communicatively coupled with a second device over a communication connection line. The system includes a security transformation device coupled to the communication connection line. The security transformation device is configured to transform non-secure communication into secure communication to send over the communication connection line to a destination. The security transformation device is configured to evaluate communication using security evaluation functionality by either authenticating or failing to authenticate the communication. If the communication is successfully authenticated, then the communication is provided to a destination, otherwise, the communication is not provided to the destination.
    Type: Application
    Filed: July 20, 2017
    Publication date: December 7, 2017
    Inventor: Vladimir Dimitrov Kostadinov