Patents Issued in April 14, 2022
  • Publication number: 20220116186
    Abstract: Systems, methods, and devices can be utilized to schedule at least one Hybrid Automatic Repeat Request (HARQ) transmission and at least one HARQ feedback message in the same Physical Resource Block (PRB). A HARQ transmission can be scheduled in a mini-slot of the PRB. Accordingly, latencies associated with transmitting and receiving the PRB can be reduced, while the high reliability of HARQ can be retained. Implementations can be applied to 5G technologies such as Ultra Reliable Low Latency Communications (URLLCs) and enhanced Mobile BroadBand (eMBB), as well as other low-latency communications. A method can include determining a location of a device; selecting, based at least in part on the location of the device, a mini-slot size; scheduling, in one or more mini-slots having the mini-slot size in a PRB, a HARQ transmission; and transmitting, to the device, the HARQ transmission in the one or more mini-slots of the PRB.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Shuqing Xing, Wafik Abdel Shahid, Scott Francis Migaldi
  • Publication number: 20220116187
    Abstract: [Object] To provide a communication apparatus and a communication method that enable reinforcement of reliability of multicast communication and effective utilization of wireless communication resources to be compatible. [Solution] Provided is a communication apparatus including: a communication unit configured to perform communication of a frame. The communication unit transmits a frequency allocation frame, which includes frequency allocation information that specifies a transmission frequency of a delivery acknowledgment response frame with respect to a multicast frame, and receives the delivery acknowledgment response frame that is transmitted in the transmission frequency specified by the frequency allocation information and is frequency-division multiplexed.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Applicant: Sony Group Corporation
    Inventors: Eisuke SAKAI, Takeshi ITAGAKI
  • Publication number: 20220116188
    Abstract: Systems, apparatuses, and methods are described for wireless communications. A base station may transmit, to a wireless device, a DCI format comprising a downlink BWP indicator, an uplink BWP indicator, a PDSCH resource allocation, and a PUCCH resource allocation for HARQ ACK transmission. The wireless device may select, from a plurality of uplink active BWPs of the cell, an uplink active BWP based on the uplink BWP indicator. The wireless device may transmit the HARQ ACK via the selected uplink active BWP.
    Type: Application
    Filed: October 25, 2021
    Publication date: April 14, 2022
    Inventors: Hua Zhou, Esmael Dinan, Ali Cirik, Alireza Babaei, Hyoungsuk Jeon, Kyungmin Park, Kai Xu
  • Publication number: 20220116189
    Abstract: A method, network node and wireless device, for releasing component carriers for wireless device power efficiency are provided. According to one aspect, the process includes receiving a component carrier-release assistance indication, CC-RAI, recommendation from the WD, the CC-RAI recommendation recommending release of at least one CC. The process may optionally include releasing at least one of the at least one component carrier. The process may also optionally include transmitting an acknowledgement to the WD acknowledging acceptance or rejection of the CC-RAI recommendation.
    Type: Application
    Filed: August 30, 2019
    Publication date: April 14, 2022
    Inventors: Sina MALEKI, Ali NADER, Andres REIAL
  • Publication number: 20220116190
    Abstract: Various embodiments comprise systems, methods, architectures, mechanisms and apparatus for automatically coordinating time domain duplex (TDD) configurations and transmission parameters among wireless network providers operating on adjacent TDD channels and/or bands in proximity of each other to avoid cross link interference (CLI).
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Applicant: CHARTER COMMUNICATIONS OPERATING, LLC
    Inventors: Abdulrauf Hafeez, Maulik Vaidya
  • Publication number: 20220116191
    Abstract: An apparatus, e.g., a UE, for resolution of conflicts between HD and FD configurations is disclosed. The UE receives a configuration indicating that a first set of symbols is configured for HD communication with at least one of D symbols, U symbols, or F symbols in which the F symbols are configured as D or U. The UE receives DCI scheduling FD communication including an FD transmission and an FD reception on a second set of symbols. The second set of symbols have a third set of symbols in common with the first set of symbols. The third set of symbols have conflicting HD and FD configurations. The UE cancels, based on the conflicting HD and FD configurations of the third set of symbols, at least one of the FD transmission or the FD reception in the third set of symbols.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 14, 2022
    Inventors: Tianyang BAI, Navid ABEDINI, Kiran VENUGOPAL, Qian ZHANG, Hua WANG, Junyi LI, Yan ZHOU, Tao LUO
  • Publication number: 20220116192
    Abstract: A method by a first wireless device in a wireless network to support simultaneous transmit-receive with a second wireless device in the wireless network using a first wireless link and a second wireless link. The method includes transmitting multi-link operation information to the second wireless device, wherein the multi-link operation information indicates a frequency separation that is to be maintained between the first wireless link and the second wireless link and transmitting a first frame to the second wireless device using the first wireless link while simultaneously receiving a second frame from the second wireless device using the second wireless link, wherein the frequency separation is maintained between the first wireless link and the second wireless link when transmitting the first frame and receiving the second frame simultaneously.
    Type: Application
    Filed: October 14, 2021
    Publication date: April 14, 2022
    Applicant: NEWRACOM, Inc.
    Inventors: Yujin NOH, Heejung YU, Jong-ee OH, Jaeyoung RYU
  • Publication number: 20220116193
    Abstract: A wireless communication method and apparatus, and a radio frequency subsystem are provided. The apparatus includes a local oscillator circuit, configured to provide a local oscillator signal; a radio frequency transmitter coupled to the local oscillator circuit, configured to send a first signal on a first carrier based on the local oscillator signal provided by the local oscillator circuit; a radio frequency receiver coupled to the local oscillator circuit, configured to receive a second signal on a second carrier based on a local oscillator signal of a same frequency as the local oscillator signal provided by the local oscillator circuit; and a digital frequency converter coupled to the radio frequency transmitter and the radio frequency receiver, configured to provide a digital frequency conversion operation to compensate for a frequency difference between a center frequency of the first carrier and a center frequency of the second carrier.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Inventor: Peng GAO
  • Publication number: 20220116194
    Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a base station may determine, for full-duplex mode communication on a first link and a second link, a timing adjustment to at least one of a first timing or a second timing, wherein the timing adjustment is to cause a delay between clutter reflection from a first signal and an occurrence of a second signal to occur during a cyclic prefix of the second signal; cause the timing adjustment to be applied to the at least one of the first timing or the second timing; and communicate in the full-duplex mode with a first node and a second node in accordance with the timing adjustment, wherein communicating includes transmitting the first signal to the first node and receiving the second signal from the second node. Numerous other aspects are provided.
    Type: Application
    Filed: December 17, 2021
    Publication date: April 14, 2022
    Inventors: Kapil GULATI, Navid ABEDINI, Andrzej PARTYKA, Vasanthan RAGHAVAN, Junyi LI, Ozge KOYMEN
  • Publication number: 20220116195
    Abstract: A user equipment is configured to operate in a wireless communications network being operated in a TDD scheme, the TDD scheme including a plurality of TDD-frames, each TDD-frame including a guard period arranged between a downlink symbol and an uplink symbol of the TDD-frame. The user equipment is configured to receive a first number of symbols during the guard period or is configured to transmit the uplink symbol and to transmit a second number of symbols previous to transmitting the uplink symbol.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Thomas FEHRENBACH, Lars THIELE, Cornelius HELLGE, Thomas WIRTH
  • Publication number: 20220116196
    Abstract: Technologies are provided for adaptive control of bias settings in a digital microphone. In some embodiments, a device includes a first component that provides data indicative of a clock frequency of operation in a functional mode of a digital microphone. The clock frequency clocks one or more microphone components having switching activity. The device also can include a second component that determines, using the clock frequency, an amount of bias current to supply to at least a first microphone component of the one or more microphone components. The device can further include a memory device that retains control parameters that include at least one of a first subset of parameters defining a relationship between current and frequency and a second subset of parameters defining a quantization of the relationship. The quantization including multiple bias current levels for respective frequency intervals.
    Type: Application
    Filed: May 7, 2021
    Publication date: April 14, 2022
    Inventors: Miroslav Svajda, Dusan Vecera, Igor Mucha
  • Publication number: 20220116197
    Abstract: A time transfer modem includes a radio frequency integrated circuit (RFIC), a radio frequency (RF) front end, and processing circuitry. The RF front end is configured to receive and up-convert an input for time transfer with a remote station to generate an up-converted timing signal centered at a select frequency that is outside of a frequency range of interest but within an operational frequency range of the RFIC. The RF front end may also be configured to attenuate, via a pre-selection filter, up-converted adjacent signals to generate a filtered timing signal at the select frequency. The RFIC may be configured to down-convert and digitize the filtered timing signal to generate a digitized timing signal for signal processing by the processing circuitry to determine a clock difference between a local clock signal and the digitized timing signal that originated from the remote station.
    Type: Application
    Filed: May 6, 2021
    Publication date: April 14, 2022
    Inventors: Norman H. Adams, Jeffrey A. Boye, Adam V. Crifasi, Blair C. Fonville, Ian M. Hughes, Amit Shah, Gregory L. Weaver, John F. Youssef, Darrell A. Zinn
  • Publication number: 20220116198
    Abstract: A homomorphic operation accelerator includes a plurality of circuits and a homomorphic operation managing circuit. The plurality of circuits may perform homomorphic operations. The homomorphic operation managing circuit may receive ciphertext data, homomorphic encryption information and homomorphic operation information from an external device. The homomorphic operation managing circuit may activate or deactivate each of a plurality of enable signals applied to the plurality of circuits based on the homomorphic encryption information and the homomorphic operation information. The homomorphic operation managing circuit may activate or deactivate each of the plurality of circuits based on the plurality of enable signals. The homomorphic encryption information may be associated with a homomorphic encryption algorithm used to generate the ciphertext data. The homomorphic operation information may be associated with the homomorphic operations to be performed on the ciphertext data.
    Type: Application
    Filed: June 2, 2021
    Publication date: April 14, 2022
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Hanbyeul NA, Sumin KIM, Hongrak SON, Junho SHIN
  • Publication number: 20220116199
    Abstract: An apparatus for generating synthetic data according to an embodiment includes a synthetic data generator configured to generate synthetic data corresponding to combined data obtained by combining original data held by each of a plurality of data providing apparatuses, and a synthetic data provider configured to provide the synthetic data to a data using apparatus.
    Type: Application
    Filed: October 13, 2021
    Publication date: April 14, 2022
    Inventors: Min Jung KIM, Ji Hoon CHO, Hyo Jin YOON, Young Hyun KIM, Kyoo Hyung HAN
  • Publication number: 20220116200
    Abstract: Selector derived encryption systems and methods are disclosed herein. An example method includes creating a hashed and encrypted database, as well as performing a query against the hashed and encrypted database using an encrypted selector exchange protocol to prevent the exposure of extraneous data from the hashed and encrypted database.
    Type: Application
    Filed: October 8, 2020
    Publication date: April 14, 2022
    Inventor: Ryan Carr
  • Publication number: 20220116201
    Abstract: Methods, systems, and computer-readable storage media for providing a DLS-enriched view on data stored in a database system, the DLS-enriched view including a set of annotations indicating at least one application table and at least one field of the application table, storing a staging table corresponding to the application table field and a database trigger that is configured to write data from the field to the staging table in response to a change in the at least one application table, providing at least one IR artifact based on the DLS-enriched view, generating at least one DLS-specific entity and chaincode based on the IR artifact and a configuration for a DLS, to which the chaincode is to be deployed, deploying the chaincode to the DLS, and monitoring the one or more staging tables for changes and, in response to a change, recording data of the staging table to the DLS.
    Type: Application
    Filed: October 9, 2020
    Publication date: April 14, 2022
    Inventors: Srinivasa Byaiah Ramachandra Reddy, Ashwin Srinivasa
  • Publication number: 20220116202
    Abstract: The present invention relates to a method of generating random numbers for cryptographic applications, in which a recording of an environment is generated by means of a detection unit, the recording is presented by means of a display device, a virtual object is positioned in the presentation of the recording in the environment, real world coordinates for real world points in a real world coordinate system are determined for the environment, virtual world coordinates for one or more virtual world points in a virtual world coordinate system are determined for the virtual object, at least the real world coordinates of a real world point of the environment and the virtual world coordinates of a virtual world point of the virtual object are used to generate a random number, and the random number is used in a cryptographic application.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 14, 2022
    Applicant: Schneider Electric Industries SAS
    Inventors: Alexander HIESER, Marcus ZINN
  • Publication number: 20220116203
    Abstract: The exemplary embodiments disclose a system and method, a computer program product, and a computer system for encryption. The exemplary embodiments may include receiving an encryption request from a first smart device, preparing a response to the encryption request and generating a key, encrypting the prepared response with the generated key, sending the encrypted response to the first smart device, splitting the key into two or more pieces, sending the two or more key pieces to a second smart device, sending the two or more key pieces from the second smart device to the first smart device, assembling the two or more key pieces into the key on the first smart device, and decrypting the encrypted response on the first smart device using the assembled key.
    Type: Application
    Filed: October 12, 2020
    Publication date: April 14, 2022
    Inventors: Gray Franklin Cannon, Shikhar Kwatra, Vijay Ekambaram, Jennifer L. Szkatulski, Saravanan Sadacharam, Vijay Kumar Ananthapur Bache
  • Publication number: 20220116204
    Abstract: Systems and methods of shared secret validation for a transaction to transfer an association of a digital asset represented in a distributed transactional database from an incumbent entity to a requesting entity, the digital asset having associated a probabilistic data structure encoding at least one digital hash of each of a plurality of secrets including the shared secret, and the transaction including a hash of the shared secret, including validating the transaction by comparing the hash of the shared secret in the transaction with the probabilistic data structure; and responsive to the validation, committing the transaction in the database to effect the transfer of association of the digital asset to the requesting entity.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 14, 2022
    Inventor: Jonathan ROSCOE
  • Publication number: 20220116205
    Abstract: A method for managing security keys for an I/O device may include loading a first security key from a primary memory to a security engine, performing a first data transfer operation between a host and the I/O device using the first security key with the security engine, loading a second security key from a secondary memory to the security engine, and performing a second data transfer operation between the host and the I/O device using the second security key with the security engine. The method may further include storing the first security key in the primary memory based on a frequency of use of the first security key. The frequency of use of the first security key may be determined by a pattern of transfers between the host and the I/O device.
    Type: Application
    Filed: December 15, 2020
    Publication date: April 14, 2022
    Inventors: Pyeongwoo LEE, Sumanth JANNYAVULA VENKATA, Young Deok KIM
  • Publication number: 20220116206
    Abstract: A first semiconductor device includes a processor configured to generate a random number at initial test of a second semiconductor device after fabrication of the second semiconductor device in a supply chain related to the second semiconductor device, and send the generated random number to the second semiconductor device. The processor is further configured to receive a first signature that is signed over the sent random number by the second semiconductor device using a first private key that is stored in the second semiconductor device, among a first private and public key pair, and test the received first signature, using a first public key that is stored in the first semiconductor device, among the first private and public key pair, to determine whether the second semiconductor device is authenticated.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: David KEHLET, Shuanghong SUN, Saikumar JAYARAMAN, Fariaz KARIM
  • Publication number: 20220116207
    Abstract: Disclosed is an orthogonal access control system based on cryptographic operations provided by multi-hop proxy re-encryption (PRE) that strictly enforces only authorized access to data by groups of users, scalable to large numbers of users. Scalable delegation of decryption authority can be shared with a plurality of members of a group whether those members be users or devices, and members of a group can further create sub groups and delegate decryption authority to those members, whether users or devices. Members are granted access via generation of transform keys, and membership or access can be revoked merely be deleting the transform key—no elimination of the encrypted data, regardless of its storage location, is needed.
    Type: Application
    Filed: September 10, 2021
    Publication date: April 14, 2022
    Inventors: Robert L. Wall, Patrick Joseph Walsh
  • Publication number: 20220116208
    Abstract: Systems, apparatuses, methods, and computer program products are disclosed for quantum entanglement random number generation (QERNG). An example method for QERNG includes, among other operations, receiving a quantum computing (QC) detection alert control signal, a leakage alert control signal, or a tampering alert control signal; and in response to receipt of the QC detection alert control signal, the leakage alert control signal, or the tampering alert control signal, and within a defined duration of time corresponding to an associated QC threat, measuring at least a subset of a first set of entangled quantum particles, wherein one or more quantum particles in the first set of quantum particles is entangled with a respective quantum particle in a second set of quantum particles associated with a second computing system.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: JEFF J. STAPLETON, Robert L. Carter, JR., Pierre Arbajian, Bradford A. Shea, Peter Bordow, M. Erik Meinholz
  • Publication number: 20220116209
    Abstract: A microelectronic device that includes a sensor die, compute fabric dies each having processing components and data storage components, and storage component dies. Within each compute fabric die at least one of the processing components is coupled to at least one of the data storage components. Each storage component die is coupled to at least one compute fabric die. A least one of a data processing component and a storage component of the microelectronic device is electrically coupled to a sensor of the sensor die. At least one processing component is constructed to select an intrinsic properties component and generate identifying information by: changing biasing and control parameters of the selected intrinsic properties component, and generating the identifying information based on the results of the changing of the biasing and control parameters.
    Type: Application
    Filed: December 17, 2021
    Publication date: April 14, 2022
    Inventor: Michel D. Sika
  • Publication number: 20220116210
    Abstract: Embodiments include a method for secure data storage including constructing an encryption key from a plurality of key elements, the constructing including distributing the plurality of key elements to a plurality of key maintenance entities, each of the plurality of key maintenance entities employing a plurality of independent safe guards for their respective key elements of the plurality of key elements; and requiring access to the plurality of key elements to construct the encryption key. The method includes receiving a subset of the plurality of key elements via a twice-encrypted communications channel; and regenerating the encryption key at the client node; and after encrypting data, deleting the subset of the plurality of key elements received over the twice-encrypted communications channel, retaining any of the plurality of key elements previously stored at the client node.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Inventor: Amir Keyvan Khandani
  • Publication number: 20220116211
    Abstract: System generating real-time gathering partner credentials. Processor provides network-based access to user interface registering and maintaining first and second users' accounts. Processor communicates with first and second mobile communication devices in possession of users. Processor executes processor commands of users. Data repository is coupled with processor for storing first and second account data of user accounts. Account data include URIs to be accessed for dynamic collection of real-time first and second user credentials information. Account data are associated with first and second unique usernames of users. Processor includes geolocation facility determining indication of real-time geolocation proximity between mobile communication devices. Processor includes account data-collection facility responsive in real-time to processor command of first user dynamically collecting real-time second user credentials information.
    Type: Application
    Filed: October 22, 2021
    Publication date: April 14, 2022
    Inventor: Catherine R Miller
  • Publication number: 20220116212
    Abstract: A method for generating an encryption key is provided to encrypt data exchanged between a first user and a second user, wherein the key is determined from measurements of the transmission channel.
    Type: Application
    Filed: September 2, 2021
    Publication date: April 14, 2022
    Inventors: Renaud MOLIÈRE, Christiane KAMENI NGASSA, François DELAVEAU, Claude LEMÉNAGER, Alain SIBILLE, Taghrid MAZLOUM, Nir SHAPIRA
  • Publication number: 20220116213
    Abstract: A method for managing cryptographic keys for a control device, in particular for a motor vehicle. The method includes the following steps: associating a state with at least one of the cryptographic keys; using the at least one cryptographic key based on the state.
    Type: Application
    Filed: September 21, 2021
    Publication date: April 14, 2022
    Inventors: Diego Pala, Teona Tatovic, Lukas Riemenschneider
  • Publication number: 20220116214
    Abstract: Users of a multisignature wallet can customize keys to initiate various transactions. As a user specifies roles to customize keys, a smart contract is updated to associate the roles with the keys, where the customized keys are then associated with the user's multisignature wallet. The user may perform transactions by signing using the key or an address of the key, where a transaction can be processed upon verifying the key and its role. Additionally, a privacy service can facilitate blockchain transactions initiated using a key of a multisignature wallet. The privacy service receives a transaction signed by a key of the multisignature wallet and identifies a proxy wallet using the key. The privacy service validates and signs the transaction, which is then sent to a proxy wallet. The proxy wallet can cause a blockchain transaction to be executed.
    Type: Application
    Filed: October 14, 2021
    Publication date: April 14, 2022
    Inventors: Christoph Jentzsch, Simon Jentzsch, Steffen Kux
  • Publication number: 20220116215
    Abstract: A method for execution by one or more modules of one or more processors of a storage network includes receiving a data object for storage, segmenting the data object into a plurality of data segments and determining a level of security and a level of performance for the plurality of data segments. The method continues by determining whether one or more data segments of the plurality of data segments is to be transformed using an all-or-nothing transformation and in response to a determination to transform one or more data segments of the plurality of data segments, transforming a data segment of the plurality of data segments to produce a transformed data segment. The method continues by dispersed error encoding the transformed data segment to produce a set of encoded data slices and transmitting the set of encoded data slices to a set of storage units of the storage network.
    Type: Application
    Filed: December 24, 2021
    Publication date: April 14, 2022
    Applicant: Pure Storage, Inc.
    Inventors: Wesley B. Leggette, Jason K. Resch
  • Publication number: 20220116216
    Abstract: A secure approval chain for runtime protection is disclosed. As an application or pod is developed in a pipeline, an approval engine ensures that the pod is approved by all approvers. The approval engine generates a deployment token that is added to the configuration data of the pod and that can be used at deployment to perform various security operations including pod verification, runtime environment control and enforcement, and pod or application verification.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
  • Publication number: 20220116217
    Abstract: There is provided a method and system for providing authentication between a device and a cloud storage account for a user, comprising a device configured to authorise credentials for the user, authorise the device by providing a unique identifier and an encryption key, generate a ticket using the device unique identifier and user credentials, sign the ticket with the encryption key, send the signed ticket to a cloud authorisation service, and a cloud authorisation service configured to validate the signed ticket using the encryption key and match the ticket to the cloud storage account for the user via the user credentials.
    Type: Application
    Filed: November 14, 2018
    Publication date: April 14, 2022
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Roger Scott Twede, Deny Joao Correa Azzolin
  • Publication number: 20220116218
    Abstract: Provided are a selective verification system and method of zero-knowledge proofs for scalability of a blockchain, the system including: a proof unit generating a proof as a result of Prove( ) for a fact to be proved, and generating a transaction in the blockchain and storing the proof; a verification unit executing, when a new proof is registered, off-chain Verify( ) for a contract, a vk, and the proof, standing by when a result of execution is a value of true, and after a preset time elapses, determining that the proof is true; and an operation unit executing on-chain Verify( ) in response to a request for verification from the verification unit and imposing a penalty when a result of execution is a value of false.
    Type: Application
    Filed: August 20, 2020
    Publication date: April 14, 2022
    Inventors: Jaecheol RYOU, Junhoo PARK, Geunyoung KIM, Hyeokjin KIM
  • Publication number: 20220116219
    Abstract: Methods, systems, and apparatus are described providing social networking engines. Specifically, the present specification relates to a method for implementing software containers implementing social network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the social network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some implementations, the containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.
    Type: Application
    Filed: September 20, 2021
    Publication date: April 14, 2022
    Inventor: William J. Raduchel
  • Publication number: 20220116220
    Abstract: The present disclosure relates to a password management system and to a method for operating such a password management system. The password management system operates in communication with a client device running a cookie enabled browser application. The present disclosure also relates to a method for allowing access to restricted information stored at a server.
    Type: Application
    Filed: October 8, 2020
    Publication date: April 14, 2022
    Applicant: Authentico Technologies AB
    Inventors: Philip Lundin Weinstock, Aysajan Abidin
  • Publication number: 20220116221
    Abstract: A method includes: receiving, from a vehicle approaching a trust zone, an identifier corresponding to an identity of the vehicle; verifying, by a computing device (e.g., an access server at a gate of the trust zone) and using the identifier, the identity of the vehicle; and comparing the identity of the vehicle with a set of authorized identities stored in a database.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Antonino Mondello, Alberto Troia
  • Publication number: 20220116222
    Abstract: A first string, having a first string value, that is associated with a sample set of material is received, wherein a second string, having a complementary value relative to the first string value, is also associated with the sample set of material. A determinative hash is generated using the first string value and a symmetric generator polynomial. A second hash, corresponding to the second string, is generated directly from the determinative hash. A canonized hash is generated using the determinative hash and the second hash. It is determined whether at least one of the first string or the second string is stored in string storage that is configured to store a plurality of strings, including by searching a hash table for the canonized hash; in the event it is determined that at least one of the first string or the second string is not stored in the string storage, at least one of the first string or the second string is stored in the string storage.
    Type: Application
    Filed: February 25, 2021
    Publication date: April 14, 2022
    Inventors: Jonathan Darrel Coker, Travis Roger Oenning, Balamurugan Anandan
  • Publication number: 20220116223
    Abstract: A system and method is disclosed. The method comprises a client device receiving a verification request comprising an interaction identifier. The client device can then query a full node for a random sampling of block headers from the full node. The client device can receive the random sampling of block headers from the full node, and verify the random sampling of block headers. The client device can then determine that the blockchain maintained by the full node is valid after verifying the random sampling of block headers.
    Type: Application
    Filed: August 9, 2018
    Publication date: April 14, 2022
    Inventors: Mahdi Zamani, Lucianna Kiffer, Loi Luu, Karl Benedikt Bunz
  • Publication number: 20220116224
    Abstract: Methods, apparatus, systems, and articles of manufacture for attestation for a constellation of edge devices are disclosed. An example first edge computing node includes at least one memory, instructions in the first edge computing node, and processor circuitry to execute the instructions to record one or more timestamps corresponding to processing of event data from a first edge computing device, transmit the event data and the one or more timestamps to a second edge computing node, in response to the second edge computing node validating the event data based on the one or more timestamps and historical key performance indicators corresponding to the first edge computing node, validate the event data.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: Francesc Guim Bernat, Ned M. Smith, Kshitij Arun Doshi, Sanjay Bakshi, Benedict McCahill
  • Publication number: 20220116225
    Abstract: A method for extending a blockchain includes, at a space server in a distributed network: storing a plot file. The method also includes accessing a blockchain: during a current slot in the series of slots, accessing a proof-of-space challenge based on a current slot challenge associated with the current slot and a challenge chain signage point; in response to accessing the proof-of-space challenge, retrieving a proof-of-space based on the proof-of-space challenge and the plot file; calculating a quality-based number of iterations based on the quality of the proof-of-space; generating a block comprising the proof-of-space, the challenge chain signage point, and a reward chain signage point; and broadcasting the block to the distributed network.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 14, 2022
    Inventors: Bram Cohen, Krzysztof Pietrzak, Mariano Sorgente
  • Publication number: 20220116226
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for digital transaction signing for multiple client devices using secured encrypted private keys. The system generates, by a device, a private key and public key pair. The key pair is associated with an electronic account. The device also has an associated private key and public key pair. The device generates multiple key shares of the generated private key associated with the electronic account. The device encrypts each of the multiple key shares with the public key of the device thereby creating multiple first or inner layer of encrypted key shares. The device then encrypts each of the multiple first encrypted key shares each with a separate user public key associated with a user thereby creating multiple second or outer layer of encrypted key shares. The double encrypted key shares are then distributed to the respective users having the user public key.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Wissam Jarjoui, George Melika, Akbar Thobhani
  • Publication number: 20220116227
    Abstract: A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes abutting a first wearable device belonging to a first party with a second wearable device belonging to a second party; transmitting, by the first wearable device, authentication information of the first party; verifying the authentication information of the first party; transmitting, by the second wearable device, authentication information of the second party; verifying the authentication information of the second party; authorizing electronic transaction in response to successfully verifying both the authentication information of the first party and the authentication information of the second party. Each of the authentication information of the first party and the authentication information of the second party includes information configured for authentication based on a public key infrastructure (PKI) certificate.
    Type: Application
    Filed: September 10, 2021
    Publication date: April 14, 2022
    Inventor: Unho CHOI
  • Publication number: 20220116228
    Abstract: An electronic apparatus including a memory, a communication interface, and a processor configured to store, in the memory, a first certificate including first certification information and a first electronic signature corresponding to the first certification information received from a first server based on an application data request, and store a second certificate including second certification information and a second electronic signature corresponding to the second certification information received from a second server. The processor obtains first hash data by decrypting the first electronic signature using a public key of the second server included in the second certification information, and second hash data by converting the first certification information. verifies the first server based on the first hash data and the second hash data, and controls, based on a the first server being verified, the communication interface to transmit a request signal for the application data to the first server.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Juneho LEE, Youngjae YOON, Sehun SHIM, Jongoh HUR
  • Publication number: 20220116229
    Abstract: A method for representing certificate expiration includes obtaining, from a root certificate authority, a root digital certificate and generating a chain of intermediate certificate authorities. Each intermediate certificate authority includes a respective intermediate certificate digitally signed by the intermediate certificate authority that is immediately higher in the chain and a respective validation time period indicating a range of times when the intermediate certificate authority is permitted to digitally sign certificates. The respective validation time period includes the validation time period of each intermediate certificate authority that is lower in the chain. The method includes generating a certificate revocation list and generating, from the lowest intermediate certificate authority in the chain, a plurality of end entity certificates.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Applicant: Google LLC
    Inventors: Matthew Robert Jones, Benjamin Jackson Benoy, John David Thayer Wood
  • Publication number: 20220116230
    Abstract: The invention relates to a method for securely providing a personalized electronic identity on a terminal (2) which can be used by a user (1) for identification purposes when claiming an online service. In the method, an identification application is ran on a terminal (2), which is assigned to a user (1), in a system comprising data processing devices (9; 10; 11; 12) and said terminal (2), and additionally a personalization application and an identity provider application are ran.
    Type: Application
    Filed: January 8, 2020
    Publication date: April 14, 2022
    Applicant: Bundesdruckerei GMBH
    Inventors: Frank DIETRICH, Marian MARGRAF, Tim OHLENDORF, Matthias SCHWAN
  • Publication number: 20220116231
    Abstract: A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes generating, by a user, a first private key and a first public key corresponding to each other; generating, by an nth service provider, an nth private key and an nth public key corresponding to each other; transmitting, from the user to the nth service provider, a level n key; verifying, by the nth service provider, the level n key; generating, by the nth service provider, a level (n+1) key by concatenating the level n key and the nth public key signed with the nth private key; and transmitting, by the nth service provider, the level (n+1) key to the user, where n is a natural number, and when n=1, the level 1 key is the first public key signed with the first private key.
    Type: Application
    Filed: September 10, 2021
    Publication date: April 14, 2022
    Inventor: Unho CHOI
  • Publication number: 20220116232
    Abstract: An apparatus, method and computer program perform our cause to perform receiving a request at an element of distributed or cloud computing system, wherein the request includes a command; a nonce; and details of a cryptographic key for use in responding to the request; generating a response to the request at a trust agent of the element of said computing system; and providing the response to in response to the request, wherein the response includes the nonce and is signed using the cryptographic key.
    Type: Application
    Filed: January 30, 2019
    Publication date: April 14, 2022
    Applicant: Nokia Solutions and Networks Oy
    Inventors: Ian OLIVER, Borger VIGMOSTAD, Gabriela LIMONTA
  • Publication number: 20220116233
    Abstract: Generally discussed herein are systems, devices, and methods for device verification. A method can include providing, by test equipment (TE), electrical stimulus consistent with a challenge of a challenge response pair (CRP) to a physical unclonable function (PUF) of a device under test (DUT), receiving, by the TE and from the DUT, a response to the electrical stimulus, comparing, by the TE, the provided response to responses to CRPs in a database including PUF CRPs associated with a device identification and a device type, and validating the identity of the DUT when the response of the PUF to the electrical stimulus matches the response of the CRP or invalidating the identity of the electrical device when the response of the PUF does not match the response of the CRP.
    Type: Application
    Filed: October 12, 2020
    Publication date: April 14, 2022
    Inventors: Colby K. Hoffman, William T. Jennings, Michelle Moholt
  • Publication number: 20220116234
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. An example apparatus includes: instructions; and processor circuitry to execute the instructions to: retrieve a random number and a physical unclonable function (PUF) from a trusted environment; generate a virtual PUF (vPUF) based on a trusted operation including the random number and the PUF; and store the vPUF and the random number in a persistent storage.
    Type: Application
    Filed: December 20, 2021
    Publication date: April 14, 2022
    Inventors: Tat Kin Tan, Siew Chin Lim, Boon Khai Ng
  • Publication number: 20220116235
    Abstract: Embodiments are generally directed to managing power consumption of powered devices. In some embodiments, the powered devices draw power from a common source of power, which is limited. Under certain circumstances, exceeding the power limits can cause interruption of power to one or more of the devices, thus introducing a source of communication failures. To ensure reliable communications, an attempt to increase a power consumption of a first powered device in a power group is first reviewed to determine if the increase will cause a supplied power of the group to exceed a maximum power of the group. If the increase will cause the maximum power to be exceeded, the increase is modified, in some circumstances, to fit within the maximum power level. Alternatively, power consumption of a lower priority device is reduced to accommodate the requested power consumption increase.
    Type: Application
    Filed: October 14, 2020
    Publication date: April 14, 2022
    Inventors: Oscar Ernohazy, Joshua Rosenthal, Jason Harris, John James Musante, Shmuel Shaffer