Pseudo-random Sequence Scrambling Patents (Class 380/268)
  • Patent number: 10701649
    Abstract: Disclosed are a method for transmitting a synchronization signal and a base station therefor, the method comprising: generating a codebook including a second precoder defined by concatenation of first precoders, which corresponds to a plurality of antenna subarrays, respectively; generating a synchronization sequence by multiplying, by a weight, the same reference sequence input over a plurality of time intervals, for each antenna subarray; and repeatedly transmitting a synchronization signal generated by applying the second precoder to the generated synchronization sequence, through the plurality of antenna subarrays, wherein the reference sequence is different for each of the plurality of antenna subarrays, and a combination of the reference sequence and the weight indicates additional information transmitted to a terminal.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: June 30, 2020
    Assignee: LG ELECTRONICS INC.
    Inventors: Kilbom Lee, Jiwon Kang, Kitae Kim, Heejin Kim
  • Patent number: 10665137
    Abstract: An inconsistency in shares is detected with a small volume of communications traffic. n inconsistency detecting devices generate random numbers si and make the random numbers si public. The n inconsistency detecting devices generate a common random number s which is the sum total of the random numbers s0, . . . , sn?1. The n inconsistency detecting devices calculate shares [c]i. The n inconsistency detecting devices generate shares [r]i, each of which would become a random number r by reconstruction. The n inconsistency detecting devices calculate shares [d]i, each of which would become a judgment value d by reconstruction. One inconsistency detecting device receives shares [d]1, . . . , [d]n?1 from n?1 inconsistency detecting devices. The one inconsistency detecting device restores n?k shares [d]?k, . . . , [d]?n?1 from k shares [d]0, . . . , [d]k?1. The one inconsistency detecting device judges, for j=k, . . . , n?1, whether or not a share [d]j and a share [d]?j coincide with each other.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: May 26, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
  • Patent number: 10660052
    Abstract: A method for signal transmission and reception on an unlicensed band by a terminal in a wireless communication system, according to an embodiment of the present invention, comprises the steps of: receiving a reference signal that has been generated from a scrambling sequence having initial values that vary every 10 subframes; and receiving a downlink signal on the basis of the reference signal, wherein the seed value of the variation pattern of the initial values are determined on the basis of an operator of a base station that transmits the downlink signal on the unlicensed band.
    Type: Grant
    Filed: September 7, 2015
    Date of Patent: May 19, 2020
    Assignee: LG ELECTRONICS INC.
    Inventors: Hyukjin Chae, Joonkui Ahn, Hanbyul Seo
  • Patent number: 10623176
    Abstract: An information-processing device is provided with: a plaintext input unit for inputting plaintext; an initial vector generation unit for generating an initial vector; a common key block encryption unit for performing common key block encryption on the initial vector and generating an encrypted initial vector; a pseudorandom number generation unit which, accepting the encrypted initial vector as input, generates a pseudorandom number series in the same length as the plaintext; a keyed hash unit which, accepting the first portion of a ciphertext in which the pseudorandom number series and the plaintext are exclusive-OR'ed as input, generates a hash value; and a ciphertext output unit for concatenating the second and first portions of a ciphertext in which the hash value and the encrypted initial vector are exclusive-OR'ed and outputting the concatenated portions as a ciphertext.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: April 14, 2020
    Assignee: NEC CORPORATION
    Inventor: Kazuhiko Minematsu
  • Patent number: 10615960
    Abstract: Implementations of the present disclosure include receiving, by a consensus node from a first account, a digitally signed copy of a commitment value of a transaction amount, a second random number encrypted using a public key of the first account, a third random number encrypted using a public key of the second account, one or more range proofs, and a set of values generated based on one or more selected random numbers. The consensus node then verifies a digital signature corresponding to the digitally signed copy using a public key of the first account corresponding to a private key used to generate the digital signature. It also updates the balance of the first account and a balance of the second account based on the amount of the balance transfer if the first random number, the second random number, and the third random number are the same.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: April 7, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Wenbin Zhang, Baoli Ma
  • Patent number: 10567351
    Abstract: The present invention provides a simple and efficient cipher and key generation and selection capability from a predetermined, randomly changing, fixed size matrix (N) of ciphers and keys resulting in a very high-order approximation (Nr,c??) of a true One Time Pad for encryption solutions such as the CipherLoc Polymorphic Key Progression Algorithmic Cipher Engine. The ciphers are randomly selected from a pool of user supplied ciphers, FIPS 140-2 or other certified ciphers and the keys are produced from various methods for generating a key that includes reading a data stream from a network or a Cryptographic Pseudo Random Number Generator (CPRNG)/Pseudo Random Number Generator (PRNG) or a Predetermined Cryptographic Key Generator (PCKG) or any combination of all. Ciphers and generated keys are randomly paired and stored in a volatile matrix for use by an encryption solution.
    Type: Grant
    Filed: July 12, 2018
    Date of Patent: February 18, 2020
    Assignee: Cipherloc Corporation
    Inventors: Albert Henry Carlson, Robert LeBlanc, Robert Carlson, Patrick Doherty, Carlos Gonzales
  • Patent number: 10515358
    Abstract: Embodiments of the present invention are directed to methods, systems, apparatuses, and computer-readable mediums for generating and providing a transaction token that may provide contextual information associated with the token. Accordingly, the transaction token may provide any entities within a transaction processing system immediate information about the context in which the token was generated, how the token may be used, and any other information that may be pertinent to processing the token.
    Type: Grant
    Filed: October 20, 2014
    Date of Patent: December 24, 2019
    Assignee: Visa International Service Association
    Inventors: Sekhar Nagasundaram, Ajit Gaddam, Selim Aissi
  • Patent number: 10445629
    Abstract: Methods and apparatus for generating a secure QR code. In an embodiment, a directory service computer receives a secure QR code request from a merchant device that includes an acquirer financial institution (FI)-signed certificate. The directory service computer verifies the identity of a merchant, identifies a merchant identifier (ID), establishes an encrypted and Pinned SSL tunnel with the merchant device, and receives via the encrypted and Pinned SSL tunnel from the merchant device, a transaction message including a transaction amount, a universal unique identifier (UUID), and a transaction identifier (ID). The directory service computer then generates a Hash value, generates a dynamic secure QR code by combining the Hash value, the transaction ID and the merchant ID, and transmits the dynamic secure QR code data to the merchant device to conduct a purchase transaction.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: October 15, 2019
    Assignee: Mastercard International Incorporated
    Inventors: Irina Singh, Suman Rausaria, Shanthan Subramaniam, Sandeep Malhotra
  • Patent number: 10419249
    Abstract: A radio access node selects an initialization value for a scrambling sequence to be applied to a message based on whether the message is intended for a non-standard device. The initialization value is selected from among at least a first value corresponding to a standard device type and a second value corresponding to a non-standard device type. The radio access node generates the scrambling sequence using the initialization value, scrambles the message using the scrambling sequence, and transmits the message.
    Type: Grant
    Filed: May 11, 2016
    Date of Patent: September 17, 2019
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Oskar Mauritz
  • Patent number: 10403173
    Abstract: NADO Cryptography Using One-way Functions is a symmetric cryptography for encrypting and decrypting information. The NADO process introduces some novel concepts and methods to cryptography: (1) The notion of a key generator is presented that eliminates the dependence of the cryptographic security on a single, static cryptography key. (2) A key generator updating method built with one-way functions exhibiting the avalanche effect that generates an unpredictable sequence of keys as the encryption or decryption algorithm executes; (3) An sequence of unpredictable permutations that diffuse the informations across the whole block. (4) An sequence of unpredictable permutations that act as substitution boxes. (4) The use of key generator updating and one-way functions that exploit the avalanche effect to update the permutations in (3) and (4). NADO using one-way functions can be implemented efficiently in hardware or in software.
    Type: Grant
    Filed: June 1, 2014
    Date of Patent: September 3, 2019
    Assignee: Fiske Software, LLC
    Inventor: Michael Stephen Fiske
  • Patent number: 10285116
    Abstract: Systems and methods for admitting new nodes into an existing network, for example a MoCA network. As a non-limiting example, various aspects of the present disclosure provide systems and methods for adding a new node to an existing network without requiring on-site manual configuration, for example utilizing communication between the new node and a network coordinator of the existing network prior to admission of the new node to the existing network.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: May 7, 2019
    Assignee: Maxlinear, Inc.
    Inventors: Yoav Hebron, Na Chen, Ronald Lee
  • Patent number: 10264297
    Abstract: In some implementations, a system is capable of dynamically associating content streams to improve a user's viewing experience while accessing primary content. To accomplish this, the CMS uses content association data assigning secondary content items to the primary content. Secondary content items can be assigned to designated frames of the primary content so that the secondary content items are presented to user at specified time points during the playback of the primary content. Secondary content items can represent content that is related to the subject matter of the primary content, or content that a user may be interested in accessing while viewing the primary content.
    Type: Grant
    Filed: September 13, 2017
    Date of Patent: April 16, 2019
    Assignee: Perfect Sense, Inc.
    Inventors: David Gang, Bryan Morgan
  • Patent number: 10249812
    Abstract: A filter includes: an input terminal; an output terminal; and a ladder circuit that includes one or more series acoustic wave resonators connected in series between the input terminal and the output terminal and one or more parallel acoustic wave resonators connected in parallel between the input terminal and the output terminal, and in which characteristic impedance of at least one point in a pathway between the input terminal and the output terminal in a passband is greater than at least one of input impedance of the input terminal and output impedance of the output terminal in the passband.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: April 2, 2019
    Assignee: TAIYO YUDEN CO., LTD.
    Inventor: Yoshio Satoh
  • Patent number: 10225082
    Abstract: A random value generator is provided that comprises a carbon nanotube structure that generates a random output current in response to a voltage input. The random value generator includes a random value output circuit coupled to the carbon nanotube structure that receives the random output current from the carbon nanotube structure and generates a random output value based on the received random output current from the carbon nanotube structure.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: March 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Pau-Chen Cheng, Shu-Jen Han, Jianshi Tang
  • Patent number: 10182346
    Abstract: According to one embodiment of the present specification, a method for transmitting security data is disclosed. The method for transmitting security data can comprise the steps of: outputting a first sequence by scrambling a bit stream of dummy data; outputting a second sequence by scrambling the security data to be transmitted by using the bit stream; and transmitting a first code word and a second code word obtained by encoding the first sequence and the second sequence.
    Type: Grant
    Filed: October 17, 2014
    Date of Patent: January 15, 2019
    Assignee: LG ELECTRONICS INC.
    Inventors: Daesung Hwang, Joonkui Ahn, Byounghoon Kim
  • Patent number: 10116447
    Abstract: An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a positive identification and verification response from the user, the mobile device may generate a cryptogram using a user identification (ID) associated with the user, a timestamp, a device ID associated with the mobile device, a service provider application ID associated with the service provider application, and a service provider device ID. The mobile device may transmit the generated cryptogram, the user ID, the timestamp, the device ID, the service provider application ID, and the service provider device ID, to a service provider computer associated with the service provider application. The service provider computer may decrypt the cryptogram and compare the decrypted data elements to the received data elements to validate and authenticate the user.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: October 30, 2018
    Assignee: Visa International Service Association
    Inventors: James Gordon, Roopesh Joshi, David Horton
  • Patent number: 10078492
    Abstract: A method for using cellular automata to generate quality pseudo-random numbers, which may be used in cryptographic and other applications. A cellular automaton is a decentralized computing model that enables the performance of complex computations with the help of only local information. In general, cellular automata comprise a plurality of identical basic memory building blocks that are discrete in time and space, where the structure evolves over time according to a local transition rule. Cellular automata can be used in information security as an alternative for classic Feedback Shift Registers (FSRs) for pseudo-random sequence generation. The outputs of a pair of linear FSRs (LFSRs) act as continuous inputs to the two boundaries of a one-dimensional or two-dimensional elementary cellular automata.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: September 18, 2018
    Inventor: Karim Salman
  • Patent number: 10044478
    Abstract: The present disclosure relates to pseudo-randomization of unused resources at a medium access control layer (MAC) of a user equipment (UE). For example, the disclosure presents a method and an apparatus for determining that an uplink (UL) resource grant, associated with a first radio access technology (RAT), for the UE results in unused resources where there are a greater number of resources than available data for transmission at the UE, wherein the UE is configured to receive information associated with a second RAT, and wherein the first RAT is different from the second RAT, populating the unused resources, at a medium access control (MAC) layer, with pseudo-randomized bits, and transmitting at least a portion of the available data and the populated unused resources using the UL resource grant associated with the first RAT. As such, pseudo-randomization of unused resources at a medium access control layer (MAC) of a UE may be achieved.
    Type: Grant
    Filed: July 9, 2015
    Date of Patent: August 7, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Amit Gopilal Jain, Emilija Milorad Simic, Bao Vinh Nguyen, Dominic Gerard Farmer, Arif Ehsan, Dinesh Subramani, Duong Anh Hoang, Timothy Paul Pals
  • Patent number: 10009634
    Abstract: A method to identify content within a data stream, comprising: capturing a data stream, analyzing and filtering the data stream by isolating a test stream of the data stream and disabling the other sub-streams, applying the test stream to the application so as to produce an output, applying the output to a comparator, the comparator receiving a reference and determining by the comparator a distance between the application output and the reference, if the distance is below a predefined level, repeating the isolating step with a new test stream selected among the previous test stream, the new test stream being a subset of the previous test stream, if that the distance is above or equal a second predefined level, repeating the isolating step by selecting a different test stream from the data stream not already applied to the application.
    Type: Grant
    Filed: September 5, 2012
    Date of Patent: June 26, 2018
    Assignee: NAGRAVISION S.A.
    Inventors: Emmanuel Lafabrie, Salvatore Bocchetti, Bravo Pedro Lagunas, Frédéric Thabaret-Diebold
  • Patent number: 9932824
    Abstract: A method for transmitting data from a downhole tool is provided. In one embodiment, the method includes acquiring data for a formation fluid through downhole fluid analysis with a downhole tool in a well. The acquired data can include optical spectrum data measured with a spectrometer and other data. The method also includes generating time blocks of the acquired data and transmitting the time blocks from the downhole tool. More particularly, generating the time blocks may include compressing at least some of the optical spectrum data according to a first compression technique and compressing at least some of the other data according to one or more additional compression techniques. The compressed data can be packaged into the time blocks such that at least some of the time blocks include both compressed optical spectrum data and compressed other data for the formation fluid. Additional methods, systems, and devices are also disclosed.
    Type: Grant
    Filed: October 21, 2015
    Date of Patent: April 3, 2018
    Assignee: SCHLUMBERGER TECHNOLOGY CORPORATION
    Inventors: Bo Yu, Kai Hsu, Julian Pop, Kentaro Indo
  • Patent number: 9923876
    Abstract: A user inserts a received random sequence into the user's password or PIN. The user enters and transmits this randomized password to a service provider. The service provider extracts the password to determine whether to authenticate the user.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: March 20, 2018
    Assignee: PAYPAL, INC.
    Inventor: Hadi Nahari
  • Patent number: 9876767
    Abstract: User equipment decrypt information received in a first frame over an air interface during device-to-device (D2D) communication with another user equipment. The information is decrypted using a cryptographic function that is applied to a security key and a first frame number of the first frame.
    Type: Grant
    Filed: May 9, 2014
    Date of Patent: January 23, 2018
    Assignee: Alcatel Lucent
    Inventors: Fang-Chen Cheng, Said Tatesh
  • Patent number: 9866389
    Abstract: Disclosed herein are techniques and systems for transmitting a multi-broadcast signal from a wireless broadcasting device (or beacon) as part of a beacon recognition process. Specifically, the multi-broadcast signal may be in the form of multiple packets that are broadcast from the beacon within a recognition time period. A process may include creating a first packet having a first identifier (ID) and a randomly generated value, broadcasting the first packet from the beacon, generating a second ID based at least in part on the randomly generated value included in the first packet, and broadcasting, within a period of time from the broadcast of the first packet, a second packet having the second ID and a device ID that uniquely identifies the beacon. A mobile device in proximity to the beacon may include logic to detect and interpret a multi-broadcast signal from the beacon.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: January 9, 2018
    Assignee: FOOTMARKS, INC.
    Inventors: Ryan Preston Reed, Casey Roger Graika
  • Patent number: 9807606
    Abstract: A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: October 31, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Chunxuan Ye, Alexander Reznik
  • Patent number: 9749966
    Abstract: A radio frequency communication device (100) comprising a radio frequency communications interface (130) and a controller (110), wherein said controller (110) is configured to establish network communication with a network node (310) and to establish device-to-device communication with a second radio frequency communication device (325) via said radio frequency communication interface (130). The controller is further configured to determine whether there is to be performed a simultaneous transmission comprising a network transmission over said network communication with said network node (310) and a D2D transmission over said device-to-device communication with said second radio frequency communication device (325); determine if there is a transmission problem related to said simultaneous transmission; and if so determine a mitigation technique; and perform said network transmission and said D2D transmission according to said mitigation technique to mitigate said transmission problem.
    Type: Grant
    Filed: December 3, 2013
    Date of Patent: August 29, 2017
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Bengt Lindoff, Gabor Fodor, Muhammad Kazmi, Stefan Parkvall
  • Patent number: 9716587
    Abstract: A halting key derivation function is provided. A setup process scrambles a user-supplied password and a random string in a loop. When the loop is halted by user input, the setup process may generate verification information and a cryptographic key. The key may be used to encrypt data. During a subsequent password verification and key recovery process, the verification information is retrieved, a user-supplied trial password obtained, and both are used together to recover the key using a loop computation. During the loop, the verification process repeatedly tests the results produced by the looping scrambling function against the verification information. In case of match, the trial password is correct and a cryptographic key matching the key produced by the setup process may be generated and used for data decryption. As long as there is no match, the loop may continue indefinitely until interrupted exogenously, such as by user input.
    Type: Grant
    Filed: August 8, 2012
    Date of Patent: July 25, 2017
    Assignee: ENTIT SOFTWARE LLC
    Inventor: Xavier Boyen
  • Patent number: 9710623
    Abstract: A cryptographic system comprises a white-box implementation of a function; an implementation of a cryptographic algorithm; and an implementation of a combining operation for establishing cryptographically processed data in dependence on an outcome of the function and in dependence on an outcome of the cryptographic algorithm. The combining operation comprises combining an outcome of the cryptographic algorithm with an outcome of the function. Alternatively, the combining operation comprises combining an outcome of the function with a received data element to obtain a combination outcome and applying the cryptographic algorithm to the combination outcome.
    Type: Grant
    Filed: March 2, 2009
    Date of Patent: July 18, 2017
    Assignee: Irdeto B.V.
    Inventors: Wilhelmus P. A. J. Michiels, Paulus M. H. M. A. Gorissen
  • Patent number: 9712301
    Abstract: The present invention relates to a wireless communication system, and discloses a method and a device for transmitting/receiving a downlink reference signal in a wireless communication system. The present invention provides a way for maintaining orthogonality of a reference signal between cells in a multi-cell operation.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: July 18, 2017
    Assignee: LG Electronics Inc.
    Inventors: Hanbyul Seo, Kijun Kim, Inkwon Seo
  • Patent number: 9680799
    Abstract: An apparatus with one or more masking rules stored in a memory receives unmasked data associated with a first session identifier via a network and converts the received unmasked data into masked data by applying the one or more masking rules to the unmasked data. The apparatus generates a first mapped identifier associated with the unmasked data and first session identifier. The apparatus also receives, via a network, a second mapped identifier associated with a second session identifier. Upon receiving the second mapped identifier and second session identifier, the apparatus determines whether the second session identifier corresponds to the first session identifier and finds the first mapped identifier corresponding to the received second mapped identifier. The apparatus retrieves and sends the unmasked data associated with the first mapped identifier.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: June 13, 2017
    Assignee: Bank of America Corporation
    Inventors: Shankar Ramasubramanian Iyer, Maria Auxilia Dominique, Navanith R. Keerthi, Suresh G. Nair
  • Patent number: 9569774
    Abstract: A method and system for processing feedback entries received from software provided by a vendor to an end user machine. The end user machine includes the software, a feedback module, and a database. The feedback module: generates an encryption Ek0 of an identification tag FE(0) using a secret key k(0) where Ek0=E(k(0),FE(0)); generates a parameter Hn0 using a secret key n(0) where Hn0=Hash(n(0)?Ek0); generates a parameter Hs0 using a secret key s(0) where Hs0=Hash(s(0)?Ek0); and sends Ek0, Hn0, and Hs0 to the database.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: February 14, 2017
    Assignee: International Business Machines Corporation
    Inventor: Vijil Enara Chenthamarakshan
  • Patent number: 9548862
    Abstract: This disclosure describes cryptographic secure implementation of a Pseudo Random Number Generator (PRNG) architecture based on existing Fortuna algorithm, but providing improvements thereupon for gathering and measuring entropy. The improvement includes a unique step of initial seeding that is not covered by Fortuna. The solution should be adapted to a variety of computing and communicating devices, including mobile devices.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: January 17, 2017
    Assignee: Safelogic, Inc.
    Inventor: Ray Potter
  • Patent number: 9547860
    Abstract: A system for processing feedback entries received from software provided by a vendor to an end user machine. The end user machine includes the software, a feedback module, and a database. The feedback module: establishes a secret key k(0) and a secret key n(0; generates an identification tag FE(0); generates a secret key s(0); generates an encryption Ek0 of the identification tag FE(0) using the secret key k(0) where Ek0=E(k(0),FE(0)); generates a parameter Hn0 using the secret key n(0) where Hn0=Hash(n(0)?Ek0); generates a parameter Hs0 using the secret key s(0) where Hs0=Hash(s(0)?Ek0); sends Ek0, Hn0, and Hs0 to the database; and sends Ek0 and Hn0 to the vendor.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: January 17, 2017
    Assignee: International Business Machines Corporation
    Inventor: Vijil Enara Chenthamarakshan
  • Patent number: 9544889
    Abstract: A method for processing physical downlink control channel data, a transmitting end, and a user equipment are provided and relate to the field of communications, which can extract a scrambling sequence in multiple modulation modes, so that scrambling and descrambling are performed on physical downlink control channel data in multiple modulation modes. The method includes: generating a scrambling sequence corresponding to a control channel element according to an index number of the control channel element and/or a modulation mode used by the control channel element; performing scrambling on physical downlink control channel data by using the scrambling sequence; and sending the scrambled physical downlink control channel data to a user equipment. The embodiments of the present application are used to perform scrambling and descrambling on physical downlink control channel data.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: January 10, 2017
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Yuchun Wu, Shulan Feng
  • Patent number: 9529949
    Abstract: Mechanisms for generating a micro node circuit path are disclosed. A first nodal list is generated that identifies a grid of macro nodes at a first resolution that is referenced to an area. The first nodal list is modified to identify a reference macro node circuit path through the grid of macro nodes. A second nodal list is generated that identifies a grid of micro nodes that is referenced to the area at a second resolution that is a greater resolution than the first resolution. The second nodal list is modified to identify at least one derived micro node circuit path that extends through a plurality of the micro nodes based on an offset with respect to the reference macro node circuit path.
    Type: Grant
    Filed: November 25, 2014
    Date of Patent: December 27, 2016
    Assignee: Lockheed Martin Corporation
    Inventors: V. Edward Gold, Jr., Allen L. Burke
  • Patent number: 9529465
    Abstract: Methods of obtaining input on a physical input device are provided. A virtual input device is superimposed over the physical input device. The virtual input device has a different layout than the physical input device, such that a first input on the physical input device is mapped to a different input on the virtual input device. In another aspect, methods of securing a transaction according include displaying a first input screen to a user, encrypting a scrambling key using a public key, the scrambling key defining a second input screen that has a different layout from the first input screen, transmitting the encrypted scrambling key to a user device, receiving an input from the user device, and mapping the input to the second input screen.
    Type: Grant
    Filed: December 2, 2013
    Date of Patent: December 27, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Andrea Forte, Juan A. Garay, Trevor Jim, Evgene Vahlis
  • Patent number: 9497755
    Abstract: The present invention relates to a wireless communication system. In detail, provided are a method by which a terminal receives a control channel signal in a wireless communication system, and an apparatus for same, including the steps of: receiving a subframe including a plurality of control channel sets, wherein each control channel set includes a plurality of control channel candidates; and monitoring at least one control channel set in the subframe for receiving the control channel signal, wherein the plurality of control channel candidates are scrambled by a scrambling sequence having a control channel set-specific initialization value in each control channel set.
    Type: Grant
    Filed: October 7, 2013
    Date of Patent: November 15, 2016
    Assignee: LG ELECTRONICS INC.
    Inventors: Myoungseob Kim, Seungmin Lee, Hakseong Kim, Hanbyul Seo
  • Patent number: 9466058
    Abstract: An approach for associating a card (e.g., a transaction card, an identification card, etc.) that corresponds to a primary account with one or more ancillary accounts (e.g., a library account, etc.) includes obtaining information from the card and associating that information with an ancillary account. The card may then be used to access the ancillary account. The card may be a transaction card and the primary account may be a financial account. The ancillary account may be a library account. When the card is a transaction card, fees associated with the ancillary account may be charged to the financial account.
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: October 11, 2016
    Assignee: Card Limited Corp.
    Inventor: Lori D. Kirkham
  • Patent number: 9453919
    Abstract: A method for acquiring a Gold code, obtained as a sum of a first M-sequence (x) and a second M-sequence (yi), the first M-sequence being generated by a first generator polynomial (gx) and the second M-sequence being generated by a second generator polynomial (gy), the weight of the first generator polynomial being lower than the weight of the second generator polynomial, the acquiring method involving a first step of message passing decoding according to a first bipartite graph the edges of which are determined by the coefficients of the first generator polynomial, a decimation step using a predetermined decimation factor, and a second step of message passing decoding according to a second bipartite graph the edges of which are determined by a third generator polynomial having a minimum weight generating a third M-sequence having the same length as that of the second M-sequence.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: September 27, 2016
    Assignee: Commissariat a l'energie atomique et aux energies alternatives
    Inventor: Mathieu Bouvier Des Noes
  • Patent number: 9385996
    Abstract: Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined whether the data access application has available a shared encryption key that is available to the control application. If a shared encryption key is available, the shared encryption key is used to encrypt a request for access to the data. If a shared encryption key is not available, a shared encryption key is negotiated with the control application, and the negotiated shared encryption key is used to encrypt the request for access to the data. The control application receives the encrypted request, decrypts the encrypted request using the shared encryption key, and makes the data stored on the computing device in encrypted form available to the data access application in response to the decrypted request.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: July 5, 2016
    Assignee: Good Technology Corporation
    Inventors: Sean Michael Quinlan, Kevin Charles Lohman, Haniff Somani, Peter Maximilian Barker, Nicholas Benedict Van Someren
  • Patent number: 9218158
    Abstract: Shift register based circuits include non-binary polynomial calculation circuits, coder circuits, scramblers, descramblers and sequence generators that apply non-binary two-input/single output switching functions wherein at least one input contains a non-binary inverter or multiplier. A combination of a two-input/single output non-binary switching device with at least one non-binary inverter at an input is advantageously reduced to a single device that implements a single non-binary switching function. The reduced single device may be an electronic memory that stores the truth table of the single non-binary switching function.
    Type: Grant
    Filed: February 14, 2015
    Date of Patent: December 22, 2015
    Assignee: Ternarylogic LLC
    Inventor: Peter Lablans
  • Patent number: 9213857
    Abstract: The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: December 15, 2015
    Assignee: Security First Corp.
    Inventors: Mark S. O'Hare, Rick L. Orsini
  • Patent number: 9178890
    Abstract: A code for accessing a resource having a customer account associated therewith is presented via a secondary device, and authentication data indicative of the code that was presented is received from a primary device. The primary device is identified as a trusted device associated with the customer account responsive to receiving the authentication data therefrom, and the secondary device is authenticated for access to the resource responsive to identification of the primary device as the trusted device associated with the customer account.
    Type: Grant
    Filed: December 10, 2013
    Date of Patent: November 3, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Bharath Kumar Bhimanaik
  • Patent number: 9173234
    Abstract: Certain aspects of the present disclosure relate to techniques for medium reservation in the case of multi-user (MU) communications. Multiple mechanisms are supported for protecting MU transmissions, wherein appropriate control messages can be exchanged between an access point and served user stations before transmitting downlink data packets.
    Type: Grant
    Filed: March 30, 2011
    Date of Patent: October 27, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Simone Merlin, Santosh Paul Abraham, Hemanth Sampath, Vincent Knowles Jones, Maarten Menzo Wentink, Mohammad Hossein Taghavi Nasrabadi, Sameer Vermani, Didier Johannes Richard Van Nee
  • Patent number: 9077692
    Abstract: Techniques are described for blocking unidentified encrypted communication sessions. In one embodiment, a device includes an interface to receive a packet, an application identification module to attempt to identify an application associated with the packet, an encryption detection module to determine whether the packet is encrypted when the application identification module is unable to identify an application associated with the packet, and an attack detection module to determine whether the packet is associated with a network attack, to forward the packet when the packet is not associated with a network attack, and to take a response when the packet is associated with a network attack, wherein the encryption detection module sends a message to the attack detection module that indicates whether the packet is encrypted, wherein when the message indicates that packet is encrypted, the attack detection module determines that the packet is associated with a network attack.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: July 7, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Vladimir Sukhanov
  • Patent number: 9078266
    Abstract: Access terminals are adapted to facilitate discontinuous transmission (DTX). According to one example, an access terminal can employ a short timescale DTX mode and a long timescale DTX mode independent of one another. The access terminal can determine whether a first set of predetermined factors are present. When the first set of factors are determined to be present, the access terminal may enable a short timescale DTX mode, independent of whether a long timescale DTX mode is enabled or not. A determination may also be made whether a second set of predetermined factors are present. When the second set of predetermined factors are determined to be present, the access terminal may enable a long timescale DTX mode, independent of whether the short timescale DTX mode is enabled or not. Other aspects, embodiments, and features are also included.
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: July 7, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Jun Hu, Rashid Ahmed Akbar Attar, Donna Ghosh, Christopher Gerard Lott, Linhai He
  • Patent number: 9042549
    Abstract: Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: May 26, 2015
    Assignee: Qualcomm Incorporated
    Inventors: Lu Xiao, Yong Jin Kim, Zhanfeng Jia, David Jonathan Julian
  • Patent number: 9036821
    Abstract: A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
    Type: Grant
    Filed: January 21, 2014
    Date of Patent: May 19, 2015
    Assignee: InterDigital Technology Corporation
    Inventors: Alexander Reznik, Alain C. Briancon, Yevgeniy Dodis, Yogendra C. Shah, Chunxuan Ye, Robert A. DiFazio, Inhyok Cha
  • Patent number: 8948388
    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: February 3, 2015
    Assignee: Certicom Corp.
    Inventors: Daniel Richard L. Brown, Scott Alexander Vanstone
  • Patent number: 8934633
    Abstract: High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are as follows: (1) A seed key is shared between a transmitter and a receiver in advance. Random numbers are transmitted using carrier light accompanied by fluctuations and bases that are decided by random numbers. The transmitter and receiver compare a shared basis that is determined by the seed key with the random basis, and decompose the random numbers superimposed on each bit into two sequences, based on whether the shared basis coincides with the random basis or not. Error correction is processed for each sequence in the receiver, and then the random numbers are shared between the transmitter and the receiver. (2) The amount of the random numbers shared between the transmitter and the receiver is reduced to secret capacity through privacy amplification, and the resultant random numbers are used as a secret key.
    Type: Grant
    Filed: January 17, 2011
    Date of Patent: January 13, 2015
    Assignee: Hitachi, Ltd.
    Inventor: Tatsuya Tomaru
  • Patent number: 8923249
    Abstract: A wireless communications method is provided. The method includes employing a processor executing computer executable instructions stored on a computer readable storage medium to implement various acts. The method also includes generating cyclic shifts for a sequence generator by masking shift register output values with one or more vectors. The method includes forwarding the sequence generator to a future state based in part on the output values and the vectors.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: December 30, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Byoung-Hoon Kim, Juan Montojo, Peter Gaal