Abstract:
Disclosed is a system for organizing and storing information about multiple peer identities. New certificates are introduced that enable a user to efficiently create, modify, and delete identities and groups. New storage structures enable the user to list and search through existing identities, groups, and their related certificates. An identity certificate contains information about a peer identity. A group root certificate is created by a user when he decides to create a new group. When the group creator user wishes to invite another entity to join the group, it creates another type of certificate called a group membership certificate. The group membership certificate is logically “chained” to the group root certificate. The invitee checks the validity of these certificates by checking that the chaining has been properly done. The invitee may then be allowed to invite other entities to join the group by sending out its own group membership certificates.
Abstract:
A cash withdrawal system and method are provided. The system enables the withdrawal of cash associated with a withdrawal cash user at merchant locations.
Abstract:
An integrated circuit (IC) includes a first I/O cell, a logic cell, a trigger signal generation circuit, and a second I/O cell having a voltage selection pin. I/O interfaces of the first I/O cell receive first and second supply voltages, respectively, and I/O interfaces of the second I/O cell receive third and fourth supply voltages, respectively. The first I/O cell generates a first trigger signal when the first supply voltage reaches a first predetermined voltage. The logic cell receives the first trigger signal and generates a safe-state signal. The trigger signal generation circuit generates a second trigger signal when the third supply voltage reaches a second predetermined voltage. The voltage selection pin receives the safe-state signal and the second trigger signal and sets the second I/O cell in a safe-state mode, which protects the second I/O cell from over voltage damage.
Abstract:
A system for reducing dynamic power consumption of a wakeup source includes a receiver interface coupled to the wakeup source. A data packet, received by the receiver interface, transmits the data packet to the wakeup source. The wakeup source processes the data packet to identify a predetermined code for initiating a wakeup sequence. The wakeup source is put into a deep sleep mode if it is idle for a predetermined time period.
Abstract:
The invention relates to a data packet transmission process in a communication system comprising at least one terminal (UE) communicating with a base station (BS), the process comprising at least one transmission (S4) of the data packet with a given power, from the terminal to the base station based on a HARQ scheme to obtain a residual packet error rate PERres after a number of transmissions Trn, the process being characterised in that it comprises a step (S) for the joint selection of the following parameters: the number of transmissions Trn; the target packet error rate PERtg(i) of each transmission i, where i=1, . . . , Trn, to arrive at the residual packet error rate PERres; and the modulation and coding scheme m corresponding to each target packet error rate PERtg(i) so as to minimise the data packet transmission power.
Abstract:
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
Abstract:
Establishing proof of authorized receipt of information between two recipients involves a sender developing an asymmetric key pair and sending one key to each of the two recipients. A first recipient develops a challenge and sends it to the second recipient. The second recipient uses a first key to encrypt the challenge and return it to the first recipient. The first recipient decrypts the response using the second key. A correct response allows the first recipient to trust that the second recipient has an authorized copy of the information because they each have a key associated with the information that came from the sender. No prior relationship between the recipients is assumed and a public key infrastructure is not required.
Abstract:
A semiconductor integrated circuit (IC) chip includes at least one core logic module located in a central area of the chip and having a core input/output (I/O) and a plurality of I/O pads disposed on a periphery of the chip. Narrow logic blocks including buffers and delay elements separate the core logic module from the I/O pads. The core I/O is coupled to the I/O pads by way of the buffers and delay elements of the narrow logic blocks.
Abstract:
A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.
Abstract:
Collaboration between collaborative endpoints may be facilitated by a serverless publication service of a collaborative services platform. The serverless publication service may be configured to accept communicative connections from the collaborative endpoints. Users of the collaborative services platform may publish their associated collaborative presences with the serverless publication service. For example, the collaborative presence of a user may include information with respect to valid collaborative endpoints for the user and collaborative capabilities at those endpoints. Subscriptions to published collaborative presences may be placed through the serverless publication service. A collaborative presence subscribe message may specify a subscription to a collaborative presence of a user. Upon receipt of a presence subscribe message, if there is no subscription policy with respect to the sender, the recipient may be queried for a subscription policy with respect to the sender. The subscription may be accepted in accordance with the subscription policy.