top of page

334 results found

  • Video Coding Standards and Algorithms - Evolution & Patent Analysis

    What is Video Coding Format? Video coding format is defined as a format for storing and transmitting digital video content (such as in a data file or bitstream) from one system to the other system. It usually employs a standardized video compression technique, which is based on discrete cosine transform (DCT) coding and motion correction. For this purpose, a certain set of video coding specifications/documents that specify and store the technical details of these formats are available. These documents are accepted as technical standards by standardization groups, including International Standards Organization (ISO) and the International Telecommunications Union (ITU), and are hence referred to as video coding standards. In the past, a number of video coding formats have been documented and further standardized, including H.120, H.261, Motion JPEG (MJPEG), MPEG-1 Part 2, H.262 / MPEG-2 Part 2 (MPEG-2 Video), DV, H.263, MPEG-4 Part 2 (MPEG-4 Visual), Motion JPEG 2000 (MJ2), Advanced Video Coding (H.264 / MPEG-4 AVC), Theora, VC-1, and Apple ProRes. Further, these video coding standards are further classified into three key groups which include DPCM (Differential pulse-code modulation), DCT (Discrete cosine transform), and DWT (Discrete wavelet transform) (Discrete wavelet transform). Video Coding Standards: A brief summary Starting from the 1980s, a number of video coding standards have been introduced. The table presents the brief of such video coding standards along with key remarks. Algorithms Used for Video Coding Standards In the past, a number of video coding standards have been published, which include H.120, H.261, MPEG-1 Part 2, MPEG-2 Part 2 (MPEG-2 Video), H.263, Motion JPEG 2000 (MJ2), H.264 / MPEG-4 AVC, Theora, H.265, AV1, and Versatile Video Coding (VVC / H.266). These standards follow a certain algorithm and thus are classified into different categories. Algorithm wise Video coding standards 1. DCT (Discrete Cosine Transform): The source image is divided into 8x8 pixel blocks. Further, the DCT is applied to each block from left to right and top to bottom. In response to this transformation, all block elements are compressed and then quantized by dividing by a few specific costs. The array of compressed blocks that represents the photo is saved in a much less amount of space. A DCT function returns a DCT coefficient matrix, including information in the frequency domain. The DCT coefficients are then quantized by dividing by a quantization matrix to reduce garage space. The block length cost also has an impact on the pleasure and compression ratio. 2. DWT (Discrete Wavelet Transform): DWT is simple to implement, reduces computing time, and eliminates irrelevant source facts. To create 2D wavelets, the picture is divided into sections with high frequency and low frequency runs. The two subsequent sub images contain both high- and low-frequency vertical statistics. Further, each sub pixel is vertically convolved with the wavelet and the scaling characteristic, resulting in two new separations. Thus, a single-stage wavelet transformation consists of a filtering operation that can decompose a 2D signal into four frequency bands. The generalized block diagram for DWT image/video compression/De-compression shows the source image divided into multiple frames followed by DWT transformation, quantization, encoding and outputting of the compressed frames. Patent Analysis The patent data in this article shows information related to video coding standards, including the patent filing trend across the globe and the top-rated assignees. The number of applications filed each year across the world. It is exciting to know that the patent filing trend jumped to a new level of more than 1000 applications in the year 2019 - 2021. However, in upcoming times, it is expected to grow as the research and development in this field are still ongoing. Apart from the top companies, many other companies are also indulged in the research process, including Canon, Samsung, Nokia, Huawei, Qualcomm, LG, etc. Henceforth, the trend in patent filing is expected to rise to a new level in the upcoming years. The top assignees in the field of video coding are presented. Out of all, Sony, with a total number of 2546 patents, holds the majority of shares, followed by Canon and LG Electronics. The other top companies/assignees that contribute to this area of research includes Qualcomm, Samsung, Huawei, Panasonic, Sharp, Intel, Toshiba, etc. Out of many other companies, the top most companies are working with the modified DCT algorithm and the advance video encoders. Such advancement has led to technological development in view of enhanced user experience for existing video services and appropriate performance levels for new media services over 5G networks. Besides the major US companies, a number of top companies like Alibaba, Kuaishou and Hikvision, as well as Korea-based Wilus Group are also working on the development of similar technology. Conclusion The future scope of video standards is very bright in view of the upcoming and trending technology. This includes the deep-learning based video coding, such as reducing the compression complexity, and power consumption. Thus, this will allow higher efficiency and better output. Apart from this, the other key elements related to video coding standards include – visual quality assessment, especially in view of PSNR (Peak Signal-to-Noise Ratio), Artificial intelligence-based encoding algorithms, Hybrid encoding/decoding algorithms, etc. Besides this, at the international level, the video encoder market is estimated to reach from $2.3B to $3.3B USD by 2027, with a CAGR of 7.6% from 2022 to 2027. This is due to the introduction of high-efficiency video coding standards for video encoding, the simplicity of connecting analogue cameras employing video encoders to a network, and the usage of cloud services to store vast amounts of data have all contributed to the market's rise. References https://einstein.informatik.uni-oldenburg.de/rechnernetze/dpcm.htm https://www.tutorialspoint.com/digital_communication/digital_communication_differential_pcm.htm https://mil.ufl.edu/nechyba/www/eel6562/course_materials/t5.wavelets/intro_dwt.pdf http://chenlab.ece.cornell.edu/Publication/Deepak/bookchap.pdf https://towardsdatascience.com/the-overview-of-video-coding-technique-f650aed6c6a4 F. Moreno and D. Aledo, "The DLMT hardware implementation. A comparative study with the DCT and the DWT," IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society, 2012, pp. 1591-1596, doi: 10.1109/IECON.2012.6388531 F. Moreno and D. Aledo, " Comparative Analysis between DCT & DWT Techniques of Image Compression," Journal of Information Engineering and Applications, Vol. 1, No. 2, 2011, pp. 9-17. https://www.globenewswire.com/news-release/2022/08/17/2500017/0/en/The-video-encoder-market-is-estimated-to-reach-USD-3-3-billion-by-2027-from-USD-2-3-billion-in-2022-with-a-CAGR-of-7-6-from-2022-to-2027.html

  • Electromagnetic Wave Absorbers – A Solution to Wave Pollution

    Over the past few years, there has been an indispensable increase in the demand for electromagnetic wave absorbers due to the problem of ‘wave pollution’ being aggravated by the fast-growing wireless industry. With the rapid advancement of the electronic gadget industry, countless electronic devices have become part and parcel of our lives. Almost all electronic devices such as computers, mobile phones, digital circuits, etc., are capable of emitting harmful electromagnetic wave radiations, which can even affect biological tissues and hence become a cause of deadly ‘cancer’ like diseases. This generates the dire need of focusing careful attention on the development of electromagnetic wave interference (EMI) shields which can prevent mankind from its adverse ramifications. What is Electromagnetic Wave Absorber? Electromagnetic wave absorbers are the materials that prevent the reflection or transmission phenomenon of electromagnetic radiations that are incident upon them. Instead, these materials absorb those electromagnetic radiations, which further depends upon many factors that determine the level of absorption they exhibit. The absorption percentage varies for different frequencies, thicknesses and type of material. Types of Electromagnetic Wave Absorbers Electromagnetic wave absorbers are mainly of two types: Resonant absorbers: The resonant absorbers are those which depend upon frequency due to the desired resonance of these materials at a particular wavelength. These absorbers ultimately rely upon the material's properties interacting with the incident radiations in a resonant way at a specific frequency. For instance, Salisbury screen, Jaumann absorber, crossed grating absorbers, etc., are resonant absorbers. Broadband absorbers: The broadband absorbers do not depend on a particular frequency, so they can work effectively across a broad spectrum. These absorbers generally rely on the materials whose properties are independent of frequency and, therefore, can absorb radiations over a large bandwidth. The typical electromagnetic spectrum is divided over a number of frequency bands and the electronic devices and phenomena operating in those frequency bands. These days, huge attention of researchers is focused on optimizing microwave absorbers as most of the mobile communication devices and the advent of 5G technology are causing major harm in the form of hazardous microwaves in this region which typically extends from 1 GHz to 100 GHz. Due to the fact that microwaves are a subpart of the entire electromagnetic spectrum, so microwave absorbing materials (MAMs) are interchangeably called as electromagnetic (EM) wave absorbers or EMI shielders/protectors. Working of Electromagnetic Absorbers Due to the speedy technological advancements in electromagnetic radiation emitting devices like radars, microwave ovens, computers, and medical equipment, etc., a lot of EM wave pollution is being produced, which is becoming a threat to mankind. This is equally hazardous to the electronic devices themselves and has harmful effects on them. Due to this reason, EMI shielding devices are in great demand these days. The phenomenon of shielding basically occurs through two mechanisms: Absorption of electromagnetic radiations (EMR) by particular particles Reflection of EMR in a particular direction However, the first one is generally preferred as it leads to proper attenuation of EMR. The figure below represents the working mechanism of microwave or electromagnetic wave absorbers through the process of absorption, transmission and reflection. For a material to be a good absorber, there should be zero or negligible transmission and reflection. For achieving less transmission and reflection percentage, a material should have strong dielectric properties, permanent magnetic properties like high saturation magnetization, large magneto-crystalline anisotropy, high permeability, high resistivity, high Curie temperature and low coercivity, etc. Properties such as high dielectric losses, high magnetic losses, and thermal stability are the desired attributes for EMI suppression applications. Although a lot of research work has already been done in this field but the achievement of optimum standards for electromagnetic wave absorbers such as very low reflection loss, wide absorption bandwidth, small matching thickness, and perfect impedance matching, is still a challenging task. Measurement of Absorption At high frequencies, reflection and transmission are easy to measure, so scattering parameters (S-parameters) are generally measured in order to determine the absorption capacity of a material. These are measured with the help of different analysers such as vector network analyser (VNA). The VNA measures the frequency response of a component or a network of components. Rather than voltage and current, the analyser measures the power of incoming and returning high-speed signals because the power of signals can be measured more accurately at high frequencies. The processor of VNA then calculates the return loss and insertion loss of the material. The analysed results are available in different formats such as real/imaginary; magnitude/phase; smith chart etc. The range of frequency for which the electromagnetic properties are tested and number of points across that frequency band become inputs to the VNA. The VNA measures the vector response of a high-speed signal to a network by applying a continuous wave at one frequency at a time. Different Techniques for Microwave Absorption Analysis: Open circuit technique In this technique, when an electromagnetic wave is incident on the sample, the wave is either reflected, or absorbed, or transmitted. The material is not blocked by any device so it is named as open-circuit technique. Here, Incident power = Reflected power + Transmitted power + Absorbed power The absorption percentage is calculated from experimentally obtained S-parameters from VNA as per the relation: Short circuit technique In this technique, the values of reflection loss are simulated at different thicknesses of the sample using experimentally obtained complex electromagnetic parameters. Here, it is assumed that a metal plate is placed on the back side of the material, so, this technique is also called as back-metal plate technique. When an electromagnetic wave is incident on the sample, the wave is either reflected or absorbed because transmission is blocked by the metal plate. Therefore, incident power is the sum of reflected and absorbed power only. Therefore, Incident power = Reflected power + Absorbed power The absorption percentage is calculated as: In this technique, reflection loss minima just correspond to absorption maxima so these terms can be used interchangeably. Impedance Matching For perfect absorption, the condition of impedance matching should be satisfied. Reflection loss is calculated as per the relation: For perfect absorption, there should be no reflection, i.e., Zn → 1. It means that the input impedance of the wave (Zi) should be equal to the characteristic impedance (Zo). Zo is equal to 377 Ω with no imaginary part, therefore, the real part of Zi should be close to 377 Ω and the imaginary part should be close to zero. The values of Zn are calculated and matched with the RL spectra. If the RL dips correspond to the values of Zn which are very close to unity, the condition of impedance matching is said to be fulfilled. Applications of Electromagnetic Wave Absorbers Electromagnetic wave (EMW) absorbers have many applications varying for different frequency bands of the electromagnetic spectrum. Some of them are mentioned below: Wireless Communications: EMW absorbers play an important role in absorbing the harmful radiations emitted in wearable devices, RFID systems, 4G/5G communications, satellite communications, cell phones, Wi-Fi devices, etc., to increase their safe use for mankind. Microwave Components: EMW absorbers are used in various microwave components such as filters, emitters, amplifiers, and switches, etc., for proper functionality. With the help of absorbers, these components are able to handle extremely high peak power levels. Energy Harvesting: EMW absorbers are used in solar cells and help to enhance the solar energy collection due to their high absorptivity. The cells are designed in such a way that the surface impedance is matched to free space which results in perfect absorption and hence, maximum energy harvesting. Sensors: EMW absorbers are used in various types of sensors such as multi-frequency sensors, healthcare sensors, thermal sensors, etc., for different application areas such as cancer detection, glucose level measurements, blood diseases diagnostics, etc. Consumer and Industrial electronics: EMW absorbers are widely used in the field of Electronics for mitigation of Electromagnetic interference (EMI), enhancement of electromagnetic compatibility of the devices and development of technology related to the EMI shielding. Defense and Aeronautics: EMW absorbers are largely used as radar absorbing materials in stealth technology such as hidden engines. These are used to lessen the intensity of the reflected signals from the aircraft coverings so that the enemies cannot easily detect defence aircrafts. The absorbers are formed in the form of thin layer absorbing paints and the aircrafts are coated with these paints. Imaging: Absorbers are needed in the field of imaging such as phase imaging, medical imaging and thermal imaging as different types of electromagnetic waves are employed in imaging purposes. For diminishing the mutual coupling of closely placed antennas. For mitigating the harmful effects of cavity resonance in enclosed microwave integrated circuits (MMIC). As protective shields in microwave ovens to prevent any leakage from the oven to the outer environment. Future Scope and Conclusion To recapitulate, according to the facts aforementioned above, one can reach to the conclusion that electromagnetic wave absorbers are being researched for a long time. However, due to the incessant increase in the use of wireless communications and various other upcoming technologies, there will be large occurrences of electromagnetic radiations so the concept of electromagnetic wave absorbers will grow significantly in the near future and their utilization will be enhanced in novel directions. There are many great options for the development of EM wave absorbers such as wide bandwidth absorbers instead of frequency selective absorbers. The concept of a unity absorber with zero reflection can be realized in the future with the use of metamaterials that derive their optimum usage from their geometry rather than their electromagnetic properties. References 1. Tirkey, M., & Gupta, N. (2019), The quest for perfect electromagnetic wave absorber: A review, International Journal of Microwave and Wireless Technologies, 11(2), 151-167, DOI: 10.1017/S1759078718001472 2. https://www.uib.no/en/hms-portalen/75292/electromagnetic-spectrum. 3. K.K. Kefeni et al. / Materials Science and Engineering B 215 (2017) 37–55, https://doi.org/10.1016/j.mseb.2016.11.002. 4. Chen, J, Hu, Z, Wang, G, Huang, X, Wang, S, Hu, X and Liu, M (2015) High-impedance surface-based broadband absorbers with interference theory. IEEE Transactions on Antennas and Propagation 63, 4367–4374, http://dx.doi.org/10.1109%2FTAP.2015.2459138 5. Munaga, P, Ghosh, S, Bhattacharyya, S and Srivastava, KV (2016) A fractal-based compact broadband polarization insensitive metamaterial absorber using lumped resistors. Microwave and Optical Technology Letters 58, 343–347, https://doi.org/10.1002/mop.29571 6. Yoo, YJ, Ju, S, Park, SY, Kim, YJ, Bong, J, Lim, T, Kim, KW, Rhee, JY and Lee, Y (2015) Metamaterial absorber for electromagnetic waves in periodic water droplets. Scientific Reports 5, 14018, DOI: 10.1038/srep14018. 7. Channabasappa, E and Egri, R System and method of using absorber-walls for mutual coupling reduction between microstrip antennas or brick wall antennas (September 23 2008) US Patent 7,427,949, https://patents.google.com/patent/US20070126620A1/en . 8. DyczijEdlinger, R, Kingsland, DM, Peng, G, Perepelitsa, SG, Polstyanko, SV and Lee, JF (1996) Application of anisotropic absorbers to the analysis of MMIC devices by the finite element method. IEEE transactions on magnetics 32, 854–857, https://www.academia.edu/24169553/Application_of_anisotropic_absorbers_to_the_analysis_of_MMIC_devices_by_the_finite_element_method . 9. Montaser, AM, Design of metamaterial absorber for all bands from microwave to terahertz ranges. Int. J. Adv. Res. Electron. Commun. Eng. 5, 1475–1481, 2016. 10. Lee, D, Kim, HK, and Lim, S (2017) Textile metamaterial absorber using screen printed channel logo. Microwave and Optical Technology Letters 59, 1424–1427, https://doi.org/10.1002/mop.30558. 11. Sen, G, Islam, SN, Banerjee, A and Das, S (2017) Broadband perfect metamaterial absorber on thin substrate for X-band and Ku-band applications. Prog. Electromagn. Res. C 73, 9–16, doi:10.2528/PIERC17011101. 12. Long, C, Yin, S, Wang, W, Li, W, Zhu, J and Guan, J (2016) Broadening the absorption bandwidth of metamaterial absorbers by transverse magnetic harmonics of 210 mode. Scientific Reports 6, 21431, https://doi.org/10.1038/srep21431 13. Hamm, JM, Wuestner, S, Tsakmakidis, KL and Hess, O (2011) Theory of light amplification in active fishnet metamaterials. Physical Review Letters 107, 167405, https://doi.org/10.1103/PhysRevLett.107.167405 14. Asadchy, V, Faniayeu, I, Ra'Di, Y, Khakhomov, S, Semchenko, I and Tretyakov, S (2015) Broadband reflectionless metasheets: frequency-selective transmission and perfect absorption. Physical Review X 5, 031005, https://link.aps.org/doi/10.1103/PhysRevX.5.031005 15. Ishino, K, Hashimoto, Y and Abe, H, Microwave heating oven having seal means for preventing the leakage of microwave energy (September 6 1977) US Patent 4,046,983, https://patents.justia.com/patent/4046983 . 16. Namai, A, Sakurai, S, Nakajima, M, Suemoto, T, Matsumoto, K, Goto, M, Sasaki, S and Ohkoshi, Si (2008) Synthesis of an electromagnetic wave absorber for high-speed wireless communication. Journal of the American Chemical Society 131, 1170–1173, https://doi.org/10.1021/ja807943v. 17. J. Pretorius, "Design and manufacture of a ferrimagnetic wave absorber for cellular phone radiations," 12th International Symposium on Electron Devices for Microwave and Optoelectronic Applications, 2004. EDMO 2004., 2004, pp. 119-123, doi: 10.1109/EDMO.2004.1412411.

  • 5G Technology and Its Impact on Online Education

    The world of technology is progressing at a rapid pace. From 2G, we moved on to 3G and then 4G. While we were still getting used to 4G, we were introduced to the concept of 5G, which is already transforming the way we interact with technology and with each other using that technology. How 5G is changing the world – faster than ever? 5G technology has increased the speed of the wireless network along with its responsiveness. It has been reported that the 5G network is 100 times faster when compared to 4G LTE systems – allowing a host of new data-heavy applications (especially related to augmented reality or virtual reality) to function seamlessly. There is hardly any field that is not already experiencing the impact of 5G on its operations. Almost all the sectors have had an enormous impact, right from healthcare to manufacturing to communications, retail and obviously, the education sector. A study conducted by Ericsson (Mobility Report) suggests that the number of 5G subscriptions will bypass the 1 billion mark by 2023. That means 5G is going to cover 20% of the worldwide population by the end of the year. How 5G is transforming the education sector? One sector that was especially affected by Covid-19 lockdowns was education. Students were not able to visit schools – and most schools were notoriously slow in adopting technology-driven alternatives to classroom teaching. However, technology played savior and came to the rescue of educational institutions. Soon, children welcomed online schools into their homes. Just imagine the impact on the minds of young children if there was no online school. A year away from school would have had a negative impact on the minds of the children. Let’s explore how 5G wireless technology is transforming the education sector with its speed and reach. 1. The rise of online learning Educational institutions chose 5G to automate the process of learning, through dissemination of videos and lectures to the students over the Internet. Through live streaming, students experience learning substantively similar to that of the actual class. Without 5G, frequent interruptions and slow loading of videos affect the way students learn and comprehend. Slow internet plays a spoilsport and hampers the process of learning for both teachers and students.5G technology has also made it easier and speedier to watch and download videos. Heavy video files can be downloaded in a matter of seconds. As learning on the go became possible, the rate of absenteeism too decreased. Earlier, parents often did not send their wards to school due to inclement weather or minor health interruptions. However, with online schooling, institutes reported almost 100% attendance. 2. The increased flow of communication 5G has improved the way people communicate. Earlier people used to experience network issues while they were traveling and in remote areas. However, 5G coverage has made it possible for people to stay connected on the go without any interruptions. And this has benefitted education as well. Earlier schools often had a policy against any interaction between the faculty and students off-premises. However, this changed due to online education. Students got access to the contact details of the faculty. They started interacting with the faculty to solve doubts and get in-depth knowledge on any subject area. Students and faculties have video conferencing, con-calls, and group chats to delve deeper into educational topics. 3. The approach to Hybrid Learning The introduction of 5G technology has made hybrid learning not only inclusive but also an immersive experience. While people already had the devices, with 5G, they honed the skills to utilize the devices to their full potential. Hybrid learning has offered the required flexibility to the education system, making it more resilient and robust. Learners and teachers now have the tools and knowledge to participate in immersive as well as experiential learning. Such a model of education is apt for the future, one that is not affected by adverse situations (like pandemic-driven lockdowns), or even geographic locations. There is an ease and simplicity to hire freelancers for this as well. 5G has helped deliver high-quality educational content, which in turn has inspired learners to afford greater access to skills and resources, along with experiences. 4. The birth of Virtual Reality and Augmented Reality 4G did not have good support for VR and AR applications that require extremely low latency and high data speeds to have any meaningful immersion for the end user. With the birth of 5G, AR and VR received a new lease of life, including when these technologies are directed towards online education. It has become easier for students, and new recruits, to comprehend learning and imbibe the teachings in a more interactive format through AR and VR – especially when it comes to industrial engineering, automotive engineering and healthcare environments. 5. Customization in Learning and Learning Outcomes Earlier, all the students were taught the same thing in class. Everyone was expected to comprehend at the same pace. And if one did not, then the student was deemed to be a slow learner. The traditional learning pattern of the educational system was therefore to follow (or even force) a one size fits all approach. However, the onset of online education has changed that. Students can learn at their own pace, resolving queries through private chat and extra self-help videos. The blend of the right technology with a robust network has made advanced learning a possibility At present, students have access to excellent educational resources not only from their own school but from schools around the world. The highlight of this is that they can learn from the videos at their own pace without any peer pressure or stress, since students can watch the same information any number of times in order to grasp the topic in a better manner. They can practice on something till the time they gain expertise in the same. This possibility was not present in a live class, however. 6. Opportunities for special children Children with special needs have particularly benefitted from 5G. Assistive technology has helped such students in different ways on multiple levels. With the introduction of software like text-to-speech, students are able to learn and comprehend at a rapid pace. This has especially benefited students who have visual disabilities. Video instructions help students with reading problems. Similarly, learners with hearing disabilities can participate in the discussions going on in the classroom with the help of audio-to-text software. Students with movement disabilities can make use of switches and sensors for simple activities, including as part of a curriculum. 5G technology has also made it possible for teachers to create personalized curricula for students with unique needs. Virtual teaching assistants help in selecting lessons and assessments that the learners prefer based on their individual requirements. Conclusion While it is believed that Covid-19 had a major impact on education, children and youth were already facing a learning crisis even before the pandemic. The introduction of 5G and virtual learning was a blessing for learners. It has gone a long way in democratizing the learning experience as well as the teaching experience around the globe. Author Bio Sakshi Baid works as a Product Associate at Refrens.com - Online Invoice Generator & India's most powerful platform for freelancer growth. She has worked as a Brand and Digital marketing associate for some renowned companies.

  • Understanding Depositions During US Patent Litigation

    An essential step in the discovery process, deposition is a testimony given under oath and recorded in writing by a court-authorized official, usually outside of court and before the trial. The "deponent" is the witness who is being cross-examined. One of the most effective legal resources available to a party in a trial in the United States is a deposition. The majority of civil lawsuits are decided during depositions rather than in court. Experienced counsel, analyzing a deposition transcript, can typically foresee the likely outcome of a trial and can offer proposals for settlement appropriately. While court testimony during high profile trials tends to attract most of the limelight, cases are built (or unbuilt) even more during depositions of fact witnesses and expert witnesses much before the actual trial. What are depositions, though, and how do they operate? What is a Deposition? An essential step in the discovery process, deposition is a testimony given under oath and recorded in writing by a court-authorized official, usually outside of court and before the trial. The "deponent" is the witness who is being cross-examined. When Does a Deposition Take Place? Depositions typically take place at the outside counsel office. The witnesses are questioned extensively by the counsel regarding the events important to the case. A court reporter administers the same oath that the witnesses would take in a courtroom before the deposition begins. The court reporter records the entire deposition verbatim during the entire session. All parties to the lawsuit are permitted to attend the deposition. The deponent's attorney may object to any deposition question. Typically, there are only two types of objections that can be made: one is to object to the type of question being asked, and the other is to assert privilege (for example, if the question pertains to contents of conversation with the attorneys in the case). In the former case, deponent must, however, still answer in response to each key question before a decision is made. Depending on how many witnesses are involved, the length of the deposition can range from brief (such as a half hour) to as long as a week or more. Giving incorrect information or making a false statement during a deposition could result in criminal or civil penalties because the deponent is under oath to answer truthfully. What is the Purpose of Deposition? A deposition is an opportunity for knowing the technical details of the case better and not only about collecting favorable testimony. The last thing you would want is to be caught off guard by hearing damning testimony for the first time when that witness takes the stand, so if, for example, a witness' version of events might weaken your case, you would need to know about that long before trial. In essence, a deposition is a chance for both parties to identify the weak points in their respective cases and plan how to address or refute them at trial. Types of Deposition Oral Deposition Typically, the court is not directly involved in depositions. The parties individually start and oversee the process. Typically, a deposition merely includes the deponent, the attorneys for all parties involved, and a person authorized to administer oaths. Although electronic records are becoming more prevalent, stenographers still occasionally record depositions. All parties are permitted to interrogate the witness during the deposition. Lawyers often have limited authority to object to questions asked during a deposition and are not permitted to guide their clients' testimony. Typically, depositions are not admissible at trial. However, the hearsay rule has three exceptions that are particularly pertinent to deposition testimony. The first occurs when a party makes an unfavorable admission in a deposition. The second occurs when a witness's deposition and trial testimony are at odds. The third occurrence is when a witness cannot appear at trial. Also, contrary to what innumerable films and television shows would have you think, it is considered unfair to introduce a surprise witness at the last minute of a trial. The witnesses should all be identified and their testimony prepared for the trial by the time it starts. Further, any other party may move to end or restrict the deposition if it is being taken in bad faith, with the intent to harass or humiliate the deponent or a party. Until the court determines on the motion to limit the deposition, the moving party may ask for a suspension of the deposition. The deposition may resume and proceed after the court rules on the pertinent issue. Written Depositions (Interrogatories) Written questions may also be used to conduct depositions. Questions are pre-submitted by the parties in this type of deposition. The deponent only responds to such questions during the deposition. Written question depositions are less expensive than oral question depositions since the presence of the parties' attorneys is not required. This approach, however, is often viewed as less effective because it is challenging to follow up on a witness's responses when the witness only records his/her words. Interrogatories, which are written inquiries, are typically used by parties in place of depositions. US Statutes Governing Depositions The Federal Rules of Civil Procedure (FRCP) Rule 30 for depositions is followed in almost all civil matters in US federal courts. Some states follow the discovery rules set in the court rules, which differ from state to state. According to Rule 30, there can only be ten witnesses total on each side, and each witness can only testify for a maximum of seven hours each day. A subpoena is used to inform the deponent of the location and time. A legal notice is given to the key deponent's attorney rather than a subpoena in cases where the key deponent is from the opposing party. A subpoena is required if the deponent is a third party who is not on one of the sides (defendant or plaintiff). Depositions may also be taken in criminal matters by the jurisdiction in various US states. Depositions in criminal proceedings in the US must adhere to Rule 15 of the FRCP. Deposition-related laws vary from state to state. To preserve the witness' testimony for the trial, many jurisdictions require that they take a deposition. If the deponent is not a member of either party to the action, a subpoena can be issued to them, just like in civil lawsuits. If the deponent is from the opposing side, a legal notice must be sent. In the event that the deponent is unable to attend the trial, the deposition can be used as the witness' statement in lieu of the witness testifying. In several places, the deposition must be videotaped if the deponent is a minor. Deposition rules vary by jurisdiction. See State Civil Procedure Rules. In the Federal Rules of Civil Procedure, Rule 30 governs depositions by oral questions and Rule 31 governs interrogatories and depositions by written means. State-Wise Rules of Civil Procedure Trial Vs Deposition Preparing to survive a deposition is very different from preparing to testify at trial. One only has the freedom to present one's own case in front of a fact-finder who is concerned with the truth during a trial, such as a jury or judge. One first opens up and voluntarily discloses the case's background at trial. We go into the "rules" of courtroom testifying in another piece. It's important to remember that these are two very distinct forums with very distinct goals. Because intelligent, articulate people are not allowed to express their side of the story during depositions and must instead stay stoic and unresponsive, they find depositions to be incredibly challenging. Conclusion One of the most effective legal resources available to a party in a trial in the United States is a deposition. The majority of civil lawsuits are decided during depositions rather than in court. Experienced counsel, analyzing a deposition transcript, can typically foresee the likely outcome of a trial and can offer proposals for settlement appropriately. Answers offered in a deposition are frequently used in court, and if a witness changes his or her evidence from that given in the deposition, the judge or jury may find it damaging. Most attorneys are experts at "locking in" opposing witnesses during depositions to establish testimony and prove their cases. Be sure to educate yourself with the details of any potential depositions if you're ever expected to testify as a witness in a case. It could also be wise to consult with an experienced litigation and appeals lawyer who can advise you and protect your interests, especially in complicated cases involving numerous parties. Note - The information included in this article is for educational purposes only and is not intended to be a substitute for legal advice. References- https://en.wikipedia.org/wiki/Deposition_(law) https://www.law.cornell.edu/wex/deposition https://www.findlaw.com/litigation/filing-a-lawsuit/what-is-a-deposition.html https://www.investopedia.com/terms/d/deposition.asp https://www.merriam-webster.com/dictionary/deposition https://www.americanbar.org/groups/public_education/resources/law_related_education_network/how_courts_work/discovery/ https://www.stimmel-law.com/en/articles/depositions-american-litigation https://lawshelf.com/videocoursesmoduleview/depositions-types-and-purposes-module-3-of-6

  • Network Packet Sniffing Tools – A Complete Guide

    There are legitimate uses of packet sniffers, including monitoring employee network usage and safeguarding users against harmful files, conversations, and activities. A packet sniffer has several advantages such as improving network traffic, improving bandwidth efficiency, and many more. Network packet sniffing tools are used to identify the right protocol used for communication. These tools are helpful in finding the right evidence to prove a patent infringement, and these evidences can be used in a patent infringement claim chart. To know more, how patent infringement claim charts are made, contact us. What are Network Packets? Every network comprises numerous elements, including workstations, servers, networking devices, and more. All of these elements are referred to as nodes in the context of networking. A stable network connection makes sure that data is sent between these nodes consistently and at a reasonable speed based on the capacity of the network. Modern networks include a combination of physical and wireless connectivity. Although, these networks use the same basic concepts for transmission of data. Data is exchanged among different nodes in a network in the form of compact data chunks known as packets. Depending on the network protocol, these packets have different formats. Along with actual data, the packets include control information to facilitate the transport of packets from transmitter to the receiver. As packets intended to be sent to a particular node frequently transit through several nodes in a network and have the possibility to reach at the inaccurate node, the control information is necessary. To make sure that packets arrive at their intended location, the control information comprises the IP (Internet Protocol) addresses of the source and the destination, packet sequencing information (such as packet number), and more. What are Network Packet Sniffers and Why do we Need Them? There is no defined way to retrieve the packets lost during communication in protocols like Transmission Control Protocol/Internet Protocol (TCP/IP). Network designers employ these protocols only in fault-tolerant networks, where communication is unaffected by losses that fall below predetermined limits. In contrast, in protocols like User Datagram Protocol (UDP), the sender keeps sending the packet until it gets the recipient's acknowledgement. While improving transmission performance, it also uses more resources. It can cause considerable delays in net transmission rates if left unchecked. Packet sniffers provide a solution to resolve such issues. Using packet sniffers, data flow is intercepted as it travels across the network and copied to a file. Data packets sent over a network go through a number of nodes. A packet's control information is examined by each network device to determine the destination node. In most cases, a node ignores a packet that it discovers is directed to another node. In contrast, the nodes designed for packet sniffing deviate from this standard approach and gather all or a specified sample of packets, regardless of their destination address. The process is called Packet Sniffing. These packets are used by packet sniffers to analyse networks. Network managers employ packet sniffing tools to track and verify network traffic whereas hackers might use them for illicit activities. Sniffers can be set up in two different ways. The first is "unfiltered," which means it will record every packet it can and save it for subsequent analysis. The next mode is "filtered," in which analysers only record packets that include a given set of data items. Both wired and wireless networks can utilise packet sniffers, but the effectiveness of their usage relies on how much of the network they are capable to observe because of network security measures. Sniffers may have access to all packets on a wired network or may be constrained by the location of network switches. Most sniffers could only monitor one channel at a moment on a wireless network, however using several wireless interfaces can increase these capabilities. Types of Network Packet Sniffers 1. Hardware Packet Sniffers: It is a hardware element that is inserted into a network in order to do packet sniffing. Network administrators frequently employ hardware packet sniffers to examine a specific area of a vast network. These packet sniffers are employed by the network managers to assure that all packets are collected without any loss due to routing, filtering, or any other network concern. The hardware packet sniffers may be configured to transmit all packets it has collected to a central location for additional analysis. 2. Software Packet Sniffers: Software packet sniffers are more commonly employed by most enterprises. Every computer or node has a Network Interface Card to connect to the network, which is often set up to ignore packets that are not routed to it. A Software Packet Sniffer modifies this behaviour, allowing for the monitoring of all network traffic. The amount of data that is gathered by this type of packet sniffer depends upon whether the packet sniffer is in filtered or unfiltered mode. Advantages of Network Packet Sniffers There are legitimate uses of packet sniffers, including monitoring employee network usage and safeguarding users against harmful files, conversations, and activities. A packet sniffer has several advantages such as improving network traffic, improving bandwidth efficiency, and many more, some of which are discussed below. 1. Identifying root cause of a network issue: It might be challenging to pinpoint which network or application component is the cause for a slowdown or any other issue. Network administrators can easily pinpoint the elements causing delay, or packet loss by collecting data from all points of their network using packet sniffers. 2. Network Traffic Management: Understanding the network's traffic is crucial for analysing network. Traffic may be divided into several categories using the appropriate packet sniffers based on the IP addresses of the destination servers, the ports being utilised, and measurements of the total and relative amounts of traffic for each type. 3. Bandwidth Efficiency Improvement: Network administrator may simply discover the traffic flow and WAN bandwidth use, any unusual increases in network usage, and more with traffic analysis using network sniffers. With this information, businesses may prioritise bandwidth allotment for critical apps. 4. Network Security Improvement: A high amount of outgoing traffic could be a sign that a hacker is utilising your applications to communicate with the outside world or move a lot of data. A packet sniffer can identify odd traffic spikes and a network administrator can investigate further to see if a cybercriminal is active. 5. Using Network Packet Sniffing Tools for Communication Specifications Packet sniffing tools can be used to get information about protocols, source, destination, and other data related to packets sent from one node to the other. For illustration, packet sniffing process using Wireshark is discussed briefly. Wireshark captures the packet and arranges the collected packets in a descriptive packet list. Wireshark provides information about source, destination, network protocols, and length of the packet etc. To get detailed information about a packet, one can click on a particular packet in the list. For data display, Wireshark employs a color-coding scheme. Each packet is labelled with a distinct colour to signify the various types of traffic. Use Case - Wireshark The time column in Wireshark gives a time stamp for a packet that reflects the time after which the packet is received when packet sniffing begins. For example, in packet number 39 in figure 2, the time 3.832609 represents that the 39th packet is received after 3.832609 seconds from the beginning of packet sniffing. The 'Source' and 'Destination' columns include source and destination identifying data. This data might be in the form of an IP address, a Media Access Control (MAC) address, or any other identification-based information. For example, in 39th packet, 192.168.2.1 and 192.168.2.130 represents the IP address of the source and destination respectively. Similarly, in 38th packet, a2:85:2a:14:5f:d2 represents the MAC address of the source and ‘Broadcast’ in the destination column represents that the message is being broadcasted to the network devices by the source. The 'Protocol' column contains information about the network protocol utilised for communication. For example, in 39th packet, Address Resolution Protocol (ARP) protocol is mentioned which is used to map an IP address to the MAC address of the device that has that IP address. In this case, Wireshark provides MAC address of the source device which is inquiring about the device in the network having a specific IP address. In 38th packet, Domain Name System (DNS) protocol is mentioned which is used to send a DNS query to a name server to resolve a domain. For example, when any website is searched in the web browser, it triggers a DNS request, which is sent by the computer to a DNS server in order to get the website's IP address. Wireshark also provides the packet length in bits in the ‘Length’ section and the details about the packet in the ‘Info’ section. For example, in 39th packet, 42 in the Length column represents that the packet size is 42 bits and ‘Who has 192.168.2.1?’ in the Info section represents that the source is enquiring about the device in the network whose IP address is 192.168.2.1. Comparing Top Network Packet Sniffers Conclusion Packet sniffing tools, as well as some of the most popular packet sniffers used by network administrators all over the world, have been thoroughly discussed. As described in the case of Wireshark, packet sniffers give critical information about packets such as network protocols used for transmission, source and destination identification, packet length, and other data related to the packets that are transferred from one node to another in a network. Network Packet Sniffers may be installed on all major platforms and provide useful features such as network infrastructure monitoring, bandwidth monitoring, efficiency improvement, and security enhancement. References 1. https://www.softwaretestinghelp.com/network-packet-sniffers/ 2. https://www.tek-tools.com/network/all-about-packet-sniffers 3. https://www.dnsstuff.com/packet-sniffers 4. https://www.kaspersky.com/resource-center/definitions/what-is-a-packet-sniffer 5. https://www.paessler.com/it-explained/packet-sniffing 6. https://www.webroot.com/in/en/resources/glossary/what-is-a-packet-sniffer 7. https://www.spiceworks.com/it-security/network-security/articles/what-is-packet-sniffing/ 8. https://www.liveaction.com/support/specifications/ 9. https://www.netresec.com/index.ashx?page=NetworkMiner https://www.colasoft.com/download/capsa-ent-techspecs.pdf

  • How Much Intellectual Property (IP) is There in Your Tea?

    Tea is the second most consumed drink in the world, surpassed only by water. And it is a beverage that can be enjoyed hot or cold, so people of all ages find it appealing. In addition to the fact that approximately 20-30% of the world's tea is produced in India, more than eight out of ten Indian homes consume tea. Isn’t that an extremely huge number? Imagine resting at home with a cup of chamomile tea, reaping the health benefits of green tea, or nourishing your body with antioxidants with a cup of ginger tea. The feeling of having tea is relaxing for many people. Now there are different varieties of tea, but the most widely used is the “Orthodox Tea” which is processed in a traditional way. Only the top two tender leaves and an unopened leaf bud are typically present in orthodox teas, which are then meticulously hand-picked to create the myriad of different types of tea we know and love today (note: While tea plants do have small flowers, the "buds" tea people refer to are the young, unopened leaves, not flowers). Countries today are fighting neck to neck to acquire the global tea trade monopoly owing to the high demand of tea. Did you know China, India, Kenya, and Sri Lanka are the top four tea-producing nations, accounting for 75% of global production? We bet you’ll be amazed to see how well thought, organised and profitable the tea business is. Let’s not waste any more time and get straight to the point! Let’s look how much IP goes in a cup of Tea! Copyrights in Tea The information booklet giving an idea about origin of the given brand, instructions of making a perfect cup of tea is eligible for protection under copyrights. Let’s say you see a pamphlet of different types of tea and benefits offered by those teas along with some creatives and graphics displayed in a presentable manner, then, it will be considered as a creative work that can be copyrighted. Trademarks in Tea Do you remember brand names? Of course, everyone does! Lipton Ice tea is everyone's favourite, isn't it? Many people love tea from a particular brand and have a liking towards a particular texture. Some brands have a peculiar taste, aroma and flavour that make them stand out from the crowd! How are these teas differentiated? A quick answer here - By their brand identity - that is their 'Trademarks'. Some of the notable tea trademarks that elite customers famously choose are: 1. Twinings Tea One of the first tea brands ever created. It was founded in England (1706) by Thomas Twining, and today it is one of the world's leading luxury tea firms. 2. Harney & Sons Founded in 1983 by John Harney, Harney & Sons offers the best hand-picked, whole-leaf teas from the best tea farms and gardens available. 3. Palais des Thes Paris Palais des Thes, a French tea company founded in Paris in 1986, offers tea enthusiasts a broad and varied selection of superb teas from the best gardens in Asia as well as trademark flavoured teas inspired by travel and created in Paris. Trade Dress in Tea The trade dress of a given tea brand has a great deal of importance due to the increased competitiveness in the commercial sector for tea trading. Trade dress refers to a product's exterior look, including its packaging, combination of colours, textures, graphics, shape, as well as the product’s placement at its point-of-sale (store layout) and other composite aspects that set it apart from the competitors. When it comes to product packaging the first impression is the last. There are many different styles of tea packaging on the market. These include corrugated disposable paper flasks, foil stand-up pouches, paper pouches, tea boxes, and foil gusset bags. One that wins our hearts every time is the Poet Tea. Poet Tea's sophisticated aesthetic is understated yet striking. There are different colours for different flavours of tea. For its customers, the tin container designs are timeless classics that evoke nostalgia, because the look is very old school. Tin can packaging for loose leaf tea is also a very wise choice because every consumer would like to save the lovely design in their home for storage needs. The Poet Tea’s natural and organic tea from the hills of Sri Lanka is reflected on its package as well through the little organic flourishes and detailing. This sums up how effectively a trade dress works! Patents in Tea As tea is a natural resource and its flavour is its inherent character, tea cannot be patented as it is. Having said that, tea-making equipment, tea drinking apparatus, and use of tea in medical and herbal compositions are protected under patents. Tea-making machines and devices are one of the most widely protected inventions all over the world. The legal status of patents is varied but most patents have lapsed owing to the high timeframe that the tea related aspects became popular. China has the most number of patents owing to the huge production of tea in its area and research and development going on to boost the present developments going on in tea related innovations like tissue culture, flavour intensification and other organoleptic properties. Unilever, Nestle, and Nestec are the most important players that rule the tea market. These giants have been in the game for a very long time and now they have become a household name. No wonder they have the most number of patents assigned to them! The application rose drastically from 2012 onwards. This can be attributed to the fact that the print and digital media contributed a lot in popularizing tea and tea products and accessories. Geographical Indications (GI Tags) in Tea Although tea is also grown in South America, the Black and Caspian Sea region, and other places, tea is mainly grown in Asia and Africa. The world produced 7.0 million tonnes of tea in 2020, with China accounting for 42% of the amount and India for 20%. Smaller production centres can be found in locations such So Miguel Island, the Azores in Portugal, and Guria in Georgia. Secondary producers were Sri Lanka, Kenya, and Argentina. It is important to understand that not all manufacturers choose to make use of the GI tags. Not all indicators are protected abroad; many are only protected at the point of origin, which means that only certain products can have a logo, mark, or name "stamped" on them before they are shipped. Considering that teas are frequently repackaged by importing wholesalers or retailers and that a logo mark on the goods when it was exported doesn't always end up on the consumer-facing product makes this challenge considerably more challenging for tea. Indian tea has long been renowned for its superiority. Some tea varietals, such as Darjeeling, Assam, and Nilgiri teas, are only grown in India but are in high demand worldwide. Darjeeling teas stand out from other teas due to their delicate colouring and light flavour. In light of these considerations, Darjeeling tea in particular and Indian tea generally required complete protection under the guise of IPR (intellectual property rights) and GI (geographical indications), in accordance with Trade Related Aspects of Intellectual Property Rights (TRIPS), which the WTO governs. And finally in 2004 – DARJEELING TEA was registered as Geographical Indication as Sl. No. 1 & 2 (India’s First GI tag). Famous GI-Tagged Teas are: Nilgiri Orthodox Tea The Nilgiri district in Tamil Nadu's southern Western Ghats is where the tea from that region is grown. Over 70% of this fragrant, flavoured tea is exported. The Nilgiri orthodox tea is a recognised GI, despite the fact that both orthodox and CTC (crush, tear, curl) teas are made here. Additionally, it holds the unusual distinction of being India's 100th commodity to receive GI designation. Assam Orthodox Tea The history of tea production has a special place for the Indian state of Assam. It is the only location with native tea plants and the greatest tea-growing region in the world, with the exception of Southern China. Assam produces CTC tea as well as traditional tea. Since 2008, GI has helped brand the wildly popular Assam Orthodox Tea. The Assam Orthodox tag may only be applied to teas that are "produced and made out of the basic Camellia Sinensis var. Assamica and other varieties in tea farms located in the Brahmaputra or Assam Valley in northeastern India." Sangzhi White Tea White tea has a history that dates back to the Yuan Dynasty, which controlled China from 1271 to 1368. It is a tradition among the Bai ethnic group. The tea, which is faintly sweet and has anti-inflammatory properties, did not garner much notice on the market. Sangzhi White Tea was included in the national geographical trademark of China's protected goods list in 2019. Conclusion Intellectual property can be in anything! In your tea as well as the tea machine in which you made the tea in! Different facets of intellectual property are used to protect the most important aspects of the tea - its essence, identity and origin. According to a UNCTAD (United Nations Conference on Trade and Development) study, agricultural products with GI registration do command a price premium of 10 to 15 percent. That is significant from a business point of view. Because of the unique and peculiar way that these things are produced, people frequently place a high value on them. This is impacted by the distinctive geographical characteristics of the location where such products are made or cultivated or by the unique and exceptional natural circumstances of the area where such products are produced. Additionally, IP rights encourage innovators to use and advertise their innovations in the marketplace. Now you can go back to have your cup of tea. But remember all that you’ve read about the IP in your tea! References https://brill.com/view/book/9789004505698/BP000017.xml?rskey=cUlZx0&result=8 https://corpbiz.io/trademark-class-30 https://en.wikipedia.org/wiki/Tea https://teaepicure.com/tea-appellations/ https://www.wipo.int/edocs/mdocs/geoind/en/wipo_geo_lim_11/wipo_geo_lim_11_11.pdf https://www.sourcetrace.com/blog/protecting-gi-darjeeling-tea/ https://unctad.org/news/branding-strategies-using-geographical-indications-can-help-farmers-poorest-countries https://www.managingip.com/article/2a5d0zxo7uj1lvmraegao/trade-dress-case-results-in-record-damages-in-thailand http://www.xinhuanet.com/english/2020-12/24/c_139616083.htm https://vowels.co.in/blog/best-tea-packaging-design-ideas/

  • Summary Judgment - A Powerful Tool to Avoid Unnecessary Trial

    What is Summary Judgment? People sue others for a variety of reasons, including money, harm to their property or corporate reputation, or an accident, among others. They rely on the courts and the law. In terms of time, as the courts have been increasingly overburdened over the years, it now takes months for hearings to be scheduled or paperwork to be processed. Costs, on the other hand, can quickly spiral out of control in highly contested cases. As a result, it is critical that parties approach their costs in a reasonable manner. In view of these phenomena, summary judgments come to the light. What is the definition of summary judgment? A summary judgment is a procedure that allows any of the claimants (you or your opponent) – or the court – to resolve all or part of a matter without having to go to trial. Both parties to the lawsuit are covered by the order. The Summary Judgment is not confined to the Plaintiff's claim but also includes the defendant's counter-claim. A party's application for Summary Judgment is filed not only to decide a claim or counter-claim but also to obtain a response to any specific question on which the claim is based. What Is the Process for Getting a Summary Judgment? When there are no more facts to be tried, summary judgment is awarded. There's no way to get further information because all of the necessary statements and evidence are already in front of the judge. When the facts can be decided without going to trial, and the other party would lose owing to a lack of evidence, summary judgment is given. Summary judgment must be denied if it is not evident that there is no more evidence. The following are the primary considerations that the court will make: A claim, issue, or defence to a claim, issue, or defence to a claim, issue, or defence to a claim, issue, or defence to a claim, issue, or defence to a claim, issue, or defence to a claim, issue, or defence to a claim, issue, or It's worth noting that if you're the applicant (the party seeking summary judgment), you have the burden of proof (onus) to prove all of the above. What are the relevant court rules in terms of summary judgments? The Civil Procedure Rules (CPR) contain the important court rules in connection to summary judgment that you should be aware of. The following are the important rules, along with links to the CPR's pertinent pages: CPR 24.2 – Summary judgment reasons CPR 3.3(1) & (4) – Contains the court's authority to issue an order for summary judgment on its own motion. CPR 1.4 - Establishes the court's responsibility for case management, which includes summarily dismissing cases. Types of Summary Judgments There are two fundamental forms of summary-judgment motions from a tactical standpoint. One demands a comprehensive evidence presentation, while the other merely requires a restricted, targeted one. To begin, a plaintiff can seek summary judgment on any cause of action, and a defendant can seek summary judgment on any affirmative defense. However, the moving party must show evidence in support of each and every fundamental aspect of the claim or defense in either circumstance (as it would have to do at trial). Because all portions of an entire claim or defense are at issue, this form of summary-judgment motion must be written as a written preview of a party's full case-in-chief to be successful. Second, a defendant may seek summary judgment on a plaintiff's cause of action, which is a different and extremely typical technique. The main difference is that in this case, the defendant only needs to oppose one of the plaintiff's claim's fundamental elements. If the plaintiff is unable to prove one fundamental aspect of its claim, all other elements become irrelevant, and the defendant is granted summary judgment. As a result, these motions are usually targeted at the plaintiff's weakest spots. A plaintiff can also seek summary judgment on a defendant's affirmative defense, but such motions are uncommon. What is the procedure for requesting a summary judgment? The following are the most essential points with respect to the procedural aspects of applying for summary judgment: If you are the party seeking summary judgment, you must file Form N244 and expressly state that the application is being filed under CPR 24 on the form. The protocol to be followed is outlined in CPR 23. However, if your claim is being processed as part of the shorter trial schemes pilot, you may be able to file an application under CPR 23 with some modifications. If you are the applicant, you must specify the proof (point of law or document) on which you are responding and the grounds for your application. When it comes to what to file in court, make sure you serve adequate copies of the application notice and proof within the deadline. In terms of fees, you should search online for 'EX50 – Civil and Family Court Fees' to see what the current fee is for filing the application. The most recent version of EX50 may be obtained here, and the fee is £255 at the time of writing (summary judgment is classed as an application on notice where no other fee is specified). The next step is to serve the respondent with the application and supporting proof. The parties must serve costs schedules on each other 24 hours before the hearing if you are claiming costs from them and they are claiming costs from you (which would normally be the case in these circumstances). You and the other side should exchange skeleton arguments before the application hearing, and if you are the claimant, you are responsible for creating a court bundle. Following the hearing, the court may grant summary judgment, strike out or dismiss your claim or the defendant's defense (depending on the circumstances), issue a conditional order, or issue additional directions. In civil cases, either party may make a pre-trial motion for summary judgment. Rule 56 of the Federal Rules of Civil Procedure governs summary judgment for federal courts. Under Rule 56, in order to succeed in a motion for summary judgment two conditions must be met: (1) there must be no genuine doubt of material fact; and (2) the Movant must have a right to judge A genuine controversy indicates that some facts are in dispute. A party opposing Summary Judgment must usually present evidence that refutes the moving party's view of the facts. Furthermore, the disputed facts must be important to the case; inconsequential or small factual disagreements will not defeat a motion for Summary Judgment. Finally, the law must require the moving party to be awarded judgment based on the indisputable facts of the case. Summary judgment does not imply that a judge decides which side will win a trial, nor does it imply that a judge determines witness reliability. It is instead utilised when there are no factual issues for a Judge or Jury to consider. Even if the moving party would not have the Duty of Proof at trial, the moving party has the initial burden of proving that Summary Judgment is proper. The evidence given with the motion is often examined in the light most favourable to the opposing party. When the burden of proof is placed on the opposing party at trial, the moving party might get Summary Judgment by demonstrating that the opposing party has no evidence or that its evidence is insufficient to meet its burden. In what situations can you get a summary judgment? In theory, if you're the defendant in a dispute, you can get a summary judgment against a claimant in any sort of action if you're the defendant. If you are a claimant in a certain sort of dispute (for example, home possession proceedings), you may not be able to obtain summary judgment; if you are unclear, you should seek legal advice. When considering whether to proceed with a summary judgment application, there are a few things to keep in mind. The following are some of them: If you are a claimant and your opponent has raised a challenge to the court's jurisdiction, you should normally wait until the issue has been resolved. Making a summary judgment application could cause delays and cost you more money. This is due to the fact that, until the application is heard, proceedings are normally halted for various reasons. In general, unsuccessful applications will result in adverse orders against the applicant. With the aforementioned danger in mind, it's important to remember that, even if the application is rejected, it may provide a tactical advantage and save time. This is because the opposing party will have been pushed to present their case and evidence at an early stage. If a defendant needs additional time to research the claim or the case is exceptionally complex, the court may refuse to give summary judgment. Advantages of Summary Judgments • Saving the cost of a trial, • Contributing to early case resolution, • Narrowing the issues for trial, • Demanding disclosure of the opponent's evidence, • Facilitating trial preparation, and • Boosting the prospects of settlement or voluntary dismissal of the case Disadvantages of Summary Judgments • Adding significant expense to the litigation, • Facing a high risk of defeat, • Weakening settlement position after a loss on the motion, • Educating the opposition about your evidence and strategy, • Generating evidence that the opposition may use for cross-examination at trial, • Facing de novo review on appeal, which may be more favourable to the opposition than the standard of review following trial, and • Subjecting the decision to reconsideration by the court on its own motion. Conclusion One of the basic goals of the Rules of Civil Procedure is to obtain the most, speedy, and least expensive determination of every civil matter on its merits. Judgment and mechanisms to settle an issue before trial serve this principle. A side has legal means at its disposal to reach such a result if a trial is unnecessary or can be hastened, or the legal problems can be limited. The process outlined in Order XIII-A of the Code of Civil Procedure, 1908, is designed to shorten the time it takes to resolve a commercial dispute of a specific value. It is hardly an exaggeration to suggest that the purpose of the modification to the Code is to increase the merchant class's faith in the impartiality, transparency, and effectiveness of the justice delivery system. Some of the loopholes utilized by some of the parties have been addressed in the current provision. Furthermore, it should be mentioned that the Special Courts, which are Superior Courts at the District level, have been designated to adjudicate the cases. With the addition of Order XIII-A to the Code of Civil Procedure, 1908, the fact that trial is the default process in every civil matter was abolished. As a result, the legislature's goal is to enable courts to resolve commercial disputes of a certain value in a timely and efficient manner. References https://en.wikipedia.org/wiki/Summary_judgment https://www.legalserviceindia.com/legal/article-4522-summary-judgment-a-robust-tool-to-curb-unnecessary-trial.html https://www.scconline.com/blog/post/2020/07/29/summary-judgment/ https://indiankanoon.org/search/?formInput=summary%20judgment https://www.wkw.com/legal-process/faqs/what-is-a-summary-judgment/

  • Marvel's Upcoming Projects: an IP Perspective

    Disney has registered for a variety of titles that appear to be for its next Marvel films in a series of unearthed trademark applications. This year, Marvel Studios will attend San Diego Comic-Con (SDCC), and fans anticipate the company to make some news about the impending Phase 5. Fans are more interested in learning about the future of the Marvel Cinematic Universe. The title itself is intriguing enough to entice viewers to go through this article. Internet surfers caught Marvel Studios' filing for European copyright on Reddit and Twitter. Why does this matter? Are these meant for films or TV? Or game consoles? There are too many speculations! But hey! Wait. If you don't know what we are talking about, here is a little background for you. What are Marvel Studio and the Marvel Cinematic Universe? A subsidiary of Walt Disney Studios and a division of the Walt Disney Business, Marvel Studios LLC is an American film and television production company. It was previously known as Marvel Films. A group of American superhero movies created by Marvel Studios called the Marvel Cinematic Universe (MCU) are based on Marvel Comics characters. The shared universe in which all the movies are set is known as the MCU. This universe is home to many Marvel superheroes and super villains. The Marvel Universe is heavily inspired by reality. In the Marvel Universe, Earth has all the characteristics of the real Earth: the same nations, the same people, the same historical occurrences, etc. However, it also contains many other fictional elements, including the very small nations of Wakanda and Latveria, as well as the espionage agency S.H.I.E.L.D. and its adversaries HYDRA and A.I.M. Marvel Studio’s Marvels! Marvel Studios began making the movies in 2007, and since then, 29 of them have been made, with at least 14 more in various stages of development. Apart from this, it has released eight television shows. The studio's debut animation project is the television series What If...? (2021). Along with the studio's One-Shots, these movies and television shows all have continuity with one another. Marvel Studios' Intellectual Property Given its budget, creation capability and continuity, Marvel Studios take its intellectual property protection very seriously. They own the copyright of every bit and piece they have made to date. They also have their own line of merchandise based on the characters, phrases and creatives. They also have many trademarks to their credit. Out of the numerous trademarks, 59.95% are registered which is quite a decent figure thanks to the frequency and consistency of the franchise in bringing out new master-pieces every now and then! However, as many as 14.75% trademarks are still in the process and not yet have been registered. How much of a Marvel Fan are you? Let’s give it a shot! Try and remember which ones of these trademarks are you familiar with. The trademarks seem to show a pattern of registration with the word marks being filed the most as most of the characters are named and have a distinct identity of their own. Now that you have a clear picture, it would make sense to delve in deeper! Marvel's Upcoming Projects Disney has registered for a variety of titles that appear to be for its next Marvel films in a series of unearthed trademark applications. This year, Marvel Studios will attend San Diego Comic-Con (SDCC), and fans anticipate the company to make some news about the impending Phase 5. Fans are more interested in learning about the future of the Marvel Cinematic Universe. One of the most significant figures in the Marvel universe and widely regarded as the series' greatest antagonist is Doctor Doom. It's very likely that Marvel Studios will reveal their Doctor Doom project during SDCC if they are indeed working on one at the moment. And given that they have already registered a trademark for a Kang project, fans are left wondering who the MCU's next major threat will be. Who will succeed Thanos in power? All of it began when it was discovered that Marvel had registered trademarks for Thunderbolts, Captain America: New World Order, Multiverse Saga, and Avengers: Secret Wars. Even while it's odd that each and every one of the titles pertains to a project whose live-action adaptation we are aware of, it might just as easily be a comic book. But since the MCU excels in passionate speculating, you can only imagine the responses when additional TM filings were found and uploaded on Reddit. These Marvel titles might also be connected to works in other genres, such as video games or theme park attractions. Each seems intriguing; perhaps Marvel Studios will soon reveal these games in Hall H, but only time shall tell. Here Are Our Top 5 Expectations for the Marvel Studios panel at SDCC Black Panther: Wakanda Forever The most likely prediction and possibly the most significant one includes Black Panther: Wakanda Forever, which is scheduled for publication in November. One of Marvel's biggest successes in 2018 was Black Panther, which not only shattered box office records but also demonstrated that mainstream superhero movies are capable of delving into heavy subjects. The loss of the lead actor Chadwick Boseman and issues resulting from Letitia Wright's anti-vax stance, however, have marred the sequel. The Fantastic Four and X-Men It might be Kevin Feige's moment to use his trump card and debut some eagerly anticipated characters as a result of the slight decline in Marvel's popularity. Despite being essential elements of the Marvel comics universe, the X-Men and the Fantastic Four have not fared as well on screen. The majority of fans were thrilled that Disney's acquisition of 20th Century Fox would enable Feige to offer us accurate representations of the X-Men, the Fantastic Four, and antagonists Dr Doom and Galactus, despite some fans raising worries about Disney's monopoly. Blade This year, hopefully, Blade, starring Mahershala Ali, will finally get some air. Could the daughter of Blade finally be introduced in this film? Tim Seely was revealed to be the author of a comic book about Blade's Daughter years ago. Fans wanted to see her in cinema and in comic book pages, but that never happened. The latter finally came true this year in the pages of the Free Comic Book Day 2022 Avengers X-Men Eternals: Judgment Day #1. Cast of Wonderman Marvel Studios is producing a Wonder Man show for Disney+, as was previously disclosed. We don't anticipate hearing much about this show just yet because it is most likely in the very early stages of creation. But even if we only learned who was playing Simon Williams, a superhero who became a Hollywood actor, that would be fantastic. Fans would undoubtedly be quite thrilled if the casting is excellent, and we might definitely place this at the top of our list of "most anticipated Marvel projects." Deadpool 3 Then there is Deadpool 3. Although filming on this one has not yet begun, fans are eager to learn more about Wade Wilson's first MCU adventure. Not to mention, it's the first ever R-rated MCU product. Any information about Ryan Reynolds' potential return to the role of the Merc with the Mouth would be a wonderfully welcome surprise. Further, Majors' identity as Kang is most likely to be revealed, as the introduction of a villain akin to Thanos will help Phase 4 gain coherence after feeling disjointed to many fans. We may learn more about what happened to Kamala at the end of her series and Monica Rambeau's location, given the popularity of Ms Marvel and the fact that The Marvels was initially scheduled for a 2022 release. Conclusion Marvel Studios is back at Comic-Con in San Diego after a three-year absence. When Kevin Feige last appeared on stage at SDCC, he announced a number of films and TV shows for Disney+ as part of a very spectacular Phase Four slate presentation. We can't say anything with certainty just yet, but whatever it is, it all seems fantastic, and we can't wait for this to come together. References Marvel Cinematic Universe movies - IMDb. https://www.imdb.com/list/ls505520432/ All-Inclusive Resorts: Myths Debunked. https://www.allinclusivevacations.com/post/all-inclusive-resorts-myths-debunked Marvel Studios NFT Collection - Collection | OpenSea. https://opensea.io/collection/marvel-studios-nft-collection Marvel (Universe) | Multiverse Profile Wiki | Fandom. https://multiverse-profile.fandom.com/wiki/Marvel_(Universe) Predictions and Hopes for Marvel Studios' SDCC Panel - Nerdist. https://nerdist.com/article/marvel-studios-panel-predictions-san-diego-comic-con-2022/ https://www.tmdn.org/tmview/#/tmview/results?page=1&pageSize=30&criteria=C&appName=Marvel%20Characters%2C%20Inc.,Marvell%20International%20Ltd.,Marvel%20Enterprises%2C%20Inc.&basicSearch=Marvel https://www.tmdn.org/tmview/#/tmview/results?page=1&pageSize=30&criteria=C&offices=US,WO&territories=US&appName=Marvel%20Characters%2C%20Inc.,Marvell%20International%20Ltd.,Marvel%20Enterprises%2C%20Inc.&basicSearch=Marvel&tmStatus=Filed

  • Homomorphic Encryption Keeps Your Data Encrypted All Time

    What is Homomorphic Encryption? The term "homomorphic" in mathematics refers to the translation of one collection of data into another while maintaining the connections between the components in both sets. The phrase has Greek roots that mean "similar structure." Since the data structure is preserved in a homomorphic encryption system, the same mathematical operations on encrypted or decrypted data will produce equal results. Most homomorphic encryption techniques actually perform best when data is represented as an integer and addition and multiplication are used as the operational operations. This indicates that without actually decrypting the data, it can be altered and examined as though it were in plaintext format. Only you can decrypt the ciphertext and understand what it means, even though the encrypted data can be computed and processed to generate an encrypted answer. Homomorphic encryption was created to enable computation on encrypted data. As a result, data can stay private while being processed, allowing for the completion of useful activities using information from unreliable environments. This is incredibly useful in a world of distributed computation and heterogeneous networking. Like other types of public encryption, a homomorphic cryptosystem encrypts data using a public key and restricts access to its decrypted contents to those with the corresponding matching private key. Its use of an algebraic structure enables a range of computations (or operations) on the encrypted data, however, distinguishes it from other types of encryptions. The use of algebraic structure also safeguards it from quantum computers. 5 Step Process for Homomorphic Encryption The use of homomorphic encryption to encrypt any data involves five-stage processing, which is as follows: 1. Setup The setup stage involves three steps: Choose an appropriate scheme to apply Deciding on security parameters Choosing functional parameters 2. Key Generation Public Key Re-Linearization Key Galois Key Only the public key can be used for the encryption of these three keys. All of these keys (including the public keys) can be shared with external entities and can also be used for computational results. 3. Encryption 4. Evaluation The encryption text must undergo certain processes. This process will likewise produce a cipher text as its result. 5. Decryption Cipher text decryption utilizes a secret key to restore the desired outcome. Application Areas - Homomorphic Encryption Homomorphic encryption is significant because it enables calculations on encrypted data. It is impossible to retrieve the original data without the correct decryption key. This implies that data processing can be delegated to a third party without having faith in the data's security. The capacity to process encrypted data has the potential to address several significant business issues encountered by businesses in all sectors. Following are some key application areas where homomorphic encryption is used: 1. Supply Chain Security - The majority of businesses rely on reliable third parties for various aspects of their operations. To perform their duties, these vendors, contractors, and other third parties frequently need access to confidential and sensitive company information. The dangers of insecure supply chains have been highlighted by recent incidents, which also show how hackers would aim for the weakest link in the chain to accomplish their goals. This means that giving a partner access to sensitive data could expose a company to a costly and harmful data breach. A business can help protect itself against these supply chain dangers by using homomorphic encryption. A data breach provides no harm to the organization if all data given to reputable third parties for processing is encrypted. This reduces the risk associated with outsourcing key data processing for an organization. 2. Regulatory Compliance - The legislative environment for data protection has become more complicated in recent years. New laws, including the EU's Data Protection Regulation (GDPR), have given individuals new rights while also imposing new obligations and limitations on enterprises. The GDPR rule requiring that EU residents' data remain inside the EU or in nations or organizations with equal data security standards is one that many firms are having trouble complying with. One of the primary GDPR justifications for data flows between the EU and the US was rejected by the Schrems II judgment in 2020, which generated issues for many US companies who do business with EU citizens. The provisions of laws like the GDPR are expressly stated not to apply to encrypted data. A business might possibly store and process data using homomorphic encryption outside the EU and only decode it on servers in regions that adhere to GDPR regulations. 3. Private Data Analytics - Many businesses rely on data analytics to generate revenue. By gathering user data, analyzing it, and then selling it to other parties for targeted advertising, companies like Facebook are able to offer "free" services. The monetization of personal data is debatable, though. Many consumers are upset that businesses are creating detailed profiles of them without giving them any visibility or control over the information being gathered and used. To address this issue, homomorphic encryption offers a viable solution. A business such as Facebook may use homomorphic encryption to execute the necessary data analyses without having access to or the capacity to view the original data. Users having access to the encryption keys opens the door to the possibility of targeted, private advertising. Open-Source Implementations Homomorphic encryption techniques have numerous open-source implementations available today. Following is a list of some of them: Microsoft SEAL: A widely used open-source library from Microsoft that supports the BFV and the CKKS schemes. PALISADE: A widely-used open-source library from a consortium of DARPA-funded defense contractors that supports multiple homomorphic encryption schemes such as BGV, BFV, CKKS, TFHE, and FHEW, among others, with multiparty support. HELib: An early and widely used library from IBM that supports the CKKS and BGV scheme and bootstrapping. FHEW / TFHE: Supports the TFHE scheme. (Please note that the FHEW and TFHE libraries are distinct from the FHEW and TFHE schemes which are also supported by other libraries listed on this page.) HeaAn: This library implements the CKKS scheme with native support for fixed point approximate arithmetic. Λ ○ λ (pronounced “L O L”): This is a Haskell library for ring-based lattice cryptography that supports FHE. NFLlib: This library is an outgrowth of the European HEAT project to explore high-performance homomorphic encryption using low-level processor primitives. HEAT: This library focuses on an API that bridges FV-NFLib and HeLIB. cuHE: This library explores the use of GPGPUs to accelerate homomorphic encryption. Lattigo: This is a lattice-based cryptographic library written in Go. Concrete: This library supports a custom variant of the TFHE scheme. EVA: A compiler and optimizer for the CKKS scheme (targeting Microsoft SEAL). Patent Data Every day new technologies are emerging, and along with that, patent applications are also rising. Every inventor wants to safeguard their inventive ideas so as to keep them safe from competitors or from being misused. Having said that, there are already, 5323 patents being granted for homomorphic encryption technology. Alipay Information Technology is leading the race with the maximum number of patent families, i.e., 233 in homomorphic encryption technology, followed by Shenzhen Qianhai Webank with 140 patents and then Advanced New Technologies with 127 patents. Besides these top three companies, Microsoft and IBM are also in the race to as data privacy and protection become a greater concern and companies are employing advanced encryption techniques such as holomorphic encryption. The above-provided graph describes the geographical distribution of the patents related to homomorphic encryption technology. China is leading the race with 3478 patent families, followed by the USA with 1274 patent families, and then European Patent Office (EP) with 820 patent families. Homographic encryption as a concept was known since 1978 until Dr. Craig Gentry made the first system in 2009. The above-provided graph shows the trend of application filing regarding homomorphic encryption technology. It can be observed that a maximum patent was filed in the year 2021, i.e., 1244 patent applications, and a minimum in 2012, i.e., only 87 patent applications. An exponential increase in the number of filed patent applications is evident from the fact that excessive research on making the technology progressive started after the first breakthrough via Dr. Gentry. Conclusion Homomorphic encryption is being advanced by some of the biggest technological companies in the world to make it more accessible and user-friendly. For instance, SEAL (Simple Encrypted Arithmetic Library) is a collection of encryption libraries developed by Microsoft that enables computations to be carried out directly on encrypted data. Microsoft's SEAL team is working with businesses like IXUP to provide end-to-end encrypted data storage and compute services, which are powered by open-source homomorphic encryption technology. Businesses can use SEAL to build platforms for data analytics on data that is still encrypted, and the data owners never have to provide their encryption key to anybody else. Google also unveiled its open-source cryptography tool, Private Join and Compute, as a further indication of its support for homomorphic encryption. Google's tool aims to analyze data in its encrypted form while making only the conclusions drawn from the analysis and not the underlying data itself available. IBM also released the initial version of their HElib C++ library in 2016 with the intention of making homomorphic encryption more widely used. However, it is apparently "running 100 trillion times slower than plaintext operations." Since then, IBM has worked to address this problem, developing a version that is 75 times faster but still falls short of plaintext operations. Though homomorphic encryption is not fully feasible to be applied to each and every application area due to its limitations, but it is evident from history that researchers can make anything possible. So, looking at its practical applications, I think we are going to see homomorphic encryption slowly taking part in our daily lives in a short period of time. References https://www.keyfactor.com/blog/what-is-homomorphic-encryption/ https://www.venafi.com/blog/homomorphic-encryption-what-it-and-how-it-used https://inpher.io/technology/what-is-fully-homomorphic-encryption/ https://www.techtarget.com/searchsecurity/definition/homomorphic-encryption#:~:text=Homomorphic%20encryption%20is%20the%20conversion,data%20without%20compromising%20the%20encryption. https://www.thalesgroup.com/en/markets/digital-identity-and-security/magazine/brief-history-encryption https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=39ed33887e93 https://homomorphicencryption.org/introduction/ https://networksimulationtools.com/homomorphic-encryption-algorithm-projects/ https://galois.com/blog/2017/12/revolution-evolution-fully-homomorphic-encryption/

  • Wi-Fi 6: Benefits, Top Players and Compatibility

    The term wireless communication was introduced in the 19th century and wireless communication technology and wireless communication devices has developed over the subsequent years. Wireless communication devices such as IoT, Smartphones, VR headset, operating over the internet, demand high data transfer rate to communicate. At present, wireless communication include - Wi-Fi, IR wireless communication, Satellite Communication, Broadcast Radio, Microwave Radio, Bluetooth, and ZigBee etc. This article talks about Wi-Fi (mainly 802.11ax Wi-Fi 6 standard), a family of radio technologies used for the wireless local area networking (WLAN) devices. There are many different versions of Wi-Fi: 802.11a, 802.11b, 802.11g, 802.11n (Wi-Fi 4), 802.11h, 802.11i, 802.11-2007, 802.11-2012, 802.11ac (Wi-Fi 5), 802.11ad, 802.11af, 802.11-2016, 802.11ah, 802.11ai, 802.11aj, 802.11aq, 802.11ax (Wi-Fi 6), 802.11ay. The versions differ between the radio wavebands they operate on, the radio bandwidth they occupy, and the maximum data rates they can support. Wi-Fi is all about faster and uninterrupted internet and connecting more and more Wi-Fi compatible devices to a single network. As more bandwidth-demanding apps, games, and videos running on laptops and smartphone, and Internet of Things (IoT) devices (such as home automation devices including smart speakers, thermostats, and/or automated doorbells) are increasing, it brings a challenge to provide the same throughput capacity to all devices. IoT devices utilize transfer of small data packets and share the same airspace with audio and video traffic — which slow down a wireless network. In crowded places like restaurants, hospitals, railway stations, airports, and/or stadiums where hundreds of mobile devices are connected, Wi-Fi is the need of an hour. Current Wi-Fi standard (802.11 ac/Wi-Fi 5) provides a Multiple User- Multiple Input Multiple Output (MU-MIMO) feature for connecting multiple devices to a network via the routers and access points. But the MU-MIMO feature is available for downlink channel only. To overcome these problems and improve Wi-Fi capability, Wi-Fi alliance is coming up with the new standard i.e. 802.11 ax (known as Wi-Fi 6). What is Wi-Fi 6? The Wi-Fi 6 speeds up the internet up to 9.6 Gbps (theoretically) which is 3.5 Gbps up from Wi-Fi 5. That 9.6 Gbps doesn’t have to go to a single computer or Wi-Fi compatible device, rather it can be split up across a whole network of devices. That means more potential speed for each device. Some features of Wi-Fi 6 are listed below which will improve and overcome the problems. Wi-Fi 6 Isn’t Just About “TOP SPEEDS” Instead of boosting the speed for individual devices, Wi-Fi 6 is all about improving a network when a bunch of devices is connected to the network. Wi-Fi 6 provides a Multiple User- Multiple Input Multiple Output (MU-MIMO) feature for both Uplink and Downlink channel. It lets router communicate with more devices at once, lets router send data to multiple devices in the same broadcast and lets Wi-Fi device schedule check-ins with the router. Together, those features keep connections strong even as more and more devices start demanding data. Orthogonal Frequency Division Multiple Access (OFDMA) is another technology which is widely used for multiple connected devices to a single network. It is a multi-user variant of OFDM technology that enables a Wi-Fi 6 access point (AP) to connect with many devices at once. OFDMA allows better handling of data packets (such as voice traffic) to be transmitted simultaneously. In dense environments where several IoT devices and other Wi-Fi supported devices are connected, better speed and bandwidth can be given. Wi-Fi 6 Ensures Longer Battery Life Another new technology in Wi-Fi 6 allows devices to plan out communications with a router, reducing the amount of time they need to keep their antennas powered on to transmit and search for signals. That means less drain on batteries and improved battery life in turn. This is all possible because of a feature called Target Wake Time (TWT), which lets router schedule check-in times with devices. Target Wake Time (TWT) is a function that permits an Access Point (AP) to define a specific time or set of times for individual stations to access the medium. When the access point is talking to a device (like IoT device and/or smartphone), it can tell the device exactly when to put its Wi-Fi radio to sleep and exactly when to wake it up to receive the next transmission. This feature is not useful for the device which needs constant internet connectivity like laptops and is meant for smaller, already low-power Wi-Fi devices that just need to update their status every now and then. Wi-Fi 6 With Improved Security Last year, Wi-Fi started getting its biggest security update, with a new security protocol WPA3. WPA3 (Wi-Fi Protected Access) is a security protocol which provides enhanced security in public Wi-Fi networks which are open and allow anyone to connect. Individual data encryption is used in WPA3, which encrypts data between the access point and the user even though no password is entered at the time of connection. WPA3 provides protection against Brute-Force Attack where a client attempts to guess the password again and again. This is done by blocking authentication after several failed log-in attempts. WPA3 provides a new strong password-based authentication using Simultaneous Authentication of Equals (SAE) protocol which provides robust protection which is resistant to active, passive and dictionary attack. It is a peer-to-peer protocol in which one-way key derived function is used to generate a key. It is difficult for the attacker to crack the code even with the password. WPA3 uses 192-bit security suite aligned with the Commercial National Security Algorithm (CNSA) Suite that protect the government, Defense and industrial network which requires a higher level of security. Current devices and routers can support WPA3, but it’s optional. For Wi-Fi 6 certified devices WPA3 is required. Wi-Fi 6 Compatibility IEEE 802.11ax is designed to be excellently forward and backward compatible with 802.11a/g/n/ac devices. In fact, the 802.11ax compatibility design is even simpler and more thorough than 802.11n compatibility with 802.11a devices. An 802.11ax client can communicate with an 802.11a/g/n or IEEE 802.11ac access point using 802.11a/g/n or 802.11ac PLCP Protocol Data units (PPDUs). Therefore, the emergence of 802.11ax clients will not cause problems with existing infrastructure. The preamble of the 802.11ax formatted packet is an extension of the established 802.11a/g formatted packet. This extension allows the existing Clear Channel Assessment (CCA) mechanisms already in use for 802.11a/g/n and 802.11ac devices to continue in an 802.11ax world. PPDUs are typically followed by an Ack or Block Ack frame sent in an 802.11a/g format PPDU, so compatibility with existing devices is ensured and all can integrity the time commitments established before continuing to contend and transmit as usual. Wi-Fi 6 - Patent Analysis Let’s have a look at a patent data set for 802.11 ax (Wi-Fi 6) from 2011 to 2019. The graphs below show the current patent assignees and patent filing trends for Wi-Fi 6 standard. The data set consists of 900 US grant patents over the years. The analysis shows the leading market player for the Wi-Fi 6 standard and how the standard has been evolved over the years in terms of the patent. From the above graph, it is clear that Intel IP Corporation plus Intel Corporation holds around 436 patents out 900 patent (around 48%) data set which makes Intel front runner in Wi-Fi 6 standard. This clearly shows that Wi-Fi 6 products (routers, access points, IoT devices and/or smartphones) are going to have Intel chips. Qualcomm, a modem chip maker, also holds some amount of Wi-Fi 6 patents i.e. 85 (4th in the race). With Apple holding a very less number of patents indicate that they still have to rely upon either Qualcomm or Intel for implementing Wi-Fi 6 standard. Wi-Fi 6 standard started evolving in the year 2011 with just 4 US patents granted. Wi-Fi 6 standard slowly evolved and reached at its peak in the year 2015 with 397 US patents granted. By the year 2016 and 2017, the standard has evolved enough and US patent grant falls to 204 and 27 respectively. On October 27, 2016, Quantenna announced the first 802.11ax silicon, the QSR10G-AX. The chipset is compliant with Draft 1.0 and supports eight 5 GHz streams and four 2.4 GHz streams. In January 2017 Quantenna added the QSR5G-AX to their portfolio with support for four streams in both bands. Both products are aimed at routers and access points. Further, on September 12, 2017, Huawei announced their first 802.11ax access point. In 2019, latest products include Samsung Galaxy S10 and Cisco Access Points. On March 8, 2019, Samsung released the Galaxy S10 supporting 802.11ax. On April 29, 2019, Cisco announced 802.11ax access point. The ax enabled access point are Catalyst 9115, Catalyst 9117, Catalyst 9120, Meraki MR45 and MR55. With all Wi-Fi 6 certified products already up and running to work on new Wi-Fi standard, full deployment of the standard is expected in late 2019. Wi-Fi 6 Semianl Patents 1. Apparatus, system and method of communicating a wakeup packet response (US9801133B2) Date of Patent: October 24, 2017 Current Assignee: Intel Corp. The patent teaches about an apparatus including a circuitry configured to cause a first wireless device to generate a wakeup packet including a wakeup response policy field to indicate a response policy and to transmit the wakeup packet to a wakeup receiver of a second wireless device over a wakeup Resource Unit (RU) allocation of an Orthogonal Frequency Division Multiple Access (OFDMA) structure. The method includes following steps: To generate a wakeup packet comprising trigger timing information and a wakeup response policy field to indicate a response policy, the wakeup response policy field comprising a value to indicate an Orthogonal Frequency Division Multiple Access (OFDMA) packet response policy, the wakeup packet comprising a response Resource Unit (RU) allocation of an OFDMA structure for transmission of a response to wakeup packet. To transmit the wakeup packet to a wakeup receiver of a second wireless device over a wakeup RU allocation of the OFDMA structure, the wakeup packet to indicate that a radio of the second wireless device is to be woken up, the OFDMA structure comprising the wakeup RU allocation and a plurality of other RU allocations, the wakeup RU allocation allocated for communication of the wakeup packet, the plurality of other RU allocations allocated for OFDMA communication of one or more data packets. To transmit a trigger frame to the second wireless device based on the trigger timing information To process reception of said response over the response RU allocation of the OFDMA structure. 2. Techniques for mobile platform power management using Low-Power Wake-Up signals (US9736779B2) Date of Patent: August 15, 2017 Current Assignee: Intel IP Corp. The patent discusses the problem of power management for battery powered small form factor platforms (such as smartphones, tablets, wearable devices, and Internet and Things (IoT) devices). A new low - power wake – up radio (LP - WUR) listens to the wireless medium for a wake - up signal with, for example, below 50 µw power consumption. The LP - WUR allows the mobile platform to completely turn off the main wireless radios, such as Wi - Fi, Bluetooth ( BT ), Low - Energy Bluetooth ( BLE ), and the like, and then selectively or opportunistically turn them on only when there is data to transmit or receive based on a wake - up signal. 3. System and method for OFDMA tone allocation in next generation Wi-Fi Networks (US9722740B2) Date of Patent: August 01, 2017 Current Assignee: Huawei Technologies Co., Ltd. A method for receiving an uplink frame in a wireless network is provided. The method includes receiving an uplink orthogonal frequency division multiple access (OFDMA) frame over a 20 megahertz (MHz) frequency channel. The uplink OFDMA frame comprises resource units (RUs) communicated by different mobile devices. Each of the RUs in the OFDMA frame carries a separate pilot signal. The method further includes performing residual carrier frequency offset estimation on the uplink OFDMA frame in accordance with the separate pilot signals carried by the RUs. An apparatus for performing this method is also provided. 4. Method of packet classification for 802.11AX US9882687B2 Date of Patent: January 30, 2018 Current Assignee: Intel IP Corp. The patent teaches a technique for packet classification for IEEE 802.11 ax capable devices. A method is described for determining the modulation and coding scheme used, through robust bit indication in a WLAN 802.11ax frame. Embodiments provide novel networking mechanisms that facilitate a process for obtaining modulation and coding information. A technique for determining whether a legacy frame or frame with equivalent OOK modulation and/or Rep8 coding is used in WLAN IEEE 802.11ax devices is also presented. A device is configured to retrieve information from at least one of the physical layer frames, wherein the information retrieved further includes at least one of an HE-SIG1 and HE-SIG2 field and read a robust packet bit, wherein a same value of the robust packet bit resides in each of the HE-SIG1 and the HE-SIG2 fields. The robust packet bit allowing differentiation between legacy modulation and On-Off Keying (OOK) modulation and process the data in the at least one of the physical layer frames based at least in part on the robust packet bit and a constellation rotation. The above-described system can be implemented on a wireless telecommunications device(s)/system, such an 802.11 transceiver, or the like. Examples of wireless protocols that can be used with this technology include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11af, 802.11ah, 802.11ai, 802.11aj, 802.11aq, 802.11ax, 802.11u, WiFi, LTE, LTE Unlicensed, 4G, Bluetooth®, WirelessHD, WiGig, 3GPP, Wireless LAN, WiMAX. #technology #patents #emergingtech #wifi

  • How Much IP (Intellectual Property) is There in Your Burger?

    Filing patents for food procedures, equipments and appliances is a norm in the food industry. Many big brands like Wendy’s, Mc Donald’s, Burger King and Sonic Drive-In have a strong hold in the world of patents. These giants are proof that a strong patent portfolio will attract more investors, franchisees and stakeholders. Apart from this, if there is patent protection to one or many of a brand’s products then the brands has more credibility and eventually a strong market value. The phrase "intellectual property" refers to the ideas, thoughts, artistic creations, or arrangements generated by a certain individual or entity. Patented inventions, copyrighted works, and trademarked designs are all examples of intellectual property that play a crucial role in monetizing intangible assets. While intellectual property is in almost everything we have developed and put to use, it is particularly interesting to see how much it is present in small things - like a Burger! Imagine a scenario where you enter a burger cafe and sit down to go through the menu. What are the things around you that have some form of intellectual property imbibed in them? Have you ever wondered about it? It begins right from the menu card you are holding that might be protected under copyright. The logo on the menu card might be trademarked to preserve and protect the brand's identity. The design of the burger that you might order could be patented. The process and machinery used to make that burger might be protected under a patent. Let us try to understand what that favourite burger of yours is worth! Trademarks in Burger A trademark can exist in a number of forms and is something that helps promote a specific business identity. Let us look at McDonald’s whose famous "Golden Arches" and the name "McDonald's" are the most important trademarks that belong to it. Because the symbol is a trademarked design, other companies cannot use the same one or one that looks similar enough to be potentially mistaken for the original. Some other notable trademarks held by McDonald’s are: Happy Meal Extra Value Meal I'm Lovin' it Anything that includes "Mc" / "Mac" like Big Mac; Mac Attack; McWorld; Chicken McGrill; Chicken McNuggets; Egg McMuffin; McChicken; McGrilled Chicken; McNuggets; Sausage McMuffin; and McCaffe also come under the trademark umbrella of McDonald's. Also, it is interesting to note that McDonald's is well-known for aggressively enforcing its intellectual property rights. Further, McDonald’s has been involved in a number of lawsuits and other legal cases over the course of its 70-year history. Copyrights in Burger Copyright protection is for securing creative expression. This protection is generally sought for written literary works, sound recordings, video content, graphic designs, photographs, etc. Pamphlets, menu cards, adverts, videos and other literary works that a given brand might have created are eligible to be protected under copyright. Suppose you are browsing through a menu card from your favourite burger giant - The burger King, then the representation on the pamphlet or the display board might be copyrighted. Patents in Burger Filing patents for food procedures, equipments and appliances is a norm in the food industry. Many big brands like Wendy’s, McDonald’s, Burger King and Sonic Drive-In have a strong hold in the world of patents. These giants are proof that a strong patent portfolio will attract more investors, franchisees and stakeholders. Apart from this, if there is patent protection to one or many of a brand’s products then the brands has more credibility and eventually a strong market value. Firmenich, Nestle, and Impossible Foods target a wide audience, have competitive prices, and spend a lot of their budget on developing strategies for product marketing. These pointers are responsible for their strong position in the market. It is also interesting to know that many giants are moving towards including plant based items in their menu which have taken their popularity to another level. The food patents have been in question recently, this has led to a decline in the number of patents gradually. There have been litigation matters between some of the giants which have led the companies to function in a different aspect rather than relying just on filing patents. Litigation further involves a lot of monetary input which again drains the brand of it budget and sometimes brings a bad name to it. Also, the norms regarding patents related to non obviousness have become stricter making the brands conscious of their IP matters and filings. The US and Europe are the largest market places in the world that have a foot fall of people who love fast food. Fast food at large encompasses patties, wraps, burgers and rolls. People love burgers because of the variety, ease of eating and transporting it and of course the price. Children find burgers really fascinating given the exciting colours and irresistible flavours that they come in. Trade secret in Burger Any information like a recipe of product, customer list, manufacturing process or any other information that is trivial to a given brand, is kept under wraps. This is the trade secret of the brand. The information under the trade secret is kept so because the organisation does not want its competitors to follow the similar line of thought and get the desired outcome. The brands today, protect this important information because the trade secrets are an asset to the brands and provide economic value to them. The protection can last indefinitely as long as the information remains secret. The term "information" has a broad definition. As a result, "information" can contain client names, contact information, purchasing tendencies, and so on. If the trade secret is leaked, the secret is no longer a trade secret that must be kept private. It is out in the public domain. Once the secret is revealed, it cannot be recovered. Recent Developments: IP in a Burger We may infer with certainty from the information above that IP and its protection is essential to building a brand. According to latest news, many food brands have become the latest entrants to the Metaverse after filing various patents to build Metaverse goods and services ranging from digital restaurants, cafes, and others. We hope you found this interesting! References https://www.lexology.com/library/detail.aspx?g=8c5da957-d6c6-4c2b-a1b2-2d2821be6c48 https://www.mcdonalds.com/gb/en-gb/help/faq/18715-where-do-the-lettuce-and-buns-come-from.html https://www.gerbenlaw.com/trademarks/food-companies/mcdonalds/ (Link to view all McDonald's trademarks)

  • LPWAN (Low Power Wide Area Network) Technology: Next Step for the IoT Ecosystem

    The Internet of Things (IoT) ecosystem thus far has been deeply dependent on Wi-Fi (based on the IEEE 802.11 Wireless LAN standards) and in case of wearables, Bluetooth. When we connect any wearable such as a smartwatch with a mobile device, it is generally connected via Bluetooth. The mobile device acts as a gateway for the internet connectivity and smartwatch as a Thing connected to the internet. With the growing use of such wirelessly connected devices, the development of the Internet of Things (IoT) has been rapidly increasing and consequently the calls for standardization of the component technologies have also been increasing. IoT devices are an integral part of smart cities, smart buildings and smart homes which need a faster and secure connection. Many communication technologies such as Wi-Fi, Bluetooth, ZigBee and 2G/3G/4G cellular are prevalent and available today but depending on the application, factors such as range, data requirement, security and power demands and battery life will dictate the choice of one or some form of a combination of these communication technologies and standards. Most of these technologies work on either high power consumption or short range. IoT devices for smart home automation such as a smart doorbell, surveillance cameras, and smart thermostats, for example, work on Wi-Fi so as to increase the range as compared to the Bluetooth and/or Bluetooth Low Energy (LE). Bluetooth LE (and ZigBee, for that matter) offer very low power consumption compared to Wi-Fi – but this comes at a cost of significantly reduced range. In wireless communication, antenna size is inversely proportional to the used frequency, the higher the frequency is, the smaller the antenna and vice versa. If the frequency decreases, the size of the antenna increases. Use of higher frequency bands will allow smaller modules, which is important for IoT applications where size is an important factor, such as wearables. Conversely, lower frequencies provide better coverage and are more suitable for extended coverage applications where antenna and module size is not an issue. IoT devices have major application in industry as well such as consumer processes, for example to monitor hazardous fluid tanks and vending machines used for privacy/data verification for cashless payments. Some agricultural applications such as monitoring of soil, temperature and weather conditions also use IoT devices which need to be connected to the internet. These IoT devices need long-range communication and low power consumption. The problem is that the cellular services consume much higher power. So, a solution for long range, low power consumption, low cost, low data requirements and security for IoT devices is Low Power Wide Area Network (LPWAN). LPWAN technologies and standards are designed to create either a private wireless sensor network or to create a wireless cellular network provided by a cellular network service provider such as T-Mobile and AT&T. The LPWAN services provided by mobile operators are deployed on existing standards so that there is no need for investing in gateway technology. There are several well-known Standard Developing Organizations (SDOs) such as European Telecommunications Standard Institute (ETSI), Third Generation Partnership Project (3GPP), Institute of Electrical and Electronics Engineers (IEEE), and Internet Engineering Task Force (IETF) are working towards the open standards for LPWA technologies. Further, multiple industry alliances are built around individual LPWA technologies to promote new standards. LoRa Alliance, Weightless-SIG and DASH7 Alliance are a few examples of such Special Interest Groups (SIGs). 3GPP, one of the most influential SDOs today, also offers multiple licensed solutions such as Long Term Evolution (LTE) enhancements for Machine Type Communication (eMTC), Extended Coverage GSM (EC-GSM) and Narrow Band IoT (NB-IoT). Long Term Evolution (LTE) Enhancements for Machine Type Communication (eMTC) - LTE-M LTE-M is a Low Power Wide Area (LPWA) technology standard published by 3GPP in the release 13 specifications. LTE-M supports IoT through lower device complexity and provides extended coverage while allowing the reuse of the LTE installed infrastructure. This technology is evolved by 3GPP releases to support an extended battery life for a wide range of machine type communication through the use of Power Saving Mode (PSM) and extended idle-mode Discontinuous Reception (eDRX), and connected mode eDRX, cellular IoT (CIoT) control plane and Evolved Packet System (EPS) optimization for small data transmission. PSM mode is similar to power-off, but the User Equipment (UE) (IoT devices) remains registered with the network. The UE requests the PSM simply by including a timer (T3324) with the desired value in attach request, Tracking Area Update (TAU) or Routing Area Update (RAU) request. The T3324 will be the time the UE listens to the paging channel after having transitioned from connected to idle mode. When the timer expires, the UE enters PSM. The UE can also include a second timer, which is an extended T3412 in order to remain in PSM for longer than the T3412 broadcast by the network. The network accepts PSM by providing the actual value of the T3324 (and T3412) to be used in the attach/TAU/RAU accept procedure. The maximum duration, including T3412, is about 413 days. The extended idle-mode Discontinuous Reception (eDRX) is another mechanism that reduces power consumption by extending the sleeping cycle in idle mode. It allows the device to turn part of its circuitry off during the extended DRX period to save the power. The main difference between PSM and eDRX is that in PSM mode UE should exit PSM and issue periodic TAU/RAU with the same frequency as the extended idle mode DRX cycle, thus causing additional signaling for the network and power consumption in the UE. In the eDRX mode, UE can request the use of extended idle-mode DRX cycle (eDRX) during an attach request, tracking area updating (TAU) or routing area updating (RAU) procedure by including the eDRX parameters IE. Further, in order to optimize the transmission of a small amount of data, 3GPP rel-13 introduces optimized EPS procedures for small data. Depending on the application needs and traffic data cellular service provider will choose the optimized technique best suited to reduce the power consumption. The control plane CIoT EPS optimization aims to concentrate the data transfer and control plane procedures in the Mobile Management Entity (MME). The MME connects the UE (using control plane CIoT optimizations with a Packet Data Network (PDN) connection) either to the Packet GateWay (PGW) via the Serving GateWay (SGW) or directly to a new network element called SCEF (service capabilities exposure function) that connects to the MME via the radio interface. The user plane CIoT EPS optimization avoids the need to renegotiate the UE-eNB security association at idle active transition by introducing the concept of suspending and resuming a Radio Resource Control (RRC) connection. The user plane CIoT EPS optimization provides the UE with the usual user plane connectivity and is suitable both for applications involving lower data volumes transfer and for applications where the possible range of data volume transmission is unpredictable and can vary quite significantly in frequency and volume. The control plane CIoT EPS optimization, on the other hand, is more suitable for applications involving lower data volumes transfer as it uses the system control plane resources. The IoT devices operating according to the LTE-M standard connects to the cheaper LTE network as they are half-duplex and narrower bandwidth of 1.4 MHz licensed spectrum between 450 MHz to 3.5 GHz. The maximum data rate of LTE-M devices is only 100 kb/sec which makes it much cheaper for IoT devices. LTE-M is suitable for both static sensor applications and also for the applications which require voice, mobility and higher throughput. Some of the applications include: IoT devices which involve tracking sensors such as tracking children or animals, remote health monitoring and wearables. To protect threatened species, their behavior and which habitat is best suited for them needs to be fully understand. So, LTE-M network provides cost effective technology for wildlife tracker IoT devices. IoT devices which require high mobility and low data rate such as event-triggered location tracking IoT devices in which only location needs to be transmitted. Wearables such as smart watches often require voice support, mobility and high throughput to communicate with the internet. The security requirements for these applications are high as personal data is involved. So, LTE-M powered IoT devices enjoy all the security features provided by LTE. Extended Coverage GSM (EC-GSM) EC-GSM is a 3GPP rel-13 feature based on enhanced GPRS (eGPRS) and designed as a high capacity, long range, low energy and low complexity cellular system for IoT communications. GSM can be deployed on either side of WCDMA (Wideband Code Division Multiple Access) or LTE carriers. EC-GSM IoT does not require any additional frequency planning since the system is supported on top of existing GSM deployments. The most commonly used spectrum bands for GSM are 800-900 MHz and 1800-1900 MHz. It uses variable data rate with a peak rate of 240 kbps using modulation techniques such Gaussian Minimum Shift Keying (GMSK) and 8-array Phase Shift Keying (8-PSK). GMSK is a digital frequency modulation scheme in which frequency of the carrier is modulated by passing the data stream first through the Gaussian filter which reduces the sideband power to minimize the inter-channel interference. In Phase Shift Keying (PSK) modulation phase of the carrier is changed according to the digital data. 8-PSK uses eight different phase angles to represent a combination of three bits. The optimization techniques PSM and eDRX are the software features for the core network. EC-GSM also supports security framework comprising Ciphering, Mutual authentication and integrity protection for user data and control plane. The EC-GSM is a cheaper option as it uses the lower frequency band of GSM technology. It is useful for agricultural-based IoT devices as they don’t require high data rate and are generally no handover is required in such cases. EC-GSM is a 2G based technology specifically designed for IoT devices to be deployed in rural areas with limited 3G or 4G connectivity. This technology will be more helpful in improving agricultural problems in rural areas. The environmental sensors (IoT devices) collect weather data and agronomic data to be sent over EC-GSM network and helps to tackle problems like food security such as climate change and water availability. The only drawback of this technology is that it is based on out dated 2G network. Narrow Band IoT (NB-IoT) Narrowband IoT (NB-IoT) is a 3GPP Release 13 feature that uses various principles and building blocks of the existing LTE physical layer and higher protocol layers. NB-IoT has been designed to offer extended coverage compared to the traditional GSM networks. New physical layer signals and channels, such as synchronization signals and physical random access channel, are designed to meet the demanding requirement of extended coverage and ultra-low device complexity. It is not compatible with 3G but can co-exist with GSM, GPRS, and LTE. In existing LTE network connectivity is supported by Packet Data Network (PDN) attach request but NB-IoT comes with a new capability of connectivity without PDN. UEs supporting CIoT (Cellular Internet of Things) remains attached without PDN connection, which may be useful for cases where huge numbers of devices would keep a connection inactive for a very long period of time and rarely transmit data over it. When a UE is attached without PDN connection, only SMS service is available for any data transmissions and applications are constrained by this sole capability. The SMS could be used also to trigger PDN connection establishment. The 3GPP Enhanced Coverage feature is an integral characteristic of NB-IoT, as it increases the depth of radio coverage to enable IoT devices to operate in remote locations. This feature increases the power level of signaling channels together with the ability to repeat transmissions. The NB-IoT supports eDRX and PSM as is done by LTE-M. NB-IoT reuses the LTE design extensively, including the numerologies, downlink orthogonal frequency-division-multiple-access (OFDMA), uplink Single-Carrier Frequency Division Multiple-Access (SC-FDMA), channel coding, rate matching, interleaving, etc. This significantly reduces the time required to develop full specifications. NB-IoT can be deployed inside a GSM carrier of 200 KHz, inside a single LTE of 180 KHz or inside an LTE guard band. NB-IoT is ideal for simple static sensor applications which require very low throughput, low data rate and no voice capability. It provides partial mobility and data rate of 20-65 Kb/s. Some of the applications include: Smart Street Lights which are static and needs to send the data at low rate. Smart Street Lights with embedded sound sensor which can detect gunshots and automatically report it to 911 department without depending on citizen involvement Parking sensors to monitor and report the availability of parking spaces which can reduce the time spent by cars which emits the greenhouse gases. Waste Management to monitor the status of waste containers to optimize the collection of waste works that can work on NB-IoT cellular network architecture. Smart Water Management includes smart water meters which communicates with water service providers giving details of water consumption on daily basis. It helps in leak detection, supply and demand management and fair services to the customers. Smart Energy Meters are also ideal for NB-IoT technology. Smart Energy Meters measures the energy consumption on daily basis and communicates with electricity department as well as the customer over the internet. These three standards are the cornerstones of "Mobile IoT " and are in the process of deployment in existing mobile network architecture. NB-IoT and LTE-M in particular are widely launched and deployed by the number of mobile operators across North America (T-Mobile and AT&T respectively), East Asia and in many European countries - though their potential for IoT specifically is as yet underutilized and in a classic cause-and-effect scenario, under-researched. But as emerging technologies go, LPWANs remain closer to fruition than most. Copperpod provides Portfolio Analysis to identify high value patents in a given portfolio and their licensing opportunities. Copperpod's IP monetization team helps clients mine patent portfolios for the best patents in a given portfolio. Our portfolio analysis is built upon a deeply researched algorithm based on 40+ parameters - and ranks each patent according to a highly customized PodRank. Please contact us at info@copperpodip.com to know more about our Portfolio Analysis services. Gagandeep advises clients on infringement investigations related to electronics, telecommunications and software. He has a Master’s degree in Electrical, Electronics and Communications Engineering and a Bachelor's degree in Electronics Engineering. His interest areas are Internet of things (IoT), Semiconductor, Operating Systems (Android/iOS/Windows/Linux), Embedded Software and Sensor Networks.

Let's connect

Ready to take your IP efforts to the next level? We would love to discuss how our expertise can help you achieve your goals!

Copperpod is one of the world's leading technology research and forensics firms, with an acute focus on management and monetization of intellectual property assets. 

Policy Statements

Contact Info

9901 Brodie Lane, Suite 160 - 828

Austin, TX 78748

​​​​

info@copperpodip.com

  • LinkedIn
  • Facebook
  • X
  • YouTube
  • Medium 2

© 2025 Carthaginian Ventures Private Limited d/b/a Copperpod IP. All Rights Reserved.                                                                                                               

bottom of page