Patent classifications
G16Y30/00
Broadcast transmission by relay node
A donor communication station transmits a unicast transmission comprising a plurality of device data sets where each device data set directed to each of a plurality of user equipment (UE) devices. A relay node receives the unicast transmission and retransmits the data sets in a broadcast transmission over a broadcast communication channel to the plurality of UE devices. In one example, the donor communication station encodes data for multiple user equipment (UE) devices by applying broadcast encoding to the data for each device before applying outer encoding to the data. The dual encoded data is transmitted to the relay node over a dedicated channel. The relay node applies outer decoding to the dual encoded data to retrieve the broadcast encoded data. The relay node then transmits the broadcast encoded device data in a broadcast transmission without outer encoding.
Broadcast transmission by relay node
A donor communication station transmits a unicast transmission comprising a plurality of device data sets where each device data set directed to each of a plurality of user equipment (UE) devices. A relay node receives the unicast transmission and retransmits the data sets in a broadcast transmission over a broadcast communication channel to the plurality of UE devices. In one example, the donor communication station encodes data for multiple user equipment (UE) devices by applying broadcast encoding to the data for each device before applying outer encoding to the data. The dual encoded data is transmitted to the relay node over a dedicated channel. The relay node applies outer decoding to the dual encoded data to retrieve the broadcast encoded data. The relay node then transmits the broadcast encoded device data in a broadcast transmission without outer encoding.
END-POINT CONFIGURATION AND HARDENING FOR IOT DEVICES
A process for management of Internet-of-Things (IoT) devices includes a management system for identifying, interrogating, and updating devices connected to one or more networks. The management system can include a data store for storing various data related to the devices and the various processes of the management system. The management system can include a controller for executing processes such as interrogation processes, firmware change processes, credential change processes, and other processes. The controller can determine versions of firmware and other configuration properties of a device and generate various profiles for updating the firmware and other configuration properties. The controller can determine upgrade paths for updating the firmware and other configuration properties from a first version to a second version, the upgrade paths including one or more intermediary versions for facilitating the upgrade path. The management system can update devices individually, on a device family basis, or on a system-wide basis.
END-POINT CONFIGURATION AND HARDENING FOR IOT DEVICES
A process for management of Internet-of-Things (IoT) devices includes a management system for identifying, interrogating, and updating devices connected to one or more networks. The management system can include a data store for storing various data related to the devices and the various processes of the management system. The management system can include a controller for executing processes such as interrogation processes, firmware change processes, credential change processes, and other processes. The controller can determine versions of firmware and other configuration properties of a device and generate various profiles for updating the firmware and other configuration properties. The controller can determine upgrade paths for updating the firmware and other configuration properties from a first version to a second version, the upgrade paths including one or more intermediary versions for facilitating the upgrade path. The management system can update devices individually, on a device family basis, or on a system-wide basis.
INTERNET-OF-THINGS (NB-IOT) CARRIER-BASED INTEGRATED ACCESS AND BACKHAUL
A wireless backhaul link is established between the IAB node and an IAB donor node via a first Narrow-Band Internet-of-Things (NB-IoT) carrier, in which the IAB donor node provides the IAB node with access to a wired backhaul connection that links to a core network of the wireless carrier network. One or more corresponding wireless backhaul links are further established between the IAB node and one or more additional IAB nodes via a one or more corresponding NB-IoT carriers. A wireless access link is then established between the IAB node and an NB-IoT user device or between the IAB donor node and the NB-IoT user device via a second NB-IoT carrier.
INTERNET OF THINGS COMMUNICATION METHOD AND APPARATUS
The present disclosure provides an Internet of Things communication method and apparatus. The method includes: receiving a resource addition request transmitted by a client, where the resource addition request is used to indicate addition of an identification of a reference resource into a collection resource on the first server; performing communication with the reference resource according to an access location of the reference resource and the identification of the reference resource; adding the identification of the reference resource into the collection resource if the communication between the first server and the reference resource is successful. In this way, before adding the reference resource, the first server first performs communication with the reference resource, and adds the identification of the reference resource into the collection resource after determining that the communication between the first server and the reference resource is successful, thereby ensuring the validity of the reference resource.
COMMUNICATION SYSTEM, COMMUNICATION PROCESS DEVICE, AND DEVICE ADDITION METHOD
A communication system includes: a first node; and a second node that is located at a lower level of the first node and connected to the first node. The second node includes a transmitter that transmits, when the second node is connected to the first node, function identification information for identifying functions installed in the second node, and the first node includes a receiver that receives the function identification information transmitted from the second node, and a processor that is connected to the receiver. The processor executes a process including deciding, based on the function identification information, a function to be enabled or disabled out of the functions installed in the second node, and selecting at least a test item used for verifying the function that is decided to be enabled.
COMMUNICATION SYSTEM, COMMUNICATION PROCESS DEVICE, AND DEVICE ADDITION METHOD
A communication system includes: a first node; and a second node that is located at a lower level of the first node and connected to the first node. The second node includes a transmitter that transmits, when the second node is connected to the first node, function identification information for identifying functions installed in the second node, and the first node includes a receiver that receives the function identification information transmitted from the second node, and a processor that is connected to the receiver. The processor executes a process including deciding, based on the function identification information, a function to be enabled or disabled out of the functions installed in the second node, and selecting at least a test item used for verifying the function that is decided to be enabled.
SECURE AD-HOC DEPLOYMENT OF IoT DEVICES IN A SECURE PEER-TO-PEER DATA NETWORK
A secure executable container executed by a network device establishes a two-way trusted relationship in a secure peer-to-peer data network with a network entity, generates a secure key for the network device in the secure peer-to-peer data network, and associates the endpoint device with a federation identifier identifying the user entity in the secure peer-to-peer data network. The secure executable container also: establishes a two-way trusted relationship between the network device and a target network device; obtains, based on the two-way trusted relationship, cohort interface element definition describing commands executable by the target network device; and generates a data object identifying a selected command from the commands and identifying an identifier for the target network device as a subscriber to the data object, causing the target network device to securely retrieve and execute the selected command.
METHOD AND ELECTRONIC DEVICE FOR SMART HOME CONTROL
A method for remote control of at least one non-ultra wide band (nUWB) device in a space by an electronic device is provided. The method includes identifying a position using at least one ultra wideband (UWB) anchor in the space, determining a field of view based on the position of the electronic device in the space, identifying the at least one nUWB device within the field of view, and establishing communication with the at least one nUWB device.