Patent classifications
H04L69/24
Control method for duplicate data transmission function, terminal, and computer storage medium
Disclosed in an embodiment of the present invention are a control method for a duplicated data transmission function, a terminal and a computer storage medium, the method comprising a terminal determining a bit in a received bit map according to configured indication information corresponding to a data radio bearer (DRB) and/or a preset rule, the bit map being one from among two received bit maps, the terminal determining a duplicate data transmission function of the DRB to be activated/deactivated on the basis of the indication of the bit.
Providing media content to content consumers for playback and consumption
Media content items is provided to content consumers for playback and consumption includes plurality of nodes interacting with each other in accordance with defined protocol in communication network. A first node receives a request for playback of a media content from a content consumer. A second node owns the requested media content and provides media content rights to the first participant and/or the content consumer. The first node further provides media content metadata to the consumer device for consumption. A plurality of instances of a distributed media rights transaction ledger, associated with respective node, includes a plurality of media content rights transactions corresponding to an acquisition of the media content rights by the first participant and/or content consumer prior to the consumption of the media content. The plurality of media content rights transactions is categorized, defined, and managed by plurality of nodes in accordance with the defined protocol.
System and method for secure communication channel establishment
Embodiments described herein relate to techniques for establishing a secure communication channel. The techniques may include performing an encryption capability negotiation between peer devices, wherein a first peer device and a second peer device are connected by a communication channel comprising a first link of the first peer device and a second link of the second peer device; marking, when the encryption capability negotiation is successful, the first link and the second link as encryption capable; performing, based on the marking, a security negotiation between the first peer device and the second peer device; based on the security negotiation: establishing a first security association on the first peer device; and establishing a second security association on the second peer device; programming the first security association to hardware of the first peer device; and programming the second security association to hardware of the second peer device.
QUIC TRANSPORT PROTOCOL-BASED COMMUNICATION METHOD AND SYSTEM
The present disclosure provides communication techniques based on QUIC transport protocol. The communication techniques comprise receiving a first handshake message sent by a client computing device; defining a second handshake message in response to the first handshake message, wherein the second handshake message includes an encrypted-transport tag and a plaintext-transport tag; sending the second handshake message to the client computing device for selecting, based on the second handshake message, a target transport mode from a plurality of transport modes; receiving a third handshake message sent by the client computing device, where the third handshake message includes identification information of the target transport mode; and performing data transport based on the target transport mode.
WIRELESS POWER RECEIVER DEVICE, WIRELESS POWER TRANSMITTER DEVICE, METHOD OF RECEIVING WIRELESS POWER, AND METHOD OF TRANSMITTING WIRELESS POWER
A wireless power receiver device according to one embodiment of the present application receives wireless power from a wireless power transmitter device, wherein the wireless power receiver device receives the wireless power on the basis of any one of a first power profile, a second power profile having a higher power than the first power profile, and a third power profile having a higher power than the second power profile, and the wireless power transmitter device transmits the wireless power on the basis of any one profile from among the first power profile, the second power profile, and the third power profile, wherein a first data packet including first profile information indicating that the wireless power receiver device supports the third power profile is transmitted to the wireless power transmitter device, and a second data packet including second profile information indicating that the wireless power transmitter device supports the third power profile is received from the wireless power transmitter device.
SIDELINK CONNECTION ESTABLISHMENT DESIGN TO SUPPORT UNICAST AND GROUPCAST COMMUNICATION FOR NR V2X
Some embodiments of this disclosure include apparatuses and methods for sidelink connection establishment design to support unicast and groupcast communication for NR V2X in a wireless communication system. The apparatuses and methods include at least generating an announcement of support for a unicast or a groupcast communication for a vehicle-to-everything (V2X) service, generating one or more connection establishment request messages for a secure link establishment to a second UE, to support a V2X communication to enable the V2X service, where the one or more connection establishment request message includes: a first connection establishment request message that is transmitted over a PC5-S interface, and a second connection establishment request message that is transmitted over a PC5-RRC interface. The apparatuses and methods further include at least processing a response message from the second UE that accepts or rejects the connection establishment request message for the secure link establishment.
SUPPORTING MULTIPLE TRANSPORT OPTIONS FOR BORDER GATEWAY PROTOCOL
A first router transmits a first message including information identifying a first set of transport layer protocols supported by the first router. The first router receives a second message including information identifying a second set of transport layer protocols supported by a second router. A common transport layer protocol is selected from a subset of transport layer protocols that are common to the first and second sets of transport layer protocols. The first router then establishes a border gateway protocol (BGP) session with the second router over the common transport layer protocol. The first message is unicast to the second router or broadcast/multicast over a plurality of links to a plurality of routers that includes the second router. In some cases, the common transport layer protocol is selected by the router having a higher priority, based on preferences, or a combination thereof.
PACKET PROCESSING METHOD AND FIRST NETWORK DEVICE
Embodiments of this application disclose a packet processing method. The method in the embodiments of this application includes: receiving a first negotiation packet from a second network device based on a first interface of a first network device, where the first negotiation packet includes a first source media access control MAC address; determining whether the first source MAC address is the same as a first locked MAC address stored by the first network device, where the first locked MAC address is a MAC address of a network device that is determined by the first network device and that has established negotiation with the first network device; and when it is determined that the first source MAC address is different from the first locked MAC address stored by the first network device, skipping updating a link status of a first link based on the first negotiation packet.
PACKET PROCESSING METHOD AND FIRST NETWORK DEVICE
Embodiments of this application disclose a packet processing method. The method in the embodiments of this application includes: receiving a first negotiation packet from a second network device based on a first interface of a first network device, where the first negotiation packet includes a first source media access control MAC address; determining whether the first source MAC address is the same as a first locked MAC address stored by the first network device, where the first locked MAC address is a MAC address of a network device that is determined by the first network device and that has established negotiation with the first network device; and when it is determined that the first source MAC address is different from the first locked MAC address stored by the first network device, skipping updating a link status of a first link based on the first negotiation packet.
COMMUNICATION NODE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
A method for a communication node is presented. The method may include storing, in the memory, a set of desired network performance characteristics for an application. The method may further include storing, in the memory, a plurality of traffic-control configurations, where each of the plurality of traffic-control configurations is associated with an estimated power usage and a set of estimated network performance characteristics. The method may also include selecting, to execute the application, a particular traffic-control configuration from a set of two or more traffic-control configurations in the plurality of traffic-control configurations, where the set of two or more traffic-control configurations meet the set of desired network performance characteristics for the application. The method may further include configuring the communication node based on the particular traffic-control configuration.