Patent classifications
H04W12/10
Method for ensuring the integrity of data to ensure operational safety and vehicle-to-X device
A method for ensuring integrity of data sent by a vehicle V2X communication device to a control module to ensure operational safety, including: receiving data transferred by vehicle-to-X communication by a first computing apparatus of the V2X communication device, storing the data in a data memory, forwarding the data to a second computing apparatus, receiving the data by the second computing apparatus, establishing whether an action is to be triggered for the data and, in response, transmitting the data to a comparison apparatus, carrying out a comparison test for the data provided by the second computing apparatus with the data stored in the data memory and, in response to the test being passed, outputting the data and/or a control instruction and/or a warning message by the V2X communication device to a control module. Furthermore, a corresponding vehicle-to-X device and the use of the device in a vehicle are disclosed.
Enhanced LDACS system having LDACS underlay and overlay networks and associated methods
An enhanced L-band Digital Aeronautical Communications System (LDACS) may include LDACS ground stations, and a LDACS airborne stations configured to communicate with the LDACS ground stations. The enhanced LDACS may also include a network controller configured to operate the LDACS ground stations and LDACS airborne stations at different transmission powers to define an LDACS underlay network and an LDACS overlay network. The LDACS underlay network may have a larger cell size than the LDACS overlay network. Portions of the LDACS underlay network may be installed prior in time to portions of the LDACS overlay network.
Enhanced LDACS system having LDACS underlay and overlay networks and associated methods
An enhanced L-band Digital Aeronautical Communications System (LDACS) may include LDACS ground stations, and a LDACS airborne stations configured to communicate with the LDACS ground stations. The enhanced LDACS may also include a network controller configured to operate the LDACS ground stations and LDACS airborne stations at different transmission powers to define an LDACS underlay network and an LDACS overlay network. The LDACS underlay network may have a larger cell size than the LDACS overlay network. Portions of the LDACS underlay network may be installed prior in time to portions of the LDACS overlay network.
Data communication system to selectively and securely couple distributed ledgers with artificial intelligence (AI) engines
A data communication system generates Artificial Intelligence (AI) responses to distributed ledger data. In the data communication system, ledger clients discover distributed ledgers and establish hardware-trust with the distributed ledgers. The ledger clients discover AI engines and establish hardware-trust with the AI engines. The ledger clients read ledger information from the top data blocks of the distributed ledgers and select top-block ledger information. The ledger clients select AI engines to receive the selected top-block ledger information and transfer the selected ledger information to the selected AI engines. The selected AI engines process the selected top-block ledger information and generate the AI responses.
Data communication system to selectively and securely couple distributed ledgers with artificial intelligence (AI) engines
A data communication system generates Artificial Intelligence (AI) responses to distributed ledger data. In the data communication system, ledger clients discover distributed ledgers and establish hardware-trust with the distributed ledgers. The ledger clients discover AI engines and establish hardware-trust with the AI engines. The ledger clients read ledger information from the top data blocks of the distributed ledgers and select top-block ledger information. The ledger clients select AI engines to receive the selected top-block ledger information and transfer the selected ledger information to the selected AI engines. The selected AI engines process the selected top-block ledger information and generate the AI responses.
DATA CENTER 5G NETWORK ENCRYPTED MULTICAST-BASED AUTHORITY AUTHENTICATION METHOD AND SYSTEM
A data center 5.sup.th-Generation (5G) network encrypted multicast-based authority authentication method, system, and device, and a medium. In the present disclosure, authority authentication and data connection are performed on each platform of a data center by 5G network encrypted multicast, and a network encrypted multicast component is configured on the platform of the data center. An encrypted multicast packet is sent to a network by the platform. Connection is completed by handshaking and mutual heartbeat transmission between the platforms. Authority verification is performed through the multicast packet. In this manner, the problem of security risk of traditional authority authentication may be reduced, and the intercommunication speed and efficiency of each platform of the data center may be improved greatly.
DATA CENTER 5G NETWORK ENCRYPTED MULTICAST-BASED AUTHORITY AUTHENTICATION METHOD AND SYSTEM
A data center 5.sup.th-Generation (5G) network encrypted multicast-based authority authentication method, system, and device, and a medium. In the present disclosure, authority authentication and data connection are performed on each platform of a data center by 5G network encrypted multicast, and a network encrypted multicast component is configured on the platform of the data center. An encrypted multicast packet is sent to a network by the platform. Connection is completed by handshaking and mutual heartbeat transmission between the platforms. Authority verification is performed through the multicast packet. In this manner, the problem of security risk of traditional authority authentication may be reduced, and the intercommunication speed and efficiency of each platform of the data center may be improved greatly.
METHODS FOR ESTABLISHING SOCIAL RELATIONSHIP AND TERMINAL
Methods for establishing a social relationship, and a terminal, a server and a storage medium are provided. The method includes: in response to a request for establishing a social relationship with a target account by a first account, obtaining an interactive verification condition set by the target account for the first account, and a social interaction permission corresponding to the interactive verification condition; obtaining the social interaction state of the first account with the target account within the social interaction permission; and when the social interaction state satisfies the interaction verification condition, establishing the social relationship between the target account and the first account.
User Equipment and Method Performed Therein for Communication in a Wireless Communication Network
A method performed by a UE (10) for evaluating validity of a radio link, wherein the UE (10) is operating in a wireless communication network, and wherein the UE (10) receives a signal on the radio link. The UE (10) determines (401) that the received signal comprises a time synchronization message and a security extension associated with the time synchronization message. The UE (10) further determines (402) that the radio link is valid if a security mechanism related to the security extension indicates that the time synchronization message is valid. The UE (10) further determines (403) that the radio link is non-valid if the security mechanism related to the security extension indicates that the time synchronization message is non-valid.
User Equipment and Method Performed Therein for Communication in a Wireless Communication Network
A method performed by a UE (10) for evaluating validity of a radio link, wherein the UE (10) is operating in a wireless communication network, and wherein the UE (10) receives a signal on the radio link. The UE (10) determines (401) that the received signal comprises a time synchronization message and a security extension associated with the time synchronization message. The UE (10) further determines (402) that the radio link is valid if a security mechanism related to the security extension indicates that the time synchronization message is valid. The UE (10) further determines (403) that the radio link is non-valid if the security mechanism related to the security extension indicates that the time synchronization message is non-valid.