H04W12/10

BLUETOOTH COMMUNICATION METHOD AND SYSTEM

A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.

Communication method and communications apparatus

This application provides a communication method and a communications device. The method includes: obtaining, by a first communications device, authorization information, where the authorization information indicates that a second communications device is a device that needs to perform time synchronization; and providing, by the first communications device, time information for the second communications device based on the authorization information; or obtaining, by the first communications device, authorization information, where the authorization information indicates that the second communications device is not a device that needs to perform time synchronization; and skipping, by the first communications device, providing time information for the second communications device based on the authorization information, to avoid broadcasting the time information to all communications devices, so that a time synchronization service can be provided for a specific communications device.

Communication method and communications apparatus

This application provides a communication method and a communications device. The method includes: obtaining, by a first communications device, authorization information, where the authorization information indicates that a second communications device is a device that needs to perform time synchronization; and providing, by the first communications device, time information for the second communications device based on the authorization information; or obtaining, by the first communications device, authorization information, where the authorization information indicates that the second communications device is not a device that needs to perform time synchronization; and skipping, by the first communications device, providing time information for the second communications device based on the authorization information, to avoid broadcasting the time information to all communications devices, so that a time synchronization service can be provided for a specific communications device.

Network connection method and device

A method for implementing network connection, applied to a base station, includes: receiving a connection resume request message sent by user equipment (UE); detecting, according to the connection resume request message, that at least one rejection cause of rejecting connection resumption is met; and sending a connection resume reject message to the UE, wherein the connection resume reject message carries a cause value indicating the at least one rejection cause.

Method and user equipment for handling of integrity check failures of PDCP PDUS

Embodiments herein provide a method and a UE for handling of integrity check failures of Packet Data Convergence Protocol (PDCP) Protocol Data Units (PDUs) in a wireless communication system. The method includes performing an integrity check at a PDCP layer on at least one Radio Bearer based on a Message Authentication Code-Integrity (MAC-I) of the PDCP PDU. The method includes determining a success of integrity check of the PDCP PDU or a failure of integrity check of the PDCP PDU received on the radio bearer. Further, the method includes discarding the PDCP PDU for which integrity is check failed. Furthermore, the method includes indicating a Radio Resource Control (RRC) layer about the integrity check failure on the at least one radio bearer in response to determining a trigger condition.

METHOD AND APPARATUS FOR SENDING UPLINK CONTROL INFORMATION FOR MULTI-RADIO ACCESS TECHNOLOGY OPERATION

A method and apparatus for sending uplink control information by a multi-mode wireless transmit/receive unit (WTRU) capable of operating on multiple component carriers of a plurality of radio access technologies (RATs) for multi-RAT operation are disclosed. The WTRU may generate uplink control information (UCI) pertaining to a first RAT and a second RAT, wherein the UCI may include a first plurality of hybrid automatic repeat request acknowledgements (HARQ-ACKs) pertaining to a plurality of downlink (DL) transmissions of the first RAT and a second plurality of HARQ-ACKs pertaining to a plurality of DL transmissions of the second RAT. The WTRU may multiplex at least part of the generated UCI pertaining to the first RAT and at least part of the generated UCI pertaining to the second RAT onto a physical channel on a component carrier of the second RAT.

COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A MERCHANT LOCATION USING A VIRTUAL CARD, IN REAL-TIME

The present disclosure is related to a computer-implemented method, card processing server, and non-transitory computer readable medium for determining a merchant location using a virtual card, in real-time. A card processing server may receive test transaction data from an acquirer bank of a merchant when a test transaction is initiated through a virtual card provided to the merchant. The card processing server may detect a record of the test transaction in a transaction database, in real-time, using one or more attributes of the virtual card stored in the card processing server and may retrieve signature data from the test transaction data upon detecting the record of the test transaction. Finally, the card processing server determines a transaction source data location of the merchant at which the test transaction was initiated and a registered name of the merchant based on the signature data.

VERIFICATION INFORMATION REVISING DEVICE, VERIFICATION INFORMATION REVISING METHOD, AND VERIFICATION INFORMATION REVISING PROGRAM

A verification information modification device includes processing circuitry configured to acquire, from each verification device that uses verification information of software to verify a file forming the software, an error log relating to erroneous detection that has occurred in the verification device, when it is determined that a same error has occurred in a predetermined number or more of verification devices based on the acquired error log, extract an error log of the error from acquired error logs and create information indicating verification information that has caused the erroneous detection and candidates for modification details of the verification information based on the extracted error log, and output the information indicating verification information that has caused the erroneous detection and candidates for modification details of the verification information.

SERVICE AUTHORIZATION METHOD, APPARATUS, AND SYSTEM
20230019000 · 2023-01-19 ·

Embodiments of this application relate to a service authorization method and system, and an apparatus. The method includes: A first NRF receives a first request requesting an access token for accessing service of a second NF in a second network from a first NF, where the first NF and the first NRF are located in a first network, and the first request includes SNPN information of the first network and/or the second network. The first NRF forwards the first request to a second NRF located in the second network. The second NRF generates an access token in response to the first request, where the access token includes the SNPN information of the first network and/or the second network. The second NRF sends the access token to the first NRF. The first NRF receives the access token and sends the access token to the first NF.

ELECTRONIC DEVICE AND ELECTRONIC DEVICE CONTROL METHOD

An electronic device includes a memory storing instructions, and a processor configured to execute the instructions to, based on receiving one or more packets from an external device, identify whether the one or more packets are encrypted, acquire first information indicating whether each of the one or more packets is encrypted and second information indicating a received signal strength indicator (RSSI) of each of the one or more packets, and acquire authenticated RSSI information of the external device by identifying RSSI information of an encrypted first packet based on the first information and the second information.