Patent classifications
H04L47/38
Management, by an intermediate device, of the quality of transmission of a data stream to a mobile terminal
The invention concerns a method for transmitting a piece of digital content consisting of a plurality of data packets to a mobile terminal (10), via a communication network (20), in which a management device (30) implements the obtaining (E11, E23, F8, F33), from the communication network, of at least one piece of information related to the bandwidth available on at least one link of the network to the mobile terminal, the selection (E12, E24, F10, F34), depending on said piece of information related to the bandwidth, of an encoding rate (RES) to use for at least one of said data packets, and the sending (E14, E25, F16, F38), to a device intended to provide the digital content (41), of a message indicating the selected encoding rate, in order to instruct the equipment intended to provide the digital content (41) to transmit, to the mobile terminal, at least one of the data packets, encoded with the selected encoding rate, on one of the network links.
Dictionary configuration method, buffer control method, network side device and user equipment
A dictionary configuration method, a buffer control method, a network side device and a UE are provided. The buffer control method for the network side device includes: receiving, by the network side device, first check information transmitted by the UE; determining, by the network side device, whether content in a compression buffer of the UE is identical to content in a decompression buffer of the network side device; and when the content in the compression buffer is different from the content in the decompression buffer, transmitting, by the network side device, buffer resetting information to the UE.
Reestablishment of lost radio link between user equipment and source node using cryptographic verification based on a secret key
For each target cell determined by a handover decision process, a first message is transmitted from a source base station (20S) to a target base station (20T) servicing that target cell. The first message includes an identifier of a wireless device (10) having a communication link with the source base station and information for obtaining authentication data for this wireless device. The authentication data depends on a secret key available to the wireless device and the source base station and on an identity of the target cell. Upon failure of the communication link, a cell is selected at the wireless device, which transmits to that cell a reestablishment request message including its identifier and authentication data depending on the secret key and on an identity of the selected cell. If the selected cell is a target cell serviced by a target base station that received a first message, conformity of the authentication data included in the reestablishment request message with the authentication data obtained from this first message is verified to authorize transfer of the communication link to the selected cell.
Reestablishment of lost radio link between user equipment and source node using cryptographic verification based on a secret key
For each target cell determined by a handover decision process, a first message is transmitted from a source base station (20S) to a target base station (20T) servicing that target cell. The first message includes an identifier of a wireless device (10) having a communication link with the source base station and information for obtaining authentication data for this wireless device. The authentication data depends on a secret key available to the wireless device and the source base station and on an identity of the target cell. Upon failure of the communication link, a cell is selected at the wireless device, which transmits to that cell a reestablishment request message including its identifier and authentication data depending on the secret key and on an identity of the selected cell. If the selected cell is a target cell serviced by a target base station that received a first message, conformity of the authentication data included in the reestablishment request message with the authentication data obtained from this first message is verified to authorize transfer of the communication link to the selected cell.
Method and apparatus for transmitting resources and non-transitory storage medium
The present disclosure provides a method for transmitting resources. The method includes: determining the target bitrate of a target moment; in response to the target bitrate being inconsistent with the current bitrate, acquiring target address information of a multimedia resource having said target bitrate; and sending to a server a frame acquisition request carrying the target address information, the frame acquisition request being used to instruct the server to return a media frame of said multimedia resource at the target bit rate.
Method and apparatus for transmitting resources and non-transitory storage medium
The present disclosure provides a method for transmitting resources. The method includes: determining the target bitrate of a target moment; in response to the target bitrate being inconsistent with the current bitrate, acquiring target address information of a multimedia resource having said target bitrate; and sending to a server a frame acquisition request carrying the target address information, the frame acquisition request being used to instruct the server to return a media frame of said multimedia resource at the target bit rate.
METHODS AND SYSTEMS FOR DETECTING AND TRANSFERRING DEFECT INFORMATION DURING MANUFACTURING PROCESSES
A method, corresponding system, and computer program product for detecting and transferring defect information during a manufacturing process is disclosed. The method includes receiving data to be transferred from a source to a destination over a primary communication link. The method identifies at least one type of data in the received data in response to receiving the data to be transferred over the primary communication link. Thereafter, the method allows transfer of a first type of data from the at least one type of data to the destination over a secondary communication link, the first type of data corresponding to the defect information, and wherein the secondary communication link is different from the primary communication link. Further, the method allows transfer of a second type of data from the at least one type of data to the destination over the primary communication link.
VIDEO INTERCONNECT TERMINATION CHARGING
This disclosure describes a video interconnect system that may establish a Video over Long Term Evolution (ViLTE) communication session between two interacting client devices. In some examples, the video interconnect system may selectively establish a ViLTE communication based on one or more rules associated with the domain information of interacting client devices, availability of network bandwidth, bandwidth consumption of a video component of the ViLTE communication, or established service agreements between telecommunication service providers of the interacting client devices. Further, the video interconnect system may facilitate generating termination charges for a video and/or audio communication session of a ViLTE communication. For example, a video component of the ViLTE communication may be charged and metered based on data usage, and an audio component of the ViLTE communication may be charged and metered based on the duration and relative location of the interacting client devices.
Cooperative communication method, cloud server, and core network server
A cooperative communication method includes determining bandwidth of a first wireless network that user equipment (UE) currently accesses, determining bandwidth required by data to be sent to the UE, and when the bandwidth of the first wireless network cannot meet the bandwidth required by the to-be-sent data, sending a first part of data packets to the first wireless network, and sending a second part of the data packets to at least one core network, so that the at least one core network sends the second part of the data packets to the UE using at least one wireless network, where a communications protocol of the first wireless network is different from that of the at least one wireless network. Bandwidth resources can be integrated on wireless networks with different communications protocols, so that fluent transmission of data can be implemented.
System and method for providing data services on vehicles
Devices, systems, methods and computer-readable media are provided for data communication to and from a vehicle. A device is provided that includes memory storing processor-executable instructions; and at least one processor in communication with the memory that executes the stored instructions to: receive, from at least one user on the vehicle, at least one request for data communication; identify a plurality of communication links available at a current location of the moving vehicle; form an adaptive bonded communication link using the plurality of communication links to aggregate throughput across the plurality of communication links for the requested data communication, wherein the adaptive bonded communication link is configured to adapt to data communication requirements for the requested data communication and to data communication characteristics of the plurality of communication links as the vehicle moves. Corresponding methods, computer system products, uses, and computer-readable media are also provided.