Patent classifications
H04W12/037
HARMONIZING NOISE AGGREGATION AND NOISE MANAGEMENT IN DISTRIBUTED ANTENNA SYSTEM
The present invention is directed to systems and methods for reducing noise levels by harmonization in a DCC-DAS using smart weighted aggregation of noise and signal resources to achieve an optimal signal to noise ratio in varying traffic and interference conditions.
METHOD AND APPARATUS FOR CONFIGURING BI-DIRECTIONAL CHANNEL IN WIRELESS COMMUNICATION SYSTEM
A method and apparatus for configuring a bi-directional channel in a wireless communication system is provided. A user equipment (UE) configures the bi-directional channel which is used for either an uplink (UL) channel or a sidelink (SL) channel, and transmits data via at least one of the UL channel or the SL channel. The bi-direction channel may be used for vehicle-to-everything (V2X) communication.
Gunshot detection system with forensic data retention, live audio monitoring, and two-way communication
A gunshot detection system includes gunshot sensor units with microphones for detecting gunshots and capturing audio data depicting the detected gunshots and other ambient sounds, an environmental board with various environmental sensors for generating environmental data indicating environmental conditions. The audio data, environmental data, and position information can be stored locally on local nonvolatile storage of the gunshot sensor unit for later retrieval by law enforcement entities. In one embodiment, the gunshot sensor units include a wired and/or wireless data transfer interface for transferring the audio data, environmental data and/or position information to handheld units of law enforcement entities. The gunshot sensor unit can also stream live captured audio data for live monitoring by a control panel, and might also include speakers for providing audio playback of audio data from the control panel.
Gunshot detection system with forensic data retention, live audio monitoring, and two-way communication
A gunshot detection system includes gunshot sensor units with microphones for detecting gunshots and capturing audio data depicting the detected gunshots and other ambient sounds, an environmental board with various environmental sensors for generating environmental data indicating environmental conditions. The audio data, environmental data, and position information can be stored locally on local nonvolatile storage of the gunshot sensor unit for later retrieval by law enforcement entities. In one embodiment, the gunshot sensor units include a wired and/or wireless data transfer interface for transferring the audio data, environmental data and/or position information to handheld units of law enforcement entities. The gunshot sensor unit can also stream live captured audio data for live monitoring by a control panel, and might also include speakers for providing audio playback of audio data from the control panel.
Method for Performing Verification by Using Shared Key, Method for Performing Verification by Using Public Key and Private Key, and Apparatus
A method and an apparatus for performing verification using a shared key are disclosed. The method includes: receiving, by a first network element, a registration request message from a second network element, where the registration request message includes a user identifier, first network identifier information, and second network identifier information, the second network identifier information is obtained by processing the first network identifier information by using a shared key, and the shared key is a key used between the first network element and the second network element; verifying, by the first network element, the registration request message by using the shared key; and sending, by the first network element, a registration response message to the second network element. When receiving a registration request from a visited network, a home network verifies the registration request message by using a shared key, to avoid a spoofing attack from the visited network.
Method for Performing Verification by Using Shared Key, Method for Performing Verification by Using Public Key and Private Key, and Apparatus
A method and an apparatus for performing verification using a shared key are disclosed. The method includes: receiving, by a first network element, a registration request message from a second network element, where the registration request message includes a user identifier, first network identifier information, and second network identifier information, the second network identifier information is obtained by processing the first network identifier information by using a shared key, and the shared key is a key used between the first network element and the second network element; verifying, by the first network element, the registration request message by using the shared key; and sending, by the first network element, a registration response message to the second network element. When receiving a registration request from a visited network, a home network verifies the registration request message by using a shared key, to avoid a spoofing attack from the visited network.
WIRELESS ACCESS CREDENTIAL SYSTEM
An access control system and methods according to at least one embodiment leverage wireless access credentials to allow a user to securely gain access to a secured area using his or her mobile device. As such, a credentialed mobile device may permit access to the secured area without requiring a real-time connection to a credential management system and/or an administrative system.
WIRELESS ACCESS CREDENTIAL SYSTEM
An access control system and methods according to at least one embodiment leverage wireless access credentials to allow a user to securely gain access to a secured area using his or her mobile device. As such, a credentialed mobile device may permit access to the secured area without requiring a real-time connection to a credential management system and/or an administrative system.
Method for reestablishing RRC connection, terminal and storage medium
Implementations of the disclosure provides a method for reestablishing an RRC connection, a terminal and a storage medium. In the method, a terminal determines a Packet Data Convergence Protocol (PDCP) for initiating an RRC connection reestablishment procedure, based on knowledge of the PDCP supported by a first base station, the PDCP is a first PDCP or a second PDCP. The terminal initiates the RRC connection reestablishment procedure to the first base station, based on the first PDCP or the second PDCP.
Methods and apparatuses for dynamically updating routing identifier(s)
Systems, methods, apparatuses, and computer program products for dynamically updating routing identifiers (IDs) are provided. One method may include deciding, at a network node, to update a routing identifier for at least one user equipment. The method may then include obtaining or generating a new routing identifier to be assigned to the at least one user equipment along with authentication vectors, and transmitting the new routing identifier to an authentication entity.