Patent classifications
H04W12/037
Wireless communication terminal, access point, wireless communication system, wireless communication method, and recording medium
In a wireless communication terminal, a control circuit is configured to cause a wireless communicator to wirelessly connect to a first AP on the basis of authentication information of the first AP stored on a memory and is configured to execute authentication processing with the first AP on the basis of the authentication information of the first AP stored on the memory without executing setup processing when the control circuit selects a first mode. The control circuit is configured to start the setup processing with a second AP by using the wireless communicator when the control circuit selects the second mode. The control circuit is configured to cause the wireless communicator to wirelessly connect to the second AP and is configured to execute the authentication processing with the second AP on the basis of authentication information received from the second AP by the wireless communicator.
Automated Delivery Security System
A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.
Automated Delivery Security System
A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.
Communication device and non-transitory computer-readable medium storing computer-readable instructions for communication device
A communication device may accept an input of user authentication information, cause an output unit to output specific information obtained by using a public key in a case where authentication using the inputted user authentication information is successful. In a case where the authentication using the inputted user authentication information fails, the specific information is not outputted. The communication device may receive an authentication request in which the public key is used from a first external device, send an authentication response to the first external device, receive first connection information from the first external device, and establish a first wireless connection between the communication device and a second external device by using the first connection information.
Communication device and non-transitory computer-readable medium storing computer-readable instructions for communication device
A communication device may accept an input of user authentication information, cause an output unit to output specific information obtained by using a public key in a case where authentication using the inputted user authentication information is successful. In a case where the authentication using the inputted user authentication information fails, the specific information is not outputted. The communication device may receive an authentication request in which the public key is used from a first external device, send an authentication response to the first external device, receive first connection information from the first external device, and establish a first wireless connection between the communication device and a second external device by using the first connection information.
Datapath load distribution for a RIC
To provide a low latency near RT RIC, some embodiments separate the RIC's functions into several different components that operate on different machines (e.g., execute on VMs or Pods) operating on the same host computer or different host computers. Some embodiments also provide high speed interfaces between these machines. Some or all of these interfaces operate in non-blocking, lockless manner in order to ensure that critical near RT RIC operations (e.g., datapath processes) are not delayed due to multiple requests causing one or more components to stall. In addition, each of these RIC components also has an internal architecture that is designed to operate in a non-blocking manner so that no one process of a component can block the operation of another process of the component. All of these low latency features allow the near RT RIC to serve as a high speed IO between the E2 nodes and the xApps.
Datapath load distribution for a RIC
To provide a low latency near RT RIC, some embodiments separate the RIC's functions into several different components that operate on different machines (e.g., execute on VMs or Pods) operating on the same host computer or different host computers. Some embodiments also provide high speed interfaces between these machines. Some or all of these interfaces operate in non-blocking, lockless manner in order to ensure that critical near RT RIC operations (e.g., datapath processes) are not delayed due to multiple requests causing one or more components to stall. In addition, each of these RIC components also has an internal architecture that is designed to operate in a non-blocking manner so that no one process of a component can block the operation of another process of the component. All of these low latency features allow the near RT RIC to serve as a high speed IO between the E2 nodes and the xApps.
Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
Disclosed here is a system and method to determine which wireless telecommunication network functionalities are impaired when using end-to-end encryption and to ameliorate the impairment of the functionality. The system receives a request from a sender device to communicate with a receiver device, where the request indicates whether the sender device is capable of an end-to-end encryption. The system determines whether the receiver device is capable of the end-to-end encryption, and whether the receiver device is associated with a functionality provided by a wireless telecommunication network that is impaired when the end-to-end encryption is used. Upon determining that the receiver device is not capable of the end-to-end encryption or that the receiver device is associated with the functionality that is impaired, the system performs an action to ameliorate the impairment to the functionality.
Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
Disclosed here is a system and method to determine which wireless telecommunication network functionalities are impaired when using end-to-end encryption and to ameliorate the impairment of the functionality. The system receives a request from a sender device to communicate with a receiver device, where the request indicates whether the sender device is capable of an end-to-end encryption. The system determines whether the receiver device is capable of the end-to-end encryption, and whether the receiver device is associated with a functionality provided by a wireless telecommunication network that is impaired when the end-to-end encryption is used. Upon determining that the receiver device is not capable of the end-to-end encryption or that the receiver device is associated with the functionality that is impaired, the system performs an action to ameliorate the impairment to the functionality.
METHODS, APPARATUS AND SYSTEMS FOR ADDRESS CONFIGURATION FOR INTEGRATED ACCESS AND BACKHAUL LINKS
Methods, apparatus and systems for address configuration for integrated access and backhaul (IAB) links are disclosed. In one embodiment, a method performed by a first network node is disclosed. The method comprises: obtaining, from an operations administration and maintenance (OAM) or a second network node, a first address information related to at least one Internet Protocol security (IPsec) address; generating, based on the first address information, a second address information; and transmitting, to the second network node, the second address information based on a radio resource control (RRC) message, wherein the first network node and the second network node are connected via a backhaul link in an integrated access and backhaul (IAB) network.