H04W12/104

WIRELESS COMMUNICATIONS

A method for operating a User Equipment (UE) is disclosed, wherein the UE is served by a source first network function in a first network and requires to register with a target second network function in a second network. The method comprises generating a registration request with integrity protection for at least a part of the registration request, and sending an integrity protected part of the registration request to the source first network function via the target second network function.

WIRELESS COMMUNICATIONS

A method for operating a User Equipment (UE) is disclosed, wherein the UE is served by a source first network function in a first network and requires to register with a target second network function in a second network. The method comprises generating a registration request with integrity protection for at least a part of the registration request, and sending an integrity protected part of the registration request to the source first network function via the target second network function.

SIGNAL TRANSMISSION METHOD AND APPARATUS
20210377774 · 2021-12-02 ·

This application provides a signal transmission method and apparatus. The method includes: A neighboring cell sends downlink reference signal resource configuration information to a serving cell. The serving cell sends a downlink reference signal measurement request including downlink reference signal resource configuration information to a terminal device. The neighboring cell and the terminal device transmit a downlink reference signal based on the downlink reference signal resource configuration information. The terminal device obtains a downlink reference signal measurement result. The terminal device sends the downlink reference signal measurement result to the serving cell. The serving cell sends the downlink reference signal measurement result to the neighboring cell, or sends, to the neighboring cell, beam information that is about a beam between the neighboring cell and the terminal device and that is determined based on the downlink reference signal measurement result.

METHOD FOR PROVIDING PROOF OF PRESENCE
20210374374 · 2021-12-02 · ·

Method for providing proof of presence at a predefined location, comprising: an initialing step (E1) during which initialization data of a digital device (10) are transmitted to a server (20), a computing step (E2) in which the device iteratively computes, at a refresh frequency (FMIN), a time index (INDT), a step (E3) of displaying a validation matrix barcode on the screen of the device, and a step (E4) of validating a presence at the predefined location, comprising a sub step (E41) of scanning the validation matrix barcode displayed on the screen of the device by means of a communication terminal (30).

TECHNIQUES FOR SECURE AUTHENTICATION OF THE CONTROLLED DEVICES

According to an exemplary embodiment of the present disclosure, a computer program stored in a computer readable storage medium is disclosed. The computer program includes commands which cause a processor of a control device to execute steps below, the steps including: acquiring International Mobile Station Identity (IMSI) related to a Subscriber Identity Module (SIM) and location information of a controlled device from the controlled device; calculating a hash value obtained by hashing the IMSI by using a hash function; generating first signature data in which the hash value and the location information are encrypted with a private key of the control device by using an asymmetric key algorithm; generating first encryption data obtained by encrypting the first signature data with a public key of a home subscriber server by using the asymmetric key algorithm; and transmitting a connection request message including the first encryption data to the home subscriber server.

METHOD AND APPARATUS FOR REALIZING UPLINK POSITIONING, AND STORAGE MEDIUM
20220210761 · 2022-06-30 · ·

Provided are a method and an apparatus for implementing uplink positioning and a storage medium. The method includes: sending a first positioning instruction to a first measurement node set, where the first measurement node set includes at least three measurement nodes and a target node is located within a coverage range of the measurement nodes; receiving first positioning attribute information fed back by each measurement node and corresponding to the first positioning instruction, where the first positioning attribute information includes a measurement node identity and random access information of a cell where the measurement node is located; and sending a random access instruction carrying the first positioning attribute information to the target node, where the random access instruction is configured to trigger the target node to send a random access signal to the each measurement node to determine a communication distance between the target node and the each measurement node.

Blockchain-based patrol inspection proof storage method, apparatus, and electronic device

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based storage of patrol inspection proof are provided. One of the methods includes: receiving proof information of patrol inspection at a patrol inspection site; obtaining one or more operating environment parameters of the mobile terminal at a time of the patrol inspection, wherein the one or more operating environment parameters comprise at least location information and sensor data of the mobile terminal; performing credibility verification on the patrol inspection site based on the proof information, the location information, and the sensor data using an algorithm model based on labeled identification information, labeled operating environment parameters, and historical attendance information; and in response to the credibility verification being successful, uploading verification information associated with the proof information for storing in a blockchain.

Blockchain-based patrol inspection proof storage method, apparatus, and electronic device

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based storage of patrol inspection proof are provided. One of the methods includes: receiving proof information of patrol inspection at a patrol inspection site; obtaining one or more operating environment parameters of the mobile terminal at a time of the patrol inspection, wherein the one or more operating environment parameters comprise at least location information and sensor data of the mobile terminal; performing credibility verification on the patrol inspection site based on the proof information, the location information, and the sensor data using an algorithm model based on labeled identification information, labeled operating environment parameters, and historical attendance information; and in response to the credibility verification being successful, uploading verification information associated with the proof information for storing in a blockchain.

AUTOMATED REMOTE ID MONITORING NETWORK
20220191698 · 2022-06-16 ·

Techniques and systems are described for monitoring remote identifiers transmitted by aerial devices and for detecting whether an aerial device is engaging in suspicious activities. A described technique can include determining, based on information collected from one or mom network components associated with a cellular network, that an aerial device is communicating via the cellular network and is operating in a geographical area; determining whether the aerial device corresponds to a remote identifier which is transmitted within the geographical area or reported for the geographical area; and providing an alarm notification based on the aerial device lacking a correspondence to a remote identifier which is transmitted within the geographical area or reported for the geographical area.

AUTOMATED REMOTE ID MONITORING NETWORK
20220191698 · 2022-06-16 ·

Techniques and systems are described for monitoring remote identifiers transmitted by aerial devices and for detecting whether an aerial device is engaging in suspicious activities. A described technique can include determining, based on information collected from one or mom network components associated with a cellular network, that an aerial device is communicating via the cellular network and is operating in a geographical area; determining whether the aerial device corresponds to a remote identifier which is transmitted within the geographical area or reported for the geographical area; and providing an alarm notification based on the aerial device lacking a correspondence to a remote identifier which is transmitted within the geographical area or reported for the geographical area.