H04L12/04

ADAPTIVE BACKOFF TIME IN POWER-OVER-ETHERNET DETECTION CYCLES
20230038813 · 2023-02-09 ·

One aspect provides a power sourcing equipment controller for providing power to a powered device using power-over-Ethernet (PoE). The power sourcing equipment includes a voltage-output logic block to output a sequence of voltage signals, the voltage signals comprising at least a detection signal and a classification signal; a current-measurement logic block to measure current provided responsive to the voltage signals; a backoff-time-determination logic block to determine a backoff time in response to the current-measurement logic block detecting the provided current exceeding a predetermined threshold, the backoff time being determined based on an amount of time needed for discharging an internal capacitor associated with the powered device; and a timing logic block to cause the voltage-output logic block to delay the output of a next sequence of voltage signals based on the determined backoff time, thereby facilitating powering up of a device compliant with a different PoE standard.

ADAPTIVE BACKOFF TIME IN POWER-OVER-ETHERNET DETECTION CYCLES
20230038813 · 2023-02-09 ·

One aspect provides a power sourcing equipment controller for providing power to a powered device using power-over-Ethernet (PoE). The power sourcing equipment includes a voltage-output logic block to output a sequence of voltage signals, the voltage signals comprising at least a detection signal and a classification signal; a current-measurement logic block to measure current provided responsive to the voltage signals; a backoff-time-determination logic block to determine a backoff time in response to the current-measurement logic block detecting the provided current exceeding a predetermined threshold, the backoff time being determined based on an amount of time needed for discharging an internal capacitor associated with the powered device; and a timing logic block to cause the voltage-output logic block to delay the output of a next sequence of voltage signals based on the determined backoff time, thereby facilitating powering up of a device compliant with a different PoE standard.

Preventing shortened lifetimes of security keys in a wireless communications security system

23A wireless communications device has a first security key, a second security key, and established channels. Each established channel has a corresponding security count value, and utilizes a security key. At least one of the established channels utilizes the first security key. The second security key is assigned to a new channel. A first set is then used to obtain a first value. The first set has only security count values of all the established channels that utilize the second key. The first value is at least as great as the x most significant bits (MSB.sub.x) of the greatest value in the first set. The MSB.sub.x of the initial security count value for the new channel is set equal to the first value. If the first set is empty, then the initial security count is set to zero.

Method and user equipment for handling of integrity check failures of PDCP PDUS

Embodiments herein provide a method and a UE for handling of integrity check failures of Packet Data Convergence Protocol (PDCP) Protocol Data Units (PDUs) in a wireless communication system. The method includes performing an integrity check at a PDCP layer on at least one Radio Bearer based on a Message Authentication Code-Integrity (MAC-I) of the PDCP PDU. The method includes determining a success of integrity check of the PDCP PDU or a failure of integrity check of the PDCP PDU received on the radio bearer. Further, the method includes discarding the PDCP PDU for which integrity is check failed. Furthermore, the method includes indicating a Radio Resource Control (RRC) layer about the integrity check failure on the at least one radio bearer in response to determining a trigger condition.

Method and user equipment for handling of integrity check failures of PDCP PDUS

Embodiments herein provide a method and a UE for handling of integrity check failures of Packet Data Convergence Protocol (PDCP) Protocol Data Units (PDUs) in a wireless communication system. The method includes performing an integrity check at a PDCP layer on at least one Radio Bearer based on a Message Authentication Code-Integrity (MAC-I) of the PDCP PDU. The method includes determining a success of integrity check of the PDCP PDU or a failure of integrity check of the PDCP PDU received on the radio bearer. Further, the method includes discarding the PDCP PDU for which integrity is check failed. Furthermore, the method includes indicating a Radio Resource Control (RRC) layer about the integrity check failure on the at least one radio bearer in response to determining a trigger condition.

Authentication device, network device, communication system, authentication method, and non-transitory computer readable medium

Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.

Authentication device, network device, communication system, authentication method, and non-transitory computer readable medium

Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.

MODULAR SYSTEM (SWITCHBOARDS AND MID-PLANE) FOR SUPPORTING 50G OR 100G ETHERNET SPEEDS OF FPGA+SSD
20230085624 · 2023-03-23 ·

A chassis front-end is disclosed. The chassis front-end may include a switchboard including an Ethernet switch, a Baseboard Management Controller, and a mid-plane connector. The chassis front-end may also include a mid-plane including at least one storage device connector and a speed logic to inform at least one storage device of an Ethernet speed of the chassis front-end. The Ethernet speeds may vary.

MODULAR SYSTEM (SWITCHBOARDS AND MID-PLANE) FOR SUPPORTING 50G OR 100G ETHERNET SPEEDS OF FPGA+SSD
20230085624 · 2023-03-23 ·

A chassis front-end is disclosed. The chassis front-end may include a switchboard including an Ethernet switch, a Baseboard Management Controller, and a mid-plane connector. The chassis front-end may also include a mid-plane including at least one storage device connector and a speed logic to inform at least one storage device of an Ethernet speed of the chassis front-end. The Ethernet speeds may vary.

AUTHENTICATION DEVICE, NETWORK DEVICE, COMMUNICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.