Patent classifications
H04M3/16
BASEBAND PROCESSOR AND METHOD FOR POWER SAVING BY ADJUSTMENT OF CLOCK RATE AND SUPPLY VOLTAGE
The disclosure relates to a baseband processing method, comprising: receiving a downlink (DL) baseband (BB) signal in a transmission time interval (TTI), wherein the DL BB signal comprises a time-frequency resource comprising a control section and a data section; decoding at least part of the control section to detect a DL grant information; if the DL grant information is detected, determine a number of granted data resource blocks from the DL grant information; and adjust at least one of a clock rate and supply voltage of the baseband processing based on the number of granted resource blocks.
BASEBAND PROCESSOR AND METHOD FOR POWER SAVING BY ADJUSTMENT OF CLOCK RATE AND SUPPLY VOLTAGE
The disclosure relates to a baseband processing method, comprising: receiving a downlink (DL) baseband (BB) signal in a transmission time interval (TTI), wherein the DL BB signal comprises a time-frequency resource comprising a control section and a data section; decoding at least part of the control section to detect a DL grant information; if the DL grant information is detected, determine a number of granted data resource blocks from the DL grant information; and adjust at least one of a clock rate and supply voltage of the baseband processing based on the number of granted resource blocks.
Operation related to user equipment using secret identifier
A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.
Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.
Communication apparatus, method for controlling communication apparatus, and storage medium
There is provided a communication apparatus. A first communication unit receives an advertise signal from an external apparatus. A second communication unit wirelessly communicates with the external apparatus by using a predetermined protocol. A control unit determines whether the external apparatus supports the predetermined protocol on the basis of the advertise signal from the external apparatus. If it is determined that the external apparatus does not support the predetermined protocol, the control unit performs control so that a request to start encrypted communication is sent to the external apparatus via the first communication unit. If it is determined that the external apparatus supports the predetermined protocol, the control unit performs control so that a request to start unencrypted communication is sent to the external apparatus via the first communication unit.
Method and system for peer-to-peer enforcement
Methods and systems are provided for establishing dynamic peer-to-peer communications channels between terminals. A connection request for establishing a communications channel between a first terminal and second terminal may be intercepted. The first terminal and the second terminal may be connectable over secured communications channels to a secured network. Based on the intercepted connection request and/or network parameters obtained from the first and the second terminals, the terminals may be instructed to establish a peer-to-peer communications channel over a network distinct from the secured network. Security of the peer-to-peer communications channel may be maintained, such as by use of authentication and/or encryption in one or both of the first terminal and the second terminal.
Authentication method and system
There is provided an authentication method and system where protection of user equipment (UE) privacy and network security can be improved. The system includes a third party communicatively trusted by and connected to the UE and one or more network entities, the third party configured to obtain identity information indicative of identity of the UE or the network entities and verify the UE and the network entities on whether the UE and the network entities are authorized to perform communications in the communication network. The third party is further configured to create mapping information, the mapping information including mappings between each identity indicated by the identity information and a respective temporary authentication identifier (ID) and according to the mapping information, transmit the respective temporary authentication ID to each of the UE and the network entities that are verified successfully by the third party. The system further includes the one or more network entities to which the UE is authenticated to access, each of the network entities configured to communicate with the UE or other network entities based on their respective temporary authentication ID.
Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
Mobile terminal, and safety verification method and device for mobile payment
Provided are a mobile terminal, and a safety verification method and device for mobile payment. The mobile terminal includes a payment card and an NFC chip, also includes: a conduction switch coupled between the payment card and the NFC chip, and configured to receive a control signal from a processor and control, according to the control signal, closing or opening of a conduction path between the financial card and the NFC chip; and the processor, which is configured to verify, before the financial card transacts with an external reader, verification information input by a user; generate, when the verification information input by the user passes the verification, a control signal for controlling the conduction switch to open the conduction path, and generate, when the verification information input by the user does not pass the verification, a control signal for controlling the conduction switch to close the conduction path.
Mobile terminal device, information management device, and information management system
According to the present invention, a mobile terminal device includes: an operation input section which accepts operations; a memory section which previously stores a list of states of the mobile terminal device during use as locking conditions to determine a state at the time of limiting an operation of the mobile terminal device; a state determining section which generates state information in accordance with a state of the mobile terminal device; and a function limiting section which determines whether the state information meets the locking conditions, and switches the mobile terminal device to a locked state to limit an operation of the operation input section, when the state information is determined to meet the locking conditions.