Patent classifications
H04W12/033
Selective relay of data packets
The disclosure relates generally to wireless communication, and more particularly to selective relay of data packets. A method includes listening to a host device in one or more listening time slots of a host piconet, identifying one or more bitmap portions of a bitmap, wherein the identified one or more bitmap portions corresponds to the one or more listening time slots of the host piconet, determining whether a data packet having a data packet payload is effectively received from the host device during the one or more listening time slots, and populating the bitmap with one or more corresponding signifiers.
Multi-services gateway device at user premises
An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and one or more endpoint devices associated with the application gateway. The application gateway can be controlled remotely by the application service provider through a service management center and configured to execute an application service provided from the application service provider. The application gateway can execute the application service at the user premises upon voice command by a user and independent of application services executing on the application service provider's network. An application service logic manager can communicate with an application service enforcement manager to verify that the request conforms with the policy and usage rules associated with the application service in order to authorize execution of the application service on the application gateway, either directly or through endpoint devices.
Multi-services gateway device at user premises
An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and one or more endpoint devices associated with the application gateway. The application gateway can be controlled remotely by the application service provider through a service management center and configured to execute an application service provided from the application service provider. The application gateway can execute the application service at the user premises upon voice command by a user and independent of application services executing on the application service provider's network. An application service logic manager can communicate with an application service enforcement manager to verify that the request conforms with the policy and usage rules associated with the application service in order to authorize execution of the application service on the application gateway, either directly or through endpoint devices.
Secure streaming of real-time location data between electronic devices
Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.
Secure streaming of real-time location data between electronic devices
Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.
Wireless communication system, communication method, transmitter and receiver
A transmitter includes a first measurement unit configured to measure a radio wave environment between the transmitter and a receiver for an individual wireless resource, a transmission control unit configured to determine the wireless resource and a parameter on a basis of the measurement result of the radio wave environment, an encoder unit configured to perform distributed coding of the bit sequence on a basis of the parameter, and a transmission unit configured to transmit information representing the determined wireless resource and the distributed coded bit sequence, by using the determined wireless resource. The receiver includes a second measurement unit configured to measure the radio wave environment for the individual wireless resource, a reception control unit configured to estimate the parameter on a basis of the measurement result of the radio wave environment, a reception unit configured to receive the information representing the determined wireless resource and the distributed coded bit sequence, by using the determined wireless resource, and a decoder unit configured to decode the received bit sequence on a basis of the parameter.
HEARING DEVICE WITH REMOTE FITTING, HEARING SYSTEM, AND RELATED METHODS
The present disclosure relates to methods and devices for a hearing system. A method, performed by a hearing device of a hearing system comprising a hearing device system and an external device, the hearing device system comprising the hearing device and a user accessory device with a user application installed thereon is disclosed, the method comprising receiving, from the user accessory device, secure hearing system data, the secure hearing system data comprising a data type identifier; determining a data type of the secure hearing system data based on the data type identifier; determining hearing system data by applying a security scheme to the secure hearing system data based on the data type; and operating the hearing device according to the hearing system data.
HEARING DEVICE WITH REMOTE FITTING, HEARING SYSTEM, AND RELATED METHODS
The present disclosure relates to methods and devices for a hearing system. A method, performed by a hearing device of a hearing system comprising a hearing device system and an external device, the hearing device system comprising the hearing device and a user accessory device with a user application installed thereon is disclosed, the method comprising receiving, from the user accessory device, secure hearing system data, the secure hearing system data comprising a data type identifier; determining a data type of the secure hearing system data based on the data type identifier; determining hearing system data by applying a security scheme to the secure hearing system data based on the data type; and operating the hearing device according to the hearing system data.
TERMINAL APPARATUS, METHOD, AND INTEGRATED CIRCUIT
A terminal apparatus is provided. The terminal apparatus includes a receiver configured to receive a first message from a base station apparatus, and a processing unit configured to modify first data radio bearer configuration configured for the terminal apparatus, based on the first message. A first PDCP entity is reconfigured as a packet data convergence protocol (PDCP) entity for the first data radio bearer. A first secrecy key for a source and a second secrecy key for a target are configured for the first PDCP entity as secrecy keys for the first data radio bearer. In a case that the first message includes first information and second information, the second secrecy key for the target of the first PDCP entity is configured based on the second information. In a case that the first message does not include the first information, the first secrecy key for the source is applied to the second secrecy key for the target of the first PDCP entity.
Consolidation of User Plane and Control Plane Reports in a 5G Communication Network
A method of performing a virtual network function. The method comprises forking a user plane process on a computer by a virtual network function process that executes on the computer, forking a control plane process on the computer by the virtual network function process, adding blocks to a user plane blockchain by the user plane process that record user plane events, adding blocks to a control plane blockchain by the control plane process that record control plane events, creating a first package of information by the user plane process based on the user plane blockchain, self-terminating by the user plane process while passing the first package of information to the virtual network function process, creating a second package of information by the control plane process based on the control plane blockchain, self-terminating by the control plane process while passing the second package of information to the virtual network function process.