会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • TRANSMITTING DATA FROM A FIRST TO SECOND COMMUNICATION DEVICE USING TWO DIFFERENT MODULATION/CODING SCHEMES
    • 使用两种不同的调制/编码方案从第一到第二通信设备传输数据
    • WO2018056875A1
    • 2018-03-29
    • PCT/SE2016/050897
    • 2016-09-23
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    • WANG, YuWILHELMSSON, LeifHIERTZ, Guido RolandMESTANOV, Filip
    • H04L1/00H04B7/06H04W74/04H04W72/04
    • Method performed by a first communication device (101) for transmitting data to a second communication device (102). The first communication device (101) transmits (603) the data in a set of time-frequency resources (800) scheduled for transmission by the first communication device (101). The set of time-frequency resources (800) has a fixed duration and comprises: a) a first part (801) comprising the data and b) a second part (802). The first part (801) has a shorter duration than the fixed duration. The transmitting (603) of the data in the first part (801) is performed with a first modulation and coding scheme (MCS). The second part (802) has a remaining duration of the fixed duration. The second part (802) comprises at least one of: a padding, and additional data. The transmitting (603) further comprises transmitting said at least one of: the padding and the additional data, with a second MCS.
    • 由第一通信设备(101)执行的用于将数据发送到第二通信设备(102)的方法。 第一通信设备(101)在被调度用于由第一通信设备(101)发送的一组时间 - 频率资源(800)中发送(603)数据。 该组时频资源(800)具有固定的持续时间并且包括:a)包括数据的第一部分(801)和b)第二部分(802)。 第一部分(801)的持续时间比固定持续时间短。 用第一调制和编码方案(MCS)执行第一部分(801)中的数据的传输(603)。 第二部分(802)具有固定持续时间的剩余持续时间。 第二部分(802)包括以下中的至少一个:填充和附加数据。 发送(603)还包括用第二MCS发送所述填充和附加数据中的至少一个。
    • 10. 发明申请
    • METHODS AND DEVICES FOR PRIVACY ENHANCEMENT IN NETWORKS
    • 网络隐私增强的方法和设备
    • WO2017026930A1
    • 2017-02-16
    • PCT/SE2015/050865
    • 2015-08-11
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    • HIERTZ, GuidoMESTANOV, Filip
    • H04W48/18H04L9/08H04L9/30H04L29/06H04W48/20H04W84/12
    • H04L9/0827H04L9/0825H04W12/02H04W12/04H04W48/20H04W84/12
    • It is disclosed methods for operating mobile stations and access point's. Corresponding devices and computer programs are also disclosed. The method of operating a mobile station comprises a step S1 of obtaining a public key for encryption, a step S2 of encrypting the MAC address assigned to the STA by utilizing the obtained public key for encryption and a step S3 of creating, based on the encrypted MAC address, a message for transmission to the access point to enable the access point to decrypt the encrypted MAC address. The method of operating an access point comprises a step S10 of providing a public key for encryption to a mobile station, a step S20 of receiving a message from the STA, based on a MAC address that has been encrypted and the step S30 of decrypting, by utilizing at least the access point's private key, at least part of the message in order to obtain the MAC address assigned to the STA. The proposed technology provides for a secure communication while retaining smart network functionality.
    • 公开了用于操作移动台和接入点的方法。 还公开了相应的设备和计算机程序。 操作移动台的方法包括:获得用于加密的公开密钥的步骤S1,通过利用所获得的用于加密的公钥来加密分配给STA的MAC地址的步骤S2;以及基于加密的步骤 MAC地址,用于传输到接入点的消息,以使接入点解密加密的MAC地址。 操作接入点的方法包括:向移动台提供用于加密的公开密钥的步骤S10,基于已经被加密的MAC地址接收来自STA的消息的步骤S20,以及解密步骤S30, 通过至少利用接入点的私钥,至少部分消息来获得分配给STA的MAC地址。 所提出的技术提供了一种安全通信,同时保留智能网络功能。