Abstract:
Embodiments of the present invention provide a handover method, base station, user equipment, and mobility management entity. The handover method includes: obtaining an algorithm used by a user equipment in a universal mobile telecommunication system and four least significant bits of a downlink non-access stratum count; and sending a handover command to the user equipment, where the handover command carries the algorithm used by the user equipment in the universal mobile telecommunication system and the four least significant bits of the downlink non-access stratum count, so that the user equipment calculates a cipher key and an integrity key according to the four least significant bits of the downlink non-access stratum count.
Abstract:
The present invention discloses a heat exchange plate, heat exchanger, and communication base station cabinet. The heat exchange plate includes a heat exchange plate body that has an air duct, an air inlet is disposed on a first side surface of the heat exchange plate body and an air outlet is disposed on an adjacent second side surface of the heat exchange plate body. The air duct is formed between the air inlet and the air outlet, and a diversion structure for guiding air to flow is disposed in the air duct.
Abstract:
A dynamic link library loading method includes: when an identifier of a first dynamic link library is not in a list of loaded dynamic link libraries, allocating a handle to the first dynamic link library, and adding the identifier of the first dynamic link library and the handle allocated to the first dynamic link library to the list of the loaded dynamic link libraries; and when the first dynamic link library is an integrated dynamic link library, adding identifiers of one or more dynamic link libraries for integration and the handle allocated to the first dynamic link library to the list of loaded dynamic link libraries; and based on the handle allocated to the first dynamic link library, loading the first dynamic link library into a running memory of an electronic device.
Abstract:
A method for accessing a memory of a multi-core system, a related apparatus, a system, and a storage medium involve obtaining data from a system memory according to a prefetch instruction, sending a message to a core that carries the to-be-accessed data. Each segment of data is stored in an intra-core cache based on the prefetch instruction.
Abstract:
An embedded universal integrated circuit card (eUICC) management method, an eUICC, an SM platform, and a system are provided. The method includes: acquiring, by an eUICC, capability information of a terminal in which the eUICC is embedded; and sending, by the eUICC, the capability information of the terminal to an SM platform, so that the SM platform manages a profile on the eUICC or generates a profile or manages the eUICC according to the capability information of the terminal. Capability information of a terminal in which the eUICC is embedded is reported to an SM platform, so that processing such as generation or management of a configuration file can match the capability information of the terminal, which improves processing accuracy.
Abstract:
A command-line interface (CLI) displaying method includes receiving a typed character, determining whether a character is displayed in a prompt information displaying area, deleting the character displayed in the prompt information displaying area when the character is displayed in the prompt information displaying area, and displaying information obtained by processing a command string currently displayed in a command line displaying area in the prompt information displaying area.
Abstract:
The present disclosure relates to the field of communications technologies. The method in embodiments of the present disclosure includes: determining a destination switch for service migration when a flow table capacity of a source switch is greater than a specified threshold; generating an equivalent flow entry that is equivalent to each initial flow entry of at least two initial flow entries stored in the source switch, and delivering each generated equivalent flow entry to the destination switch, where an equivalent flow entry that is equivalent to any initial flow entry is used by the destination switch to process a data packet that matches the any initial flow entry and that is forwarded by the source switch; and generating an aggregated flow entry by aggregating the at least two initial flow entries, and delivering the aggregated flow entry to the source switch.
Abstract:
A method and a device for optimizing and configuring a detection rule, where the method includes: a network entity receives network traffic; extracts a packet from the network traffic, and identifies, according to a feature of the packet, protocol related information used in the network; saves the protocol related information and correspondence between pieces of information in the protocol related information to a first learning association table; and matches a corresponding rule from a vulnerability rule base according to the protocol related information to generate a first compact rule set. Through the generated compact rule set in the present invention, subsequent protocol detection is performed only for a protocol threat that may occur in a live network; therefore, content that needs to be detected subsequently is reduced, the detection efficiency is improved, and unnecessary performance consumption is avoided at the same time.
Abstract:
A method and a device for optimizing and configuring a detection rule, where the method includes: a network entity receives network traffic; extracts a packet from the network traffic, and identifies, according to a feature of the packet, protocol related information used in the network; saves the protocol related information and correspondence between pieces of information in the protocol related information to a first learning association table; and matches a corresponding rule from a vulnerability rule base according to the protocol related information to generate a first compact rule set. Through the generated compact rule set in the present invention, subsequent protocol detection is performed only for a protocol threat that may occur in a live network; therefore, content that needs to be detected subsequently is reduced, the detection efficiency is improved, and unnecessary performance consumption is avoided at the same time.
Abstract:
Embodiments of the present invention provide a handover method, base station, user equipment, and mobility management entity. The handover method includes: obtaining an algorithm used by a user equipment in a universal mobile telecommunication system and four least significant bits of a downlink non-access stratum count; and sending a handover command to the user equipment, where the handover command carries the algorithm used by the user equipment in the universal mobile telecommunication system and the four least significant bits of the downlink non-access stratum count, so that the user equipment calculates a cipher key and an integrity key according to the four least significant bits of the downlink non-access stratum count.