Abstract:
The present invention relates to a method for transmitting an encrypted message between terminals, comprising the steps of: if a message application is executed on a screen of a terminal, running a keyboard that provides a security mode selection button in the message application execution window; if a user input with respect to the selecting button is sensed, receiving and temporarily storing the message that the user is inputting after switching to the security mode; and if an instruction indicating that writing has been completed is sensed through the keyboard, encrypting the message.
Abstract:
A chunk-based scheduling method and a chunk-based scheduling apparatus, capable of improving Quality of Service (QoS) upon the occurrence of congestion in a wireless communication system are provided. The method includes requesting, by a terminal, from a base station for chunk-based scheduling which uses an available bit rate bearer so as to receive chunk that constitutes traffic, and receiving, from the base station, at least one chunk scheduled based on the time limit information of the chunk.
Abstract:
A chunk-based scheduling method and a chunk-based scheduling apparatus, capable of improving Quality of Service (QoS) upon the occurrence of congestion in a wireless communication system are provided. The method includes requesting, by a terminal, from a base station for chunk-based scheduling which uses an available bit rate bearer so as to receive chunk that constitutes traffic, and receiving, from the base station, at least one chunk scheduled based on the time limit information of the chunk.
Abstract:
The present disclosure relates to a communication method and a system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as a smart home, a smart building, a smart city, a smart car, a connected car, health care, digital education, a smart retail, and security and safety services. A method and an apparatus for communicating voice calls in a communication system are provided. The apparatus includes a first terminal that is a representative terminal configured to receive a voice call sets up a function for using a call forwarding service with a second terminal that is an auxiliary terminal, when the first terminal detects an occurrence of an event complying with a certain criterion for performing a call forwarding service, to determine whether a call forwarding service with the second terminal is being executed, and to execute, unless the call forwarding service is being executed, the call forwarding service and to transfer a voice call received by the first terminal to the second terminal.
Abstract:
A method for providing a service by a transparent internet cache (TIC) server in a communication network supporting a multipath transport control protocol (MPTCP) is provided. The method includes establishing an MPTCP connection with a user equipment (UE) and an original server through a first network, upon receiving a service provision request from the UE, releasing the MPTCP connection established among the TIC server, the UE, and the original server if data related to a service corresponding to the service provision request is cached, and providing the service corresponding to the service provision request to the UE.
Abstract:
Methods and apparatus are provided for managing a Virtual Machine (VM) in a mobile communication system. Upon receiving a VM provisioning request message from a 3rd party entity, an Edge Cloud-Radio Access Network (EC-RAN) VM control command message, indicating that the Edge Cloud Management Controller (ECMC) commands a VM provisioning, is transmitted to an Edge Cloud Manager (ECM). An EC-RAN VM control command Ack message is received, including information indicating whether a VM host, which the EC-RAN VM control command message targets, accepts or rejects the EC-RAN VM control command message, and including a VM instance ID allocated to the VM host. A VM instance corresponding to the VM instance ID is registered and a status of the VM instance is set as an allocation status, after the EC-RAN VM control command Ack message is received from the ECM.
Abstract:
A method of performing user authentication of a mobile station by proxy in a communication system is provided. The method includes receiving an authentication request, which requests authentication of a user, from an Internet service provider having received information indicating that the mobile station can perform authentication based on only the mobile station's own information, requesting the user to provide security identification information for authentication, receiving the security identification information input by the user, authenticating the user by determining whether the security identification information is valid information, through security-requiring information managed by the mobile station, and transmitting an authentication result to the Internet service provider and receiving an authorized authentication result from the Internet service provider and providing a service according to the authorized authentication result to the user.
Abstract:
An apparatus and method for supporting a location update registration process used for an idle mode operation of a Mobile Station (MS) in a Machine-to-Machine (M2M) communication are provided. The method includes determining whether a system global location update registration timer is applied to the MS, when it is determined that the global location update registration timer is not applied, determining a timer for updating a location when the MS operates in an idle mode, and transmitting a message including the timer to the MS.
Abstract:
A 5G or pre-5G communication system is provided to support higher data transmission rates after 4G communication systems such as LTE. To support communication of a terminal that dually accesses a first radio access technology (RAT) communication system and a second RAT communication system, a session generation request message for transmitting traffic is received from a terminal. A target communication system that is to generate a data path with respect to the traffic from the first RAT communication system and the second RAT communication system is determined, the data path for the target communication system is configured, and information about the configured data path is transmitted to the terminal.
Abstract:
A method for detecting a section where congestion occurs in a data transmission path by a user equipment (UE) comprises receiving a first probe packet, receiving a second probe packet, measuring an interval in time of reception between the first probe packet and the second probe packet, determining whether the measured time interval exceeds a threshold, and determining whether a bottleneck occurs using a result of the determination and information contained in the probe packets, wherein the information contained in the probe packets is information about the time interval between the probe packets and transmission rates of load packets.