Abstract:
In an implementation, a first electronic control unit (ECU) performs an operation using a first key and a first fresh value to generate a keystream; performs an exclusive OR operation using the keystream and a to-be-transmitted first plaintext packet to generate a first ciphertext packet; and sends the first ciphertext packet to a second ECU. The first fresh value is a value generated by a counter in the first ECU when the first ECU transmits a packet, and the counter is configured to record a quantity of packets transmitted by the first ECU. The first ECU transmits the first ciphertext packet to the second ECU. This can prevent the first packet transmitted by the first ECU from being eavesdropped on, and help improve confidentiality of the packet transmitted by the first ECU.
Abstract:
Example uplink switching methods and apparatus are described. One example method include performing switching between a supplementary uplink (SUL) and a normal (NUL), where a switching time period for the switching between the SUL and the NUL is longer than 0 microseconds. Therefore, the SUL and the NUL can share a radio frequency channel so that the shared radio frequency channel can be switched between the SUL and the NUL.
Abstract:
This application discloses a communication method, apparatus, and system, and relates to the field of communication technologies. The method includes: obtaining a second key used for communication authentication with a second node, where the second key is different from a preconfigured first key; receiving, from the second node, a release request for a first communication connection, where the first key is used for communication authentication on the first communication connection; and sending a connection establishment request to the second node, where the connection establishment request is used to request to establish a connection based on the second key. The method provides a technical solution in which the first node and the second node release a connection after determining an updated key, and establish a connection by using the new key, to implement an authentication procedure in a multi-communication scenario convergence scenario.
Abstract:
An object drag method includes a first terminal that displays an object on a display of the first terminal. The first terminal receives a drag operation from a user. The drag operation initiates a drag for the object. The first terminal displays, on the display of the first terminal in response to the drag operation, an animation in which the object moves with the drag operation. The first terminal sends drag data to a second terminal after determining that a drag intent of the user is a cross-device drag. The drag data enables the second terminal to display the object on a display of the second terminal.
Abstract:
A communications method includes receiving, from a second node, first algorithm negotiation request information used to indicate one or more algorithms and one or more key derivation functions, determining at least one first algorithm in the one or more algorithms and at least one first key derivation function in the one or more key derivation functions, and sending, to the second node, first information used to indicate the at least one first algorithm and the at least one first key derivation function.
Abstract:
An uplink resource grant method includes receiving, by a terminal, configuration information from a network device, where the configuration information includes information about a first uplink resource and information about a second uplink resource, and searching, by the terminal, a search space for a downlink control channel to obtain grant information. The search space includes a first control channel candidate set when the downlink control channel carries grant information of the first (or the second) uplink resource, and the search space includes a second control channel candidate set when the downlink control channel carries grant information of the second (or the first) uplink resource or grant information of a downlink resource. The first control channel candidate set is the same as the second control channel candidate set.
Abstract:
A service application programming interface (API) invoking method where a security method applied to an API exposing function entity is updated from an original security method to a new security method, and where the security method of the API exposing function entity is used for communication between the API exposing function entity and an invoker. The method includes: obtaining, by the invoker, a new security method of the API exposing function entity; and sending, by the invoker, a first invoking request to the API exposing function entity using the new security method, where the first invoking request includes a name of a service API, and where the first invoking request is used to invoke the service API.
Abstract:
This application provides a method including: generating, by an access point (AP), a plurality of first media access control MAC frames, where the plurality of first MAC frames are corresponding to a plurality of stations (STAs) in a one-to-one manner, and each of the plurality of first MAC frames carries a target wake time (TWT) parameter of a corresponding STA or instruction information for instructing a corresponding STA to send a TWT parameter to the AP; and sending, by the AP, a corresponding first MAC frame to each of the plurality of STAs simultaneously, where the first MAC frame is used to determine a TWT parameter with a STA corresponding to the first MAC frame. According to embodiments of this application, the AP can simultaneously negotiate with the plurality of STAs a TWT parameter of each STA by sending the corresponding first MAC frame to each of the plurality of STAs simultaneously.
Abstract:
An apparatus for implementing low power consumption for data switching device includes a dormancy management module that controls an upper layer logic component in a device to enter a low power consumption state when a current state parameter of the device satisfies a preset dormancy configurationcondition; detects whether an energy consumption state of a transmission medium is active; and wakes up the upper layer logic component in the device to enter a normal working state if the energy consumption state of the transmission medium is active. When a preset condition is satisfied, upper layer logic components such as a CPU, a network processor and an optical module in the device, properly stop full-time operation to save energy.