Joint use of ethernet header compression and robust header compression

    公开(公告)号:US11310352B2

    公开(公告)日:2022-04-19

    申请号:US17022162

    申请日:2020-09-16

    Abstract: The present invention provides a method for joint use of Ethernet header compression and robust header compression. More particularly, a method, comprising performing, a first compression/decompression operation to an Ethernet header of an Ethernet packet data; determining that the Ethernet packet includes an Internet Protocol packet; identifying at least one Internet Protocol packet within the Ethernet packet data; and performing a second compression/decompression operation to an Internet Protocol header of the at least one Internet Protocol packet, wherein the second compression/decompression operation is based on an indicated at least one of a context or profile independent from that of the first compression/decompression operation, is disclosed.

    Message verification
    3.
    发明授权

    公开(公告)号:US10893056B2

    公开(公告)日:2021-01-12

    申请号:US15764006

    申请日:2015-09-30

    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core configured to obtain, from a timestamp, a truncated timestamp comprising a first number of least significant bits of the timestamp and not comprising at least one most significant bit of the timestamp, to derive a hash value based at least in part on the timestamp, a payload and a secret value, and to compile a first message comprising the truncated timestamp, the payload and, at least in part, the hash value, and a transmitter configured to be directed by the at least one processing core, to transmit the first message toward a recipient.

    JOINT USE OF ETHERNET HEADER COMPRESSION AND ROBUST HEADER COMPRESSION

    公开(公告)号:US20210099555A1

    公开(公告)日:2021-04-01

    申请号:US17022162

    申请日:2020-09-16

    Abstract: The present invention provides a method for joint use of Ethernet header compression and robust header compression. More particularly, a method, comprising performing, a first compression/decompression operation to an Ethernet header of an Ethernet packet data; determining that the Ethernet packet includes an Internet Protocol packet; identifying at least one Internet Protocol packet within the Ethernet packet data; and performing a second compression/decompression operation to an Internet Protocol header of the at least one Internet Protocol packet, wherein the second compression/decompression operation is based on an indicated at least one of a context or profile independent from that of the first compression/decompression operation, is disclosed.

    Method and apparatus for direct control of smart devices with a remote resource

    公开(公告)号:US10097696B2

    公开(公告)日:2018-10-09

    申请号:US15108568

    申请日:2014-01-15

    Abstract: A method, apparatus and computer program product are provided for direct control of constrained electronic devices with a remote resource. A method performed in a mobile device is provided. The method includes the mobile device receiving a network address and a smart device identifier from a smart device; accessing a remote resource, such as an external internet application, based on the network address; receiving a command indication, wherein the command indication indicates an action to be executed by the smart device; and causing a transmission of a command to the smart device, wherein the transmission includes the smart device identifier.

    Two-user authentication
    9.
    发明授权

    公开(公告)号:US11070546B2

    公开(公告)日:2021-07-20

    申请号:US15742627

    申请日:2015-07-09

    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive from a first device a digital key, receive from a second device an encrypted data item, decrypt the encrypted data item using the digital key to obtain a decrypted data item, and verify the decrypted data item matches a reference data item, and responsive to the decrypted data item matching the reference data item, grant access to at least one of the first device and the second device.

Patent Agency Ranking