Abstract:
Examples of the disclosure relate to a three-dimensional chip. The three-dimensional chip includes a plurality of integrated circuit layers and one or more microfluidic channel layers. The plurality of integrated circuit layers includes one or more electronic and/or photonic components and are arranged in a stack. The one or more microfluidic channel layers are positioned between integrated circuit layers. The microfluidic channel layers include microfluidic channels and the microfluidic channels are configured to enable working fluid to flow through the microfluidic channels to provide passive heat transfer for the one or more electronic and/or photonic components in the integrated circuit layers. The microfluidic channels include one or more portions that extend along a microfluidic channel layer and one or more portions that extend through a microfluidic channel layer.
Abstract:
Embodiments of the disclosure provide a method, device and computer readable medium for authentication. According to embodiments of the present disclosure, only the first terminal device in a group of terminal devices which requests to connect to a network needs to finish the whole authentication. Upon the first terminal device successfully accesses to the network, the remaining terminal devices in the same group can ignore the authentication. In this way, time for authentication is reduced and the calculation efforts related to authentication is reduced for a large number for terminal devices.
Abstract:
Methods and apparatus are provided for differentiating security configurations in a radio local area network. A method can comprises: at a base station, sending a handover request to a local access point for initiating a handover of a user equipment from the base station to the local access point, the handover request comprising an indication of a scheme of security configuration to be used for protecting a communication between the base station and the user equipment. The method can further comprise, at the base station, forwarding to the user equipment a handover command received from the local access point, wherein the indication is comprised in the handover command by the local access point. The method can further comprise communicating with the user equipment according to the scheme of security configuration after the user equipment is handover to the local access point.
Abstract:
A method, a corresponding apparatus, and a computer program product for performing a handover in a heterogeneous network. The method comprises sending, by a source local area base station, one or more handover requests with respect to an ongoing local area an ongoing local area service to one or more neighbor local area base stations and one or more handover requests with respect to an ongoing wide area service to a wide area base station. The method also comprises receiving one or more handover commands with respect to the ongoing local area service from the one or more neighbor local area base stations and one or more messages from the wide area base station, each message including information regarding one of the one or more neighbor local area base stations. The method additionally comprises selecting, based upon the one or more received handover commands and messages, one of the one or more neighbor local area base stations as a target local area base station for service continuity of at least one of the ongoing local area service and the ongoing wide area service. With the claimed inventions, the service continuity of at least one of the ongoing local area service and the ongoing wide area service could be maintained and handover can be completed in a seamless manner.
Abstract:
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising at least one processing core configured to determine whether to switch a first base station from a first mode to a second mode, wherein when in the second mode the first base station is at least in part controlled by a second base station, and a transmitter configured to cause a message comprising an indication of the determination to be transmitted toward at least one of the first base station and the second base station.
Abstract:
Methods and apparatus are provided for securing device-to-device communications. A method can comprise: at an access network apparatus, obtaining from a core network apparatus and storing a first key shared between a first user equipment and the core network apparatus for device-to-device communications of the first user equipment; receiving from a second user equipment, a request for generating a second key for a device-to-device communication between the first user equipment and the second user equipment; in response to the request, generating the second key based on the first key and security parameters; and sending the second key to the second user equipment.
Abstract:
Methods, corresponding apparatuses, and computer program products for configuring one or more signaling radio bearers are disclosed. A method comprises sending a configuration request for configuring one or more signaling radio bearers to a local area access point by which a user equipment is connected to a wide area base station, wherein the one or more signaling radio bearers are used for communication between the user equipment and the wide area base station. The method also comprises receiving configuration information with respect to the one or more signaling radio bearers from the local area access point. The method additionally comprises sending the configuration information with respect to the one or more signaling radio bearers to the user equipment via a radio resource control message. With the claimed inventions, the wide area base station is capable of efficiently configuring the signaling radio bearers for use between the wide area base station and the user equipment via the local area access point.
Abstract:
Embodiments of the disclosure provide a method, device and computer readable medium for authentication. According to embodiments of the present disclosure, only the first terminal device in a group of terminal devices which requests to connect to a network needs to finish the whole authentication. Upon the first terminal device successfully accesses to the network, the remaining terminal devices in the same group can ignore the authentication. In this way, time for authentication is reduced and the calculation efforts related to authentication is reduced for a large number for terminal devices.
Abstract:
In accordance with an example embodiment of the present invention, there is provided an apparatus such as for example a mobile or a base station, comprising at least one processing core configured to compile a message comprising information concerning resources used in a communication network, the at least one processing core being configured to perform a first determination, that a second user equipment is engaged in a device-to-device session with a first user equipment, the at least one processing core being configured to, responsive to the first determination, include in the message information concerning the second user equipment, and a transmitter configured to cause the message to be transmitted toward a network node. The message may comprise a resource usage report and/or charging report, for example.
Abstract:
A fast-accessing method may comprise: establishing a first security connection between a first network node and a user equipment; obtaining first information from a second network node, wherein the first information comprises at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; providing second information to the second network node, in response to an indication of the second network node from the user equipment, wherein the second information comprises security information related to the user equipment; and sending the first information to the user equipment for establishing a second security connection between the user equipment and the second network node.