摘要:
The present invention relates to a method for storing data on a storage entity (SE), comprising the steps of: a) computing a file identifier for a file to be stored on said SE; b) checking, by said SE, if the file has already been stored using said file identifier; c) generating a user-specific private and a user-specific public identifier; d) updating or computing tags of said file by said client such that said updating or computing is homomorphic in the user-specific private identifier and in parts of said file; e) providing said user-specific public identifier said updated tags and a proof of possession of said secret identifier to said SE by said client; f) verifying by said SE, said proof-of-possession; g) verifying validity of said tags; h) upon successful checking storing a public identifier for said file incorporating said user-specific public identifier and said updated tags by said SE; i) if the file has not already been stored, storing said file by said SE.
摘要:
A method for operating a centralized radio access network (C-RAN) having a plurality of base stations, wherein at least a portion of base station processing is performed at a centralized processing entity, and wherein a virtualized environment is provided by the centralized processing entity such that the plurality of base stations run in virtual machines, includes relocating base station processing from a first virtual machine that performs base station processing for a first base station that serves an initial cell to a second virtual machine by: introducing a target cell for which the second virtual machine performs base station processing, simultaneously transmitting, via at least a portion of antennas of the first base station, signals for both the initial cell and the target cell, and handing over user terminals that are assigned to the initial cell to the target cell.
摘要:
A method for at least partially updating encrypted data stored on one or more servers includes dividing the encrypted data into equal sized chunks; encrypting each chunk using an all-or-nothing encryption scheme (AONE) with an encryption key, wherein an additional randomness per chunk is embedded into the AONE; outputting a plurality of ciphertext blocks for each chunk; storing the encrypted chunks on the one or more servers such that an i-th ciphertext block of each encrypted chunk is stored on an i-th server, wherein a result of a predetermined function performed on the randomness for all encrypted chunks is stored with each encrypted chunk; determining one or more chunks to update; reverting the predetermined function by accessing all the encrypted chunks; decrypting the one or more Chunks to update based on the result of, updating the decrypted chunks; re-encrypting the updated decrypted chunks, and storing the re-encrypted chunks.
摘要:
A method for determining a path of an object for moving from a starting node representing a starting state to an end state includes a) determining a plurality of child nodes to a parent node, b) checking whether transitions from the parent node to each of the child nodes are free of obstacles and excluding partial paths that are not free of obstacles, c) computing a cost value for each of the non-excluded partial paths, d) adding the computed cost value to a cost value from the starting node to the parent node, e) adding an estimated or expected cost value for a partial path from each of the child nodes to an end node representing an end state, f) determining a lowest overall cost value and selecting a new parent node, and g) repeatedly performing steps a)-f) until at least one termination condition is fulfilled.
摘要:
The present invention relates to method for realizing a geofence scenario with a system according to at least the OMA NGSI 9/10 standard – NGSI-system -, wherein the NGSI-system provides a NGSI subscription operation for subscribing NGSI-entities for notifications, wherein said geofence scenario is defined at least by at least a geofence object set comprising mobile objects, at least a geofencing set comprising one or more geofences and one or more geofence predicates for mathematically combining a geofence object set and a geofencing set, which result includes at least the values true and false, wherein when the predicate changes from the value false to the value true is considered an ENTER geofence event, and wherein when the predicate changes from true to another value is considered a LEAVE geofence event, wherein for subscribing to geofence event notification according to the NGSI subscription protocol a) the geofence scenario is specified as NGSI operational scope for the NGSI subscription and/or b) the geofence scenario is included as one or more attributes of a NGSI entity for the NGSI subscription.
摘要:
A method for providing encrypted information by an information entity to one or more operating entities, the information entity having a database for storing encrypted information and the one or more operating entities being configured to operate on the encrypted information, wherein the encrypted information is stored encrypted with an encryption key known to the one or more operating entities includes performing, by an operating entity, a request on the encrypted information, wherein plaintext information to be stored encrypted is provided in tuples, each having ID information, one or more fields with field information specifying the fields, and values, wherein at least the values are encrypted with non-deterministic order preserving encryption with at least one encryption key such that each plaintext value is encrypted into a set of encrypted values, and wherein the set of encrypted values is partitioned into a left set and a right set.
摘要:
A method for monitoring a status in a form of presence and/or absence of a subscribed network entity in a network by a presence service, wherein the network is a software defined network having one or more forwarding elements being configurable for recognizing and applying one or more actions on packets being forwarded by the forwarding elements and one or more network entities, includes monitoring the status of the subscribed network entity. The monitoring the status of the subscribed network entity includes providing the presence service with a status update of the selected network entity only when at least one of the one or more forwarding elements, to which the selected network entity is directly connected, has detected a change in the presence status of the subscribed network entity; and dropping packets of the subscribed network entity destined for the presence service.
摘要:
A method for preserving privacy within a communication system, wherein a location-based service concerning an area of interest is provided for at least one user by a database server and wherein location information represented by coordinates of objects and/or users and/or areas and/or queries, made to the location-based service, is concealed, includes concealing the location information by transforming coordinates by first splitting the area of interest up in tiles for providing at least one tiling of the area of interest, and then permuting the tiles by a pseudo-random permutation process.
摘要:
A method of providing access control for a software defined network (SDN) controller, wherein said controller (4), upon receiving a trigger event from the data plane (1) of said software defined network, triggers one or more applications (6) that are installed to run at the control plane (2) of said software defined network atop said controller (4) to react to said trigger event, is characterized in that said controller (4), before triggering applications (6) due to a trigger event, applies a conflict resolution scheme comprising the steps of defining flow spaces on the basis of packet headers and assigning each flow space a priority, determining all flow spaces that are affected by said trigger event and selecting from these flow spaces a single flow space having assigned a priority that complies with a predetermined policy, and determining, from the applications related to said selected flow space, a single application – master application – according to predefined criteria and triggering, in addition to said master application, only those applications whose reactions to said trigger event do not conflict with said master application. Furthermore, a corresponding software defined network (SDN) with access control and a corresponding SDN controller are disclosed.
摘要:
A method for motorway speed control comprises the steps of splitting the motorway into a number of stretches, wherein each stretch includes one or more variable speed limit (VSL) sites that are configured to indicate VSL control settings in form of discrete speed values, defining an initial solution space of each stretch including all possible combinations of VSL control settings, and shrinking the initial solution space of each stretch by applying constraint-based and/or macroscopic traffic analysis-based reduction schemes, and based on the resulting residual solution space, evaluating a combination of VSL control settings as a solution combination for being indicated by said VSL sites of the respective stretch by performing an iterative solution search in which macro-simulations together with a limited number of micro-simulations are applied on selected candidate subsets of combinations of VSL control settings.