UE-SUBSTITUTE-UNIT OF A COMMUNICATION NETWORK

    公开(公告)号:EP4489450A1

    公开(公告)日:2025-01-08

    申请号:EP23184121.4

    申请日:2023-07-07

    Abstract: Techniques for communication in a communication system, comprising the following steps
    • providing domain units, wherein the domain units provide a functionality of the network for communication by means of network functions; wherein at least one of the domain units is represented by a UE having at least one UE-network-function, wherein the UE communicates with the network by means of a radio link;
    • providing a database within the network, wherein the domain units communicate via a communication link with the database, and wherein the domain units each retrieve data from the database and/or write data output obtained by their network functions into the database to execute their network functionality;
    • providing a UE-substitute-unit within the communication system having at least one of said UE-network-functions, said UE-substitute-unit at least temporarily substituting for said UE, which is temporarily not connected because of network interrupts, wherein the UE-substitute-unit executes the at least UE-network-functions and retrieves data from said database and/or writes data output obtained by the UE-network-function into said database.

    DATA COMMUNICATION AND CRYPTOGRAPHIC OPERATIONS FOR SECURE WIRELESS INTERACTIONS

    公开(公告)号:EP4307611A1

    公开(公告)日:2024-01-17

    申请号:EP22185316.1

    申请日:2022-07-15

    Abstract: There is provided a method of generating a secure result (1005) to support authorisation of a rapid wireless interaction (1000) between a first computing device (1001) and a second computing device (1002), the method being implemented by a third computing device (1003) remote from the first (1001) and second computing devices (1002). The method comprises: receiving, from the first computing device (1001) via a secure communications channel, a request to generate the secure result (1005), the request comprising interaction data (1014) relating to the wireless interaction (1000); retrieving, from a data store in secure communication with the third computing device (1003), cryptographic material (1015) to be used to generate the secure result (1005); generating, using the retrieved cryptographic material, the secure result (1005) by applying the cryptographic material to the interaction data; and transmitting, to the first computing device (1001) via the secure communications channel, the secure result (1005), for processing and onward provision by the first computing device (1001) to the second computing device (1002) for subsequent authorisation of the wireless interaction (1000). A computing device (1003) arranged to implement this method is also provided.

    VIRTUAL DEVICE PORTABILITY
    4.
    发明公开

    公开(公告)号:EP4030284A1

    公开(公告)日:2022-07-20

    申请号:EP21198818.3

    申请日:2021-09-24

    Abstract: Examples described herein relate to a network interface device comprising: a device interface; at least one processor; a direct memory access (DMA) device; and a packet processing circuitry. In some examples, the at least one processor, when operational, is configured to: in connection with a first operation: perform a format translation of a first descriptor from a first format associated with an emulated device to a second format associated with the packet processing circuitry and provide, to the packet processing circuitry, the translated first descriptor. In some examples, the at least one processor, when operational, is configured to: in connection with a second operation: perform a descriptor format translation of a second descriptor from the second format associated with the packet processing circuitry to the first format associated with the emulated software device and provide, to the emulated device, the translated second descriptor.

    CONTACTLESS TRANSACTION
    5.
    发明公开

    公开(公告)号:EP4488910A3

    公开(公告)日:2025-01-15

    申请号:EP24214861.7

    申请日:2022-07-15

    Abstract: A method for carrying out a contactless payment transaction between a first computing device and a second computing device is described. The contactless payment transaction is to be provided for authorisation through a transaction processing system. Here, authorisation of the contactless payment transaction comprises verifying a secure result provided by the first computing device and generated by a cryptographic process. The method at the first computing device comprises the following steps. Firstly, the contactless payment transaction is initiated with the second computing device. A dummy secure result is then obtained. This dummy secure result is a unique value, has the format of a legitimate secure result, but is not generated by the cryptographic process. The contactless payment transaction with the second computing device is then completed using the dummy secure result. Authorisation of the wireless transaction is then possible if the dummy secure result can be used to reconcile the contactless payment transaction with a true secure result. To achieve this, the dummy secure result and information sufficient to establish a true secure result for the contactless payment transaction to enable the true secure result to be generated are provided by the first computing device such that the true secure result can be generated and provided with the dummy secure result. In due course, after matching with the dummy secure result, the transaction processing system uses this true secure result for authorisation of the contactless payment transaction. A suitable first computing device is also described, as is a method of interaction between a first computing device and a third computing device adapted to provide the true secure result.

    AUTOMATIC IPV6/IPV4 FALLBACK APPROACH IN PROXY NETWORKS

    公开(公告)号:EP4040760A1

    公开(公告)日:2022-08-10

    申请号:EP21208204.4

    申请日:2021-11-15

    Abstract: The method for an automated IPv6/IPv4 fallback approach in proxy networks is presented. In some embodiments, the method comprises receiving, at a proxy server, a request from a client executing on a client computer for access to a target computer; determining identification-information of the client; determining an address pair including an IPv6 address and an IPv4 address of the proxy server; assigning the address pair to the identification-information of the client; establishing a first communications connection between the client computer and the proxy server using one of IP addresses included in the address pair, and a second communications connection between the proxy server and the target computer using one of IP addresses included in the address pair; and facilitating a network packet flow between the client computer and the target computer using the first communications connection and the second communications connection.

Patent Agency Ranking