Abstract:
Examples of the disclosure relate to a three-dimensional chip. The three-dimensional chip includes a plurality of integrated circuit layers and one or more microfluidic channel layers. The plurality of integrated circuit layers includes one or more electronic and/or photonic components and are arranged in a stack. The one or more microfluidic channel layers are positioned between integrated circuit layers. The microfluidic channel layers include microfluidic channels and the microfluidic channels are configured to enable working fluid to flow through the microfluidic channels to provide passive heat transfer for the one or more electronic and/or photonic components in the integrated circuit layers. The microfluidic channels include one or more portions that extend along a microfluidic channel layer and one or more portions that extend through a microfluidic channel layer.
Abstract:
Embodiments of the disclosure provide a method, device and computer readable medium for authentication. According to embodiments of the present disclosure, only the first terminal device in a group of terminal devices which requests to connect to a network needs to finish the whole authentication. Upon the first terminal device successfully accesses to the network, the remaining terminal devices in the same group can ignore the authentication. In this way, time for authentication is reduced and the calculation efforts related to authentication is reduced for a large number for terminal devices.
Abstract:
Methods and apparatus are provided for differentiating security configurations in a radio local area network. A method can comprises: at a base station, sending a handover request to a local access point for initiating a handover of a user equipment from the base station to the local access point, the handover request comprising an indication of a scheme of security configuration to be used for protecting a communication between the base station and the user equipment. The method can further comprise, at the base station, forwarding to the user equipment a handover command received from the local access point, wherein the indication is comprised in the handover command by the local access point. The method can further comprise communicating with the user equipment according to the scheme of security configuration after the user equipment is handover to the local access point.
Abstract:
A method, a corresponding apparatus, and a computer program product for performing a handover in a heterogeneous network. The method comprises sending, by a source local area base station, one or more handover requests with respect to an ongoing local area an ongoing local area service to one or more neighbor local area base stations and one or more handover requests with respect to an ongoing wide area service to a wide area base station. The method also comprises receiving one or more handover commands with respect to the ongoing local area service from the one or more neighbor local area base stations and one or more messages from the wide area base station, each message including information regarding one of the one or more neighbor local area base stations. The method additionally comprises selecting, based upon the one or more received handover commands and messages, one of the one or more neighbor local area base stations as a target local area base station for service continuity of at least one of the ongoing local area service and the ongoing wide area service. With the claimed inventions, the service continuity of at least one of the ongoing local area service and the ongoing wide area service could be maintained and handover can be completed in a seamless manner.
Abstract:
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising at least one processing core configured to determine whether to switch a first base station from a first mode to a second mode, wherein when in the second mode the first base station is at least in part controlled by a second base station, and a transmitter configured to cause a message comprising an indication of the determination to be transmitted toward at least one of the first base station and the second base station.
Abstract:
Methods and apparatus are provided for securing device-to-device communications. A method can comprise: at an access network apparatus, obtaining from a core network apparatus and storing a first key shared between a first user equipment and the core network apparatus for device-to-device communications of the first user equipment; receiving from a second user equipment, a request for generating a second key for a device-to-device communication between the first user equipment and the second user equipment; in response to the request, generating the second key based on the first key and security parameters; and sending the second key to the second user equipment.
Abstract:
Methods, corresponding apparatuses, and computer program products for configuring one or more signaling radio bearers are disclosed. A method comprises sending a configuration request for configuring one or more signaling radio bearers to a local area access point by which a user equipment is connected to a wide area base station, wherein the one or more signaling radio bearers are used for communication between the user equipment and the wide area base station. The method also comprises receiving configuration information with respect to the one or more signaling radio bearers from the local area access point. The method additionally comprises sending the configuration information with respect to the one or more signaling radio bearers to the user equipment via a radio resource control message. With the claimed inventions, the wide area base station is capable of efficiently configuring the signaling radio bearers for use between the wide area base station and the user equipment via the local area access point.
Abstract:
A method of generating a key for D2D communication between a first user equipment and a second user equipment in a first radio access node is disclosed. In an exemplary embodiment, the method may comprise: receiving a request for D2D key generation from the first user equipment which is served by the first radio access node; determining whether the second user equipment is served by the first radio access node; when it is determined that the second user equipment is served by the first radio access node, generating a first random number and a second random number; generating a first D2D key based on the first random number and a second D2D key based on the second random number; sending the first D2D key and the second random number to the second user equipment; and sending the second D2D key and the first random number to the first user equipment; and when it is determined that the second user equipment is not served by the first radio access node, determining a second radio access node which serves the second user equipment; generating a first random number; generating a first D2D key based on the first random number; sending the first D2D key to the second radio access node; receiving a second D2D key from the second radio access node; and sending the second D2D key and the first random number to the first user equipment.
Abstract:
Methods and apparatus are provided for key pairing between peer D2D UEs in different eNBs or D2D areas. A method may comprise: receiving at a first access network node serving a first D2D area from a first user equipment in the first D2D area, a request for keys for a D2D communication between the first user equipment and a second user equipment, wherein the request comprises an identification of a second D2D area where the second user equipment is located and being different from the first D2D area; identifying a second access network node serving the second D2D area based on the identification; sending to the second access network node, a request for a security context of the second user equipment; and receiving from the second access network node the security context for obtaining the keys for the D2D communication.
Abstract:
One of the embodiments of the present invention relates to a method for controlling a D2D discovery process at a discovering user equipment. The method comprises determining by the discovering user equipment whether discovery information in a discovering message received from a discovered user equipment is sufficient for performing the D2D discovery process or not. In response to a positive result of the determination, the user equipment continues the discovery procedure without involvement of network node, at least by using the discovery information in the discovering message; in response to a negative result of the determination, the user equipment sends a request to a network node for assistance on further discovery information for performing the D2D discovery process, and then receives the further discovery information from the network node. Embodiments of the present invention also provide methods, apparatuses and computer program products.