Abstract:
A system for transmission data protection includes user equipment (UE) and an access point. The access point sends a broadcast message that carries a public key for encryption. The UE receives and stores the public key for encryption. The UE obtains a global public key or a private key corresponding to the UE, and protects transmission data using the public key for encryption and the global public key or the private key corresponding to the UE.
Abstract:
A negotiation mode processing method and an intelligent network device relate to the field of communications technologies, and used to improve application flexibility of the intelligent network device. The method includes determining, by an intelligent network device, that a physical layer (PHY) receives an auto-negotiation configuration stream from a network device connected to the PHY, and changing a negotiation mode of another PHY in the intelligent network device from a non-auto-negotiation mode to an auto-negotiation mode. The auto-negotiation configuration stream indicates that the device sending the auto-negotiation configuration stream is in the auto-negotiation mode. In this way, the application flexibility of the intelligent network device can be improved, and further improves communication quality of the network device.
Abstract:
Embodiments of the present invention disclose a method for upgrading a version of a network device and a device. A specific solution is: configuring a forwarding plane of the network device to be a first forwarding plane and a second forwarding plane; performing, in the first forwarding plane, sampling on forwarded packets by using a preset sampling ratio, to obtain a sample packet; forwarding, by the second forwarding plane, the sample packet in a broadcast manner, to learn a MAC address; and when a quantity of MAC addresses learned by the second forwarding plane reaches a preset threshold, performing upgrade so that the second forwarding plane is used for packet forwarding of the network device. The technical solution can effectively avoid generation of a large quantity of broadcast packets during a version upgrade process, can help reduce network bandwidth that is excessively occupied, and avoid network congestion.
Abstract:
In a time synchronization method, after clock board times between service boards are synchronized, a service board obtains a CPU time and the clock board time of the service board according to a preset periodicity, and makes a record. When performing CPU time synchronization between the service boards, the service board obtains a current CPU time of the service board, calculates a synchronization time of the CPU based on the current CPU time, a last recorded CPU time and clock board time, and adjusts the CPU time of the service board to the synchronization time. After the clock board times between the service boards that need to implement CPU high-precision time synchronization are synchronized by using a high-precision time synchronization protocol, the CPU time of each service board is adjusted to a corresponding synchronization time.
Abstract:
The disclosure relates to technology for haptic stimulation. According to one aspect of the present disclosure, there is provided a haptic stimulation system comprising a haptic stimulation interface comprising a pattern of stimulation elements configured to stimulate receptors in skin of a user. The haptic stimulation system further comprises a control circuit configured to present information in the haptic stimulation interface in accordance with a presentation mode that is tailored to the user.
Abstract:
The disclosure relates to technology for haptic stimulation. A haptic stimulation device comprises a set of haptic stimulation elements. Each haptic stimulation element comprises a transducer configured to generate a pressure wave and an enclosure coupled to the transducer thereby forming a cavity bounded by the enclosure and the transducer. The haptic stimulation device comprises a controller configured to drive the transducers to generate a haptic stimulation pattern based on pressure waves in the cavities.
Abstract:
The disclosure relates to technology for secure compute. One aspect includes a network device, comprising a non-transitory memory comprising instructions; and one or more processors in communication with the non-transitory memory storage. The one or more processors execute the instructions to receive and process routing requests in a network; send an indication into the network that the network device is able to perform secure computes; perform a secure compute based on an input received via the network from an input device; ensure that a result of the secure compute is trusted as a correct result of the secure compute; and provide the trusted result of the secure compute to a result device connected to the network.
Abstract:
Embodiments of this application disclose a network key processing system, including user equipment, a security anchor network element, and an access and mobility management network element, where the security anchor network element is configured to: obtain a first key parameter from a slice selection network element, where the first key parameter includes identifier information of N network slices; generate N slice-dedicated keys based on the first key parameter; and send the N slice-dedicated keys to the corresponding N network slices respectively; the access and mobility management network element is configured to: obtain the first key parameter, and send the first key parameter to the user equipment; and the user equipment is configured to: generate the N slice-dedicated keys for the N network slices based on the first key parameter, and access the N network slices based on the generated N slice-dedicated keys.
Abstract:
Embodiments of the present invention provide a method for improving voice call quality. The method is applied to a terminal, and the terminal includes a buffer module. When the buffer module includes voice data, the method includes: determining that the voice data buffered by the buffer module is in an accumulated state; and cutting off an SID frame in the voice data. To be specific, when the SID frame is detected and the voice data buffered by the buffer module is in the accumulated state, the SID frame in the voice data is cut off. The SID frame does not include semantic data. In this way, an amount of to-be-sent voice data is reduced, a packet loss and a sending delay are reduced, voice call quality is improved, and user experience is improved.
Abstract:
The disclosure relates to technology for secure compute. One aspect includes a network device, comprising a non-transitory memory comprising instructions; and one or more processors in communication with the non-transitory memory storage. The one or more processors execute the instructions to receive and process routing requests in a network; send an indication into the network that the network device is able to perform secure computes; perform a secure compute based on an input received via the network from an input device; ensure that a result of the secure compute is trusted as a correct result of the secure compute; and provide the trusted result of the secure compute to a result device connected to the network.