Method and apparatus for controlling sidelink QoS

    公开(公告)号:US12207140B2

    公开(公告)日:2025-01-21

    申请号:US18456034

    申请日:2023-08-25

    Abstract: The present application generally relates to wireless communication technology. More particularly, it relates to a method and apparatus for controlling sidelink (SL) Quality of Service (QoS). According to one or more embodiments, a method for controlling sidelink (SL) Quality of Service (QoS) comprising the following steps carried out at a User Equipment (UE): a) generating QoS requirement from characteristics for one or more packets to be transmitted via a sidelink; b) determining bearer configuration corresponding to the QoS requirement; and c) performing SL transmission on the basis of the bearer configuration.

    Protocol synchronization for HARQ
    66.
    发明授权

    公开(公告)号:US12206754B2

    公开(公告)日:2025-01-21

    申请号:US18389023

    申请日:2023-11-13

    Abstract: A method and apparatus according to the present invention addresses and/or prevents lost protocol synchronization in HARQ systems caused by ACK/NACK errors. One embodiment detects lost synchronization errors for NDI-based retransmission protocols and restores synchronization by sending an explicit RESET message. In response to the RESET message, the transmitter aborts the transmission of a current PDU and transmits a new PDU and corresponding NDI. Another embodiment prevents protocol synchronization errors by sending scheduling grants on a packet by packet basis. The receiver sends a subsequent explicit scheduling grant to the transmitter based on an error evaluation of a received PDU. The transmitter will not send the next PDU unless it receives the subsequent explicit scheduling grant.

    Cyberattack identification in a network environment

    公开(公告)号:US12206694B2

    公开(公告)日:2025-01-21

    申请号:US17802578

    申请日:2020-02-28

    Inventor: Harri Pietila

    Abstract: There is provided mechanisms for cyberattack identification in a network environment. A method is performed by a security analytics module. The method comprises obtaining logged events. The events having occurred and are logged in the network environment. Each logged event is associated with a cyber security deviation score and cyber security deviation statistics. The method comprises matching each logged event to a cyber-attack lifecycle phase by comparing characteristics of each logged event, as given by the cyber security deviation statistics, to known cyberattack lifecycle phases. The method comprises linking together the logged events by forming at least one chain of the logged events. Each chain corresponds to one type of cyberattack as given by combinations of the known cyberattack lifecycle phases. The cyber security deviation scores and cyber security deviation statistics are updated based on how the logged events are linked together. The method comprises determining, based on how the logged events are linked together and the cyber security deviation scores and the cyber security deviation statistics as updated, whether the logged events are benign or part of a cyberattack.

    Enhanced retransmission scheme for index modulation in NOMA

    公开(公告)号:US12206606B2

    公开(公告)日:2025-01-21

    申请号:US18009933

    申请日:2020-06-25

    Abstract: A method in a transmitter comprises transmitting a first data block to a first user, using an index modulation scheme and using SSD for transmitting the first data block. In some embodiments, the index modulation scheme is index-modulated OFDM and the indices comprise subcarrier indices. The method further comprises determining that a retransmission of the first data block to the first user is needed, and rearranging a bit mapping of bits in the first data block to indices used in the index modulation scheme, compared to a bit mapping previously used for transmitting the first data block to the first user using the index modulation scheme. The method further comprises retransmitting the second data block to the first user, where this retransmitting comprises using the index modulation scheme with the rearranged bit mapping and using SSD.

    Packet processing in a computing device using multiple tables

    公开(公告)号:US12206590B2

    公开(公告)日:2025-01-21

    申请号:US18286871

    申请日:2022-03-23

    Abstract: A computing device (110) receives a packet comprised in a flow, and uses a region index table (310) to identify a first region of a Throughput-Value Function, TVF (400), based on a flow rate of the flow. The first region is one of a plurality of sequentially ordered regions across an input domain of the TVF (400). The computing device (110) randomly selects one of a plurality of preconfigured offset values to identify a second region of the TVF (400) that is lower than the first region of the TVF (400) by the randomly selected offset value. The computing device (110) determines a packet value using a TVF table (330) that maps each of the regions to a respective one of a plurality of packet values. The packet value is mapped to the second region. The computing device (110) marks the packet with the packet value mapped to the second region.

    Channel quality reporting in LTE-M and NB-IoT

    公开(公告)号:US12206493B2

    公开(公告)日:2025-01-21

    申请号:US17429408

    申请日:2020-01-31

    Abstract: According to some embodiments, a method performed by a wireless device operating in connected mode for reporting channel quality comprise: determining that aperiodic channel quality reporting has been triggered for the wireless device and transmitting a downlink channel quality report to a network node. A channel quality in the report is represented by a number of repetitions used to receive a channel. In particular embodiments, the number of repetitions comprises a number of repetitions used to receive a machine type communication (MTC) physical downlink control channel (MPDCCH) or a narrowband Internet-of-things (NB-IoT) physical downlink control channel (NPDCCH).

Patent Agency Ranking