Abstract:
The present disclosure provides a method for information transmission, a base station and a user equipment. The method for information transmission includes: performing a coverage enhancement processing on control information and data information; transmitting the control information and the data information, which the coverage enhancement processing is performed on, to a user equipment; and transmitting coverage enhancement indication information to the user equipment, where the coverage enhancement indication information is used for indicating the user equipment to acquire the control information and the data information which the coverage enhancement processing is performed on. The technical solutions of the present disclosure are capable of improving the downlink coverage range.
Abstract:
The present invention provides a method for information transmission, a base station and a user equipment. The method for information transmission includes: performing a coverage enhancement processing on control information and data information (101); transmitting the control information and the data information, which the coverage enhancement processing is performed on, to a user equipment (102); and transmitting coverage enhancement indication information to the user equipment, where the coverage enhancement indication information is used for indicating the user equipment to acquire the control information and the data information which the coverage enhancement processing is performed on (103). The technical solutions of the present invention are capable of improving the downlink coverage range.
Abstract:
Example authentication methods and apparatus are described. One example method is applied to an identity management entity, and the identity management entity is deployed in a core network control plane of a Long-Term Evolution (LTE) network. The method includes receiving a certificate request message from terminal equipment and generating a digital certificate for the terminal equipment. An identity request message carrying the digital certificate is sent to an identity proxy entity, where the identity proxy entity is deployed in a blockchain network, and the identity request message is used to obtain a blockchain identity for the terminal equipment.