Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Analysis of selectionmethodof comparable licensing agreement in standard patent cases
    • BI Chun li
    • Information and Communications Technology and Policy. 2019, 45(10): 1-5.
    • Abstract ( 222 )   
    • The core issue ofFRANDprinciple is to provide fair, reasonable and non-discriminatory licensing fees. In this type of cases, the commonly used methods are comparable licensing agreement, Top-down and Bottom-up, etc. In some complex cases, several methods need to be combined to analyze. Because the conclusion of comparable licensing agreement is signed voluntarily by both parties, conforms to the principle of marketization, has the similarity of licensing environment, and is easy to operate, it often becomes the preferred method for judges. Based on the analysis of cases of Huawei and UP, Ericsson and TCL, this paper analyses the connotation of comparable licensing agreement method. It also provides some reference for enterprises to sign corresponding licensing agreements or how to screen suitable licensing agreements in licensing fee disputes.
    • Related Articles | Related Articles | Metrics
    • Patent situation analysis of key technologies of artificial intelligence
    • LI Guo hong, JIAN GLei, ZHANG Chao
    • Information and Communications Technology and Policy. 2019, 45(10): 6-9.
    • Abstract ( 186 )   
    • In the system of artificial intelligence technology, computer vision and image recognition, speech recognition and speech synthesis, natural language processing belong to the basic functional technology. They have been studied and applied to intelligent robots, automatic driving, intelligent medical treatment, intelligent security and other products and fields. They are the closest to the product-oriented development of artificial intelligence technology so far. Based on the global and domestic patent search of the above three kinds of technologies, and the reading of a large number of patent documents, this paper makes a thorough study on the current situation, characteristics and future evolution trend of patent distribution, compares the differences of patent distribution among high-tech enterprises in relevant countries, and hopes that the research results will provide reference in technical research and intellectual property distribution for domestic enterprises.
    • Related Articles | Metrics
    • Research on international competitive situation of quantum communication based on patent analysis
    • ZHANG Qian
    • Information and Communications Technology and Policy. 2019, 45(10): 10-13.
    • Abstract ( 182 )   
    • As a theoretically absolutely secure information transmission technology, quantum communication has received extensive attention from the global industry. In recent years, it has gradually moved from theory to practice,commercialization and industrialization.The United States, Japan, China, and Europe are among the top of the world in basic research and applied technology.The number of patents has grown rapidly.The number of applications in the early years of the United States and Japan were high. But in recent years, more and more patent applications have come from the Chinese. The
      number of QKD patents is greater than the number of QT/QSS/QSDC patents. Because the application deployment of CV-QKDtechnology is less difficult thanDV-QKD,the CV-QKDpatent applications are more active. American innovation companies actively apply for patent applications and launch projects. Domestic research institutes, companies, and equipment manufacturers are actively conducting research on quantum communication.And the QKD-based quantum secure communication protocol, network and devices are themaindirection of patent innovation.
    • Related Articles | Related Articles | Metrics
    • Global patent distribution of vertical cavity surface emission laser (VCSEL)
    • WANG Xiao, LI Wenyu
    • Information and Communications Technology and Policy. 2019, 45(10): 14-17.
    • Abstract ( 199 )   
    • With the rapid explosion of 3D sensing, VCSEL has entered the consumer electronics field from the optical communication field. The application of VCSEL market in many scenarios also shows its infinite potential. Smartphone brands in China have begun to integrate 3D sensing technology and have launched supply chain alliances and cooperation. In this paper, the global patent distribution of VCSEL is analyzed from multiple perspectives.Some suggestions are put forward to promote the construction of intellectual property rights in the field of optical devices in China, and suggestions are made to promote the overall development of the optical device industry in China.
    • Related Articles | Metrics
    • Research on index system of internet content governance
    • FENG Zhe
    • Information and Communications Technology and Policy. 2019, 45(10): 17-20.
    • Abstract ( 159 )   
    • The report of the 19th National Congress proposed to strengthen the construction of Internet content, establish a comprehensive network governance system, and create a clear network space. At present, Internet content governance is a common problem facing the world’s major countries. The specialization, diversification, technology and intelligence of network content production and distribution bring massive information flow, which brings difficulties and challenges to network content governance. Through the definition and comparison of Internet content governance objects, this paper aims to establish a set of scientific, operational and systematic authoritative network space ecological evaluation index system, which provides reference for revising the rules of governance and perfecting the effect of governance.
    • Related Articles | Related Articles | Metrics
    • Analysis on the security and prospect of quantumsecure communication
    • LAIJunsen, LIULu, WUBingbing, ZHAOWenyu, ZHANGHaiyi
    • Information and Communications Technology and Policy. 2019, 45(10): 21-25.
    • Abstract ( 175 )   
    • Quantum secure communication (QSC) based on quantum key distribution (QKD) is one of the promising solutions for improving the network information security in the future. In last decade, frontier research, demonstrational application, and network construction ofQSChave developed rapidly, the level of industrialization has been determined improved. Recently, the practical security issues of QSC system and network have caused widespread concern and discussion in academia, industry and public opinion. In this paper, the practical security issues of QSC systems and networks are analyzed, the prospects ofQSCapplicationand relevant strategies are discussed.

    • Related Articles | Related Articles | Metrics
    • Key technologies and future prospects of power quantum secure communication
    • BIANYuxiang, LIYong, ZHANGGuozhi, FENGBao, LAIJunsen
    • Information and Communications Technology and Policy. 2019, 45(10): 26-32.
    • Abstract ( 207 )   
    • As an important infrastructure for the country’s economic development, the power system, once the relevant grid production and enterprise management information is leaked or falsified, will inevitably cause significant losses to residents' electricity use and even national information security. Quantum security communication is based on the basic principles of quantum mechanics and has theoretical unconditional security. It provides a theoretically absolutely secure information channel for the safe transmission of grid production and operational data. This paper introduces the development status of quantum secure communication technology and its application in power systems, and analyzes the problems and challenges of
      current quantum security communication technology in power system applications. Aiming at the main problems, this paper focuses on the key technologies of power quantum security communication, and prospects the future development and application mode of power quantum security communication technology, which can provide reference for the quantum security communication technology in thepower industry.
    • Related Articles | Related Articles | Metrics
    • The cyber security challenge in thequantumera and its countermeasures
    • MA Zhangchao
    • Information and Communications Technology and Policy. 2019, 45(10): 37-42.
    • Abstract ( 188 )   
    • The rapid development of quantum information technology will have a profound impact on information and communication technology and cyber security. Quantum computing poses new challenges to traditional cryptography and also stimulates the development of quantum cryptography based on quantum physics. This paper begins with the historical evolution of cryptography and introduces the basic concepts from classical cryptography to quantum cryptography. Then it analyzes the quantum security problems and its urgency caused by quantum computing, and further explores its countermeasures and solutions.
    • Related Articles | Related Articles | Metrics
    • Thedevelopment of studyonquantumattacks and defenses in practical continuous-variablequantumkey distribution systems
    • ZHENGYi, HUANGPeng, PENGJinye, ZENGGuihua
    • Information and Communications Technology and Policy. 2019, 45(10): 43-48.
    • Abstract ( 222 )   
    • 连续变量量子密钥分发是一种理论上可以提供无条件安全密钥分发的技术,具有广泛的应用前景。然而,实际的连续变量量子密钥分发系统中却存在着一些违背安全性证明中假设的不完美性,它们可能为窃听者打开安全漏洞来隐藏他们的窃听行为,从而成功地窃取安全密钥信息。虽然量子黑客攻击严重地影响了系统的实际应用安全性,但这些攻击均有相应完善的防御方案,从而有效地促进了系统的商业化应用。本文分别详细地展示了连续变量量子密钥分发系统硬件光路的信源、信道及信宿3 个模块中不同的量子黑客攻击及防御策略,并对该研究方向进行了展望。
    • Related Articles | Related Articles | Metrics
    • Software definedquantumkey distribution as a service
    • CAOYuan, ZHAOYongli
    • Information and Communications Technology and Policy. 2019, 45(10): 49-55.
    • Abstract ( 161 )   
    • Quantumkey distribution(QKD)can provide long-term security and confidentiality for information andcommunications.Given the high cost and complexity of QKD networks, QKD as a service becomes one of the effective operation patterns for futureQKDnetworks, which allows the network-wide users to share theQKDnetwork infrastructure by applying for QKD services. This paper uses the software defined networking (SDN) technique to provide efficient and flexible QKD services. The framework and demonstration platform for software defined QKD as a service are introduced, and the QKD service provisioning workflow is demonstrated.
    • Related Articles | Related Articles | Metrics
    • Some thoughtsonthe development of 5G
    • YANG Fengyi
    • Information and Communications Technology and Policy. 2019, 45(10): 56-59.
    • Abstract ( 154 )   
    • The year 2019 is the first year for 5G commercial deploy. 5G is the future of telecommunication and vertical industries.Somekey impacting factors and countermeasures for the development of 5Gwas discussed in this paper. It includes reducing the network operation cost,makingthe electromagnetic radiationmorepopular, converging with vertical industries.
    • Related Articles | Metrics
    • Opportunities and challenges of 5Gcommercial development
    • WEIKejun
    • Information and Communications Technology and Policy. 2019, 45(10): 60-63.
    • Abstract ( 229 )   
    • At present, Major countries in the world have successively launched 5Gcommercial service, and 2019 has become the first year of 5G commercial. As a key infrastructure for the digital economy and society development, 5G will have a profound impact on information consumption and industrial transformation. Based on a comprehensive review of the current global development of 5G commercial development, this paper analyzes the opportunities and challenges of 5G commercial development.
    • Related Articles | Related Articles | Metrics
    • Face recognition technology in the applicationof telephone real-name retained photos authenticity detection
    • SHIJingxin, LUYue, ZHANGMin
    • Information and Communications Technology and Policy. 2019, 45(10): 64-68.
    • Abstract ( 149 )   
    • With the deepening of the work telephone real- name, Supervisory authority gradually upgrading the real-name assessment indicators of telecom enterprises from the initial compliance rate to the current real rate is escalating, which reflects the regulation of overweight step by step. The difficulty of supervising on telecom enterprises lies in the large volume and complex scenes of the retained photos, we need to seek technology to break through barriers. This paper studies the face recognition technology, and based on the research of the real-name retained photos authenticity testing platform to carry out targeted analysis of the test and the results.
    • Related Articles | Related Articles | Metrics
    • Digitaleconomyboosts supply-side structural reform
    • WANG Ming zhu
    • Information and Communications Technology and Policy. 2019, 45(10): 69-72.
    • Abstract ( 211 )   
    • At present, the main obstacle to China's high-quality economic development is the structural contradiction, which is the structure mismatch of supply and demand. Digital technology is changing every day, and its application potential is bursting into full release. By improving production efficiency, eliminating excess capacity, reducing supply cost and enhancing innovation capacity, digital economy will promote effective supply capacity. By expanding traditional demand, enriching emerging demand, and promoting demand upgrading, digital economy will drive an appropriate expansion of total demand. To deepen China's supply and demand structure reform, we should strengthen top-level design, give full play to the innovative of the digital economy, consolidate the foundation for the development of digital industrialization, deepen the integration of the digitaleconomyin various fields, and build an open and inclusive environment.

    • Related Articles | Related Articles | Metrics
    • Using system dynamics to analyze the mechanism of big data regulation
    • LIU Yang
    • Information and Communications Technology and Policy. 2019, 45(10): 76-81.
    • Abstract ( 149 )   
    • Big data is an imperative foundation of modern life and it has already been widely used all over the world. However, the abuse of big data is becoming more and more serious. This study develops a system dynamics model to analyze the mechanism of big data regulation. And the model is verified in an anti telecom and network fraud system.The findings indicate that user self regulation is the symptomatic solution and system regulation is the fundamental solution to the regulation problem. System coverage has positive indirect effects to solving the regulation problem, while behavior variation and switching cost have negative indirect effects at the same time. The study validates an innovative approach in the combination of system dynamics and big data regulation, and finds an effective way to analyze the mechanism of big data regulation.
    • Related Articles | Related Articles | Metrics
    • Researchon 5GterminalNASsessionmanagementmechanismand protocol testingmethod
    • LINa, CHENJun, SUNXiangqian
    • Information and Communications Technology and Policy. 2019, 45(10): 87-92.
    • Abstract ( 159 )   
    • Driven by technologies such as SDN, NFV and cloud computing, the 5G network architecture is based on service and has features of control and forwarding separation. The diversification of 5Gservices, terminals and business models in the future has new requirements for session management. This paper firstly introduces the 5G system architecture and protocol stack, then focuses on the terminal NAS PDU session management mechanism, and illustrates the design method of the terminal protocol conformance test case to provide reference for the development of5Gterminal test standards.
    • Related Articles | Related Articles | Metrics
    • Wi-Fi6 system evolution and testschem
    • WANGWei
    • Information and Communications Technology and Policy. 2019, 45(10): 93-96.
    • Abstract ( 165 )   
    • This article mainly introduce the latest WLAN technology standardization progress and the key technology evolution trend inWi-Fi 6.We also do a further analysis among all the 802.11ax key technology, which is related to physical layer and RF measurement.At last, we introduced the 802.11ax test requirement, RF test item and test solution,Wi-Fi alliance newtest requirement and item are involved in this part.
    • Related Articles | Metrics