


Official news from China Mobile shows that China Mobile Research Institute and China Mobile (Chengdu) Industry Research Institute recently cooperated with ZTE to successfully complete the industry's first "5G-A drone trusted access for low-altitude intelligent networking" ”Technical Verification
This technology introduces a new type of UAV identification in the 5G-A network for the first time, connects chip modules, networks, and flight control platforms end-to-end, fully verifying core capabilities such as UAV identification, authentication, and management. , which has laid the foundation for the efficient management and control of connected drones by 5G-A networks. In the future, it can help build a comprehensive, manageable, controllable, intelligent and open low-altitude intelligent Internet service system.
IT Home Note: 5G-A refers to 5G-Advanced, also known as 5.5G, which is the transition stage between 5G and 6G. 5G-A will surpass existing 5G technology in terms of speed, latency, connection scale and energy consumption. It is expected to achieve peak speeds of 10 Gigabit downlink and Gigabit uplink, millisecond-level latency and low-cost 100 billion IoT
China Mobile stated that the low-altitude economy will become a new economic growth point. As a new basic service carrier for the low-altitude economy, drones will play an increasingly important role in traction and driving. On June 28 this year, my country promulgated the "Interim Regulations on the Management of Unmanned Aircraft Flights". Connected drones have ushered in unprecedented development opportunities, but the industry as a whole still faces the challenges of trusted access, network control, low-altitude sensing, and platform management services. With many other challenges, there is an urgent need to systematically build a low-altitude intelligent networking capability system and establish the operator's hub position in the low-altitude economic industry chain.
In order to realize the low-altitude intelligent Internet with all scenarios and capabilities, China Mobile Research Institute has made a comprehensive layout in terms of capability system construction, standardization, industry promotion, etc., and proposed the "1 5 N" in the overall 5G-A network capability architecture. "model
China Mobile stated that this technical verification has achieved three industry firsts:
- For the first time, the introduction and capability adaptation of the new drone logo have been completed on the terminal side.
- For the first time, the network side has been upgraded to support UAS network functions to complete the identification, mapping, authentication, authorization and full life cycle management of UAV trusted identities.
- For the first time, the flight control platform has completed the docking with the core network capability open platform, realized the binding of identification and operation information, and achieved end-to-end fundamental changes that make 5G-A drone access manageable and controllable.
The above is the detailed content of Completed the first verification: 5.5G UAV trusted access technology for low-altitude intelligent networking. For more information, please follow other related articles on the PHP Chinese website!

Since 2008, I've championed the shared-ride van—initially dubbed the "robotjitney," later the "vansit"—as the future of urban transportation. I foresee these vehicles as the 21st century's next-generation transit solution, surpas

Revolutionizing the Checkout Experience Sam's Club's innovative "Just Go" system builds on its existing AI-powered "Scan & Go" technology, allowing members to scan purchases via the Sam's Club app during their shopping trip.

Nvidia's Enhanced Predictability and New Product Lineup at GTC 2025 Nvidia, a key player in AI infrastructure, is focusing on increased predictability for its clients. This involves consistent product delivery, meeting performance expectations, and

Google's Gemma 2: A Powerful, Efficient Language Model Google's Gemma family of language models, celebrated for efficiency and performance, has expanded with the arrival of Gemma 2. This latest release comprises two models: a 27-billion parameter ver

This Leading with Data episode features Dr. Kirk Borne, a leading data scientist, astrophysicist, and TEDx speaker. A renowned expert in big data, AI, and machine learning, Dr. Borne offers invaluable insights into the current state and future traje

There were some very insightful perspectives in this speech—background information about engineering that showed us why artificial intelligence is so good at supporting people’s physical exercise. I will outline a core idea from each contributor’s perspective to demonstrate three design aspects that are an important part of our exploration of the application of artificial intelligence in sports. Edge devices and raw personal data This idea about artificial intelligence actually contains two components—one related to where we place large language models and the other is related to the differences between our human language and the language that our vital signs “express” when measured in real time. Alexander Amini knows a lot about running and tennis, but he still

Caterpillar's Chief Information Officer and Senior Vice President of IT, Jamie Engstrom, leads a global team of over 2,200 IT professionals across 28 countries. With 26 years at Caterpillar, including four and a half years in her current role, Engst

Google Photos' New Ultra HDR Tool: A Quick Guide Enhance your photos with Google Photos' new Ultra HDR tool, transforming standard images into vibrant, high-dynamic-range masterpieces. Ideal for social media, this tool boosts the impact of any photo,


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Zend Studio 13.0.1
Powerful PHP integrated development environment

Notepad++7.3.1
Easy-to-use and free code editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.