摘要:
A method of restoring a failure in a network topology. A first node is provided that has a first access link connected to a first port group of a first customer and a first network link connected to a first active router. A second node has a first access link connected to the first port group of the first customer and a first network link connected to a second stand-by router. The first node has a second network link connected to the second node via a second network link of the second node. If the first access link of the first node or the first node itself fails, the second node switches to the active state. If the second network link of the first node fails, the second node switches to the active state. In this way the traffic will be forward to the first router and/or the second router.
摘要:
The method is for downloading data to mobile devices belonging to a mobile telecommunications network. When downloading of update information to one or more mobile devices is initiated in some way, a message with update information to be sent to the mobile devices is formed on the basis of the stored information. The formed information message is then downloaded to the mobile devices. The network is for downloading data to mobile devices that have mobile devices and a mobile telecommunications network to which the mobile devices belong. The network also has a repository containing information of terminal capabilities and/or subscriber information of the mobile devices in the network,
摘要:
The invention is concerned with a method of user authentication in a network comprising a mobile terminal, a service provider and an authentication server. The mobile terminal has a smart card with security functions and user/equipment specific information. In the method, the user gives (3) identity information to the service provider as a reply on a request (1) for using a service provided by the service provider. The identity information given by the user is sent (4) from the service provider to the authentication server, which generates (5) a random number, which is sent (6) to the smart card of the mobile terminal. The smart card creates (7) a message by combining equipment specific information in the card and the random number, The message is digitally signed by the smart card and then sent (8) to the authentication server. The authentication server decrypts (9) the message arid compares the content to originally created message information. The authentication server sends (10) a confirmation to the service provider if the content of the message and said originally created message information correspond to each other.
摘要:
The method is for applying a coating on a paper substance. A paper moves over a set of rollers. A coating is applied with a coating applicator that has ultrasonic transducers to vibrate the coating to reduce the viscosity of the coating. A downstream blade has an ultrasonic transducer in operative engagement with the blade. The vibrating blade is applied to the paper for scraping off excessive coating from the paper.
摘要:
The method of the invention for checking the identity of devices is implemented in a device management system in a mobile telecommunication network. The system comprises devices to be managed, a server side device management application, a client side device management application, a database, and an interface between said device management applications. The method is mainly characterized in that a device management session is initiated via said interface, before or after which said client side device management application reads equipment information, and sends it to the interface. The interface compares the equipment information sent with previously stored equipment information for the subscription from which the equipment information was sent by means of subscription information for said subscription and reporting said comparison result to the server side device management application. The system of the invention comprises a component on the client side for reading the equipment identity, an interface for checking identity of devices from a device identity repository, and a database implementing a device identity repository.
摘要:
In the method of the invention for the management of roaming of mobile subscribers, which are roaming between a home network and foreign networks, the roaming behavior is based on the contents of control files saved in the mobile equipment of the subscribers. A list of networks to be used in a priority order in a roaming situation is defined in said control files. When a subscriber is roaming management application, which checks the current roaming setting for the subscriber and the desired roaming behavior for the location that the subscriber roamed into, and as a result of the comparison, when necessary, it adjusts the roaming setting to be in accordance with said desired roaming behavior.
摘要:
The method of the invention for preparing a treatment product is characterized by using a starting plasmid based on a virus belonging to the Togaviridae stock from which the genes encoding capsid proteins of the virus have been deleted. An RNA encoding virus-like particles (VLP-RNA) is prepared by manipulating the starting plasmid by connecting to it a spreading enabling gene and a treatment gene. The invention is furthermore concerned with such a treatment product and a plasmid construct encoding virus-like particles, which is prepared from the Sindbis virus in which the capsid protein of the virus has been substituted by a spreading enabling gene and a treatment gene. Example of spreading enabling gene is a gene encoding vesicular stomatitis virus glycoprotein (VSV-G). A particular example of treatment product is Herpes simplex virus thymidine kinase linked to GFP, said product being a Suicude/Reporter construct
摘要:
The method and network ensure secure forwarding of a message in a telecommunication network that has at least one first terminal and another terminal. The first terminal moves from a first address to a second address. A secure connection between the first address of the first terminal and the other terminal defining at least the addresses of the two terminals is established. When the first terminal moves from the first address to a second address, the connection is changed to be between the second address and to the other terminal by means of a request from the first terminal and preferably a reply back to the first terminal.
摘要:
The method and a system is for locating and recording time-limited signal sequences (10, 20, 30, 40, 50, 60, 70, 80, 90) in media channels that may contain undesirable signal components (102, 103, 104, 105, 202, 204), e.g., recording music in radio transmissions. The signals are continuously buffered in a memory. The user identifies a desired source material. Out of this desired source material a section may be taken as a search key (100, 112, 400). The device may also select search keys automatically. If a second instance of the search key (114, 200, 500, 510, 520) is detected, signal sequences that in time are connected to the search keys are compared. The signal sequences that by comparison are substantially identical are identified as belonging to the same, wanted, source material. The next step is an iteration of the above procedure results in a longer and higher quality segment of source material than the initial common segment.