摘要:
A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.
摘要:
Method for searching services, resources and/or functionalities in a network wherein the network comprises a multitude of nodes to which routable network addresses are assigned, and wherein the services, resources and/or functionalities which are to be searched, are specified by a source node (Q) that is characterized in that a corresponding direction is specified within the network by at least one destination node (Z) and/or nodes near to the destination node (Z), by which a routing path is defined between the source node (Q) and the corresponding destination node (Z), and characterized in that only pre-configurable nodes near to the routing path between source node (Q) and destination node (Z) are included in the search.
摘要:
Method for searching services, resources and/or functionalities in a network wherein the network comprises a multitude of nodes to which routable network addresses are assigned, and wherein the services, resources and/or functionalities which are to be searched, are specified by a source node (Q) that is characterized in that a corresponding direction is specified within the network by at least one destination node (Z) and/or nodes near to the destination node (Z), by which a routing path is defined between the source node (Q) and the corresponding destination node (Z), and characterized in that only pre-configurable nodes near to the routing path between source node (Q) and destination node (Z) are included in the search.
摘要:
A first sleeve and a second sleeve are put onto the shaft at a predetermined axial distance apart and are pressed radially. The shaft is encapsulated between the first and the second sleeve with a thermoplastic in such a way that a vane body, which has at least one aperture, is formed. The vane body is encapsulated with a sealing compound in such a way that a sealing lip is formed on the vane body at the margins.
摘要:
Embodiments provide a method of forming a chip package. The method may include attaching at least one chip on a carrier, the chip including a plurality of chip pads on a surface of the chip opposite to the carrier; depositing a first adhesion layer on the carrier and on the chip pads of the chip, the first adhesion layer including tin or indium; depositing a second adhesion layer on the first adhesion layer, the second adhesion layer including a silane organic material; and depositing a lamination layer or an encapsulation layer on the second adhesion layer and the chip.
摘要:
A method for facilitating communication in a mobile communication system in which address-delegating entities are involved, wherein mobile nodes attaching to the communication system get assigned an address or address prefix, wherein the address or address prefix assignment is delegated from an entity being associated with mobility management—mobility entity—to some other configuration component (2), is characterized in that the configuration component (2), upon being delegated by a mobility entity to assign a mobile node an address or address prefix, stores information about the delegating mobility entity. Furthermore, a corresponding mobile communication system with discovery functionality of address-delegating entities is disclosed.
摘要:
A mobile communication system includes a core network having one or more elements that handle bearer processing and/or that store user equipment context information for at least one user equipment or device. Elements of the core network are configured to suspend some or all bearer processing and/or to compress portions of or the whole user equipment context information for the at least one user equipment or device. Elements of the core network may also be configured to transfer portions or all of the user equipment context information to other elements of the core network and/or to remove portions or all of the user equipment context information. Suspending some or all bearer processing and/or compressing portions of or the whole user equipment context information may be done for a user equipment or device in an energy saving state. Related methods and a user equipment device are also described.
摘要:
To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.
摘要:
A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application servers. The PUCI application servers make an evaluation as to whether a communication received from the user equipment is an unsolicited communication; the CSCF makes a decision on routing toward the PUCI application servers based on the evaluation; then, the PUCI application servers execute the routing based on the decision.
摘要:
Method for supporting network based mobility for a mobile terminal in an IMS (IP Multimedia Subsystem) architecture, wherein the mobile terminal is connected to a femto cell or to a macro cell—source cell—and wherein handover of an actual session of the mobile terminal is performed to another femto cell or macro cell—target cell—, wherein the femto cells and the macro cells are provided with an eMSC-server (Mobile Switching Center Server enhanced for IMS Centralized Services) function, and wherein the source cell's eMSC-server function hosts a source user agent and the target cell's eMSC-server function hosts a target user agent, is characterized in that the source user agent contacts the target user agent directly or indirectly prior to executing the actual handover, and wherein the source user agent prepares the target user agent together with the corresponding access network by exchanging handover related information.