摘要:
A method for data transmission includes: a router receives a data packet sent by an access device of a first user, where the data packet carries target device selection information including at least a user identity of a second user, and the user identity is associated with at least one access device of the second user; the router obtains a routing address of an optimal access device among access devices associated with the user identity; and the router sends the data packet to the optimal access device according to the routing address.
摘要:
A method for authentication includes: a Gateway Mobile Station (G-MS) receives an authentication trigger message from a host, and sends the authentication trigger message to an authentication server through an Ethernet Convergence Sublayer (Eth-CS) to trigger authentication. A network system includes a G-MS, which is connected to a host and an authentication server in communicable mode. The G-MS is configured to: receive an authentication trigger message from the host and send the authentication trigger message to the authentication server through the Eth-CS. The authentication server is configured to: receive the authentication trigger message that the G-MS sends through the Eth-CS, and authenticate the host. A G-MS includes: a receiving unit, configured to receive an authentication trigger message from the host; and a sending unit, configured to send the authentication trigger message received by the receiving unit to the authentication server through the Eth-CS.
摘要:
Embodiments of the present disclosure disclose a user-oriented communication method, a route registration method and device, and a communication system. In the method, a first domain router receives a first data packet sent by a first terminal. The first data packet includes a user identifier of a first user and a user identifier of a second user, the first terminal belongs to the first user, and a second terminal belongs to the second user. The first domain router queries for a second domain router connected to the second terminal according to the user identifier of the second user and sends the first data packet to the second domain router, so that the second domain router sends the first data packet to the second terminal.
摘要:
The present disclosure is directed to systems and methods for dry particle coating of cohesive powders, and to the dry coated particles/powders produced thereby. The present disclosure is further directed to systems and methods for dry coating of cohesive particles, particularly nanosized particles, to provide enhanced flowability and other advantageous physical and/or functional properties. The disclosed systems and methods offer downstream processing advantages, e.g., for purposes of subsequent fluidization, coating, granulation and/or other particle processing operations, and have applicability in wide ranging industries, including specifically paint-related applications, pharmaceutical applications, food-related applications, cosmetic applications, defense-related applications, electronics-related applications, toner and ink-related applications, and the like.
摘要:
Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. Secure transmission of data is provided from a party in communication with a first application resident on a first computer which is in communication with a second computer with a certification authority application resident thereon. The second computer is in communication with a third computer utilizing an administrative function resident thereon. The first, second and third computers are connected by a network, such as the Internet. A name-value pair for certification processing is created on said first computer and transmitted to an administrative function on the third computer. Then, the name-value pair is routed to the appropriate certification authority on the second computer. The administrative function also transmits other certification information from said administrative function to said certification authority on the second computer. Until, finally, a certificate is created comprising the name-value pair and the other certification information on the second computer. The certificate is utilized for authenticating identity of the party.