摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
A mobile communications device includes logic means operable to generate a request that is transmitted to a first network node. The request includes a personal information number and at least one device identifier associated with the mobile communications device. The mobile communications device also includes logic means operable to receive a response from the first network node. The response includes a URL and a session ID based upon the personal information number and the at least one device identifier associated with the mobile communications device. The mobile communications device further includes logic means operable to establish a communication session with a second network node to provision at least one aspect of the mobile communications device by transmitting the URL and the session ID to the second network node.
摘要:
A method for provisioning a mobile communications device comprises sending a registration request for registration with a registration server, the registration request including a request for a personal information number; receiving a response from the registration server, the response including the personal information number; sending a provisioning request to a network node, the request including the personal information number and at least one device identifier associated with the mobile communications device; receiving a response from the network node, the response including a URL and a session ID based upon the personal information number and the at least one device identifier associated with the mobile communications device; and launching an application on the mobile communication device to establish a communication session between the mobile communication device and a provisioning system.
摘要:
A method for provisioning a mobile communications device comprises sending a registration request for registration with a registration server, the registration request including a request for a personal information number; receiving a response from the registration server, the response including the personal information number; sending a provisioning request to a network node, the request including the personal information number and at least one device identifier associated with the mobile communications device; receiving a response from the network node, the response including a URL and a session ID based upon the personal information number and the at least one device identifier associated with the mobile communications device; and launching an application on the mobile communication device to establish a communication session between the mobile communication device and a provisioning system.
摘要:
A mobile communications device includes logic means operable to generate a request that is transmitted to a first network node. The request includes a personal information number and at least one device identifier associated with the mobile communications device. The mobile communications device also includes logic means operable to receive a response from the first network node. The response includes a URL and a session ID based upon the personal information number and the at least one device identifier associated with the mobile communications device. The mobile communications device further includes logic means operable to establish a communication session with a second network node to provision at least one aspect of the mobile communications device by transmitting the URL and the session ID to the second network node.
摘要:
A hydraulic pump to synchronize the operation of a pair of hydraulic actuators wherein each hydraulic actuator comprises a cylinder including a first fluid port and a second fluid port formed in the proximal and distal end portions thereof respectively and having a piston disposed therein coupled to a piston rod at least partially disposed within the corresponding cylinder. The dual hydraulic pump includes a triple gear assembly to alternately feed pressurized hydraulic fluid to the first fluid port of each hydraulic actuator simultaneously or the second fluid port of each hydraulic actuator simultaneously to synchronize the linear movement of each piston and piston rod in a first direction or a second direction.
摘要:
In an example, a threat intelligence controller is configured to operate on a data exchange layer (DXL). The threat intelligence controller acts as a DXL consumer of reputation data for a network object, which may be reported in various different types and from various different sources. Of the devices authorized to act as reputation data producers, each may have its own trust level. As the threat intelligence controller aggregates data from various providers, it may weight the reputation reports according to trust level. The threat intelligence engine thus builds a composite reputation for the object. When it receives a DXL message requesting a reputation for the object, it publishes the composite reputation on the DXL bus.