摘要:
A method for Access Authentication in the High Rate Packet Data Network is proposed in the present invention comprising steps of the AN-AAA receiving the Radius Access Request message sent from the HRPD AN; the AN-AAA judging whether a terminal is a roaming one according to the Network Access ID and transmits the roaming terminal's authentication information to the terminal's home nerwork. If said terminal is a local one, the AN-AAA judges the type of the terminal according to the NAI value. If said terminal is a single-mode one, the AN-AAA works out the Result2 with the MD5 algorithm. if said terminal is in dual-mode, the AN-AAA calculates the Result2 with the CAVE algorithm to compare the Result1 with the Result2.
摘要:
A method and device for authenticating a MS has an R-UIM by using CAVE Algorithm are provided. The hardware structure of the device includes a cdma2000/HRPD dual-mode chip, a User Identity Module supporting the CAVE algorithm. The dual-mode terminal forms the NAI value with the domain name stored in a memory of the dual-mode terminal in advance by the IMSI. The dual-mode terminal extracts a RAND that is necessary for the calculation of an authentication parameters from the Random values included in a Chap Challenge message, instructs the R-UIM card to use the CAVE algorithm to calculate the authentication parameters with the RAND and an exsiting SSD_A in the R-UIM card, and bears the authentication parameters by the Result domain of a Chap Response message. With the present invention, the wastes caused by the replacement of R-UIM cards can be avoided.
摘要:
A method and device for authenticating a MS has an R-UIM by using CAVE Algorithm are provided. The hardware structure of the device includes a cdma2000/HRPD dual-mode chip, a User Identity Module supporting the CAVE algorithm. The dual-mode terminal forms the NAI value with the domain name stored in a memory of the dual-mode terminal in advance by the IMSI. The dual-mode terminal extracts a RAND that is necessary for the calculation of an authentication parameter1 from the Random values included in a Chap Challenge message, instructs the R-UIM card to use the CAVE algorithm to calculate the authentication parameter1 with the RAND and an existing SSD_A in the R-UIM card, and bears the authentication parameter1 by the Result domain of a Chap Response message. With the present invention, the wastes caused by the replacement of R-UIM cards can be avoided.
摘要:
A method for Access Authentication in the High Rate Packet Data Network is proposed in the present invention comprising steps of the AN-AAA receiving the Radius Access Request message sent from the HRPD AN; the AN-AAA judging whether a terminal is a roaming one according to the Network Access ID and transmits the roaming terminal's authentication information to the terminal's home nerwork. If said terminal is a local one, the AN-AAA judges the type of the terminal according to the NAI value. If said terminal is a single-mode one, the AN-AAA works out the Result2 with the MD5 algorithm. if said terminal is in dual-mode, the AN-AAA calculates the Result2 with the CAVE algorithm to compare the Result1 with the Result2.
摘要:
A low-profile electronic circuit breaker includes first and second electrical branches coupled to respective first and second load terminals. The electronic circuit breaker also includes an electronic processing circuit configured to monitor an electrical condition in the first and second electrical branches. The electronic circuit breaker is packaged in a housing sized to occupy a standard single-pole breaker panelboard location. In some embodiments, the electronic circuit breaker has no load neutral terminals associated with the first and second load terminals. Methods of assembling an electronic circuit breaker are provided, as are other system and method aspects.
摘要:
Isolated polypeptides are disclosed herein, the isolated polypeptides comprising at least 90% identity to any one of: SEQ ID NO:1; SEQ ID NO:2; or SEQ ID NO:3, wherein the isolated polypeptide inhibits an interaction between palmitoyl acyl transferase zinc-finger DHHC type containing 17 (z D17) and c-jun N-terminal kinase (JNK). The polypeptides may be conjugated to a delivery and targeting moiety, such as the cell-membrane transduction domain of the HIV-1 Tat protein. There are also provided methods for treating a disease associated with cytotoxicity or excitotoxicity.
摘要翻译:本文公开了分离的多肽,所述分离的多肽与SEQ ID NO:1中的任一个包含至少90%的同一性; SEQ ID NO:2; 或SEQ ID NO:3,其中所述分离的多肽抑制含有17(z D17)和c-jun N-末端激酶(JNK)的棕榈酰酰基转移酶锌指DHHC型之间的相互作用。 多肽可以与递送和靶向部分缀合,例如HIV-1 Tat蛋白的细胞膜转导结构域。 还提供了治疗与细胞毒性或兴奋性毒性相关的疾病的方法。
摘要:
A method comprises forming a pathname indicative of a location of content on a wireless network, the pathname including an identifier of the wireless network; and sending a request for the content, the request including the pathname. In one embodiment, the pathname further includes a delimiter configured to specify a location of the identifier of the wireless network in the pathname.
摘要:
An apparatus for context-based contact information management may include a processor. The processor may be configured to receive contact information and associated sender-based context information. In this regard, the contact information and sender-based context information may have been transmitted from a sending device. The processor may also be configured to associate receiver-based context information with the contact information and identify a historical context within a historical multi-dimensional context environment based at least in part on the sender-based context information and the receiver-based context information. Further, the processor may be configured to link the contact information to the historical context. Associated methods and computer program products may also be provided.
摘要:
Systems and methods are described for creating composed communication services within a gateway to a telecom network. Composed communication services are virtual services which can be created by a network operator and which combine two or more actual communication services that perform functionality in the telecom network. For example, a composed messaging service can be created for a client, which combines methods from the MMS and SMS communication services. Subsequently, when the client invokes either SMS or MMS services in the gateway, those invocations will be counted against the composed service and the SLA and policy control will be applied against it accordingly.
摘要:
System and method for specifying and implementing programs. A graphical program is created in a graphical specification and constraint language that allows specification of a model of computation and explicit declaration of constraints in response to user input. The graphical program includes a specified model of computation, a plurality of interconnected functional blocks that visually indicate functionality of the graphical program in accordance with the specified model of computation, and specifications or constraints for the graphical program or at least one of the functional blocks in the graphical program. The specified model of computation and specifications or constraints are useable to analyze the graphical program or generate a program or simulation.