摘要:
A user terminal is switched between a cellular network and a worldwide interoperability for microwave access radio network within a telecommunication system. An authentication, authorization and accounting (AAA) server which is designed for use with both of these networks is disposed in the telecommunication system in such a way that user data of the user terminal stored in the AAA server can be accessed from both of these networks, thereby advantageously ensuring uninterrupted switching between the two networks free of loss.
摘要:
The present invention relates to remotely provisioning subscriber identification parameters in a device on a wireless network. A secure connection is established with the device, and a token containing the new subscriber identification parameters is forwarded over the secure connection. The device may verify the received token. In one embodiment, the subscriber identification parameters are updated to change network operators. The secure connection can be with the old network operator or the new network operator. The device on the wireless network may be a machine-to-machine device. The provisioned subscriber identification may be part of a universal subscriber identification module.
摘要:
The present invention relates to a method for producing a tower segment of a concrete tower of a wind energy installation, comprising the steps: providing a segment mold having at least one formwork for defining a mold of the tower segment that is to be produced and for filling with concrete; filling the segment mold with concrete in order to form the tower segment by the subsequent hardening of the concrete; measuring the tower segment thus hardened for creating a three-dimensional, virtual actual model of said tower segment; producing said three-dimensional actual model; comparing the three-dimensional actual model with a predefined mold, in particular a stored three-dimensional, virtual target model; and determining a deviation between both virtual models and changing the segment mold, in particular changing the at least one formwork when the deviation exceeds a first predefined threshold value.
摘要:
The present invention relates to a method for producing a tower segment of a concrete tower of a wind energy installation, comprising the steps: providing a segment mold having at least one formwork for defining a mold of the tower segment that is to be produced and for filling with concrete; filling the segment mold with concrete in order to form the tower segment by the subsequent hardening of the concrete; measuring the tower segment thus hardened for creating a three-dimensional, virtual actual model of said tower segment; producing said three-dimensional actual model; comparing the three-dimensional actual model with a predefined mold, in particular a stored three-dimensional, virtual target model; and determining a deviation between both virtual models and changing the segment mold, in particular changing the at least one formwork when the deviation exceeds a first predefined threshold value.
摘要:
A system comprising an IMS network (104), an adapter module (106), an identity provider (108) and an application (110) is described. The adapter module (106) is within an IMS trust domain. The application (110) is within the trust domain of the identity provider. A user of the system can access the application (110) via the IMS network (104), regardless of whether the application is within the IMS trust domain, by making use of the adapter module (106) to obtain the user's user credentials for the application from the identity provider.
摘要:
The present invention relates to hiding a device identifier (IMEI) in a communication system. Identifying a device is done by indicating an international mobile equipment identity (IMEI) as an instance identifier of the device of a user. Generating aglobally routable user agent uniform resource identifier (GRUU) for the user is done by encrypting the instance identifier so that the GRUU comprises an identity of the user and the encrypted instance identifier.
摘要:
The use of suitable measures in a method for agreeing on a security key between at least one first and one second communication station to secure a communication link is improved so that the security level for the communication is increased and the improved method can be combined with already available methods. A first parameter is determined from an authentication and key derivation protocol. In addition, an additional parameter is sent securely from the second to the first communications station. A security key is then determined from the first parameter and the additional parameter.
摘要:
The invention specifies a coil form which assures the possibility of production by automated means, a strain-relieved connection between external connecting lines, which can pass in an insulated fashion through an opening of a surrounding motor stator housing, and the coil winding ends of an exciter winding wound on the coil form. For this purpose connector sleeves are inserted and fixed in place to radially continuous, stepped diameter, fitting openings in a locking plastic bracket which is hinged-mounted by a plastic hinge on one end flange and which, after the connection has been made, can be swiveled over the exciter coil winding and locked on the other end flange. Around one set of sleeve ends of the connector sleeves which project out of the internal operating side of the plastic bracket, the coil winding ends of the exciter coil are wound. In the other set of sleeve ends the insulation stripped ends of the external connecting lines are inserted to make contact from the exterior operating side of the plastic bracket.
摘要:
The present invention relates to hiding a device identifier (IMEI) in a communication system. Identifying a device is done by indicating an international mobile equipment identity (IMEI) as an instance identifier of the device of a user. Generating a globally routable user agent uniform resource identifier (GRUU) for the user is done by encrypting the instance identifier so that the GRUU comprises an identity of the user and the encrypted instance identifier.
摘要:
A first cryptographic key (318) and a second cryptographic key (322) are created by a mobile radio terminal (103) and by a computer of the home communications network (108, 109) by using authentication key materials (312). The first cryptographic key (318) is transmitted to the computer of the visited communications network (113), and the second cryptographic key (322) is transmitted to an application server computer (106, 107).