Abstract:
Apparatuses, methods, and systems are disclosed for supporting authentication with a mobile core network using a concealed identity. One apparatus (300) includes a processor (305) that sends (505) a first authentication message that includes a concealed identifier to a network function to authenticate with a mobile communication network via a non-3GPP access network. The processor (305) receives (510) a second authentication message from the network function in response to the first authentication message. The second authentication message comprises an authentication response based on the concealed identifier. The processor (305) completes (515) authentication with the mobile communication network in response to the authentication response comprising a challenge packet. The processor (305) receives (520) configuration information for accessing the mobile communication network in response to successful authentication with the mobile communication network.
Abstract:
Apparatuses, methods, and systems are disclosed for supporting remote unit reauthentication. One apparatus (600) apparatus includes a processor (605) and a transceiver (625) that sends (805) a first authentication message to a network function in a mobile communication network and receives (810) a second authentication message from the network function in response to the first authentication message. Here, the first authentication message contains an indicator that the apparatus supports EAP Reauthentication Protocol and the second authentication message contains a key management domain name indicating a group of network functions that can share reauthentication security context. The processor (605) derives (815) reauthentication security context in response to successful authentication with the mobile communication network and locally stores (820) the received key management domain name and the derived reauthentication security context for subsequent reauthentication with the mobile communication network.
Abstract:
A system is disclosed in which an application server sends, to an interworking function, a request for setting up sponsored data connectivity for one or more services provided by the application server. The request includes an application server identifier and packet flow description(s) associated with the one or more services. The interworking function determines, from the received information, information for forwarding to a core network node, and sends the information to the core network node for managing and/or storing respective policy charging control (PCC) rules associated with the one or more services. The interworking function can be a Service Capability Exposure Function.
Abstract:
A Proxy Call Session Control Function, P-CSCF, comprises a transceiver and a controller. The transceiver receives a register request from a user equipment, UE, in a visited public land mobile network, VPLMN. The controller retrieves a network identifier, PLMN ID, for the VPLMN, queries a database for any local emergency number(s), and includes the PLMN ID for the VPLMN in a header and forwards the register request to a Serving Call Session Control Function, S-CSCF.
Abstract:
A system is described in which a default MME (9A) receives a NAS message (S501, S505) from a mobile device (3D); sends a rerouting request (S509) to a base station (5) serving the mobile device (3D) and includes information identifying a group of dedicated MMEs (9D) to which the NAS message should be rerouted. If none of the dedicated MMEs (9D) is available, then the default MME (9A) receives a message from the base station (5), the message rerouting the NAS message to the default MME (9A), instead of a dedicated MME (9D). The default MME (9A) either proceeds (S515a) to serving the mobile device (3D) or the default MME (9A) rejects (S515b) the NAS message.
Abstract:
For allowing an improvement of performance of a network while retaining a reliable detection of unsolicited communications a method for routing an IMS (IP Multimedia Subsystem) communication from a network element of an originating network to a network element of the same network or of a terminating network is claimed, wherein a process for detecting unsolicited communications is performed by a detection application within the originating network and/or within the terminating network for evaluating communications as being unsolicited or permitted. The method is characterized in that a permitted communication will be routed from the network element of the originating network to the network element of the same network or of the terminating network without being routed through the detection application. Further, an according network is claimed, preferably for carrying out the above mentioned method.
Abstract:
A lot of existing technologies for tangible user interface tracking use back- or front-projection setups, but they suffer from poor image quality, shadow casting, non-ergonomic interaction, and/or large installations. The known drawbacks are eliminated with infrared photodiodes (14) mounted behind a display's LC-matrix (21) to track infrared diodes (3) in front of the LC-matrix (21). The sensors (14) are addressed through a modular master-slave circuit (27, 28). Using several interaction devices (1), multiuser interaction is possible.
Abstract:
A communication control system for connecting a call using a local service number valid within a local service area within which a user equipment is positioned, and forwarding data via an internet protocol network, comprising a local number converter and a session controller group. The local number converter is located in each local service area, in response to a query specifying a local service number, accesses a database of correspondence between a local service number valid within the local service area and a global routable number, and determines a global routable number corresponding to the specified local service number. The session controller group accepts a call request including the local service number from the user equipment, queries the local number converter in the local service area within which the user equipment is positioned to convert the local service number into a global routable number, and routes the internet protocol network using the global routable number.
Abstract:
Für eine Brennkraftmaschine (1) mit einem Common-Rail-Systeme einschliesslich Einzelspeichern (8) wird ein Verfahren zur Steuerung und Regelung vorgeschlagen, bei dem aus einem Soll-Ist-Vergleich des Spritzendes und des Spritzbeginns eine Spritzende-Abweichung und eine Spritzbeginn-Abweichung bestimmt wird. Anhand dieser Abweichungen wird sodann ein Injektor (7) bewertet, wobei die weitere Steuerung und Regelung der Brennkraftmaschine auf Grundlage der Injektor-Bewertung erfolgt.
Abstract:
Verfahren zur Beschichtung von Metallen, insbesondere von Zink und seinen Legierungen, wobei man das Metall a) einer Konversionsbehandlung durch Kontakt mit einer Konversionslösung unterzieht, die mindestens ein einfaches oder komplexes Salz mindestens eines Metalls M enthält, und c) mit einem Beschichtungsmittel in Kontakt bringt, das c1) insgesamt 5 bis 30 Gew.-% eines oder mehrerer aliphatischer vernetzender Einbrennurethanharze, c2) insgesamt 10 bis 30 Gew.-% eines oder mehrerer Vernetzungsmittel für die Komponente c1 und c3) 4 bis 30 Gew.-% eines oder mehrerer Korrosionsschutzpigmente enthält und danach die im Teilschritt c) erhaltene Beschichtung aushärtet. Vorzugsweise wird das Verfahren als „no -rinse" - Bandverfahren durchgeführt. Weiterhin betrifft die Erfindung ein Metallblech mit einer Beschichtung, die nach dem genannten Verfahren erhältlich ist, ein Formteil aus einem derartigen Metallblech oder einen Gegenstand, der ein derartiges Metallblech oder ein Formteil hieraus enthält, sowie die Verwendung eines solchen Metallblechs, Formteils oder Gegenstandes im Außenbereich von Gebäuden.