Patent application number | Description | Published |
20100105355 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTION OF AN UNAUTHORIZED SERVICE MESSAGE IN A NETWORK - A method is described for detecting an unauthorized service message in a communications network. The method comprising the steps of: receiving a signaling message associated with a supplementary service (SS) message and/or a unstructured supplementary service data (USSD) message from a first network node, the signaling message comprising identification information of the sender of the SS message and/or USSD message and first location information of the first network node; requesting second location information of the first network node from the a second network node serving the sender of the SS message and/or USSD message; and, comparing the first location information with the second location information in order to determine whether the SS message and/or USSD message is authorized or not. | 04-29-2010 |
20100210292 | EXTENDING A TEXT MESSAGE WITH CONTENT - A method is described for extending a text message with content wherein the text message is sent by a mobile terminal via a Short Message Service Center (SMSC) of a communications system to a recipient and wherein the communications system further comprises a Content Service Center (CSC). The method comprises the steps of receiving at the CSC the text message originating from the SMSC; generating a content-extended text message by adding at least one piece of content to at least a part of the text message; and, sending the content-extended text message depending on the size of the content-extended text message in one or more mobile terminated short messages (MT/SM) to the recipient. | 08-19-2010 |
20100233992 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SHORT MESSAGE SERVICE (SMS) FORWARDING - Methods, systems, and computer readable media for SMS forwarding are disclosed. One method includes performing steps at a message service message proxy separate from a short message service center and implemented on a computing platform including at least one processor. The steps include receiving a message service message routing information response message containing message service message routing information for a first destination. The response message is modified to direct a mobile terminated message service message intended for the first destination to the message service message proxy. The mobile terminated message service message is then received at the message service message proxy and the message service message proxy determines whether a message service message forwarding feature is enabled for the first destination. In response to determining that a message service message forwarding feature is enabled for the first destination, it is determined whether the mobile terminated message service message is eligible for forwarding to a second destination. In response to determining the mobile terminated message service message is eligible for forwarding, signaling is initiated to forward the mobile terminated message service message to the second destination. | 09-16-2010 |
20100235911 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MITIGATING ADDRESS SPOOFING IN MESSAGING SERVICE TRANSACTIONS - Systems, methods, and computer readable media for detecting and mitigating address spoofing in messaging service transactions are disclosed. A messaging service firewall (MSF) separate from a short message service center (SMSC) receives a mobility management reply message (MMR) that is sent by a mobile location register element in response to an associated mobility management query (MMQ) and that includes a serving switch identifier. The MSF allocates a global title address (GTA) from a pool of GTAs and stores a correlation between the allocated GTA and the originating SMSC. The MSF replaces the serving switch identifier in the MMR with the allocated GTA and routes the modified MMR. The MSF then receives a messaging service message (MSM) that is addressed to the allocated GTA and that includes the purported originating SMSC. If the purported originating SMSC does not match the SMSC to which the GTA is correlated, the MSM is discarded. | 09-16-2010 |
20130095793 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MITIGATING ADDRESS SPOOFING IN MESSAGING SERVICE TRANSACTIONS - Systems, methods, and computer readable media for detecting and mitigating address spoofing in messaging service transactions are disclosed. A messaging service firewall (MSF) separate from a short message service center (SMSC) receives a mobility management reply message (MMR) that is sent by a mobile location register element in response to an associated mobility management query (MMQ) and that includes a serving switch identifier. The MSF allocates a global title address (GTA) from a pool of GTAs and stores a correlation between the allocated GTA and the originating SMSC. The MSF replaces the serving switch identifier in the MMR with the allocated GTA and routes the modified MMR. The MSF then receives a messaging service message (MSM) that is addressed to the allocated GTA and that includes the purported originating SMSC. If the purported originating SMSC does not match the SMSC to which the GTA is correlated, the MSM is discarded. | 04-18-2013 |
20130137471 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SHORT MESSAGE SERVICE (SMS) FORWARDING - Methods, systems, and computer readable media for SMS forwarding are disclosed. A message service message routing information response message containing message service message routing information for a first destination may be received. The response message is modified to direct a mobile terminated message service message intended for the first destination to the message service message proxy. The mobile terminated message service message is received at the message service message proxy, which determines whether a message service message forwarding feature is enabled for the first destination. If a message service message forwarding feature is enabled for the first destination, it is determined whether the mobile terminated message service message is eligible for forwarding to a second destination. If the mobile terminated message service message is eligible for forwarding, signaling is initiated to forward the mobile terminated message service message to the second destination. | 05-30-2013 |
20130178238 | EXTENDING A TEXT MESSAGE WITH CONTENT - A method is described for extending a text message with content wherein the text message is sent by a mobile terminal via a Short Message Service Center (SMSC) of a communications system to a recipient and wherein the communications system further comprises a Content Service Center (CSC). The method comprises the steps of receiving at the CSC the text message originating from the SMSC; generating a content-extended text message by adding at least one piece of content to at least a part of the text message; and, sending the content-extended text message depending on the size of the content-extended text message in one or more mobile terminated short messages (MT/SM) to the recipient. | 07-11-2013 |
Patent application number | Description | Published |
20090274886 | COMPOSITION FOR THE PROTECTION OF A SHAPED ARTICLE AGAINST CORROSION - The invention relates to a composition for the protection of a shaped article against corrosion, said composition comprising (a) a polyisobutene having a glass transition temperature of less than −20° C. and surface tension of less than 40 mM/m at a temperature above the glass transition temperature of said polyisobutene, (b) a filler material and (c) an anti-oxidant composition. The anti-oxidant composition comprises a primary and/or a secondary anti-oxidant, the primary anti-oxidant being selected from the group consisting of sterically hindered phenol compounds. The invention further relates to a wrapping tape comprising said composition for the protection of a shaped article, a process for the manufacture of said wrapping tape and a process for covering a shaped article with said wrapping tape. | 11-05-2009 |
20100051199 | PROCESS FOR PROVIDING AN EXTENDED TUBULAR ARTICLE WITH A CORROSION PROTECTION COATING SYSTEM HAVING SELF-REPAIRING PROPERTIES - The present invention provides a system, composition and process for protecting an extended tubular article or a section thereof from corrosion. The system comprises a layer of an adhesive composition on a surface of the extended tubular article or section thereof, and a corrosion protecting layer thereon. | 03-04-2010 |
20110123791 | COMPOSITION FOR THE PROTECTION OF A SHAPED ARTICLE AGAINST CORROSION - The invention relates to a composition for the protection of a shaped article against corrosion, said composition comprising (a) a polyisobutene having a glass transition temperature of less than −20° C. and surface tension of less than 40 mM/m at a temperature above the glass transition temperature of said polyisobutene, (b) a filler material and (c) an anti-oxidant composition. The anti-oxidant composition comprises a primary and/or a secondary anti-oxidant, the primary anti-oxidant being selected from the group consisting of sterically hindered phenol compounds. The invention further relates to a wrapping tape comprising said composition for the protection of a shaped article, a process for the manufacture of said wrapping tape and a process for covering a shaped article with said wrapping tape. | 05-26-2011 |
20140318686 | PROCESS FOR PROVIDING AN EXTENDED TUBULAR ARTICLE WITH A CORROSION PROTECTION COATING SYSTEM HAVING SELF-REPAIRING PROPERTIES - The present invention A process for providing an extended tubular article or one or more sections of the extended tubular article with a corrosion protecting system, wherein (a) a layer of an adhesive composition is applied to the surface of the extended tubular article or the one or more sections of the extended tubular article, and (b) a corrosion protecting layer is applied to the layer of the adhesive composition, the adhesive composition comprising a polyolefin blend, wherein the polyolefin blend comprises 30% to 100% by weight of a polyisobutene and 0% to 70% by weight of an olefin polymer, based on the total weight of the polyolefin blend, wherein said polyisobutene is has a glass transition temperature of lower than −40° C. and a number average molecular weight M | 10-30-2014 |
Patent application number | Description | Published |
20110207775 | AGENT THAT MODULATES PHYSIOLOGICAL CONDITION OF PESTS, INVOLVED IN INSECT VESICLE-FUSING ATPASE ACTIVITY - The present invention provides an agent that modulates physiological condition of pests, wherein the agent has an ability to modulate the activity of an insect vesicle-fusing ATPase; a method for assaying pesticidal activity of a test substance, which comprises measuring the activity of a vesicle-fusing ATPase in a reaction system in which the vesicle-fusing ATPase contacts with a test substance, and the like. | 08-25-2011 |
20120258929 | AGENT THAT MODULATES PHYSIOLOGICAL CONDITION OF PESTS, INVOLVED IN INSECT PEPTIDYL-DIPEPTIDASE A ACTIVITY - The present invention provides an agent that modulates physiological condition of pests, wherein the agent has an ability to modulate the activity of an insect peptidyl-dipeptidase A; a method for assaying pesticidal activity of a test substance, which comprises a step of measuring the activity of a peptidyl-dipeptidase A in a reaction system in which the peptidyl-dipeptidase A contacts with a test substance, and the like. | 10-11-2012 |
20150065557 | METHODS FOR CONTROLLING PESTS USING RNAi - The present invention relates to methods for controlling pest infestation using double stranded RNA molecules. The invention provides methods for producing transgenic cells expressing the double stranded RNA molecules, as well as compositions and commodity products containing or treated with such molecules. | 03-05-2015 |
Patent application number | Description | Published |
20120221743 | SUPPORT FOR NETWORK ROUTING SELECTION - A database of pre-stored information is provided to support address resolution to determine addresses that can be used to control routing through a network such as call routing through a telephone network or e-mail routing. A user is enabled to enter address describing data, which the user can distinguish into different information parts. The network, address resolution equipment determines an identifier of an intended destination based on the information parts, if need be by combining it with the database. The result is used to control routing of data through the network. Furthermore, the address describing data is inspected for information parts that were distinguished by the user and that applied to the intended destination but were by themselves insufficient to determine the identifier. When such an information part is found, a new record is added to the database of pre-stored address resolution information or an existing record is modified the new or modified record representing that information derived from said insufficient information part applies to the identifier that was determined to supply the address. The new or modified record is subsequently used resolve further address describing data to route other data. | 08-30-2012 |
20120243532 | SUPPORT FOR NETWORK ROUTING SELECTION - An address for controlling transmission of routing through a network is obtained by means of input from a combination of network terminals. Initially, address describing data is received from a user via a source terminal. A control circuit determines whether the address describing data is sufficient to define an address of a destination. If not, the control circuit uses the address describing data to extract information must be met by the destination, but for which it is not known for specific destinations whether it is met. The information may define a desired property of the destination for example, or a mutual relation between the user and the destination. The control circuit then transmits a confirmation request to one or more possible destinations, to ask whether information relates to the possible destination. If a positive confirmation is received back from a possible destination, the address of this possible destination is used. Information that the information relates to the possible destination may be stored to resolve future address describing information. | 09-27-2012 |
20130039183 | TELECOMMUNICATION QUALITY OF SERVICE CONTROL - Different quality of service policies are enforced for packets from traffic streams of different type in a communication network, according to the type of traffic types of traffic. A learning phase and an operation phase are provided. The learning phase teaching by example of characteristics that must be used to distinguish the different types of traffic. In the learning phase, an indication is received of a quality of service policy that is required for user applications of a selected type. An indication is provided indicating execution of a user application of said type in a user domain and characteristics of packet traffic are derived from inspection of packets transmitted through the communication network to and/or from the user domain during the indicated execution. In the operation phase packet traffic in the network to and/or from the user domain is inspected. It is detected whether observed characteristics of the packet traffic match the derived characteristics. When a match is detected, enforcement of the quality of service policy in the network to packet traffic of the selected type of user application is triggered. | 02-14-2013 |
20130046838 | SUPPORT FOR NETWORK ROUTING SELECTION - Retrieval of address data for control of routing through a network, such as a telephone network or an e-mail network is supported by a database with pre-stored address resolution information. Input from users is used to expand the database. When a first user inputs information that links a destination in the network to an information item, the database is expanded by adding a record that links the information item to a source identifier of the first user and a destination identifier of the destination. Subsequently, the added record is compared with address describing data from a second user. A destination address may be derived from the address describing data for example when at least one attribute associated with the second user and the source identifier match and at least part of the address describing data matches the information item. In another embodiment an address of the source identifier may be used as a destination address for the second user, when address describing data from the second user matches with the information item from the record. | 02-21-2013 |