摘要:
A method for making safety mechanisms available in wireless mesh networks which have a plurality of nodes that are interconnected by multi-hop communication in a wireless network meshed by mesh routing in the MAC layer, every node being active as a router to forward the data traffic of the other nodes. At least two differentiated levels of confidence are defined by a type of protection (ToP) the value of which represents a specific level of confidence for the nodes and data packets, the data packets being labeled with a ToP value in the mesh header, and at least one ToP value being allocated to the participating nodes, the nodes forwarding the data packet in the mesh network using the ToP values of the node and of the data packet if this ToP value combination is admissible in the node.
摘要:
A method and an arrangement for configuration of a mobile appliance in a communication arrangement, with a communication address that is linked to its location in each case being assigned to the mobile appliance are provided. For this purpose, the location of the mobile appliance is determined in a first step, a configuration which is linked to the determined location is checked in a second step from a database, and this determined configuration is assigned to the mobile appliance in a third step.
摘要:
A method, a system and a terminal for occupying a key and a display field that is associated with the key of a first end device of a first subscriber. An address identifies the second end device of a second subscriber. Following user input of the first subscriber. The detected second address is assigned to the key as a target address for setting up a future connection. Associated subscriber information is determined for the detected address, and the determined subscriber information is assigned to the display field.
摘要:
The invention relates to a method and an arrangement for connecting packet-oriented communication terminals, wherein a first communication terminal (P1) is arranged in a first network (LAN), the first network (LAN) being connected to a second network (INT) via a network address-translating unit (NAT), a second communication terminal (P2) being arranged in said second network. For this purpose, a proxy (P) is provided in the gateway (GW) for intercepting or listening to messages, in that a STUN, ICE, or TURN protocol is implemented. The concept of the invention is to implement, on a case by case basis, IP address spoofing or port number spoofing and a “RESPONSE ADDRESS” STUN field in the proxy, thereby performing the STUN or ICE protocol not on the respective communication terminals, but at a third part on another unit. A performance takes place even if the central unit is not located in the user data path between the STUN server STUN and the respective communication terminal.
摘要:
A method and a telecommunications system for interchanging messages and information during a telephone conference, with the telephone conference taking place via a telephone network and the telephone conference being assigned a code which can be predetermined, and from which a password is derived which allows the subscribers to the telephone conference access to a communication platform which is based on a data network, for the purpose of interchanging data during the telephone conference.
摘要:
The invention relates to a method for detecting the status of a telephone receiver (H) for a communication terminal (EG), wherein the telephone receiver (H) is equipped with a microphone (M) and with a loudspeaker (LS). The loudspeaker (LS) of the telephone receiver (H) is used to output a defined tone signal, and this tone signal is simultaneously picked up again by means of the microphone (M) of the telephone receiver (H). The tone signal picked up is analysed, with at least one value for at least one parameter of the tone signal picked up being ascertained, and the at least one value is used to determine the status of the telephone receiver (H).
摘要:
Embodiments relate to a key distributer node (AS) for a network, which comprises: a) a memory device (1) with at least one first key, b) at least one data communication device (2) that can exchange data with first and second access nodes (MAP1, MAP2) for a terminal (STA) integrated wirelessly into the network, c) at least one processor (3) connected to the memory device (1) and the data communication device (2), wherein functions are provided for the processor(s) that allow authentication of the terminal (STA) at the second access node (MAP2) in response to a key request received by the second access node (MAP2), d) a derivation of a second key from the first key, and e) triggered transmission of the second key through the data communication device to the second access node (MAP2). Connections to the network's first and second access nodes (MAP1, MAP2) with security relationships are provided for the key distributor node (AS) when using the first key.
摘要:
In one aspect, a method for establishing communication in a packet-oriented communications network between a calling (EG1) and a called terminal is provided. In the method, before a call-accepted signal by the called terminal, triggered by a message within the framework of call set-up signaling, a direct, first payload connection is established and maintained between the calling and the called terminal. As a direct result of the call-accepted signal of the called terminal communication is triggered between the calling and called terminal by means of the established first payload connection.
摘要:
A displayed name is assigned to a telephone number on a first communication terminal of a communication system, the telephone number of a second communication being detected on the first terminal or the communication system during a connection between the first and second terminals. The displayed name is transmitted to the communication system and stored along with the telephone number once the displayed name has been input.