摘要:
The invention relates to a method for access control for a configuration access (UI) to a device (G), wherein access is provided to the configuration access (UI) by way of a first data connection (LAN), and wherein the configuration access (UI) is protected by at least one primary access control device. In the process, access is provided to the device (G) by way of a second access prior to the use of the configuration access (UI), wherein the configuration access (UI) is released following said second access for a pre-defined time period and after expiration of said time period is blocked again.
摘要:
The invention relates to identifying and/or addressing a data terminal device (DEE1) of a local network (LNW, LAN, W-LAN, Ethernet, Powerline) such that address/identification information (AID-INF3) of the data terminal device of the local network is available to a user of the local network in a simple and comfortable manner, wherein the data terminal device registers with a terminal system (ESY) due to a triggering event (ALE), indicated, for example, by the URL 'www.mygigaset.com' and present, for example, in a large area network (GNW, WAN, MAN, INTERNET), and transmits thereto address/identification information, for example modifiable information (AID-INF1), referencing the local network and the large area network. Said address/identification information is stored by the terminal system. Subsequently, in a further data terminal device (DEE2) of the local network, the URL 'www.mygigaset.com' is entered into the terminal system, a connection is established with the terminal system, and address/identification information, for example modifiable information (AID-INF2), referencing the large area network is transmitted. The terminal system compares the transmitted address/identification information (AID-INF1, AID-INF2) to each other, and transmits to the further data terminal device a part of the address/identification information (AID-INF1) referring back to the local network as the address/identification information (AID-INF3) of the data terminal device (DEE1), because both data terminal devices are present in the same local network, in order that said data terminal device can communicate directly with the data terminal device (DEE1).
摘要:
In order to establish and operate a communication system (KSY) in which it can be communicated with other communication subscribers administered in the communication server (KS) of a closed communication community by means of a communication device (KG) - when said communication device is activated for use in a communication network - via a configuration server (KS) in the sense of 'plug and play', the communication system (KSY), which comprises a communication device (KG) and a proprietary configuration server (KS), e.g. with a SIP server component, for example from the manufacturer of the communication device (KG), is preconfigured with a reference to the configuration server (KS) as a SIP provider. Immediately after switching on the communication device (KG), the latter will automatically register with the configuration server (KS) with a control message (STN), e.g. a SIP message, containing an address information (ADI). The address information (ADI) is, for example, a dynamically allocated IP address (IPA). A login name (AMN) is formed on the basis of at least one unique device-specific identifier (KEN).
摘要:
When registering a DECT mobile part (MT) with the base station (BS), the VoIP user ID (user) is formed from the DECT user ID (IPUI) according to a mapping rule and is used for registering an SIP account (SIPA). In addition, the SIP password (pw(AC)) is formed from the DECT authentication code (AC). Roaming or handover of DECT mobile parts (MT) in DECT systems featuring a VoIP connection can be accomplished in a simple manner by adjusting the DECT user ID (IPUI) to the SIP user ID (user (IPUI')) and adjusting the authentication code (AC) to the password (pw(AC)). The DECT mobile parts (MT) can continue to be used without change even when the same are connected to IP-oriented networks (IN), while said DECT mobile parts (MT) can be marketed for a wider range of uses.
摘要:
The invention relates to a method for configuring a terminal (EGl, EG2), wherein a user (N1,N2) first enters an authentication code (AC) provided by a provider (providerA, providerC) into the terminal (EGl, EG2). The authentication code is then transmitted from the terminal (EGl, EG2) to an address server (AS), which then provides an address of a configuration server (KSA, KSC) using the authentication code (AC) and transmits the address to the terminal (EGl, EG2). The authentication code (AC) is then transmitted to the configuration server (KSA, KSC). Subsequently, the configuration server (KSA, KSC) provides the configuration data with reference to the transmitted data. The configuration data is transmitted to the terminal (EGl, EG2) and is configured there.