摘要:
In a communication system having a function or performance feature to be protected, the periodic transmission of encoded interrogation information is initiated by a security routine to ensure that the function or performance feature is protected. The protected function is activated and further-executed only if reply information which is also encoded is received from a connected crypto-unit in a predetermined time span after a transmission of the interrogation information.
摘要:
A communications system includes a processor and associated memory containing information identifying dialing authorizations for a plurality of Personal Identification Numbers thereby a user to enter a personal identification number to receive access to authorized connections.
摘要:
The method and application apparatus establish performance features in a private communication system of a public communication network. Unsuccessful calls coming in from a public communication system to communication terminal apparatuses (KE1. . . n) of a private communication system (KS), as well as calls (ar', ar") directed to private performance feature communication terminal apparatuses (KE-AUL, KE-RR), are acquired in the private communication system (KS) and reported to the application apparatus(PC). Using the application apparatus (PC), a performance feature, for example call forwarding (AUL) or callback (RR), is set up or, respectively, introduced, dependent on the acquired incoming calls (ar', ar").
摘要:
In a communication system (KS), communication terminals (KA) provided for a legitimacy check are allocated to at least one inhibit dial evaluation routine (SWABE). In the framework of a call (ar), the call numbers (zrn) communicated to the inhibit dial evaluation routine (SWABE) as well as the call number (rnr) of the respective communication terminal (KA) are acquired and call numbers (zrn) or, respectively, call number combinations (rnr,zrn) that cannot be evaluated are reported to an application means (PC) via an application interface (acl). The calls (ar) are held in the communication system (KS) until the communicated call numbers (zrn) or, respectively, call number combinations (rnr, zrn) have been checked in the application device (PC) in view of their legitimacy and a legitimacy result (acl-amo) has been communicated from the application device (PC) to the communication system (KS). An advantage of the inventive method may be seen therein at only one inhibit dial evaluation routine (SWABE) need be established in the communication system (KS) for the communication terminals (KA) to be checked. Thus, the legitimacy checking of call numbers (rnr, zrn) of incoming calls (ar) is realized with the lowest possible additional outlay in the communication system (KS).
摘要:
Buffer memory systems are utilized in communication systems for the transmission of data that arise irregularly over time. These data are stored in memory areas and are subsequently transmitted block-by-block via a data line. The capacity limit of those memory areas is often exhausted, even though an adequate amount of free memory space is still present in the buffer memory system. A buffer distribution method, which is based on a combination of a fixed and of a dynamic buffer allocation method, solves this problem.
摘要:
A method and apparatus for communicating and storing measured values that are measured on electrical equipment. The values are retrieved within the framework of a link controller of at least one communication terminal attached to the communication system. Alarm information is displayed optically and/or acoustically when predetermined values are transgressed either upwardly or downwardly.