Patent application number | Description | Published |
20080205363 | Method for operating a VoIP terminal device and a VoIP terminal device - In one aspect, a method for operating a cordless VoIP terminal device in a private network is provided. The VoIP terminal device is authorized to access the private network. Data stored on the VoIP terminal device is assessable via a standard interface for facilitating data access only after the VoIP terminal device has been successfully logged into the private network. A VoIP terminal device for carrying out the method is further provided. | 08-28-2008 |
20090133121 | Method for processing messages and message processing device - A message processing device for processing messages has at least one reception buffer, a message includes at least one authentication element and one message content. The message is received and stored in the reception buffer. A characteristic variable of a priority for security checking of the message is determined as a function of the message content. A processing sequence for further message processing for the security checking, taking into account the at least one authentication element of the messages in the reception buffer is defined and carried out as a function of the characteristic variable. | 05-21-2009 |
20090172398 | Method and Arrangement for Providing a Wireless Mesh Network - Provided are a method and an arrangement for creating a wireless mesh network in which a new node is provided that is connected between mesh nodes and an AAA server located in an infrastructure network. Based on basic encoding data that is available to the new node following successful initial authentication of a first mesh node, the new node performs the authentication similar to a proxy server instead of an AAA server, particularly for a limited time, during subsequent authentication attempts. | 07-02-2009 |
20090279518 | METHOD AND ARRANGEMENT FOR PROVIDING A WIRELESS MESH NETWORK - A method and an arrangement for providing a wire-free mesh network are provided. An approval procedure is carried out in situations in which a subscriber who is registering on the mesh network transmits an MAC address which already exists in the mesh network, such that two different subscribers within the mesh network never have identical MAC addresses. | 11-12-2009 |
20100064346 | Method and Arrangement for Providing a Wireless Mesh Network - The invention relates to a method for providing a wireless local network, wherein stationary communication devices and mobile communication devices are connected in the manner of a mesh as the sub-network, which is particularly connected to an infrastructure network and configured such that it can exchange authentication messages with at least one communication device, which is particularly disposed in the infrastructure network and provides an authentication function. During an attempt to establish a first link by a first communication device connected to a communication device providing the authentication function to a second communication device connected to the communication device providing the authentication function, an authenticator role to be assigned as part of an authentication process is associated with the first and second communication devices, wherein at least one property correlating with the connection is analyzed for meeting a criterion. The invention further relates to an arrangement comprising means for carrying out the method. | 03-11-2010 |
20100079237 | DEVICE AND METHOD FOR PROVIDING RFID IDENTIFICATION DATA FOR AN AUTHENTICATION SERVER - In a system ( | 04-01-2010 |
20100198873 | METHOD FOR PROTECTING PRODUCT DATA FROM UNAUTHORIZED ACCESS - In a method for protecting at least parts of product data, which are stored on at least one server and/or in at least one database and associated with a product identified by an RFID tag, from unauthorized access, an authentication and authorization check of an accessing party is performed upon access to a server and/or database, additionally proof being required upon access that the product is located within the discretionary area of the accessing party, the proof being provided by the RFID tag upon detection by an RFID reader by an access token in the form of a data structure, by which the RFID tag authorizes the accessing party to access at least parts of the product data associated with the product identified by the RFID tag, and stored on the server and/or in the database, wherein the product data can be queried and/or changed depending on the application. | 08-05-2010 |
20100201480 | METHOD FOR THE ACCESS CONTROL TO AN AUTOMATION UNIT - In a method for the access control to an automation unit ( | 08-12-2010 |