Abstract: As an alternative to known communication systems which are available on the Internet and set up voice-over-IP links between users, the invention provides for the setup of a star-shaped communication network. To this end, a software generator first of all generates a native application which acts as a central node and, when required, for its part generates Internet applications that allow communication with the native application.
Abstract: To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each instance, and sending along a new key in the messages, in each instance, which key, after it has been received completely, becomes the key used, and, once again, another new key is exchanged. This allows dynamic encryption, which allows an interception-proof connection, starting from a secure initial exchange of keys, for example.
Abstract: In order to set up an encrypted communication link between two mobile appliances, it is proposed that the identification data and keys that are required therefor be interchanged in a one-off identification step and that, as part of the setup of the actual communication link, an unencrypted connection first of all be set up for reciprocal identification and then a connection encrypted with the initial interchanged keys be set up.
Abstract: The invention relates to a method for forming a network with a first mobile computer (10) having at least one first main communications program (12) and a second mobile computer (14) having at least one second main communications program (16) and a first contact program (18) associated with the first main communications program (12), the first main communications program (12) sending at least social data to the first contact program (18).
Abstract: To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each instance, and sending along a new key in the messages, in each instance, which key, after it has been received completely, becomes the key used, and, once again, another new key is exchanged. This allows dynamic encryption, which allows an interception-proof connection, starting from a secure initial exchange of keys, for example.
Abstract: As an alternative to known communication systems which are available on the Internet and set up voice-over-IP links between users, the invention provides for the setup of a star-shaped communication network. To this end, a software generator first of all generates a native application which acts as a central node and, when required, for its part generates Internet applications that allow communication with the native application.
Abstract: The invention relates to a method which employs at least one CPU (10, 12, 14, 16) that has at least one network interface (18, 20, 22, 24) and one messaging program (26, 28, 30, 32), which receives a message (34) with a message text (36) and a file attachment (38) via the network interface (18, 20, 22, 24) in at least one operating condition. According to the invention, the messaging program (26, 28, 30, 32) automatically saves the file attachment (38), separately from the message text (36) of the message (34), at a memory location that is based upon the path information (40) of the message (34).
Abstract: The invention is based on a system (10) having a database unit (12), which is at least intended to manage data (14) relating to at least one business process, and having at least one mobile computation unit (16, 18) which has a first process application (20, 22) which is intended to process data (14) relating to the business process. It is proposed that the system comprises at least one second process application (20, 22) which is intended to initiate a process step (24) of the business process at least in the first process application (20, 22).