摘要 |
The known methods and devices, which resemble the remote access systems for answering machines, do not provide sufficient protection against copying and manipulation. With the modified method, the establishment of connections between the base station and the adapters is made dependent on a mutual authentication process. The user identifies himself first with respect to his terminal and second, when the connection has been established, with respect to the base station by means of coded data comprising a "key" and a "secret". The coded data initiate a mutual authentication step according to known processes. It is only then that the base station, by means of a first ready signal, acknowledges that it is ready to be connected to an adapter, and the user sends similarly coded commands for the adapter and type of actuation, preferably combined with unrestricted data and an acknowledgement. The method even enables critical functions with greater demands as concerns security to be remotely controlled via the public telephone network, for which dedicated lines would otherwise be necessary. |