Deutsche Telekom AG is a German telecommunications company headquartered in Bonn. Deutsche Telekom was formed in 1996 as the former state-owned monopoly Deutsche Bundespost was privatized. As of June 2008, the German government still holds a 15% stake in company stock directly, and another 17% through the government bank KfW. Wikipedia.
Deutsche Telekom AG | Date: 2015-09-25
An access portal for controlling communication between a building-external communication server of a building-external communication network and a building-internal communication entity of a building-internal communication network includes: a memory for storing authentication data for initiating a communication connection to the communication server; a first communication interface for establishing communication with the building-external communication server using the stored authentication data, wherein the first communication interface is configured to monitor the communication connection to the building-external communication server and, in the event of a fault in the communication connection, to generate a fault message; and a second communication interface for communicating with the communication entity, wherein the second communication interface is configured to send the stored authentication data to the building-internal communication entity in response to receiving the fault message in order to initiate a communication connection between the building-internal communication entity and the building-external communication server.
Deutsche Telekom AG | Date: 2015-07-17
A method for detecting an attack in a computer network having a plurality of computers includes: receiving a plurality of warning messages from the computers, the warning messages being based on different types of anomalies in the computer network; comparing a number of warning messages from the plurality of received warning messages with a predetermined event threshold, the number of warning messages being based on a single type of anomaly in the computer network; and outputting an alarm signal if the number of warning messages based on the same type of anomaly in the computer network falls below the event threshold.
Deutsche Telekom AG | Date: 2015-02-12
A method for generating an optical frequency comb with a defined number of frequency comb lines with an adjustable spacing therebetween includes generating an input frequency comb comprising a multiplicity of input frequency comb lines with a light source. Individual frequency comb lines having an identical frequency spacing are filtered out of the multiplicity of input frequency comb lines so as to obtain filtered frequency comb lines. A first modulating of the filtered frequency comb lines is performed at a first modulation frequency so as to generate first sideband lines. The first sideband lines are generated by the first modulating so that the filtered frequency comb lines and the first sideband lines have an identical frequency spacing.
Deutsche Telekom AG | Date: 2015-06-18
A method for transmitting data from a mobile unit to a backend system includes, when connectivity is present between the mobile unit and the backend system: receiving, by the mobile unit, a master index from the backend system, deleting, by the mobile unit, data of the local database which are contained in the master database based on a comparison of a local index with the master index and updating the local index, transmitting, by the mobile unit, data stored in the local database which are not yet contained in the master database, receiving and storing a new master index from the backend system, and deleting the transmitted data of the local database based on a comparison of the updated local index with the new master index and further updating the local index.
Deutsche Telekom AG | Date: 2015-09-08
A method for automatically establishing multi-participant interactions and/or conference calls between users of mobile devices, according to which an interaction establishing application is installed on the mobile device of each participating user and receives for each user, phone numbers of other users defined as his friends and a list of predetermined triggers as conditions for initiating an interaction between users. The application constantly monitors the location of each users mobile device and upon detecting that one or more of the triggers are met, the application automatically initiates one or more interactions between users that comply with the triggers that are met.