1. A teleconference system comprising a security server and a conference management server, the teleconference system being configured to perform a teleconference through a network,
the security server comprising:
a first communicator configured to connect to the network;
a first hardware processor; and
a first memory storing instructions, the instructions, when executed by the first hardware processor, causing the first hardware processor to perform:
a determining operation of determining whether address information of a terminal apparatus operated by a conference participant is included in a particular range;
a first transmitting operation of:
when the address information of the terminal apparatus is included in the particular range, transmitting first authentication information corresponding to the conference participant from the first communicator to an authentication server, the first authentication information being acquired from the terminal apparatus through the first communicator, the authentication server being configured to authenticate usage of a function through a network corresponding to the particular range; and
when the address information of the terminal apparatus is outside the particular range, transmitting second authentication information corresponding to the conference participant from the first communicator to the conference management server, the second authentication information being acquired from the terminal apparatus through the first communicator, the conference management server being configured to authenticate connection to a conference server configured to control the teleconference;
a second transmitting operation of, when an authentication result satisfying an authentication condition is acquired through the first communicator from the authentication server in response to transmission of the first authentication information, transmitting third authentication information from the first communicator to the conference management server, the third authentication information corresponding to the first authentication information and being generated by the security server; and
a third transmitting operation of:
transmitting a second authentication result from the first communicator to the terminal apparatus that is a transmission source of the second authentication information, the second authentication result being acquired from the conference management server through the first communicator in response to transmission of the second authentication information; and
transmitting a first authentication result from the first communicator to the terminal apparatus that is a transmission source of the first authentication information, the first authentication result being acquired from the conference management server through the first communicator in response to transmission of the third authentication information,
the conference management server comprising:
a second communicator configured to connect to the network;
a second hardware processor; and
a second memory storing instructions, the instructions, when executed by the second hardware processor, causing the second hardware processor to perform:
an authenticating operation of:
when the second authentication information is acquired from the security server through the second communicator, authenticating connection to the conference server based on authentication information stored in a management portion of the conference management server and on the second authentication information; and
when the third authentication information is acquired from the security server through the second communicator, authenticating connection to the conference server based on authentication information stored in the management portion and on the third authentication information; and
a fifth transmitting operation of transmitting an authentication result by the authenticating operation from the second communicator to the security server.
2. The teleconference system according to claim 1, wherein the security server is connected to a local area network to which the authentication server is connected; and
wherein the conference management server is connected to an external network different from the local area network.
3. The teleconference system according to claim 2, wherein the local area network is formed by a first local area network and a second local area network different form the first local area network; and
wherein the security server is connected to the first local area network, and the authentication server is connected to the second local area network.
4. The teleconference system according to claim 3, wherein the particular range of the address information corresponds to a range of local address in the second local area network.
5. The teleconference system according to claim 1, wherein the management portion of the conference management server includes a first database storing authentication information for being compared with the third authentication information, and a second database storing authentication information for being compared with the second authentication information;
wherein the first database stores usage function information indicative of usage permission of a particular conference function that is given to the terminal apparatus of which the address information is included in the particular range; and
wherein the second database stores usage function information indicative of limited permission of a conference function excluding the particular conference function.
6. A non-transitory computer-readable storage medium storing a program executable by a computer configured to control a security server included in a teleconference system in which a teleconference is conducted through a network, the program comprising:
a determining instruction of determining whether address information of a terminal apparatus operated by a conference participant is included in a particular range;
a first transmitting instruction of:
when the address information of the terminal apparatus is included in the particular range, transmitting first authentication information corresponding to the conference participant from a first communicator of the security server to an authentication server, the first authentication information being acquired from the terminal apparatus through the first communicator, the authentication server being configured to authenticate usage of a function through a network corresponding to the particular range; and
when the address information of the terminal apparatus is outside the particular range, transmitting second authentication information corresponding to the conference participant from the first communicator to the conference management server, the second authentication information being acquired from the terminal apparatus through the first communicator, the conference management server being configured to authenticate connection to a conference server configured to control the teleconference;
a second transmitting instruction of, when an authentication result satisfying an authentication condition is acquired through the first communicator from the authentication server in response to transmission of the first authentication information, transmitting third authentication information from the first communicator to the conference management server, the third authentication information corresponding to the first authentication information and being generated by the security server; and
a third transmitting instruction of:
transmitting a second authentication result from the first communicator to the terminal apparatus that is a transmission source of the second authentication information, the second authentication result being acquired from the conference management server through the first communicator in response to transmission of the second authentication information; and
transmitting a first authentication result from the first communicator to the terminal apparatus that is a transmission source of the first authentication information, the first authentication result being acquired from the conference management server through the first communicator in response to transmission of the third authentication information.
7. The storage medium according to claim 6, wherein the determining instruction comprises determining whether the address information of the terminal apparatus is included in the particular range, based on whether the address information of the terminal apparatus is in a same subnet as a network to which the authentication server is connected.
8. The storage medium according to claim 7, wherein the first transmitting instruction comprises transmitting the second authentication information from the first communicator to the conference management server, the conference management server being connected to an external network different from a local area network including the subnet to which the authentication server is connected.
9. The storage medium according to claim 6, wherein the program further comprises a fourth transmitting instruction of, when the address information of the terminal apparatus is included in the particular range, transmitting access information from the first communicator to the conference management server, the access information indicating that the address information of the terminal apparatus is included in the particular range.
10. A non-transitory computer-readable storage medium storing a program executable by a computer configured to control a conference management server included in a teleconference system in which a teleconference is conducted through a network, the program comprising:
an authenticating instruction of:
when second authentication information corresponding to a conference participant is acquired from a security server through a second communicator of the conference management server, authenticating connection to a conference server based on authentication information stored in a management portion of the conference management server and on the second authentication information, the security server being configured to communicate with a terminal apparatus operated by the conference participant, the conference server being configured to control the teleconference; and
when third authentication information is acquired from the security server through the second communicator, authenticating connection to the conference server based on authentication information stored in the management portion and on the third authentication information, the third authentication information corresponding to first authentication information that is managed by an authentication server configured to authenticate usage of a function through a network of which address information is included in a particular range; and
a fifth transmitting instruction of transmitting an authentication result by the authenticating instruction from the second communicator to the security server.
11. The storage medium according to claim 10, wherein the program further comprises a sixth transmitting instruction of:
in response to acquiring access information through the second communicator from the security server, transmitting usage permission of a particular conference function from the second communicator to the security server, the access information indicating that the address information of the terminal apparatus is included in the particular range, the particular conference function being used by a teleconference controlled by the conference server, the usage permission of the particular conference function being given to the terminal apparatus of which the address information is included in the particular range; and
in response to not acquiring the access information through the second communicator from the security server, not transmitting the usage permission of the particular conference function.
12. The storage medium according to claim 10, wherein the program further comprises:
an identifying instruction of identifying a type of acquired authentication information and determining whether the acquired authentication information is the second authentication information or the third authentication information; and
an accessing instruction of:
when the acquired authentication information is the third authentication information, accessing a first database storing usage function information indicative of usage permission of a particular conference function that is given to the terminal apparatus of which the address information is included in the particular range; and
when the acquired authentication information is the second authentication information, accessing a second database storing usage function information indicative of limited permission of a conference function excluding the particular conference function.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.
1. A motor vehicle that is mandated by law or regulation to stop at a railroad crossing before proceeding across the crossing, the vehicle comprising:
a body having an interior with a driver’s seat at a front of the body on one side and an entrance and exit door on the other side opposite the driver’s seat;
a power actuator for opening and closing the door;
lamps on the exterior of the body that are visible to other vehicles in the vicinity of the vehicle;
one or more accessories that generate sound that can be heard by a driver in the seat;
an electrical system comprising an electrical system controller (ESC) that processes data from various sources to provide control data for performing certain control functions incidental to operation of the vehicle;
a devoted switch accessible to a driver in the seat for signaling the ESC to initiate a sequence of operations when actuated by a driver upon the vehicle approaching a railroad crossing;
virtual controllers in the ESC that control the power actuator for the door, the lamps, and the one or more accessories, and that are responsive to actuation of the devoted switch by a driver a) to begin flashing the lamps, b) to mute the sound from the accessories, c) upon the ESC’s receipt of data indicating that the vehicle has stopped, to operate the power actuator to open the door, d) upon subsequent receipt of data disclosing that the vehicle has begun to move forward, operating the power actuator to close the door, e) unmuting the muted accessories, and f) ceasing flashing the lamps.
2. A motor vehicle as set forth in claim 1 in which the one or more accessories comprises a speaker of an audio system.
3. A motor vehicle as set forth in claim 1 in which the one or more accessories comprises a motorized blower of an air circulation system.
4. A motor vehicle as set forth in claim 1 in which the data disclosing that the vehicle has begun to move comprises vehicle speed data defining a selected speed.
5. A motor vehicle as set forth in claim 1 in which the data disclosing that the vehicle has begun to move comprises vehicle travel data disclosing a selected distance that the vehicle has traveled after the stop.
6. A motor vehicle as set forth in claim 1 including an additional input device for the ESC that is disposed for operation by a driver to extend the selected distance for allowing the vehicle to cross a longer crossing than a cross contemplated by the selected distance.
7. A method for performing a sequence of certain functions in a motor vehicle that is mandated by law or regulation to stop at a railroad crossing before proceeding across the crossing and that comprises a body having an interior driver’s seat that is disposed at the front of the body to one side and an entrance and exit door on the other side opposite the driver’s seat, a power actuator for opening and closing the door, lamps on the exterior of the body that are visible to other vehicles in the vicinity of the vehicle, one or more accessories that generate sound that can be heard by a driver, and an electrical system comprising an electrical system controller (ESC) that processes data from various sources to provide control data for performing certain control functions incidental to operation of the vehicle;
the method comprising:
providing a devoted switch for actuation by a driver occupying the seat upon the vehicle approaching a railroad crossing to signal the ESC to initiate a sequence of operations;
causing the ESC to respond to actuation of the devoted switch by causing a) the lamps to begin flashing, b) sound from the accessories to be muted, c) upon the ESC’s receipt of data indicating that the vehicle has stopped, the power actuator to open the door, d) upon subsequent receipt of data disclosing that the vehicle has begun to move forward, the power actuator to close the door, e) the muted accessories to be unmuted, and f) flashing the lamps to cease.
8. A method as set forth in claim 7 in which the one or more accessories comprises a speaker of an audio system.
9. A method as set forth in claim 7 in which the one or more accessories comprises a motorized blower of an air circulation system.
10. A method as set forth in claim 7 in which the data disclosing that the vehicle has begun to move comprises vehicle speed data defining a selected speed.
11. A method as set forth in claim 1 in which the data disclosing that the vehicle has begun to move comprises vehicle travel data disclosing a selected distance that the vehicle has traveled after the stop.
12. A method as set forth in claim 7 including providing an additional input device for the ESC that is disposed for operation by a driver and using the additional input device to extend the selected distance for allowing the vehicle to cross a longer crossing than a crossing contemplated by the selected distance.
13. A method as set forth in claim 8 including playing a prerecorded announcement over the speaker upon actuation of the devoted switch to request passengers to be quiet so that the driver can listen for a train.