. . "Any known verification protocol can be used for this purpose, including simple comparison of a secret user password with a stored list, encrypted handshaking protocols of the type commonly used in cellular telephone systems and described in Canadian patent 1242501, public key protocols and the like. [0033]FIG. 5A is a flowchart illustrating steps employed in authorizing remote scheduling operation" . .