摘要:
A multi-use adapter configured to provide network connectivity for a serial bus client is provided. The adapter includes: a serial interface for coupling with the serial bus client; a network interface for interfacing the adapter with a network; and host control logic configured to interface a plurality of types of serial bus clients with a utilizing device over the network. The host control logic may be configured to detect a USB client coupled to the USB interface, to determine a corresponding driver for the detected USB client, and to retrieve the corresponding driver via the network interface.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
In one embodiment, an audio recorder is disclosed that interfaces with an automobile radio. The audio recorder includes a radio tuner that receives radio frequency signals and converts the signals to audio output and an audio comparator that compares audio output from the radio tuner with audio output of the automobile radio and tunes the radio tuner until the audio output of the audio tuner is synchronized with the audio output of the automobile radio. An audio storage device is activatable to record the audio output of the radio tuner for later playback.
摘要:
A network device and a method of configuring a network device are provided. The method includes: receiving an e-mail message at the network device; parsing the e-mail message to retrieve configuration instructions; and executing a configuration action according to the configuration instructions contained in the e-mail message. The network device includes: a first upstream network interface; control logic configured to: receive an e-mail message; parse the e-mail message to retrieve configuration instructions; and execute a configuration action according to the configuration instructions contained in the e-mail message.
摘要:
A method and system facilitates enhanced communication between a LAN and a WAN by determining which IP device of the LAN is a gateway and then restricting communication between the LAN and the WAN such that the communication is routed through the gateway. Determining which IP device of the LAN is a gateway can comprise using DHCP protocol to implement a provisioning and setup flow between a WAN bridge and gateway. By restricting communication between the LAN and the WAN such that it is routed through the gateway, features of the gateway such as a firewall and/or parental controls, can be advantageously utilized.
摘要:
Systems and techniques for detecting rogue access points. A wireless signal may be received from a wireless device. The wireless device may be determined to be a candidate device based on network identification information. Additional information associated with the wireless device may be acquired, and the wireless device may be determined to be a rogue device based on the additional information. Notification information indicative of the determination may be transmitted.
摘要:
Methods and systems for deterring spam on a communication medium are disclosed. Call traffic on the communication medium includes IP telephone calls, IM™ messages and other IP calls. The method includes detecting a call with a user device for accessing the communication medium, such as an IP telephone, a computer, etc. A signaling message associated with the call is accessed and compared with information relating to identities that correspond to originators of spam calls sent over said communication medium, which is stored in a repository associated with the communication medium, such as a dynamically updatable database. Where no match is found between the signaling message and the stored spam call identity information, the call is routed to the user. Where the signaling message matches any said spam call originator identity information however, the call is deterred from being routed to the user.
摘要:
A method and system for remotely managing a bridge device, such as a modem, are disclosed. Management traffic from a service provider can be communicated to a bridge device which lacks a public IP address by sending the management traffic through the bridge device to a router of a LAN. The router then sends the management traffic back to the bridge device. Thus, the service provider can perform management tasks such as troubleshooting, health monitoring, accounting, provisioning, security and firmware upgrades in a manner that is transparent to the user.
摘要:
A gateway device is provided, wherein the device is configured to initiate communication with a client device to notify the client device of detected network events and to query the user for action. A method of managing a gateway device is provided. The method includes: detecting an unauthorized network event, transmitting from the gateway device to a client device over a local area network (LAN) a message indicating the detection of the unauthorized or unexpected network event and requesting a response from a user of the client device, receiving the response from the client device, and handling the unauthorized or unexpected network event pursuant to the response from the client device.
摘要:
Systems and methods are provided for initiating functions on a network connectivity device, such as a router. A keypad sequence is input into the control device using a limited keypad. A command is transmitted to the router, and the router performs a function in response to the command. Accordingly, telephone handsets may be utilized to generate control commands to a router.