Abstract:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
Abstract:
VoIP verification is initiated by subscriber-side test VoIP appliance, or VoIP proxy agent. Test VoIP appliance is coupled to test node over a communications internetwork by upstream and downstream datapaths. VoIP verification request is transmitted to test node. Responsively, test node transmits VoIP verification signal to test VoIP appliance. Perceivable indication of verification signal received by VoIP appliance is effected by visual display, audible indication, or both. Operational state verifier apparatus is disposed in a digital telephony device, a computer terminal, or with an ATA interface coupled to analog telephony device used in VoIP communications system.
Abstract:
A VoIP device has at least one programmable button to enable the user to initiate a VoIP or SIP call to another device. The button can be programmed by the device user, the device manufacturer, and/or a VoIP service provider. The VoIP device does not have a dial pad, visual numbers display, or other certain standard features on a SIP phone. Thus, the VoIP device allows simplified dedicated communication. Numerous uses are possible, which result in advantages over conventional SIP phones.
Abstract:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
Abstract:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
Abstract:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.
Abstract:
Systems and techniques for detecting rogue access points. A wireless signal may be received from a wireless device. The wireless device may be determined to be a candidate device based on network identification information. Additional information associated with the wireless device may be acquired, and the wireless device may be determined to be a rogue device based on the additional information. Notification information indicative of the determination may be transmitted.
Abstract:
Methods and systems for deterring spam on a communication medium are disclosed. Call traffic on the communication medium includes IP telephone calls, IM™ messages and other IP calls. The method includes detecting a call with a user device for accessing the communication medium, such as an IP telephone, a computer, etc. A signaling message associated with the call is accessed and compared with information relating to identities that correspond to originators of spam calls sent over said communication medium, which is stored in a repository associated with the communication medium, such as a dynamically updatable database. Where no match is found between the signaling message and the stored spam call identity information, the call is routed to the user. Where the signaling message matches any said spam call originator identity information however, the call is deterred from being routed to the user.