Abstract:
An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.
Abstract:
A system for sharing collective information is provided. The system includes a profile component that receives information regarding a user's profile. A detection component determines profiles of other users related to the user's profile and a content component relays data associated with the other users in view of the user's profile.
Abstract:
An exemplary flexible network simulator and related methods test the ability of electronic devices to communicate with each other on a network, especially in real-time. The flexible network simulator can establish different connectivity protocols between multiple electronic devices and test the electronic devices using customized sets of network conditions.
Abstract:
An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.
Abstract:
A network test system utilizes known good responses when testing responses from in-test servers. In one embodiment, the test system includes a verification server that is known to provide correct responses. In-test servers are subjected to very high rates of requests, and the responses are compared to responses from the verification server. Hash values are optionally used to represent the correct responses, and are compared to similar hash values produced from the actual responses of the in-test servers. Dynamic data is accommodated by basing the hash values on only the static portions of responses. Alternatively, dynamic data is accommodated by using search patterns—when receiving an actual response from an in-test server, the response is searched for the specified search pattern. The response is deemed to be incorrect if the search pattern does not occur. Wildcards and other variable elements are used in the search patterns.
Abstract:
Methods and apparatus for synchronizing access control in a web server are described. A plurality of security scenarios are defined, each of which has one or more security settings associated therewith. The security settings are those that are associated with a plurality of access control mechanisms that control access to a web server or to resources that are used by the web server. One or more of the security settings for one or more of the access control mechanisms are set when a security scenario is selected. Thus, the security settings for a number of different access control mechanisms can be set contemporaneously by selecting one security scenario.