摘要:
A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer-2 query frame to the plurality of stations. A service provider station may generate a layer-2 service frame in response to receiving the layer-2 query frame. The service consumer station may discover the service provider station and the services offered by the service provider station based on the layer-2 service frame. Also, the service consumer may discover the service provider station using layer-2 query frame and may discover the services offered by the service provider station using higher layer service discovery procedure.
摘要:
A processor integrating and controlling at least two A/V devices by constructing a control model, referred to as a filter graph, of the at least two A/V devices as a function of a physical connection topology of the at least two A/V devices and a desired content to be rendered by one of the at least two A/V devices. The filter graph may be constructed as a function of at least two device filters corresponding to the at least two A/V devices, in which the device filters include certain characteristics of the at least two A/V device. These characteristics may include the input or output pins for each device, the media type that the A/V device may process, the type of functions that the device may serve, etc. The desired content may be received as a user input which is entered via a keyboard, mouse or other comparable input devices. In addition, the user input may be entered as a voice command, which may be parsed by the processor using conventional speech recognition algorithms or natural language processing to extract the necessary information. Once the filter graph is constructed, the processor may control the at least two A/V devices via the filter graph by invoking predetermined operations on the filter graph resulting in the appropriate commands being sent to the at least two A/V devices, thereby results in the rendering of the desired content.
摘要:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
摘要:
Systems, methods, and apparatuses are directed to conducting online transactions by virtue of a near field communication (NFC) reading mechanism configured to contactlessly read NFC-compliant provisioning information including a monetary value. Moreover, logic is configured to initiate establishment of a communication link, automatically send a request message to confirm the read provisioning information via the communication link, store at least a portion of the provisioning information in a secure memory unit, and based on the confirmation of the provisioning information, automatically present on a display unit, the monetary value, selectable transaction options, and an online information resource link to accommodate execution of a selected transaction option.
摘要:
An apparatus, system, and method to identify a region of an image including a barcode based on, at least in part, an entity specific feature associated with the barcode; detect a codeword boundary for the barcode based on, at least in part, an adaptive boundary determination mechanism; and decode the codeword based on, at least in part, a plurality of metrics associated with the entity.
摘要:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
摘要:
Extending driver objects, such as device driver objects. In one embodiment, a system including a driver object, an auto-aggregator object, and a driver extension object. The driver object has a set of at least one standard interface. The auto-aggregator object is aggregated to the driver object by a blind aggregation mechanism. The driver extension object is aggregated to the driver object by an auto-aggregation mechanism invoked by the auto-aggregator object to provide a custom interface for the driver object. In another embodiment, an aggregation map is used to map the driver object to the driver extension object.
摘要:
Embodiments are directed to enrollment of an endpoint device in a secure domain. An enrollment request is sent to a delegated registrar (DR) device to initiate a trust-establishment procedure with the DR device to establish initial connectivity and an initial symmetric key to be shared between the DR and the endpoint device. The DR device provides to the endpoint device limited-use credentials for group-access key establishment, and group connectivity parameters for accessing a group administrator (GA) device. The endpoint device and the GA device perform a group-enrollment procedure in which the endpoint device provides the limited-use credentials to the GA device and receives, from the GA device, the group-access key.
摘要:
Techniques for monitoring information technology (IT) assets using mobile devices are described herein. The mobile device is configured to wirelessly communicate with the IT asset using a near field communications (NFC) standard used to communicate over short distances. The IT asset is configured to include a monitoring device that is operable in a low power mode as well as in a normal power mode to monitor security related parameters. An alarm is generated in response to detecting a breach in security of the IT asset and the mobile device is notified of the alarm. A user may use the mobile device to send an encrypted message to the IT asset and instruct it to operate in a lockout mode, thereby protecting the digital assets accessible via the IT asset from unauthorized use.
摘要:
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements.