摘要:
A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer-2 query frame to the plurality of stations. A service provider station may generate a layer-2 service frame in response to receiving the layer-2 query frame. The service consumer station may discover the service provider station and the services offered by the service provider station based on the layer-2 service frame. Also, the service consumer may discover the service provider station using layer-2 query frame and may discover the services offered by the service provider station using higher layer service discovery procedure.
摘要:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
摘要:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
摘要:
Resource authorization includes receiving a resource request from a first requester. The resource request includes credentials and identifies an operation to be performed with respect to a resource. The resource request is mapped to a resource identifier, and the resource data structure is searched for a resource node based on the resource identifier. A determination is made whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization level associated with the resource node.
摘要:
A rule processing system is implemented that allows for the integration of external applications into a common operational framework. External applications are permitted to define nodes in the rule processing system, and users are permitted construct rules in a rule graph using the defined nodes via a browser interface. Rules may be constructed in a hierarchical format, such that the rules are traversed by a rule engine an executed in a structured manner. Integration between external applications and the rule processing system may be via object oriented software techniques, such as the Component Object Model for object interfacing.
摘要:
An event notification service in a Component Object Model (COM) system employs a server called an event provider service that operates as a separate layer between an event source and a client called an event subscriber. The notification service also includes event filtering so that an event subscriber only receives events that meet the conditions set by an event filter. A persistent notifier moniker allows an event subscriber client to receive events even if the client is not currently active because the moniker activates the client executing upon receipt of an event.
摘要:
Coordination of the display of an incoming signal stream (such as broadcast TV content or streaming web content) on a display with web browsing. The method includes storing a uniform resource locator (URL) associated with the incoming signal stream being displayed, receiving a first signal to display web content associated with the URL, pausing display of the incoming signal stream while storing the incoming signal stream on a storage device, and obtaining and displaying the web content associated with the URL. The method further includes receiving a second signal to resume display of the incoming signal stream, removing the web content from the display, and resuming display of the incoming signal stream at the point that the pause occurred by obtaining the incoming signal stream from the storage device.
摘要:
A computer system with unattended on-demand availability includes power-saving features which place the system into a Standby mode whenever the system is idle or is not being used. Prior to entering Standby mode, the system sets a hardware timer which indicates when the next scheduled event in the system should be performed. When either the timer expires or another event occurs which requires system operation, the system resumes to the On power state without user intervention. In one embodiment, the system of the present invention allows applications to periodically save their operational states. By saving their operational states, applications are able to guard against power failures and crashes. If a power failure or crash occurs, the system consults restart policies and, if appropriate, automatically re-starts applications to their most recently saved operational states once power is re-stored.