摘要:
Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.
摘要:
A process for establishing secure mutual trust includes generating a one-time-password. The one-time-password is transferred between the devices in a communication occurring off of the network. Each device generates a set of authenticators by hashing a plurality of sub-strings of the password and the device's authentication certificate with a respective set of nonces. The devices exchange the respective sets of authenticators. Each device then alternates revealing its respective set of nonces and its authentication certificate in a multi-stage process. The devices re-calculate the authenticators based upon the respective set of nonces and authentication certificate revealed by the other device along with the one-time-password sub-strings that it posses. If each device determines that the authenticators re-calculated by the given device matches the authenticators previously received from the other device, secure mutual trust is established.
摘要:
Described herein are techniques to facilitate the improvement of network throughput. An implementation described herein measures throughput over a data-communications network and between at least two endpoints on the network. This implementation also displays a graphical representation depicting the present throughput of the network as it is measured. The graphical representation has an identified target throughput threshold, and that threshold is indicative of an acceptable level of throughput for the usage being targeted, such as high-quality video streaming.
摘要:
Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.
摘要:
A method and system for generating a user interface for controlling software components through a user control point device. The user interface system provides multiple software components that each can provide a user interface component. Each user interface component provides a user interface for the corresponding software component. A user control point component requests each software component to provide its user interface component. The user control point component then displays an indication of each software component. In response to the selection of a software component, the user control point component requests the user interface component for that software component to display its user interface through the control point device. When a user interacts with that user interface, the user interface component notifies the corresponding software component of the interaction.
摘要:
A method and system for generating a user interface for controlling software components through a user control point device. The user interface system provides multiple software components that each can provide a user interface component. Each user interface component provides a user interface for the corresponding software component. A user control point component requests each software component to provide its user interface component. The user control point component then displays an indication of each software component. In response to the selection of a software component, the user control point component requests the user interface component for that software component to display its user interface through the control point device. When a user interacts with that user interface, the user interface component notifies the corresponding software component of the interaction.
摘要:
A method and system for controlling environmental conditions, such as lighting. The lighting system provides an architecture that includes a scene description data structure. A scene defines one or more circuits and a target state for the lights on those circuits. The scene description data structure specifies circuits within a scene and specifies a target state for the lights on those circuits within a scene. The lighting system provides a lighting gateway that retrieves and provides scene descriptions to assist in generating a user interface for enabling scenes, and that receives requests to enable scenes and then requests a lighting controller to enable the target state for each circuit within the scene. Each space (e.g., area or room) within the environment has a lighting component that provides a standard programmatic interface to the control the lights from a space. The lighting component retrieves scene descriptions from the lighting gateway and receives requests from a user control point device to enable a scene and then forwards the requests to the lighting gateway.
摘要:
Systems and methods for enabling secure dynamic credential distribution to a machine over a network are provided. In various embodiments, a computer, into which logging or access is sought, distributes logon credentials automatically to a requestor over the network before logon. Based on pre-existing trust, the computer self-generates and self-distributes logon credentials to the requestor, whereby the logon credentials are not stored on the requestor device.
摘要:
Providing presence tracking of nodes of a logical network in a distributed computing system. Each node in a logical network tracks the presence of all other nodes on the network. This presence information is used by the protocol to optimize bandwidth utilization of the shared physical media, by not attempting to communicate with a device that does not appear to be or is unlikely to be present. In one embodiment, the presence tracking is applied to a power line carrier (PLC) physical media because of PLC's low-bandwidth characteristics, low baud rate characteristics and the widespread usage of plugged-in devices, the presence of which on the network is generally more transient by nature.
摘要:
Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.