Abstract:
Particular embodiments of a gateway computing device may provide a provisioning service for access credentials for a restricted network. The gateway computing device may receive, from a client device, a request for the access credentials, wherein the request was sent over an open network using a restricted-packet-size protocol designed to limit power usage by devices sending messages using the protocol. The gateway computing device may segment data comprising the access credentials into a plurality of packets, wherein the plurality of packets conform to the restricted-packet-size protocol. Finally, the gateway computing device may send, over the open network to the client device, the segmented data using the restricted-packet-size protocol.
Abstract:
Particular embodiments of a gateway computing device provide a provisioning service for access credentials to a restricted network, wherein the provisioning service is accessible by an open network. A messaging protocol for the open network may only recognize messages relating to one of a set of services provided by the gateway computing device, including the provisioning service. The gateway computing device may receive, from a client device, a request to connect to the restricted network, wherein the request was sent using the open network. Upon determining whether the client device is authorized to access the restricted network, the gateway computing device may send a response to the client device using the open network.
Abstract:
In one embodiment, a method includes receiving information from a network-enabled device, the network-enabled device being associated with a first user of a social-networking system. The information indicates that the physical presence of an item has been detected by one or more sensors of the network-enabled device. The method further includes identifying the item based on the received information and providing information about the identified item to one or more second users of the social-networking system.
Abstract:
In one embodiment, a method includes receiving a natural-language message including an authorization request to authorize a first user access to one or more of a number of connected devices associated with a second user; parsing the natural-language message; identifying, based on the parsed natural-language message, the first user and one or more of a number of connected devices; implicitly determining that the first user is authorized to access the identified one or more of the number of connected devices based on a calculated strength of a relationship between a node representing the first user in a social graph and a node representing the second user in the social graph satisfying a pre-determined threshold; and providing, based on the implicit authorization, access to the identified one or more of the number of connected devices.
Abstract:
In one embodiment, a method includes receiving information from a network-enabled device, the network-enabled device being associated with a first user of a social-networking system. The information indicates that the physical presence of an item has been detected by one or more sensors of the network-enabled device. The method further includes identifying the item based on the received information and providing information about the identified item to one or more second users of the social-networking system.
Abstract:
In one embodiment, a method includes receiving, from a device via a wireless signal, a request to access a WLAN of a router, the request including a device identifier. The provisioning agent may be within wireless ranges of the device and of the router. The provisioning agent may request, from an authentication server, a password for the device. The password may be uniquely generated by the authentication server for the device. The provisioning agent may receive the password from the authentication server. The provisioning agent may send, to the router, the password and the device identifier. The provisioning agent may receive, from the router, an indication that the router has verified the password with the authentication server. The router may store the device identifier in association with the password. The provisioning agent may send, to the device, the password. The password may authenticate the device to the router.
Abstract:
Techniques for multi-protocol peer-to-peer connection are described. An apparatus may comprise a discovery component to discover a remote device using a first protocol, and receive discovery information from the remote device, the discovery information including protocol information. The apparatus may comprise an authentication component to authenticate the remote device. The apparatus may comprise a connection component to establish a peer-to-peer connection with the remote device using a second protocol based on the protocol information. Other embodiments are described and claimed.
Abstract:
A first electronic device stores in its memory one or more installation files for a first version of an application. A local connection is established between the first electronic device and a second electronic device. The local connection is independent of Internet connectivity. Using the local connection, a determination is made as to whether the first version of the application is installed on the second electronic device. In response to a determination that the first version of the application is not installed on the second electronic device, the first electronic device sends, to the second electronic device through the local connection, the one or more installation files for the first version of the application.
Abstract:
In one embodiment, a method includes, by a first computing device associated with a first user, receiving a connection request from a second computing device associated with a second user. The method also includes confirming that the connection request is associated with the second user and sending to the second computing device an acceptance of the connection request in response to confirming that the connection request is associated with the second user. The method further includes receiving from the second computing device an acknowledgement of the acceptance and, in response to the acknowledgement, allowing information to be exchanged between the first and second computing devices.
Abstract:
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system. The method also includes determining (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, where the authorization is based on social-networking information. The method further includes providing the instructions to the second network-enabled device.