摘要:
Methods and apparatus to limit access to a secure personal network are provided. The method includes receiving an Internet protocol (IP) packet of a device including a confirmation value associated with the SPN. The method compares the confirmation value to a predetermined confirmation value and allows access to the SPN when the confirmation value matches the predetermined confirmation value. The IP packet is dropped otherwise. The confirmation value and the predetermined confirmation value are generated by an algorithm including a pseudorandom number generator, a hash function and a one-time password.
摘要:
Methods and apparatus for handing off an end-point associated with a first device to a second device within a locally accessible network operating in an Internet protocol (IP) environment that supports multiple addresses for each device are provided. The first device is in a currently established session with a third device within the IP environment. End-point information associated with the end-point of the first device is locally transferred to the second device. A further end-point, compatible with the currently established session, is configured by the second device using the transferred end-point information. The second device broadcasts an announcement to the locally accessible network, including the router, that the second device is associated with the further end-point.
摘要:
A service advertisement delivery system and method is useful in a data processing network. A broadcasting node receives service advertisements describing services offered by service providing network nodes. A datastore in communication with the broadcasting node stores a set of the service advertisements of the service providing network nodes. The broadcasting node broadcasts the set of service advertisements over a broadcast channel to service seeking network nodes receiving the advertisements over the broadcast channel.
摘要:
Disclosed is a multiple-stage puzzle-solving game device comprising a plurality of puzzles imprinted thereon, a plurality of dials, each of which comprising a plurality of indicia imprinted thereon, each indicium representing a probable segment of a solution to a puzzle, and an unsealable sealed reward container comprising a game reward disposed therewithin, and a plurality of dial receptacles disposed on the exterior thereof, each dial receptacle adapted to receive a dial that is pre-assigned thereto. In order to win the game reward, the dials must be rotated to indicate the correct sequential combination of solutions to all puzzles, one puzzle at a time, at which point, reward container is unsealed thereby providing access to the game reward.
摘要:
Disclosed is a multiple-stage puzzle-solving game device comprising a plurality of puzzles imprinted thereon, a plurality of dials, each of which comprising a plurality of indicia imprinted thereon, each indicium representing a probable segment of a solution to a puzzle, and an unsealable sealed reward container comprising a game reward disposed therewithin, and a plurality of dial receptacles disposed on the exterior thereof, each dial receptacle adapted to receive a dial that is pre-assigned thereto. In order to win the game reward, the dials must be rotated to indicate the correct sequential combination of solutions to all puzzles, one puzzle at a time, at which point, reward container is unsealed thereby providing access to the game reward.
摘要:
A method for securely connecting a software defined radio (SDR) (110) to a server (140) through a network is presented. A request to download a radio configuration (R-CFG) file is sent from the SDR device to the server. A determination is made that the R-CFG file is configured to control a plurality of radio frequency parameters for the SDR device solely within levels permitted by a regulatory agency. The R-CFG is then downloaded to the SDR device.
摘要:
A system for key management and securing communications channels is presented for the upgrade of compact electronic devices via a communications channel by service providers such as the original manufacturer and, possibly, a number of authorized third party service providers. The manufacturer, acting as a trusted authority, generates and distributes private cryptographic keys to each one of the clients and authorized service providers. The trusted authority also makes available public key values that may be used to secure communications between service providers and clients. The trusted authority may add additional authorized service providers and may also revoke the authorization of compromised service providers, thereby preventing communications between clients and said compromised service providers. Accordingly, authorized service providers, in addition to the manufacturer, may provide program and security upgrades, messages, and generally any data to electronic devices via a secure communications link.
摘要:
This invention discloses improvements to a damper of the type used in industrial applications to open and close ducts carrying noxious or corrosive materials, such as combustion by-products. The improvements include a liner rack and wheeled pinion system to raise and lower a damper blade plate and improvements to the seal cartridge to prolong the life of the seal membrane and to prevent galling between the blade plate and the seal cartridge or damper frame.
摘要:
A system includes long-term storage (e.g., flash memory) for storing sensitive data and critical components of a consumer electronic (CE) device such as an operating system (OS) kernel, private cryptographic key values, security applications, and firmware configurations, for example. Security hardware/software designates and restricts access to secured portions of long-term storage that contain the critical components. Requests for access to these secured portions are addressed by the security hardware/software, which authenticates a cryptographic authorization code received with the request. Read-write access to the secured portions is allowed for download and installation of, for example, a software or firmware upgrade if the cryptographic authorization code is authenticated.
摘要:
A method of providing web content for a printing device includes attaching a memory module storing the web content to a printing device consumable.