Abstract:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
Abstract:
Systems and methods directed to URI-based host to mobile device setup and pairing are described herein. A uniform resource identifier (URI) may be received from a host device. A request for an application associated with the host device and the wireless device may be transmitted based at least in part on the URI. The requested application may be received. An association with the host device may be established based at least in part on the application.
Abstract:
Systems and methods directed to URI-based host to mobile device setup and pairing are described herein. A uniform resource identifier (URI) may be received from a host device. A request for an application associated with the host device and the wireless device may be transmitted based at least in part on the URI. The requested application may be received. An association with the host device may be established based at least in part on the application.
Abstract:
A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated with a vehicle; configuring a bus controller to verify authenticity of the message filtering rule, wherein the bus controller is programmed through an interface, the interface inaccessible from the host processor; filtering messages from the host processor using the verified message filtering rule, wherein the filtering is performed by the bus controller; and transmitting the filtered messages from the bus controller over a bus to one or more electronic control units (ECUs), the ECUs communicatively coupled to the bus.
Abstract:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
Abstract:
Technologies for transferring Near Field Communications information on a computing device include storing information corresponding to services in a database on the computing device, receiving a voice input corresponding to a name of a requested service, and retrieving the information corresponding to the requested service from the database. Such technologies may also include loading the retrieved information corresponding to the requested service into a Near Field Communications tag emulated by the computing device and transferring the retrieved information to a portable computing device in response to the Near Field Communications tag being touched by a Near Field Communications reader of the portable computing device. The information corresponding to the requested service stored in the database, retrieved from the database, loaded into the Near Field Communications tag, and/or transferred to the portable computing device may include a Universal Resource Identifier and content-specific keywords corresponding to the requested service.
Abstract:
Embodiments are directed to enrollment of an endpoint device in a secure domain. An enrollment request is sent to a delegated registrar (DR) device to initiate a trust-establishment procedure with the DR device to establish initial connectivity and an initial symmetric key to be shared between the DR and the endpoint device. The DR device provides to the endpoint device limited-use credentials for group-access key establishment, and group connectivity parameters for accessing a group administrator (GA) device. The endpoint device and the GA device perform a group-enrollment procedure in which the endpoint device provides the limited-use credentials to the GA device and receives, from the GA device, the group-access key.
Abstract:
In one example, a system for recognizing an object includes a processor to select from a plurality of image frames an image frame in which a view of the object is not blocked, and to estimate a location of the object in the selected image frame.
Abstract:
In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method.
Abstract:
A wireless flash drive may use a Near Field Communication (NFC) radio link with a second device to establish a second, non-NFC, radio link with the second device, and then use the non-NFC link to wirelessly transfer data between the second device and the non-volatile memory in the flash drive. Some embodiments may also have other features, such as a switch to activate the non-NFC link without using the NFC link, a battery to power the non-NFC radio and the non-volatile memory, inductive charging circuitry to wirelessly recharge the battery, or instructions to be uploaded to the second device for use in establishing the non-NFC link.