摘要:
An exemplary method for providing secure access to resources at shared appliances comprises obtaining an instruction from a first user to send a resource to a secure repository, the resource being associated with a first identifier, receiving a second identifier from a shared appliance, determining a pseudo identity associated with the shared appliance based on the second identifier, granting to the shared appliance permissions associated with the pseudo identity, including a permission to retrieve the resource from the secure repository, receiving the first identifier from a second user at the shared appliance, and enabling the shared appliance to provide the resource to the second user at the shared appliance.
摘要:
Communications methods and appliances are described. According to one embodiment, a communications method includes prior to deployment of an appliance, establishing a trusted association between the appliance and a certificate authority, during deployment of the appliance, associating the appliance with a communications address of a communications medium, using the certificate authority, creating a signed certificate including the communications address of the appliance, announcing the signed certificate using the appliance, after the announcing, extracting the communications address of the appliance from the signed certificate, and after the extracting, verifying the communications address of the appliance.
摘要:
A job store for a pull-based presentation output system includes a job storage storing one or more jobs from a plurality of job submission clients; and a driver storage storing one or more drivers for converting a job into a format used by a corresponding presentation output device. The job store receives a job from a job submission client, stores the job in the job storage, receives a pull command from a presentation output device when the presentation output device is one of idle and nearly finished with a current job and without receiving further input from a user of the job submission client, retrieves the job from the job storage, applies a driver for converting that job into a format used by the presentation output device sending the pull command and outputs the job to the presentation output device sending the pull command.
摘要:
A presentation output system includes a digital computer network, one or more job submission clients, and a job store. The job store accepts and holds output jobs from the plurality of job submission clients. The presentation output system further includes one or more presentation output devices that pull the output jobs from the job store for outputting.
摘要:
An exemplary method for providing secure access to resources at shared appliances comprises obtaining an instruction from a first user to send a resource to a secure repository, the resource being associated with a first identifier, receiving a second identifier from a shared appliance, determining a pseudo identity associated with the shared appliance based on the second identifier, granting to the shared appliance permissions associated with the pseudo identity, including a permission to retrieve the resource from the secure repository, receiving the first identifier from a second user at the shared appliance, and enabling the shared appliance to provide the resource to the second user at the shared appliance.
摘要:
An exemplary method for configuring a device to enable it to become a member of an established network comprises reading, using a portable device, a first token of a networked device, obtaining configuration data based on the first token, reading a second token of a non-networked device, establishing a communication session with the non-networked device based on the second token, and providing the configuration data to the non-networked device to enable it to become a member of the same network as the networked device.
摘要:
An accessory device is directly connected in a non-networked manner to an electronic device. The accessory device is to be used by a web application running on a computing device connected to the electronic device over a network. The accessory device has a shared context or an owned context. The shared context specifies that usage of the accessory device is shared among the web application and one or more other web applications. The owned context specifies that the usage of the accessory device is exclusive to the web application and not to any other web application.
摘要:
An exemplary method for configuring a device to enable it to become a member of an established network comprises reading, using a portable device, a first token of a networked device, obtaining configuration data based on the first token, reading a second token of a non-networked device, establishing a communication session with the non-networked device based on the second token, and providing the configuration data to the non-networked device to enable it to become a member of the same network as the networked device.
摘要:
The invention provides a method for a sender to send a message on a tangible medium and ensure that it is privacy protected until verification that the medium has been received by the authorized recipient. The invention provides a method in which a sender creates an encrypted content message that may be decrypted using a content decryption key that is unknown to the authorized recipient. The sender creates an encrypted authentication message that may be decrypted using a recipient's key that is known to the authorized recipient but is unknown to others, except perhaps to the sender. The sender fixes the encrypted content message and the encrypted authentication message onto a tangible medium and then permits the authorized recipient to obtain the tangible medium. The authorized recipient uses the recipient's key to decrypt the encrypted authentication message and then creates a valid reply that is based upon or which uses the decrypted authentication message. The authorized recipient sends the valid reply to the sender and upon verification that the reply is valid the sender allows the authorized recipient to obtain the content decryption key. With the content decryption key, the authorized recipient is able to decrypt the encrypted content message. The invention also includes an article of manufacture for sending an encrypted message from a sender to an authorized recipient using a method, of the invention.
摘要:
A method for displaying a computer system runtime information includes the steps of displaying a plurality of runtime information items in different hyperbolic trees. The method further comprises the steps of navigating and inspecting runtime information within each individual hyperbolic tree, and navigating between semantically linked hyperbolic trees.