摘要:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.
摘要:
An UNENROLLED adapter responds to an enrollment activation signal by generating an enrollment supplicant signal. The enrollment supplicant signal is received by an ENROLLED adapter, an enrollment provider, which responds by formulating and transmitting an enrollment provider signal, including security management service information, to the UNENROLLED adapter. The UNENROLLED adapter changes a network adapter configuration responsive to the security management service information provided by the ENROLLED adapter, by which the network adapter is configured securely, and secure communications are effectuated. Enrolled adapter can solicit enrollment of an UNENROLLED adapter. The activation signal can be a physical or virtual activation sequence.
摘要:
VoIP verification is initiated by subscriber-side test VoIP appliance, or VoIP proxy agent. Test VoIP appliance is coupled to test node over a communications internetwork by upstream and downstream datapaths. VoIP verification request is transmitted to test node. Responsively, test node transmits VoIP verification signal to test VoIP appliance. Perceivable indication of verification signal received by VoIP appliance is effected by visual display, audible indication, or both. Operational state verifier apparatus is disposed in a digital telephony device, a computer terminal, or with an ATA interface coupled to analog telephony device used in VoIP communications system.
摘要:
Range-confined security management adapter and method simplify security deployment in a network. First RC security information, including nearest- and k-neighbor information, is transmitted between authenticating neighbor and supplicant neighbor using a predetermined transmission adaptation technique. The adapter can evoke a response from the neighbor by adapting the initial transmitted signal power level, and increasing incrementally; the initial transmitted signal bit rate, and decreasing incrementally; or both, in response to second RC security information signal. RC communications are effected at low power, high bit rate, or both, establishing secure configuration, effecting secure communication, and thwarting miscreant intrusion into the network.
摘要:
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling, piggybacked adapter receives network signals and electrical from EPN-connected first adapter through a shared medium port. An authenticating adapter exchanges security management services and information with supplicant adapter. Two or more adapters may be piggybacked. Piggybacked adapters exchange security management service information without rogue intrusion. Exchanged information, stored, is later used to communicate securely. Defined adjacency (neighborhood) information can be exchanged, and a neighborhood established on an EPN, where one authorized neighbors securely communicate.
摘要:
In one embodiment, a method includes an apparatus includes a programmable microprocessor that determines the current security status of a network, generates a signal corresponding to the status, and applies the signal to an indicating device to produce an indication of the security status of the network that is sensible to a user. The indicating device can include an electric light source, such as an LED, or a electro-acoustic transducer, such as a loudspeaker, or both, that produces different colors of light or different sounds or that flashes or sounds intermittently to indicate the current security status of the network, to warn of an unexpected change in the level of security, or to indicate the functionality of other network security measures, such as a firewall or VPN.
摘要:
In one embodiment a method comprises enrolling a mobile device in a local area network by setting a variable to a mobile device identifier and authenticating the mobile device using a network gateway and the mobile device identifier. A request for data is received from the mobile device and the data is delivered from a service provider to the mobile device.
摘要:
A method and system for remotely managing a bridge device, such as a modem, are disclosed. Management traffic from a service provider can be communicated to a bridge device which lacks a public IP address by sending the management traffic through the bridge device to a router of a LAN. The router then sends the management traffic back to the bridge device. Thus, the service provider can perform management tasks such as troubleshooting, health monitoring, accounting, provisioning, security and firmware upgrades in a manner that is transparent to the user.