摘要:
A network device determines the traffic specification values based on the session values that represent the application parameters of an application, which is provided differentiated service levels. A user of the network device may provide and/or choose the session values. The network device may generate one or more streams corresponding to a plurality of the applications. Each stream may comprise one or more traffic instances. The network device may assign a priority value to each stream and instance identifier to each traffic instances within the stream to manage the transfer of data units.
摘要:
A network device determines the traffic specification values based on the session values that represent the application parameters of an application, which is provided differentiated service levels. A user of the network device may provide and/or choose the session values. The network device may generate one or more streams corresponding to a plurality of the applications. Each stream may comprise one or more traffic instances. The network device may assign a priority value to each stream and instance identifier to each traffic instances within the stream to manage the transfer of data units.
摘要:
A sub-system may maintain the network connectivity of the device, while the device is operating in low power. The sub-system may determine whether a pre-specified pattern is present in the incoming packet. The sub-system may send network messages such as keep-alive or time-out messages on behalf of the device if a first pattern is detected in the incoming packet. A first action associated with the first pattern may indicate that a network message is to be sent to another device. The sub-system may send a wake-up signal to the device if a second pattern is detected in the incoming packet. A second action associated with the second pattern may indicate that a wake-up signal is to be sent to the device.
摘要:
A sub-system may maintain the network connectivity of the device, while the device is operating in low power. The sub-system may determine whether a pre-specified pattern is present in the incoming packet. The sub-system may send network messages such as keep-alive or time-out messages on behalf of the device if a first pattern is detected in the incoming packet. A first action associated with the first pattern may indicate that a network message is to be sent to another device. The sub-system may send a wake-up signal to the device if a second pattern is detected in the incoming packet. A second action associated with the second pattern may indicate that a wake-up signal is to be sent to the device.
摘要:
Methods and devices for NFC-tap file encryption, decryption and access via Near Field Communication (NFC) are disclosed. A user can select an unencrypted file stored in a computing device for encryption. Upon encryption, the file name of the selected file and the encryption key used to encrypt the selected file are transmitted to an NFC-enabled wireless device for storage. The user can select an encrypted file stored in the computing device for access. As the user taps the computing device with the wireless device, the file name of the selected file is transmitted to the wireless device, which in turn transmits a decryption key for decrypting the selected file to the computing device. The computing device decrypts the selected file with the decryption key. The user can now access the decrypted file.
摘要:
Methods and devices for NFC tap login with automatically-generated login information are disclosed. A user can launch a browser application and log in a desired website without having to enter the user's username and password. The user can achieve this by tapping a Near Field Communication-enabled computing device with an NFC-enabled wireless device. The wireless device generates and stores the user's usernames and passwords corresponding to a number of websites, and provides the username and password for the desired website to the computing device via an NFC-based communication link. Through a browser application running on the computing device, the user can sign up an account at and log in the desired website.
摘要:
Methods and devices for NFC-tap file encryption, decryption and access via Near Field Communication (NFC) are disclosed. A user can select an unencrypted file stored in a computing device for encryption. Upon encryption, the file name of the selected file and the encryption key used to encrypt the selected file are transmitted to an NFC-enabled wireless device for storage. The user can select an encrypted file stored in the computing device for access. As the user taps the computing device with the wireless device, the file name of the selected file is transmitted to the wireless device, which in turn transmits a decryption key for decrypting the selected file to the computing device. The computing device decrypts the selected file with the decryption key. The user can now access the decrypted file.
摘要:
Apparatus and methods associated with providing secure credential management are described. One apparatus embodiment includes a data store to store authentication data and an authentication supplicant (AS) logic to provide a response to an authentication communication (ACM) received from an authentication process. An authentication management (AM) logic may receive the ACM from a connection management (CM) logic associated with a host operating system (HOS), provide the ACM to the AS logic, and provide the response back to the CM logic. The apparatus may include a device management (DM) client logic to provide a secure connection to an operator DM server associated with the authentication process and to store authentication data provided by the operator DM server in the data store. The AS logic, AM logic, and DM logic may reside in firmware that is not accessible to the HOS.
摘要:
Illustrative embodiments of systems and methods providing remote management over a wireless wide-area network (WWAN) using short messages are disclosed. In one embodiment, a computing device may include an in-band processor, a wireless transceiver configured for communications over a WWAN, and an out-of-band (OOB) processor capable of communicating over the WWAN using the wireless transceiver irrespective of an operational state of the in-band processor. The OOB processor may be configured to receive a short message via the wireless transceiver, determine whether the short message originated from a trusted remote computing device, and execute at least one operation indicated by the short message in response to determining that the short message originated from a trusted remote computing device.
摘要:
A method and device for remote management over a wireless wide-area network includes receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message.