Abstract:
A computer program configured as a server includes a first interface for communication between the network node and a computer device, a second interface for communication between the network node and the monitoring service, a third interface for communication between the network node and the home gateway, and a database to store configuration data of the home gateway. The server includes logic to maintain the configuration data in the database via communications using the third interface which include messages identifying sensing devices connected to the home gateway. The server includes logic to receive an activation request from the computing device via the first interface, and in response to the activation request, execute a protocol via the second interface to create a user record using the configuration data. The server includes logic to verify a connection between the home gateway and the user record via the third interface.
Abstract:
A computer system automatically generates service documentation based on usage of a web service. The computer system captures network traffic including actual requests to a service endpoint of the web service and actual responses from the service endpoint of the web service. The captured network traffic can be analyzed using machine learning to determine one or more operations that are available at the service endpoint, input arguments that are accepted by the service endpoint, and output arguments that are provided by the service endpoint. The computer system can automatically generate service documentation for the web service based on metadata that identifies the operations, the input arguments, and the output arguments.
Abstract:
Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credential for Wi-Fi hotspots using SOAP-XML techniques are generally described herein. Techniques for subscription remediation using SOAP-XML techniques are also generally described herein. In some embodiments, the mobile device may be configured to establish a transport-layer security (TLS) session with a sign-up server through a Wi-Fi Hotspot to receive a certificate of the sign-up server. When the certificate is validated, the mobile device may be configured to exchange device management messages with the sign-up server to sign-up for a Wi-Fi subscription and provisioning of credentials, and retrieve a subscription management object (MO) that includes a reference to the provisioned credentials for storage in a device management tree.
Abstract:
A network controller in a communication device may be operable to route local host-management traffic between a local host and a management controller within the communication device, wherein the local host may be operable to utilize its network processing resources and function during communication of the local host-management traffic. A dedicated management port may be configured in the network controller to enable receiving and/or transmitting local host-management traffic communicated from and/or to the local host separate from the local host's network traffic communicated via the network controller. The host-management traffic is communicated between the network controller and the management controller via NC-SI interface. The management controller may be assigned Internet protocol (IP) based addressing information for use during routing of local host- management traffic.
Abstract:
A universal plug and play remote access architecture is provided. A remote access server device can perform a service level access control with respect to a service request of a remote access client device by extending a device level filter used for a remote access discover agent Config service that is provided by the remote access server device to a service level.
Abstract:
A novel method and software system design are presented for interchanging sensors from different vendors in a plug and play manner to drive mission critical applications within a sensor based architecture, policy based framework, event-based architecture. This technique is applicable to sensors directly attached to a computer, or sensors attached to a network, or sensors attached to a controller node which is attached to a network or directly attached to a computer.
Abstract:
A method, system, computer program product, and devices for enterprise network access control and management for Government and Corporate entities, including interagency identity management; connectors and controls; an interagency directory services transformation service; a user/duty position resolving service; role-based encryption key management; role-based business process modeling; and proximity- based access control enabled by user-role-track association.
Abstract:
A cross domain provisioning method, system and architecture for securely managing digital identities across a wide variety of IT systems, providing unified administration, compliance and auditing, and simplified connectivity. The combined use of certain aspects of the illustrative IDM Provisioning Platform (DataForum TM ), Connectivity Component Architecture, Design-Time Client Workflow Tool, and the use of digital certificates to secure cross domain communication channels, collectively offer a unique approach to solving cross domain provisioning problems.
Abstract:
The present invention provides a service provisioning method to support configurations of admission control, and resource control policies for constrained devices by using commissioning procedure. In one implementation, the apparatus comprises the obtaining module (808) is configured to obtain at least one service information including at least one pre-registered service along with associated device ID from said commissioning device, the creation module (810) is configured to create at least one service ID against said service information received, and create said admission control policy and/or said resource control policy for said service ID, the lookup module (812) is configured to lookup for service ID associated with said service in said provisioning device, on receipt of at least one request, from said client device, to access said service, and the access module (814) is configured to grant/deny access for said service, based on said policies decided, to said client device.