Zero configuration method and recording medium
    3.
    发明专利
    Zero configuration method and recording medium 有权
    零配置方法和记录介质

    公开(公告)号:JP2006340380A

    公开(公告)日:2006-12-14

    申请号:JP2006175717

    申请日:2006-06-26

    Abstract: PROBLEM TO BE SOLVED: To attain a zero configuration nomadic wireless and wired computing environment. SOLUTION: This system examines predefined user preference or profile settings (step 268) to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection (step 274). A user may set a preference for infrastructure (288) or ad hoc modes (step 280) in the auto mode. With infrastructure mode preference setting, when the user has already operated off-line or in ad hoc mode (step 288), the system automatically detects and transfers connection to a newly available infrastructure wireless network (steps 292 to 294 to 266). COPYRIGHT: (C)2007,JPO&INPIT

    Abstract translation: 要解决的问题:实现零配置游牧无线和有线计算环境。 解决方案:该系统检查预定义的用户偏好或配置文件设置(步骤268),以确定应连接哪个可竞争数量的无线网络,以及应该使用什么类型的认证来进行此类连接(步骤274)。 用户可以在自动模式中设置基础设施(288)或自组织模式(步骤280)的偏好。 利用基础架构模式首选项设置,当用户已经离线或自组织模式运行时(步骤288),系统自动检测并传送到新可用的基础设施无线网络的连接(步骤292至294至266)。 版权所有(C)2007,JPO&INPIT

    SECURITY LINK MANAGEMENT IN DYNAMIC NETWORKS
    10.
    发明申请
    SECURITY LINK MANAGEMENT IN DYNAMIC NETWORKS 审中-公开
    动态网络中的安全链路管理

    公开(公告)号:WO0182038A2

    公开(公告)日:2001-11-01

    申请号:PCT/US0109448

    申请日:2001-03-26

    Applicant: MICROSOFT CORP

    Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.

    Abstract translation: 描述了通过安全密钥交换,认证和授权建立和管理安全数据/音频/视频链路的方法。 本发明的实施例使得能够使用受信任机器的机器标识符来建立具有有限权限的安全链路。 如果机器的用户没有适合于认证的用户识别信息,这是特别有用的。 此外,由用户识别信息的默认用户的呈现有利地启动系统管理员的干预,而不是一致拒绝。 这种分散式过程允许新用户访问网络,而无需物理访问集中式设施来呈现其凭据。 本发明的另一实施例使得远程用户能够以有限的权限连接到安全网络。

Patent Agency Ranking