摘要:
Secure resource discover in peer-to-peer networks involves creating a resource discovery record associated with a computing resource of a user device that is made available via the user device to peers of a peer-to-peer network. The resource discovery record describes the computing resource and may be independent of native service discovery mechanisms of the peer-to-peer network. An access right record is created that controls the ability of one or more contacts to gain access to the resource discovery record. The resource discovery record is sent to the one or more contacts via the peer-to-peer network. The one or more contacts can use the resource discovery record to access the computing resource via the peer-to-peer network in accordance with the access right record.
摘要:
Secure resource discover in peer-to-peer networks involves creating a resource discovery record associated with a computing resource of a user device that is made available via the user device to peers of a peer-to-peer network. The resource discovery record describes the computing resource and may be independent of native service discovery mechanisms of the peer-to-peer network. An access right record is created that controls the ability of one or more contacts to gain access to the resource discovery record. The resource discovery record is sent to the one or more contacts via the peer-to-peer network. The one or more contacts can use the resource discovery record to access the computing resource via the peer-to-peer network in accordance with the access right record.
摘要:
Secure resource discover in peer-to-peer networks involves creating a resource discovery record associated with a computing resource of a user device that is made available via the user device to peers of a peer-to-peer network. The resource discovery record describes the computing resource and may be independent of native service discovery mechanisms of the peer-to-peer network. An access right record is created that controls the ability of one or more contacts to gain access to the resource discovery record. The resource discovery record is sent to the one or more contacts via the peer-to-peer network. The one or more contacts can use the resource discovery record to access the computing resource via the peer-to-peer network in accordance with the access right record.
摘要:
An apparatus is provided that includes a processor configured to receive a captured traffic unit (CTU) intended for a network service, the CTU being one into which incoming traffic has been assembled based on a filter describing which incoming traffic to capture and how to assemble the respective incoming traffic into the CTU. The processor is also configured to determine whether to allow the CTU to pass to one or more applications configured to implement the respective network service based on a passlet including permissions to a particular user. The processor is further configured to instruct a firewall to allow the CTU to pass to the respective one or more applications or to reject the CTU based on the determination. In this regard, the processor is configured to perform the above functions under control of a security framework implemented in middleware between a user-level domain and a system-level domain.
摘要:
An apparatus is provided that includes a processor configured to receive a captured traffic unit (CTU) intended for a network service, the CTU being one into which incoming traffic has been assembled based on a filter describing which incoming traffic to capture and how to assemble the respective incoming traffic into the CTU. The processor is also configured to determine whether to allow the CTU to pass to one or more applications configured to implement the respective network service based on a passlet including permissions to a particular user. The processor is further configured to instruct a firewall to allow the CTU to pass to the respective one or more applications or to reject the CTU based on the determination. In this regard, the processor is configured to perform the above functions under control of a security framework implemented in middleware between a user-level domain and a system-level domain.
摘要:
A terminal for interacting with a physical entity includes a controller capable of selecting a physical entity, and thereafter receiving data from the entity at a terminal at least partially over an air interface. The controller can also identify a type of the entity based upon the data. Thereafter, the controller can be capable of performing at least one action based upon the entity type, an application operating on the terminal and a selection event. The application can comprise any of a number of applications, such as an application associated with the type of entity or an alternative application other than the associated application. Likewise, the selection event can comprise any of a number of different predefined events, such as “select and get information,” “select and open,” and/or “select drag and drop.”
摘要:
An approach is provided for providing user interface navigation information associated with the availability of services. Location information associated with a device is received. Menu items associated with one or more services based on the location information are selected. Presentation of the selected menu items in a bridge is caused, at least in part. The bridge is a user interface element common to the services.
摘要:
Provided are improved systems, methods, and devices for a distributed network architecture for permitting a low power proxy to wake a power saving device from an offline power saving mode using a wake up agent operating a link layer wake up mechanism. The distributed network architecture using wake up agents allows a power saving device to coordinate a relationship with an access point capable of waking the power saving device from an offline mode, allows the power saving device to communicate that relationship to a proxy entity or other control point, and to permit the proxy entity and other control points to use wake up mechanisms to instruct wake-up capable access points to wake a power saving device from an offline mode, such as to wake a UPnP™ device from a deep sleep offline power saving mode.
摘要:
A mobile terminal (10) includes a transceiver (11); a user interface (10D) and a location module (10B) coupled to the transceiver and responsive to a trigger to request that a map be downloaded to the mobile terminal for storage in a memory (10C). The location module is further coupled to the user interface for displaying at least a portion of a downloaded map to a user and for prompting the user to indicate the user's location on the map. The location module is responsive to the user indicating the user's location for supplying enhanced mobile terminal location information to an application (10A) that requests mobile terminal location information.
摘要:
Service Discovery (SD) agent (208) provides uniform and integrated service discovery operation, whereby a default connection to SD Engine (SDE) (224) may be automatically initiated to aid in service discovery. User agents (UA) (214-216) are installed to implement the various SDP interfaces (314-324) as required. Canonical query transform (310) transforms user queries from query generation tool (302) to the appropriate protocol as needed for SD interfaces (314-324). Likewise, service discovery results from the SD interfaces are translated by canonical query transform (310) into user friendly results for ultimate display to user interface (326).