摘要:
A multicast repeater is located on a host computer system on a network. One or more other multicast repeaters on other networks are discovered. These other multicast repeaters are located on networks that are separated from the network comprising the host by at least one networking device that is not configured to route UDP multicast addressing. Each time that a UDP multicast request packet is received via multicast, the multicast repeater determines whether the multicast repeater has previously forwarded the UDP multicast request packet. If the multicast repeater has previously forwarded the UDP multicast request packet, it ignores the UDP multicast request packet. However, if the multicast repeater has not previously forwarded the UDP multicast request packet, the multicast repeater sends the UDP multicast request packet via TCP/IP to the one or more other multicast repeaters that have been discovered.
摘要:
A multicast repeater is located on a host computer system on a network. One or more other multicast repeaters on other networks are discovered. These other multicast repeaters are located on networks that are separated from the network comprising the host by at least one networking device that is not configured to route UDP multicast addressing. Each time that a UDP multicast request packet is received via multicast, the multicast repeater determines whether the multicast repeater has previously forwarded the UDP multicast request packet. If the multicast repeater has previously forwarded the UDP multicast request packet, it ignores the UDP multicast request packet. However, if the multicast repeater has not previously forwarded the UDP multicast request packet, the multicast repeater sends the UDP multicast request packet via TCP/IP to the one or more other multicast repeaters that have been discovered.
摘要:
A trust manager receives client account information from a client, determines whether the client account information is valid, and determines whether the client is authorized to access one or more embedded devices that are in electronic communication with a security broker. The trust manager also receives security broker account information from the security broker, determines whether the security broker account information is valid, and determines whether the security broker is authorized to provide access to the embedded device(s). If the client account information from the client is valid and the client is authorized to access the embedded device(s), and if the security broker account information from the security broker is valid and the security broker is authorized to provide access to the embedded device(s), the trust manager establishes a secure trusted connection between the client and the security broker.
摘要:
A plurality of non-multicast nodes that do not process multicast messages register with a selective multicast proxy. In response to receiving a request for a service from a requestor via multicast, the selective multicast proxy identifies among the plurality of non-multicast nodes one or more providers of the requested service. The selective multicast proxy sends the request to the one or more providers without sending the request to other non-multicast nodes on the computer network. The selective multicast proxy, the requestor of the service, the provider(s) of the service, and the non-multicast nodes may all be located within the same local area network.
摘要:
A plurality of non-multicast nodes that do not process multicast messages register with a selective multicast proxy. In response to receiving a request for a service from a requestor via multicast, the selective multicast proxy identifies among the plurality of non-multicast nodes one or more providers of the requested service. The selective multicast proxy sends the request to the one or more providers without sending the request to other non-multicast nodes on the computer network. The selective multicast proxy, the requestor of the service, the provider(s) of the service, and the non-multicast nodes may all be located within the same local area network.
摘要:
An authentication program on a network authenticator establishes a secure communication channel with an embedded device. The authentication program receives security credentials from an embedded device. The authentication program receives from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device. The authentication program registers the secret for the embedded device.
摘要:
A trust manager receives client account information from a client, determines whether the client account information is valid, and determines whether the client is authorized to access one or more embedded devices that are in electronic communication with a security broker. The trust manager also receives security broker account information from the security broker, determines whether the security broker account information is valid, and determines whether the security broker is authorized to provide access to the embedded device(s). If the client account information from the client is valid and the client is authorized to access the embedded device(s), and if the security broker account information from the security broker is valid and the security broker is authorized to provide access to the embedded device(s), the trust manager establishes a secure trusted connection between the client and the security broker.
摘要:
An authentication program on a network authenticator establishes a secure communication channel with an embedded device. The authentication program receives security credentials from an embedded device. The authentication program receives from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device. The authentication program registers the secret for the embedded device.