US20080072292A1 - Secure device introduction with capabilities assessment - Google Patents

Secure device introduction with capabilities assessment Download PDF

Info

Publication number
US20080072292A1
US20080072292A1 US11/514,452 US51445206A US2008072292A1 US 20080072292 A1 US20080072292 A1 US 20080072292A1 US 51445206 A US51445206 A US 51445206A US 2008072292 A1 US2008072292 A1 US 2008072292A1
Authority
US
United States
Prior art keywords
environment
devices
communication
introducing
common
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/514,452
Inventor
Ranjit S. Narjala
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US11/514,452 priority Critical patent/US20080072292A1/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NARJALA, RANJIT
Priority to CN2007800284497A priority patent/CN101523798B/en
Priority to EP13004539.6A priority patent/EP2677788B1/en
Priority to PCT/US2007/076633 priority patent/WO2008105922A2/en
Priority to EP07873783A priority patent/EP2076994A4/en
Publication of US20080072292A1 publication Critical patent/US20080072292A1/en
Priority to US13/337,666 priority patent/US8464322B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • H04L12/2821Avoiding conflicts related to the use of home appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2838Distribution of signals within a home automation network, e.g. involving splitting/multiplexing signals to/from different paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1023Media gateways
    • H04L65/1026Media gateways at the edge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1083In-session procedures
    • H04L65/1094Inter-user-equipment sessions transfer or sharing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/56Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the invention generally relates to securely introducing devices into an environment, and more particularly to establishing relationships between, managing data communication with, and restricting resource access of devices introduced into an environment.
  • Wired and wireless communication between computing devices has enjoyed wide adoption and significant growth as a flexible and cost-effective infrastructure has become available.
  • gigabit Ethernet and wireless technology such as WiFi (a common name for several related standards proposed by the Institute of Electrical and Electronics Engineers, “IEEE”), Bluetooth, infrared coded data, etc. permit data transfer via wireless signals or fast wired data pathways.
  • IEEE Institute of Electrical and Electronics Engineers
  • bandwidth management or allocation which may be an issue when, as often happens, multiple devices in an environment are engaging in a common task with devices outside the environment.
  • An example would be multiple devices engaging in a data download, peer-to-peer data transfer, conferencing or telephony communication session, etc.
  • Another issue is establishing trust and identity between various devices, such as conference participants.
  • Yet another issue is determining a proper scope of rights in the environment for visiting devices.
  • FIG. 1 shows an exemplary network environment according to an embodiment of the invention.
  • FIG. 2 is a flow chart of an exemplary protocol transaction according to an embodiment of the invention.
  • FIG. 3 illustrates, according to one embodiment, a framework for establishing initial trust relationships between devices and communicating these trust relationships.
  • FIG. 4 illustrates a flowchart according to one embodiment for introducing devices into an environment.
  • FIG. 5 illustrate two different but common device configurations that may be found in a personal or commercial networked environment such as a Digital Home or Office LAN environment.
  • FIG. 6 illustrates a system of devices that may operate in accord with various embodiments of the invention.
  • FIG. 7 illustrates a suitable computing environment in which certain aspects of the invention may be implemented.
  • Another issue is minimizing bandwidth requirements when multiple devices within an environment may be engaging in a common task and hence it may be beneficial to aggregate communication into a common communication in to or out of the environment.
  • Another issue smart bandwidth allocation so low bandwidth devices are recognized as such and are not unnecessarily provided bandwidth to the detriment of other high-bandwidth devices.
  • Other issues are addressed herein as well and will become apparent from the following description.
  • devices may transfer credentials within the environment, and while doing so, a device may also communicate it capabilities and resource requirements to facilitate configuring the device for use within the environment. Credentials may be passwords or encryption keys required to obtain access to network resources, or other configuration information useful or necessary to operate the device.
  • credentials may be passwords or encryption keys required to obtain access to network resources, or other configuration information useful or necessary to operate the device.
  • Capabilities and requirements provided by the device may be used to facilitate coordinating efficient communication between devices within an environment with devices outside the environment, such as aggregating overlapping communication sessions into a single common session between the environment and external communication end points, as well as to facilitate smart bandwidth allocation through transcoding data sent to a device, as well as segregating some devices to limit their access (as desired) to resources of the environment, etc.
  • FIG. 1 illustrates an environment 100 including an Access point (“AP”) 102 that is a central element in many WLANs since may communicate with one or more stations 104 , 106 that use the wireless network, and may copy data packets to or from a traditional wired network 108 so that stations 104 and 106 can communicate with devices such as server 110 that lack a wireless interface.
  • WEP Wi-Fi Protected Access
  • Wi-Fi Protected Access Wi-Fi Protected Access
  • IEEE 802.11i Wi-Fi Protected Access
  • devices of the environment 100 may be engaging in any sort of network activity, such as client devices accessing network data on the Internet, an intranet, etc., streaming video feeds, participating in video and/or data conferences, downloading, etc.
  • the user of a device such as laptop WLAN client 114 wishes to use the wireless network through AP 102 to access resources on other wireless or wired nodes, it must obtain a valid encryption key and enter it into the wireless device's configuration.
  • an administrator of the wireless network would provide the key and the user would type it into a configuration form.
  • this approach is inconvenient for the user and cumbersome for the administrator.
  • an unauthorized user may obtain a copy of the key from the user and use it to access the network. Changing the WLAN configuration to exclude such an unauthorized user may entail re-configuring all of the other authorized devices.
  • An alternate method of managing WLAN access may use a registration protocol according to an embodiment of the invention.
  • a protocol may be used allowing WLAN client 114 to register with a network entity called a Registrar 116 by way of communication through AP 102 .
  • the Registrar may be integrated with the AP, and yet other embodiments may use several Registrars.
  • there may also be a Media Gateway Device (MGD), which may be a standalone device or, as assumed in the illustrated embodiment, incorporated within the Registrar.
  • MGW Device Media Gateway Device
  • the MGD may be configured to perform various tasks, such as coordinating communication for multiple devices within the environment be engaging in a common communication task, such as a video conference, with devices outside the environment, such as with devices on the Internet, or transcoding content to provide compatibility or reducing bandwidth, or to block out attempts by a device to access communication features not authorized for the device within the environment.
  • a common communication task such as a video conference
  • devices outside the environment such as with devices on the Internet
  • transcoding content to provide compatibility or reducing bandwidth
  • device introduction into a new environment may utilize a relatively secure Out-Of-Band (OOB) channel to initially transfer data from an existing device, such as a Registrar or other device in the environment to a new device being introduced.
  • This data may, for example, be used to at least temporarily establish a secure communication channel over which the new device may subsequently be configured.
  • An Application Framework implementing the registration protocol may be used to provide a common framework for new device configuration.
  • application software for a device registers with the Application Framework, and the framework coordinates with the Registrar (or other existing device) and the new device to automatically configure the new device when it is introduced.
  • Registrar 116 may communicate with AP 102 over the wired network 108 , over a wireless (radio) connection, or both.
  • the Registrar may provide administrative facilities to monitor the WLAN and manage encryption keys.
  • a New WLAN client 114 has an associated secret called a device password which can be used as the OOB data to transfer for establishing the secure communication channel.
  • the password may be engraved on the device or printed on a label, or may be displayed by the device or by software associated with the device. If the device password is displayed in this way, it may be dynamic (for example, the displayed password may be valid for a period of time or until some event occurs, then a new device password may be chosen and displayed).
  • the device password may be readable by a reader device near the new client.
  • NFC Near Field Communication
  • NFC Near Field Communication
  • the new WLAN client might be equipped with an infrared or other light signal transmitter, and be able to transmit the device password to an optical receiver of the Registrar within line-of-sight proximity.
  • These and other known techniques may be used to perform an OOB data transfer between the new device and the existing device in the environment, e.g., the Registrar, to facilitate establishing the secure communication channel.
  • an in-band communication channel can be (or already is) compromised.
  • a typical example of a high-risk in-band channel is a public wireless “hotspot,” e.g., a place providing public network access, or a hotel room network connection.
  • an initial OOB data transfer with the new device is performed to bootstrap establishing a secure communication channel over which to then configure the new device. For example, assuming the OOB data contains cryptosystem data, the new device and Registrar, or other existing device, proxy, etc., use the cryptosystem data to establish a secure communication channel with the new device.
  • the new device may request a Registrar, Framework Protocol Stack (see, e.g., the FIG. 4 embodiment) or other entity or programmatic construct to act as a certificate authority (CA) for cryptographic, e.g., X.509, type certificates.
  • CA certificate authority
  • FIG. 2 illustrates a flow chart 200 according to one embodiment to securely transfer a credential such as a WEP key from the Registrar to the client.
  • Registrar 116 , AP 102 and client 114 can interact according to FIG. 2 .
  • All messages can be sent in-band (for example, over the wireless communication channel), or some messages can be sent over a different channel.
  • the embodiment described with reference to this figure uses the Extensible Authentication Protocol (“EAP”), as described in the Internet Engineering Task Force (“IETF”) Request for Comments (“RFC”) number 3748 dated June 2004, as a framework for transmitting and receiving many of the messages in the protocol.
  • EAP Extensible Authentication Protocol
  • IETF Internet Engineering Task Force
  • RRC Request for Comments
  • messages according to embodiments of the invention can be used with other communication frameworks, or transmitted as raw data over any sort of communication channel.
  • FIG. 2 discussion is of a high level and for clarity in presentation some encryption details have been left out.
  • the client's device password is provided to the Registrar 202 . This may be accomplished by reading the password from the client's label or display and entering it through a Registrar user interface, by placing the client near the Registrar so that the Registrar can read the client's NFC token automatically, or via some other OOB method.
  • the client transmits a first message (“M 1 ”) (encapsulated within an EAP message) to initiate the introduction protocol with the Registrar.
  • M 1 contains a first random number N 1 and a public key PK E of the client, and may contain other information (described below). M 1 is received by the Registrar 206 .
  • the Registrar responds to M 1 by transmitting a second message (“M 2 ”) containing a second random number N 2 and a public key PK R of the Registrar 208 .
  • the client receives M 2 210 .
  • the transaction continues with the client transmitting a message Mn 212 and the Registrar responding with message Mn+1 214 .
  • Portions of each message may be encrypted with a key known to both the client and the Registrar, or with a public or private key of one of the parties.
  • Messages may have appended a message authentication code (“HMAC”), containing a cryptographic hash of the previous message and a portion of the current message preceding the MAC, to permit the recipient to verify that the other party correctly received the previous message and that no third party is tampering with the messages in transit.
  • HMAC message authentication code
  • the key used to compute the HMAC in one or more of the messages from the Registrar is authenticated using a device password that should match the client's own device password. This permits the client to verify that it is receiving credentials from an authorized Registrar (and not, for example, from a rogue Registrar that is attempting to trick the client into connecting to a hostile wireless network).
  • One or more of the messages from the Registrar contains a credential such as a WEP or WPA key that the client can use to access the wireless LAN through the AP.
  • the credential may be encrypted with a key-encryption key to prevent its recovery by an eavesdropper.
  • the client When the client receives the message containing the credential, it verifies the HMAC to ensure the message came from a Registrar with knowledge of its own device password 216 , e.g., in one embodiment a test is performed to ensure mutually proved knowledge of the device password was received. If the passwords differ, the client aborts the EAP transaction by transmitting a negative acknowledge (“NACK”) message 218 . If the HMAC correctly verifies knowledge of the device password, the client may decrypt the credential and store it in a configuration database for future use 220 .
  • NACK negative acknowledge
  • the session is terminated. For example, this may be performed by transmitting a “Done” response to the Registrar 222 , which receives the “Done” message 224 and responds with an EAP “Fail” message 226 .
  • the client subsequently receives the “Fail” message 228 .
  • the failure message does not mean that the client must repeat the EAP transaction to obtain a credential. It merely indicates that the transaction was used to provision a credential rather than to grant the client immediate use of the wireless LAN.
  • the client may use the credential it received later, when it attempts to access the network through the AP 230 . For example, the client may update its configuration according to data in the credential, or may use the credential to complete a new authentication protocol transaction designed to provide network access.
  • configuring communication parameters and communication configurations for the devices may also be performed. For example, by establishing trust between the devices and a registrar, credentials may be exchanged between the devices to facilitate establishing trust between the devices. Or, bandwidth requirements for devices may be configured to control device inter-communication as well as communication to locations external to the environment.
  • FIG. 3 illustrates, according to one embodiment, a framework 300 for establishing initial trust relationships between devices and communicating these trust relationships, e.g., between various operating system, device driver, and application software components.
  • an Application Framework 302 is built on device introduction mechanisms, such as those described above with respect to FIGS. 1-2 .
  • the Application Framework is initialized after sending the Done message and before responding with the Fail message and terminating the EAP session.
  • the illustrated Application Framework may be used by any application or device to bootstrap a secure communication channel.
  • device discovery techniques such as wireless or wired network discovery data probes, Universal Plug and Play (UPnP) operations, or other discovery techniques may be used to announce a new device's presence in an environment, locate Registrars or other devices of the environment, and manage networked devices.
  • An Application Programming Interface (API) or Software Development Kit (SDK) may also be defined to provide functions to perform the operations and techniques discussed herein for discovering, registering and configuring devices within an environment.
  • the below line 304 components 306 - 312 may be standardized or become well-defined by a Specification, such as described in the “Wi-Fi Simple Config Proposal”, the most current version at this time being Revision 1.0a dated Feb. 10, 2006.
  • Below the line 304 components 306 - 312 include an In-Band media manager 306 for managing a conventional communication connections such as a Bluetooth link, an Institute of Electrical and Electronics Engineers (IEEE) 802.x type of WLAN link, etc. It is presumed this in-band communication channel is susceptible to attack.
  • IEEE Institute of Electrical and Electronics Engineers
  • OOB media manager 308 for managing OOB communication channels, such as the various exemplary communication channels discussed above.
  • OOB communication channel is presumed difficult to attack and hence is therefore deemed trustable for initial data exchanges to establish secure communication over the not-trusted in-band channel.
  • a Registrar or other managing device may have associated policies that control what characteristics or features of a new device that may be allowed to become active. For example, while a new device may support instant messaging, the Registrar may be configured to ignore and/or not configure such features of software for a new device. This allows a user or other environment administrator to selectively allow resource access, e.g., to implement “guest” access. It will be appreciated restricting access may be based on automatically applied policies (or their equivalent) as well as through interaction with a user or other environment administrator. It will be appreciated various device characteristics, such as device type, owner, bandwidth or other resource requirements, well-behaved time in the environment, etc. may be used as decision factors in granting rights to a device. Thus for example, a telephony device may be brought into the environment and automatically only be granted access to resources compatible with the nature of the device, e.g., to conference data streams, audio portions of audiovisual data, etc.
  • the device itself may impose its own access limitations, such as to protect itself from intrusion or to maximize its operation duration.
  • a particular device may nonetheless have its own local policy such that the device does not utilize the activity even though present and available in the environment.
  • security conscious device owners disallow activity even if offered in a particular environment, such as file sharing in a public access network hotspot.
  • a device may be configured to ignore battery intensive features available within an environment.
  • each application that registers can be identified in an interface (not illustrated), such as a Graphical User Interface (GUI) for receiving user input, or to an automatic interface to process registrations, where the interface provides opportunity for a user or automatic registration processor to enforce a local policy or user interest in permitting, denying, or modifying an application's registration.
  • GUI Graphical User Interface
  • the “guest” access discussed above can be interactively enforced for a device introduced into an environment by, during introduction of the device, recognizing it is a foreign device and checking for applicability of rules, policies, or the like and prompting (if needed) a user by way of a GUI or other interface for access rights for this new device.
  • a guest device of a visiting friend may be given restricted access in the environment, such as only being allowed to engage in certain types of communication, e.g., to grant or deny Internet access, to grant or deny music streaming, to time limit access to the environment, etc.
  • FIG. 4 illustrates a flowchart 400 according to one embodiment for registering for and monitoring for device introductions to an environment. It will be appreciated a device may have multiple software and/or hardware applications or functionality that may be registered 402 , such as with a FIG. 1 Registrar 116 .
  • a test is performed to check a newly added device to see if 404 restrictions are applicable to the device. It will be appreciated some devices, such as those previously registered with the system, or devices having a certain characteristic such as a digitally secured trust certificate or other trusted characteristic authenticated by a trusted party such as a CA (Certificate Authority) or other authority recognized by the environment may bypass the restriction checks. If 404 restrictions apply to the new device or functionality, service access restrictions and device configurations may be established 406 - 410 . It will be appreciated while items 406 - 410 are illustrated sequentially, operations may occur in parallel or in a different order than as illustrated, and in some cases only selected operations are performed.
  • LAN local area network
  • restrictions may be applied automatically and/or interactively through a GUI or other interface.
  • a user or environment administrator desires to allow only temporary device access to a network, such as when a visitor comes with a device, such as a Personal Digital Assistant (PDA), music player, camera, etc., and wants the visiting device to connect to the internet, share files with the user, play songs from the music player on a wireless or wired local area network (LAN) capable stereo system, share pictures from a camera, print pictures on a printer in the environment, etc.
  • a device such as a Personal Digital Assistant (PDA), music player, camera, etc.
  • PDA Personal Digital Assistant
  • LAN local area network
  • the user and/or administrator needs to grant necessary credentials to the visitor's device for it to perform desired tasks within the environment, e.g., to allow it network access and/or access to devices within the host environment.
  • desired tasks e.g., to allow it network access and/or access to devices within the host environment.
  • users or environment administrators do not want to give the visiting device unrestricted environment access but instead wants to carefully control the extent of network access the visitor's device receives.
  • guest access or other device restrictions may be determined when introducing a device to an environment.
  • restrictions are enforced with dynamic filters implemented on an Access Point (AP), router, gateway or other such device through which network access is obtained.
  • environment devices and resources are accessible through their own physical and/or logical network reachable through an AP, router, gateway, etc.
  • the user or environment administrator has the option of enforcing access restrictions on the new device. It will be appreciated defaults may be assigned for common interests such as Internet access, file access, etc. Access rights may be directly managed by a Registrar, and/or defaults and device specific restrictions may be communicated by the Registrar to an AP, router, gateway, etc. that is positioned to restrict environment access and able to establish access control lists (ACLs), filters, or the like as necessary to restrict access as desired.
  • ACLs access control lists
  • the user or environment administrator can enable such access via the Registrar.
  • a GUI may be used to interactively control initial device access and such a GUI may also be used to change access permissions.
  • the Registrar is configured to enumerate available resources within the environment, e.g., shares, or input and/or output devices on the network, such as printers, stereo systems, speakers, etc. The user or administrator may select devices and shares a guest device may access. If access is not directly managed by the Registrar, the Registrar communicates access changes to the AP, router, gateway, etc. which is controlling access and it sets up appropriate ACLs, filters, etc. corresponding to the changed access rights.
  • ACLs may be as simple as IP and/or MAC address and/or port-based filters, or may be more advanced, depending on the capability of the Registrar, AP, router, gateway, etc. limiting access to environment resources.
  • the guest device obtains access only to specified portions of the network, and will be unable to view or access other resources within the user's network.
  • guest access rights may be configured to automatically expire, e.g., time out, or be revoked on certain conditions, such as when the guest device leaves the environment.
  • the device may also be desired to establish 408 communication restrictions. For example, when a device is introduced and its applications and/or functionality registered 402 , during the registration process characteristics of the device may be tracked or recorded, such as knowledge that the device is an audio only device such as a telephone, has only a black and white screen, has limited processing power, etc. In the audio only case, for example, communication features discoverable by, or otherwise accessible by, the device may be established in accord with the device's characteristics. For example, if an audio only device seeks to join an audiovisual based conference, the device may be introduced into the conference as an audio only device where all video functionality is automatically disabled, and more particularly, no attempt is made to send video data to the audio only device. Such intelligent data routing may significantly decrease the bandwidth requirements for the audio only device as well as improve bandwidth or other resource performance for other devices having more burdensome requirements.
  • communication aggregation 410 may also be performed.
  • Common tasks include, for example, streaming audio data, such as music or voice communication, transferring video data such as related to a movie presentation, video conference, video telephone, etc., Voice over IP (VoIP), instant messaging, collaboration applications, and the like.
  • streaming audio data such as music or voice communication
  • video data such as related to a movie presentation, video conference, video telephone, etc.
  • VoIP Voice over IP
  • instant messaging such as related to a movie presentation, video conference, video telephone, etc.
  • FIG. 5 significant bandwidth may be wasted in having multiple devices all trying to individually communicate with every other device. Instead of such cross-communication, in various configurations communication aggregation may be performed to simplify communication requirements.
  • a common communication nexus such as a gateway, router, firewall, etc.
  • it may be used to cross-connect devices communicating through it and maintain multiple communication lines on behalf of the devices using the nexus. This thus simplifies the operation of the devices as they need only maintain communication with the nexus, from which the devices will receive the communications from all the other devices. In addition to freeing bandwidth, simplification reduces cost and facilitates home appliance type devices.
  • an association 412 is recorded between a device and its hardware or other software devices that need to know about the introduction of the device, and monitoring 414 is performed for new devices being added to the environment.
  • a FIG. 3 Application Framework monitors device introductions.
  • a FIG. 1 registrar 116 monitors device introductions. As devices are introduced, already registered applications (if any) for the new device are notified when the introduction is complete so that they can engage in data exchanges to provide for automatic configuration of the new device.
  • logically processing continues with checking if 416 there was a new device introduction. If 416 a new device is not seen, processing loops back with monitoring 414 for device introductions. The loop 416 back is shown as a dotted line to suggest that processing might not literally loop directly back since a system implementing the illustrated embodiment may perform other tasks and/or processes not illustrated before returning to the monitoring 414 . If 416 a new device was introduced, a check 418 is performed to determine if it has associated (registered) apps. If 420 so, those apps are notified 422 to trigger their responsive action to the introduction, e.g., to configure the device or take some other action. If 416 there was no new device, or if 420 there are no associated applications, or after notifying 422 associated applications, processing loops back to monitoring 414 for new devices.
  • priority and/or execution ordering data may be associated with the applications and/or restrictions to capture dependencies that may exist between the applications, e.g., to allow designating that one application needs to be run before another, or to limit application access in accord with restrictions.
  • FIG. 3 Application Framework 302 may analyze whether existing device configurations can and/or should be modified in light of new device introduction, such as to take advantage of services now available from the new device.
  • An expert system may also be used to control the execution order of associated applications, if needed, when multiple applications registrations exist for a device.
  • device may be introduced in a variety of ways, such as, for example, by activating a wireless transceiver, pressing an “install” button or switch, plugging the device in to a bus communicatively coupled with the Application Framework, etc.
  • an installation “wizard” may become active on a Registrar and/or or on a user interface for the new device.
  • a callback function could be called to trigger execution 414 of the appropriate application(s).
  • the installation wizard itself would have previously registered 402 itself for all devices.
  • the wizard may provide instructions and/or configuration questions to a user to assist with installing the new device. While in some cases no intervention by the user is required, thus making matters very simple for a user, in other cases, such as when assigning device restrictions, configuring communication aggregation, or introducing a wireless access point, it may respectively be desirable to prompt a user for access rights, aggregation parameters, a SSID (service set identifier) or other personalization data to associate with the new device, etc.
  • SSID service set identifier
  • FIG. 5 illustrate two different but common device configurations that may be found in a personal or commercial networked environment such as a Digital Home or Office LAN environment.
  • FIG. 5A illustrates a typical peer to peer (P2P) type of conference 500 , in which every device 502 - 506 (e.g., conference endpoints) is required to establish a communication connection with every other device in the conference, such as outside endpoints 508 - 512 . As illustrated, this results in a lot of cross-communication, bandwidth consumption, and communication complexity due to the many crossing communication lines 514 between the devices 502 - 512 .
  • P2P peer to peer
  • Such overhead is especially burdensome in some configurations in which devices participating in a common task, such as a conference, share a common network access, such as a gateway, firewall or other device 516 as illustrated in FIG. 5B .
  • all devices 502 - 512 need to establish a communication connection to every other device, however, since several 502 - 506 of the devices are behind a common communication nexus 516 such as a gateway, firewall, or the like, this device 516 bears the burden of passing all communication between inner 502 - 506 and outer 508 - 512 devices, which also may result in the nexus 516 being a bottleneck. Combining related communication and/or other data transfers may significantly facilitate communication by multiple devices engaging in the common task.
  • devices when registering/introducing devices in an environment, e.g., as discussed above with respect to FIG. 4 , devices may be evaluated for whether they support functionality that may be aggregated with other devices if such devices are engaged in a common task. For example, as illustrated in the FIG. 6 system 600 of devices, if devices 602 - 606 all support a particular task, such as conferencing (which includes audio and/or visual conferencing, data conferencing, etc.), the devices are instructed during registration or introduction to use an aggregation communication mode instead of a conventional communication mode.
  • conferencing which includes audio and/or visual conferencing, data conferencing, etc.
  • the devices are all communicatively coupled by way of a network 608 and communicate through a common communication nexus 610 referred to herein as a such as a Media Gateway Device (MGD).
  • MGD Media Gateway Device
  • the MGD also incorporates the Registrar, e.g., FIG. 1 item 116 , to which devices are introduced.
  • a MGD incorporates data handling capabilities of a gateway, firewall, or the like, along with aggregation features (and Registrar features if present) discussed below.
  • the devices establish individual communication connections 612 - 616 with the MGD 610 , e.g., over their local wired and/or wireless network 608 .
  • the MGD then establishes connections 618 as needed to outside (e.g., with respect to local network(s) 608 ) end points 622 - 626 .
  • each outside endpoint is aware of the MGD and hence pursuant to a protocol agreed upon by the endpoints and MGD, each outside endpoint establishes a single communication line 620 to the MGD, e.g., over the Internet or other network 628 communicatively coupling the endpoints 602 - 606 , 622 - 626 with the understanding the MGD will convey data as needed to the inside endpoints.
  • each of the illustrated communication lines 620 represents three communication lines from each outside endpoint to each inside endpoint, however, each of these routes to the MGD since it remains the common communication nexus for the inside endpoints.
  • the MGD may attempt to establish a more optimal communication for the device as well as for the communication with outside endpoints 622 - 626 through the MGD or other gateway, firewall, router, etc. For example, if device 602 is an audio-only telephone, even if the telephone attaches to an audiovisual conference, the MGD can automatically strip out video data from other participants to simplify what data 612 the telephone is required to process. This type of proxying for the telephone also allows the MGD to act as a transcoder to allow incompatible devices to engage in activities not ordinarily supported, such as a video conference on an audio-only device.
  • NIC network interface card
  • audio capabilities or associated codecs audio capabilities or associated codecs
  • video capabilities or associated codecs screen size, resolution, output abilities, camera specifications, text capabilities, specific application support (SkypeTM, Instant Messaging, VoIP applications, collaboration applications, etc.), and decisions made regarding aggregation, transcoding, and the like.
  • SkypeTM Instant Messaging, VoIP applications, collaboration applications, etc.
  • the MGD 610 is used to set up conference calls with the outside endpoints 622 - 626 for internal home devices 602 - 606 that wish to join these calls.
  • the MGD also functions as a home media server, and hence is capable of streaming media to endpoint devices in the home.
  • the devices may have wired and/or wireless connections to the MGD.
  • the MGD reviews the discovered capabilities of the newly introduced device. It will be appreciated the MGD may directly receive these capabilities if it is collocated with a Registrar, or this information is passed to the MGD (e.g., by way of a push or pull mechanism) after successful registration or introduction of a device.
  • the MGD may also be configured to poll for capabilities responsive to monitored execution of certain applications, e.g., in FIG. 3 application layer 302 , using a device within the environment, such as communication software executed on an endpoint 602 - 606 .
  • the MGD sets up a conference call with outside entities, e.g., between outside endpoints 622 - 626 and inside devices 602 - 606 in the Digital Home.
  • outside entities e.g., between outside endpoints 622 - 626 and inside devices 602 - 606 in the Digital Home.
  • there is a single MGD there is a single MGD; it will be appreciated there may be multiple MGDs each communicatively coupled so as to tie together multiple sub-networks of devices.
  • multiple MGDs if present, may operate as a single MGD.
  • each device sets up a session with the MGD, which in turn multiplexes all media streams and sends them to the outside devices participating in the common communication task, e.g., the conference call.
  • the MGD uses the device capability information provided and/or discovered when the device joined the network, e.g., during registration or introduction, to mediate the media traffic, determine what data ad/or media streams get sent to particular devices, and transcode or otherwise scale data, such as to reduce high resolution images for small screen sizes, such as for a cell phone or to remove the video entirely, to reduce audio bitrates, etc.
  • a more powerful device such as a desktop or laptop computer engaging in the common communication task will, however, receive complete media streams since such devices are able to support higher capabilities.
  • the MGD functions as a multiplexer/de-multiplexer for the endpoint communications.
  • the MGD collates incoming streams from devices 602 - 606 and sends them out as a single stream to an outside endpoint 622 - 626 .
  • the MGD receives data for the common communication task from each of the outside endpoints and combines them into a single data stream provided to each of the inside endpoints.
  • the Registrar or MGD incorporating the Registrar receiving device registration acts as a local Certificate Authority (CA) and hence may act as an authority as to the identity of devices within an environment thus allowing devices within the environment to validate the identity of other devices as desired.
  • CA Certificate Authority
  • conference participants or other endpoints may establish trust relationships with the MGD and indirectly establish trust with other conference participants or endpoints based at least in part on knowledge the other participants or endpoints have similarly established trust relationships with the MGD.
  • FIG. 7 and the following discussion are intended to provide a brief, general description of a suitable environment in which certain aspects of the illustrated invention may be implemented.
  • the term “machine” is intended to broadly encompass a single machine, or a system of communicatively coupled machines or devices operating together.
  • Exemplary machines include computing devices such as personal computers, workstations, servers, portable computers, handheld devices, e.g., Personal Digital Assistant (PDA), telephone, tablets, etc., as well as transportation devices, such as private or public transportation, e.g., automobiles, trains, cabs, etc.
  • PDA Personal Digital Assistant
  • the environment includes a machine 700 that includes a system bus 702 to which is attached processors 704 , a memory 706 , e.g., random access memory (RAM), read-only memory (ROM), or other state preserving medium, storage devices 708 , a video interface 710 , and input/output interface ports 712 .
  • the machine may be controlled, at least in part, by input from conventional input devices, such as keyboards, mice, etc., as well as by directives received from another machine, interaction with a virtual reality (VR) environment, biometric feedback, or other input source or signal.
  • VR virtual reality
  • the machine may include embedded controllers, such as programmable or non-programmable logic devices or arrays, Application Specific Integrated Circuits, embedded computers, smart cards, and the like.
  • the machine may utilize one or more connections to one or more remote machines 714 , 716 , such as through a network interface 718 , modem 720 , or other communicative coupling.
  • Machines may be interconnected by way of a physical and/or logical network 722 , such as the network 108 of FIG. 1 , an intranet, the Internet, local area networks, and wide area networks.
  • communication with network 722 may utilize various wired and/or wireless short range or long range carriers and protocols, including radio frequency (RF), satellite, microwave, Institute of Electrical and Electronics Engineers (IEEE) 802.11, Bluetooth, optical, infrared, cable, laser, etc.
  • RF radio frequency
  • IEEE Institute of Electrical and Electronics Engineers
  • Associated data may be stored in, for example, volatile and/or non-volatile memory 706 , or in storage devices 708 and/or associated storage media, including conventional hard-drives, floppy-disks, optical storage, tapes, flash memory, memory sticks, digital video disks, etc., as well as more exotic mediums such as machine-accessible biological state preserving storage.
  • Associated data may be delivered over transmission environments, including network 722 , in the form of packets, serial data, parallel data, propagated signals, etc., and may be used in a compressed or encrypted format. Associated data may be used in a distributed environment, and stored locally and/or remotely for access by single or multi-processor machines. Associated data may be used by or in conjunction with embedded controllers; hence in the claims that follow, the term “logic” is intended to refer generally to possible combinations of associated data and/or embedded controllers.
  • remote machines 714 , 716 may respectively be FIG. 1 Client 114 and Station 104 . It will be appreciated that remote machines 714 , 716 may be configured like machine 700 , and therefore include many or all of the elements discussed for machine.

Abstract

Introducing, managing and restricting devices in an environment is discussed, including how to securely introduce the devices, how to establish trust between the devices, how to manage bandwidth requirements and other resource requirements of the devices, how to aggregate resource usage when multiple devices within an environment are engaging in a common task, and how to restrict device access to environment resources. Various techniques including manual and automatic solutions are disclosed.

Description

    FIELD OF THE INVENTION
  • The invention generally relates to securely introducing devices into an environment, and more particularly to establishing relationships between, managing data communication with, and restricting resource access of devices introduced into an environment.
  • BACKGROUND
  • Wired and wireless communication between computing devices has enjoyed wide adoption and significant growth as a flexible and cost-effective infrastructure has become available. For example, gigabit Ethernet and wireless technology such as WiFi (a common name for several related standards proposed by the Institute of Electrical and Electronics Engineers, “IEEE”), Bluetooth, infrared coded data, etc. permit data transfer via wireless signals or fast wired data pathways. Unfortunately, while new standards and improved equipment have increased network data rates, the technology continues to have issues that have not been satisfactorily addressed, such as easily and securely introducing devices, and once introduced, configuring devices and establishing trust (as needed) between the devices.
  • In addition to configuration difficulty for devices introduced into an environment, another problem is bandwidth management or allocation, which may be an issue when, as often happens, multiple devices in an environment are engaging in a common task with devices outside the environment. An example would be multiple devices engaging in a data download, peer-to-peer data transfer, conferencing or telephony communication session, etc. Another issue is establishing trust and identity between various devices, such as conference participants. Yet another issue is determining a proper scope of rights in the environment for visiting devices.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The features and advantages of the present invention will become apparent from the following detailed description of the present invention in which:
  • FIG. 1 shows an exemplary network environment according to an embodiment of the invention.
  • FIG. 2 is a flow chart of an exemplary protocol transaction according to an embodiment of the invention.
  • FIG. 3 illustrates, according to one embodiment, a framework for establishing initial trust relationships between devices and communicating these trust relationships.
  • FIG. 4 illustrates a flowchart according to one embodiment for introducing devices into an environment.
  • FIG. 5 illustrate two different but common device configurations that may be found in a personal or commercial networked environment such as a Digital Home or Office LAN environment.
  • FIG. 6 illustrates a system of devices that may operate in accord with various embodiments of the invention.
  • FIG. 7 illustrates a suitable computing environment in which certain aspects of the invention may be implemented.
  • DETAILED DESCRIPTION
  • It will be appreciated there are several different issues being addressed herein, one of which being how to securely introduce devices into an environment, such as a digital home, digital office, etc. discussed above, where some or all of the devices may be operating over wireless communication channels. Another issue is how to establish trust between the devices, such as to enable devices to set up trusted multiparty, multi-media conferences and sharing of media between devices over a secure communication channel, and enable devices to be confident of the authenticity of other endpoints in the conference. It will be appreciated endpoints establishing trust relationships with a common device may indirectly establish trust with other endpoints based at least in part on knowledge the other endpoints have similarly established trust relationships with the common device. Another issue is minimizing bandwidth requirements when multiple devices within an environment may be engaging in a common task and hence it may be beneficial to aggregate communication into a common communication in to or out of the environment. Another issue smart bandwidth allocation so low bandwidth devices are recognized as such and are not unnecessarily provided bandwidth to the detriment of other high-bandwidth devices. Other issues are addressed herein as well and will become apparent from the following description.
  • When introducing devices in an environment, such as a local area network (LAN) or wireless LAN (WLAN), and/or other communication environment, it will be appreciated devices may transfer credentials within the environment, and while doing so, a device may also communicate it capabilities and resource requirements to facilitate configuring the device for use within the environment. Credentials may be passwords or encryption keys required to obtain access to network resources, or other configuration information useful or necessary to operate the device. Capabilities and requirements provided by the device (and/or determined based on device identity) may be used to facilitate coordinating efficient communication between devices within an environment with devices outside the environment, such as aggregating overlapping communication sessions into a single common session between the environment and external communication end points, as well as to facilitate smart bandwidth allocation through transcoding data sent to a device, as well as segregating some devices to limit their access (as desired) to resources of the environment, etc.
  • FIG. 1 illustrates an environment 100 including an Access point (“AP”) 102 that is a central element in many WLANs since may communicate with one or more stations 104, 106 that use the wireless network, and may copy data packets to or from a traditional wired network 108 so that stations 104 and 106 can communicate with devices such as server 110 that lack a wireless interface. If WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), IEEE 802.11i, or other security is in effect, devices such as stations 104 and 106 share an encryption key with AP 102. In this figure, WEP/WPA protected connections are indicated with thick dashed lines 112. It will be appreciated devices of the environment 100 may be engaging in any sort of network activity, such as client devices accessing network data on the Internet, an intranet, etc., streaming video feeds, participating in video and/or data conferences, downloading, etc.
  • If the user of a device such as laptop WLAN client 114 wishes to use the wireless network through AP 102 to access resources on other wireless or wired nodes, it must obtain a valid encryption key and enter it into the wireless device's configuration. Traditionally, an administrator of the wireless network would provide the key and the user would type it into a configuration form. However, this approach is inconvenient for the user and cumbersome for the administrator. In addition, an unauthorized user may obtain a copy of the key from the user and use it to access the network. Changing the WLAN configuration to exclude such an unauthorized user may entail re-configuring all of the other authorized devices.
  • An alternate method of managing WLAN access may use a registration protocol according to an embodiment of the invention. For example, a protocol may be used allowing WLAN client 114 to register with a network entity called a Registrar 116 by way of communication through AP 102. While illustrated as separate entities, in another embodiment, the Registrar may be integrated with the AP, and yet other embodiments may use several Registrars. In some embodiments, there may also be a Media Gateway Device (MGD), which may be a standalone device or, as assumed in the illustrated embodiment, incorporated within the Registrar. The MGD may configured to perform various tasks, such as coordinating communication for multiple devices within the environment be engaging in a common communication task, such as a video conference, with devices outside the environment, such as with devices on the Internet, or transcoding content to provide compatibility or reducing bandwidth, or to block out attempts by a device to access communication features not authorized for the device within the environment.
  • In some embodiments, device introduction into a new environment may utilize a relatively secure Out-Of-Band (OOB) channel to initially transfer data from an existing device, such as a Registrar or other device in the environment to a new device being introduced. This data may, for example, be used to at least temporarily establish a secure communication channel over which the new device may subsequently be configured. An Application Framework implementing the registration protocol may be used to provide a common framework for new device configuration. In one embodiment, application software for a device registers with the Application Framework, and the framework coordinates with the Registrar (or other existing device) and the new device to automatically configure the new device when it is introduced. Registrar 116 may communicate with AP 102 over the wired network 108, over a wireless (radio) connection, or both. The Registrar may provide administrative facilities to monitor the WLAN and manage encryption keys.
  • In the illustrated embodiment, a New WLAN client 114 has an associated secret called a device password which can be used as the OOB data to transfer for establishing the secure communication channel. The password may be engraved on the device or printed on a label, or may be displayed by the device or by software associated with the device. If the device password is displayed in this way, it may be dynamic (for example, the displayed password may be valid for a period of time or until some event occurs, then a new device password may be chosen and displayed). In some embodiments, the device password may be readable by a reader device near the new client. For example, Near Field Communication (“NFC”) devices can exchange data wirelessly over a short distance, so a device password might be stored in an NFC token and read by an NFC reader. In another embodiment, the new WLAN client might be equipped with an infrared or other light signal transmitter, and be able to transmit the device password to an optical receiver of the Registrar within line-of-sight proximity. These and other known techniques may be used to perform an OOB data transfer between the new device and the existing device in the environment, e.g., the Registrar, to facilitate establishing the secure communication channel.
  • As noted above, it is presumed that an in-band communication channel can be (or already is) compromised. A typical example of a high-risk in-band channel is a public wireless “hotspot,” e.g., a place providing public network access, or a hotel room network connection. To avoid the new device being compromised when it is introduced, in various embodiments, an initial OOB data transfer with the new device is performed to bootstrap establishing a secure communication channel over which to then configure the new device. For example, assuming the OOB data contains cryptosystem data, the new device and Registrar, or other existing device, proxy, etc., use the cryptosystem data to establish a secure communication channel with the new device. It will be appreciated various cryptographic protocols and techniques may be used; in some embodiments, the new device may request a Registrar, Framework Protocol Stack (see, e.g., the FIG. 4 embodiment) or other entity or programmatic construct to act as a certificate authority (CA) for cryptographic, e.g., X.509, type certificates.
  • FIG. 2 illustrates a flow chart 200 according to one embodiment to securely transfer a credential such as a WEP key from the Registrar to the client. Registrar 116, AP 102 and client 114 can interact according to FIG. 2. All messages can be sent in-band (for example, over the wireless communication channel), or some messages can be sent over a different channel. The embodiment described with reference to this figure uses the Extensible Authentication Protocol (“EAP”), as described in the Internet Engineering Task Force (“IETF”) Request for Comments (“RFC”) number 3748 dated June 2004, as a framework for transmitting and receiving many of the messages in the protocol. However, it will be appreciated messages according to embodiments of the invention can be used with other communication frameworks, or transmitted as raw data over any sort of communication channel. Further it will be appreciated that the following FIG. 2 discussion is of a high level and for clarity in presentation some encryption details have been left out.
  • First, the client's device password is provided to the Registrar 202. This may be accomplished by reading the password from the client's label or display and entering it through a Registrar user interface, by placing the client near the Registrar so that the Registrar can read the client's NFC token automatically, or via some other OOB method. Next, after initiating the EAP transaction 204 (not illustrated), the client transmits a first message (“M1”) (encapsulated within an EAP message) to initiate the introduction protocol with the Registrar. M1 contains a first random number N1 and a public key PKE of the client, and may contain other information (described below). M1 is received by the Registrar 206.
  • The Registrar responds to M1 by transmitting a second message (“M2”) containing a second random number N2 and a public key PKR of the Registrar 208. The client receives M2 210. The transaction continues with the client transmitting a message Mn 212 and the Registrar responding with message Mn+1 214. Portions of each message may be encrypted with a key known to both the client and the Registrar, or with a public or private key of one of the parties. Messages may have appended a message authentication code (“HMAC”), containing a cryptographic hash of the previous message and a portion of the current message preceding the MAC, to permit the recipient to verify that the other party correctly received the previous message and that no third party is tampering with the messages in transit.
  • The key used to compute the HMAC in one or more of the messages from the Registrar is authenticated using a device password that should match the client's own device password. This permits the client to verify that it is receiving credentials from an authorized Registrar (and not, for example, from a rogue Registrar that is attempting to trick the client into connecting to a hostile wireless network). One or more of the messages from the Registrar contains a credential such as a WEP or WPA key that the client can use to access the wireless LAN through the AP. The credential may be encrypted with a key-encryption key to prevent its recovery by an eavesdropper. When the client receives the message containing the credential, it verifies the HMAC to ensure the message came from a Registrar with knowledge of its own device password 216, e.g., in one embodiment a test is performed to ensure mutually proved knowledge of the device password was received. If the passwords differ, the client aborts the EAP transaction by transmitting a negative acknowledge (“NACK”) message 218. If the HMAC correctly verifies knowledge of the device password, the client may decrypt the credential and store it in a configuration database for future use 220.
  • Once the client has successfully received the credential, in an EAP context, the session is terminated. For example, this may be performed by transmitting a “Done” response to the Registrar 222, which receives the “Done” message 224 and responds with an EAP “Fail” message 226. The client subsequently receives the “Fail” message 228. Note that in this context, the failure message does not mean that the client must repeat the EAP transaction to obtain a credential. It merely indicates that the transaction was used to provision a credential rather than to grant the client immediate use of the wireless LAN. The client may use the credential it received later, when it attempts to access the network through the AP 230. For example, the client may update its configuration according to data in the credential, or may use the credential to complete a new authentication protocol transaction designed to provide network access.
  • After successfully establishing communication with an introduced device, as will be discussed further below, configuring communication parameters and communication configurations for the devices may also be performed. For example, by establishing trust between the devices and a registrar, credentials may be exchanged between the devices to facilitate establishing trust between the devices. Or, bandwidth requirements for devices may be configured to control device inter-communication as well as communication to locations external to the environment.
  • FIG. 3 illustrates, according to one embodiment, a framework 300 for establishing initial trust relationships between devices and communicating these trust relationships, e.g., between various operating system, device driver, and application software components.
  • In one embodiment, an Application Framework 302 is built on device introduction mechanisms, such as those described above with respect to FIGS. 1-2. In one embodiment, the Application Framework is initialized after sending the Done message and before responding with the Fail message and terminating the EAP session. It will be appreciated by one skilled in the art the FIGS. 1-2 EAP discussion is exemplary and any message transport protocol may be used for credential setup. The illustrated Application Framework may be used by any application or device to bootstrap a secure communication channel. It will be further appreciated that device discovery techniques, such as wireless or wired network discovery data probes, Universal Plug and Play (UPnP) operations, or other discovery techniques may be used to announce a new device's presence in an environment, locate Registrars or other devices of the environment, and manage networked devices. An Application Programming Interface (API) or Software Development Kit (SDK) may also be defined to provide functions to perform the operations and techniques discussed herein for discovering, registering and configuring devices within an environment.
  • In the illustrated embodiment, the below line 304 components 306-312 may be standardized or become well-defined by a Specification, such as described in the “Wi-Fi Simple Config Proposal”, the most current version at this time being Revision 1.0a dated Feb. 10, 2006. Below the line 304 components 306-312 include an In-Band media manager 306 for managing a conventional communication connections such as a Bluetooth link, an Institute of Electrical and Electronics Engineers (IEEE) 802.x type of WLAN link, etc. It is presumed this in-band communication channel is susceptible to attack.
  • There is also an Out-Of-Band (OOB) media manager 308 for managing OOB communication channels, such as the various exemplary communication channels discussed above. The OOB communication channel is presumed difficult to attack and hence is therefore deemed trustable for initial data exchanges to establish secure communication over the not-trusted in-band channel.
  • In one embodiment, a Registrar or other managing device may have associated policies that control what characteristics or features of a new device that may be allowed to become active. For example, while a new device may support instant messaging, the Registrar may be configured to ignore and/or not configure such features of software for a new device. This allows a user or other environment administrator to selectively allow resource access, e.g., to implement “guest” access. It will be appreciated restricting access may be based on automatically applied policies (or their equivalent) as well as through interaction with a user or other environment administrator. It will be appreciated various device characteristics, such as device type, owner, bandwidth or other resource requirements, well-behaved time in the environment, etc. may be used as decision factors in granting rights to a device. Thus for example, a telephony device may be brought into the environment and automatically only be granted access to resources compatible with the nature of the device, e.g., to conference data streams, audio portions of audiovisual data, etc.
  • In addition to an environment restricting a device's access, the device itself may impose its own access limitations, such as to protect itself from intrusion or to maximize its operation duration. For example, while an environment may support and/or allow certain activity, such access to streaming media, a particular device may nonetheless have its own local policy such that the device does not utilize the activity even though present and available in the environment. For example, security conscious device owners disallow activity even if offered in a particular environment, such as file sharing in a public access network hotspot. Or, if battery levels are low, a device may be configured to ignore battery intensive features available within an environment.
  • In one embodiment, each application that registers (or that has already registered), such as with the Application Framework 302 can be identified in an interface (not illustrated), such as a Graphical User Interface (GUI) for receiving user input, or to an automatic interface to process registrations, where the interface provides opportunity for a user or automatic registration processor to enforce a local policy or user interest in permitting, denying, or modifying an application's registration. For example, the “guest” access discussed above can be interactively enforced for a device introduced into an environment by, during introduction of the device, recognizing it is a foreign device and checking for applicability of rules, policies, or the like and prompting (if needed) a user by way of a GUI or other interface for access rights for this new device. Thus, a guest device of a visiting friend may be given restricted access in the environment, such as only being allowed to engage in certain types of communication, e.g., to grant or deny Internet access, to grant or deny music streaming, to time limit access to the environment, etc.
  • FIG. 4 illustrates a flowchart 400 according to one embodiment for registering for and monitoring for device introductions to an environment. It will be appreciated a device may have multiple software and/or hardware applications or functionality that may be registered 402, such as with a FIG. 1 Registrar 116.
  • In the illustrated embodiment, a test is performed to check a newly added device to see if 404 restrictions are applicable to the device. It will be appreciated some devices, such as those previously registered with the system, or devices having a certain characteristic such as a digitally secured trust certificate or other trusted characteristic authenticated by a trusted party such as a CA (Certificate Authority) or other authority recognized by the environment may bypass the restriction checks. If 404 restrictions apply to the new device or functionality, service access restrictions and device configurations may be established 406-410. It will be appreciated while items 406-410 are illustrated sequentially, operations may occur in parallel or in a different order than as illustrated, and in some cases only selected operations are performed.
  • As discussed above and as will be discussed further with respect to FIG. 5 and FIG. 6, it may be desirable to establish 406 limited rights or guest access rights to an introduced device, such as to prevent local area network (LAN) file access, restrict access to bandwidth consuming services, etc. As discussed above, restrictions may be applied automatically and/or interactively through a GUI or other interface. For example, there may be situations where a user or environment administrator desires to allow only temporary device access to a network, such as when a visitor comes with a device, such as a Personal Digital Assistant (PDA), music player, camera, etc., and wants the visiting device to connect to the internet, share files with the user, play songs from the music player on a wireless or wired local area network (LAN) capable stereo system, share pictures from a camera, print pictures on a printer in the environment, etc.
  • In order for the visitor to perform these tasks, the user and/or administrator needs to grant necessary credentials to the visitor's device for it to perform desired tasks within the environment, e.g., to allow it network access and/or access to devices within the host environment. However, as will be appreciated, users or environment administrators do not want to give the visiting device unrestricted environment access but instead wants to carefully control the extent of network access the visitor's device receives. As discussed above with respect to FIG. 3 guest access or other device restrictions may be determined when introducing a device to an environment.
  • In one embodiment, restrictions are enforced with dynamic filters implemented on an Access Point (AP), router, gateway or other such device through which network access is obtained. In one embodiment environment devices and resources are accessible through their own physical and/or logical network reachable through an AP, router, gateway, etc. When registering a guest device in this embodiment, the user or environment administrator has the option of enforcing access restrictions on the new device. It will be appreciated defaults may be assigned for common interests such as Internet access, file access, etc. Access rights may be directly managed by a Registrar, and/or defaults and device specific restrictions may be communicated by the Registrar to an AP, router, gateway, etc. that is positioned to restrict environment access and able to establish access control lists (ACLs), filters, or the like as necessary to restrict access as desired.
  • Thus, it will be appreciated that after completing registration of a device with the environment, if the guest device wants to access specific resources such as shares or devices for which access was not initially granted, the user or environment administrator can enable such access via the Registrar. For example, as discussed above, a GUI may be used to interactively control initial device access and such a GUI may also be used to change access permissions. In one embodiment, the Registrar is configured to enumerate available resources within the environment, e.g., shares, or input and/or output devices on the network, such as printers, stereo systems, speakers, etc. The user or administrator may select devices and shares a guest device may access. If access is not directly managed by the Registrar, the Registrar communicates access changes to the AP, router, gateway, etc. which is controlling access and it sets up appropriate ACLs, filters, etc. corresponding to the changed access rights.
  • Note that ACLs may be as simple as IP and/or MAC address and/or port-based filters, or may be more advanced, depending on the capability of the Registrar, AP, router, gateway, etc. limiting access to environment resources. The guest device obtains access only to specified portions of the network, and will be unable to view or access other resources within the user's network. It will be appreciated guest access rights may be configured to automatically expire, e.g., time out, or be revoked on certain conditions, such as when the guest device leaves the environment.
  • In addition to establishing 406 access rights, it may also be desired to establish 408 communication restrictions. For example, when a device is introduced and its applications and/or functionality registered 402, during the registration process characteristics of the device may be tracked or recorded, such as knowledge that the device is an audio only device such as a telephone, has only a black and white screen, has limited processing power, etc. In the audio only case, for example, communication features discoverable by, or otherwise accessible by, the device may be established in accord with the device's characteristics. For example, if an audio only device seeks to join an audiovisual based conference, the device may be introduced into the conference as an audio only device where all video functionality is automatically disabled, and more particularly, no attempt is made to send video data to the audio only device. Such intelligent data routing may significantly decrease the bandwidth requirements for the audio only device as well as improve bandwidth or other resource performance for other devices having more burdensome requirements.
  • In addition to establishing 408 communication restrictions, communication aggregation 410 may also be performed. As discussed with respect to FIG. 5 and FIG. 6 below, if multiple devices are engaging in a common task, conventional arrangements typically require each device to individually establish requisite connections while participating in the common task. Common tasks include, for example, streaming audio data, such as music or voice communication, transferring video data such as related to a movie presentation, video conference, video telephone, etc., Voice over IP (VoIP), instant messaging, collaboration applications, and the like. As will be discussed with FIG. 5, significant bandwidth may be wasted in having multiple devices all trying to individually communicate with every other device. Instead of such cross-communication, in various configurations communication aggregation may be performed to simplify communication requirements. In one embodiment, when a common communication nexus such as a gateway, router, firewall, etc. is by several devices to the common task, it may be used to cross-connect devices communicating through it and maintain multiple communication lines on behalf of the devices using the nexus. This thus simplifies the operation of the devices as they need only maintain communication with the nexus, from which the devices will receive the communications from all the other devices. In addition to freeing bandwidth, simplification reduces cost and facilitates home appliance type devices.
  • Once a device is registered 402, and restrictions 406-410 processed, an association 412 is recorded between a device and its hardware or other software devices that need to know about the introduction of the device, and monitoring 414 is performed for new devices being added to the environment. In the illustrated embodiment, a FIG. 3 Application Framework monitors device introductions. In another embodiment, a FIG. 1 registrar 116 monitors device introductions. As devices are introduced, already registered applications (if any) for the new device are notified when the introduction is complete so that they can engage in data exchanges to provide for automatic configuration of the new device.
  • In the illustrated embodiment logically processing continues with checking if 416 there was a new device introduction. If 416 a new device is not seen, processing loops back with monitoring 414 for device introductions. The loop 416 back is shown as a dotted line to suggest that processing might not literally loop directly back since a system implementing the illustrated embodiment may perform other tasks and/or processes not illustrated before returning to the monitoring 414. If 416 a new device was introduced, a check 418 is performed to determine if it has associated (registered) apps. If 420 so, those apps are notified 422 to trigger their responsive action to the introduction, e.g., to configure the device or take some other action. If 416 there was no new device, or if 420 there are no associated applications, or after notifying 422 associated applications, processing loops back to monitoring 414 for new devices.
  • By providing automatic applications triggering on device introduction, this reduces the burden on an end user in having to know what software to run to configure the new device to work in an existing network, what order to attempt to utilize the software, how to effectively limit access to the network for guest devices, etc. Similarly, by providing a way to automatically interrogate introduced devices to identify and handle restrictions 406-410, an end user is able to more simply limit device access to the user's network, and also have opportunity to aggregate devices (if possible) to minimize burden and consumption of the user's resources. Note multiple applications may be registered with a device and that priority and/or execution ordering data may be associated with the applications and/or restrictions to capture dependencies that may exist between the applications, e.g., to allow designating that one application needs to be run before another, or to limit application access in accord with restrictions.
  • It will be appreciated various features and functions described herein may be provided by way of an API available for use by a Registrar or other device and/or software of a particular environment, such as application software illustrated in FIG. 3 items 316, 318, in an operating system, or by another application to perform the foregoing operations. In one embodiment, an Expert System with appropriate rule sets may be used by the FIG. 3 Application Framework 302 to analyze whether existing device configurations can and/or should be modified in light of new device introduction, such as to take advantage of services now available from the new device. An expert system may also be used to control the execution order of associated applications, if needed, when multiple applications registrations exist for a device.
  • It will be appreciated device may be introduced in a variety of ways, such as, for example, by activating a wireless transceiver, pressing an “install” button or switch, plugging the device in to a bus communicatively coupled with the Application Framework, etc. When the new device is recognized, e.g., FIG. 4 item 416, an installation “wizard” may become active on a Registrar and/or or on a user interface for the new device. In embodiments utilizing an API implementing functions to perform operations described herein, a callback function could be called to trigger execution 414 of the appropriate application(s). The installation wizard itself would have previously registered 402 itself for all devices. Once the wizard is active, as needed, it may provide instructions and/or configuration questions to a user to assist with installing the new device. While in some cases no intervention by the user is required, thus making matters very simple for a user, in other cases, such as when assigning device restrictions, configuring communication aggregation, or introducing a wireless access point, it may respectively be desirable to prompt a user for access rights, aggregation parameters, a SSID (service set identifier) or other personalization data to associate with the new device, etc.
  • FIG. 5 illustrate two different but common device configurations that may be found in a personal or commercial networked environment such as a Digital Home or Office LAN environment. FIG. 5A illustrates a typical peer to peer (P2P) type of conference 500, in which every device 502-506 (e.g., conference endpoints) is required to establish a communication connection with every other device in the conference, such as outside endpoints 508-512. As illustrated, this results in a lot of cross-communication, bandwidth consumption, and communication complexity due to the many crossing communication lines 514 between the devices 502-512.
  • Such overhead is especially burdensome in some configurations in which devices participating in a common task, such as a conference, share a common network access, such as a gateway, firewall or other device 516 as illustrated in FIG. 5B. In the FIG. 5B embodiment, all devices 502-512 need to establish a communication connection to every other device, however, since several 502-506 of the devices are behind a common communication nexus 516 such as a gateway, firewall, or the like, this device 516 bears the burden of passing all communication between inner 502-506 and outer 508-512 devices, which also may result in the nexus 516 being a bottleneck. Combining related communication and/or other data transfers may significantly facilitate communication by multiple devices engaging in the common task.
  • Thus, rather than have multiple devices 502-506 operate independently, instead, in one embodiment, when registering/introducing devices in an environment, e.g., as discussed above with respect to FIG. 4, devices may be evaluated for whether they support functionality that may be aggregated with other devices if such devices are engaged in a common task. For example, as illustrated in the FIG. 6 system 600 of devices, if devices 602-606 all support a particular task, such as conferencing (which includes audio and/or visual conferencing, data conferencing, etc.), the devices are instructed during registration or introduction to use an aggregation communication mode instead of a conventional communication mode. In the illustrated embodiment, the devices are all communicatively coupled by way of a network 608 and communicate through a common communication nexus 610 referred to herein as a such as a Media Gateway Device (MGD). As illustrated the MGD also incorporates the Registrar, e.g., FIG. 1 item 116, to which devices are introduced. As will be appreciated a MGD incorporates data handling capabilities of a gateway, firewall, or the like, along with aggregation features (and Registrar features if present) discussed below.
  • Thus, in contrast with the FIG. 5 configurations having complex communication lines 514 between devices 502-512, for devices 602-606 sharing a MGD or equivalent devices as a common communication nexus, the devices establish individual communication connections 612-616 with the MGD 610, e.g., over their local wired and/or wireless network 608. The MGD then establishes connections 618 as needed to outside (e.g., with respect to local network(s) 608) end points 622-626. Note only three connections as illustrated are required for all three internal devices 602-606 to communicate with the outside endpoints, and similarly, while the outside devices 622-626 require a conventional burdensome communication lines 620 to communicate with each other, they only need to establish communication with the MGD in order to engage in the common task with the inside end points 602-606. In one embodiment, the outside endpoints are aware of the MGD and hence pursuant to a protocol agreed upon by the endpoints and MGD, each outside endpoint establishes a single communication line 620 to the MGD, e.g., over the Internet or other network 628 communicatively coupling the endpoints 602-606, 622-626 with the understanding the MGD will convey data as needed to the inside endpoints. In another embodiment, each of the illustrated communication lines 620 represents three communication lines from each outside endpoint to each inside endpoint, however, each of these routes to the MGD since it remains the common communication nexus for the inside endpoints.
  • In one embodiment, based on the characteristics of the devices 502-506, the MGD may attempt to establish a more optimal communication for the device as well as for the communication with outside endpoints 622-626 through the MGD or other gateway, firewall, router, etc. For example, if device 602 is an audio-only telephone, even if the telephone attaches to an audiovisual conference, the MGD can automatically strip out video data from other participants to simplify what data 612 the telephone is required to process. This type of proxying for the telephone also allows the MGD to act as a transcoder to allow incompatible devices to engage in activities not ordinarily supported, such as a video conference on an audio-only device. It will be appreciated that various device characteristics may be determined when registering or introducing a device, such as network interface card (NIC) speed, audio capabilities or associated codecs, video capabilities or associated codecs, screen size, resolution, output abilities, camera specifications, text capabilities, specific application support (Skype™, Instant Messaging, VoIP applications, collaboration applications, etc.), and decisions made regarding aggregation, transcoding, and the like.
  • Consider a Digital Home scenario in which the MGD 610 is used to set up conference calls with the outside endpoints 622-626 for internal home devices 602-606 that wish to join these calls. In this scenario, the MGD also functions as a home media server, and hence is capable of streaming media to endpoint devices in the home. It will be appreciated that the devices may have wired and/or wireless connections to the MGD. Once devices have been registered and authorized to access resources of the network 608, the MGD reviews the discovered capabilities of the newly introduced device. It will be appreciated the MGD may directly receive these capabilities if it is collocated with a Registrar, or this information is passed to the MGD (e.g., by way of a push or pull mechanism) after successful registration or introduction of a device. The MGD may also be configured to poll for capabilities responsive to monitored execution of certain applications, e.g., in FIG. 3 application layer 302, using a device within the environment, such as communication software executed on an endpoint 602-606.
  • As discussed above with respect to FIGS. 1-2, during registration with a Registrar, the registrant and Registrar exchange cryptographic data so that devices can establish secure communication sessions, e.g., Transport Layer Security (TLS), Internet Protocol Security (IPSec), etc. sessions between themselves and the MGD. In one embodiment, the MGD sets up a conference call with outside entities, e.g., between outside endpoints 622-626 and inside devices 602-606 in the Digital Home. In the illustrated embodiment there is a single MGD; it will be appreciated there may be multiple MGDs each communicatively coupled so as to tie together multiple sub-networks of devices. Logically, multiple MGDs, if present, may operate as a single MGD. In the illustrated embodiment, each device sets up a session with the MGD, which in turn multiplexes all media streams and sends them to the outside devices participating in the common communication task, e.g., the conference call.
  • In one embodiment, once the common communication task is established for one of the devices through the MGD, other devices may choose to participate as well through the MGD. When another device enters the call, the MGD uses the device capability information provided and/or discovered when the device joined the network, e.g., during registration or introduction, to mediate the media traffic, determine what data ad/or media streams get sent to particular devices, and transcode or otherwise scale data, such as to reduce high resolution images for small screen sizes, such as for a cell phone or to remove the video entirely, to reduce audio bitrates, etc. A more powerful device such as a desktop or laptop computer engaging in the common communication task will, however, receive complete media streams since such devices are able to support higher capabilities. In one embodiment, the MGD functions as a multiplexer/de-multiplexer for the endpoint communications. In one embodiment, the MGD collates incoming streams from devices 602-606 and sends them out as a single stream to an outside endpoint 622-626. Similarly, in this embodiment, the MGD receives data for the common communication task from each of the outside endpoints and combines them into a single data stream provided to each of the inside endpoints.
  • In some embodiments, for shared tasks such as the conference example discussed above, it may be important to be able to establish secure connections between participants to prevent eavesdropping on the conference, as well as to enable each party to be confident of the authenticity of other parties in the conference. It will be appreciated such security information can be established during registration or introduction of devices and shared with other conference participants. In particular, in one embodiment, the Registrar (or MGD incorporating the Registrar) receiving device registration acts as a local Certificate Authority (CA) and hence may act as an authority as to the identity of devices within an environment thus allowing devices within the environment to validate the identity of other devices as desired. It will be appreciated conference participants or other endpoints may establish trust relationships with the MGD and indirectly establish trust with other conference participants or endpoints based at least in part on knowledge the other participants or endpoints have similarly established trust relationships with the MGD.
  • FIG. 7 and the following discussion are intended to provide a brief, general description of a suitable environment in which certain aspects of the illustrated invention may be implemented. As used herein below, the term “machine” is intended to broadly encompass a single machine, or a system of communicatively coupled machines or devices operating together. Exemplary machines include computing devices such as personal computers, workstations, servers, portable computers, handheld devices, e.g., Personal Digital Assistant (PDA), telephone, tablets, etc., as well as transportation devices, such as private or public transportation, e.g., automobiles, trains, cabs, etc.
  • Typically, the environment includes a machine 700 that includes a system bus 702 to which is attached processors 704, a memory 706, e.g., random access memory (RAM), read-only memory (ROM), or other state preserving medium, storage devices 708, a video interface 710, and input/output interface ports 712. The machine may be controlled, at least in part, by input from conventional input devices, such as keyboards, mice, etc., as well as by directives received from another machine, interaction with a virtual reality (VR) environment, biometric feedback, or other input source or signal.
  • The machine may include embedded controllers, such as programmable or non-programmable logic devices or arrays, Application Specific Integrated Circuits, embedded computers, smart cards, and the like. The machine may utilize one or more connections to one or more remote machines 714, 716, such as through a network interface 718, modem 720, or other communicative coupling. Machines may be interconnected by way of a physical and/or logical network 722, such as the network 108 of FIG. 1, an intranet, the Internet, local area networks, and wide area networks. One skilled in the art will appreciated that communication with network 722 may utilize various wired and/or wireless short range or long range carriers and protocols, including radio frequency (RF), satellite, microwave, Institute of Electrical and Electronics Engineers (IEEE) 802.11, Bluetooth, optical, infrared, cable, laser, etc.
  • The invention may be described by reference to or in conjunction with associated data such as functions, procedures, data structures, application programs, etc. which when accessed by a machine results in the machine performing tasks or defining abstract data types or low-level hardware contexts. Associated data may be stored in, for example, volatile and/or non-volatile memory 706, or in storage devices 708 and/or associated storage media, including conventional hard-drives, floppy-disks, optical storage, tapes, flash memory, memory sticks, digital video disks, etc., as well as more exotic mediums such as machine-accessible biological state preserving storage. Associated data may be delivered over transmission environments, including network 722, in the form of packets, serial data, parallel data, propagated signals, etc., and may be used in a compressed or encrypted format. Associated data may be used in a distributed environment, and stored locally and/or remotely for access by single or multi-processor machines. Associated data may be used by or in conjunction with embedded controllers; hence in the claims that follow, the term “logic” is intended to refer generally to possible combinations of associated data and/or embedded controllers.
  • Thus, for example, with respect to the illustrated embodiments, assuming machine 700 embodies the FIG. 1 Registrar, then remote machines 714, 716 may respectively be FIG. 1 Client 114 and Station 104. It will be appreciated that remote machines 714, 716 may be configured like machine 700, and therefore include many or all of the elements discussed for machine.
  • Having described and illustrated the principles of the invention with reference to illustrated embodiments, it will be recognized that the illustrated embodiments can be modified in arrangement and detail without departing from such principles. And, though the foregoing discussion has focused on particular embodiments, other configurations are contemplated. In particular, even though expressions such as “in one embodiment,” “in another embodiment,” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the invention to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments.
  • Consequently, in view of the wide variety of permutations to the embodiments described herein, this detailed description is intended to be illustrative only, and should not be taken as limiting the scope of the invention. What is claimed as the invention, therefore, is all such modifications as may come within the scope and spirit of the following claims and equivalents thereto.

Claims (25)

1. A method for introducing devices into an environment and managing introduced devices such as to establish complimentary relationships, restrict resource access, and establish peer device trust, the method comprising:
introducing a first device into the environment, the introducing comprising establishing a temporary link between the device and a nexus communicatively coupling the first device to the environment, and exchanging security credentials for establishing a secure link over the temporary link; and
determining contemporaneously with the introducing if operational restrictions or functionality aggregation should be applied to the first device.
2. The method of claim 1, further comprising:
introducing a second device into the environment;
comparing a capability of the first device with a corresponding capability of a second device communicatively coupled with the environment; and
based at least in part on the comparing, determining transcoding is required to communicatively couple said capabilities of the first and second devices.
3. The method of claim 1, wherein said operational restrictions include selectively limiting access by the first device to resources of the environment, or limiting communication by the first device.
4. The method of claim 3, wherein limiting communication by the first device comprises a selected one of:
blocking network traffic from the first device corresponding to the limited communication, or
instructing the first device to disable an operational feature corresponding to the limited communication.
5. The method of claim 1, further comprising:
providing a user interface (UI) having controls for at least configuring the assigning operational restrictions or functionality aggregation.
6. The method of claim 5, wherein the UI is automatically invoked during the introducing of the first device.
7. The method of claim 1, further comprising:
establishing a common communication task between the first device and a second and third device outside of the environment and a fourth device within the environment; and
aggregating network communication from the second, third, and fourth devices corresponding to at least the common communication task.
8. The method of claim 1, further comprising:
identifying multiple devices communicatively coupled with the first device share a common functionality with the first device; and
aggregating network communication from said multiple devices corresponding to the common functionality and routing an aggregated communication to the first device.
9. The method of claim 8, wherein the common functionality is a conferencing functionality.
10. The method of claim 9, wherein the conferencing functionality includes audiovisual conferencing, the method further comprising:
prior to said aggregating, transcoding said network communication from said multiple devices to reduce video bandwidth.
11. The method of claim 1, in which a registrar processes device introductions in the environment, the method further comprising:
introducing a second device into the environment; and
establishing trust between the first and second devices, the establishing trust including the registrar providing the first device with a credential of the second device, and the registrar providing the second device with a credential of the first device;
wherein the first and second devices trust credentials provided by the registrar.
12. A system of devices inside or outside an environment and communicatively coupled therewith, the system comprising:
at least one outside endpoint to a common communication task; and
a plurality of inside endpoints to the common communication task, the inside endpoints communicatively coupled with a media gateway device aggregating data of the inside endpoints for the common communication task and communicatively coupling the inside endpoints with the at least one outside endpoint.
13. The system of claim 12,
wherein the common communication task expects a full complement of communication links, the full complement being a communication link between one endpoint and every other endpoint to the common communication task, and
wherein the media gateway device facilitates an inside endpoint having fewer communication links than the full complement.
14. The system of claim 13, wherein the inside endpoint maintains one communication link to the media gateway device, the media gateway device operable to aggregate communication from other endpoints over the one communication link.
15. The system of claim 13, wherein outside endpoints to the communication task maintain the full complement of communication links.
16. The system of claim 12, further comprising:
a certificate authority communicatively coupled with the inside endpoints and configured to facilitate trust between at least the inside endpoints.
17. The system of claim 16, wherein the facilitated trust comprises identity verification.
18. The system of claim 16, further comprising a registrar configured to process an introduction of each one of the plurality of inside endpoints to the environment, and during said introduction, to identify device functionality of the plurality to aggregate.
19. The system of claim 18, wherein the certificate authority is disposed within the registrar.
20. A machine accessible tangible medium having associated instructions for introducing devices into an environment and managing introduced devices such as to establish complimentary relationships, restrict resource access, and establish peer device trust, the instructions, which when accessed, results in one or more machines performing:
introducing a first device into the environment, the introducing comprising establishing a temporary link between the device and a nexus communicatively coupling the first device to the environment, and exchanging security credentials for establishing a secure link over the temporary link; and
determining contemporaneously with the introducing if operational restrictions or functionality aggregation should be applied to the first device.
21. The medium of claim 20, wherein the instructions include further instructions, which when accessed, results in one or more machines performing:
introducing a second device into the environment;
comparing a capability of the first device with a corresponding capability of a second device communicatively coupled with the environment; and
based at least in part on the comparing, determining transcoding is required to communicatively couple said capabilities of the first and second devices.
22. The medium of claim 20, wherein the instructions include further instructions, which when accessed, results in one or more machines performing:
providing a user interface (UI) having controls for at least configuring the assigning operational restrictions or functionality aggregation, the UI being automatically invoked during the introducing the first device.
23. The medium of claim 20, wherein the instructions include further instructions, which when accessed, results in one or more machines performing:
establishing a common communication task between the first device and a second and third device outside of the environment and a fourth device within the environment; and
aggregating network communication from the second, third, and fourth devices corresponding to at least the common communication task.
24. The medium of claim 20, wherein the instructions include further instructions, which when accessed, results in one or more machines performing:
identifying multiple devices communicatively coupled with the first device share a common functionality with the first device; and
aggregating network communication from said multiple devices corresponding to the common functionality and routing an aggregated communication to the first device.
25. The medium of claim 24, wherein the common functionality includes audiovisual conferencing, the instructions including further instructions, which when accessed, results in one or more machines performing, prior to said aggregating, transcoding said network communication from said multiple devices to reduce data transfer requirements of said network communication.
US11/514,452 2006-09-01 2006-09-01 Secure device introduction with capabilities assessment Abandoned US20080072292A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US11/514,452 US20080072292A1 (en) 2006-09-01 2006-09-01 Secure device introduction with capabilities assessment
CN2007800284497A CN101523798B (en) 2006-09-01 2007-08-23 Secure device introduction with capabilities assessment
EP13004539.6A EP2677788B1 (en) 2006-09-01 2007-08-23 Method and system for data aggregation for communication tasks common to multiple devices
PCT/US2007/076633 WO2008105922A2 (en) 2006-09-01 2007-08-23 Secure device introduction with capabilities assessment
EP07873783A EP2076994A4 (en) 2006-09-01 2007-08-23 Secure device introduction with capabilities assessment
US13/337,666 US8464322B2 (en) 2006-09-01 2011-12-27 Secure device introduction with capabilities assessment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/514,452 US20080072292A1 (en) 2006-09-01 2006-09-01 Secure device introduction with capabilities assessment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/337,666 Division US8464322B2 (en) 2006-09-01 2011-12-27 Secure device introduction with capabilities assessment

Publications (1)

Publication Number Publication Date
US20080072292A1 true US20080072292A1 (en) 2008-03-20

Family

ID=39190197

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/514,452 Abandoned US20080072292A1 (en) 2006-09-01 2006-09-01 Secure device introduction with capabilities assessment
US13/337,666 Expired - Fee Related US8464322B2 (en) 2006-09-01 2011-12-27 Secure device introduction with capabilities assessment

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/337,666 Expired - Fee Related US8464322B2 (en) 2006-09-01 2011-12-27 Secure device introduction with capabilities assessment

Country Status (4)

Country Link
US (2) US20080072292A1 (en)
EP (2) EP2677788B1 (en)
CN (1) CN101523798B (en)
WO (1) WO2008105922A2 (en)

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060053276A1 (en) * 2004-09-03 2006-03-09 Lortz Victor B Device introduction and access control framework
US20080065234A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Power Management Using a Wireless Home Entertainment Hub
US20080066094A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Control of Data Presentation in Multiple Zones Using a Wireless Home Entertainment Hub
US20080061578A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Data presentation in multiple zones using a wireless home entertainment hub
US20080065238A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Presentation of Still Image Data on Display Devices Using a Wireless Home Entertainment Hub
US20080066118A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Connecting a Legacy Device into a Home Entertainment System Useing a Wireless Home Enterainment Hub
US20080141329A1 (en) * 2006-09-07 2008-06-12 Technology, Patents & Licensing, Inc. Device Control Using Multi-Dimensional Motion Sensing and a Wireless Home Entertainment Hub
US20080195620A1 (en) * 2007-02-14 2008-08-14 Microsoft Corporation Nearby Media Device Tracking
US20080195621A1 (en) * 2007-02-14 2008-08-14 Microsoft Corporation Media Device Presence Management
US20090183238A1 (en) * 2008-01-15 2009-07-16 Axis Ab Method and devices for handling access privileges
US20090265765A1 (en) * 2008-04-22 2009-10-22 General Instrument Corporation System and Methods for Managing Trust in Access Control Based on a User Identity
US20090265551A1 (en) * 2008-04-22 2009-10-22 General Instrument Corporation System and Methods for Access Control Based on a User Identity
US20090290520A1 (en) * 2008-05-21 2009-11-26 Microsoft Corporation Wireless network host in silent mode
US20100157960A1 (en) * 2008-12-18 2010-06-24 Microsoft Corporation Wireless access point supporting control by multiple applications
US20100217705A1 (en) * 2009-02-26 2010-08-26 Canon Kabushiki Kaisha Communication apparatus, and control method for communication apparatus
US20100220586A1 (en) * 2009-02-27 2010-09-02 Research In Motion Limited Route reflector for a communication system
US20110066711A1 (en) * 2009-04-17 2011-03-17 Prem Jothipragasam Kumar Management of shared client device and device manager
US8005236B2 (en) 2006-09-07 2011-08-23 Porto Vinci Ltd. Limited Liability Company Control of data presentation using a wireless home entertainment hub
WO2011100478A3 (en) * 2010-02-10 2011-10-06 Qualcomm Incorporated In- band provisioning of a device at a closed subscriber group
US20120005323A1 (en) * 2010-07-01 2012-01-05 Li Gordon Yong Method and system for service discovery and deployment in an ip multimedia network
US8098677B1 (en) 2009-07-31 2012-01-17 Anue Systems, Inc. Superset packet forwarding for overlapping filters and related systems and methods
WO2012094399A2 (en) * 2011-01-05 2012-07-12 Eye-Fi, Inc. Method and system for out-of-band delivery of wireless network credentials
US20130080520A1 (en) * 2011-09-22 2013-03-28 Nokia Corporation Method and apparatus for provisioning resource credentials based on social networking data
EP2665237A1 (en) * 2012-05-16 2013-11-20 Nokia Corporation Method, apparatus, and computer program product for controlling network access to guest apparatus based on presence of hosting apparatus
US20140006571A1 (en) * 2012-07-02 2014-01-02 Fujitsu Limited Process execution method and apparatus
US20140059629A1 (en) * 2012-08-23 2014-02-27 Electronics And Telecommunications Research Institute Two-way broadcast service providing system and method including media transmission apparatus
CN103916695A (en) * 2012-12-31 2014-07-09 三星电子株式会社 Method of receiving connection information from mobile communication device, and digital image-capturing apparatus
US20140213220A1 (en) * 2008-05-13 2014-07-31 At&T Mobility Ii Llc Administration of access lists for femtocell service
US8799648B1 (en) * 2007-08-15 2014-08-05 Meru Networks Wireless network controller certification authority
WO2014149380A1 (en) * 2013-03-15 2014-09-25 Intel Corporation Motion initiated teleconference
US20140298358A1 (en) * 2011-12-14 2014-10-02 Nokia Corporation Method and Apparatus for Providing Optimization Framework for task-Oriented Event Execution
WO2014159782A1 (en) * 2013-03-14 2014-10-02 General Instrument Corporation Automated transfer of a unique identifier for a consumer electronics device
US8902895B2 (en) 2009-07-31 2014-12-02 Anue Systems, Inc. Automatic filter overlap processing and related systems and methods
US8934495B1 (en) * 2009-07-31 2015-01-13 Anue Systems, Inc. Filtering path view graphical user interfaces and related systems and methods
US20150085848A1 (en) * 2012-04-26 2015-03-26 Nokia Corporation Method and Apparatus for Controlling Wireless Network Access Parameter Sharing
US9094891B2 (en) 2008-05-13 2015-07-28 At&T Mobility Ii Llc Location-based services in a femtocell network
EP2922328A1 (en) * 2014-03-21 2015-09-23 Orange Controlled temporary access to a local area network
CN105045609A (en) * 2015-05-28 2015-11-11 深圳光启智能光子技术有限公司 Method for executing and integrating optical wireless communication application function in application
US9197673B1 (en) * 2015-05-18 2015-11-24 A2Zlogix, Inc. System and method for reception and transmission optimization of secured video, image, audio, and other media traffic via proxy
US9233301B2 (en) 2006-09-07 2016-01-12 Rateze Remote Mgmt Llc Control of data presentation from multiple sources using a wireless home entertainment hub
US9246759B2 (en) 2008-06-12 2016-01-26 At&T Mobility Ii Llc Point of sales and customer support for femtocell service and equipment
US9301113B2 (en) 2006-07-12 2016-03-29 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US20160173647A1 (en) * 2011-02-23 2016-06-16 Lookout, Inc. Automatically collecting data from a computing device after launching an application by the computing device
US9467385B2 (en) 2014-05-29 2016-10-11 Anue Systems, Inc. Cloud-based network tool optimizers for server cloud networks
US9509701B2 (en) 2009-10-15 2016-11-29 At&T Intellectual Property I, L.P. Management of access to service in an access point
US9781044B2 (en) 2014-07-16 2017-10-03 Anue Systems, Inc. Automated discovery and forwarding of relevant network traffic with respect to newly connected network tools for network tool optimizers
US9992134B2 (en) 2015-05-27 2018-06-05 Keysight Technologies Singapore (Holdings) Pte Ltd Systems and methods to forward packets not passed by criteria-based filters in packet forwarding systems
US9996397B1 (en) * 2015-12-09 2018-06-12 International Business Machines Corporation Flexible device function aggregation
US10050847B2 (en) 2014-09-30 2018-08-14 Keysight Technologies Singapore (Holdings) Pte Ltd Selective scanning of network packet traffic using cloud-based virtual machine tool platforms
US10116528B2 (en) 2015-10-02 2018-10-30 Keysight Technologies Singapore (Holdings) Ptd Ltd Direct network traffic monitoring within VM platforms in virtual processing environments
US10142212B2 (en) 2015-10-26 2018-11-27 Keysight Technologies Singapore (Holdings) Pte Ltd On demand packet traffic monitoring for network packet communications within virtual processing environments
US10652112B2 (en) 2015-10-02 2020-05-12 Keysight Technologies Singapore (Sales) Pte. Ltd. Network traffic pre-classification within VM platforms in virtual processing environments
CN111491277A (en) * 2020-04-08 2020-08-04 吴义魁 Wireless Internet of things exception handling method, intelligent gateway and related device
EP2741465B1 (en) * 2012-12-04 2021-03-17 Orange Method and device for managing secure communications in dynamic network environments

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172776A1 (en) * 2007-12-31 2009-07-02 Petr Makagon Method and System for Establishing and Managing Trust Metrics for Service Providers in a Federated Service Provider Network
US9979737B2 (en) 2008-12-30 2018-05-22 Genesys Telecommunications Laboratories, Inc. Scoring persons and files for trust in digital communication
US9277401B2 (en) 2013-01-22 2016-03-01 Qualcomm Incorporated Device utilizing an optical signal to access an access point
JP6563416B2 (en) 2014-03-26 2019-08-21 クアルコム,インコーポレイテッド System and method for improving the user experience of applications for proximity-based peer-to-peer mobile computing
WO2015155780A1 (en) 2014-04-08 2015-10-15 Hewlett-Packard Development Company, L.P. Providing device functionality utilizing authorization tokens
WO2016099481A1 (en) * 2014-12-17 2016-06-23 Hewlett-Packard Development Company, L.P. Host a conference call
US9584518B1 (en) 2015-09-09 2017-02-28 Callware Technologies, Inc. Dynamic communications controller
US10320920B2 (en) * 2017-05-23 2019-06-11 Bank Of America Corporation Automatic migration of communication sessions using a private cloud-cloud technology

Citations (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5621729A (en) * 1995-06-07 1997-04-15 Geophonic Networks, Inc. Receiver controlled communication system
US6011782A (en) * 1997-05-08 2000-01-04 At&T Corp. Method for managing multicast addresses for transmitting and receiving multimedia conferencing information on an internet protocol (IP) network
US20020059434A1 (en) * 2000-06-28 2002-05-16 Jeyhan Karaoguz Multi-mode controller
US20030055994A1 (en) * 2001-07-06 2003-03-20 Zone Labs, Inc. System and methods providing anti-virus cooperative enforcement
US20030059434A1 (en) * 2000-08-09 2003-03-27 Andrew Grupe Methods and compositions for treating gastrointestinal tract mucin production associated disease conditions
US20030088651A1 (en) * 2001-11-06 2003-05-08 Wilson Richard A. Dynamic network device reconfiguration
US20030095510A1 (en) * 2001-11-16 2003-05-22 Motorola, Inc. Use and management of groups defined according to a call initiation protocol
US20040263530A1 (en) * 2001-11-06 2004-12-30 David Sahuc Device,method and system for multimedia content adaptation
US20050060411A1 (en) * 2003-09-16 2005-03-17 Stephane Coulombe System and method for adaptation of peer-to-peer multimedia sessions
US20050086346A1 (en) * 2003-10-17 2005-04-21 Meyer Jeffrey D. Access point coupling guests to the internet
US20050094581A1 (en) * 1999-03-02 2005-05-05 Microsoft Corporation Security and support for flexible conferencing topologies spanning proxies, firewalls and gateways
US20050147044A1 (en) * 2000-11-22 2005-07-07 Microsoft Corporation Locator and tracking service for peer-to-peer resources
US20050232247A1 (en) * 2004-04-16 2005-10-20 Noel Whitley Collection of enhanced caller ID information
US20050237377A1 (en) * 2004-04-22 2005-10-27 Insors Integrated Communications Audio data control
US20050257055A1 (en) * 2004-04-28 2005-11-17 Anderson Eric C Device ownership transfer from a network
US20060053276A1 (en) * 2004-09-03 2006-03-09 Lortz Victor B Device introduction and access control framework
US20060056636A1 (en) * 2004-09-14 2006-03-16 Schrum Sidney B Jr Transmit power control for wireless security
US20060101280A1 (en) * 2004-11-08 2006-05-11 Tatsuhiko Sakai Authentication method and system, and information processing method and apparatus
US20060161538A1 (en) * 2005-01-19 2006-07-20 Microsoft Corporation Transcode matrix
US20060183462A1 (en) * 2005-02-11 2006-08-17 Nokia Corporation Managing an access account using personal area networks and credentials on a mobile device
US20060239217A1 (en) * 2005-04-21 2006-10-26 Microsoft Corporation Low power transmission provisioning for wireless network devices
US20060245379A1 (en) * 2005-04-28 2006-11-02 Joe Abuan Multi-participant conference adjustments
US20070005766A1 (en) * 2003-03-17 2007-01-04 July Systems, Inc. Method and system for providing external and internal services through an application intermediation gateway
US20070015463A1 (en) * 2005-06-23 2007-01-18 Microsoft Corporation Provisioning of wireless connectivity for devices using NFC
US20070022185A1 (en) * 2005-07-25 2007-01-25 Stuart Hamilton Simple home networking
US20070055752A1 (en) * 2005-09-08 2007-03-08 Fiberlink Dynamic network connection based on compliance
US20070094366A1 (en) * 2005-10-20 2007-04-26 Ayoub Ramy P System and method for real-time processing and distribution of media content in a network of media devices
US20070192600A1 (en) * 2005-05-27 2007-08-16 Samsung Electronics Co., Ltd. Key handshaking method and system for wireless local area networks
US20070288743A1 (en) * 2004-01-12 2007-12-13 Cisco Technology, Inc. Enabling stateless server-based pre-shared secrets
US7370350B1 (en) * 2002-06-27 2008-05-06 Cisco Technology, Inc. Method and apparatus for re-authenticating computing devices
US7788707B1 (en) * 2006-05-23 2010-08-31 Sprint Spectrum L.P. Self-organized network setup
US7827545B2 (en) * 2005-12-15 2010-11-02 Microsoft Corporation Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy
US7881235B1 (en) * 2004-06-25 2011-02-01 Apple Inc. Mixed media conferencing

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822523A (en) * 1996-02-01 1998-10-13 Mpath Interactive, Inc. Server-group messaging system for interactive applications
US7075918B1 (en) * 1999-12-30 2006-07-11 At&T Corp. BRG with PBX capabilities
US6948065B2 (en) * 2000-12-27 2005-09-20 Intel Corporation Platform and method for securely transmitting an authorization secret
US20030149874A1 (en) * 2002-02-06 2003-08-07 Xerox Corporation Systems and methods for authenticating communications in a network medium
US7539486B2 (en) * 2002-05-06 2009-05-26 Avaya Inc. Wireless teleconferencing system
US6801612B2 (en) * 2002-11-21 2004-10-05 International Business Machines Corporation System and method for conference call consolidation
US7549048B2 (en) * 2004-03-19 2009-06-16 Microsoft Corporation Efficient and secure authentication of computing systems
US7403497B2 (en) * 2004-11-12 2008-07-22 Intel Corporation Data transport between a media gateway and server

Patent Citations (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5621729A (en) * 1995-06-07 1997-04-15 Geophonic Networks, Inc. Receiver controlled communication system
US6011782A (en) * 1997-05-08 2000-01-04 At&T Corp. Method for managing multicast addresses for transmitting and receiving multimedia conferencing information on an internet protocol (IP) network
US20050094581A1 (en) * 1999-03-02 2005-05-05 Microsoft Corporation Security and support for flexible conferencing topologies spanning proxies, firewalls and gateways
US20020059434A1 (en) * 2000-06-28 2002-05-16 Jeyhan Karaoguz Multi-mode controller
US20030059434A1 (en) * 2000-08-09 2003-03-27 Andrew Grupe Methods and compositions for treating gastrointestinal tract mucin production associated disease conditions
US20050147044A1 (en) * 2000-11-22 2005-07-07 Microsoft Corporation Locator and tracking service for peer-to-peer resources
US20030055994A1 (en) * 2001-07-06 2003-03-20 Zone Labs, Inc. System and methods providing anti-virus cooperative enforcement
US20030088651A1 (en) * 2001-11-06 2003-05-08 Wilson Richard A. Dynamic network device reconfiguration
US20040263530A1 (en) * 2001-11-06 2004-12-30 David Sahuc Device,method and system for multimedia content adaptation
US20030095510A1 (en) * 2001-11-16 2003-05-22 Motorola, Inc. Use and management of groups defined according to a call initiation protocol
US7370350B1 (en) * 2002-06-27 2008-05-06 Cisco Technology, Inc. Method and apparatus for re-authenticating computing devices
US20070005766A1 (en) * 2003-03-17 2007-01-04 July Systems, Inc. Method and system for providing external and internal services through an application intermediation gateway
US20050060411A1 (en) * 2003-09-16 2005-03-17 Stephane Coulombe System and method for adaptation of peer-to-peer multimedia sessions
US20050086346A1 (en) * 2003-10-17 2005-04-21 Meyer Jeffrey D. Access point coupling guests to the internet
US20070288743A1 (en) * 2004-01-12 2007-12-13 Cisco Technology, Inc. Enabling stateless server-based pre-shared secrets
US20050232247A1 (en) * 2004-04-16 2005-10-20 Noel Whitley Collection of enhanced caller ID information
US20050237377A1 (en) * 2004-04-22 2005-10-27 Insors Integrated Communications Audio data control
US20050257055A1 (en) * 2004-04-28 2005-11-17 Anderson Eric C Device ownership transfer from a network
US7881235B1 (en) * 2004-06-25 2011-02-01 Apple Inc. Mixed media conferencing
US20060053276A1 (en) * 2004-09-03 2006-03-09 Lortz Victor B Device introduction and access control framework
US20060056636A1 (en) * 2004-09-14 2006-03-16 Schrum Sidney B Jr Transmit power control for wireless security
US20060101280A1 (en) * 2004-11-08 2006-05-11 Tatsuhiko Sakai Authentication method and system, and information processing method and apparatus
US20060161538A1 (en) * 2005-01-19 2006-07-20 Microsoft Corporation Transcode matrix
US20060183462A1 (en) * 2005-02-11 2006-08-17 Nokia Corporation Managing an access account using personal area networks and credentials on a mobile device
US20060239217A1 (en) * 2005-04-21 2006-10-26 Microsoft Corporation Low power transmission provisioning for wireless network devices
US20060245379A1 (en) * 2005-04-28 2006-11-02 Joe Abuan Multi-participant conference adjustments
US20070192600A1 (en) * 2005-05-27 2007-08-16 Samsung Electronics Co., Ltd. Key handshaking method and system for wireless local area networks
US20070015463A1 (en) * 2005-06-23 2007-01-18 Microsoft Corporation Provisioning of wireless connectivity for devices using NFC
US20070022185A1 (en) * 2005-07-25 2007-01-25 Stuart Hamilton Simple home networking
US20070055752A1 (en) * 2005-09-08 2007-03-08 Fiberlink Dynamic network connection based on compliance
US20070094366A1 (en) * 2005-10-20 2007-04-26 Ayoub Ramy P System and method for real-time processing and distribution of media content in a network of media devices
US7827545B2 (en) * 2005-12-15 2010-11-02 Microsoft Corporation Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy
US7788707B1 (en) * 2006-05-23 2010-08-31 Sprint Spectrum L.P. Self-organized network setup

Cited By (146)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8146142B2 (en) * 2004-09-03 2012-03-27 Intel Corporation Device introduction and access control framework
US9602471B2 (en) 2004-09-03 2017-03-21 Intel Corporation Device introduction and access control framework
US20060053276A1 (en) * 2004-09-03 2006-03-09 Lortz Victor B Device introduction and access control framework
US9301113B2 (en) 2006-07-12 2016-03-29 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US9674679B2 (en) 2006-07-12 2017-06-06 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US10149126B2 (en) 2006-07-12 2018-12-04 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US9003456B2 (en) 2006-09-07 2015-04-07 Porto Vinci Ltd. Limited Liability Company Presentation of still image data on display devices using a wireless home entertainment hub
US20080065234A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Power Management Using a Wireless Home Entertainment Hub
US20080066118A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Connecting a Legacy Device into a Home Entertainment System Useing a Wireless Home Enterainment Hub
US20080141329A1 (en) * 2006-09-07 2008-06-12 Technology, Patents & Licensing, Inc. Device Control Using Multi-Dimensional Motion Sensing and a Wireless Home Entertainment Hub
US20080150704A1 (en) * 2006-09-07 2008-06-26 Technology, Patents & Licensing, Inc. Data Presentation from Multiple Sources Using a Wireless Home Entertainment Hub
US9398076B2 (en) 2006-09-07 2016-07-19 Rateze Remote Mgmt Llc Control of data presentation in multiple zones using a wireless home entertainment hub
US8307388B2 (en) 2006-09-07 2012-11-06 Porto Vinci Ltd. LLC Automatic adjustment of devices in a home entertainment system
US9319741B2 (en) 2006-09-07 2016-04-19 Rateze Remote Mgmt Llc Finding devices in an entertainment system
US9155123B2 (en) 2006-09-07 2015-10-06 Porto Vinci Ltd. Limited Liability Company Audio control using a wireless home entertainment hub
US9172996B2 (en) 2006-09-07 2015-10-27 Porto Vinci Ltd. Limited Liability Company Automatic adjustment of devices in a home entertainment system
US9185741B2 (en) * 2006-09-07 2015-11-10 Porto Vinci Ltd. Limited Liability Company Remote control operation using a wireless home entertainment hub
US11729461B2 (en) 2006-09-07 2023-08-15 Rateze Remote Mgmt Llc Audio or visual output (A/V) devices registering with a wireless hub system
US7684902B2 (en) 2006-09-07 2010-03-23 Porto Vinci LTD Limited Liability Company Power management using a wireless home entertainment hub
US11570393B2 (en) 2006-09-07 2023-01-31 Rateze Remote Mgmt Llc Voice operated control device
US11451621B2 (en) 2006-09-07 2022-09-20 Rateze Remote Mgmt Llc Voice operated control device
US11323771B2 (en) 2006-09-07 2022-05-03 Rateze Remote Mgmt Llc Voice operated remote control
US11050817B2 (en) 2006-09-07 2021-06-29 Rateze Remote Mgmt Llc Voice operated control device
US7920932B2 (en) 2006-09-07 2011-04-05 Porto Vinci, Ltd., Limited Liability Co. Audio control using a wireless home entertainment hub
US8005236B2 (en) 2006-09-07 2011-08-23 Porto Vinci Ltd. Limited Liability Company Control of data presentation using a wireless home entertainment hub
US10674115B2 (en) 2006-09-07 2020-06-02 Rateze Remote Mgmt Llc Communicating content and call information over a local area network
US10523740B2 (en) 2006-09-07 2019-12-31 Rateze Remote Mgmt Llc Voice operated remote control
US9386269B2 (en) 2006-09-07 2016-07-05 Rateze Remote Mgmt Llc Presentation of data on multiple display devices using a wireless hub
US10277866B2 (en) 2006-09-07 2019-04-30 Porto Vinci Ltd. Limited Liability Company Communicating content and call information over WiFi
US20080065238A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Presentation of Still Image Data on Display Devices Using a Wireless Home Entertainment Hub
US9191703B2 (en) 2006-09-07 2015-11-17 Porto Vinci Ltd. Limited Liability Company Device control using motion sensing for wireless home entertainment devices
US8923749B2 (en) 2006-09-07 2014-12-30 Porto Vinci LTD Limited Liability Company Device registration using a wireless home entertainment hub
US8146132B2 (en) 2006-09-07 2012-03-27 Porto Vinci Ltd. Limited Liability Company Device registration using a wireless home entertainment hub
US8321038B2 (en) 2006-09-07 2012-11-27 Porto Vinci Ltd. Limited Liability Company Presentation of still image data on display devices using a wireless home entertainment hub
US20080066122A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Source Device Change Using a Wireless Home Entertainment Hub
US20080061578A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Data presentation in multiple zones using a wireless home entertainment hub
US20080065232A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Remote Control Operation Using a Wireless Home Entertainment Hub
US8421746B2 (en) 2006-09-07 2013-04-16 Porto Vinci Ltd. Limited Liability Company Device control using multi-dimensional motion sensing and a wireless home entertainment hub
US8990865B2 (en) 2006-09-07 2015-03-24 Porto Vinci Ltd. Limited Liability Company Calibration of a home entertainment system using a wireless home entertainment hub
US8776147B2 (en) 2006-09-07 2014-07-08 Porto Vinci Ltd. Limited Liability Company Source device change using a wireless home entertainment hub
US8966545B2 (en) * 2006-09-07 2015-02-24 Porto Vinci Ltd. Limited Liability Company Connecting a legacy device into a home entertainment system using a wireless home entertainment hub
US9233301B2 (en) 2006-09-07 2016-01-12 Rateze Remote Mgmt Llc Control of data presentation from multiple sources using a wireless home entertainment hub
US20080066094A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Control of Data Presentation in Multiple Zones Using a Wireless Home Entertainment Hub
US8607281B2 (en) * 2006-09-07 2013-12-10 Porto Vinci Ltd. Limited Liability Company Control of data presentation in multiple zones using a wireless home entertainment hub
US20080066120A1 (en) * 2006-09-07 2008-03-13 Technology, Patents & Licensing, Inc. Data Presentation Using a Wireless Home Entertainment Hub
US8634573B2 (en) 2006-09-07 2014-01-21 Porto Vinci Ltd. Limited Liability Company Registration of devices using a wireless home entertainment hub
US8935733B2 (en) * 2006-09-07 2015-01-13 Porto Vinci Ltd. Limited Liability Company Data presentation using a wireless home entertainment hub
US9270935B2 (en) 2006-09-07 2016-02-23 Rateze Remote Mgmt Llc Data presentation in multiple zones using a wireless entertainment hub
US8704866B2 (en) 2006-09-07 2014-04-22 Technology, Patents & Licensing, Inc. VoIP interface using a wireless home entertainment hub
US8713591B2 (en) 2006-09-07 2014-04-29 Porto Vinci LTD Limited Liability Company Automatic adjustment of devices in a home entertainment system
US8761404B2 (en) 2006-09-07 2014-06-24 Porto Vinci Ltd. Limited Liability Company Musical instrument mixer
US8990253B2 (en) 2007-02-14 2015-03-24 Microsoft Corporation Media device presence management
US8204910B2 (en) * 2007-02-14 2012-06-19 Microsoft Corporation Media device presence management
US20080195621A1 (en) * 2007-02-14 2008-08-14 Microsoft Corporation Media Device Presence Management
US8806027B2 (en) * 2007-02-14 2014-08-12 Microsoft Corporation Nearby media device tracking
US20080195620A1 (en) * 2007-02-14 2008-08-14 Microsoft Corporation Nearby Media Device Tracking
US8799648B1 (en) * 2007-08-15 2014-08-05 Meru Networks Wireless network controller certification authority
US8713643B2 (en) * 2008-01-15 2014-04-29 Axis Ab Method and devices for handling access privileges
US20090183238A1 (en) * 2008-01-15 2009-07-16 Axis Ab Method and devices for handling access privileges
US8819422B2 (en) 2008-04-22 2014-08-26 Motorola Mobility Llc System and methods for access control based on a user identity
US9065656B2 (en) 2008-04-22 2015-06-23 Google Technology Holdings LLC System and methods for managing trust in access control based on a user identity
US20090265765A1 (en) * 2008-04-22 2009-10-22 General Instrument Corporation System and Methods for Managing Trust in Access Control Based on a User Identity
US20090265551A1 (en) * 2008-04-22 2009-10-22 General Instrument Corporation System and Methods for Access Control Based on a User Identity
US9325714B2 (en) 2008-04-22 2016-04-26 Google Technology Holdings LLC System and methods for access control based on a user identity
WO2009131798A1 (en) * 2008-04-22 2009-10-29 General Instrument Corporation System and methods for access control based on a user identity
US9775036B2 (en) 2008-05-13 2017-09-26 At&T Mobility Ii Llc Access control lists and profiles to manage femto cell coverage
US9877195B2 (en) 2008-05-13 2018-01-23 At&T Mobility Ii Llc Location-based services in a femtocell network
US9538383B2 (en) 2008-05-13 2017-01-03 At&T Mobility Ii Llc Interface for access management of femto cell coverage
US9584984B2 (en) 2008-05-13 2017-02-28 At&T Mobility Ii Llc Reciprocal addition of attribute fields in access control lists and profiles for femto cell coverage management
US9591486B2 (en) 2008-05-13 2017-03-07 At&T Mobility Ii Llc Intra-premises content and equipment management in a femtocell network
US9392461B2 (en) 2008-05-13 2016-07-12 At&T Mobility Ii Llc Access control lists and profiles to manage femto cell coverage
US9775037B2 (en) 2008-05-13 2017-09-26 At&T Mobility Ii Llc Intra-premises content and equipment management in a femtocell network
US9503457B2 (en) * 2008-05-13 2016-11-22 At&T Mobility Ii Llc Administration of access lists for femtocell service
US9930526B2 (en) 2008-05-13 2018-03-27 At&T Mobility Ii Llc Interface for access management of femto cell coverage
US10225733B2 (en) 2008-05-13 2019-03-05 At&T Mobility Ii Llc Exchange of access control lists to manage femto cell coverage
US10499247B2 (en) 2008-05-13 2019-12-03 At&T Mobility Ii Llc Administration of access lists for femtocell service
US9319964B2 (en) 2008-05-13 2016-04-19 At&T Mobility Ii Llc Exchange of access control lists to manage femto cell coverage
US9094891B2 (en) 2008-05-13 2015-07-28 At&T Mobility Ii Llc Location-based services in a femtocell network
US20140213220A1 (en) * 2008-05-13 2014-07-31 At&T Mobility Ii Llc Administration of access lists for femtocell service
US9369876B2 (en) 2008-05-13 2016-06-14 At&T Mobility Ii Llc Location-based services in a femtocell network
US9155022B2 (en) 2008-05-13 2015-10-06 At&T Mobility Ii Llc Interface for access management of FEMTO cell coverage
US8374159B2 (en) 2008-05-21 2013-02-12 Microsoft Corporation Wireless network host in silent mode
US10306539B2 (en) 2008-05-21 2019-05-28 Microsoft Technology Licensing, Llc Wireless network host in silent mode
US9769731B2 (en) 2008-05-21 2017-09-19 Microsoft Technology Licensing, Llc Wireless network host in silent mode
US20090290520A1 (en) * 2008-05-21 2009-11-26 Microsoft Corporation Wireless network host in silent mode
US9307398B2 (en) 2008-05-21 2016-04-05 Microsoft Technology Licensing, Llc Wireless network host in silent mode
US8958405B2 (en) 2008-05-21 2015-02-17 Microsoft Corporation Wireless network host in silent mode
US9246759B2 (en) 2008-06-12 2016-01-26 At&T Mobility Ii Llc Point of sales and customer support for femtocell service and equipment
US8855087B2 (en) 2008-12-18 2014-10-07 Microsoft Corporation Wireless access point supporting control by multiple applications
US20100157960A1 (en) * 2008-12-18 2010-06-24 Microsoft Corporation Wireless access point supporting control by multiple applications
US8458339B2 (en) * 2009-02-26 2013-06-04 Canon Kabushiki Kaisha Communication apparatus and control method for electronic payment services
US20100217705A1 (en) * 2009-02-26 2010-08-26 Canon Kabushiki Kaisha Communication apparatus, and control method for communication apparatus
US20100220586A1 (en) * 2009-02-27 2010-09-02 Research In Motion Limited Route reflector for a communication system
US8023406B2 (en) * 2009-02-27 2011-09-20 Research In Motion Limited Route reflector for a communication system
US20110066711A1 (en) * 2009-04-17 2011-03-17 Prem Jothipragasam Kumar Management of shared client device and device manager
US8671174B2 (en) * 2009-04-17 2014-03-11 Prem Jothipragasam Kumar Management of shared client device and device manager
US8902895B2 (en) 2009-07-31 2014-12-02 Anue Systems, Inc. Automatic filter overlap processing and related systems and methods
US8842548B2 (en) 2009-07-31 2014-09-23 Anue Systems, Inc. Superset packet forwarding for overlapping filters and related systems and methods
US8098677B1 (en) 2009-07-31 2012-01-17 Anue Systems, Inc. Superset packet forwarding for overlapping filters and related systems and methods
US8934495B1 (en) * 2009-07-31 2015-01-13 Anue Systems, Inc. Filtering path view graphical user interfaces and related systems and methods
US10645582B2 (en) 2009-10-15 2020-05-05 At&T Intellectual Property I, L.P. Management of access to service in an access point
US9509701B2 (en) 2009-10-15 2016-11-29 At&T Intellectual Property I, L.P. Management of access to service in an access point
US8792392B2 (en) 2010-02-10 2014-07-29 Qualcomm Incorporated Method and apparatus for in-band provisioning of a device at a closed subscriber group
WO2011100478A3 (en) * 2010-02-10 2011-10-06 Qualcomm Incorporated In- band provisioning of a device at a closed subscriber group
US9407718B2 (en) * 2010-07-01 2016-08-02 Broadcom Corporation Method and system for service discovery and deployment in an IP multimedia network
US20120005323A1 (en) * 2010-07-01 2012-01-05 Li Gordon Yong Method and system for service discovery and deployment in an ip multimedia network
WO2012094399A3 (en) * 2011-01-05 2013-05-02 Eye-Fi, Inc. Method and system for out-of-band delivery of wireless network credentials
WO2012094399A2 (en) * 2011-01-05 2012-07-12 Eye-Fi, Inc. Method and system for out-of-band delivery of wireless network credentials
US20190089815A1 (en) * 2011-02-23 2019-03-21 Lookout, Inc. Configuring a computing device to automatically obtain data in response to a predetermined event
US10165083B2 (en) * 2011-02-23 2018-12-25 Lookout, Inc. Automatically collecting data from a computing device after launching an application by the computing device
US20160173647A1 (en) * 2011-02-23 2016-06-16 Lookout, Inc. Automatically collecting data from a computing device after launching an application by the computing device
US11720652B2 (en) 2011-02-23 2023-08-08 Lookout, Inc. Monitoring a computing device to automatically obtain data in response to detecting background activity
US10701183B2 (en) * 2011-02-23 2020-06-30 Lookout, Inc. Configuring a computing device to automatically obtain data in response to a predetermined event
US20130080520A1 (en) * 2011-09-22 2013-03-28 Nokia Corporation Method and apparatus for provisioning resource credentials based on social networking data
US20140298358A1 (en) * 2011-12-14 2014-10-02 Nokia Corporation Method and Apparatus for Providing Optimization Framework for task-Oriented Event Execution
US20150085848A1 (en) * 2012-04-26 2015-03-26 Nokia Corporation Method and Apparatus for Controlling Wireless Network Access Parameter Sharing
EP2665237A1 (en) * 2012-05-16 2013-11-20 Nokia Corporation Method, apparatus, and computer program product for controlling network access to guest apparatus based on presence of hosting apparatus
KR101481265B1 (en) * 2012-05-16 2015-01-09 노키아 코포레이션 Method, apparatus, and computer program product for controlling network access to guest apparatus based on presence of hosting apparatus
US20130309971A1 (en) * 2012-05-16 2013-11-21 Nokia Corporation Method, apparatus, and computer program product for controlling network access to guest apparatus based on presence of hosting apparatus
CN103428808A (en) * 2012-05-16 2013-12-04 诺基亚公司 Method and apparatus for controlling network access to guest apparatus based on presence of hosting apparatus
US8818276B2 (en) * 2012-05-16 2014-08-26 Nokia Corporation Method, apparatus, and computer program product for controlling network access to guest apparatus based on presence of hosting apparatus
US20140006571A1 (en) * 2012-07-02 2014-01-02 Fujitsu Limited Process execution method and apparatus
US9596133B2 (en) * 2012-07-02 2017-03-14 Fujitsu Limited Process execution method and apparatus
US20140059629A1 (en) * 2012-08-23 2014-02-27 Electronics And Telecommunications Research Institute Two-way broadcast service providing system and method including media transmission apparatus
KR101736174B1 (en) * 2012-08-23 2017-05-17 한국전자통신연구원 Two-way broadcasting system and method including apparatus for obtaining user's media
EP2741465B1 (en) * 2012-12-04 2021-03-17 Orange Method and device for managing secure communications in dynamic network environments
CN103916695A (en) * 2012-12-31 2014-07-09 三星电子株式会社 Method of receiving connection information from mobile communication device, and digital image-capturing apparatus
WO2014159782A1 (en) * 2013-03-14 2014-10-02 General Instrument Corporation Automated transfer of a unique identifier for a consumer electronics device
WO2014149380A1 (en) * 2013-03-15 2014-09-25 Intel Corporation Motion initiated teleconference
FR3018979A1 (en) * 2014-03-21 2015-09-25 Orange TEMPORARY ACCESS CONTROL TO A LOCAL NETWORK
EP2922328A1 (en) * 2014-03-21 2015-09-23 Orange Controlled temporary access to a local area network
US9847947B2 (en) 2014-05-29 2017-12-19 Keysight Technologies Singapore (Holdings) Pte Ltd Cloud-based network tool optimizers for server cloud networks
US10389642B2 (en) 2014-05-29 2019-08-20 Keysight Technologies Singapore (Sales) Pte. Ltd. Cloud-based network tool optimizers for server cloud networks
US9467385B2 (en) 2014-05-29 2016-10-11 Anue Systems, Inc. Cloud-based network tool optimizers for server cloud networks
US9781044B2 (en) 2014-07-16 2017-10-03 Anue Systems, Inc. Automated discovery and forwarding of relevant network traffic with respect to newly connected network tools for network tool optimizers
US10050847B2 (en) 2014-09-30 2018-08-14 Keysight Technologies Singapore (Holdings) Pte Ltd Selective scanning of network packet traffic using cloud-based virtual machine tool platforms
US9197673B1 (en) * 2015-05-18 2015-11-24 A2Zlogix, Inc. System and method for reception and transmission optimization of secured video, image, audio, and other media traffic via proxy
US9992134B2 (en) 2015-05-27 2018-06-05 Keysight Technologies Singapore (Holdings) Pte Ltd Systems and methods to forward packets not passed by criteria-based filters in packet forwarding systems
US10447617B2 (en) 2015-05-27 2019-10-15 Keysight Technologies Singapore (Sales) Pte. Ltd. Systems and methods to forward packets not passed by criteria-based filters in packet forwarding systems
CN105045609A (en) * 2015-05-28 2015-11-11 深圳光启智能光子技术有限公司 Method for executing and integrating optical wireless communication application function in application
US10652112B2 (en) 2015-10-02 2020-05-12 Keysight Technologies Singapore (Sales) Pte. Ltd. Network traffic pre-classification within VM platforms in virtual processing environments
US10116528B2 (en) 2015-10-02 2018-10-30 Keysight Technologies Singapore (Holdings) Ptd Ltd Direct network traffic monitoring within VM platforms in virtual processing environments
US10142212B2 (en) 2015-10-26 2018-11-27 Keysight Technologies Singapore (Holdings) Pte Ltd On demand packet traffic monitoring for network packet communications within virtual processing environments
US9996397B1 (en) * 2015-12-09 2018-06-12 International Business Machines Corporation Flexible device function aggregation
US10372502B2 (en) * 2015-12-09 2019-08-06 International Business Machines Corporation Flexible device function aggregation
CN111491277A (en) * 2020-04-08 2020-08-04 吴义魁 Wireless Internet of things exception handling method, intelligent gateway and related device

Also Published As

Publication number Publication date
WO2008105922A3 (en) 2009-03-12
EP2076994A2 (en) 2009-07-08
EP2677788A1 (en) 2013-12-25
CN101523798A (en) 2009-09-02
US8464322B2 (en) 2013-06-11
WO2008105922A2 (en) 2008-09-04
EP2677788B1 (en) 2015-03-04
EP2076994A4 (en) 2012-07-25
US20120096141A1 (en) 2012-04-19
CN101523798B (en) 2012-02-29

Similar Documents

Publication Publication Date Title
US8464322B2 (en) Secure device introduction with capabilities assessment
US20070079113A1 (en) Automatic secure device introduction and configuration
US8917651B2 (en) Associating wi-fi stations with an access point in a multi-access point infrastructure network
US8942375B2 (en) Method and system for providing multiple encryption in a multi-band multi-protocol hybrid wired/wireless network
US8156337B2 (en) Systems and methods for authenticating communications in a network medium
US9032215B2 (en) Management of access control in wireless networks
US20160364553A1 (en) System, Apparatus And Method For Providing Protected Content In An Internet Of Things (IOT) Network
EP3228059B1 (en) Secure connections establishment
US20120184242A1 (en) Methods and Systems for Enhancing Wireless Coverage
US11736304B2 (en) Secure authentication of remote equipment
WO2019041802A1 (en) Discovery method and apparatus based on service-oriented architecture
KR100707805B1 (en) Authentication system being capable of controlling authority based of user and authenticator
CN116746182A (en) Secure communication method and apparatus
EP2741465B1 (en) Method and device for managing secure communications in dynamic network environments
US20210243599A1 (en) User authentication method through bluetooth device and device therefor
JP2006345302A (en) Gateway device and program
EP1547299A1 (en) Method and system for providing multiple encryption in a multi-band multi-protocol hybrid wired/wireless network
US20070291669A1 (en) Method and apparatus for a hybrid network service
KR100654441B1 (en) Method and apparatus for controlling wireless network access
Taesombut et al. Secure registration protocol for media appliances in wireless home networks
Schwiderski-Grosche et al. Towards the secure initialisation of a personal distributed environment
Akhanolu Implementation and security of Bluetooth technology
WO2006081712A1 (en) A method for switching the level of the plaintext and cyphertext during the conversation
WO2010004354A1 (en) Key management in an access network

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NARJALA, RANJIT;REEL/FRAME:019392/0001

Effective date: 20070601

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION