会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • TRANSMISSION OF CONFIGURATION TO A DEVICE FOR PROVISIONING IN A NETWORK
    • 将配置传输到用于在网络中提供的设备
    • US20130031227A1
    • 2013-01-31
    • US13191852
    • 2011-07-27
    • Daniel E. FordChuck A. Black
    • Daniel E. FordChuck A. Black
    • G06F15/177
    • H04L12/40019H04L12/4035H04L2012/40228Y02D30/30
    • A method is provided that includes receiving a communication from a trusted device indicating that a device to be provisioned has been added to the network; obtaining identifying information of the device to be provisioned; accessing a stored configuration for the device based on the identifying information; and transmitting the configuration to the device for provisioning. Alternatively, a computer-readable medium is provided that stores instructions to perform a method to transmit a discovery communication to a trusted device, receive a communication originating at an administrative device including a configuration; and provision the device via reboot with the configuration. Alternatively, an apparatus is provided including a table of provisioning configurations, the table including a configuration for a device to be provisioned in a network and a provisioning module to retrieve the configuration of the device stored in the table of provisioning configurations based on identifying information received from a discovery communication.
    • 提供了一种方法,包括从可信设备接收指示要被供应的设备已被添加到网络的通信; 获取要提供的设备的识别信息; 基于识别信息访问设备的存储配置; 以及将配置发送到所述设备供配置。 或者,提供了一种计算机可读介质,其存储执行将发现通信发送到可信设备的方法的指令,接收源自包括配置的管理设备的通信; 并通过重新启动配置设备。 或者,提供了一种装置,其包括供应配置表,该表包括用于在网络中提供的设备的配置,以及供应模块,用于基于接收到的识别信息来检索存储在供应配置表中的设备的配置 从发现沟通。
    • 7. 发明申请
    • SECURITY ACTIONS BASED ON CLIENT IDENTITY DATABASES
    • 基于客户身份数据库的安全行动
    • US20130191901A1
    • 2013-07-25
    • US13356742
    • 2012-01-24
    • Chuck A. Black
    • Chuck A. Black
    • G06F21/20
    • H04L63/0876H04L63/1466
    • Example embodiments disclosed herein relate to authentication based on Media Access Control (MAC) addresses. A network security device receives one or more client identity databases from one or more edge network devices. The client identity databases include MAC addresses of clients and secondary identification information for each of the clients. The network security device determines that a client device has been connected to one of the edge devices. A security action is performed based on whether the MAC address and respective secondary identification information of one of the clients matches the MAC address and respective secondary identification information of the connected client device.
    • 本文公开的示例性实施例涉及基于媒体访问控制(MAC)地址的认证。 网络安全设备从一个或多个边缘网络设备接收一个或多个客户端标识数据库。 客户端身份数据库包括客户端的MAC地址和每个客户端的辅助标识信息。 网络安全设备确定客户端设备已经连接到其中一个边缘设备。 基于MAC地址和其中一个客户端的相应次要标识信息是否与所连接的客户端设备的MAC地址和相应的辅助标识信息匹配来执行安全动作。