TECHNIQUES FOR VERIFYING USER INTENT AND SECURELY CONFIGURING COMPUTING DEVICES

The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of: (1) approving a request received from the peripheral computing device to engage in a setup procedure for the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: KLINGLER DANIEL C, VAN DER MERWE RUDOLPH, COGGIN JAY S, NELSON ALEX T, ALSINA THOMAS, ELDER AARON M, MARI PEDRO, TRISCARI JOSEPH M, LEE KEUN SUP, POWELL RICHARD M, BROGLE KYLE C, SCHMIDT JOHANNES P, ALLAMANCHE ERIC A, BRADLEY BOB
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of: (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providingconfiguration information to the peripheral computing device over the communication link. 本公开实施方案阐述了一种用于使计算设备能够安全配置外围计算设备的技术。根据一些实施方案,该方法能够包括以下步骤:(1)批准从外围计算设备接收的请求以参与外围计算设备的设置过程,(2)从外围计算设备接收:(i)编码密码和定时信息的音频信号,和(ii)光信号。另外,该方法