Techniques for validating user intent and securely configuring computing devices
Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) a...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) approving a request received from a peripheral computing device to participate in a setup process of the peripheral computing device, (2) receiving from the peripheral computing device (i) an audio signal encoding a password and timing information, and (ii) an optical signal. In addition, the method may involve, in response to identifying that the timing information correlates with the optical signal: (3) extracting a password from the audio signal; and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method may involve (5) providing the configuration information to the peripheral computing device via the communication link.
本公开实施方案涉及用于验证用户意图以及安全配置计算设备的技术 |
---|