Techniques for validating user intent and securely configuring computing devices

Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: KLINGLER DANIEL C, VAN DER MERWE RUDOLPH, COGGIN JAY S, ALSINA THOMAS, ELDER AARON M, NIELSEN ALEX T, MARI PEDRO, TRISCARI JOSEPH M, LEE KEUN SUP, POWELL RICHARD M, BROGLE KYLE C, ALLAMANCHE ERIC A, SCHMIDT JAN PHILIPP, BRADLEY BOB
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator KLINGLER DANIEL C
VAN DER MERWE RUDOLPH
COGGIN JAY S
ALSINA THOMAS
ELDER AARON M
NIELSEN ALEX T
MARI PEDRO
TRISCARI JOSEPH M
LEE KEUN SUP
POWELL RICHARD M
BROGLE KYLE C
ALLAMANCHE ERIC A
SCHMIDT JAN PHILIPP
BRADLEY BOB
description Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) approving a request received from a peripheral computing device to participate in a setup process of the peripheral computing device, (2) receiving from the peripheral computing device (i) an audio signal encoding a password and timing information, and (ii) an optical signal. In addition, the method may involve, in response to identifying that the timing information correlates with the optical signal: (3) extracting a password from the audio signal; and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method may involve (5) providing the configuration information to the peripheral computing device via the communication link. 本公开实施方案涉及用于验证用户意图以及安全配置计算设备的技术
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116471589A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116471589A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116471589A3</originalsourceid><addsrcrecordid>eNqNyjsKAjEUBdA0FqLu4bkAi-C_lEGxEovph5DczATiS8xnwN2L4gKsTnOm4t5CD-yeFZlsSDQq74wqjnuqGYkcF3AhxYYydE3wL9KBretr-iQdHrF-u8HoNPJcTKzyGYufM7G8nNvmukIMHXJUGozSNTcpd5u93B6Op_U_5w37jTgy</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Techniques for validating user intent and securely configuring computing devices</title><source>esp@cenet</source><creator>KLINGLER DANIEL C ; VAN DER MERWE RUDOLPH ; COGGIN JAY S ; ALSINA THOMAS ; ELDER AARON M ; NIELSEN ALEX T ; MARI PEDRO ; TRISCARI JOSEPH M ; LEE KEUN SUP ; POWELL RICHARD M ; BROGLE KYLE C ; ALLAMANCHE ERIC A ; SCHMIDT JAN PHILIPP ; BRADLEY BOB</creator><creatorcontrib>KLINGLER DANIEL C ; VAN DER MERWE RUDOLPH ; COGGIN JAY S ; ALSINA THOMAS ; ELDER AARON M ; NIELSEN ALEX T ; MARI PEDRO ; TRISCARI JOSEPH M ; LEE KEUN SUP ; POWELL RICHARD M ; BROGLE KYLE C ; ALLAMANCHE ERIC A ; SCHMIDT JAN PHILIPP ; BRADLEY BOB</creatorcontrib><description>Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) approving a request received from a peripheral computing device to participate in a setup process of the peripheral computing device, (2) receiving from the peripheral computing device (i) an audio signal encoding a password and timing information, and (ii) an optical signal. In addition, the method may involve, in response to identifying that the timing information correlates with the optical signal: (3) extracting a password from the audio signal; and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method may involve (5) providing the configuration information to the peripheral computing device via the communication link. 本公开实施方案涉及用于验证用户意图以及安全配置计算设备的技术</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230721&amp;DB=EPODOC&amp;CC=CN&amp;NR=116471589A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25551,76304</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230721&amp;DB=EPODOC&amp;CC=CN&amp;NR=116471589A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>KLINGLER DANIEL C</creatorcontrib><creatorcontrib>VAN DER MERWE RUDOLPH</creatorcontrib><creatorcontrib>COGGIN JAY S</creatorcontrib><creatorcontrib>ALSINA THOMAS</creatorcontrib><creatorcontrib>ELDER AARON M</creatorcontrib><creatorcontrib>NIELSEN ALEX T</creatorcontrib><creatorcontrib>MARI PEDRO</creatorcontrib><creatorcontrib>TRISCARI JOSEPH M</creatorcontrib><creatorcontrib>LEE KEUN SUP</creatorcontrib><creatorcontrib>POWELL RICHARD M</creatorcontrib><creatorcontrib>BROGLE KYLE C</creatorcontrib><creatorcontrib>ALLAMANCHE ERIC A</creatorcontrib><creatorcontrib>SCHMIDT JAN PHILIPP</creatorcontrib><creatorcontrib>BRADLEY BOB</creatorcontrib><title>Techniques for validating user intent and securely configuring computing devices</title><description>Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) approving a request received from a peripheral computing device to participate in a setup process of the peripheral computing device, (2) receiving from the peripheral computing device (i) an audio signal encoding a password and timing information, and (ii) an optical signal. In addition, the method may involve, in response to identifying that the timing information correlates with the optical signal: (3) extracting a password from the audio signal; and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method may involve (5) providing the configuration information to the peripheral computing device via the communication link. 本公开实施方案涉及用于验证用户意图以及安全配置计算设备的技术</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjsKAjEUBdA0FqLu4bkAi-C_lEGxEovph5DczATiS8xnwN2L4gKsTnOm4t5CD-yeFZlsSDQq74wqjnuqGYkcF3AhxYYydE3wL9KBretr-iQdHrF-u8HoNPJcTKzyGYufM7G8nNvmukIMHXJUGozSNTcpd5u93B6Op_U_5w37jTgy</recordid><startdate>20230721</startdate><enddate>20230721</enddate><creator>KLINGLER DANIEL C</creator><creator>VAN DER MERWE RUDOLPH</creator><creator>COGGIN JAY S</creator><creator>ALSINA THOMAS</creator><creator>ELDER AARON M</creator><creator>NIELSEN ALEX T</creator><creator>MARI PEDRO</creator><creator>TRISCARI JOSEPH M</creator><creator>LEE KEUN SUP</creator><creator>POWELL RICHARD M</creator><creator>BROGLE KYLE C</creator><creator>ALLAMANCHE ERIC A</creator><creator>SCHMIDT JAN PHILIPP</creator><creator>BRADLEY BOB</creator><scope>EVB</scope></search><sort><creationdate>20230721</creationdate><title>Techniques for validating user intent and securely configuring computing devices</title><author>KLINGLER DANIEL C ; VAN DER MERWE RUDOLPH ; COGGIN JAY S ; ALSINA THOMAS ; ELDER AARON M ; NIELSEN ALEX T ; MARI PEDRO ; TRISCARI JOSEPH M ; LEE KEUN SUP ; POWELL RICHARD M ; BROGLE KYLE C ; ALLAMANCHE ERIC A ; SCHMIDT JAN PHILIPP ; BRADLEY BOB</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116471589A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>KLINGLER DANIEL C</creatorcontrib><creatorcontrib>VAN DER MERWE RUDOLPH</creatorcontrib><creatorcontrib>COGGIN JAY S</creatorcontrib><creatorcontrib>ALSINA THOMAS</creatorcontrib><creatorcontrib>ELDER AARON M</creatorcontrib><creatorcontrib>NIELSEN ALEX T</creatorcontrib><creatorcontrib>MARI PEDRO</creatorcontrib><creatorcontrib>TRISCARI JOSEPH M</creatorcontrib><creatorcontrib>LEE KEUN SUP</creatorcontrib><creatorcontrib>POWELL RICHARD M</creatorcontrib><creatorcontrib>BROGLE KYLE C</creatorcontrib><creatorcontrib>ALLAMANCHE ERIC A</creatorcontrib><creatorcontrib>SCHMIDT JAN PHILIPP</creatorcontrib><creatorcontrib>BRADLEY BOB</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>KLINGLER DANIEL C</au><au>VAN DER MERWE RUDOLPH</au><au>COGGIN JAY S</au><au>ALSINA THOMAS</au><au>ELDER AARON M</au><au>NIELSEN ALEX T</au><au>MARI PEDRO</au><au>TRISCARI JOSEPH M</au><au>LEE KEUN SUP</au><au>POWELL RICHARD M</au><au>BROGLE KYLE C</au><au>ALLAMANCHE ERIC A</au><au>SCHMIDT JAN PHILIPP</au><au>BRADLEY BOB</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Techniques for validating user intent and securely configuring computing devices</title><date>2023-07-21</date><risdate>2023</risdate><abstract>Embodiments of the present disclosure relate to techniques for validating user intent and securely configuring a computing device. A technique for enabling a computing device to securely configure a peripheral computing device is set forth. According to some embodiments, the method can include (1) approving a request received from a peripheral computing device to participate in a setup process of the peripheral computing device, (2) receiving from the peripheral computing device (i) an audio signal encoding a password and timing information, and (ii) an optical signal. In addition, the method may involve, in response to identifying that the timing information correlates with the optical signal: (3) extracting a password from the audio signal; and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method may involve (5) providing the configuration information to the peripheral computing device via the communication link. 本公开实施方案涉及用于验证用户意图以及安全配置计算设备的技术</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN116471589A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION
WIRELESS COMMUNICATIONS NETWORKS
title Techniques for validating user intent and securely configuring computing devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T10%3A14%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=KLINGLER%20DANIEL%20C&rft.date=2023-07-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116471589A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true