Techniques for verifying user intent and securely configuring computing devices

The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the p...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Elder, Aaron M, Mari, Pedro, Triscari, Joseph M, Alsina, Thomas, Brogle, Kyle C, Bradley, Bob, Coggin, Jay S, Van Der Merwe, Rudolph, Klingler, Daniel C, Powell, Richard M, Allamanche, Eric A, Schmidt, Johannes P, Nelson, Alex T, Lee, Keun Sup
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!