System and method for prioritizing and filtering cec commands

作者: Arsham Hatambeiki

DOI:

关键词:

摘要: A first controllable appliance receives from a second command for causing the to be placed into state and, in response, determines trust level of appliance. When it is determined that trustworthy, executes command. untrustworthy, ignores Otherwise, enters which waits at least predetermined period time user confirm whether or not should caused execute

参考文章(40)
Michael Baentsch, Tamas Visegrady, Thorsten Kramp, Michael Peter Kuyper-Hammond, Thomas Eirich, Michael Charles Osborne, Peter Buhler, Authentication of data communications ,(2009)
Akhilesh Kaza, John M. Sheehan, Sean Mckenna, Sameer Tejani, Arunjeet Singh, Kunal Gandhi, Cross Device Application Discovery And Control ,(2015)
Claude Castelluccia, Kasper Bonne Rasmussen, Srdjan Capkun, Method for secure communication between devices ,(2010)
Mathias Claes, Johan Verrept, Benoit Grange, Authentication apparatus with a bluetooth interface ,(2014)
Robert Karl Spiger, Stefan Thom, Paul England, Dennis J. Mattoon, Ronald Aigner, Stuart H. Schaefer, Merzin Kapadia, David R. Wooten, Trust Service for a Client Device ,(2014)
Kinshuman Kinshumann, Mark Fishel Novak, Niels T. Ferguson, Yevgeniy A. Samsonov, Identifying security boundaries on computing devices ,(2015)