18 research outputs found

    MANUFACTURER USAGE DESCRIPTIONS AND POLICY FOR INTERNET OF THINGS APPLICATIONS ON NON-DEDICATED HARDWARE

    Get PDF
    Techniques are described herein for extending Manufacturer Usage Descriptions (MUD) to onboard Internet of Things (IoT) applications on general purpose hardware in two ways that can work in tandem or separately. First, it allows an IoT application software package to securely present a MUD Uniform Resource Identifier (URI) at installation and/or first run, to the operating system on the local Personal Computer (PC), enabling the operating system to run the application in an appropriately restricted environment (e.g., a container, or Virtual Machine (VM) with its own Internet Protocol (IP) address). Second, it allows the network to then onboard the application in the restricted environment securely as a virtual IoT device on the network

    IDENTITY AND CLEANUP OF AUTHORIZATION SESSION WORK IN A SOFTWARE-DEFINED ACCESS ENABLED INTERNET OF THINGS NETWORK

    Get PDF
    Techniques are described herein for making identity work when inline tagging is not supported. This may apply to an Internet of Things (IoT) network connected to a Software Defined Access (SDA) edge

    DETERMINING NOMINAL QUALITY OF SERVICE NEEDS OF A DEVICE

    Get PDF
    Techniques are described herein for influencing network learning behaviors such as Quality of Service (QoS) using Manufacturer Usage Description (MUD) files. This mechanism improves the MUD QoS scheme by augmenting the dimensions of the QoS MUD component, and creating a new traffic mix hierarchy that converts the manufacturer expression of traffic importance into a locally significant MUD QoS hierarchy. This addition increases the security of MUD mechanisms by removing the possibility of Internet of Things (IoT) devices exploiting faults in allowed IoT protocols or servers. This mechanism also improves network allocation and planning by allowing different allocations based on traffic type and criticality

    AUTOMATIC ACCESS-CONTROL ADMISSION AND MANAGEMENT OF CONTROLLERS FOR THINGS USING MANUFACTURER USAGE DESCRIPTION

    Get PDF
    Techniques are provided herein for automated population of the controller abstraction found in Manufacturer Usage Description (MUD) files. This may be accomplished by resolving a file that contains lists of MUD Uniform Resource Locators (URLs) or additional controller files that can be iterated through

    ZERO-TOUCH BOOTSTRAP OF A NETWORK CONNECTED DEVICE

    Get PDF
    Techniques are presented herein that allow devices to automatically discover the correct enterprise wireless network to connect to, and securely onboard against that network, without manual provisioning of network information or credentials on the devices. This enables secure deployment of devices at scale on enterprise wireless networks. Minor enhancements to Institute of Electrical and Electronics Engineers (IEEE) 802.11 are described to enable this flow. Unlike Wi-Fi Alliance® Device Provisioning Protocol (DPP), the techniques presented herein are lightweight and do not include additional messaging overhead between the client device (STA) and Access Point (AP)

    ADVERTISING SOFTWARE/SECURITY USAGE DESCRIPTIONS WITH POLICY RESPONSE

    Get PDF
    Techniques are provided for an organization-maintained server which takes three inputs: (1) a set of Uniform Resource Identifiers (URIs) from Internet of Things (IoT) devices, each of which point to a manifest; (2) a set of manifests resolved from the URIs; and (3) a set of threat feeds. The server periodically compares the vulnerabilities in the threat feeds to the manifests. When a vulnerability is found, steps are taken to protect the rest of the network from the vulnerable devices until they can be remediated

    Freedom and the “choice to choose oneself” in being and time

    Get PDF
    What Heidegger means by “freedom” in Being and Time is somewhat mysterious: while the notion crops up repeatedly in the book, there is no dedicated section or study, and the concept is repeatedly connected to a new and opaque idea – that of the “choice to choose oneself.” Yet the specificity of Being and Time’s approach to freedom becomes apparent when the book is compared to other texts of the same period, in particular The Metaphysical Foundations of Logic, The Fundamental Concepts of Metaphysics, The Essence of Grounds, and The Essence of Freedom. Although there are some differences, the definition of freedom that can be found there identifies it with “existence” or “transcendence,” Dasein’s ek-static opening onto the world. Thus “being in the world must also be primordially bound up with or derived from the basic feature of Dasein’s existence, freedom… Dasein’s transcendence and freedom are identical! Freedom provides itself with intrinsic possibility: a being is, as free, necessarily in itself transcending” (GA 26: 238; Heidegger’s italics). Note the apodictic modality of the claim: it is not simply the case that Dasein, as transcending, is free. Anything that has the structure of being in the world must be free: freedom is co-extensive with Dasein. Yet Dasein is often pictured in Being and Time as anything but free: it “ensnares itself” (268), is “lost” (264), “alienated” (178), and needs to be “liberated” (264, 303). Thus comparison between Being and Time and other texts on freedom yields an important paradox: although by definition it transcends toward the world, the Dasein of Division I is deprived of freedom. It must be free, and yet phenomenological analysis shows that it is not free. To understand the specific meaning of freedom in Being and Time, one has to square this circle

    Running on Empty: The Challenge of Managing Internet Addresses

    No full text
    corecore