Corresponding respective security policies are applied to a discovery protocol (a protocol used in the discovery phase) and a control protocol (a protocol used in the control phase) of a device control protocol when communications are made.
Web www.patentalert.com
< Control protocol for image enumeration and transfer
> System and method for authenticating a web page
> Failover processing in multi-tier distributed data-handling systems
HOME | NEW USER | LOGIN | SUBSCRIPTIONS | SEARCH | GUESTBOOK | CONTACT