Corresponding respective security policies are applied to a discovery protocol (a protocol used in the discovery phase) and a control protocol (a protocol used in the control phase) of a device control protocol when communications are made.

 
Web www.patentalert.com

< Control protocol for image enumeration and transfer

> System and method for authenticating a web page

> Failover processing in multi-tier distributed data-handling systems

~ 00565