Application Encryption Function Description Protocol Used
Software signing (OTA) Authentication
Integrity
Software signing process
that ensures hackers do
not create a fake OTA file
for a software upgrade
package to replace the
software images on the
Pano device. This
verification is done during
the software update
process when the OTA
signature is compared
with a locally stored
certificate before allowing
the Android system to
continue the procedure.
PKCS #8 (RFC 5208)
AirPlay Confidentiality
Integrity
Encrypted content casting
protocol for sending
media from an AirPlay-
certified device to the
Pano device’s Ethernet
network interface.
This protocol requires an
IP network connection
from an AirPlay-certified
device to the Pano device
Ethernet NIC. It does not
use a private, short-range
wireless network
connection to the Pano
device.
Miracast Confidentiality
Integrity
Encrypted content casting
protocol for sending
media from a Miracast-
certified device to the
Pano device using a
dedicated, short-range
wireless 802.11 network
connection.
RSN (WPA2/IEEE
802.11i)
Device Proxy Client Authentication
Integrity
Confidentiality
Allows the Pano device to
communicate with the
Polycom Cloud Service to
discover its tenant ID and
register with that tenant’s
cloud services. The
connections are signaling
only; no media is passed.
Connections are made to
the Global Directory
Service, Device Discovery
Service, Tenant Directory
Service, Device
Authentication Service,
Polycom Cloud Service
Device Authentication
Service, and Device
Proxy and Registry.
TLS 1.1 and 1.2
Security
Polycom, Inc. 38