Method and system for auditing and correcting authorization inconsistencies for reception equipment in a content delivery network
First Claim
1. A method for auditing unauthorized usage in a subscriber content delivery network, the method comprising the steps of:
- a) identifying an indicator relating to accessibility in respect of a receiver intended for receiving signals through said network;
b) obtaining an indicator relating to authorization for a pre-determined service offering of said network; and
c) determining whether said indicator relating to accessibility is inconsistent with said indicator relating to authorization to thereby ascertain that the receiver is capable of engaging in unauthorized usage.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for auditing unauthorized usage in a subscriber content delivery network is described. The method and system includes identifying an indicator relating to accessibility for a receiver intended for receiving signals through the network; obtaining an indicator relating to authorization for a pre-determined service offering of the network; and determining whether the indicator of access ability is consistent with the indicator relating to authorization to thereby ascertain that the receiver is capable of engaging in unauthorized usage. The method and system may optionally include undertaking an action to change at least one of the indicator of access ability and the indicator relating to authorization.
-
Citations
35 Claims
-
1. A method for auditing unauthorized usage in a subscriber content delivery network, the method comprising the steps of:
-
a) identifying an indicator relating to accessibility in respect of a receiver intended for receiving signals through said network;
b) obtaining an indicator relating to authorization for a pre-determined service offering of said network; and
c) determining whether said indicator relating to accessibility is inconsistent with said indicator relating to authorization to thereby ascertain that the receiver is capable of engaging in unauthorized usage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for detecting unauthorized signal receivers in a subscriber content delivery network, comprising the steps of:
-
a) identifying receivers that are capable of receiving a subscriber signal delivered by said network;
b) identifying receivers that are authorized to receive the subscriber signal delivered by said network; and
c) where each of said receivers identified in step a) is not one of said receivers identified in step b), further identifying every said each of said receivers as being a potentially unauthorized signal receiver. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification