System and method for securing a network
First Claim
Patent Images
1. A secure network comprising:
- a residential gateway to communicate with a remote network and a local network;
at least one trusted local device configured to send communications comprising data packets with authentication information to the residential gateway to request access to resources of the remote network;
wherein the residential gateway inhibits a request received from the local network to access resources on the remote network until the residential gateway uses the authentication information to authenticate the data packets as coming from the at least one trusted local device.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure network is disclosed. The secure network includes a residential gateway to communicate with a remote network and a local network. At least one trusted local device is configured to send communications including data packets with authentication information to the residential gateway to request access to resources of the remote network. The residential gateway inhibits a request received from the local network to access resources on the remote network until the residential gateway uses authentication information to authenticate data packets associated with the request as originating from the at least one trusted local device.
58 Citations
31 Claims
-
1. A secure network comprising:
-
a residential gateway to communicate with a remote network and a local network; at least one trusted local device configured to send communications comprising data packets with authentication information to the residential gateway to request access to resources of the remote network; wherein the residential gateway inhibits a request received from the local network to access resources on the remote network until the residential gateway uses the authentication information to authenticate the data packets as coming from the at least one trusted local device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A residential gateway comprising:
-
a first network interface to communicate with a first network; a second network interface to communicate with a second network; and an authentication module; wherein the authentication module inspects data packets received from the second network to determine whether the data packets originated from a trusted network device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A set-top box comprising:
-
a local network interface to communicate with a local network; a display interface to generate a display on a display device coupled to the set-top box, and an authentication module; wherein the authentication module includes an encryption key, and wherein the authentication module generates an integrity check value of each data packet of a request to access video content on a remote network, and wherein the authentication module encrypts the integrity check value using the encryption key before sending each data packet of the request to a network device on the local network. - View Dependent Claims (23, 24)
-
-
25. A method of securing a network, the method comprising:
-
receiving at least one first request to access resources of a remote network from a local network device, wherein the at least one first request comprises a plurality of data packets; authenticating each data packet of the at least one first request as originating from a trusted local network device; and sending at least one second request to the remote network, after authenticating each data packet of the at least one first request as originated from the trusted local network device. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A computer readable medium tangibly embodying a program of instructions to manipulate a computing platform to:
-
receive at least one first request to access resources of a remote network from a local network device, wherein the at least one first request comprises a plurality of data packets; authenticate each data packet of the at least one first request as originating from a trusted local network device; and send at least one second request to the remote network, after the at least one first request is authenticated.
-
Specification