System and Method for Binding a Subscription-Based Computing System to an Internet Service Provider
First Claim
1. A system for binding a subscription-based computer to a service provider comprising:
- a binding module residing on the computer including a computer-readable medium having computer executable instructions comprising;
a detection module for identifying configuration data from a peripheral device of the computer;
a validation module for authenticating the configuration data; and
a security module residing on the computer, in communication with the binding module, and including a computer-readable medium having computer executable instructions comprising;
a network module for degrading operation of the computer if the validation module does not authenticate the configuration data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
-
Citations
20 Claims
-
1. A system for binding a subscription-based computer to a service provider comprising:
-
a binding module residing on the computer including a computer-readable medium having computer executable instructions comprising; a detection module for identifying configuration data from a peripheral device of the computer; a validation module for authenticating the configuration data; and a security module residing on the computer, in communication with the binding module, and including a computer-readable medium having computer executable instructions comprising; a network module for degrading operation of the computer if the validation module does not authenticate the configuration data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17)
-
-
11. A method for binding a subscription-based computer to an internet service provider (ISP) comprising:
-
communicating configuration data from a peripheral device to the computer; detecting the configuration data at the computer; authenticating a source of the configuration data; passing the configuration data to a processor of the computer if the source of the configuration data is authentic; and discarding the configuration data if the source of the configuration data is not authentic.
-
-
18. A system including a binding module in communication with a security module of a subscription-based computer, the binding module including a detection module and a cryptographic module, at least one of the binding module and the security module including a memory and a processor physically configured to execute computer executable code for:
-
accessing, decrementing, and storing a number of subscription units in the memory during operation of the computer; communicating configuration data from a peripheral device to the computer; detecting the configuration data at the computer; authenticating a source of the configuration data; passing the configuration data to a processor of the computer if the source of the configuration data is authentic; discarding the configuration data if the source of the configuration data is not authentic. communicating an encrypted packet from the computer to a remote computer of the ISP if the source of the configuration data is authentic, the encrypted packet uniquely identifying the computer; authenticating the encrypted packet at the remote computer; communicating an encrypted ping message from the remote computer to the computer at a random time interval; authenticating the encrypted ping message at the computer; maintaining communication between the ISP and the computer if the heartbeat packet is authentic; - View Dependent Claims (19, 20)
-
Specification