Set Top Box With Firewall
First Claim
Patent Images
1. A set top box, comprising:
- a first port coupling a processor to a first communications network and to a database, the first port sending resource information associated with the set top box, the resource information describing a disk drive and a capacity of the disk drive;
a second port coupling the processor to a second communications network;
the first port receiving an operating instruction that permits the processor to access the disk drive;
the processor receiving an instruction when there is a difference between the capacity of the disk drive and an authorized storage for the set top box defined in a database, the difference indicating unauthorized modification to the set top box, the instruction causing the processor to disable operation of the set top box.
7 Assignments
0 Petitions
Accused Products
Abstract
A set top box with a firewall is disclosed. The set top box uses two separate ports to communicate with two respective communications networks. The first port communicates with the first network to receive programming information and the second port communicates with the second network to receive information. A firewall, in communication with one of the ports, is capable of receiving and analyzing information from the port. The firewall helps to prevent harmful or unauthorized information from reaching other components of the set top box. The firewall can receive information before other components associated with the set top box and the firewall can include various different forms of filtering.
-
Citations
20 Claims
-
1. A set top box, comprising:
-
a first port coupling a processor to a first communications network and to a database, the first port sending resource information associated with the set top box, the resource information describing a disk drive and a capacity of the disk drive; a second port coupling the processor to a second communications network; the first port receiving an operating instruction that permits the processor to access the disk drive; the processor receiving an instruction when there is a difference between the capacity of the disk drive and an authorized storage for the set top box defined in a database, the difference indicating unauthorized modification to the set top box, the instruction causing the processor to disable operation of the set top box. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A set top box comprising:
-
a first port capable of communicating with a first communications network, a second port capable of communication with a second communications network and capable of receiving information from the second communications network; a tuner in communication with the first communications network and capable of selecting a program; a firewall in communication with the second port, capable of receiving communications from the second port and capable of filtering the information received from the second communications network. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A set top box comprising:
-
a first port capable of communicating with a first communications network, a second port capable of communication with a second communications network; a tuner in communication with the first communications network and capable of selecting a program; at least one fixed disk drive capable of storing the program information; a firewall in communication with the second port, capable of receiving communications from the second port and capable of analyzing the information received from the second communications network. - View Dependent Claims (14, 15, 16)
-
-
17. A method, comprising:
-
initiating communication between a set top box and a first service provider over a first communications network; initiating communication between the set top box and a service provider over a second communications network; sending resource information associated with the set top box describing a disk drive and a capacity of the disk drive; receiving an operating instruction that permits a processor to access the disk drive; and receiving an instruction when there is a difference between the capacity of the disk drive and authorized storage for the set top box defined in a database, the difference indicating unauthorized modifications to the set top box, the instruction causing the processor to disable operation of the set top box.
-
- 18. A method according to claim 18, wherein executing the operating instruction comprises limiting the capacity of the disk drive.
-
20. A computer program embodied on a computer-readable storage medium, the computer program including instructions for causing a processor to implement a process comprising:
-
initiating communication between a set top box and a first service provider over a first communications network; initiating communication between the set top box and a service provider over a second communications network; sending resource information associated with the set top box describing a disk drive and a capacity of the disk drive; receiving an operating instruction that permits a processor to access the disk drive; and receiving an instruction when there is a difference between the capacity of the disk drive and authorized storage for the set top box defined in a database, the difference indicating unauthorized modifications to the set top box, the instruction causing the processor to disable operation of the set top box.
-
Specification