SYSTEM AND METHOD FOR PROVIDING SECURITY BACKUP SERVICES TO A HOME NETWORK
First Claim
Patent Images
1. A method of detecting a change in the structure of a network, comprising:
- connecting a first co-registrar with a second co-registrar, said connecting comprising said first co-registrar validating a first credential identifying said second co-registrar, and said second co-registrar validating a second credential identifying said first co-registrar;
registering a device with said first co-registrar, said registering comprising exchanging secret information between said device and said co-registrar, said secret information uniquely identifying said device, said registering further comprising copying said first credential and said second credential to said device as a stored first credential and a stored second credential;
periodically transmitting a query from said device to said first co-registrar for said first credential and said second credential; and
comparing said first credential with said first stored credential, in order to detect a change in the identity of said second co-registrar.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems of providing security backup services to a home network are described. In one embodiment, the gateway for a home network is registered with a service provider. A network device is enrolled with the home network, and periodically reenrolls. The device detects whether the gateway has been replaced between enrolling and reenrolling, and if it has been replaced, determines whether the new network gateway has been endorsed by the service provider.
82 Citations
7 Claims
-
1. A method of detecting a change in the structure of a network, comprising:
-
connecting a first co-registrar with a second co-registrar, said connecting comprising said first co-registrar validating a first credential identifying said second co-registrar, and said second co-registrar validating a second credential identifying said first co-registrar; registering a device with said first co-registrar, said registering comprising exchanging secret information between said device and said co-registrar, said secret information uniquely identifying said device, said registering further comprising copying said first credential and said second credential to said device as a stored first credential and a stored second credential; periodically transmitting a query from said device to said first co-registrar for said first credential and said second credential; and comparing said first credential with said first stored credential, in order to detect a change in the identity of said second co-registrar. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification