Gated Network Service
First Claim
Patent Images
1. A method comprising:
- at a gateway device of a network, identifying a plurality of devices connected to the network;
monitoring network traffic at the gateway device;
determining that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint; and
providing a risk assessment associated with the privacy constraint violation to a subscriber of a service associated with the gateway device, wherein the risk assessment is at least partially based on terms and conditions associated with at least one device of the plurality of devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint. The method also includes providing a risk assessment associated with the privacy constraint violation. The risk assessment is at least partially based on terms and conditions associated with a particular device of the plurality of devices.
51 Citations
20 Claims
-
1. A method comprising:
-
at a gateway device of a network, identifying a plurality of devices connected to the network; monitoring network traffic at the gateway device; determining that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint; and providing a risk assessment associated with the privacy constraint violation to a subscriber of a service associated with the gateway device, wherein the risk assessment is at least partially based on terms and conditions associated with at least one device of the plurality of devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A network gateway device comprising:
-
a network interface configured to receive network traffic from a plurality of devices connected to a network; and a privacy module that is coupled to the network interface and is configured to; identify the plurality of devices connected to the network; monitor network traffic at the gateway device; determine that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint; and provide a risk assessment associated with the privacy constraint violation, wherein the risk assessment is at least partially based on terms and conditions associated with at least one device of the plurality of devices. - View Dependent Claims (16, 17)
-
-
18. A computer-readable storage medium comprising instructions that, when executed by a processor, enable the processor to:
-
at a service provider system, receive information from a gateway device, wherein the information includes at least traffic flow information associated with a plurality of devices connected to a network; develop rules usable in determining whether traffic flow monitored at the gateway device violates a privacy constraint, wherein the rules are based at least partially on the received information; and send the developed rules to the gateway device. - View Dependent Claims (19, 20)
-
Specification