SYSTEM AND METHOD FOR DETECTING HACKED MODEMS
First Claim
Patent Images
1. A method comprising:
- performing a heuristic test on an online communication device to determine a likelihood that the communication device is hacked; and
associating the likelihood that the communication device is hacked with the communication device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for detecting hacked modems in a cable network system. A cable Internet service provider can provide the disclosed heuristic to determine whether a particular cable modem has likely been hacked by obtaining a score corresponding to this likelihood. This score, as well as information regarding failure and success of various tests, can be used to generate a report identifying the likelihood that various modems have been hacked.
35 Citations
47 Claims
-
1. A method comprising:
-
performing a heuristic test on an online communication device to determine a likelihood that the communication device is hacked; and associating the likelihood that the communication device is hacked with the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An article of manufacture including a computer-readable storage medium having stored thereon computer-executable instructions, execution of which, by one or more computing devices, causes the computing devices to perform operations comprising:
-
performing a heuristic test on an online communication device to determine a likelihood that the communication device is hacked; and associating the likelihood that the communication device is hacked with the communication device. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A system comprising:
-
a memory configured to store modules comprising; a performing module configured to perform a heuristic test on an online communication device to determine a likelihood that the communication device is hacked, and an associating module configured to associate the likelihood that the communication device is hacked with the communication device; and one or more processors configured to process the modules.
-
Specification