Methods and devices for discouraging unauthorized modifications to set top boxes and to gateways
First Claim
Patent Images
1. A set top box, comprising:
- a first port coupling a processor to a first communications network and to a database, the first port sending resource information associated with the set top box, the resource information describing at least two disk drives and a capacity of each disk drive;
a second port coupling the processor to a second communications network;
the second port receiving an operating instruction over the second communications network that permits the processor to access an additional portion of the at least two disk drives;
wherein the processor executes the operating instruction to repartition the capacity of a disk drive;
a firewall determining when a source is authorized to communicate with the set top box and determining when a communications protocol is authorized, the firewall thus protecting the set top box from unauthorized access;
the processor receiving an instruction over the second communications network when there is a difference between the capacity of the disk drives and authorized storage for the set top box defined in the database, the difference indicating unauthorized modifications to the set top box, the instruction causing the processor to disable a resource of the set top box.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices are disclosed for discouraging unauthorized modifications to set top boxes and gateways. Resource information is received that describing the number of disk drives and/or the capacity of each disk drive. A processor communicates with a database that stores configuration information. The processor compares the resource information to the configuration information. When the resource information differs from the configuration information, then the processor detects unauthorized modifications to the set top box.
36 Citations
9 Claims
-
1. A set top box, comprising:
-
a first port coupling a processor to a first communications network and to a database, the first port sending resource information associated with the set top box, the resource information describing at least two disk drives and a capacity of each disk drive; a second port coupling the processor to a second communications network; the second port receiving an operating instruction over the second communications network that permits the processor to access an additional portion of the at least two disk drives;
wherein the processor executes the operating instruction to repartition the capacity of a disk drive;a firewall determining when a source is authorized to communicate with the set top box and determining when a communications protocol is authorized, the firewall thus protecting the set top box from unauthorized access; the processor receiving an instruction over the second communications network when there is a difference between the capacity of the disk drives and authorized storage for the set top box defined in the database, the difference indicating unauthorized modifications to the set top box, the instruction causing the processor to disable a resource of the set top box. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
initiating communication between a set top box and a service provider over a first communications network; initiating communication between the set top box and the service provider over a second communications network; sending to the service provider resource information associated with the set top box describing at least two disk drives and a capacity of each disk drive; receiving from the service provider an operating instruction that permits a processor in the set top box to access an additional portion of the at least two disk drives; the processor executing the operating instruction to repartition the capacity of a disk drive; determining when a source is authorized to communicate with the set top box and determining when a communications protocol is authorized, thus protecting the set top box from unauthorized access; and receiving an instruction from the service provider when there is a difference between the capacity of the disk drives and authorized storage for the set top box defined in a database, the difference indicating unauthorized modifications to the set top box, the instruction causing the processor to disable a resource of the set top box. - View Dependent Claims (8, 9)
-
Specification