Method to block unauthorized network traffic in a cable data network
First Claim
1. A system for providing data filtering from a cable modem termination system (CMTS) in a cable data network consisting essentially of:
- the CMTS, wherein the CMTS comprises a packet counter, wherein the packet counter determines a number of packets sent to a subscriber device from the CMTS (herein, “
downstream packets”
) and a number of packets originating from the subscriber device and sent to the CMTS (herein, “
upstream packets”
), and a data gateway agent;
a datastore accessible to the data gateway agent for storing a data transfer rule selected by a subscriber, wherein the selected data transfer rule comprises filtering criteria selected by the subscriber, andwherein the data gateway agent comprises instructions that cause the CMTS to;
receive a packet prior to receipt of the packet by the packet counter;
access the data transfer rule stored in the datastore;
use the filtering criteria to determine whether the packet violates the data transfer rule;
forward the packet to the packet counter for counting when the packet does not violate the data transfer rule; and
apply a corrective measure to the packet when the packet violates the data transfer rule.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention teaches methods and systems for subscriber blocking of unauthorized network traffic in a cable data network. The cable modem termination system (CMTS) incorporates a data gateway agent that filters unauthorized traffic thereby eliminating consumption based subscribers from being responsible for related service charges. Embodiments incorporate the use of packet filtering, hybrid stateful packet filtering, content filtering, application layer filtering and time based filtering. Greater acceptance of consumption based billing is achieved by having the filter settings directed by the subscriber.
96 Citations
24 Claims
-
1. A system for providing data filtering from a cable modem termination system (CMTS) in a cable data network consisting essentially of:
-
the CMTS, wherein the CMTS comprises a packet counter, wherein the packet counter determines a number of packets sent to a subscriber device from the CMTS (herein, “
downstream packets”
) and a number of packets originating from the subscriber device and sent to the CMTS (herein, “
upstream packets”
), and a data gateway agent;a datastore accessible to the data gateway agent for storing a data transfer rule selected by a subscriber, wherein the selected data transfer rule comprises filtering criteria selected by the subscriber, and wherein the data gateway agent comprises instructions that cause the CMTS to; receive a packet prior to receipt of the packet by the packet counter; access the data transfer rule stored in the datastore; use the filtering criteria to determine whether the packet violates the data transfer rule; forward the packet to the packet counter for counting when the packet does not violate the data transfer rule; and apply a corrective measure to the packet when the packet violates the data transfer rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 24)
-
-
12. A method for providing data filtering from a cable modem termination system (CMTS) in a cable data network, wherein the CMTS comprises a packet counter, wherein the packet counter determines a number of packets sent to a subscriber device from the CMTS (herein, “
- downstream packets”
) and a number of packets originating from the subscriber device and sent to the CMTS (herein, “
upstream packets”
), and a data gateway agent, the method consisting essentially of;receiving a packet prior to receipt of the packet by the packet counter; accessing a data transfer rule selected by a subscriber stored in a datastore accessible to the data gateway agent, wherein the selected data transfer rule comprises filtering criteria selected by the subscriber, and using the filtering criteria to determine whether the packet violates the data transfer rule; forwarding the packet to the packet counter for counting when the packet does not violate the data transfer rule; and applying a corrective measure to the packet violates the data transfer rule. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
- downstream packets”
Specification