Secure media peripheral association in a media exchange network
First Claim
1. A method for establishing secure access to a media peripheral in a home via a node in a communication network, the method comprising:
- acquiring by the node, security data associated with the media peripheral;
searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral;
communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when said previously acquired security data is not found; and
performing the following when said previously acquired security data is found;
utilizing by the node, said acquired security data associated with the media peripheral and said previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network;
acquiring at least one identifier associated with a location of previous operation of the media peripheral;
validating said acquired at least one identifier based on said previously acquired security data, prior to communicating over the communication network; and
registering the media peripheral for subsequent operation while being located in the home, when said acquired at least one identifier is valid.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for establishing secure access to a media peripheral in a home via a node in a communication network may include acquiring by the node, security data associated with the media peripheral. The method may include searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral. The method may further include communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when the previously acquired security data is not found. The node may utilize the acquired security data associated with the media peripheral and the previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network, when the previously acquired security data is found.
16 Citations
24 Claims
-
1. A method for establishing secure access to a media peripheral in a home via a node in a communication network, the method comprising:
-
acquiring by the node, security data associated with the media peripheral; searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral; communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when said previously acquired security data is not found; and performing the following when said previously acquired security data is found; utilizing by the node, said acquired security data associated with the media peripheral and said previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network; acquiring at least one identifier associated with a location of previous operation of the media peripheral; validating said acquired at least one identifier based on said previously acquired security data, prior to communicating over the communication network; and registering the media peripheral for subsequent operation while being located in the home, when said acquired at least one identifier is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for establishing secure access to a media peripheral in a home via a node in a communication network, the system comprising:
-
at least one processor for use within the node, said at least one processor operable to acquire security data associated with the media peripheral; said at least one processor operable to search for a previously acquired security data associated with a location of previous operation of the media peripheral; said at least one processor operable to communicate between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when said previously acquired security data is not found; and said at least one processor operable to perform the following when said previously acquired security data is found; utilize said acquired security data associated with the media peripheral and said previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network; acquire at least one identifier associated with a location of previous operation of the media peripheral; validate said acquired at least one identifier based on said previously acquired security data, prior to communicating over the communication network; and register the media peripheral for subsequent operation while being located in the home. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for establishing secure access to a media peripheral in a home via a node in a communication network, the method comprising:
-
acquiring by the node, security data associated with the media peripheral; searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral; and performing the following when said previously acquired security data is found; utilizing by the node, said acquired security data associated with the media peripheral and said previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network; acquiring at least one identifier associated with a location of previous operation of the media peripheral; validating said acquired at least one identifier based on said previously acquired security data, prior to communicating over the communication network; and registering the media peripheral for subsequent operation while being located in the home, when said acquired at least one identifier is valid. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification