Secure media peripheral association in a media exchange network
First Claim
1. A method for establishing secure access to a media peripheral in a home via a node in a communication network, the method comprising:
- acquiring by the node, security data associated with the media peripheral;
searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral;
communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when said previously acquired security data is not found; and
when said previously acquired security data is found;
registering the media peripheral for subsequent operation if a location identifier does not match a prior location identifier.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for establishing secure access to a media peripheral in a home via a node in a communication network includes acquiring by the node, security data associated with the media peripheral; searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral; and communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when the previously acquired security data is not found. The security data is a digital certificate. The security data may be read from the media peripheral. The security data may be transferred to a media exchange server coupled to the communication network. The acquired security data may be authenticated prior to the searching. At least one identifier may be established to facilitate communication of the media peripheral over the communication network.
128 Citations
20 Claims
-
1. A method for establishing secure access to a media peripheral in a home via a node in a communication network, the method comprising:
-
acquiring by the node, security data associated with the media peripheral; searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral; communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when said previously acquired security data is not found; and when said previously acquired security data is found;
registering the media peripheral for subsequent operation if a location identifier does not match a prior location identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for establishing secure access to a media peripheral in a home via a node in a communication network, the system comprising:
-
at least one processor for use within the node, said at least one processor configured to acquire security data associated with the media peripheral; said at least one processor configured to search for a previously acquired security data associated with a location of previous operation of the media peripheral; said at least one processor configured to communicate between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when said previously acquired security data is not found; and when said previously acquired security data is found;
said at least one processor configured register the media peripheral for subsequent operation if a location identifier does not match a prior location identifier. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for establishing secure access to a media peripheral in a home via a node in a communication network, the method comprising:
-
acquiring by the node, security data associated with the media peripheral; searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral; communicating between the node and the media peripheral, information associated with the media peripheral, when said previously acquired security data is not found; and performing the following when said previously acquired security data is found; acquiring at least one identifier associated with a location of previous operation of the media peripheral; validating said acquired at least one identifier based on said previously acquired security data, prior to communicating over the communication network; and registering the media peripheral for subsequent operation, when said acquired at least one identifier is valid. - View Dependent Claims (20)
-
Specification