System and method for binding a subscription-based computing system to an internet service
First Claim
1. A method for binding a subscription-based computer to an internet service provider (ISP) comprising:
- receiving configuration data from a peripheral device at the subscription-based computer;
determining if a source of the configuration data is authentic;
communicating an encrypted packet from the subscription-based computer to a remote computer of the ISP if the source of the configuration data is authentic, the encrypted packet uniquely identifying the subscription-based computer;
receiving a heartbeat packet from the remote computer at the subscription-based computer, if the encrypted packet is authenticated at the remote computer;
authenticating the heartbeat packet at the subscription-based computer; and
controlling the subscription-based computer to maintain communication with the ISP if the heartbeat packet is authentic.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
-
Citations
19 Claims
-
1. A method for binding a subscription-based computer to an internet service provider (ISP) comprising:
-
receiving configuration data from a peripheral device at the subscription-based computer; determining if a source of the configuration data is authentic; communicating an encrypted packet from the subscription-based computer to a remote computer of the ISP if the source of the configuration data is authentic, the encrypted packet uniquely identifying the subscription-based computer; receiving a heartbeat packet from the remote computer at the subscription-based computer, if the encrypted packet is authenticated at the remote computer; authenticating the heartbeat packet at the subscription-based computer; and controlling the subscription-based computer to maintain communication with the ISP if the heartbeat packet is authentic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for binding a subscription-based computer to a service provider, the system comprising:
-
a processor of the subscription-based computer; a binding module residing on the subscription-based computer including computer storage media having computer executable instructions comprising; a detection module identifying configuration data received from a peripheral device of the subscription-based computer; a validation module authenticating the configuration data; and a security module residing on the subscription-based computer, in communication with the binding module, including computer storage media, having computer executable instructions comprising a network module that degrades operation of the subscription-based computer if the validation module does not authenticate the configuration data; a heartbeat module residing on the subscription-based computer including computer storage media having computer executable instructions comprising a heartbeat validation module that receives and verifies an encrypted ping message received from a remote computer using the processor of the subscription-based computer, wherein the network module does not degrade the operation of the subscription-based computer if the validation module authenticates the configuration data and a response to a request for data, sent from the subscription-based computer to the remote computer, and if the heartbeat validation module receives and verifies the encrypted ping message. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system including a binding module that communicates with a security module of a subscription-based computer, the binding module including a detection module and a cryptographic module, at least one of the binding module and the security module including a memory and a processor physically configured to execute computer executable code for:
-
accessing, decrementing and storing a number of subscription units in the memory during operation of the subscription-based computer; receiving, at the subscription-based computer, configuration data from a peripheral device; authenticating a source of the configuration data; passing the configuration data to a processor of the subscription-based computer if the source of the configuration data is authentic; discarding the configuration data if the source of the configuration data is not authentic; sending an encrypted packet from the subscription-based computer to a remote computer of an independent service provider (ISP) if the source of the configuration data is authentic, the encrypted packet uniquely identifying the subscription-based computer; receiving an encrypted ping message from the remote computer at a random time interval; authenticating the encrypted ping message at the computer; and controlling the subscription-based computer to maintain communication between the ISP and the subscription-based computer if the encrypted ping message is authentic. - View Dependent Claims (18, 19)
-
Specification