System and method for detecting hacked modems
First Claim
Patent Images
1. A method comprising:
- performing a heuristic test on an online communication device to determine a likelihood that the communication device is hacked, wherein performing the heuristic test comprises;
determining that a provisioning mode of the communication device is in accordance with DOCSIS 1.0, and either that a STB QoS profile is not present and the communication device conforms to DOCSIS 2.0 or higher or that a STB QoS profile is present and a public customer premises equipment is present behind the communication device, andbased on the determining, noting that the likelihood that the communication device is hacked is increased; and
associating the likelihood that the communication device is hacked with the communication device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for detecting hacked modems in a cable network system. A cable Internet service provider can provide the disclosed heuristic to determine whether a particular cable modem has likely been hacked by obtaining a score corresponding to this likelihood. This score, as well as information regarding failure and success of various tests, can be used to generate a report identifying the likelihood that various modems have been hacked.
-
Citations
69 Claims
-
1. A method comprising:
-
performing a heuristic test on an online communication device to determine a likelihood that the communication device is hacked, wherein performing the heuristic test comprises; determining that a provisioning mode of the communication device is in accordance with DOCSIS 1.0, and either that a STB QoS profile is not present and the communication device conforms to DOCSIS 2.0 or higher or that a STB QoS profile is present and a public customer premises equipment is present behind the communication device, and based on the determining, noting that the likelihood that the communication device is hacked is increased; and associating the likelihood that the communication device is hacked with the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 68)
-
-
23. A computer-readable storage device having stored thereon computer-executable instructions, execution of which, by one or more computing devices, causes the computing devices to perform operations comprising:
-
performing a heuristic test on an online communication device to determine a likelihood that the communication device is hacked, wherein performing the heuristic test comprises; determining that a provisioning mode of the communication device is in accordance with DOCSIS 1.0, and either that a STB QoS profile is not present and the communication device conforms to DOCSIS 2.0 or higher or that a STB QoS profile is present and public customer premises equipment is present behind the communication device, and based on the determining, noting that the likelihood that the communication device is hacked is increased; and associating the likelihood that the communication device is hacked with the communication device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 69)
-
-
45. A system comprising:
-
a memory configured to store modules comprising; a performing module configured to perform a heuristic test on an online communication device to determine a likelihood that the communication device is hacked, wherein performing the heuristic test comprises; determining that a provisioning mode of the communication device is in accordance with DOCSIS 1.0, and either that a STB QoS profile is not present and the communication device conforms to DOCSIS 2.0 or higher or that a STB QoS profile is present and a public customer premises equipment is present behind the communication device, and based on the determining, noting that the likelihood that the communication device is hacked is increased, and an associating module configured to associate the likelihood that the communication device is hacked with the communication device; and one or more processors configured to process the modules. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
Specification