Technique for providing security measures for communications device connectable to a communications network
First Claim
1. A system for locating a device connected to a communications network through one of a plurality of nodes, the nodes being associated with respective ones of service areas, the device being identifiable by identifying data, the system comprising:
- an interface for receiving, through a first node, a request for connection by the device to the communications network, the request including information concerning the device; and
a server for determining that at least part of the information concerning the device corresponding to the identifying data is present in a theft list,whereby the device is determined to be located in the service area associated with the first node;
the server, responsive to the at least part of the information concerning the device corresponding to the identifying data present in the theft list, being further operative to;
trigger an authorization process of the device;
receive an indication of a current postal address location during the authorization process of the device; and
cause to be provided to a security enforcement agency information about a location of the device including the current postal address location.
6 Assignments
0 Petitions
Accused Products
Abstract
A user may purchase in a retail outlet a host device for receiving cable services. The cable operator needs to provide a point-of-deployment (POD) module for insertion into the host device to realize out-of-band communications, and provide conditional access to premium subscription channels. Security measures are implemented to detect removal of the host device from its connection to a broadband communications system. If its removal is unauthorized, the service area in which the host device is located may be identified when it is reconnected to the system. In addition, a transmission device in the host device may be activated to transmit detectable signals to help recover the host device.
-
Citations
36 Claims
-
1. A system for locating a device connected to a communications network through one of a plurality of nodes, the nodes being associated with respective ones of service areas, the device being identifiable by identifying data, the system comprising:
-
an interface for receiving, through a first node, a request for connection by the device to the communications network, the request including information concerning the device; and a server for determining that at least part of the information concerning the device corresponding to the identifying data is present in a theft list, whereby the device is determined to be located in the service area associated with the first node; the server, responsive to the at least part of the information concerning the device corresponding to the identifying data present in the theft list, being further operative to; trigger an authorization process of the device; receive an indication of a current postal address location during the authorization process of the device; and cause to be provided to a security enforcement agency information about a location of the device including the current postal address location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Apparatus for receiving programming content from a communications network, the apparatus comprising:
-
an interface for coupling the apparatus with a device for effecting a communication to a server through the communications network; a modem which, enabled by the interface with the device; sends, from the apparatus, to the server, through a first node of the communications network, a request for connection of the device to the communications network after the device has first been properly connected to the communications network through a second node and then disconnected and improperly reconnected through the first node, the request including the identifying data of the apparatus, an address of the device within the communications network and a current postal address location of the apparatus obtained during an authorization process during the reconnection through the first node; receives, from the server, a transmission activation message upon determining that at least a part of the identifying data is present in a theft list accessible to the server; and a transmission mechanism, which, responsive to the transmission activation message, generates a detectable radio frequency signal receivable by a radio frequency receiver of a security enforcement agency for confirming a location of the apparatus at the current postal address location obtained during the authorization process. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method for locating a device connected to a communications network through one of a plurality of nodes, the nodes being associated with respective ones of service areas, the device being identifiable by identifying data, the method comprising:
-
receiving, through a first node, a request for connection by the device to the communications network, the request including information concerning the device; and determining that at least part of the information concerning the device, corresponding to the identifying data is present in a theft list, whereby the device is determined to be located in the service area associated with the first node; further comprising, responsive to the at least part of the information concerning the device corresponding to the identifying data present in the theft list; triggering an authorization process of the device; receiving an indication of a current postal address location during the authorization process; and providing to a security enforcement agency information about a location of the device including the current postal address location. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for use in an apparatus for receiving programming content from a communications network, the apparatus including a transmission mechanism, the method comprising:
-
providing an interface for coupling the apparatus with a device for effecting a communication to a server through the communications network; enabled by the interface with the device, sending, from the apparatus, to the server, through a first node of the communications network, a request for connection of the device to the communications network after the device has first been properly connected to the communications network through a second node and then disconnected and improperly reconnected through the first node, the request including the identifying data of the apparatus, an address of the device within the communications network and a current postal address location of the apparatus obtained during an authorization process during the reconnection through the first node; and receiving, from the server, a transmission activation message upon determining that at least a part of the identifying data is present in a theft list accessible to the server, the transmission activation message causing the transmission mechanism to generate a detectable radio frequency signal receivable by a radio frequency receiver of a security enforcement agency for confirming a location of the apparatus at the current postal address location obtained during the authorization process. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
Specification