Authorizing equipment on a sub-network
First Claim
Patent Images
1. A method comprising:
- receiving, at an authorization server, an encrypted request for a connection;
identifying, by the authorization server, a first unique identifier associated with the encrypted request;
identifying, by the authorization server, a network membership key associated with the first unique identifier;
authorizing, by the authorization server, the encrypted request based on the network membership key;
creating, by the authorization server, an encrypted network membership key, said creating including encrypting the network membership key using a device access key associated with a network termination unit; and
communicating, by the authorization server, the encrypted network membership key to the network termination unit.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authorizing a customer premise equipment (CPE) device to join a network through a network termination unit (NTU). The CPE device can send an encrypted connection request, and an authorization server can decrypt the connection request and provide a network membership key (NMK) associated with the CPE device to the NTU. The authorization server can encrypt the NMK associated with the CPE device using a device access key (DAK) associated with the NTU.
-
Citations
26 Claims
-
1. A method comprising:
-
receiving, at an authorization server, an encrypted request for a connection; identifying, by the authorization server, a first unique identifier associated with the encrypted request; identifying, by the authorization server, a network membership key associated with the first unique identifier; authorizing, by the authorization server, the encrypted request based on the network membership key; creating, by the authorization server, an encrypted network membership key, said creating including encrypting the network membership key using a device access key associated with a network termination unit; and communicating, by the authorization server, the encrypted network membership key to the network termination unit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
one or more processors; a network interface communicably coupled to the one or more processors; and a non-transitory computer-readable storage medium having stored thereon instructions that when executed cause the one or more processors to perform operations comprising; receiving, using the network interface, an encrypted request for a connection, identifying a first unique identifier associated with the encrypted request, identifying a network membership key associated with the first unique identifier, authorizing the encrypted request based on the network membership key, creating an encrypted network membership key, wherein said creating includes encrypting the network membership key using a device access key associated a network termination unit, and communicating the encrypted network membership key to the network termination unit. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium having stored thereon computer-executable instructions that when executed cause one or more processors to perform operations comprising:
-
receiving an encrypted request for a connection; identifying a first unique identifier associated with the encrypted request; identifying a network membership key associated with the first unique identifier; authorizing the encrypted request based on the network membership key; creating an encrypted network membership key, wherein said creating includes encrypting the network membership key using a device access key associated with a network termination unit; and communicating the encrypted network membership key to the network termination unit. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
Specification