H04L12/22

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network
10652038 · 2020-05-12 · ·

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network
10652039 · 2020-05-12 · ·

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network
10652039 · 2020-05-12 · ·

Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.

Network device authorization for access control and information security

A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint device and a port identifier identifying a port on the switch to a threat management server in response to the device passing authentication. The threat management server determines the endpoint device is present in the black list using the device identifier. The threat management server determines the endpoint device has a block on the port of the switch using the port identifier. The threat management server removes the block for the endpoint device on the port on the switch in response to determining the endpoint device has the block on the port of the switch.

Network switch port access control and information security

A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint device to the threat management server in response to the endpoint device connecting to a port on the switch. The threat management server determines the endpoint device is present in a blacklist based on the device identifier in response to receiving the device identifier. The threat management server determines the endpoint device is blocked from one or more second ports on the switch. The threat management server blocks the endpoint device from accessing the network via the first port on the switch in response to determining the endpoint device is blocked from the one or more other ports on the switch.

TERMINAL-BASED CONTROL METHOD FOR SMART HOUSEHOLD APPLIANCE AND TERMINAL
20200021456 · 2020-01-16 ·

The present disclosure provides a terminal-based control method for a smart household appliance and a terminal, and relates to a field of controlling a smart device. The terminal-based control method for a smart household appliance of the present disclosure comprises: determining a working state of each smart household appliance; when it is determined that at least one smart household appliance is in a power-on state through the terminal, opening a second-level control interface of at least one smart household appliance in the power-on state; the second-level control interface is configured to adjust working parameters of the smart household appliance. Through the second-level control interface, the working parameters of the smart household appliance may be adjusted directly, thereby realizing and improving convenience of controlling the smart household appliance.

TERMINAL-BASED CONTROL METHOD FOR SMART HOUSEHOLD APPLIANCE AND TERMINAL
20200021456 · 2020-01-16 ·

The present disclosure provides a terminal-based control method for a smart household appliance and a terminal, and relates to a field of controlling a smart device. The terminal-based control method for a smart household appliance of the present disclosure comprises: determining a working state of each smart household appliance; when it is determined that at least one smart household appliance is in a power-on state through the terminal, opening a second-level control interface of at least one smart household appliance in the power-on state; the second-level control interface is configured to adjust working parameters of the smart household appliance. Through the second-level control interface, the working parameters of the smart household appliance may be adjusted directly, thereby realizing and improving convenience of controlling the smart household appliance.

Information Display Regarding Playback Queue Subscriptions
20240086140 · 2024-03-14 ·

Example techniques relate to playback queue subscriptions. An example implementation involves a computing system receiving, from a first computing device associated with a first user account, an instruction to enable subscription to a first playback queue associated with a first media playback system. In response to the instruction, the computing system enables second user accounts to subscribe to the first playback queue. The second user accounts are registered with respective second media playback systems in respective second household. The computing system receives, from a particular second media playback system, a request to subscribe to the first playback queue; and in response, sends one or more messages that update a control interface of the first control device to display a subscriber indication and (ii) sends one or more messages that populate a second playback queue of the particular second media playback system with audio tracks of the first playback queue.

Information Display Regarding Playback Queue Subscriptions
20240086140 · 2024-03-14 ·

Example techniques relate to playback queue subscriptions. An example implementation involves a computing system receiving, from a first computing device associated with a first user account, an instruction to enable subscription to a first playback queue associated with a first media playback system. In response to the instruction, the computing system enables second user accounts to subscribe to the first playback queue. The second user accounts are registered with respective second media playback systems in respective second household. The computing system receives, from a particular second media playback system, a request to subscribe to the first playback queue; and in response, sends one or more messages that update a control interface of the first control device to display a subscriber indication and (ii) sends one or more messages that populate a second playback queue of the particular second media playback system with audio tracks of the first playback queue.

System and Method for Secure Vehicle Communication
20190379746 · 2019-12-12 ·

A system and method for secure vehicle communication of a vehicle. The system comprises a communication system comprising at least one telematics module for executing one or more telematics applications, and a session module for session management of the telematics applications, wherein the session management comprises the assigning of at least one session identification, session ID, to each telematics application, wherein the session module assigns a new session ID to each telematics application after expiration of a predetermined time period.