MX2019014392A - Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente. - Google Patents

Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente.

Info

Publication number
MX2019014392A
MX2019014392A MX2019014392A MX2019014392A MX2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A
Authority
MX
Mexico
Prior art keywords
authentication token
locally
entry
device remotely
modem
Prior art date
Application number
MX2019014392A
Other languages
English (en)
Inventor
NEGAHDAR Ali
Original Assignee
Arris Entpr Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arris Entpr Llc filed Critical Arris Entpr Llc
Publication of MX2019014392A publication Critical patent/MX2019014392A/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • H04L12/4625Single bridge functionality, e.g. connection of two networks over a single bridge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/2898Subscriber equipments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

Se proporciona un método para configurar remotamente un módem de manera segura utilizando un testigo de autenticación para uso con un proveedor de servicios; el método incluye recibir un testigo de autenticación encriptado desde el módem, el testigo de autenticación tiene al menos una contraseña y está encriptado de acuerdo con una clave pública, transmitir el testigo de autenticación encriptado a un servidor de autenticación, recibir un testigo de autenticación desencriptado desde el servidor de autenticación, y configurar al menos una interfaz de módem al menos en parte utilizando el testigo de autenticación.
MX2019014392A 2017-06-02 2018-05-31 Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente. MX2019014392A (es)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201762514442P 2017-06-02 2017-06-02
US201762514407P 2017-06-02 2017-06-02
US201762514339P 2017-06-02 2017-06-02
US15/943,799 US10951467B2 (en) 2017-06-02 2018-04-03 Secure enabling and disabling points of entry on a device remotely or locally
PCT/US2018/035266 WO2018222791A1 (en) 2017-06-02 2018-05-31 Secure enabling and disabling points of entry on a device remotely or locally

Publications (1)

Publication Number Publication Date
MX2019014392A true MX2019014392A (es) 2020-02-10

Family

ID=62713099

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2019014392A MX2019014392A (es) 2017-06-02 2018-05-31 Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente.

Country Status (5)

Country Link
US (1) US10951467B2 (es)
EP (1) EP3632077B1 (es)
CA (1) CA3063396C (es)
MX (1) MX2019014392A (es)
WO (1) WO2018222791A1 (es)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10728233B2 (en) 2017-06-02 2020-07-28 Arris Enterprises Llc Secure key management in a high volume device deployment
US10951467B2 (en) * 2017-06-02 2021-03-16 Arris Enterprises Llc Secure enabling and disabling points of entry on a device remotely or locally
AU2019356522A1 (en) * 2018-10-08 2021-05-27 Alkira Software Holdings Pty Ltd Secure service interaction
EP3932010A1 (en) * 2019-02-27 2022-01-05 Telefonaktiebolaget LM Ericsson (publ) Methods and apparatuses for managing a port of a network device
EP4128711A1 (en) * 2020-03-27 2023-02-08 ARRIS Enterprises LLC Method and apparatus for providing secure short-lived downloadable debugging tools
US12041088B2 (en) * 2021-03-24 2024-07-16 Corelight, Inc. System and method for identifying authentication method of secure shell (SSH) sessions

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5311596A (en) * 1992-08-31 1994-05-10 At&T Bell Laboratories Continuous authentication using an in-band or out-of-band side channel
US7290142B1 (en) * 1999-09-28 2007-10-30 Thomas Licensing System and method for initializing a simple network management protocol (SNMP) agent
US6912528B2 (en) * 2000-01-18 2005-06-28 Gregg S. Homer Rechargeable media distribution and play system
US20010037468A1 (en) * 2000-04-11 2001-11-01 Gaddis M. Norton Method and apparatus for creating unique image passwords
US6771751B1 (en) * 2000-10-17 2004-08-03 Comdial Corporation Systems and methods for information exchange and synchronization using DTMF over telephone communication channels
US6952428B1 (en) * 2001-01-26 2005-10-04 3Com Corporation System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network
US7266840B2 (en) * 2001-07-12 2007-09-04 Vignette Corporation Method and system for secure, authorized e-mail based transactions
US7769838B2 (en) * 2001-08-23 2010-08-03 The Directv Group, Inc. Single-modem multi-user virtual private network
US7739359B1 (en) * 2002-09-12 2010-06-15 Cisco Technology, Inc. Methods and apparatus for secure cable modem provisioning
US7200868B2 (en) * 2002-09-12 2007-04-03 Scientific-Atlanta, Inc. Apparatus for encryption key management
US20050044379A1 (en) * 2003-08-20 2005-02-24 International Business Machines Corporation Blind exchange of keys using an open protocol
JP3803669B2 (ja) * 2003-11-07 2006-08-02 Necアクセステクニカ株式会社 ネットワーク接続システムおよびネットワーク接続方法
US20050216518A1 (en) * 2004-03-26 2005-09-29 Oracle International Corporation Database management system with persistent, user-accessible bitmap values
US9118644B2 (en) 2005-09-30 2015-08-25 Blackridge Technology Holdings, Inc. Method for directing requests to trusted resources
US7865727B2 (en) * 2006-08-24 2011-01-04 Cisco Technology, Inc. Authentication for devices located in cable networks
US9569587B2 (en) * 2006-12-29 2017-02-14 Kip Prod Pi Lp Multi-services application gateway and system employing the same
US8621540B2 (en) * 2007-01-24 2013-12-31 Time Warner Cable Enterprises Llc Apparatus and methods for provisioning in a download-enabled system
US8239340B2 (en) * 2008-04-11 2012-08-07 Trevor Hanson Message conduit systems with algorithmic data stream control and methods for processing thereof
US10459711B2 (en) * 2008-08-12 2019-10-29 Adobe Inc. Updating applications using migration signatures
US8228861B1 (en) * 2008-09-12 2012-07-24 Nix John A Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays
WO2010143906A2 (ko) * 2009-06-10 2010-12-16 엘지전자 주식회사 그룹자원할당 방법에서 자원할당 비트맵 구성방법
US9736769B2 (en) * 2009-10-01 2017-08-15 Qualcomm Incorporated Energy efficient quality of service aware communication over multiple air-links
US9379756B2 (en) * 2012-05-17 2016-06-28 Liveu Ltd. Multi-modem communication using virtual identity modules
US9166973B2 (en) * 2012-10-11 2015-10-20 Sling Media, Inc. System and method for controlling access to an electronic device
US9094401B2 (en) * 2013-02-19 2015-07-28 Owl Computing Technologies, Inc. Secure front-end interface
US10154025B2 (en) * 2013-03-15 2018-12-11 Qualcomm Incorporated Seamless device configuration in a communication network
US9131531B2 (en) * 2013-06-06 2015-09-08 Broadcom Corporation Mobile communication device with multiple wireless transceivers and methods for use therewith
US9350550B2 (en) * 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US9118664B1 (en) * 2014-02-24 2015-08-25 Arris Enterprises, Inc. Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords
EP3178281B1 (en) * 2014-08-07 2020-04-29 Intel Corporation User equipment and methods for allocation and signaling of time resources for device to device (d2d) communication
US9794784B2 (en) * 2015-01-29 2017-10-17 Qualcomm Incorporated Techniques for preventing unauthorized users from controlling modem of mobile device
US9692757B1 (en) * 2015-05-20 2017-06-27 Amazon Technologies, Inc. Enhanced authentication for secure communications
EP3110099B1 (en) * 2015-06-24 2018-10-31 Accenture Global Services Limited Device authentication
US10261782B2 (en) * 2015-12-18 2019-04-16 Amazon Technologies, Inc. Software container registry service
US10032032B2 (en) * 2015-12-18 2018-07-24 Amazon Technologies, Inc. Software container registry inspection
US10250591B2 (en) * 2016-02-12 2019-04-02 International Business Machines Corporation Password-based authentication
US20170329966A1 (en) * 2016-05-13 2017-11-16 Qualcomm Incorporated Electronic device based security management
US10523678B2 (en) * 2016-10-25 2019-12-31 Sean Dyon System and method for architecture initiated network access control
US10554632B2 (en) * 2017-05-15 2020-02-04 Medtronic, Inc. Multimodal cryptographic data communications in a remote patient monitoring environment
US10951467B2 (en) * 2017-06-02 2021-03-16 Arris Enterprises Llc Secure enabling and disabling points of entry on a device remotely or locally
US10728233B2 (en) * 2017-06-02 2020-07-28 Arris Enterprises Llc Secure key management in a high volume device deployment

Also Published As

Publication number Publication date
US20180351797A1 (en) 2018-12-06
EP3632077B1 (en) 2021-03-10
CA3063396A1 (en) 2018-12-06
WO2018222791A1 (en) 2018-12-06
US10951467B2 (en) 2021-03-16
EP3632077A1 (en) 2020-04-08
CA3063396C (en) 2024-04-23

Similar Documents

Publication Publication Date Title
MX2019014392A (es) Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente.
MX2016014461A (es) Aprovisionamiento de licencias de gestion de derechos digitales (drm) en un dispositivo cliente que utiliza un servidor de actualizaciones.
TW201612787A (en) Network authentication method for secure electronic transactions
SG10201803986RA (en) Method and system for secure transmission of remote notification service messages to mobile devices without secure elements
MX2019008945A (es) Certificado de origen basado en la emision de certificados en linea.
ZA202108153B (en) Threshold signature based medical device management
WO2016144257A3 (en) Method and system for facilitating authentication
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN104219228A (zh) 一种用户注册、用户识别方法及系统
PH12021550562A1 (en) Authentication of internet of things devices, including electronic locks
GB2498039B (en) Password recovery service
GB2512249A (en) Secure peer discovery and authentication using a shared secret
RU2018103181A (ru) Конфиденциальные аутентификация и обеспечение
MY190913A (en) Device and method for secure connection
MX2017001090A (es) Gestion de claves inalambrica para autenticacion.
RU2017106105A (ru) Способы безопасного генерирования криптограмм
PE20170656A1 (es) Autenticacion de la red de servicio
MX2016016008A (es) Sistema de gestion de credenciales electronicas.
WO2008039582A3 (en) System and method for securing software applications
PH12018550176A1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
MX2018007696A (es) Metodo y sistema para mejorar la seguridad de una transaccion.
WO2007115982A3 (fr) Procede de protection d'identite, dispositifs, et produit programme d'ordinateur correspondants
IN2014KN02750A (es)
GB2598669A8 (en) Server-based setup for connecting a device to a local area network
SE1750282A1 (sv) Updating biometric data templates