WO2020133215A1 - Authentication for configuration page using multimedia terminal adapter dial pad - Google Patents

Authentication for configuration page using multimedia terminal adapter dial pad Download PDF

Info

Publication number
WO2020133215A1
WO2020133215A1 PCT/CN2018/124875 CN2018124875W WO2020133215A1 WO 2020133215 A1 WO2020133215 A1 WO 2020133215A1 CN 2018124875 W CN2018124875 W CN 2018124875W WO 2020133215 A1 WO2020133215 A1 WO 2020133215A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification code
characters
configuration page
access
terminal adapter
Prior art date
Application number
PCT/CN2018/124875
Other languages
French (fr)
Inventor
Rongbin RUAN
Original Assignee
Arris Enterprises Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arris Enterprises Llc filed Critical Arris Enterprises Llc
Priority to PCT/CN2018/124875 priority Critical patent/WO2020133215A1/en
Publication of WO2020133215A1 publication Critical patent/WO2020133215A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/26Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using dedicated tools for LAN [Local Area Network] management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/06Simultaneous speech and data transmission, e.g. telegraphic transmission over the same conductors
    • H04M11/066Telephone sets adapted for data transmision

Definitions

  • This disclosure relates to controlling user access to a configuration page associated with a device.
  • Voice services may be supported at a customer premise by a multimedia terminal adapter (MTA) .
  • MTA multimedia terminal adapter
  • a MTA may be provided to a subscriber within an embedded MTA (eMTA) .
  • eMTA embedded MTA
  • one or more devices installed at the customer premise e.g., a modem
  • An eMTA provides subscribers with the combined functionality of a cable modem and a phone adapter, thus supporting both data and voice services at a customer premise.
  • a device e.g., a customer premise equipment (CPE) device such as a modem
  • CPE customer premise equipment
  • a web GUI graphical user interface
  • MSO multiple-systems operator
  • HTTP hypertext transfer protocol
  • WAN wide-area network
  • a web GUI through which a CPE device may be configured is accessible only from a LAN (local area network) .
  • LAN local area network
  • FIG. 1 is a block diagram illustrating an example multimedia terminal adapter (MTA) connected to a customer premise equipment (CPE) device that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
  • MTA multimedia terminal adapter
  • CPE customer premise equipment
  • FIG. 2 is a block diagram illustrating an example multimedia terminal adapter (MTA) 105 embedded within a customer premise equipment (CPE) device 115 that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
  • MTA multimedia terminal adapter
  • CPE customer premise equipment
  • FIG. 3 is a flowchart illustrating an example process 300 operable to control access to a GUI configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device.
  • FIG. 4 is a flowchart illustrating an example process 400 operable to control access to a GUI configuration page based upon a timely and valid input of a verification code into a dial pad associated with a CPE device.
  • FIG. 5 is a block diagram of a hardware configuration 500 operable to control access to a GUI configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device.
  • the methods, systems, and apparatuses described in this disclosure are operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
  • the device may generate a verification code, and the device may output a prompt directing a user to dial the verification code at a dial pad associated with the device. If a valid entry of the verification code is received through the dial pad, the device may allow access to the configuration page. If a valid entry of the verification code is not received through the dial pad, the device may deny access to the configuration page.
  • FIG. 1 is a block diagram illustrating an example multimedia terminal adapter (MTA) connected to a customer premise equipment (CPE) device that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
  • MTA multimedia terminal adapter
  • a multimedia terminal adapter (MTA) 105 may facilitate delivery of voice services to one or more telephony devices 110a-b within a subscriber premise.
  • Telephony devices 110a-b may include cordless telephone (s) 110a and/or corded telephone (s) 110b.
  • Each telephony device 110a-b may have a dial pad through which a user may input one or more characters (e.g., numbers, letters, symbols, etc. ) .
  • a dial pad of a telephony device 110a-b may include a plurality of buttons, each button being associated with one or more characters, and the dial pad may be used to input a string of characters that is to be dialed.
  • the MTA 105 may be connected to another customer premise equipment (CPE) device 115 (e.g., the MTA 105 may be connected to a modem) , or the MTA 105 may be embedded within another CPE device 115 (e.g., an embedded MTA (eMTA) may be an MTA 105 that is embedded within a cable modem) .
  • CPE customer premise equipment
  • eMTA embedded MTA
  • settings and operational parameters of a CPE device 115 may be established and/or modified by a user through a user interface associated with the CPE device 115.
  • a CPE device 115 may be configured through a web GUI (graphical user interface) that is accessed by a user through a client device (e.g., computer, mobile device, tablet, etc. ) .
  • the web GUI may present a user with various options for configuring the CPE device 115.
  • a dial pad of a telephony device 110a-b that is associated with an MTA 105 (or eMTA) which is associated with the CPE device 115 may be utilized as a tool for verification.
  • the CPE device 115 may generate a verification code, output the verification code to a user (e.g., through a generated display of the verification code) , and prompt the user to dial the characters making up the verification code using a dial pad associated with the CPE device 115 (e.g., through a dial pad of a telephony device 110a-b connected to the MTA 105) .
  • a dial pad associated with the CPE device 115
  • a string of characters e.g., numerical digits, letters, symbols, etc.
  • the verification code may be generated, for example, by a verification code module 120.
  • the user may dial the characters of the verification code on a dial pad of a telephony device 110a-b that is connected to an MTA 105 associated with the CPE device 115.
  • the characters input by the user may be received at a telephony device interface 125 of the MTA 105, and the input characters may be output to the CPE device 115 through a CPE device interface 130.
  • the characters may be received at the CPE device 115 by the verification code module 120.
  • the CPE device e.g., through the MTA
  • the CPE device may collect the dialed characters.
  • the dialed characters may be retrieved by the verification code module 120, and the verification code module 120 may compare the dialed characters to the characters of the verification code. If the dialed characters match the characters of the verification code, the authentication passes, and the user may be allowed to carry out the critical configuration of the CPE device through the configuration page (e.g., the web GUI) . If the dialed characters do not match the characters of the verification code, the authentication fails, and access to the configuration page (e.g., the web GUI) for carrying out the critical configuration of the CPE device may be rejected.
  • the configuration page e.g., the web GUI
  • a timer of a predetermined/certain duration may be started, and if the user does not dial the characters of the verification code before the timer expires, access to the configuration page for carrying out the critical configuration may be declined.
  • the CPE device 115 may be configured to randomly select characters for the verification code that should not conflict with a format associated with a normal telephone number.
  • the verification code may begin with a special key (e.g., "*" , etc. ) and the verification code may be generated according to a specific or predetermined format (e.g., “*2345#” , etc. ) .
  • a character map may be configured in a device configuration file (e.g., CPE device configuration file, MTA configuration file, etc. ) to support the generation of the verification code using the special/unique characters and/or format.
  • the configuration page (e.g., GUI page) associated with the CPE device 115 may be maintained and controlled, for example, by a configuration page module 140.
  • the configuration page module 140 may generate, and output to a display for presentation, a GUI page in response to a user request for configuring or modifying settings associated with the CPE device 115.
  • the configuration page module 140 may generate or retrieve a verification code, and the configuration page module 140 may output/display the verification code within a GUI page.
  • the configuration page module 140 may enable user access to a critical configuration of the CPE device 115.
  • the configuration page module 140 may generate and output for display, a GUI page that includes one or more options for updating/modifying one or more critical configuration settings associated with the CPE device 115.
  • one or more settings or parameters associated with a CPE device may be identified as a critical configuration based upon a user, service provider, or device manufacturer setting.
  • a CPE device may be configured with an identification of one or more specific settings or configurations that are to be treated as critical configurations.
  • the verification code may only be received by the CPE device through a dial pad that is connected to the CPE device (or associated MTA) .
  • FIG. 2 is a block diagram illustrating an example multimedia terminal adapter (MTA) 105 embedded within a customer premise equiprnent (CPE) device 115 that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
  • MTA multimedia terminal adapter
  • CPE customer premise equiprnent
  • FIG. 3 is a flowchart illustrating an example process 300 operable to control access to a configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device.
  • the process 300 can begin at 305, when a request for access to a configuration page associated with a CPE device (e.g., a CPE device 115 of FIG. 1) is received.
  • the request for access to a configuration page may be received at the CPE device (e.g., at a device configuration module 135 of FIG. 1) as a request for access to a web GUI providing one or more options for configuring the CPE device.
  • the request for access to the configuration page may be received from a user at a device other than the CPE device (e.g., another device within a LAN associated with the CPE device or a device located upstream from the CPE device) .
  • a device other than the CPE device e.g., another device within a LAN associated with the CPE device or a device located upstream from the CPE device.
  • a determination may be made whether a requested configuration is considered a critical configuration of the CPE device.
  • the determination whether a requested configuration is considered a critical configuration may be made, for example, by a device configuration module 135 of FIG. 1.
  • the CPE device may be configured with an identification of one or more specific settings or configurations that are to be treated as critical configurations.
  • the device configuration module 135 may determine whether a configuration included within the configuration page for which access is requested is a critical configuration by comparing each configuration included within the configuration page to the one or more settings or configurations that are to be treated as critical configurations by the CPE device.
  • a verification code may be generated, wherein the verification code comprises one or more characters.
  • the verification code may be generated, for example, by a verification code module 120 of FIG. 1.
  • the verification code module 120 may generate the verification code by generating a random string of characters (e.g., numerical digits, letters, symbols, etc. ) .
  • each character of the verification code may be randomly selected so that the verification code does not conflict with a format associated with a normal telephone number (e.g., the verification code module 120 may be configured to generate a verification code having a format that is distinct from the format of a telephone number) .
  • a presentation of the verification code may be output to a user.
  • the presentation of the verification code may be output to a user, for example, by a configuration page module 140 of FIG. 1.
  • the configuration page module 140 may output the verification code to a user (e.g., through a generated display of the verification code) , and the output of the verification code may include a prompt for the user to dial the characters making up the verification code using a dial pad associated with the CPE device 115 (e.g., through a dial pad of a telephony device 110a-b of FIG. 1 connected to the MTA 105 of FIG. 1) .
  • the configuration page module 140 may output the verification code to a user within a display of a GUI page, and the GUI page may prompt the user to dial the characters of the verification code on a dial pad of a telephony device 110a-b.
  • one or more dialed characters may be received through a dial pad associated with the CPE device.
  • the one or more dialed characters may be received by a verification code module 120 of FIG. 1 and the one or more dialed characters may be received through an interface between an MTA and a telephony device (e.g., a telephony device interface 125 of FIG. 1 of an MTA 105 of FIG. 1) .
  • a user may dial the characters of the verification code on a dial pad of a telephony device 110a-b that is connected to an MTA 105 associated with the CPE device 115.
  • a determination may be made whether the dialed characters match the verification code.
  • the determ ination whether the dialed characters match the verifi cation code may be made, for example, by the verification code module 120.
  • the verification code module 120 may compare the dialed characters to the characters making up the verification code, and the determination whether the dialed characters match the verification code may be based upon the comparison between the dialed characters and the characters making up the verification code.
  • the process 300 may proceed to 335.
  • access to the configuration page may be rejected.
  • the configuration page module 140 may reject user access to the requested configuration page.
  • the configuration page module 140 may output a notification that user access to the requested confirmation page has been rejected based upon an invalid verification code being received through a dial pad of a telephony device.
  • the notification may be presented to a user within a GUI that is output by the configuration page module 140 to a display.
  • the process 300 may proceed to 340.
  • access to the configuration page may be allowed.
  • the configuration page module 140 may allow user access to the requested configuration page.
  • the configuration page module 140 may generate and output a GUI that includes one or more options for carrying out a critical configuration of the CPE device.
  • the configuration page module 140 may enable user modification of one or more settings/parameters that are displayed within a GUI.
  • FIG. 4 is a flowchart illustrating an example process 400 operable to control access to a configuration page based upon a timely and valid input of a verification code into a dial pad associated with a CPE device.
  • the process 400 can begin at 405, when a request for access to a configuration page associated with a CPE device (e.g., a CPE device 115 of FIG. 1) is received.
  • the request for access to a configuration page may be received at the CPE device (e.g., at a device configuration module 135 of FIG. 1) as a request for access to a web GUI providing one or more options for configuring the CPE device.
  • the request for access to the configuration page may be received from a user at a device other than the CPE device (e.g., another device within a LAN associated with the CPE device or a device located upstream from the CPE device) .
  • a device other than the CPE device e.g., another device within a LAN associated with the CPE device or a device located upstream from the CPE device.
  • a determination may be made whether a requested configuration is considered a critical configuration of the CPE device.
  • the determination whether a requested configuration is considered a critical configuration may be made, for example, by a device configuration module 135 of FIG. 1.
  • the CPE device may be configured with an identification of one or more specific settings or configurations that are to be treated as critical configurations.
  • the device configuration module 135 may determine whether a configuration included within the configuration page for which access is requested is a critical configuration by comparing each configuration included within the configuration page to the one or more settings or configurations that are to be treated as critical configurations by the CPE device.
  • a verification code may be generated, wherein the verification code comprises one or more characters.
  • the verification code may be generated, for example, by a verification code module 120 of FIG. 1.
  • the verification code module 120 may generate the verification code by generating a random string of characters (e.g., numerical digits, letters, symbols, etc. ) .
  • each character of the verification code may be randomly selected so that the verification code does not conflict with a format associated with a normal telephone number (e.g., the verification code module 120 may be configured to generate a verification code having a format that is distinct from the format of a telephone number) .
  • a presentation of the verification code may be output to a user.
  • the presentation of the verification code may be output to a user, for example, by a configuration page module 140 of FIG. 1.
  • the configuration page module 140 may output the verification code to a user (e.g., through a generated display of the verification code) , and the output of the verification code may include a prompt for the user to dial the characters making up the verification code using a dial pad associated with the CPE device 115 (e.g., through a dial pad of a telephony device 110a-b of FIG. 1 connected to the MTA 105 of FIG. 1) .
  • the configuration page module 140 may output the verification code to a user within a display of a GUI page, and the GUI page may prompt the user to dial the characters of the verification code on a dial pad of a telephony device 110a-b.
  • a timer of a predetermined or certain duration may be started.
  • the timer may be set and started, for example, by a verification code module 120 of FIG. 1.
  • the verification code module 120 may be configured to set the timer for a certain duration in response to a verification code being output for presentation to a user, and the verification code module 120 may start the timer when the verification code is output for presentation to the user.
  • a determination may be made whether one or more dialed characters are received through a dial pad associated with the CPE device before expiration of the timer.
  • one or more dialed characters may be received by a verification code module 120 of FIG. 1 and the one or more dialed characters may be received through an interface between an MTA and a telephony device (e.g., a telephony device interface 125 of FIG. 1 of an MTA 105 of FIG. 1) .
  • a user may dial the characters of the verification code on a dial pad of a telephony device 110a-b that is connected to an MTA 105 associated with the CPE device 115.
  • the process 400 may proceed to 435.
  • access to the configuration page may be rejected.
  • the configuration page module 140 may reject user access to the requested configuration page.
  • the configuration page module 140 may output a notification that user access to the requested confirmation page has been rejected based upon a failure to receive an input of the verification code prior to the expiration of the timer.
  • the notification may be presented to a user within a GUI that is output by the configuration page module 140 to a display.
  • the process 400 may proceed to 440.
  • a determination may be made whether the dialed characters match the verification code.
  • the determination whether the dialed characters match the verification code may be made, for example, by the verification code module 120.
  • the verification code module 120 may compare the dialed characters to the characters making up the verification code, and the determination whether the dialed characters match the verification code may be based upon the comparison between the dialed characters and the characters making up the verification code.
  • access to the requested configuration page may be rejected at 435.
  • the process 400 may proceed to 445.
  • access to the configuration page may be allowed.
  • the configuration page module 140 may allow user access to the requested configuration page.
  • the configuration page module 140 may generate and output a GUI that includes one or more options for carrying out a critical configuration of the CPE device.
  • the configuration page module 140 may enable user modification of one or more settings/parameters that are displayed within a GUI.
  • FIG. 5 is a block diagram of a hardware configuration 500 operable to control access to a configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device.
  • the hardware configuration 500 can include a processor 510, a memory 520, a storage device 530, and an input/output device 540. Each of the components 510, 520, 530, and 540 can, for example, be interconnected using a system bus 550.
  • the processor 510 can be capable of processing instructions for execution within the hardware configuration 500. In one implementation, the processor 510 can be a single-threaded processor. In another implementation, the processor 510 can be a multi-threaded processor.
  • the processor 510 can be capable of processing instructions stored in the memory 520 or on the storage device 530.
  • the memory 520 can store information within the hardware configuration 500.
  • the memory 520 can be a computer-readable medium.
  • the memory 520 can be a volatile memory unit.
  • the memory 520 can be a non-volatile memory unit.
  • the storage device 530 can be capable of providing mass storage for the hardware configuration 500.
  • the storage device 530 can be a computer-readable medium.
  • the storage device 530 can, for example, include a hard disk device, an optical disk device, flash memory or some other large capacity storage device.
  • the storage device 530 can be a device external to the hardware configuration 500.
  • the input/output device 540 provides input/output operations for the hardware configuration 500.
  • the input/output device 540 can include one or more of a network interface device (e.g., an Ethernet card) , a serial communication device (e.g., an RS-232 port) , one or more universal serial bus (USB) interfaces (e.g., a USB 2.0 port) , one or more wireless interface devices (e.g., an 802.11 card) , and/or one or more interfaces for outputting video, data, and/or voice services to a client device (e.g., cordless telephone 110a of FIG. 1, corded telephone 110b of FIG. 1, etc. ) .
  • the input/output device can include driver devices configured to send communications to, and receive communications from one or more networks or devices (e.g., CPE device 115 of FIG. 1, MTA 105 of FIG. 1, etc) .
  • the methods, systems, and apparatuses described in this disclosure are operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
  • the device may generate a verification code, and the device may output a prompt directing a user to dial the verification code at a dial pad associated with the device. If a valid entry of the verification code is received through the dial pad, the device may allow access to the configuration page. If a valid entry of the verification code is not received through the dial pad, the device may deny access to the configuration page.
  • Such instructions can, for example, comprise interpreted instructions, such as script instructions, e.g., JavaScript or ECMAScript instructions, or executable code, or other instructions stored in a computer readable medium.
  • Implementations of the subject matter and the functional operations described in this specification can be provided in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
  • Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a tangible program carrier for execution by, or to control the operation of, data processing apparatus.
  • a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program does not necessarily correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document) , in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code) .
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • the processes and logic flows described in this specification are performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output thereby tying the process to a particular machine (e.g., a machine programmed to perform the processes described herein) .
  • the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit) .
  • Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices) ; magnetic disks (e.g., internal hard disks or removable disks) ; magneto optical disks; and CD ROM and DVD ROM disks.
  • semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
  • magnetic disks e.g., internal hard disks or removable disks
  • magneto optical disks e.g., CD ROM and DVD ROM disks.
  • the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

The methods and systems described in this disclosure are operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad. In response to a request for access to a configuration page associated with a device, the device may generate a verification code, and the device may output a prompt directing a user to dial the verification code at a dial pad associated with the device. If a valid entry of the verification code is received through the dial pad, the device may allow access to the configuration page. If a valid entry of the verification code is not received through the dial pad, the device may deny access to the configuration page.

Description

AUTHENTICATION FOR CONFIGURATION PAGE USING MULTIMEDIA TERMINAL ADAPTER DIAL PAD TECHNICAL FIELD
This disclosure relates to controlling user access to a configuration page associated with a device.
BACKGROUND
Voice services may be supported at a customer premise by a multimedia terminal adapter (MTA) . A MTA may be provided to a subscriber within an embedded MTA (eMTA) . For example, one or more devices installed at the customer premise (e.g., a modem) may include an eMTA. An eMTA provides subscribers with the combined functionality of a cable modem and a phone adapter, thus supporting both data and voice services at a customer premise.
In embodiments, a device (e.g., a customer premise equipment (CPE) device such as a modem) may be configured through a configuration page that is provided to a user, for example, as a web GUI (graphical user interface) . In some instances, it may be desirable for certain critical configurations of a CPE device to be implemented or modified only by a local user. It is commonplace for an MSO (multiple-systems operator) to disable HTTP (hypertext transfer protocol) WAN (wide-area network) access, so that a web GUI through which a CPE device may be configured is accessible only from a LAN (local area network) . With WiFi enabled, the LAN side still may not be completely trusted, because the WiFi password may be hacked and accessed through the LAN. Therefore, it is desirable to improve upon methods and systems for ensuring that an individual logging into a web GUI is physically near the CPE device (e.g., modem) .
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram illustrating an example multimedia terminal adapter (MTA) connected to a customer premise equipment (CPE) device that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
FIG. 2 is a block diagram illustrating an example multimedia terminal adapter (MTA) 105 embedded within a customer premise equipment (CPE) device 115 that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
FIG. 3 is a flowchart illustrating an example process 300 operable to control access to a GUI configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device.
FIG. 4 is a flowchart illustrating an example process 400 operable to control access to a GUI configuration page based upon a timely and valid input of a verification code into a dial pad associated with a CPE device.
FIG. 5 is a block diagram of a hardware configuration 500 operable to control access to a GUI configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device.
Like reference numbers and designations in the various drawings indicate like elements.
DETAILED DESCRIPTION
It is desirable to improve upon methods and systems for ensuring that an individual logging into a web GUI is physically near the CPE device (e.g., modem) . The methods, systems, and apparatuses described in this disclosure are operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad. In response to a request for access to a configuration page associated with a device, the device may generate a verification code, and the device may output a prompt directing a user to dial the verification code at a dial pad associated with the device. If a valid entry of the verification code is received through the dial pad, the device may allow access to the configuration page. If a valid entry of the verification code is not received through the dial pad, the device may deny access to the configuration page.
FIG. 1 is a block diagram illustrating an example multimedia terminal adapter (MTA) connected to a customer premise equipment (CPE) device that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad. In embodiments, a multimedia terminal adapter (MTA) 105 may facilitate delivery of voice services to one or more telephony devices 110a-b within a subscriber premise. Telephony devices 110a-b may include cordless telephone (s) 110a and/or corded telephone (s) 110b. Each telephony device 110a-b may have a dial pad through which a user may input one or more characters (e.g., numbers, letters, symbols, etc. ) . For example, a dial pad of a telephony device 110a-b may include a plurality of buttons, each button being associated with one or more characters, and the dial pad may be used to input a string of characters that is to be dialed. It should be understood that the MTA 105 may be connected to  another customer premise equipment (CPE) device 115 (e.g., the MTA 105 may be connected to a modem) , or the MTA 105 may be embedded within another CPE device 115 (e.g., an embedded MTA (eMTA) may be an MTA 105 that is embedded within a cable modem) .
In embodiments, settings and operational parameters of a CPE device 115 may be established and/or modified by a user through a user interface associated with the CPE device 115. For example, a CPE device 115 may be configured through a web GUI (graphical user interface) that is accessed by a user through a client device (e.g., computer, mobile device, tablet, etc. ) . The web GUI may present a user with various options for configuring the CPE device 115.
In embodiments, to ensure that a web GUI is accessed by an authorized user (i.e., an owner) of a CPE device 115, a dial pad of a telephony device 110a-b that is associated with an MTA 105 (or eMTA) which is associated with the CPE device 115 may be utilized as a tool for verification. When a request for access to the web GUI is received, the CPE device 115 may generate a verification code, output the verification code to a user (e.g., through a generated display of the verification code) , and prompt the user to dial the characters making up the verification code using a dial pad associated with the CPE device 115 (e.g., through a dial pad of a telephony device 110a-b connected to the MTA 105) . For example, when an attempt is made to carry out a critical configuration of a CPE device 115 through a web GUI, a string of characters (e.g., numerical digits, letters, symbols, etc. ) may be randomly generated and displayed within the GUI page, and the GUI page may prompt the user to dial the characters on a dial pad of a telephony device 110a-b. The verification code may be generated, for example, by a verification code module 120.
In response to the prompt requesting entry of the verification code, the user may dial the characters of the verification code on a dial pad of a telephony device 110a-b that is connected to an MTA 105 associated with the CPE device 115. The characters input by the user may be received at a telephony device interface 125 of the MTA 105, and the input characters may be output to the CPE device 115 through a CPE device interface 130. The characters may be received at the CPE device 115 by the verification code module 120. After the user dials the characters on the dial pad, the CPE device (e.g., through the MTA) may collect the dialed characters. For example, the dialed characters may be retrieved by the verification code module 120, and the verification code module 120 may compare the dialed characters to the characters of the verification code. If the dialed characters match the characters of the verification code, the authentication passes, and the user may be allowed to carry out the critical configuration of the CPE device through the configuration page (e.g., the web GUI) . If the dialed characters do not match the characters of the verification code, the authentication fails, and access to the configuration page (e.g., the web GUI) for carrying out the critical configuration of the CPE device may be rejected.
In embodiments, when the verification code is output to the user (e.g., when the verification code is displayed within a web GUI) , a timer of a predetermined/certain duration may be started, and if the user does not dial the characters of the verification code before the timer expires, access to the configuration page for carrying out the critical configuration may be declined.
The CPE device 115, or other module charged with controlling access to a configuration page, may be configured to randomly select characters for the verification code  that should not conflict with a format associated with a normal telephone number. For example, the verification code may begin with a special key (e.g., "*" , etc. ) and the verification code may be generated according to a specific or predetermined format (e.g., “*2345#” , etc. ) . In embodiments, a character map may be configured in a device configuration file (e.g., CPE device configuration file, MTA configuration file, etc. ) to support the generation of the verification code using the special/unique characters and/or format.
In embodiments, the configuration page (e.g., GUI page) associated with the CPE device 115 may be maintained and controlled, for example, by a configuration page module 140. The configuration page module 140 may generate, and output to a display for presentation, a GUI page in response to a user request for configuring or modifying settings associated with the CPE device 115. For example, when a request for carrying out a critical configuration of the CPE device 115 is received, the configuration page module 140 may generate or retrieve a verification code, and the configuration page module 140 may output/display the verification code within a GUI page. When a valid verification code is received by the CPE device 115 through an associated dial pad, the configuration page module 140 may enable user access to a critical configuration of the CPE device 115. For example, the configuration page module 140 may generate and output for display, a GUI page that includes one or more options for updating/modifying one or more critical configuration settings associated with the CPE device 115. It should be understood that one or more settings or parameters associated with a CPE device may be identified as a critical configuration based upon a user, service provider, or device manufacturer setting. For example, a CPE device may be configured with an identification of one or more specific settings or configurations that are to be treated as critical configurations.
Utilizing this method, the verification code may only be received by the CPE device through a dial pad that is connected to the CPE device (or associated MTA) .
FIG. 2 is a block diagram illustrating an example multimedia terminal adapter (MTA) 105 embedded within a customer premise equiprnent (CPE) device 115 that is operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad.
FIG. 3 is a flowchart illustrating an example process 300 operable to control access to a configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device. The process 300 can begin at 305, when a request for access to a configuration page associated with a CPE device (e.g., a CPE device 115 of FIG. 1) is received. In embodiments, the request for access to a configuration page may be received at the CPE device (e.g., at a device configuration module 135 of FIG. 1) as a request for access to a web GUI providing one or more options for configuring the CPE device. It should be understood that the request for access to the configuration page may be received from a user at a device other than the CPE device (e.g., another device within a LAN associated with the CPE device or a device located upstream from the CPE device) .
At 310, a determination may be made whether a requested configuration is considered a critical configuration of the CPE device. The determination whether a requested configuration is considered a critical configuration may be made, for example, by a device configuration module 135 of FIG. 1. In embodiments, the CPE device may be configured with an identification of one or more specific settings or configurations that are to be treated as critical configurations. The device configuration module 135 may determine whether a configuration  included within the configuration page for which access is requested is a critical configuration by comparing each configuration included within the configuration page to the one or more settings or configurations that are to be treated as critical configurations by the CPE device.
If, at 310, the determination is made that a requested configuration is considered a critical configuration of the CPE device, the process 300 may proceed to 315. At 315, a verification code may be generated, wherein the verification code comprises one or more characters. The verification code may be generated, for example, by a verification code module 120 of FIG. 1. In embodiments, the verification code module 120 may generate the verification code by generating a random string of characters (e.g., numerical digits, letters, symbols, etc. ) . For example, each character of the verification code may be randomly selected so that the verification code does not conflict with a format associated with a normal telephone number (e.g., the verification code module 120 may be configured to generate a verification code having a format that is distinct from the format of a telephone number) .
At 320, a presentation of the verification code may be output to a user. The presentation of the verification code may be output to a user, for example, by a configuration page module 140 of FIG. 1. In embodiments, the configuration page module 140 may output the verification code to a user (e.g., through a generated display of the verification code) , and the output of the verification code may include a prompt for the user to dial the characters making up the verification code using a dial pad associated with the CPE device 115 (e.g., through a dial pad of a telephony device 110a-b of FIG. 1 connected to the MTA 105 of FIG. 1) . For example, the configuration page module 140 may output the verification code to a user within a display of  a GUI page, and the GUI page may prompt the user to dial the characters of the verification code on a dial pad of a telephony device 110a-b.
At 325, one or more dialed characters may be received through a dial pad associated with the CPE device. For example, the one or more dialed characters may be received by a verification code module 120 of FIG. 1 and the one or more dialed characters may be received through an interface between an MTA and a telephony device (e.g., a telephony device interface 125 of FIG. 1 of an MTA 105 of FIG. 1) . In response to the prompt requesting entry of the verification code, a user may dial the characters of the verification code on a dial pad of a telephony device 110a-b that is connected to an MTA 105 associated with the CPE device 115.
At 330, a determination may be made whether the dialed characters match the verification code. The determ ination whether the dialed characters match the verifi cation code may be made, for example, by the verification code module 120. In embodiments, the verification code module 120 may compare the dialed characters to the characters making up the verification code, and the determination whether the dialed characters match the verification code may be based upon the comparison between the dialed characters and the characters making up the verification code.
If, at 330, the determination is made that the dialed characters do not match the verification code, the process 300 may proceed to 335. At 335, access to the configuration page may be rejected. For example, the configuration page module 140 may reject user access to the requested configuration page. In embodiments, the configuration page module 140 may output a notification that user access to the requested confirmation page has been rejected based upon an invalid verification code being received through a dial pad of a telephony device. For example,  the notification may be presented to a user within a GUI that is output by the configuration page module 140 to a display.
If, at 330, the determination is made that the dialed characters match the verification code, the process 300 may proceed to 340. At 340, access to the configuration page may be allowed. For example, the configuration page module 140 may allow user access to the requested configuration page. In embodiments, the configuration page module 140 may generate and output a GUI that includes one or more options for carrying out a critical configuration of the CPE device. In embodiments, the configuration page module 140 may enable user modification of one or more settings/parameters that are displayed within a GUI.
Returning, to 310, if the determination is made that a requested configuration is not considered a critical configuration of the CPE device, user access to the requested configuration page may be allowed at 340.
FIG. 4 is a flowchart illustrating an example process 400 operable to control access to a configuration page based upon a timely and valid input of a verification code into a dial pad associated with a CPE device. The process 400 can begin at 405, when a request for access to a configuration page associated with a CPE device (e.g., a CPE device 115 of FIG. 1) is received. In embodiments, the request for access to a configuration page may be received at the CPE device (e.g., at a device configuration module 135 of FIG. 1) as a request for access to a web GUI providing one or more options for configuring the CPE device. It should be understood that the request for access to the configuration page may be received from a user at a device other than the CPE device (e.g., another device within a LAN associated with the CPE device or a device located upstream from the CPE device) .
At 410, a determination may be made whether a requested configuration is considered a critical configuration of the CPE device. The determination whether a requested configuration is considered a critical configuration may be made, for example, by a device configuration module 135 of FIG. 1. In embodiments, the CPE device may be configured with an identification of one or more specific settings or configurations that are to be treated as critical configurations. The device configuration module 135 may determine whether a configuration included within the configuration page for which access is requested is a critical configuration by comparing each configuration included within the configuration page to the one or more settings or configurations that are to be treated as critical configurations by the CPE device.
If, at 410, the determination is made that a requested configuration is considered a critical configuration of the CPE device, the process 400 may proceed to 415. At 415, a verification code may be generated, wherein the verification code comprises one or more characters. The verification code may be generated, for example, by a verification code module 120 of FIG. 1. In embodiments, the verification code module 120 may generate the verification code by generating a random string of characters (e.g., numerical digits, letters, symbols, etc. ) . For example, each character of the verification code may be randomly selected so that the verification code does not conflict with a format associated with a normal telephone number (e.g., the verification code module 120 may be configured to generate a verification code having a format that is distinct from the format of a telephone number) .
At 420, a presentation of the verification code may be output to a user. The presentation of the verification code may be output to a user, for example, by a configuration page module 140 of FIG. 1. In embodiments, the configuration page module 140 may output the  verification code to a user (e.g., through a generated display of the verification code) , and the output of the verification code may include a prompt for the user to dial the characters making up the verification code using a dial pad associated with the CPE device 115 (e.g., through a dial pad of a telephony device 110a-b of FIG. 1 connected to the MTA 105 of FIG. 1) . For example, the configuration page module 140 may output the verification code to a user within a display of a GUI page, and the GUI page may prompt the user to dial the characters of the verification code on a dial pad of a telephony device 110a-b.
At 425, a timer of a predetermined or certain duration may be started. The timer may be set and started, for example, by a verification code module 120 of FIG. 1. In embodiments, the verification code module 120 may be configured to set the timer for a certain duration in response to a verification code being output for presentation to a user, and the verification code module 120 may start the timer when the verification code is output for presentation to the user.
At 430, a determination may be made whether one or more dialed characters are received through a dial pad associated with the CPE device before expiration of the timer. For example, one or more dialed characters may be received by a verification code module 120 of FIG. 1 and the one or more dialed characters may be received through an interface between an MTA and a telephony device (e.g., a telephony device interface 125 of FIG. 1 of an MTA 105 of FIG. 1) . In response to the prompt requesting entry of the verification code, a user may dial the characters of the verification code on a dial pad of a telephony device 110a-b that is connected to an MTA 105 associated with the CPE device 115.
If, at 430, the determination is made that one or more dialed characters are not received through a dial pad associated with the CPE device before expiration of the timer, the process 400 may proceed to 435. At 435, access to the configuration page may be rejected. For example, the configuration page module 140 may reject user access to the requested configuration page. In embodiments, the configuration page module 140 may output a notification that user access to the requested confirmation page has been rejected based upon a failure to receive an input of the verification code prior to the expiration of the timer. For example, the notification may be presented to a user within a GUI that is output by the configuration page module 140 to a display.
If, at 430, the determination is made that one or more dialed characters are received through a dial pad associated with the CPE device before expiration of the timer, the process 400 may proceed to 440. At 440, a determination may be made whether the dialed characters match the verification code. The determination whether the dialed characters match the verification code may be made, for example, by the verification code module 120. In embodiments, the verification code module 120 may compare the dialed characters to the characters making up the verification code, and the determination whether the dialed characters match the verification code may be based upon the comparison between the dialed characters and the characters making up the verification code.
If, at 440, the determination is made that the dialed characters do not match the verification code, access to the requested configuration page may be rejected at 435.
If, at 440, the determination is made that the dialed characters match the verification code, the process 400 may proceed to 445. At 445, access to the configuration page  may be allowed. For example, the configuration page module 140 may allow user access to the requested configuration page. In embodiments, the configuration page module 140 may generate and output a GUI that includes one or more options for carrying out a critical configuration of the CPE device. In some embodiments, the configuration page module 140 may enable user modification of one or more settings/parameters that are displayed within a GUI.
Returning, to 410, if the determination is made that a requested configuration is not considered a critical configuration of the CPE device, user access to the requested configuration page may be allowed at 445.
FIG. 5 is a block diagram of a hardware configuration 500 operable to control access to a configuration page based upon a valid input of a verification code into a dial pad associated with a CPE device. The hardware configuration 500 can include a processor 510, a memory 520, a storage device 530, and an input/output device 540. Each of the  components  510, 520, 530, and 540 can, for example, be interconnected using a system bus 550. The processor 510 can be capable of processing instructions for execution within the hardware configuration 500. In one implementation, the processor 510 can be a single-threaded processor. In another implementation, the processor 510 can be a multi-threaded processor. The processor 510 can be capable of processing instructions stored in the memory 520 or on the storage device 530.
The memory 520 can store information within the hardware configuration 500. In one implementation, the memory 520 can be a computer-readable medium. In one implementation, the memory 520 can be a volatile memory unit. In another implementation, the memory 520 can be a non-volatile memory unit.
In some implementations, the storage device 530 can be capable of providing mass storage for the hardware configuration 500. In one implementation, the storage device 530 can be a computer-readable medium. In various different implementations, the storage device 530 can, for example, include a hard disk device, an optical disk device, flash memory or some other large capacity storage device. In other implementations, the storage device 530 can be a device external to the hardware configuration 500.
The input/output device 540 provides input/output operations for the hardware configuration 500. In embodiments, the input/output device 540 can include one or more of a network interface device (e.g., an Ethernet card) , a serial communication device (e.g., an RS-232 port) , one or more universal serial bus (USB) interfaces (e.g., a USB 2.0 port) , one or more wireless interface devices (e.g., an 802.11 card) , and/or one or more interfaces for outputting video, data, and/or voice services to a client device (e.g., cordless telephone 110a of FIG. 1, corded telephone 110b of FIG. 1, etc. ) . In embodiments, the input/output device can include driver devices configured to send communications to, and receive communications from one or more networks or devices (e.g., CPE device 115 of FIG. 1, MTA 105 of FIG. 1, etc) .
Those skilled in the art will appreciate that the invention improves upon methods and systems for ensuring that an individual logging into a web GUI is physically near the CPE device (e.g., modem) . The methods, systems, and apparatuses described in this disclosure are operable to facilitate control over user access to a device configuration page based upon a reception of a verification code through an associated dial pad. In response to a request for access to a configuration page associated with a device, the device may generate a verification code, and the device may output a prompt directing a user to dial the verification code at a dial  pad associated with the device. If a valid entry of the verification code is received through the dial pad, the device may allow access to the configuration page. If a valid entry of the verification code is not received through the dial pad, the device may deny access to the configuration page.
The subject matter of this disclosure, and components thereof, can be realized by instructions that upon execution cause one or more processing devices to carry out the processes and functions described above. Such instructions can, for example, comprise interpreted instructions, such as script instructions, e.g., JavaScript or ECMAScript instructions, or executable code, or other instructions stored in a computer readable medium.
Implementations of the subject matter and the functional operations described in this specification can be provided in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a tangible program carrier for execution by, or to control the operation of, data processing apparatus.
A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or  data (e.g., one or more scripts stored in a markup language document) , in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code) . A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
The processes and logic flows described in this specification are performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output thereby tying the process to a particular machine (e.g., a machine programmed to perform the processes described herein) . The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit) .
Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices) ; magnetic disks (e.g., internal hard disks or removable disks) ; magneto optical disks; and CD ROM and DVD ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate  embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Particular embodiments of the subject matter described in this specification have been described. Other embodiments are within the scope of the following claims. For example, the actions recited in the claims can be performed in a different order and still achieve desirable results, unless expressly noted otherwise. As one example, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.

Claims (20)

  1. An apparatus comprising:
    an interface that receives a request for access to a configuration page associated with the apparatus; and
    one or more modules that:
    generate a verification code, wherein the verification code comprises one or more characters;
    output a presentation of the verification code to a user;
    receive one or more dialed characters through a dial pad that is associated with a multimedia terminal adapter, the multimedia terminal adapter being connected to the apparatus;
    compare the dialed characters to the characters of the verification code; if the dialed characters do not match the characters of the verification code,
    denying access to the requested configuration page; and
    if the dialed characters match the characters of the verification code, allowing access to the requested configuration page.
  2. The apparatus of claim 1, wherein the multimedia terminal adapter comprises an embedded multimedia terminal adapter.
  3. The apparatus of claim 1, wherein the verification code is generated according to a format that does not conflict with a telephone number.
  4. The apparatus of claim 1, wherein the requested configuration page comprises a web graphical user interface.
  5. The apparatus of claim 1, wherein the presentation of the verification code is output to a user within a web graphical user interface.
  6. The apparatus of claim 1, wherein allowing access to the requested configuration page comprises enabling one or more one or more configurable settings that are designated as critical configurations.
  7. A method comprising:
    receiving a request for access to a configuration page associated with a device;
    generating a verification code, wherein the verification code comprises one or more characters;
    outputting a presentation of the verification code to a user;
    receiving one or more dialed characters through a dial pad that is associated with a multimedia terminal adapter, the multimedia terminal adapter being connected to the device;
    comparing the dialed characters to the characters of the verification code;
    ifthe dialed characters do not match the characters of the verification code, denying access to the requested configuration page; and
    if the dialed characters match the characters of the verification code, allowing access to the requested configuration page.
  8. The method of claim 7, wherein the multimedia terminal adapter comprises an embedded multimedia terminal adapter.
  9. The method of claim 7, wherein the verification code is generated according to a format that does not conflict with a telephone number.
  10. The method of claim 7, wherein the requested configuration page comprises a web graphical user interface.
  11. The method of claim 7, wherein the requested configuration page comprises one or more configurable settings that are designated as critical configurations.
  12. The method of claim 7, wherein the presentation of the verification code is output to a user within a web graphical user interface.
  13. The method of claim 7, wherein allowing access to the requested configuration page comprises enabling one or more one or more configurable settings that are designated as critical configurations.
  14. One or more non-transitory computer readable media having instructions operable to cause one or more processors to perform the operations comprising:
    receiving a request for access to a configuration page associated with a device;
    generating a verification code, wherein the verification code comprises one or more characters;
    outputting a presentation of the verification code to a user;
    receiving one or more dialed characters through a dial pad that is associated with a multimedia terminal adapter, the multimedia terminal adapter being connected to the device;
    comparing the dialed characters to the characters of the verification code;
    ifthe dialed characters do not match the characters of the verification code, denying access to the requested configuration page; and
    ifthe dialed characters match the characters of the verification code, allowing access to the requested configuration page.
  15. The one or more non-transitory computer-readable media of claim 14, wherein the multimedia terminal adapter comprises an embedded multimedia terminal adapter.
  16. The one or more non-transitory computer-readable media of claim 14, wherein the verification code is generated according to a format that does not conflict with a telephone number.
  17. The one or more non-transitory computer-readable media of claim 14, wherein the requested configuration page comprises a web graphical user interface.
  18. The one or more non-transitory computer-readable media of claim 14, wherein the requested configuration page comprises one or more configurable settings that are designated as critical configurations.
  19. The one or more non-transitory computer-readable media of claim 14, wherein the presentation of the verification code is output to a user within a web graphical user interface.
  20. The one or more non-transitory computer-readable media of claim 14, wherein allowing access to the requested configuration page comprises enabling one or more one or more configurable settings that are designated as critical configurations.
PCT/CN2018/124875 2018-12-28 2018-12-28 Authentication for configuration page using multimedia terminal adapter dial pad WO2020133215A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/124875 WO2020133215A1 (en) 2018-12-28 2018-12-28 Authentication for configuration page using multimedia terminal adapter dial pad

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/124875 WO2020133215A1 (en) 2018-12-28 2018-12-28 Authentication for configuration page using multimedia terminal adapter dial pad

Publications (1)

Publication Number Publication Date
WO2020133215A1 true WO2020133215A1 (en) 2020-07-02

Family

ID=71125782

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/124875 WO2020133215A1 (en) 2018-12-28 2018-12-28 Authentication for configuration page using multimedia terminal adapter dial pad

Country Status (1)

Country Link
WO (1) WO2020133215A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1901583A (en) * 2006-07-03 2007-01-24 陈晓燕 Self-aid printing method and printing device for telephone input
CN106302448A (en) * 2016-08-15 2017-01-04 中国联合网络通信集团有限公司 remote access control method and device
CN106488449A (en) * 2015-08-31 2017-03-08 西安中兴新软件有限责任公司 A kind of management method of Wireless Telecom Equipment and Wireless Telecom Equipment
US20180351926A1 (en) * 2017-06-02 2018-12-06 Arris Enterprises Llc Secure shell (ssh) server public key validation by a ssh client in a high volume device deployment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1901583A (en) * 2006-07-03 2007-01-24 陈晓燕 Self-aid printing method and printing device for telephone input
CN106488449A (en) * 2015-08-31 2017-03-08 西安中兴新软件有限责任公司 A kind of management method of Wireless Telecom Equipment and Wireless Telecom Equipment
CN106302448A (en) * 2016-08-15 2017-01-04 中国联合网络通信集团有限公司 remote access control method and device
US20180351926A1 (en) * 2017-06-02 2018-12-06 Arris Enterprises Llc Secure shell (ssh) server public key validation by a ssh client in a high volume device deployment

Similar Documents

Publication Publication Date Title
US10924917B2 (en) Profile download method and system, and related device
CN112771826B (en) Application program login method, application program login device and mobile terminal
US11039299B2 (en) ESIM card activation method, wireless router, and user terminal
JP6001816B1 (en) Managing wireless network login password sharing
US10228926B2 (en) Remote support installation mechanism
EP3975503A1 (en) Esim card replacement method and related device
JP6568355B2 (en) Method and apparatus for mutual communication of accounts between apps
US20170366970A1 (en) Wireless setup procedure enabling modification of wireless credentials
WO2013182154A1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN111434087A (en) Method and electronic device for providing communication service
CN111338663B (en) System upgrading method, terminal and storage medium
CN112738046A (en) One-key login method, terminal and system server
US10834555B2 (en) System and method for facilitating carrier-specific configuration of a user device based on pre-stored information for multiple carriers
EP2829035A1 (en) Implementing policies for an enterprise network using policy instructions that are executed through a local policy framework
WO2020133215A1 (en) Authentication for configuration page using multimedia terminal adapter dial pad
KR102054424B1 (en) Service providing system and method for security supporting multi-channel authentication with user equipment, and non-transitory computer readable medium having computer program recorded thereon
CN110875895A (en) Method, system, equipment and vehicle for realizing intelligent terminal software login
CN113038446B (en) Registration and authentication method and device
US11533620B2 (en) Method of managing a tamper-proof device comprising a plurality of software containers
US20230098969A1 (en) Sim, communication device, and writing method for application
KR102054421B1 (en) Service providing system and method for security supporting multi-channel authentication, and non-transitory computer readable medium having computer program recorded thereon
KR102054422B1 (en) Service providing system and method for security based on multi-channel authentication, and non-transitory computer readable medium having computer program recorded thereon
KR20160061485A (en) Easy identification service method and system
CN114422179A (en) Login method and device for terminal equipment browser

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18945283

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18945283

Country of ref document: EP

Kind code of ref document: A1