US20070271600A1 - Assuring physical security of a subscriber line device - Google Patents
Assuring physical security of a subscriber line device Download PDFInfo
- Publication number
- US20070271600A1 US20070271600A1 US11/833,876 US83387607A US2007271600A1 US 20070271600 A1 US20070271600 A1 US 20070271600A1 US 83387607 A US83387607 A US 83387607A US 2007271600 A1 US2007271600 A1 US 2007271600A1
- Authority
- US
- United States
- Prior art keywords
- client device
- physical location
- established
- actual physical
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Definitions
- the present invention relates to equipment that can remotely access a network and more particularly to the security of such equipment.
- caller ID allows one to insure that an incoming call is coming from a particular telephone line.
- a call back technique can also be used to insure that a device connected by a POTS or ISDN line is connected via a particular telephone line or location.
- the packets transmitted by client devices which have a broadband connection do not specify the physical location at which the packets originated.
- Security for broadband connections is often accomplished by storing an encrypted “key” on a client machine.
- Security in such a system is enforced by checking to insure that a client requesting access has this key stored on the client.
- a device with a stored key is stolen is stolen, this key is also stolen.
- a stolen client machine with a stored key can be at a different location; however, when a server interrogates the client, it will fine the required key stored on the client.
- the present invention is directed to insuring that a client device is in fact connected to the network from a known location. That is, the present invention insures that a client device is not seeking access to a network after it has been moved from a pre-established location.
- the present invention is directed to adding a layer of security to a network client device that is connected to a network via a broadband connection.
- the security provided by the present invention takes into account the physical location of the client device.
- the security provided by the present invention insures that the client machine has not been moved from its authorized or pre-established location.
- a check is made to insure that the machine connected by a broadband connection is located at its assigned location. If this check finds that the client machine is not at its assigned location, the broadband network connection is inhibited or terminated.
- One embodiment of the invention takes advantage of the fact that most clients connected to a network via broadband, also have a POTS or ISDN connection to the outside world.
- a client connected to a network with a high speed broadband connection uses a caller ID mechanism or a callback mechanism on a slow speed POTS or ISDN connection to insure that the client is located at an assigned location.
- a GPS (global positioning system) mechanism is included in the client machine.
- a server can both check a encrypted key to insure that the client is an authorized client and the GPS data to insure that the client is at an assigned location.
- FIG. 1 is a system diagram of a first embodiment of the invention with a client machine connected to a network via a cable modem.
- FIG. 2 is a flow diagram illustrating the operation of the first embodiment of the invention.
- FIG. 3 is a block diagram of a second embodiment of the invention.
- FIG. 4 is a flow diagram illustrating the operation of the second embodiment of the invention.
- the present invention provides a layer of security that insures that a client machine is physically located at an assigned or pre-established location.
- the present invention can be used alone or in combination with other prior art security mechanisms.
- the present invention can, for example, be used to verify that a client machine has not been stolen and moved to a new location.
- the present invention provides an alternative or additional mechanism for insuring network security for a client machine connected to a network with a broadband connection.
- FIG. 1 A first embodiment of the present invention is shown in FIG. 1 .
- the system shown in FIG. 1 includes a client device 10 that is connected to a network server 16 via a broadband cable.
- the client 10 includes a cable modem 10 C and an interface 10 T to the normal telephone network 12 .
- the client device 10 also includes an initialization program 10 P.
- the client device 10 could for example be a personal computer or a network router.
- the telephone connection 10 T could for example be a conventional modem or it could be some other type of conventional telephone network interface.
- the cable modem 10 is connected to a CMTS (Cable Modem Termination System) which is part of the broadband gateway 14 .
- CMTS Code Modem Termination System
- the broadband gateway 14 is connected network server 16 through the Internet 15 . Connecting devices to a network by cable systems is conventional and not further described herein.
- the system operates as shown in FIG. 2 .
- the initialization program 10 P causes the device 1 to place a call to itself via telephone network interface 10 T.
- the telephone line from the central office 12 has the telephone number 345-1212
- the telephone interface 10 T places a call to 345-1212.
- the telephone line to central office 12 has the conventional call waiting and caller ID features.
- the telephone interface 10 T when the telephone interface 10 T receives the incoming call, it checks the caller ID number in a conventional manner. If the number matches the pre-stored number (in this case 345-1212) the client 10 continues it normal initialization process. If the numbers do not match, this indicates that the client device 10 has been moved and connected via a different telephone line and the process terminates. The reason for this is that the caller ID number is associated with a particular physical telephone line, and not with the device connected to that physical line. The device which actually initiates a call on a particular line does not affect the caller ID number of that physical line. Telephone devices for placing calls and checking called ID numbers are conventional and thus telephone interface 10 T is not further described herein.
- the stored telephone number (against which the called ID number is matched) can be stored in the program 10 P in an encrypted manner so that it can not be changed other than by an authorized used.
- Various known security devices can be used to protect this number from an un-authorized change.
- the telephone interface 1 oT modem can call to a special number which connects to a call back device (not shown in the drawings) which initiates a call back process. In such an embodiment, initialization only proceeds if the device in fact receives the appropriate call back.
- initialization program 10 P also performs the other normal initialization operations.
- the network server 16 can also authenticate the client using other conventional authentication processes. For example, a key stored on the client can be interrogated in a conventional manner to insure that the correct machine is trying to access the server.
- the first embodiment shown in FIG. 1 adds a security mechanism that insures that a client machine has not been moved from its assigned location.
- This additional security measure can be used alone or together with other known security measures.
- the client device 20 includes a cable modem 20 C and an initialization program 20 P similar to the first embodiment of the invention. Also similar to the first embodiment, the client 20 is connected to the Internet 25 and from there to a server 26 . However, in this second embodiment of the invention, the client device 20 includes a “Global Positioning System” (GPS) unit 20 G.
- GPS Global Positioning System
- the GPS unit 20 G is a conventional receiver, that determines its actual physical position from satellite signals. The unit 20 G determines it global coordinates (longitude and latitude) and stores then in a register (not explicitly shown in the drawings). Such a GPS unit is conventional and not further described herein.
- the initiation program 20 P reads the coordinates determined by unit 20 G. These coordinates are compared to coordinates previously stored in the client. If the coordinates match, it indicates that the unit has not been moved, and the initialization proceeds. If the coordinates do not match, the initialization is terminated. It is noted that the coordinates can be stored in the program 20 P in an encrypted manner so that they cannot be changed other than by an authorized used.
- FIG. 4 illustrates the relevant steps performed by initiation program 20 P in conjunction with GPS unit 20 G.
- initialization program 20 P also performs the other normal initialization operations.
- the operations occur when the unit powers up as indicated by block 302 .
- the GPS unit 20 G determines its coordinates as indicated by block 304 .
- a check is made to determine if the coordinates determined by GPS unit 20 G match those stored in initialization program 20 P. If the numbers match the initialization proceeds in a normal manner as indicated by block 307 . If the coordinates do not match the initialization process stops.
- a signal is sent to a security server by cable via cable modem 20 C and CMTS gateway 24 .
- the signal sent to the security server can include the coordinates indicated by GPS unit 20 U, thereby giving an indication of the location of a possibly stolen unit.
- DSL Digital Subscriber Line
- DSL allows high speed data communication over copper telephone lines between end-users and central offices.
- DSL allows one pair of wires to be used for a regular telephone connection (using low frequencies) and a broadband digital connection (using higher frequencies). This type of connection is becoming popular in the United States and it is even more popular in Europe.
- An embodiment using DSL could be similar to the embodiment shown in FIG. 1 , except that instead of a cable modem and a CMTS gateway, such an embodiment would include a single pair of wires connecting the client machine to the gateway device. These wires would carry both a normal POTS connection and a broadband connection. The operation of such an embodiment would be similar to the first embodiment except that the broadband and the POTS connection would be via a single pair of wires.
- both the embodiments shown in FIGS. 1 and 3 could be implemented in the same client. Such an embodiment would both call itself and check the caller ID and compare GPS coordinates before initializing.
- location checking mechanism described herein could be used alone or in combination with other security mechanisms such as the used of an encrypted stored key and password.
- Such an embodiment would both check a caller ID as does the first embodiment or check GPS coordinates as does the second embodiment and interrogate a stored encrypted key and/or a password.
- the number of security techniques used in any particular instance is a matter of engineering choice depending on the circumstances.
- the check of the physical location of the client device is performed at the time the device is initialized, in other embodiments, this check could be performed at various other time.
- the physical location check could be performed each hour of operation or each day of operation, etc.
- the initialization process is terminated if the actual physical location of the device does not match some pre-established physical location. It is noted that instead of terminating the initiation process, various the client device could be prohibited from connecting to the network by various other means such as by disabling the cable modem or other broadband connection.
- client machine and client device are used interchangeably to mean the same thing. Namely, as used herein both the terms “client device” and “client machine” refer to a client connected to a network by a broadband connection.
- the network 15 and 25 can be a Local Area Network (LAN) or a Wide Area Network (WAN).
- Networks 15 and 25 could for example be the Internet.
Abstract
A security system and method for a client device connected to a network by a broadband connection. The security system insures that the client machine has not been moved from its authorized location. A check is made to insure that the machine is located at its assigned location. If this check finds that the client machine is not at its assigned location, the network connection is inhibited or terminated.
Description
- This application is a continuation of U.S. patent application Ser. No. 10/762,145, entitled Assuring Physical Security of a Subscriber Line Device, filed Jan. 20, 2004, the disclosure of which is herein incorporated by reference in its entirety.
- The present invention relates to equipment that can remotely access a network and more particularly to the security of such equipment.
- Insuring that only authorized individuals or authorized equipment can connect to network or to a server is very important. If a client is connected to a server or a network by a POTS or ISDN line, caller ID, or a call-back mechanism can be used to insure that a call is coming from a particular location. Telephone caller ID allows one to insure that an incoming call is coming from a particular telephone line. A call back technique can also be used to insure that a device connected by a POTS or ISDN line is connected via a particular telephone line or location.
- The packets transmitted by client devices which have a broadband connection do not specify the physical location at which the packets originated. Security for broadband connections is often accomplished by storing an encrypted “key” on a client machine. Security in such a system is enforced by checking to insure that a client requesting access has this key stored on the client. However, if a device with a stored key is stolen is stolen, this key is also stolen. A stolen client machine with a stored key, can be at a different location; however, when a server interrogates the client, it will fine the required key stored on the client.
- The present invention is directed to insuring that a client device is in fact connected to the network from a known location. That is, the present invention insures that a client device is not seeking access to a network after it has been moved from a pre-established location.
- The present invention is directed to adding a layer of security to a network client device that is connected to a network via a broadband connection. The security provided by the present invention takes into account the physical location of the client device. The security provided by the present invention insures that the client machine has not been moved from its authorized or pre-established location.
- With the present invention, a check is made to insure that the machine connected by a broadband connection is located at its assigned location. If this check finds that the client machine is not at its assigned location, the broadband network connection is inhibited or terminated.
- One embodiment of the invention takes advantage of the fact that most clients connected to a network via broadband, also have a POTS or ISDN connection to the outside world. With this embodiment of the invention, a client connected to a network with a high speed broadband connection, uses a caller ID mechanism or a callback mechanism on a slow speed POTS or ISDN connection to insure that the client is located at an assigned location.
- In another embodiment of the invention, a GPS (global positioning system) mechanism is included in the client machine. When the client is connected to a network, a server can both check a encrypted key to insure that the client is an authorized client and the GPS data to insure that the client is at an assigned location.
-
FIG. 1 is a system diagram of a first embodiment of the invention with a client machine connected to a network via a cable modem. -
FIG. 2 is a flow diagram illustrating the operation of the first embodiment of the invention. -
FIG. 3 is a block diagram of a second embodiment of the invention. -
FIG. 4 is a flow diagram illustrating the operation of the second embodiment of the invention. - There are a variety of known broadband technologies that can be used to connect a client device to a network via a broadband connection. Two of the widely deployed technologies are “Cable” and “DSL”. Security is an important consideration when a client connects to a network via a broadband connection. Frequently, security is implemented by storing an encrypted key on a client machine. When a client machine seeks to connect to a server, the server interrogates this key to insure that the client machine is authorized to access the server. Often a password (alone or a password together with an encrypted key) is also used to insure security.
- However, a stored encrypted key or a password cannot be used to insure that a broadband connected client machine has not been moved from its assigned location. The present invention provides a layer of security that insures that a client machine is physically located at an assigned or pre-established location. The present invention can be used alone or in combination with other prior art security mechanisms.
- The present invention can, for example, be used to verify that a client machine has not been stolen and moved to a new location. The present invention provides an alternative or additional mechanism for insuring network security for a client machine connected to a network with a broadband connection.
- A first embodiment of the present invention is shown in
FIG. 1 . The system shown inFIG. 1 includes aclient device 10 that is connected to anetwork server 16 via a broadband cable. Theclient 10 includes acable modem 10C and aninterface 10T to the normal telephone network 12. Theclient device 10 also includes aninitialization program 10P. Theclient device 10 could for example be a personal computer or a network router. Thetelephone connection 10T could for example be a conventional modem or it could be some other type of conventional telephone network interface. - The
cable modem 10 is connected to a CMTS (Cable Modem Termination System) which is part of the broadband gateway 14. The broadband gateway 14 is connectednetwork server 16 through the Internet 15. Connecting devices to a network by cable systems is conventional and not further described herein. - The system operates as shown in
FIG. 2 . When the client device 1 powers up, (that is when the client device 1 is initialized) theinitialization program 10P causes the device 1 to place a call to itself viatelephone network interface 10T. For example, if the telephone line from the central office 12 has the telephone number 345-1212, thetelephone interface 10T places a call to 345-1212. The telephone line to central office 12 has the conventional call waiting and caller ID features. - As indicated by
block 205, when thetelephone interface 10T receives the incoming call, it checks the caller ID number in a conventional manner. If the number matches the pre-stored number (in this case 345-1212) theclient 10 continues it normal initialization process. If the numbers do not match, this indicates that theclient device 10 has been moved and connected via a different telephone line and the process terminates. The reason for this is that the caller ID number is associated with a particular physical telephone line, and not with the device connected to that physical line. The device which actually initiates a call on a particular line does not affect the caller ID number of that physical line. Telephone devices for placing calls and checking called ID numbers are conventional and thustelephone interface 10T is not further described herein. - It is noted that the stored telephone number (against which the called ID number is matched) can be stored in the
program 10P in an encrypted manner so that it can not be changed other than by an authorized used. Various known security devices can be used to protect this number from an un-authorized change. - In alternate embodiments were Call Waiting and Caller ID features are not available, the telephone interface 1oT modem can call to a special number which connects to a call back device (not shown in the drawings) which initiates a call back process. In such an embodiment, initialization only proceeds if the device in fact receives the appropriate call back.
- Naturally it should be understood that
initialization program 10P also performs the other normal initialization operations. - The
network server 16, can also authenticate the client using other conventional authentication processes. For example, a key stored on the client can be interrogated in a conventional manner to insure that the correct machine is trying to access the server. - In summary the first embodiment shown in
FIG. 1 adds a security mechanism that insures that a client machine has not been moved from its assigned location. This additional security measure can be used alone or together with other known security measures. - A second embodiment of the invention is shown in
FIG. 3 . In this second embodiment of the invention, theclient device 20 includes acable modem 20C and aninitialization program 20P similar to the first embodiment of the invention. Also similar to the first embodiment, theclient 20 is connected to theInternet 25 and from there to aserver 26. However, in this second embodiment of the invention, theclient device 20 includes a “Global Positioning System” (GPS)unit 20G. TheGPS unit 20G is a conventional receiver, that determines its actual physical position from satellite signals. Theunit 20G determines it global coordinates (longitude and latitude) and stores then in a register (not explicitly shown in the drawings). Such a GPS unit is conventional and not further described herein. - When the
client unit 20 is initialized, theinitiation program 20P reads the coordinates determined byunit 20G. These coordinates are compared to coordinates previously stored in the client. If the coordinates match, it indicates that the unit has not been moved, and the initialization proceeds. If the coordinates do not match, the initialization is terminated. It is noted that the coordinates can be stored in theprogram 20P in an encrypted manner so that they cannot be changed other than by an authorized used. - The operation of the system is illustrated in
FIG. 4 which illustrates the relevant steps performed byinitiation program 20P in conjunction withGPS unit 20G. Naturally it should be understood thatinitialization program 20P also performs the other normal initialization operations. - The operations occur when the unit powers up as indicated by
block 302. TheGPS unit 20G determines its coordinates as indicated byblock 304. As indicated byblock 305, a check is made to determine if the coordinates determined byGPS unit 20G match those stored ininitialization program 20P. If the numbers match the initialization proceeds in a normal manner as indicated byblock 307. If the coordinates do not match the initialization process stops. - In still another alternate embodiment, when the numbers do not match, a signal is sent to a security server by cable via
cable modem 20C and CMTS gateway 24. The signal sent to the security server can include the coordinates indicated by GPS unit 20U, thereby giving an indication of the location of a possibly stolen unit. - Various other embodiments of the invention are also possible. There are a variety of alternative techniques that can be used to connect a remote client to a server via the internet. Embodiments utilizing various broadband network technologies are possible.
- For example another embodiment utilizes the Digital Subscriber Line (DSL) technology and protocol. DSL allows high speed data communication over copper telephone lines between end-users and central offices. DSL allows one pair of wires to be used for a regular telephone connection (using low frequencies) and a broadband digital connection (using higher frequencies). This type of connection is becoming popular in the United States and it is even more popular in Europe.
- An embodiment using DSL could be similar to the embodiment shown in
FIG. 1 , except that instead of a cable modem and a CMTS gateway, such an embodiment would include a single pair of wires connecting the client machine to the gateway device. These wires would carry both a normal POTS connection and a broadband connection. The operation of such an embodiment would be similar to the first embodiment except that the broadband and the POTS connection would be via a single pair of wires. - It is noted that the various embodiments of the invention could be used singularly or in combination for added security. For example, in still another embodiment, both the embodiments shown in
FIGS. 1 and 3 could be implemented in the same client. Such an embodiment would both call itself and check the caller ID and compare GPS coordinates before initializing. - Likewise the location checking mechanism described herein could be used alone or in combination with other security mechanisms such as the used of an encrypted stored key and password. Such an embodiment would both check a caller ID as does the first embodiment or check GPS coordinates as does the second embodiment and interrogate a stored encrypted key and/or a password. The number of security techniques used in any particular instance is a matter of engineering choice depending on the circumstances.
- In the above described embodiments, the check of the physical location of the client device is performed at the time the device is initialized, in other embodiments, this check could be performed at various other time. For example, the physical location check could be performed each hour of operation or each day of operation, etc.
- In the above described embodiments, the initialization process is terminated if the actual physical location of the device does not match some pre-established physical location. It is noted that instead of terminating the initiation process, various the client device could be prohibited from connecting to the network by various other means such as by disabling the cable modem or other broadband connection.
- It is noted that herein the terms client machine and client device are used interchangeably to mean the same thing. Namely, as used herein both the terms “client device” and “client machine” refer to a client connected to a network by a broadband connection. The
network Networks - While various embodiments of the invention have been shown, it will be understood by those skilled in the art, that various other changes in form and detail may be made without departing from the spirit and scope of the invention. The scope of the invention is limited only by the appended claims.
Claims (20)
1. An apparatus including:
at least one processor operable to determine if a client device is operating from a pre-established physical location by determining the actual physical location of said client device, and comparing said actual physical location of said client device to said pre-established physical location.
2. The apparatus of claim 1 wherein said at least one processor is also operable to terminate the operation of said client device if said physical location and said pre-established location are different.
3. The apparatus of claim 1 wherein said client device includes a stored encrypted key and said at least one processor is operable to check said key.
4. The apparatus of claim 1 wherein said at least one processor is operable to determine the actual physical location of said client device by initiating a telephone call from a telephone line connected to said client device and checking the caller ID of the telephone line that initiated said call.
5. The apparatus of claim 1 wherein said apparatus and said client device are connected via a cable modem.
6. The apparatus of claim 1 wherein said apparatus and said client device are connected via a Digital Subscriber Line (DSL) connection.
7. The system of claim 1 wherein said apparatus is connected to the Internet.
8. Apparatus of claim 1 wherein said at least one processor is operable to determine the actual physical location of said client device using a Global Positioning System (GPS) unit to determine the location of said client device.
9. An apparatus for determining if a client device is operating from a pre-established physical location,
said apparatus including,
a mechanism for determining the actual physical location of said client device,
a comparison mechanism for comparing actual physical location of said client device to said pre-established physical location.
10. The apparatus of claim 9 including,
a mechanism for terminating the operation of said device if said physical location and said pre-established location are different.
11. The apparatus of claim 9 wherein said client device includes a stored encrypted key and apparatus includes a mechanism operable to check said key.
12. The apparatus of claim 9 including a mechanism operable to determine the actual physical location of said client device by initiating a telephone call from a telephone line connected to said client device and checking the caller ID of the telephone line that initiated said call.
13. The apparatus of claim 9 wherein said apparatus and said client device are connected via a cable modem system.
14. The apparatus of claim 9 wherein said apparatus and said client device are connected via a Digital Subscriber Line (DSL) connection.
15. The system of claim 9 wherein said apparatus is connected to the Internet.
16. A security method including,
a security check sequence operable when a client device is initialized,
said security check sequence including,
automatically determining the actual physical location of said client device,
comparing said actual physical location to a pre-established physical location,
termination said initialization of said client device if said physical location and said pre-established locations do not match, and
continuing said initialization of said client device if said physical location and said pre-established locations do match.
whereby said client device is only initialized if said device is at a pre-established physical location.
17. The method of claim 16 wherein the actual physical location of said client device is determined by initiating a telephone call to said client device from a telephone line connected to said client device and checking the caller ID of the telephone line that initiated said call.
18. The method of claim 16 wherein the actual physical location of said client device is determined by use of a Global Positioning System (GPS) unit.
19. The method of claim 16 wherein said client device is connected to a network by uses of a cable modem.
20. The method of claim 16 wherein a notification is automatically given if said actual physical location and said pre-established located do not match.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/833,876 US20070271600A1 (en) | 2004-01-20 | 2007-08-03 | Assuring physical security of a subscriber line device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/762,145 US7281131B1 (en) | 2004-01-20 | 2004-01-20 | Assuring physical security of a subscriber line device |
US11/833,876 US20070271600A1 (en) | 2004-01-20 | 2007-08-03 | Assuring physical security of a subscriber line device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/762,145 Continuation US7281131B1 (en) | 2004-01-20 | 2004-01-20 | Assuring physical security of a subscriber line device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070271600A1 true US20070271600A1 (en) | 2007-11-22 |
Family
ID=38562259
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/762,145 Expired - Fee Related US7281131B1 (en) | 2004-01-20 | 2004-01-20 | Assuring physical security of a subscriber line device |
US11/833,876 Abandoned US20070271600A1 (en) | 2004-01-20 | 2007-08-03 | Assuring physical security of a subscriber line device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/762,145 Expired - Fee Related US7281131B1 (en) | 2004-01-20 | 2004-01-20 | Assuring physical security of a subscriber line device |
Country Status (1)
Country | Link |
---|---|
US (2) | US7281131B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9438606B1 (en) * | 2015-03-23 | 2016-09-06 | International Business Machines Corporation | Environmental-based location monitoring |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965319A (en) * | 2018-08-03 | 2018-12-07 | 珠海格力电器股份有限公司 | Apparatus control method, system and storage medium |
US11409881B2 (en) * | 2019-08-12 | 2022-08-09 | Dell Products, Lp | Method and apparatus for wireless signal based location security system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5760690A (en) * | 1996-05-02 | 1998-06-02 | Digital Equipment Corporation | Portable computer with integrated alarm system |
US20030105971A1 (en) * | 2001-12-05 | 2003-06-05 | Angelo Michael F. | Location-based security for a portable computer |
US20030217151A1 (en) * | 2002-03-01 | 2003-11-20 | Roese John J. | Location based data |
US20050026650A1 (en) * | 2003-07-30 | 2005-02-03 | Sbc Knowledge Ventures, L.P. | Provisioning of wireless private access subscribers for location based services |
US6861946B2 (en) * | 2000-05-17 | 2005-03-01 | Caveo Technology Llc. | Motion-based input system for handheld devices |
-
2004
- 2004-01-20 US US10/762,145 patent/US7281131B1/en not_active Expired - Fee Related
-
2007
- 2007-08-03 US US11/833,876 patent/US20070271600A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5760690A (en) * | 1996-05-02 | 1998-06-02 | Digital Equipment Corporation | Portable computer with integrated alarm system |
US6861946B2 (en) * | 2000-05-17 | 2005-03-01 | Caveo Technology Llc. | Motion-based input system for handheld devices |
US20030105971A1 (en) * | 2001-12-05 | 2003-06-05 | Angelo Michael F. | Location-based security for a portable computer |
US20030217151A1 (en) * | 2002-03-01 | 2003-11-20 | Roese John J. | Location based data |
US20050026650A1 (en) * | 2003-07-30 | 2005-02-03 | Sbc Knowledge Ventures, L.P. | Provisioning of wireless private access subscribers for location based services |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9438606B1 (en) * | 2015-03-23 | 2016-09-06 | International Business Machines Corporation | Environmental-based location monitoring |
US20160321815A1 (en) * | 2015-03-23 | 2016-11-03 | International Business Machines Corporation | Environmental-based location monitoring |
US9536176B2 (en) | 2015-03-23 | 2017-01-03 | International Business Machines Corporation | Environmental-based location monitoring |
US9665797B2 (en) * | 2015-03-23 | 2017-05-30 | International Business Machines Corporation | Environmental-based location monitoring |
Also Published As
Publication number | Publication date |
---|---|
US7281131B1 (en) | 2007-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6647099B1 (en) | Administrative control and security of modems | |
US8090944B2 (en) | Method and apparatus for authenticating users of an emergency communication network | |
US8385888B2 (en) | Authentication of mobile devices over voice channels | |
US20070220275A1 (en) | WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION | |
US6892308B1 (en) | Internet protocol telephony security architecture | |
EP2334111B1 (en) | Authentication of mobile devices over voice channels | |
US7512967B2 (en) | User authentication in a conversion system | |
EP2222065B1 (en) | Secure feature access from an off-pbx telephone | |
US20030137944A1 (en) | Method and apparatus for authenticated quality of service reservation | |
US20070271600A1 (en) | Assuring physical security of a subscriber line device | |
US6711610B1 (en) | System and method for establishing secure internet communication between a remote computer and a host computer via an intermediate internet computer | |
US6580718B1 (en) | Method and apparatus for preventing unauthorized use of a permanent virtual connection | |
US7154883B2 (en) | Internet telephone system | |
US20030110273A1 (en) | High speed, high security remote access system | |
US8495728B2 (en) | Internet appliance integrating telephone function security and guidance features | |
EP1119147A1 (en) | Provision of secure access for telecommunications system | |
JP2004185454A (en) | User authentication method | |
US8627439B2 (en) | Processing communication events in a communications system | |
WO2002025899A1 (en) | Internet protocol telephony security architecture | |
US20090059896A1 (en) | Remote connection to a telephone line via internet | |
JPH1127750A (en) | Access authentication method, connection controller and communication system | |
JP2002041476A (en) | System and method for user authentication | |
JP2001211479A (en) | Data communication system | |
WO2023088306A1 (en) | Security login verification method and related device | |
US10979561B1 (en) | PIN or secret-code based caller-id validation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |