US20070271600A1 - Assuring physical security of a subscriber line device - Google Patents

Assuring physical security of a subscriber line device Download PDF

Info

Publication number
US20070271600A1
US20070271600A1 US11/833,876 US83387607A US2007271600A1 US 20070271600 A1 US20070271600 A1 US 20070271600A1 US 83387607 A US83387607 A US 83387607A US 2007271600 A1 US2007271600 A1 US 2007271600A1
Authority
US
United States
Prior art keywords
client device
physical location
established
actual physical
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/833,876
Inventor
Michael Reuter
Rohit FEDANE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Priority to US11/833,876 priority Critical patent/US20070271600A1/en
Publication of US20070271600A1 publication Critical patent/US20070271600A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Definitions

  • the present invention relates to equipment that can remotely access a network and more particularly to the security of such equipment.
  • caller ID allows one to insure that an incoming call is coming from a particular telephone line.
  • a call back technique can also be used to insure that a device connected by a POTS or ISDN line is connected via a particular telephone line or location.
  • the packets transmitted by client devices which have a broadband connection do not specify the physical location at which the packets originated.
  • Security for broadband connections is often accomplished by storing an encrypted “key” on a client machine.
  • Security in such a system is enforced by checking to insure that a client requesting access has this key stored on the client.
  • a device with a stored key is stolen is stolen, this key is also stolen.
  • a stolen client machine with a stored key can be at a different location; however, when a server interrogates the client, it will fine the required key stored on the client.
  • the present invention is directed to insuring that a client device is in fact connected to the network from a known location. That is, the present invention insures that a client device is not seeking access to a network after it has been moved from a pre-established location.
  • the present invention is directed to adding a layer of security to a network client device that is connected to a network via a broadband connection.
  • the security provided by the present invention takes into account the physical location of the client device.
  • the security provided by the present invention insures that the client machine has not been moved from its authorized or pre-established location.
  • a check is made to insure that the machine connected by a broadband connection is located at its assigned location. If this check finds that the client machine is not at its assigned location, the broadband network connection is inhibited or terminated.
  • One embodiment of the invention takes advantage of the fact that most clients connected to a network via broadband, also have a POTS or ISDN connection to the outside world.
  • a client connected to a network with a high speed broadband connection uses a caller ID mechanism or a callback mechanism on a slow speed POTS or ISDN connection to insure that the client is located at an assigned location.
  • a GPS (global positioning system) mechanism is included in the client machine.
  • a server can both check a encrypted key to insure that the client is an authorized client and the GPS data to insure that the client is at an assigned location.
  • FIG. 1 is a system diagram of a first embodiment of the invention with a client machine connected to a network via a cable modem.
  • FIG. 2 is a flow diagram illustrating the operation of the first embodiment of the invention.
  • FIG. 3 is a block diagram of a second embodiment of the invention.
  • FIG. 4 is a flow diagram illustrating the operation of the second embodiment of the invention.
  • the present invention provides a layer of security that insures that a client machine is physically located at an assigned or pre-established location.
  • the present invention can be used alone or in combination with other prior art security mechanisms.
  • the present invention can, for example, be used to verify that a client machine has not been stolen and moved to a new location.
  • the present invention provides an alternative or additional mechanism for insuring network security for a client machine connected to a network with a broadband connection.
  • FIG. 1 A first embodiment of the present invention is shown in FIG. 1 .
  • the system shown in FIG. 1 includes a client device 10 that is connected to a network server 16 via a broadband cable.
  • the client 10 includes a cable modem 10 C and an interface 10 T to the normal telephone network 12 .
  • the client device 10 also includes an initialization program 10 P.
  • the client device 10 could for example be a personal computer or a network router.
  • the telephone connection 10 T could for example be a conventional modem or it could be some other type of conventional telephone network interface.
  • the cable modem 10 is connected to a CMTS (Cable Modem Termination System) which is part of the broadband gateway 14 .
  • CMTS Code Modem Termination System
  • the broadband gateway 14 is connected network server 16 through the Internet 15 . Connecting devices to a network by cable systems is conventional and not further described herein.
  • the system operates as shown in FIG. 2 .
  • the initialization program 10 P causes the device 1 to place a call to itself via telephone network interface 10 T.
  • the telephone line from the central office 12 has the telephone number 345-1212
  • the telephone interface 10 T places a call to 345-1212.
  • the telephone line to central office 12 has the conventional call waiting and caller ID features.
  • the telephone interface 10 T when the telephone interface 10 T receives the incoming call, it checks the caller ID number in a conventional manner. If the number matches the pre-stored number (in this case 345-1212) the client 10 continues it normal initialization process. If the numbers do not match, this indicates that the client device 10 has been moved and connected via a different telephone line and the process terminates. The reason for this is that the caller ID number is associated with a particular physical telephone line, and not with the device connected to that physical line. The device which actually initiates a call on a particular line does not affect the caller ID number of that physical line. Telephone devices for placing calls and checking called ID numbers are conventional and thus telephone interface 10 T is not further described herein.
  • the stored telephone number (against which the called ID number is matched) can be stored in the program 10 P in an encrypted manner so that it can not be changed other than by an authorized used.
  • Various known security devices can be used to protect this number from an un-authorized change.
  • the telephone interface 1 oT modem can call to a special number which connects to a call back device (not shown in the drawings) which initiates a call back process. In such an embodiment, initialization only proceeds if the device in fact receives the appropriate call back.
  • initialization program 10 P also performs the other normal initialization operations.
  • the network server 16 can also authenticate the client using other conventional authentication processes. For example, a key stored on the client can be interrogated in a conventional manner to insure that the correct machine is trying to access the server.
  • the first embodiment shown in FIG. 1 adds a security mechanism that insures that a client machine has not been moved from its assigned location.
  • This additional security measure can be used alone or together with other known security measures.
  • the client device 20 includes a cable modem 20 C and an initialization program 20 P similar to the first embodiment of the invention. Also similar to the first embodiment, the client 20 is connected to the Internet 25 and from there to a server 26 . However, in this second embodiment of the invention, the client device 20 includes a “Global Positioning System” (GPS) unit 20 G.
  • GPS Global Positioning System
  • the GPS unit 20 G is a conventional receiver, that determines its actual physical position from satellite signals. The unit 20 G determines it global coordinates (longitude and latitude) and stores then in a register (not explicitly shown in the drawings). Such a GPS unit is conventional and not further described herein.
  • the initiation program 20 P reads the coordinates determined by unit 20 G. These coordinates are compared to coordinates previously stored in the client. If the coordinates match, it indicates that the unit has not been moved, and the initialization proceeds. If the coordinates do not match, the initialization is terminated. It is noted that the coordinates can be stored in the program 20 P in an encrypted manner so that they cannot be changed other than by an authorized used.
  • FIG. 4 illustrates the relevant steps performed by initiation program 20 P in conjunction with GPS unit 20 G.
  • initialization program 20 P also performs the other normal initialization operations.
  • the operations occur when the unit powers up as indicated by block 302 .
  • the GPS unit 20 G determines its coordinates as indicated by block 304 .
  • a check is made to determine if the coordinates determined by GPS unit 20 G match those stored in initialization program 20 P. If the numbers match the initialization proceeds in a normal manner as indicated by block 307 . If the coordinates do not match the initialization process stops.
  • a signal is sent to a security server by cable via cable modem 20 C and CMTS gateway 24 .
  • the signal sent to the security server can include the coordinates indicated by GPS unit 20 U, thereby giving an indication of the location of a possibly stolen unit.
  • DSL Digital Subscriber Line
  • DSL allows high speed data communication over copper telephone lines between end-users and central offices.
  • DSL allows one pair of wires to be used for a regular telephone connection (using low frequencies) and a broadband digital connection (using higher frequencies). This type of connection is becoming popular in the United States and it is even more popular in Europe.
  • An embodiment using DSL could be similar to the embodiment shown in FIG. 1 , except that instead of a cable modem and a CMTS gateway, such an embodiment would include a single pair of wires connecting the client machine to the gateway device. These wires would carry both a normal POTS connection and a broadband connection. The operation of such an embodiment would be similar to the first embodiment except that the broadband and the POTS connection would be via a single pair of wires.
  • both the embodiments shown in FIGS. 1 and 3 could be implemented in the same client. Such an embodiment would both call itself and check the caller ID and compare GPS coordinates before initializing.
  • location checking mechanism described herein could be used alone or in combination with other security mechanisms such as the used of an encrypted stored key and password.
  • Such an embodiment would both check a caller ID as does the first embodiment or check GPS coordinates as does the second embodiment and interrogate a stored encrypted key and/or a password.
  • the number of security techniques used in any particular instance is a matter of engineering choice depending on the circumstances.
  • the check of the physical location of the client device is performed at the time the device is initialized, in other embodiments, this check could be performed at various other time.
  • the physical location check could be performed each hour of operation or each day of operation, etc.
  • the initialization process is terminated if the actual physical location of the device does not match some pre-established physical location. It is noted that instead of terminating the initiation process, various the client device could be prohibited from connecting to the network by various other means such as by disabling the cable modem or other broadband connection.
  • client machine and client device are used interchangeably to mean the same thing. Namely, as used herein both the terms “client device” and “client machine” refer to a client connected to a network by a broadband connection.
  • the network 15 and 25 can be a Local Area Network (LAN) or a Wide Area Network (WAN).
  • Networks 15 and 25 could for example be the Internet.

Abstract

A security system and method for a client device connected to a network by a broadband connection. The security system insures that the client machine has not been moved from its authorized location. A check is made to insure that the machine is located at its assigned location. If this check finds that the client machine is not at its assigned location, the network connection is inhibited or terminated.

Description

  • This application is a continuation of U.S. patent application Ser. No. 10/762,145, entitled Assuring Physical Security of a Subscriber Line Device, filed Jan. 20, 2004, the disclosure of which is herein incorporated by reference in its entirety.
  • FIELD OF THE INVENTION
  • The present invention relates to equipment that can remotely access a network and more particularly to the security of such equipment.
  • BACKGROUND OF THE INVENTION
  • Insuring that only authorized individuals or authorized equipment can connect to network or to a server is very important. If a client is connected to a server or a network by a POTS or ISDN line, caller ID, or a call-back mechanism can be used to insure that a call is coming from a particular location. Telephone caller ID allows one to insure that an incoming call is coming from a particular telephone line. A call back technique can also be used to insure that a device connected by a POTS or ISDN line is connected via a particular telephone line or location.
  • The packets transmitted by client devices which have a broadband connection do not specify the physical location at which the packets originated. Security for broadband connections is often accomplished by storing an encrypted “key” on a client machine. Security in such a system is enforced by checking to insure that a client requesting access has this key stored on the client. However, if a device with a stored key is stolen is stolen, this key is also stolen. A stolen client machine with a stored key, can be at a different location; however, when a server interrogates the client, it will fine the required key stored on the client.
  • The present invention is directed to insuring that a client device is in fact connected to the network from a known location. That is, the present invention insures that a client device is not seeking access to a network after it has been moved from a pre-established location.
  • SUMMARY OF THE INVENTION
  • The present invention is directed to adding a layer of security to a network client device that is connected to a network via a broadband connection. The security provided by the present invention takes into account the physical location of the client device. The security provided by the present invention insures that the client machine has not been moved from its authorized or pre-established location.
  • With the present invention, a check is made to insure that the machine connected by a broadband connection is located at its assigned location. If this check finds that the client machine is not at its assigned location, the broadband network connection is inhibited or terminated.
  • One embodiment of the invention takes advantage of the fact that most clients connected to a network via broadband, also have a POTS or ISDN connection to the outside world. With this embodiment of the invention, a client connected to a network with a high speed broadband connection, uses a caller ID mechanism or a callback mechanism on a slow speed POTS or ISDN connection to insure that the client is located at an assigned location.
  • In another embodiment of the invention, a GPS (global positioning system) mechanism is included in the client machine. When the client is connected to a network, a server can both check a encrypted key to insure that the client is an authorized client and the GPS data to insure that the client is at an assigned location.
  • DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a system diagram of a first embodiment of the invention with a client machine connected to a network via a cable modem.
  • FIG. 2 is a flow diagram illustrating the operation of the first embodiment of the invention.
  • FIG. 3 is a block diagram of a second embodiment of the invention.
  • FIG. 4 is a flow diagram illustrating the operation of the second embodiment of the invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • There are a variety of known broadband technologies that can be used to connect a client device to a network via a broadband connection. Two of the widely deployed technologies are “Cable” and “DSL”. Security is an important consideration when a client connects to a network via a broadband connection. Frequently, security is implemented by storing an encrypted key on a client machine. When a client machine seeks to connect to a server, the server interrogates this key to insure that the client machine is authorized to access the server. Often a password (alone or a password together with an encrypted key) is also used to insure security.
  • However, a stored encrypted key or a password cannot be used to insure that a broadband connected client machine has not been moved from its assigned location. The present invention provides a layer of security that insures that a client machine is physically located at an assigned or pre-established location. The present invention can be used alone or in combination with other prior art security mechanisms.
  • The present invention can, for example, be used to verify that a client machine has not been stolen and moved to a new location. The present invention provides an alternative or additional mechanism for insuring network security for a client machine connected to a network with a broadband connection.
  • A first embodiment of the present invention is shown in FIG. 1. The system shown in FIG. 1 includes a client device 10 that is connected to a network server 16 via a broadband cable. The client 10 includes a cable modem 10C and an interface 10T to the normal telephone network 12. The client device 10 also includes an initialization program 10P. The client device 10 could for example be a personal computer or a network router. The telephone connection 10T could for example be a conventional modem or it could be some other type of conventional telephone network interface.
  • The cable modem 10 is connected to a CMTS (Cable Modem Termination System) which is part of the broadband gateway 14. The broadband gateway 14 is connected network server 16 through the Internet 15. Connecting devices to a network by cable systems is conventional and not further described herein.
  • The system operates as shown in FIG. 2. When the client device 1 powers up, (that is when the client device 1 is initialized) the initialization program 10P causes the device 1 to place a call to itself via telephone network interface 10T. For example, if the telephone line from the central office 12 has the telephone number 345-1212, the telephone interface 10T places a call to 345-1212. The telephone line to central office 12 has the conventional call waiting and caller ID features.
  • As indicated by block 205, when the telephone interface 10T receives the incoming call, it checks the caller ID number in a conventional manner. If the number matches the pre-stored number (in this case 345-1212) the client 10 continues it normal initialization process. If the numbers do not match, this indicates that the client device 10 has been moved and connected via a different telephone line and the process terminates. The reason for this is that the caller ID number is associated with a particular physical telephone line, and not with the device connected to that physical line. The device which actually initiates a call on a particular line does not affect the caller ID number of that physical line. Telephone devices for placing calls and checking called ID numbers are conventional and thus telephone interface 10T is not further described herein.
  • It is noted that the stored telephone number (against which the called ID number is matched) can be stored in the program 10P in an encrypted manner so that it can not be changed other than by an authorized used. Various known security devices can be used to protect this number from an un-authorized change.
  • In alternate embodiments were Call Waiting and Caller ID features are not available, the telephone interface 1oT modem can call to a special number which connects to a call back device (not shown in the drawings) which initiates a call back process. In such an embodiment, initialization only proceeds if the device in fact receives the appropriate call back.
  • Naturally it should be understood that initialization program 10P also performs the other normal initialization operations.
  • The network server 16, can also authenticate the client using other conventional authentication processes. For example, a key stored on the client can be interrogated in a conventional manner to insure that the correct machine is trying to access the server.
  • In summary the first embodiment shown in FIG. 1 adds a security mechanism that insures that a client machine has not been moved from its assigned location. This additional security measure can be used alone or together with other known security measures.
  • A second embodiment of the invention is shown in FIG. 3. In this second embodiment of the invention, the client device 20 includes a cable modem 20C and an initialization program 20P similar to the first embodiment of the invention. Also similar to the first embodiment, the client 20 is connected to the Internet 25 and from there to a server 26. However, in this second embodiment of the invention, the client device 20 includes a “Global Positioning System” (GPS) unit 20G. The GPS unit 20G is a conventional receiver, that determines its actual physical position from satellite signals. The unit 20G determines it global coordinates (longitude and latitude) and stores then in a register (not explicitly shown in the drawings). Such a GPS unit is conventional and not further described herein.
  • When the client unit 20 is initialized, the initiation program 20P reads the coordinates determined by unit 20G. These coordinates are compared to coordinates previously stored in the client. If the coordinates match, it indicates that the unit has not been moved, and the initialization proceeds. If the coordinates do not match, the initialization is terminated. It is noted that the coordinates can be stored in the program 20P in an encrypted manner so that they cannot be changed other than by an authorized used.
  • The operation of the system is illustrated in FIG. 4 which illustrates the relevant steps performed by initiation program 20P in conjunction with GPS unit 20G. Naturally it should be understood that initialization program 20P also performs the other normal initialization operations.
  • The operations occur when the unit powers up as indicated by block 302. The GPS unit 20G determines its coordinates as indicated by block 304. As indicated by block 305, a check is made to determine if the coordinates determined by GPS unit 20G match those stored in initialization program 20P. If the numbers match the initialization proceeds in a normal manner as indicated by block 307. If the coordinates do not match the initialization process stops.
  • In still another alternate embodiment, when the numbers do not match, a signal is sent to a security server by cable via cable modem 20C and CMTS gateway 24. The signal sent to the security server can include the coordinates indicated by GPS unit 20U, thereby giving an indication of the location of a possibly stolen unit.
  • Various other embodiments of the invention are also possible. There are a variety of alternative techniques that can be used to connect a remote client to a server via the internet. Embodiments utilizing various broadband network technologies are possible.
  • For example another embodiment utilizes the Digital Subscriber Line (DSL) technology and protocol. DSL allows high speed data communication over copper telephone lines between end-users and central offices. DSL allows one pair of wires to be used for a regular telephone connection (using low frequencies) and a broadband digital connection (using higher frequencies). This type of connection is becoming popular in the United States and it is even more popular in Europe.
  • An embodiment using DSL could be similar to the embodiment shown in FIG. 1, except that instead of a cable modem and a CMTS gateway, such an embodiment would include a single pair of wires connecting the client machine to the gateway device. These wires would carry both a normal POTS connection and a broadband connection. The operation of such an embodiment would be similar to the first embodiment except that the broadband and the POTS connection would be via a single pair of wires.
  • It is noted that the various embodiments of the invention could be used singularly or in combination for added security. For example, in still another embodiment, both the embodiments shown in FIGS. 1 and 3 could be implemented in the same client. Such an embodiment would both call itself and check the caller ID and compare GPS coordinates before initializing.
  • Likewise the location checking mechanism described herein could be used alone or in combination with other security mechanisms such as the used of an encrypted stored key and password. Such an embodiment would both check a caller ID as does the first embodiment or check GPS coordinates as does the second embodiment and interrogate a stored encrypted key and/or a password. The number of security techniques used in any particular instance is a matter of engineering choice depending on the circumstances.
  • In the above described embodiments, the check of the physical location of the client device is performed at the time the device is initialized, in other embodiments, this check could be performed at various other time. For example, the physical location check could be performed each hour of operation or each day of operation, etc.
  • In the above described embodiments, the initialization process is terminated if the actual physical location of the device does not match some pre-established physical location. It is noted that instead of terminating the initiation process, various the client device could be prohibited from connecting to the network by various other means such as by disabling the cable modem or other broadband connection.
  • It is noted that herein the terms client machine and client device are used interchangeably to mean the same thing. Namely, as used herein both the terms “client device” and “client machine” refer to a client connected to a network by a broadband connection. The network 15 and 25 can be a Local Area Network (LAN) or a Wide Area Network (WAN). Networks 15 and 25 could for example be the Internet.
  • While various embodiments of the invention have been shown, it will be understood by those skilled in the art, that various other changes in form and detail may be made without departing from the spirit and scope of the invention. The scope of the invention is limited only by the appended claims.

Claims (20)

1. An apparatus including:
at least one processor operable to determine if a client device is operating from a pre-established physical location by determining the actual physical location of said client device, and comparing said actual physical location of said client device to said pre-established physical location.
2. The apparatus of claim 1 wherein said at least one processor is also operable to terminate the operation of said client device if said physical location and said pre-established location are different.
3. The apparatus of claim 1 wherein said client device includes a stored encrypted key and said at least one processor is operable to check said key.
4. The apparatus of claim 1 wherein said at least one processor is operable to determine the actual physical location of said client device by initiating a telephone call from a telephone line connected to said client device and checking the caller ID of the telephone line that initiated said call.
5. The apparatus of claim 1 wherein said apparatus and said client device are connected via a cable modem.
6. The apparatus of claim 1 wherein said apparatus and said client device are connected via a Digital Subscriber Line (DSL) connection.
7. The system of claim 1 wherein said apparatus is connected to the Internet.
8. Apparatus of claim 1 wherein said at least one processor is operable to determine the actual physical location of said client device using a Global Positioning System (GPS) unit to determine the location of said client device.
9. An apparatus for determining if a client device is operating from a pre-established physical location,
said apparatus including,
a mechanism for determining the actual physical location of said client device,
a comparison mechanism for comparing actual physical location of said client device to said pre-established physical location.
10. The apparatus of claim 9 including,
a mechanism for terminating the operation of said device if said physical location and said pre-established location are different.
11. The apparatus of claim 9 wherein said client device includes a stored encrypted key and apparatus includes a mechanism operable to check said key.
12. The apparatus of claim 9 including a mechanism operable to determine the actual physical location of said client device by initiating a telephone call from a telephone line connected to said client device and checking the caller ID of the telephone line that initiated said call.
13. The apparatus of claim 9 wherein said apparatus and said client device are connected via a cable modem system.
14. The apparatus of claim 9 wherein said apparatus and said client device are connected via a Digital Subscriber Line (DSL) connection.
15. The system of claim 9 wherein said apparatus is connected to the Internet.
16. A security method including,
a security check sequence operable when a client device is initialized,
said security check sequence including,
automatically determining the actual physical location of said client device,
comparing said actual physical location to a pre-established physical location,
termination said initialization of said client device if said physical location and said pre-established locations do not match, and
continuing said initialization of said client device if said physical location and said pre-established locations do match.
whereby said client device is only initialized if said device is at a pre-established physical location.
17. The method of claim 16 wherein the actual physical location of said client device is determined by initiating a telephone call to said client device from a telephone line connected to said client device and checking the caller ID of the telephone line that initiated said call.
18. The method of claim 16 wherein the actual physical location of said client device is determined by use of a Global Positioning System (GPS) unit.
19. The method of claim 16 wherein said client device is connected to a network by uses of a cable modem.
20. The method of claim 16 wherein a notification is automatically given if said actual physical location and said pre-established located do not match.
US11/833,876 2004-01-20 2007-08-03 Assuring physical security of a subscriber line device Abandoned US20070271600A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/833,876 US20070271600A1 (en) 2004-01-20 2007-08-03 Assuring physical security of a subscriber line device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/762,145 US7281131B1 (en) 2004-01-20 2004-01-20 Assuring physical security of a subscriber line device
US11/833,876 US20070271600A1 (en) 2004-01-20 2007-08-03 Assuring physical security of a subscriber line device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/762,145 Continuation US7281131B1 (en) 2004-01-20 2004-01-20 Assuring physical security of a subscriber line device

Publications (1)

Publication Number Publication Date
US20070271600A1 true US20070271600A1 (en) 2007-11-22

Family

ID=38562259

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/762,145 Expired - Fee Related US7281131B1 (en) 2004-01-20 2004-01-20 Assuring physical security of a subscriber line device
US11/833,876 Abandoned US20070271600A1 (en) 2004-01-20 2007-08-03 Assuring physical security of a subscriber line device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/762,145 Expired - Fee Related US7281131B1 (en) 2004-01-20 2004-01-20 Assuring physical security of a subscriber line device

Country Status (1)

Country Link
US (2) US7281131B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9438606B1 (en) * 2015-03-23 2016-09-06 International Business Machines Corporation Environmental-based location monitoring

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965319A (en) * 2018-08-03 2018-12-07 珠海格力电器股份有限公司 Apparatus control method, system and storage medium
US11409881B2 (en) * 2019-08-12 2022-08-09 Dell Products, Lp Method and apparatus for wireless signal based location security system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5760690A (en) * 1996-05-02 1998-06-02 Digital Equipment Corporation Portable computer with integrated alarm system
US20030105971A1 (en) * 2001-12-05 2003-06-05 Angelo Michael F. Location-based security for a portable computer
US20030217151A1 (en) * 2002-03-01 2003-11-20 Roese John J. Location based data
US20050026650A1 (en) * 2003-07-30 2005-02-03 Sbc Knowledge Ventures, L.P. Provisioning of wireless private access subscribers for location based services
US6861946B2 (en) * 2000-05-17 2005-03-01 Caveo Technology Llc. Motion-based input system for handheld devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5760690A (en) * 1996-05-02 1998-06-02 Digital Equipment Corporation Portable computer with integrated alarm system
US6861946B2 (en) * 2000-05-17 2005-03-01 Caveo Technology Llc. Motion-based input system for handheld devices
US20030105971A1 (en) * 2001-12-05 2003-06-05 Angelo Michael F. Location-based security for a portable computer
US20030217151A1 (en) * 2002-03-01 2003-11-20 Roese John J. Location based data
US20050026650A1 (en) * 2003-07-30 2005-02-03 Sbc Knowledge Ventures, L.P. Provisioning of wireless private access subscribers for location based services

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9438606B1 (en) * 2015-03-23 2016-09-06 International Business Machines Corporation Environmental-based location monitoring
US20160321815A1 (en) * 2015-03-23 2016-11-03 International Business Machines Corporation Environmental-based location monitoring
US9536176B2 (en) 2015-03-23 2017-01-03 International Business Machines Corporation Environmental-based location monitoring
US9665797B2 (en) * 2015-03-23 2017-05-30 International Business Machines Corporation Environmental-based location monitoring

Also Published As

Publication number Publication date
US7281131B1 (en) 2007-10-09

Similar Documents

Publication Publication Date Title
US6647099B1 (en) Administrative control and security of modems
US8090944B2 (en) Method and apparatus for authenticating users of an emergency communication network
US8385888B2 (en) Authentication of mobile devices over voice channels
US20070220275A1 (en) WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION
US6892308B1 (en) Internet protocol telephony security architecture
EP2334111B1 (en) Authentication of mobile devices over voice channels
US7512967B2 (en) User authentication in a conversion system
EP2222065B1 (en) Secure feature access from an off-pbx telephone
US20030137944A1 (en) Method and apparatus for authenticated quality of service reservation
US20070271600A1 (en) Assuring physical security of a subscriber line device
US6711610B1 (en) System and method for establishing secure internet communication between a remote computer and a host computer via an intermediate internet computer
US6580718B1 (en) Method and apparatus for preventing unauthorized use of a permanent virtual connection
US7154883B2 (en) Internet telephone system
US20030110273A1 (en) High speed, high security remote access system
US8495728B2 (en) Internet appliance integrating telephone function security and guidance features
EP1119147A1 (en) Provision of secure access for telecommunications system
JP2004185454A (en) User authentication method
US8627439B2 (en) Processing communication events in a communications system
WO2002025899A1 (en) Internet protocol telephony security architecture
US20090059896A1 (en) Remote connection to a telephone line via internet
JPH1127750A (en) Access authentication method, connection controller and communication system
JP2002041476A (en) System and method for user authentication
JP2001211479A (en) Data communication system
WO2023088306A1 (en) Security login verification method and related device
US10979561B1 (en) PIN or secret-code based caller-id validation system

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION