Patent application number | Description | Published |
20100005295 | SYSTEM AND METHOD FOR PROVIDING UNIQUE ENCRYPTION KEY - A system and method for providing a unique encryption key including a receiver, at a Voice over Internet Protocol (VoIP) adapter, configured to receive a configuration file, a processor, at the VoIP adapter, configured to decrypt the configuration file using a default key stored in the VoIP adapter, update one or more profile parameters of the configuration file, and install an encryption key at the VoIP adapter using the configuration file, and a transmitter, at the VoIP adapter, configured to register, with a network element, for network service using the updated configuration file such that the receiver is configured to receive network service from the network element when the updated configuration file is authenticated by the network element. | 01-07-2010 |
20110067096 | SYSTEM AND METHOD FOR PROVIDING SECURE CONFIGURATION FILE PROVISIONING - A system and method for providing secure configuration file exchange is disclosed. The system may comprise a Voice over Internet Protocol (VoIP) device comprising a receiver and a processor, wherein the VoIP device is configured to: receive, at the receiver, an encrypted first configuration file from a server using a default Uniform Resource Locator (URL) stored in the VoIP device; decrypt, at the processor, the first configuration file using a default key stored in the VoIP device; apply, at the processor, a first set of profile parameters stored in the first configuration file, wherein applying further comprises updating the default URL and the default key in the VoIP device with a new URL and a new key stored in the first configuration file; receive, at the receiver, an encrypted second configuration file from the server using the new URL; decrypt, at the processor, the second configuration file using the new key; and apply, at the processor, a second set of profile parameters stored in the second configuration file in order to provide network service from the server to a customer premise equipment (CPE) communicatively coupled to the VoIP device. | 03-17-2011 |
20110107389 | SYSTEM FOR AND METHOD OF SET-TOP BOX MEMORY MONITORING - A system and method for monitoring set-top box memory is presented. In one exemplary embodiment, the system and method for monitoring set-top box memory may comprise receiving memory data of a set-top box at a central computing device, monitoring the memory data of the set-top box, analyzing the memory data, identifying a memory management issue, and performing one or more remedial actions in response to the identified memory management issue. | 05-05-2011 |
20110119714 | AUTOSCROLLING THROUGH INTERACTIVE TELEVISION CONTENT - A video client device receives a request for interactive television content. The video client device provides, in response to the request, the interactive television content for display on a video display device. The video client device receives an instruction to initiate an autoscroll function. The video client device retrieves, in response to the instruction, configuration information that identifies a manner for performing the autoscroll function. The video client device performs the autoscroll function to automatically scroll through the interactive television content, in a horizontal direction or a vertical direction, on the video display device based on the configuration information. | 05-19-2011 |
20110246775 | System and Method For Providing Unique Encryption Key - A system and method for providing a unique encryption key including a receiver, at a Voice over Internet Protocol (VoIP) adapter, configured to receive a configuration file, a processor, at the VoIP adapter, configured to decrypt the configuration file using a default key stored in the VoIP adapter, update one or more profile parameters of the configuration file, and install an encryption key at the VoIP adapter using the configuration file, and a transmitter, at the VoIP adapter, configured to register, with a network element, for network service using the updated configuration file such that the receiver is configured to receive network service from the network element when the updated configuration file is authenticated by the network element. | 10-06-2011 |