US 12,273,334 B2
Systems and methods for providing secure services
David de Andrade, Fairfax, CA (US); Patrick Ladd, San Marcos, CA (US); John Brzozowski, Schwenksville, PA (US); and John Leddy, Bryn Mawr, PA (US)
Assigned to Comcast Cable Communications, LLC, Philadelphia, PA (US)
Filed by Comcast Cable Communications, LLC, Philadelphia, PA (US)
Filed on Apr. 12, 2024, as Appl. No. 18/634,338.
Application 18/634,338 is a continuation of application No. 15/908,511, filed on Feb. 28, 2018, granted, now 11,991,160.
Application 15/908,511 is a continuation of application No. 14/079,174, filed on Nov. 13, 2013, granted, now 9,942,213, issued on Apr. 10, 2018.
Claims priority of provisional application 61/786,699, filed on Mar. 15, 2013.
Prior Publication US 2024/0414143 A1, Dec. 12, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04W 12/06 (2021.01); H04W 12/069 (2021.01)
CPC H04L 63/08 (2013.01) [H04L 9/3234 (2013.01); H04L 63/068 (2013.01); H04L 63/0823 (2013.01); H04W 12/068 (2021.01); H04W 12/069 (2021.01)] 26 Claims
OG exemplary drawing
 
1. One or more non-transitory computer-readable media storing processor-executable instructions thereon that, when executed by one or more processors, cause the one or more processors to:
authenticate a first device;
provide an authorization element based upon the authentication of the first device;
authorize the first device using the authorization element;
provide a security token to the first device based upon the authorization of the first device, wherein the first device is within a first network and the security token is received by the first device from a second network external to the first network; and
provide the security token to a second device, wherein the second device is within the first network, and wherein the second device receives a request for information from the first device via the first network, the request for information comprising an unencrypted data field and an encrypted data field, and wherein the encrypted data field is encrypted using the security token such that the second device will authenticate the request for information using the security token.