Abstract:
A coax server acts as a proxy between a coax transmission infrastructure and an Internet Protocol (IP) transmission infrastructure. An incoming request is received from a particular one of a plurality of coax client devices on the coax infrastructure. A request for specific media content is transmitted to a media-on-demand server in response to receiving the incoming request. A media stream is received over the IP infrastructure from the media-on-demand server, the media stream corresponding to the specific media content, and the coax server allocates a coax channel of sufficient bandwidth on the coax infrastructure and transmits the media stream on the coax channel utilizing the RF modulation scheme. A pointer indicating the coax channel on which the media stream is being transmitted is sent to the particular coax client device. The coax channel is unknown to other of the coax client devices besides the particular coax client device.
Abstract:
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices.
Abstract:
A coax server acts as a proxy between a coax transmission infrastructure and an Internet Protocol (IP) transmission infrastructure. An incoming request is received from a particular one of a plurality of coax client devices on the coax infrastructure. A request for specific media content is transmitted to a media-on-demand server in response to receiving the incoming request. A media stream is received over the IP infrastructure from the media-on-demand server, the media stream corresponding to the specific media content, and the coax server allocates a coax channel of sufficient bandwidth on the coax infrastructure and transmits the media stream on the coax channel utilizing the RF modulation scheme. A pointer indicating the coax channel on which the media stream is being transmitted is sent to the particular coax client device. The coax channel is unknown to other of the coax client devices besides the particular coax client device.
Abstract:
A coax server acts as a proxy between a coax transmission infrastructure and an Internet Protocol (IP) transmission infrastructure. An incoming request is received from a particular one of a plurality of coax client devices on the coax infrastructure. A request for specific media content is transmitted to a media-on-demand server in response to receiving the incoming request. A media stream is received over the IP infrastructure from the media-on-demand server, the media stream corresponding to the specific media content, and the coax server allocates a coax channel of sufficient bandwidth on the coax infrastructure and transmits the media stream on the coax channel utilizing the RF modulation scheme. A pointer indicating the coax channel on which the media stream is being transmitted is sent to the particular coax client device. The coax channel is unknown to other of the coax client devices besides the particular coax client device.
Abstract:
A coax server acts as a proxy between a coax transmission infrastructure and an Internet Protocol (IP) transmission infrastructure. An incoming request is received from a particular one of a plurality of coax client devices on the coax infrastructure. A request for specific media content is transmitted to a media-on-demand server in response to receiving the incoming request. A media stream is received over the IP infrastructure from the media-on-demand server, the media stream corresponding to the specific media content, and the coax server allocates a coax channel of sufficient bandwidth on the coax infrastructure and transmits the media stream on the coax channel utilizing the RF modulation scheme. A pointer indicating the coax channel on which the media stream is being transmitted is sent to the particular coax client device. The coax channel is unknown to other of the coax client devices besides the particular coax client device.
Abstract:
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices.
Abstract:
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices.
Abstract:
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices.
Abstract:
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices.
Abstract:
Systems and methods are described for off-site user access control to communications services via a site-based communications network. Embodiments operate in context of sites, each having one or more site-based networks in communication with external networks via one or more on-site routers. User devices are provided with controlled access to those external networks via wired or wireless connections between those user devices and the site based networks. In some embodiments, on-site routers maintain route maps that indicate which user devices are authorized. Standard routing functions are used so that traffic from authorized devices is routed normally, while traffic from unauthorized devices is automatically forwarded to an off-site (e.g., cloud-based) authentication system. As devices become remotely authenticated, the off-site authentication system can remotely update route maps of the on-site routers to add those devices.