Incognito Insights | Telecom Blog | Incognito Software Systems

Reducing Service Theft in DOCSIS Networks | Incognito Blog

Written by Incognito | 09/06/15 6:15 PM
  1. IP Verification: Only the intended cable modem identified as originating from the associated IP address may download the configuration file

  2. Single Download Only: The configuration file may only be downloaded once

  3. Randomly Generated Filenames: The configuration filename is a randomly generated hex string created on-the-fly during the DHCP process, which eliminates the possibility of guessing configuration filenames

  4. Configuration File Expiry: If a configuration file is not downloaded, the filename and related information regarding that file are destroyed after a configurable amount of time (default: 60 seconds)

  5. TLV 19 and 20: The solution offers the ability to include TFTP timestamp and cable modem IP in configuration files.

For a more in-depth look at how you can prevent fraud on your DOCSIS network, check out our four-part Tips and Tutorial series on fraud protection.