Automatic token based secure content streaming method and apparatus
First Claim
Patent Images
1. A method comprising:
- receiving, at a computing device and over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address;
making a determination, via the computing device and using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and
transmitting, via the computing device and over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download.
5 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for improving interactions with and between computers in secure content access, distribution and download and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide systems and methods for automatic token-based secure content streaming.
5 Citations
22 Claims
-
1. A method comprising:
-
receiving, at a computing device and over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address; making a determination, via the computing device and using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and transmitting, via the computing device and over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium tangibly encoded with computer-executable instructions, that when executed by a processor associated with a computing device, performs a method comprising:
-
receiving, over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address; making a determination, using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and transmitting, over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A computing device comprising:
-
a processor; a non-transitory storage medium for tangibly storing thereon program logic for execution by the processor, the program logic comprising; receiving logic executed by the processor for receiving, over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address; determining logic executed by the processor for making a determination, using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and transmitting logic executed by the processor for transmitting, over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download.
-
Specification