APPARATUS AND METHODS FOR CONTENT DELIVERY AND MESSAGE EXCHANGE ACROSS MULTIPLE CONTENT DELIVERY NETWORKS
First Claim
1. A method for providing protected content via a first network to an authorized user of a second network, said method comprising:
- receiving at an entity of said second network a request for said protected content, said request comprising at least information identifying a requesting user and information identifying requested content;
determining, based at least in part on said information identifying said requesting user, an identity of said requesting user as an authorized user of said second network;
generating a unique identifier for said authorized user; and
transmitting a response to said request to an entity of said first network, said response comprising said unique identifier;
wherein, said transmission of said response is configured to cause said entity of said first network deliver said protected content to said authorized user; and
wherein said unique identifier is stored at said entity of said first network and is configured to enable use in a subsequent request, said subsequent request comprising a request for second protected content different than said first content.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for providing protected content to subscribers of a managed (e.g., MSO) network via a content source accessible via an internetwork such as the Internet. In one embodiment, a user accesses a service provider portal (e.g., website), and requests content. The service provider determines whether the requesting user is permitted to access the content, and what rights or restrictions are associated with the user. This includes authenticating the user as a subscriber of the MSO, and determining the subscriber'"'"'s subscription level. In another embodiment, a user'"'"'s account with the MSO and service provider may be federated, thus a given user will have MSO-specific information regarding its identity (such as login information, GUID, etc.) and is able to perform a single sign on to request and receive content.
-
Citations
21 Claims
-
1. A method for providing protected content via a first network to an authorized user of a second network, said method comprising:
-
receiving at an entity of said second network a request for said protected content, said request comprising at least information identifying a requesting user and information identifying requested content; determining, based at least in part on said information identifying said requesting user, an identity of said requesting user as an authorized user of said second network; generating a unique identifier for said authorized user; and transmitting a response to said request to an entity of said first network, said response comprising said unique identifier; wherein, said transmission of said response is configured to cause said entity of said first network deliver said protected content to said authorized user; and wherein said unique identifier is stored at said entity of said first network and is configured to enable use in a subsequent request, said subsequent request comprising a request for second protected content different than said first content. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus in a content delivery network configured to authorize access to a selected one or more services at a packet network by at least one user device, said apparatus comprising:
-
a first interface configured to receive; information identifying said at least one user device; and a request for said access to said selected one or more services; a processor comprising at least one computer program, said computer program configured to; verify said information identifying said at least one user device as being associated with at least one subscriber of said content delivery network; generate a unique identifier specific to said subscriber; and generate a response to said request for said access to said selected one or more services; and a second interface configured to transmit; said unique identifier to at least one entity of said packet network for storage thereon; and said response to said request for said access to said selected one or more services. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A method for providing protected content via a first content delivery network to an authorized user of a second content delivery network, said method comprising:
-
receiving at an entity of said first network a request for said protected content from a user device, said request comprising at least information identifying said user device and information identifying said protected content; querying a plurality of records to determine a unique identifier of said user device, said unique identifier being previously provided by said second network; transmitting said unique identifier and said information identifying said protected content to an entity of said second network; receiving in response to said transmission of said unique identifier and said information identifying said protected content, a response from said entity of said second network; and delivering said protected content to said user device based at least in part on said response. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method of operating a packet network, comprising:
-
receiving from an IP-enabled device a request for content at an entity of said packet network, said content being protected in accordance with one or more policies specified by the operator of a managed content distribution network, said request comprising information uniquely associated with a subscriber of said managed network; accessing information stored at said entity received from said operator, said stored information enabling said entity to determine whether the request for content should be granted; when granting said request, issuing a communication to said managed network indicating that said content is being provided; and causing said content to be provided to said requesting 1P-enabled device over said packet network, said content being at least partly encapsulated using an IP protocol. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification