Media Player Security for Full Length Episodes
First Claim
1. A computer-implemented method for obtaining secure streaming media content, the method comprising:
- obtaining from an authentication server responsive to a request for authentication of a media player, an encrypted security asset storing at least one security identifier in an encrypted format;
transmitting a request for a media stream to the authentication server, the request for the media stream including the encrypted security asset storing the at least one security identifier;
receiving from the authentication server responsive to the authentication server verifying the encrypted security asset, playlist information identifying a sequence of media segments in the requested media stream;
transmitting a request to the authentication server for a first media segment in the sequence of media segments based on the playlist information, the request for the first media segment including the encrypted security asset;
receiving a first encryption key for decrypting the first media segment in the sequence of media segments responsive to the authentication server verifying the encrypted security asset, the first encryption key obtained by the authentication server upon receiving the request for the first media segment and the first encryption key used to encrypt the first media segment;
receiving the first media segment encrypted using the first encryption key;
decrypting the first media segment using the first encryption key; and
playing the first media segment using the media player.
1 Assignment
0 Petitions
Accused Products
Abstract
A streaming video player and authentication server work in conjunction to provide secure streaming media. Player authentication is used to ensure that only users using an authorized media player authorized users can access and stream the media content. An encryption process protects unauthorized users from playing media streams that are intercepted between the content server and an authorized user. Additionally, timed tokens are used to ensure that a user authorized to access a stream during a specified time period cannot access the same stream at a later time when the user is no longer authorized.
97 Citations
20 Claims
-
1. A computer-implemented method for obtaining secure streaming media content, the method comprising:
-
obtaining from an authentication server responsive to a request for authentication of a media player, an encrypted security asset storing at least one security identifier in an encrypted format; transmitting a request for a media stream to the authentication server, the request for the media stream including the encrypted security asset storing the at least one security identifier; receiving from the authentication server responsive to the authentication server verifying the encrypted security asset, playlist information identifying a sequence of media segments in the requested media stream; transmitting a request to the authentication server for a first media segment in the sequence of media segments based on the playlist information, the request for the first media segment including the encrypted security asset; receiving a first encryption key for decrypting the first media segment in the sequence of media segments responsive to the authentication server verifying the encrypted security asset, the first encryption key obtained by the authentication server upon receiving the request for the first media segment and the first encryption key used to encrypt the first media segment; receiving the first media segment encrypted using the first encryption key; decrypting the first media segment using the first encryption key; and playing the first media segment using the media player. - View Dependent Claims (2, 3)
-
-
4. A computer-implemented method for providing access to secure media content, the method comprising:
-
authenticating a media player executing on a client based on at least one security identifier transmitted from the client to an authentication server; providing an encrypted security asset to the client, the encrypted security asset storing the at least one security identifier and storing a timestamp in an encrypted format; receiving a request from the client for a media stream, the request for the media stream including the encrypted security asset storing the at least one security identifier; responsive to verifying the security data in the encrypted security asset, providing playlist information identifying a sequence of media segments in the requested media stream; and responsive to receiving a request for a first media segment in the sequence of media segments, obtaining a first encryption key for the first media segment and transmitting the first encryption key to the client, the first encryption key for decrypting the first media segment. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for obtaining secure streaming media content, the method comprising:
-
transmitting a sequence of requests for media segments corresponding to a media stream including a request for a first media segment, each request providing information to an authentication server indicating that the media player was previously authenticated; receiving a first media segment in an encrypted format and a first encryption key for decrypting at least the first media segment in the sequence of media segments; decrypting the first media segment using the first encryption key; and playing the first media segment using the media player. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification