AUTOMATIC TOKEN-BASED SECURE CONTENT STREAMING METHOD AND APPARATUS
5 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for improving interactions with and between computers in secure content access, distribution and download and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide systems and methods for automatic token-based secure content streaming.
5 Citations
42 Claims
-
1-22. -22. (canceled)
-
23. A method comprising:
-
receiving, at a computing device and over an electronic communications network, a first request from a user device for a content item, a first network address being associated with the first request; generating, via the computing device, a secure token, the generating comprising encrypting information including the first network address and temporal information to form the secure token; transmitting, via the computing device and over the electronic communications network to the user device, the secure token in response to the first request for the content item; receiving, via the computing device and over the electronic communications network, a subsequent request for the content item from the user device after the first request for the content item, a subsequent network address being associated with the subsequent request; obtaining, via the computing device, the secure token associated with the subsequent request; extracting, via the computing device, the first network address and the temporal information from the secure token associated with the subsequent request; making, via the computing device, a determination whether or not to permit the subsequent request for the content, making the determination comprising; determining, using the temporal information extracted from the secure token associated with the subsequent request, whether or not the secure token has expired; and determining, using the subsequent network address associated with the subsequent request for the content item, whether or not a count of network addresses associated with each request for the content item by the user device exceeds a threshold number of network addresses; permitting, via the computing device, the subsequent request for the content item in a case that the secure token has not expired and the threshold number of network addresses is not exceeded; and denying, via the computing device, the subsequent request for the content item in a case that the secure token is expired and in a case that the threshold number of network addresses is exceeded. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A non-transitory computer-readable storage medium tangibly encoded with computer-executable instructions that when executed by a processor associated with a computing device perform a method comprising:
-
receiving, over an electronic communications network, a first request from a user device for a content item, a first network address being associated with the first request; generating a secure token, the generating comprising encrypting information including the first network address and temporal information to form the secure token; transmitting, over the electronic communications network to the user device, the secure token in response to the first request for the content item; receiving, over the electronic communications network, a subsequent request for the content item, from the user device after the first request for the content item, a subsequent network address being associated with the subsequent request; obtaining the secure token associated with the subsequent request; extracting the first network address and the temporal information from the secure token associated with the subsequent request; making a determination whether or not to permit the subsequent request for the content, making the determination comprising; determining, using the temporal information extracted from the secure token associated with the subsequent request, whether or not the secure token has expired; and determining, using the subsequent network address associated with the subsequent request for the content item, whether or not a count of network addresses associated with each request for the content item by the user device exceeds a threshold number of network addresses; permitting the subsequent request for the content item in a case that the secure token has not expired and the threshold number of network addresses is not exceeded; and denying the subsequent request for the content item in a case that the secure token is expired and in a case that the threshold number of network addresses is exceeded. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41)
-
-
42. A computing device comprising:
-
a processor; a non-transitory storage medium for tangibly storing thereon program logic for execution by the processor, the program logic comprising; receiving logic executed by the processor for receiving, over an electronic communications network, a first request from a user device for a content item, a first network address being associated with the first request; generating logic executed by the processor for generating a secure token, the generating comprising encrypting information including the first network address and temporal information to form the secure token; transmitting logic executed by the processor for transmitting, over the electronic communications network to the user device, the secure token in response to the first request for the content item; receiving logic executed by the processor for receiving, over the electronic communications network, a subsequent request for the content item from the user device after the first request for the content item, a subsequent network address being associated with the subsequent request; obtaining logic executed by the processor for obtaining the secure token associated with the subsequent request; extracting logic executed by the processor for extracting the first network address and the temporal information from the secure token associated with the subsequent request; making logic executed by the processor for making a determination whether or not to permit the subsequent request for the content, the logic for making the determination comprising; determining logic executed by the processor for determining, using the temporal information extracted from the secure token associated with the subsequent request, whether or not the secure token has expired; and determining logic executed by the processor for determining, using the subsequent network address associated with the subsequent request for the content item, whether or not a count of network addresses associated with each request for the content item by the user device exceeds a threshold number of network addresses; permitting logic executed by the processor for permitting the subsequent request for the content item in a case that the secure token has not expired and the threshold number of network addresses is not exceeded; and denying logic executed by the processor for denying the subsequent request for the content item in a case that the secure token is expired and in a case that the threshold number of network addresses is exceeded.
-
Specification