Content licensing and conditional access using a mobile device
First Claim
Patent Images
1. A method for controlling access to protected content provided by a service provider, the method comprising:
- during a registration process for a given user, storing an association between a symmetric encryption key and a unique identifier of a set-top box for the given user;
encrypting the protected content using the symmetric encryption key associated with the unique identifier of the set-top box, wherein the set-top box is configured to validate access to view the protected content by accepting a content token;
encrypting the symmetric encryption key to an encrypted symmetric encryption key, wherein the encrypted symmetric encryption key is decryptable with the content token serving as a dynamically-generated encryption key, wherein a mobile application configured to run on a mobile device that is physically separate from the set-top box is configured to generate the content token on the mobile device that is physically separate from the set-top box in response to a user request for access to view the protected content; and
transmitting the encrypted protected content and the encrypted symmetric encryption key to the set-top box.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted.
-
Citations
23 Claims
-
1. A method for controlling access to protected content provided by a service provider, the method comprising:
-
during a registration process for a given user, storing an association between a symmetric encryption key and a unique identifier of a set-top box for the given user; encrypting the protected content using the symmetric encryption key associated with the unique identifier of the set-top box, wherein the set-top box is configured to validate access to view the protected content by accepting a content token; encrypting the symmetric encryption key to an encrypted symmetric encryption key, wherein the encrypted symmetric encryption key is decryptable with the content token serving as a dynamically-generated encryption key, wherein a mobile application configured to run on a mobile device that is physically separate from the set-top box is configured to generate the content token on the mobile device that is physically separate from the set-top box in response to a user request for access to view the protected content; and transmitting the encrypted protected content and the encrypted symmetric encryption key to the set-top box. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. One or more computer-readable storage media not consisting of a signal containing-instructions which cause a computer to perform a method for controlling access to content from a service provider encrypted with a symmetric key and accompanied by an encrypted version of the symmetric key, the method comprising:
-
accepting a set of parameters in a mobile device of a user that is physically separate from a set-top box, wherein the parameters comprise a unique identifier of the set-top box; as part of a registration process, sending the parameters to the service provider for storage in a service provider database as associated with the user; upon request by a user, in the mobile device that is physically separate from the set-top box, generating a dynamic key for viewing the content on a set-top box, wherein the dynamic key generated by the mobile device that is physically separate from the set-top box is operable to decrypt the encrypted version of the symmetric key used to encrypt the content; and inputting the dynamic key into the set-top box to access the content. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
a set-top box; a mobile device; one or more set-top box program modules executable on the set-top box having a unique identifier and configured to receive protected content from a service provider; a mobile application executable on the mobile device controllable by a user and physically separate from the set-top box; wherein the mobile application causes the mobile device to perform a method comprising; accepting a set of parameters, wherein the parameters comprise the unique identifier of the set-top box; as part of a registration process, sending the parameters to the service provider for storage in a service provider database as associated with the user; upon request by the user, generating a dynamic key for viewing the protected content on the set-top box, wherein the dynamic key is operable to decrypt a symmetric key used to encrypt the protected content; and inputting the dynamic key into the set-top box; and wherein the one or more set-top box program modules cause the set-top box to perform a method comprising; receiving, from the service provider, the protected content and an encrypted symmetric key used to encrypt the protected content; receiving the dynamic key from the mobile device; decrypting the encrypted symmetric key with the dynamic key received from the mobile device; and decrypting the protected content with the decrypted symmetric key.
-
Specification