Authentication and binding of multiple devices
First Claim
1. A method comprising:
- receiving, at a first device that is preregistered with a content provider and that has a first security profile, a first content registration request including a first digital signature;
determining, by a processor of the first device, that a second device, having a second security profile lower than the first security profile, is authorized to receive content from the content provider;
digitally signing, by the processor, the first content registration request with a second digital signature;
transmitting the first content registration request with the first digital signature and the second digital signature to the content provider; and
receiving, at the first device, a first response that includes access authorization credentials and identity information that associates the second device with a user account.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are described that relate to authentication and/or binding of multiple devices with varying security profiles. In one aspect, a first device with a higher security profile may vouch for the authenticity of a second device with a lower security profile when the second device requests access for content from a content provider. The vouching process may be implemented by allowing the first device to overlay its digital signature on a registration request that has been signed and transmitted by the second device. The second device with the lower security profile may access content from the content provider or source for a predetermined time period, even when the second device does not access content through the first device.
-
Citations
16 Claims
-
1. A method comprising:
-
receiving, at a first device that is preregistered with a content provider and that has a first security profile, a first content registration request including a first digital signature; determining, by a processor of the first device, that a second device, having a second security profile lower than the first security profile, is authorized to receive content from the content provider; digitally signing, by the processor, the first content registration request with a second digital signature; transmitting the first content registration request with the first digital signature and the second digital signature to the content provider; and receiving, at the first device, a first response that includes access authorization credentials and identity information that associates the second device with a user account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A first device comprising:
-
memory; and a processor configured to; receive, at the first device that is preregistered with a content provider and that has a first security profile, a first content registration request including a first digital signature; determine that a second device, having a second security profile lower than the first security profile, is authorized to receive content from the content provider; digitally sign the first content registration request with a second digital signature; transmit the first content registration request with the first digital signature and the second digital signature to the content provider; and receive a first response that includes access authorization credentials and identity information that associates the second device with a user account. - View Dependent Claims (12, 13, 14)
-
-
15. A method comprising:
-
receiving, at a first device that is preregistered with a content provider and that has a first security profile, a first content registration request including a first digital signature; determining, by a processor of the first device, that a second device, having a second security profile lower than the first security profile, is authorized to receive content from the content provider; digitally signing, by the processor, the first content registration request with a second digital signature; transmitting the first content registration request with the first digital signature and the second digital signature to the content provider; receiving, at the first device, a first response that includes access authorization credentials and identity information that associates the second device with a user account; and transmitting the first response to the second device. - View Dependent Claims (16)
-
Specification