Secure authorization for accessing content on a shareable device
First Claim
Patent Images
1. A system for authorizing access to media content, comprising:
- a database;
communications circuitry configured to connect to a first device and a second device; and
one or more processors coupled to the database and the communications circuitry, the one or more processors separate from the first device and the second device, the first device separate from the second device, the one or more processors configured to;
authorize access to the media content by the second device;
receive, from the second device, a first identification of the first device;
generate, after authorization of access to the media content by the second device, a token, the token associated with the first identification;
store, in the database, the first identification and a copy of the token;
send the token to the second device;
receive, from the first device, the token and a second identification of the first device, the token having been received by the first device from the second device;
retrieve, from the database and using the token received from the first device, the first identification; and
authorize access to the media content by the first device in response to a result of a comparison of the first identification and the second identification being that the second identification identifies the first device.
2 Assignments
0 Petitions
Accused Products
Abstract
Described is a process for securely authorizing access to media content from a first device to a second device. Access to content may be authorized by performing authentication from the first device. Information used for authentication (e.g. login information) is not shared with the second device. Instead, a token may be used to authenticate the second device. The authorization process may be done in a secure manner by sharing only the generated token with the second device. Authentication information may not be derived from the token, and accordingly, even if the second device is not secure or the token is exposed, authentication information remains secure.
-
Citations
18 Claims
-
1. A system for authorizing access to media content, comprising:
-
a database; communications circuitry configured to connect to a first device and a second device; and one or more processors coupled to the database and the communications circuitry, the one or more processors separate from the first device and the second device, the first device separate from the second device, the one or more processors configured to; authorize access to the media content by the second device; receive, from the second device, a first identification of the first device; generate, after authorization of access to the media content by the second device, a token, the token associated with the first identification; store, in the database, the first identification and a copy of the token; send the token to the second device; receive, from the first device, the token and a second identification of the first device, the token having been received by the first device from the second device; retrieve, from the database and using the token received from the first device, the first identification; and authorize access to the media content by the first device in response to a result of a comparison of the first identification and the second identification being that the second identification identifies the first device. - View Dependent Claims (2, 3, 15)
-
-
4. A non-transitory computer-readable medium storing computer code for controlling one or more processors, the computer code including instructions to cause the one or more processors to:
-
authorize access to the media content by the second device; receive, from a second device, a first identification of a first device; generate, after authorization of access to the media content by the second device, a token, the token associated with the first identification; store, in a database, the first identification and a copy of the token; send the token to a second device; receive, from the first device, the token and a second identification of the first device, the token having been received by the first device from the second device; retrieve, from the database and using the token received from the first device, the first identification; and authorize access to the media content by the first device in response to a result of a comparison of the first identification and the second identification being that the second identification identifies the first device, wherein the one or more processors are separate from the first device and the second device, and wherein the first device is separate from the second device. - View Dependent Claims (5, 6, 16)
-
-
7. A system for accessing media content, comprising:
-
communications circuitry configured to connect to a device, a first server, and a second server; and one or more processors coupled to the communications circuitry, the one or more processors separate from the device, the first server, and the second server, the device separate from the first server and the second server, the first server separate from the second server, the one or more processors configured to; receive, from the device, a token, the token having been generated by the first server after the first server has authorized access to the media content by the device, the token associated with a first identification of the one or more processors, the first identification having been provided to the first server by the device; send, to the first server, the token and a second identification of the one or more processors; receive, from the first server, an authorization to access the media content, the authorization having been determined by the first server based on a result of a comparison of the first identification and the second identification being that the second identification identifies the one or more processors, the first identification having been retrieved from a database by the first server using the token; send, to the second server at predefined times, the token; and receive, from the second server, a response indicative of a status of a right to access the media content. - View Dependent Claims (8, 9, 10, 17)
-
-
11. A non-transitory computer-readable medium storing computer code for controlling one or more processors, the computer code including instructions to cause the one or more processors to:
-
receive, from a device, a token, the token having been generated by a first server after the first server has authorized access to the media content by the device, the token associated with a first identification of the one or more processors, the first identification having been provided to the first server by the device; send, to the first server, the token and a second identification of the one or more processors; receive, from the first server, an authorization to access the media content, the authorization having been determined by the first server based on a result of a comparison of the first identification and the second identification being that the second identification identifies the one or more processors, the first identification having been retrieved from a database by the first server using the token; send, to the second server at predefined times, the token; and receive, from the second server, a response indicative of a status of a right to access the media content, wherein the one or more processors are separate from the device, the first server, and the second server, the device is separate from the first server and the second server, and the first server is separate from the second server. - View Dependent Claims (12, 13, 14, 18)
-
Specification