METHOD AND SYSTEM FOR SECURE OVER-THE-TOP LIVE VIDEO DELIVERY
First Claim
1. A method for handling secure distribution of content comprising:
- initiating a media playback request and receiving a playback request response;
parsing content information from the playback request response, the content information including content encryption keys, content encryption key identifiers, and content encryption key expiration times;
retrieving content and manifest files from a content delivery server;
detecting content encryption key rotation boundaries between periods of use of different content encryption keys in decrypting retrieved content;
issuing requests to a license server ahead of a key rotation boundary to retrieve a second content encryption key to be used after a content encryption key rotation boundary is reached; and
applying the second key for content decryption after the key rotation boundary is reached.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content encryption key has expired, a second content encryption key is provided to the content packaging engine for encryption of a second portion of a video stream. The method further provides for notification of client devices of imminent key changes, as well as support for secure retrieval of new keys by client devices. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method.
41 Citations
20 Claims
-
1. A method for handling secure distribution of content comprising:
-
initiating a media playback request and receiving a playback request response; parsing content information from the playback request response, the content information including content encryption keys, content encryption key identifiers, and content encryption key expiration times; retrieving content and manifest files from a content delivery server; detecting content encryption key rotation boundaries between periods of use of different content encryption keys in decrypting retrieved content; issuing requests to a license server ahead of a key rotation boundary to retrieve a second content encryption key to be used after a content encryption key rotation boundary is reached; and applying the second key for content decryption after the key rotation boundary is reached. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computerized device operable as a client for handling secure distribution of content, comprising:
-
memory operative to store computer program instructions; one or more processors; input/output interface circuitry; and interconnect circuitry coupling the memory, processors and input/output interface circuitry together, wherein the processors are operative to execute the computer program instructions from the memory to cause the computerized device to; initiate a media playback request and receive a playback request response; parse content information from the playback request response, the content information including content encryption keys, content encryption key identifiers, and content encryption key expiration times; retrieve content and manifest files from a content delivery server; detect content encryption key rotation boundaries between periods of use of different content encryption keys in decrypting retrieved content; issue requests to a license server ahead of a key rotation boundary to retrieve a second content encryption key to be used after a content encryption key rotation boundary is reached; and apply the second key for content decryption after the key rotation boundary is reached. - View Dependent Claims (17, 18, 19, 20)
-
Specification