Patent classifications
H04N21/6334
Method for acquiring access rights to conditional access content
A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.
METHOD AND SYSTEM FOR SECURE OVER-THE-TOP LIVE VIDEO DELIVERY
A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content encryption key has expired, a second content encryption key is provided to the content packaging engine for encryption of a second portion of a video stream. The method further provides for notification of client devices of imminent key changes, as well as support for secure retrieval of new keys by client devices. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method.
SECURE ENROLMENT OF SECURITY DEVICE FOR COMMUNICATION WITH SECURITY SERVER
Provided is novel technology for secure security data transmission and more particularly for registering network-enabled security devices such as IP cameras to a security server over a public network such as to a cloud-based security service. An enrolment server is provided that is logged into using a computing device to request and receive an activation code for the security device. The activation code is then provided to the security device, e.g. directly by the computing device. The Security device authenticates itself based on the activation code and in one example provides a public key that will be used to verify its registration. Data transmissions by the device are secured in part on the basis of its registration.
DEVICE LOCATION DETERMINATION
In overview, the disclosed methods, devices, and systems enable the location of the first device to be verified. In particular, second location verification data is generated using a current location of the second device is provided to a first device by a second device which can be matched with first location verification data received by the first device from a server, the first location verification data is generated using a stored location of the first device. If the first and second location verification data match, the location of the first device is considered to have been verified.
SECURE PROVISIONING, BY A CLIENT DEVICE, CRYPTOGRAPHIC KEYS FOR EXPLOITING SERVICES PROVIDED BY AN OPERATOR
A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.
Database layer caching for video communications
An apparatus includes a network interface and a processor. The network interface receives event data that identifies a content ID and a message authentication code. The content ID identifies a content within a webcast or a virtual event. The processor generates a content hash, at least in part based on the content ID. The network interface transmits a content request and receives the content. The content request identifies the content hash and the message authentication code.
Systems and methods for providing multi-part persistent content
The systems and methods discussed herein enable providing multi-part persistent content that may maintain a state across multiple presentations, including via different applications. In one such implementation, a first portion of a content item, such as a first level of a video game, may be provided to a client device, and the client device may interact with the game. An identification of a state of the game or completion of the first portion may be provided to a content server, which may store an association of the device or user with the execution state. At a subsequent time, a second portion of the content item, such as a second level of the game, may be provided to the client device, based on the stored association. This can prevent the repetitive transmission of the same content, thereby reducing use of computational and bandwidth resources.
Systems and methods for providing multi-part persistent content
The systems and methods discussed herein enable providing multi-part persistent content that may maintain a state across multiple presentations, including via different applications. In one such implementation, a first portion of a content item, such as a first level of a video game, may be provided to a client device, and the client device may interact with the game. An identification of a state of the game or completion of the first portion may be provided to a content server, which may store an association of the device or user with the execution state. At a subsequent time, a second portion of the content item, such as a second level of the game, may be provided to the client device, based on the stored association. This can prevent the repetitive transmission of the same content, thereby reducing use of computational and bandwidth resources.
Method and system for secure over-the-top live video delivery
A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content encryption key has expired, a second content encryption key is provided to the content packaging engine for encryption of a second portion of a video stream. The method further provides for notification of client devices of imminent key changes, as well as support for secure retrieval of new keys by client devices. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method.
Systems and methods for connecting a public device to a private device with pre-installed content management applications
Systems and methods for providing access to media content by connecting, to a public device, a private device that has an installed application associated with the media content. A media guidance application may receive a communication from a private device, running a private interface application, requesting to access content using the public device. In response, the media guidance application may retrieve, at the public device, a public interface application associated with the private interface application, from a content provider of the content. The private interface application may be configured to control a graphical user interface of the public interface application. Accordingly, the user may be able to access content via the public device when the private device is within a predetermined proximity to the public device.