SYSTEMS AND METHODS TO TEMPORARILY GRANT ACCESS TO A DIGITAL GATEWAY

20230156254 · 2023-05-18

    Inventors

    Cpc classification

    International classification

    Abstract

    Systems and methods are provided for temporarily granting access to a digital gateway. One example method includes receiving a request for temporary access to the digital gateway. A temporary access token is generated at a server. The temporary access token is assigned to a user. Access to the digital gateway is granted via the temporary access token. The temporary access token is automatically expired after a pre-set period. Access to the digital gateway is revoked once the temporary access token has expired.

    Claims

    1.-30. (canceled)

    31. A method comprising: while a first computing device is logged into to a service of a content provider and is playing a content item from the content provider: receiving a request to access an un-played portion of the content item; in response to the receiving the request: generating a link that is based on a play position of the content item; detecting an interaction with the link at a second computing device; and in response to the detecting: granting temporary access to the service of the content provider to the second computing device; causing the content item to be played from the position identified by the link at the second computing device; and expiring the temporary access.

    32. The method of claim 31, wherein: an input to temporarily stop playback of the content item is received before the request to access the un-played portion of the content item is received; and the link is generated based on the temporary stop position of the content item.

    33. The method of claim 31, wherein the method further comprises transmitting the generated link from a server to the second computing device.

    34. The method of claim 31, wherein: generating the link further comprises generating a quick response code at the first computing device; and detecting the interaction further comprises scanning the quick response code with the second computing device.

    35. The method of claim 31, wherein the temporary access expires after the content item is accessed a pre-defined number of times.

    36. The method of claim 31, wherein granting temporary access to the service of the content provider further comprises verifying an identify of a user of the second computing device before granting temporary access to the service.

    37. The method of claim 31, wherein: the service of the content provider further comprises a plurality of chatrooms; granting access to the service of the content provider further comprises granting access to the plurality of chatrooms via the second computing device; and expiring the temporary access further comprises removing access to the plurality of chatrooms.

    38. The method of claim 36, further comprising: putting the first computing device and the second computing device in a first chatroom of the plurality of chatrooms; and synchronizing playback, of the content item, between the first computing device and the second computing device.

    39. The method of claim 31, wherein: the method further comprises: accessing a website associated with the service of the content provider at a third computing device; receiving a temporary password at the website, wherein the temporary password is separate from a password used to access the service of the content provider; and detecting an interaction with the link at a second computing device further comprises receiving user input associated with inputting the temporary password.

    40. The method of claim 31, wherein granting temporary access to the service of the content provider further comprises granting temporary access to a category of content items available via the service.

    41. A system comprising: input circuitry configured to: while a first computing device is logged into to a service of a content provider and is playing a content item from the content provider: receive a request to access an un-played portion of the content item; control circuitry configured to: in response to the receiving the request: generate a link that is based on a play position of the content item; detect an interaction with the link at a second computing device; and in response to the detecting: grant temporary access to the service of the content provider to the second computing device; cause the content item to be played from the position identified by the link at the second computing device; and expire the temporary access.

    42. The system of claim 41, wherein: the input control circuitry is further configured to receive an input to temporarily stop playback of the content item before the request to access the un-played portion of the content item is received; and the control circuitry is configured to generate the link by generating the link based on the temporary stop position of the content item.

    43. The system of claim 41, wherein the control circuitry is further configured to transmit the generated link from a server to the second computing device.

    44. The system of claim 41, wherein: the control circuitry is configured to generate the link by generating a quick response code at the first computing device; and the control circuitry is configured to detect the interaction by detecting the interaction via scanning the quick response code with the second computing device.

    45. The system of claim 41, wherein the control circuitry is configured to expire the temporary access by expiring the temporary access after the content item is accessed a pre-defined number of times.

    46. The system of claim 41, wherein the control circuitry is configured to grant temporary access to the service of the content provider by verifying an identify of a user of the second computing device before granting temporary access to the service.

    47. The system of claim 41, wherein: the service of the content provider further comprises a plurality of chatrooms; the control circuitry is further configured to grant access to the plurality of chatrooms via the second computing device; and the control circuitry is further configured to remove access to the plurality of chatrooms when expiring the temporary access.

    48. The system of claim 36, wherein the control circuitry is further configured to: put the first computing device and the second computing device in a first chatroom of the plurality of chatrooms; and synchronize playback, of the content item, between the first computing device and the second computing device.

    49. The system of claim 41, wherein: the control circuitry is further configured to: access a website associated with the service of the content provider at a third computing device; receive a temporary password at the web site, wherein the temporary password is separate from a password used to access the service of the content provider; and the control circuitry is configured to detect an interaction with the link at a second computing device by receiving user input associated with inputting the temporary password.

    50. The system of claim 41, wherein the control circuitry is configured to grant temporary access by granting temporary access to a category of content items available via the service.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0015] The above and other objects and advantages of the disclosure will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout and in which:

    [0016] FIG. 1 shows an exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure;

    [0017] FIG. 2A shows another exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure;

    [0018] FIG. 2B shows another exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure;

    [0019] FIG. 3 shows another exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure;

    [0020] FIG. 4 is a diagram representing a data flow for granting temporary access to an over-the-top content platform, in accordance with some embodiments of the disclosure;

    [0021] FIG. 5 is a block diagram representing components of a computing device and data flow therebetween for granting temporary access to an over-the-top content platform, in accordance with some embodiments of the disclosure; and

    [0022] FIG. 6 is a flowchart representing a process for granting temporary access to an over-the-top content platform, in accordance with some embodiments of the disclosure.

    DETAILED DESCRIPTION

    [0023] Systems and methods are described herein for temporarily granting access to an over-the-top content platform. As referred to herein, an over-the-top content platform is a service that enables users to access content via the internet. The content may be streamed live and/or streamed on demand to a computing device. On-demand content may also be downloaded to a computing device in response to a user request and/or according to a pre-set rule. Content includes audio, video and/or any other media content that may be delivered over the internet. Audio includes audio only content, such as songs. Video includes audiovisual content such as movies and/or television programs. Other media content includes e-books. The over-the-top content platform may be accessed via a website and/or an app running on a computing device.

    [0024] Generally, a token is a generated code that grants a computing device access to a specific resource. An example of such a token is a JSON web token. A JSON web token comprises a header, a payload and a signature. The header comprises metadata that may include the type of token and the hashing algorithm being used to sign the token. The payload includes the claims (data) that the token is encoding, for example the issuer of the token and the expiry date/time of the token. The signature is used to verify the token and may be a hash of the header, the payload and a secret. The JSON token may be in the format of three strings separated by “.”, for example, “A3jC9x.na8Ss1.POak65”. The token may be used, for example, in a URL, a POST request added as header and/or as a GET request added as an appended parameter.

    [0025] The disclosed methods and systems may be implemented on a computing device. As referred to herein, the computing device can be any device comprising a processor and memory, for example, a television, a Smart TV, a set-top box, an integrated receiver decoder (IRD) for handling satellite television, a digital storage device, a digital media receiver (DMR), a digital media adapter (DMA), a streaming media device, a DVD player, a DVD recorder, a connected DVD, a local media server, a BLU-RAY player, a BLU-RAY recorder, a personal computer (PC), a laptop computer, a tablet computer, a WebTV box, a personal computer television (PC/TV), a PC media server, a PC media center, a handheld computer, a stationary telephone, a personal digital assistant (PDA), a mobile telephone, a portable video player, a portable music player, a portable gaming machine, a smartphone, an augmented reality device, a mixed reality device, a virtual reality device, or any other television equipment, computing equipment, or wireless device, and/or combination of the same.

    [0026] The methods and/or any instructions for performing any of the embodiments discussed herein may be encoded on computer-readable media. Computer-readable media includes any media capable of storing data. The computer-readable media may be transitory, including, but not limited to, propagating electrical or electromagnetic signals, or may be non-transitory, including, but not limited to, volatile and non-volatile computer memory or storage devices such as a hard disk, floppy disk, USB drive, DVD, CD, media cards, register memory, processor caches, random access memory (RAM), etc.

    [0027] FIG. 1 shows an exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure. A user requests temporary access to an over-the-top content platform at a mobile device 100. The user may initiate the request by, for example, providing a code at a website of the over-the-top content platform. The request is transmitted, via a communications network 102, to a server 104. The communications network 102 may be a local network and/or the internet and may include wired and/or wireless components. At the server 104, a temporary access token is generated 106. The temporary access token is assigned to the mobile device 100. For example, the token may be sent, via the communications network 102, to the mobile device 100. Access to the over-the-top content platform is granted via the temporary access token. For example, the mobile device 100 may send, via the communications network 102, the temporary access token to the over-the-top content platform provider. The over-the-top content platform provider may verify the token and grant the mobile device 100 access to the over-the-top content platform for the period of time defined by the token. Once the period of time defined by the token has expired, the mobile device's access to the over-the-top platform may be revoked.

    [0028] FIG. 2A shows another exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure. An account holder initiates the request by selecting an option to enable temporary access to the over-the-top content platform at an app running on a first mobile device 208. The first mobile device 208 may transmit the request, for example, via Bluetooth, to a second mobile device 200. The request is received at the second mobile device 200 by an app running on the second mobile device. The request is transmitted from the second mobile device 200, via a communications network 202, to a server 204. Again, the communications network 202 may be a local network and/or the internet and may include wired and/or wireless components. At the server 204, a temporary access token is generated 206. The temporary access token is assigned to the second mobile device 200. For example, the token may be sent, via the communications network 202, to the second mobile device 200. Access to the over-the-top content platform is granted via the temporary access token. For example, the second mobile device 200 may send, via the communications network 202, the temporary access token to the over-the-top content platform provider. The over-the-top content platform provider may verify the token and grant the mobile device 200 access to the over-the-top content platform for the period of time defined by the token. Once the period of time defined by the token has expired, the mobile device's access to the over-the-top platform may be revoked.

    [0029] FIG. 2B shows another exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure. A user requests temporary access to an over-the-top content platform at a mobile device 200. The user initiates the request by capturing a QR code 212 via a camera 214 of the mobile device 200. The QR code may comprise an internet link and a code for requesting temporary access to the over-the-top content platform. The request is transmitted, via a communications network 202, to a server 204. At the server 204, a temporary access token is generated 206. The temporary access token is assigned to the mobile device 200. For example, the token may be sent, via the communications network 202, to the mobile device 200. Access to the over-the-top content platform is granted via the temporary access token. For example, the mobile device 200 may send, via the communications network 202, the temporary access token to the over-the-top content platform provider. The over-the-top content platform provider may verify the token and grant the mobile device 200 access to the over-the-top content platform for the period of time defined by the token. Once the period of time defined by the token has expired, the mobile device's access to the over-the-top platform may be revoked.

    [0030] FIG. 3 shows another exemplary environment in which temporary access to an over-the-top content platform is granted, in accordance with some embodiments of the disclosure. A user requests temporary access to an over-the-top content platform at a smart speaker 316. The user initiates the request by issuing a command 314 to the smart speaker 316. In this example, the command is “Give Alice temporary access to my video account.” The smart speaker looks up contact information about Alice. This contact information may be obtained, for example, at the smart speaker, at a device connected to the smart speaker, such as a smartphone connected via Bluetooth, and/or from a server remote to the smart speaker. The request and Alice's contact information are transmitted, via a communications network 302, to a server 304. Again, the communications network 302 may be a local network and/or the internet and may include wired and/or wireless components. At the server 304, a temporary access token is generated 306. The temporary access token is assigned to Alice's mobile device 300, utilizing Alice's contact information. For example, the token may be sent, via the communications network 302, to the mobile device 300. Access to the over-the-top content platform is granted via the temporary access token. For example, the mobile device 300 may send, via the communications network 302, the temporary access token to the over-the-top content platform provider. The over-the-top content platform provider may verify the token and grant the mobile device 300 access to the over-the-top content platform for the period of time defined by the token. Once the period of time defined by the token has expired, the mobile device's access to the over-the-top platform may be revoked.

    [0031] FIG. 4 is a diagram representing a data flow for granting temporary access to an over-the-top content platform, in accordance with some embodiments of the disclosure. At a client 400, such as a mobile device, an account owner 404 requests a token generation 408. The request includes the duration of temporary access for a temporary user 406 as well as an identifier for the temporary user 406. The request is sent from the client 400 to a web service of a server 402. The account owner 404 is validated 410. Following the validation of the account owner 404, a token request 412 is sent to a token generator of the server 402. At the token generator, a token is generated and encrypted 414. The token is sent 416 from the server 402 and is received 418 by the client 400. The token is shared 420 with the temporary user 406. The temporary user 406 uses the temporary token to log in 422 to the over-the-top content provider. The over-the-top content provider validates the token 424 and provides time-based access 426 to the temporary user 406.

    [0032] FIG. 5 is a block diagram representing components of a computing device and data flow therebetween for granting temporary access to an over-the-top content platform, in accordance with some embodiments of the disclosure. Computing device 500 (e.g., a mobile device 100, 200 as discussed in connection with FIGS. 1-2) comprises input circuitry 504, control circuitry 508 and an output module 518. Control circuitry 508 may be based on any suitable processing circuitry (not shown) and comprises control circuits and memory circuits, which may be disposed on a single integrated circuit or may be discrete components. As referred to herein, processing circuitry should be understood to mean circuitry based on one or more microprocessors, microcontrollers, digital signal processors, programmable logic devices, field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), etc., and may include a multi-core processor (e.g., dual-core, quad-core, hexa-core, or any suitable number of cores). In some embodiments, processing circuitry may be distributed across multiple separate processors or processing units, for example, multiple of the same type of processing units (e.g., two Intel Core i7 processors) or multiple different processors (e.g., an Intel Core i5 processor and an Intel Core i7 processor). Some control circuits may be implemented in hardware, firmware, or software.

    [0033] A user provides an input 502 that is received by the input circuitry 504. The input circuitry 504 is configured to receive a user input related to a computing device. For example, this may be via a touchscreen, keyboard, mouse, microphone and/or infra-red controller of the computing device 500. The input circuitry 504 transmits 506 the user input to the control circuitry 508.

    [0034] The control circuitry 508 comprises a transceiver 510, a digital gateway access module 514 and an output module 518. The user input is transmitted to the transceiver 510. At the transceiver 510, a request for temporary access a digital gateway (such as an over-the-top content platform), based on the user input 502, is transmitted via a communications network to a server. The communications network may comprise wired and/or wireless means, for example, the internet and/or a Wi-Fi network. At the server a temporary access token is generated and is transmitted back to the computing device, via the transceiver 510. The temporary access token is transmitted 512 to the digital gateway access module 514. The digital access module 514 transmits the token to the over-the-top content platform. Upon verification, the over-the-top content platform grants temporary access to the computing device 500. This is transmitted 516 to the output module 518. The output module 518 displays content 520 from the digital gateway to the user via a display of the computing device.

    [0035] FIG. 6 is a flowchart representing a process for granting temporary access to an over-the-top content platform, in accordance with some embodiments of the disclosure. Process 600 may be implemented on any aforementioned computing device 100, 200. In addition, one or more actions of the process 600 may be incorporated into or combined with one or more actions of any other process or embodiments described herein.

    [0036] At 602, a request for temporary access to an over-the-top content platform is received. At 604, a temporary access token is generated at a server. At 606, the temporary access token is assigned to a user. At 608, access to the over-the-top content platform is granted via the temporary access token. At 610, the temporary access token automatically expires after a pre-set period. At 612, access to the over-the-top content platform is revoked once the temporary access token has expired.

    [0037] The processes described above are intended to be illustrative and not limiting. One skilled in the art would appreciate that the steps of the processes discussed herein may be omitted, modified, combined, and/or rearranged, and any additional steps may be performed without departing from the scope of the disclosure. More generally, the above disclosure is meant to be exemplary and not limiting. Furthermore, it should be noted that the features and limitations described in any one embodiment may be applied to any other embodiment herein, and flowcharts or examples relating to one embodiment may be combined with any other embodiment in a suitable manner, done in different orders, or done in parallel. In addition, the systems and methods described herein may be performed in real time. It should also be noted that the systems and/or methods described above may be applied to, or used in accordance with, other systems and/or methods.