Claims
- 1. A system for providing a data stream for a predetermined number of viewings, comprising:
a client component that is arranged to communicate user verification information, request a data stream, and to receive the data stream, wherein the received data stream is encrypted; and a streaming data component arranged to verify the user verification information and to provide the encrypted data stream to the client component, wherein the encrypted data stream is flow controlled to maintain a substantially full buffer in the verified client component.
- 2. The system of claim 1, wherein the predetermined number of viewings is a single viewing.
- 3. The system of claim 1, wherein the streaming data component comprises:
a transaction server arranged to verify the user verification information for the requested data stream; and a streaming data server arranged to negotiate encryption keys with the client component for use in encrypting the requested data stream and controlling a rate of a flow of the encrypted data stream to the client component.
- 4. The system of claim 1, wherein the client component is further arranged to provide a network statistic on a rate that a flow of the encrypted data stream is being received.
- 5. A computer-readable medium having computer-executable instructions for performing actions that provide a data stream to a client for a predetermined number of viewings, the actions comprising:
receiving user verification information with a request for the data stream from the client; determining the validity of the user verification information; and when the user verification information is valid, performing actions, including:
negotiating an encryption key with the client; encrypting the data stream as it is streamed to the client, wherein the data stream is encrypted with the negotiated encryption key; and controlling a rate of a flow of the encrypted data stream to the client.
- 6. The computer-readable medium of claim 5, wherein the predetermined number of viewings is a single viewing.
- 7. The computer-readable medium of claim 5, wherein controlling the rate of the flow further comprises transmitting the encrypted data stream to the client at substantially the same rate as the encrypted data stream is received by the client.
- 8. The computer-readable medium of claim 5, wherein controlling the rate of the flow further comprises monitoring a network statistic such that a client buffer is maintained substantially full.
- 9. A method for transacting requests for a data stream for single viewing, comprising:
receiving a request for the data stream; receiving user information associated with the request for the data stream; determining when the user information is associated with a valid user account; and when the user information is valid, performing actions, including:
debiting the valid user account by an amount associated with the requested data stream; and generating a token associating the requested data stream to the user information, such that the data stream is accessible.
- 10. The method of claim 9, further comprising:
receiving a user selected time limit for accessing the data stream; and associating the user selected time limit with the generated token such that the access to the data stream is denied upon expiration of the time limit.
- 11. The method of claim 9, further comprising:
generating a new user account when a user account associated with the received user information is unavailable.
- 12. A method for receiving a data stream, comprising:
communicating a request for the data stream; communicating user information and a token associated with the requested data stream, wherein the user information and token are validated for the requested data stream; and receiving the data stream at a rate of a flow that maintains a client buffer substantially full.
- 13. The method of claim 12, wherein the token includes user permissions for the requested data stream.
- 14. The method of claim 12, wherein the user information includes user account information.
- 15. The method of claim 12, wherein the token includes a user selected time limit for accessing the data stream, wherein access to the data stream is denied upon expiration of the user selected time limit.
- 16. The method of claim 12, wherein the received data stream is encrypted.
- 17. The method of claim 16, wherein the encrypted data stream is encrypted using Triple-DES encryption.
- 18. The method of claim 16, wherein the encrypted data stream is encrypted for a single viewing.
- 19. A computer-readable medium encoded with a data structure for storing data stream verification information for use in an encrypting data stream system for a predetermined number of viewings, the data structure comprising:
a first verification data field associated with a location of a stored data stream; a second verification data field associated with a user permission for the stored data stream; and a third verification data field associated with an expiration time of the user permissions associated with the second verification data field.
- 20. The data structure of claim 19, where the predetermined number of viewings is a single viewing.
- 21. The data structure of claim 19, wherein the location of the data stream is identified by a universal resource identifier.
- 22. The data structure of claim 19, wherein the expiration time is user selectable for the data stream.
RELATED APPLICATIONS
[0001] This is a continuation of U.S. patent application Ser. No. 09/436,916, entitled “Process and Streaming Server for Encrypting a Data Stream,” filed Nov. 9, 1999, under 35 U.S.C. §120 and 37 C.F.R. §1.53(b), which is incorporated herein by reference.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09436916 |
Nov 1999 |
US |
Child |
10109963 |
Mar 2002 |
US |