Adoption of mobile devices such as smartphones, tablets and so forth is growing exponentially, revolutionizing usage scenarios for media consumption both in corporate and end user segments. One such usage is multiscreen TV or TV everywhere, where a user can watch video content on personal devices such as a tablet computer or smartphone. The user demand for such services has been growing dramatically. However, platform security mechanisms that can support such usages are not readily available, thus restricting the availability of content.
Embodiments provide mechanisms to allow a user to carry content subscriptions such as TV subscriptions on multiple devices to enable the user to access content subject to such subscriptions at a variety of locations, and on different devices securely. For example, the user can watch TV content at any location, either within the home or away from home when traveling.
Embodiments also provide security mechanisms for platforms such as a set-top box (STB), cable box, cable card, digital video recorder (DVR) or other content gateway. As used herein, the terms “set-top box” or “STB” are used to generically refer to any type of end user content gateway that provides access to protected digital content to be rendered into audio and/or video. In this way, a multichannel video programming distributor (MVPD) vendor can enable time bounded device authentication for sharing content from the platform. In some usage models, the provider can charge additional fees for secure sharing of protected content for viewing purposes.
Accordingly, a user can consume media content on a trusted device or share with family members from a set-top/cable box according to a time bounded authentication mechanism. For example, if a user wants to temporarily watch the content available via a set-top/cable box located at the user's home on a remote device such as a tablet, then the user can add the tablet to a trusted device list for a specified period of time (e.g., hours, days or weeks). Note that in various implementations, the length of the time bounded permission and/or the number of permitted devices can be based on different payment based options. In turn, a security mechanism on a platform in accordance with an embodiment of the present invention allows the user to access the content based on security and fee-based policies.
In another scenario if a user is traveling and wants to watch his subscription content on a temporary basis via a hotel TV or other device, the user can add the device as a trusted device if security requirements are met. Accordingly, the user can watch subscribed media content on the trusted device based on time bounded security policies.
Although the scope of the present invention is not limited in this regard, embodiments can provide a firmware/software security mechanism on a variety of platforms including smartphones, tablets, ultrabooks, and so forth. In addition, a backend server such as of a MVPD can perform user identity and device authentication, in addition to digital rights management (DRM) mechanisms such as Digital Living Network Alliance (DLNA) and digital transmission content protection-Internet protocol (DTCP-IP) protocols. When authentication is confirmed, in that the user is identified and the device that is to access the content meets the security requirements of a given service provider, content can be accessed. For example, real time content sharing on a mobile device from a set-top box can occur in a manner in which the identified/authenticated device can share the content from the set-top/cable box. Although described herein as being shared for a STB or other content gateway of the user, understand that the scope of the present invention is not limited in this regard, and the sharing can be via, e.g., a cloud-based repository such as a content service of the MVPD vendor.
In various embodiments, time bound trust can be established between devices with a pay-for-use mode. For example, a user can use a trusted device to view content for four hours with payment of an appropriate fee to a MVPD vendor. Note that the user can add remote devices such as a TV in a hotel/friend's place as a trusted device for viewing content temporarily if security and location requirements are met. Accordingly, platform solutions based on firmware, secure device and authentication, and DRM via, e.g., a mobile platform, can be realized. In this way, a user can dynamically add personal devices as trusted devices for viewing protected content received from, e.g., a cable provider, if security requirements are met. In addition, a user can dynamically add a guest device as a trusted device based on time bounded authentication and device identification if security and location requirements are met.
Referring now to
As seen in
Still referring to mobile device 110, CPU 115 can be coupled to a chipset hardware 120, e.g., via a secure path. Chipset hardware 120 can further include a security engine 125 which can be a collection of hardware, firmware and/or software to perform security operations in accordance with an embodiment of the present invention. In the embodiment shown in
In one embodiment, IAM module 127 allows a user to request to add a device as a trusted device to a subscription such that the user can consume content on that device without any other user authentications. In one embodiment, the device identity and authentication data can be stored in a secure storage 128 managed by a trusted execution environment (of security engine 125) independent of a host operating system (OS) and CPU 115.
In one embodiment, SPM module 129 can be set by an authorized user on mobile device 110 during a device trust provisioning process such that only specific rated content can be displayed on this device. The policy can also be set such that content can only be displayed in specific geographic locations. These policies can be managed, in one embodiment, by a MVPD service provider. Examples of these policies include specified location(s) for sharing content, quality of the content (e.g., destination of the content, allowed play mode and so forth), additional security mechanisms for user/device authentications as indicated, such as monthly changes to passwords, e.g., a specific one-time programming (OTP) password to ensure the device is used by the authorized persons. In one embodiment, an OTP password can be sent either through e-mail or a cloud-based access web user interface mechanism. Other policies can include ratings allowed, adding devices on which content can be consumed, removing devices from which content can be consumed, additional authentication mechanisms, content viewing timing and so forth.
Still referring to
To this end, as seen in the embodiment of
In one embodiment, cloud authentication/authorization service 158 and cloud policy service 155 can be used by users to add a remote device over the cloud either from a TV that has Internet access, e.g., via a wired or wireless (e.g., WiFi™) interface, or by using a mobile device. The user can also manage multiple device policies on the cloud and can remove/add or change content viewing policies such as rating, adding new devices, removing new devices, additional authentication mechanisms and content viewing timings and so forth.
To enable subscription content to be provided to mobile device 110 assuming that authentication/authorization is successful, server(s) 150 can communicate with STB 170 to cause content stored in or associated with STB 170 (e.g., via a network attached storage (NAS)) to be provided, e.g., on a streaming basis to mobile device 110. As seen in the embodiment of
In one embodiment, a user can add a new device by downloading a content viewing application on the device. To this end, the device can be provisioned with a new device identity based on available subscriptions of the user. In some embodiments, there may be additional fees to add a device based on a MVPD business model. During this initialization process, a unique identifier (ID) can be created based on a user subscription profile and stored in a secure storage of the mobile device. The user's authentication can be securely tied to a device login and secure boot process by relying on an OS and/or firmware and an application integrity check at boot time. The content accessed via this device can be protected with DRM support in firmware and/or software. The level of DRM support to be provided to allow content sharing, as well as content access policies to provide a given level of access, such as viewing versus storing, can depend on the security available on the platform and MVPD business model.
Referring now to
As further shown in
Still referring to
As seen, control next passes to block 240 where based on the subscription profile as communicated to a content supervisor, a unique time bound identifier can be created to enable sharing of subscription information. As discussed above, access can be provided in a time bounded manner and accordingly, the time bound ID may provide for information with regard to an identity of the device on which the authorization is granted as well as a duration of the time bounded authorization. In one embodiment, the information contained in the time bound ID is a unique identifier (to identify this authorized content sharing), expiry time of the ID, authorization to store content locally on a user's device/shared device with a specified period of time, or so forth. Via this time bound authorization, a user can download certain content to be stored locally on the device and can allow playback even when the network is not available (e.g., in-flight mode or when camping in a remote wilderness). In some embodiments, this information can include a simple time duration, e.g., four hours, eight hours, 24 hours or so forth. In other embodiments, the time bounded information can further provide specific viewing hours. For example, for a certain amount of time after new content is released, e.g., a broadcast television program, a new movie or so forth, different manners of time bounding can be performed. Further, different policies such as different fee level for accessing different types of content or at different times can be implemented. Note that block 240 can be performed in the MVPD server, in various embodiments. Note that storage of the time stamp may be an implementation choice. In one embodiment, it could be stored locally or in the cloud/remote, but note that time stamping is done in the secure execution environment. If maintained in the cloud, the mobile device can synchronize with the cloud periodically on the time stamp information. Depending on the network availability, or device limitation, cloud or local time stamping can be done.
Still referring to
Assuming that the user confirms the transaction control passes to block 270 where a time stamp can be generated and the transaction can begin by streaming of the content securely to the mobile device. In the embodiment of
Although shown with this particular implementation in the embodiment of
Referring now to
As seen in
Control next passes to block 340 where based on the subscription profile, a unique time bound identifier can be created to enable sharing of subscription content. As discussed above, access can be provided in a time bounded manner and accordingly, the time bound ID may provide for information with regard to an identity of the device on which the authorization is granted as well as a duration of the time bounded authorization. Note that block 340 can be performed in the MVPD server, in various embodiments.
Still referring to
In various embodiments, the mobile device can further be used to access a program guide to identify content desired for storage into the STB, and to further program the STB to access and maintain the content. To provide for such programming, the mobile device can include, either in the same or separate user application, a control panel to enable recording of content on the set-top box. In this way the content can be stored in the set-top box responsive to a request to store the content communicated from the mobile device to the authentication service of the content provider (or directly to the STB).
Although shown with this particular implementation the embodiment of
As discussed above, it is possible for a user to also gain access to subscription content via a temporary device where the user is located. As used herein, the term “temporary device” is used to refer to a content output and/or rendering device such as a television, tablet computer or other device to which a user has a time-bounded access such as a hotel room TV. To this end, this temporary device, which can be an Internet-connected TV, can itself seek authorization to receive the subscription content. At the least, the connected device can include identification information to enable receipt of the subscription content from a network such as the Internet responsive to an authorization for the temporary device performed independently of the device itself.
Referring now to
Using a network-connected temporary device such as present in the
Referring now to
As seen, control next passes to block 440 where based on the subscription profile, a unique time bound identifier can be created to enable sharing of subscription information. Of course, this assumes that both the user and the temporary device are authenticated in that the user has a valid subscription profile and furthermore, that the security configuration information indicates that suitable secure mechanisms are present in the temporary device to protect received content per the content provider's policies. This time bound identifier thus may provide for access in a time-bounded manner and accordingly, the time bound ID may provide for information with regard to an identity of the temporary device on which the authorization is granted as well as a duration of the time bounded authorization.
Still referring to
Embodiments thus allow time bounded content sharing in a secure manner to one or more devices, e.g., mobile devices remote to a primary platform, e.g., a set-top box. A cloud-based configuration capability can be used to add/remove devices dynamically, enable/disable specific rated contents on specific devices, and so forth. By providing a hardware-based secure authentication, content execution transfer across devices is limited.
Real time content sharing on an authenticated mobile device from a set-top box is controlled such that only having a given DRM mechanism such as DLNA and DTCP-IP protection is not sufficient. Instead the device is authenticated to meet security requirements, e.g., of a service provider, such that only trusted/paid devices can share the content from a set-top/cable box or other content source. Access by such trusted devices can be time bounded so that the device can only view content for a predetermined duration, and may further be subject to a fee or business based mechanism of a MVPD vendor.
Note that the subscription profile information stored on the mobile device can be updated and also maintained on other devices. For example, to maintain coherency of the subscription profile information across various compute platforms, the user subscription profile information and updates to it can be stored at a cloud-based location such as at a cloud-based location of the content provider. In this way, the cloud-based storage of the subscription profile information can remain the central point for coherency such that when the user seeks to access the subscription profile information with a remote device, an indication of update availability can be provided so that the user can access the updated user profile information from the cloud-based storage.
Embodiments can be implemented in many different systems. For purposes of illustration, a security engine within the context of a smartphone, namely an Android™-based smartphone is shown in
An application framework 520 executes below application layer 510. Application framework 520 may include various managers to manage functionality of the smartphone. In turn, various services, agents, native libraries and a runtime can execute below application framework 520. In the embodiment shown in
Embodiments thus can be used in many different environments. Referring now to
To enable communications to be transmitted and received, various circuitry may be coupled between baseband processor 710 and an antenna 780. Specifically, a radio frequency (RF) transceiver 770 and a wireless local area network (WLAN) transceiver 775 may be present. In general, RF transceiver 770 may be used to receive and transmit wireless data and calls according to a given wireless communication protocol such as 3G or 4G wireless communication protocol such as in accordance with a code division multiple access (CDMA), global system for mobile communication (GSM), long term evolution (LTE) or other protocol. Other wireless communications such as receipt or transmission of radio signals, e.g., AM/FM, or global positioning satellite (GPS) signals may also be provided. In addition, via WLAN transceiver 775, local wireless signals, such as according to a Bluetooth™ standard or an IEEE 802.11 standard such as IEEE 802.11a/b/g/n can also be realized. Although shown at this high level in the embodiment of
In one embodiment, servers of a content provider at a cloud-based location can perform authentications, policy management and content providing. To this end, the servers can include multiple independent servers, each to perform one or more services such as described above with regard to
In one such embodiment, a first server can be configured to perform authentication and authorization operations responsive to identification information received from a mobile device of a subscriber, where this identification information is received with a request to receive content subject to a content subscription at a device remote from a principal residence associated with the content subscription.
In turn, a second server can be coupled to the first server to perform policy operations responsive to a communication from the mobile device. Such policy operations can include access and update to policy information associated with the content subscription, including association of alternate content devices with the content subscription. Another server can be coupled to the first and second servers to provide the content subject to the content subscription to the remote device responsive to authorization by the first server. This content provision can be based at least in part on the policy information and the identification information. More specifically, the policy information for the subscription indicates that the remote device is an alternate content device associated with the subscription. As an example, the remote device can be the mobile device of the subscriber, or it can be another device, such as a device to which the subscriber has temporary access (and assuming that this device has an acceptable level of security).
Embodiments may be implemented in code and may be stored on at least one non-transitory storage medium having stored thereon instructions which can be used to program a system to perform the instructions. The storage medium may include, but is not limited to, any type of disk including floppy disks, optical disks, solid state drives (SSDs), compact disk read-only memories (CD-ROMs), compact disk rewritables (CD-RWs), and magneto-optical disks, semiconductor devices such as read-only memories (ROMs), random access memories (RAMs) such as dynamic random access memories (DRAMs), static random access memories (SRAMs), erasable programmable read-only memories (EPROMs), flash memories, electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, or any other type of media suitable for storing electronic instructions.
While the present invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of this present invention.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US11/62712 | 11/30/2011 | WO | 00 | 9/6/2013 |