Automatic token based secure content streaming method and apparatus

ABSTRACT

Disclosed are systems and methods for improving interactions with and between computers in secure content access, distribution and download and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide systems and methods for automatic token-based secure content streaming.

FIELD OF THE DISCLOSURE

The present disclosure relates to secure content accessing, and moreparticularly to providing token-based secure content access.

BACKGROUND

The world wide web has become a popular mechanism for receiving contentfor playback at a user device. The content can comprise audio and/orvideo content, and the user device can be any of a number of userdevices, including a personal computer, tablet, mobile telephone, etc.,connected to the web. In some cases, a user may use multiple devices toplay the same content. For example, the user may use a televisionconnected to the web (e.g., a smart television) as well as a handhelddevice connected to the web to receive the content at both devices. Insome cases, a user may be using a mobile device to play content whilephysically moving from one geographic location to another. As the userchanges geographic locations, the network address (e.g., the InternetProtocol or IP address) can change. In addition, some user devices mayhave more than one network interface card, each of which has its ownnetwork address.

SUMMARY

The present disclosure provides novel systems and methods for automatictoken-based secure content access, such as and without limitation accessto streaming content. In some embodiments, a media player, or otherapplication executing on a user's device, transmits a request includingan identifier of the content in response to a user's selection of thecontent's link at the user's device; the request also includes a networkaddress, e.g., an IP address, of the user's device. The request isreceived by a web server, e.g., a content management system (CMS)server, which provides a content master playlist comprising information(e.g., universal resource locators (URLs)) corresponding to the contentitem. A URL can identify a web server, e.g., a content delivery network(CDN) server, or CDN URL, to which the media player can make a contentdownload request. By way of some non-limiting examples, a CDN URL mightbe used to request a media playlist, a media segment, or the like.

In one scenario, content can be encoded to create a number of variantsof the content at different bit rates, resolutions, and qualities. Inaddition, an encoder can segment content into a number of sections, ormedia segments, and each media segment encoded at a certain bit rate,resolution and quality level is stored in a media file. A content masterplaylist file can be created to contain a list of the URLs to variantmedia playlists (each of which contains a list of URLs pointing to thevariant's media segments (or media segment files)). In this scenario,the response provided by the CMS server to the media player's contentaccess request can comprise a content master playlist.

A content master playlist comprising an identifier (e.g., a URL or otherinformation) for each of a number of variant media playlists can be usedto request a variant media playlist (e.g., request a file correspondingto a variant and containing the media segment URLs for the variant and aspecified playback order). A media player retrieves a media playlist URLfor a desired variant from the content master playlist and requests thevariant media playlist (e.g., from a CDN server) using the URL(corresponding to the variant) from the content master playlist. Themedia player uses the media segment URLs in a received variant mediaplaylist to request a number of media segments (e.g., from a CDN serveridentified by each media segment URL). By way of a non-limiting example,a variant can be determined by the media player, or by another devicesuch as the CMS server, CDN server, etc., based on resourcecapabilities, such as and without limitation network bandwidth (orcapacity), user device resource limitations (e.g., memory, processorspeed, graphic processing capabilities, etc.).

Streaming content over an electronic communications network thatincludes the Internet provides considerable flexibility for users toplayback content; however, there are a number of issues that arise withthe use of the Internet to stream content. One such issue involves thepotential for multiple different IP addresses being used by the mediaplayer (or other client application or component) to communicate withthe server(s) to retrieve content. For example, using a mobile userdevice with a media player and connected to the network, a user canplayback content as the user is on the move. As the user is moving, theIP address of the user device can change as the user device moves fromone cellular tower to another, shifts between a wireless network and acellular network, etc. As yet another non-limiting example, a userdevice, such as a multi-home device, may have more than one networkinterface card (NIC), each of which has its own IP address that can beused by the user device. As yet a further non-limiting example, IPaddresses can differ by destination as a result of proxies, networkaddress translations (NATs) and enterprises, or the like.

Another issue that may arise with content access over the Internetinvolves geographic restrictions, or geo-restrictions, that may beplaced on access to the content; and, attempts by users to circumventthe geo-restrictions using an unauthorized publication of the URL(s)corresponding to a content master playlist, a variant media playlist,and/or a media segment. By way of one example, a content provider,content owner, etc. may wish to restrict access to streaming content,such as and without limitation content of a live sporting (or other)event, so that viewership of the live event is restricted to viewersthat are outside a geographic area in which the live event is takingplace, and viewers that are local to (e.g., within) the geographic areaare denied access to the live sporting event's streaming content.

A user's geographic location can be determined using the IP address sentby the user device in the request for content and a mapping of the IPaddress to a geographic location. By way of a non-limiting example, acontent provider might use the network address of the user's user deviceto determine the geographic location of the user, and then use thedetermined geographic location to determine whether or not to restrict,or block, access to certain content, such as a live broadcast of asporting event, based on the user's geographic location. A commoninternet standard implementation is for a content provider to use amapping (which can be provided by an Internet Service Provider (ISP) orthird-party service) of IP addresses and zip codes to identify theuser's zip code, and to block the user's access to the content if thatIP address maps to a restricted ZIP code.

As discussed herein, a way to circumvent a geo-restriction is to obtain(e.g., via an unauthorized publication) the URL(s) corresponding to acontent master playlist, a variant media playlist, and/or a mediasegment. Each user device that uses an unauthorized publication of a URLdoes so using a different IP address. Such unauthorized attempts toaccess content should be identified and blocked. Normal changes in IPaddress (for reasons such as discussed above) should be identified andauthorized so that an authorized user can continue to experience contentdespite a change in IP address. However, since it is difficult, if notimpossible, to determine whether a IP address change is associated withan unauthorized access request or is associated with an authorizedaccess request, a typical approach is to deny access in response to anyIP address change even in a case that it is associated with anauthorized access request.

Restricting access (or validation of access) to content based on asingle IP address is too rigid and can cause frustrating interruptionsin content streaming for a legitimate user while experiencing content asthe user device undergoes changes in its IP address (such as an IPaddress change caused by movement of a mobile user device, e.g.,movement across cellular towers and/or movement between cellular, wiredand wireless networks, or an IP address change caused by a user devicethat supports multi-homing (with multiple IP addresses), etc.). Such anIP-address validation demands that a user experience content using asingle IP address during a session, which may not be feasible. By way ofone non-limiting example, a CMS may host a website using a domain, e.g.,sports.yahoo.com, and a CDN may be hosted on a separate domain, e.g.,atlas.cdn.yimg.com, e.g., to isolate CMS and CDN resources forperformance reasons. In other words, use of a single IP address during asession might be infeasible; however, allowing multiple IP addresses canresult in unauthorized distribution of URLs such that multiple userdevices (with different IP addresses) are able to experience contentwithout authorization.

Access restriction based on dynamic short-lived Hypertext TransportProtocol (HTTP) session cookies alone is problematic given that manyclient applications (e.g., browser, media player, etc. applications)block cookies (or might allow cookies from the same domain) by default,and many user devices do not even support cookies. Furthermore, HTTPsession cookies cannot prevent a user with an HTTP session cookie fromsharing or publishing master/media playlist URL(s) with other users thatdo not have an HTTP session cookie, so that the other users (e.g.,viewers in blackout areas) can use the URL(s) to gain unauthorizedaccess to the content. Moreover, cookies are expensive to generate and alarge scale use would typically require a separate domain for CDNs forlatency and/or security reasons.

The automatic token-based secure content streaming described hereinaddresses these and other problems and enables authorized access tocontent (e.g., streaming content) using a number of different IPaddresses per secure token (e.g., a secure token corresponding to aviewing request), while minimizing unauthorized attempts to accesscontent. This presents improvements to the secure distribution ofcontent, and enables access to content by an authorized user via thesecure token and over an electronic communications network, such as theInternet, despite changes in the IP address of the user device beingused by the authorized user.

According to some embodiments, the disclosed systems and methods firstreceive a request to access content, e.g., streaming content, from auser device. In some embodiments, the content access request can bevalidated to determine whether or not to authorize the request to accessthe content. As one example, validation might be performed to determinewhether any geographic restrictions exist (a geo-restriction validation)to block access to the content. Embodiments of the present disclosurecan use a secure token for token-based validation for secure contentaccess, distribution and download to users, such as and withoutlimitation anonymous users. In some embodiments of the presentdisclosure, token-based validation can be used in combination with othertypes of validation, such as and without limitation geo-based validation(such as the geo-restrictions discussed herein), user-based validation(e.g., validation based on user identification information, such as andwithout limitation a username and password), or the like.

After a determination is made to authorize access to the content (viageographic, user, etc. validation(s)), a secure token is generated andassociated with the IP address used by the user device in making thecontent access request. The IP address associated with the contentaccess request can be the IP address received with the content accessrequest. The secure token can comprise an encrypted value generated frominformation, such as and without limitation the IP address received withthe content access request alone or in combination with a short-livedexpiration time. The secure token can be generated by encrypting theinformation using an encryption algorithm such as MD5. The secure tokenis provided to the user device (having the IP address) from which thecontent access request is received, in response to the received contentaccess request. In one example, the secure token is transmitted with acontent master playlist comprising information for retrieving any of anumber of variant media playlist. In some embodiments, the response caninclude a URL comprising one or more secure token parameters. As anotheralternative, the secure token can be transmitted via a cookie (e.g., anHTTP session cookie) to the user device from which the content accessrequest is received (e.g., in a case that cookies are supported by theuser device and are not blocked).

The disclosed systems and methods then receive a subsequent request,e.g., a content download request) including the secure token transmittedto the user device in response to the content access request. Thecontent download request is a request to transmit content (e.g., avariant media playlist, a number of media segments, etc.) to the userdevice. The request can be received by a CDN server corresponding to aURL contained in a content master playlist transmitted to the userdevice in response to the content access request. The IP address of theuser device from which the content download request is received istransmitted with the content download request. Before transmitting therequested content to the user device, the secure token received with thecontent download request is validated. Token-based validation (whichincludes secure token validation) can comprise a check to ensure thatthe secure token is not expired (is still live). By way of anon-limiting example and as discussed herein, the received secure tokencan have an associated short-lived expiration time which can beretrieved from the received secure token, and the expiration time can bechecked against a time associated with the content download request toensure that the secure token is not expired (is still live).

The disclosed systems and methods, if a determination is made that thesecure token is still live, then validate the IP address received in thesecure token with the content download request to make a determinationwhether it matches the IP address received with the content accessrequest (e.g., the IP address used to generate the secure token). By wayof a non-limiting example, the secure token received with the contentdownload request can be decrypted by the CDN server to retrieve the IPaddress associated with the content access request from the securetoken. As yet another non-limiting example, the received secure tokencan be used to retrieve the IP address in a stored mapping, e.g., amapping associating the secure token with the IP address received withthe content access request. As yet another example, the secure token canbe retrieved from an HTTP session cookie.

The disclosed systems and methods, if the IP address received with thecontent access request does not match the IP address received with thecontent download request, initialize a count (e.g., a mismatch counter)to an initial value (e.g., set to 1 to memorialize the first mismatch),if there is no previous mismatch; or, if there is a previous mismatch,increment an existing mismatch counter (e.g., by 1 to memorialize thecurrent mismatch). A determination is made whether or not the number ofmismatches (using the mismatch counter) exceeds a threshold number ofmismatches. If the mismatch counter does not exceed the thresholdnumber, the requested content (e.g., a variant media playlist, a sectionof content, etc.) is transmitted to the user device in response to thereceived content download request. If the number of mismatches exceedsthe threshold number, the content download request is denied. In such acase, the user of the user device can make another content accessrequest. The determination whether or not the mismatch counter exceedsthe threshold number of mismatches is selectively performed based on theoutcome of the IP-address matching determination.

If the IP address from the secure token (e.g., the IP address associatedwith the content access request) matches the IP address received withthe content download request, the secure token is successfullyvalidated. In accordance with at least one embodiment, the IP addresscomparison operation is conditionally performed based on the outcome ofa determination that the secure token is not expired (e.g., still live).Thus, in accordance with at least one embodiment, the secure tokenvalidation can include both a IP address validation and a temporalvalidation.

It will be recognized from the disclosure herein that embodiments of theinstant disclosure provide improvements to a number of technology areas,for example those related to systems and processes that handle orprocess content distribution and delivery to users over the internet,such as but not limited to, local and/or web-based applications, TVwidgets, set-top boxes, or other types of media rendering or platforms.The disclosed systems and methods can effectuate increased flexibilityin the ways that users can access and download content while stillenforcing restrictions on access to content and minimizing attempts atunauthorized access, thereby maximizing user and content owner andcontent provider satisfaction, as the disclosed systems and methods,inter alia validate content access requests received from a user deviceand accommodate IP address changes that can occur with the user device.Users are provided with a fully automated content streaming experiencethrough the disclosed systems' and methods' token-based secure contentstreaming. For example, the disclosed token-based content accessvalidation avoids a denial of access due to changes in IP addressingthat can occur for a number legitimates reasons, as the disclosedsystems and methods can automatically validate a content access requestusing one or more tokens and a counter identifying a number of IPaddressing changes to ensure that the number of IP addressing changesdoes not exceed a threshold number, thereby limiting unauthorized accessto content.

In accordance with one or more embodiments, a method is disclosed whichincludes receiving, at a computing device and over an electroniccommunications network, a content download request from a user device,the content download request being a request for a download inconnection a content item and having an associated secure token and anassociated first network address of the user device, the associatedsecure token being generated in connection with a previous request madein connection with the content item and having an associated secondnetwork address; making and determination, via the computing device andusing the secure token received from the user device with the contentdownload request, whether or not to permit the requested download, thedetermination comprising a first determination whether the first andsecond network addresses are a match and a second determination that isselectively performed based on an outcome of the first determination,the second determination determining whether a number of network addressmismatches associated with the secure token exceeds a mismatchthreshold; and transmitting, via the computing device and over theelectronic communications network to the user device, a response to thecontent download request, the response comprising content requested bythe content download request in a case that the first and second networkaddresses match and in a case that the first and second networkaddresses mismatch but the number of mismatches does not exceed themismatch threshold.

In accordance with one or more embodiments, a non-transitorycomputer-readable storage medium is provided, the non-transitorycomputer-readable storage medium tangibly storing thereon, or havingtangibly encoded thereon, computer readable instructions that whenexecuted cause at least one processor to perform a method for automatictoken-based secure content streaming.

In accordance with one or more embodiments, a system is provided thatcomprises one or more computing devices configured to providefunctionality in accordance with such embodiments. In accordance withone or more embodiments, functionality is embodied in steps of a methodperformed by at least one computing device. In accordance with one ormore embodiments, program code (or program logic) executed by aprocessor(s) of a computing device to implement functionality inaccordance with one or more such embodiments is embodied in, by and/oron a non-transitory computer-readable medium.

DRAWINGS

The above-mentioned features and objects of the present disclosure willbecome more apparent with reference to the following description takenin conjunction with the accompanying drawings wherein like referencenumerals denote like elements and in which:

FIG. 1 is a schematic diagram illustrating an example of a networkwithin which the systems and methods disclosed herein could beimplemented according to some embodiments of the present disclosure;

FIG. 2 depicts is a schematic diagram illustrating an example of clientdevice in accordance with some embodiments of the present disclosure;

FIG. 3 is a schematic block diagram illustrating components of anexemplary system in accordance with embodiments of the presentdisclosure;

FIG. 4 is a flowchart illustrating steps performed in accordance withsome embodiments of the present disclosure;

FIG. 5 is a diagram of an exemplary example of a non-limiting embodimentin accordance with some embodiments of the present disclosure;

FIG. 6 is a flowchart illustrating steps performed in accordance withsome embodiments of the present disclosure;

FIG. 7 is an exemplary example of a non-limiting embodiment inaccordance with some embodiments of the present disclosure; and

FIG. 8 is a block diagram illustrating the architecture of an exemplaryhardware device in accordance with one or more embodiments of thepresent disclosure.

DETAILED DESCRIPTION

Subject matter will now be described more fully hereinafter withreference to the accompanying drawings, which form a part hereof, andwhich show, by way of illustration, specific example embodiments.Subject matter may, however, be embodied in a variety of different formsand, therefore, covered or claimed subject matter is intended to beconstrued as not being limited to any example embodiments set forthherein; example embodiments are provided merely to be illustrative.Likewise, a reasonably broad scope for claimed or covered subject matteris intended. Among other things, for example, subject matter may beembodied as methods, devices, components, or systems. Accordingly,embodiments may, for example, take the form of hardware, software,firmware or any combination thereof (other than software per se). Thefollowing detailed description is, therefore, not intended to be takenin a limiting sense.

Throughout the specification and claims, terms may have nuanced meaningssuggested or implied in context beyond an explicitly stated meaning.Likewise, the phrase “in one embodiment” as used herein does notnecessarily refer to the same embodiment and the phrase “in anotherembodiment” as used herein does not necessarily refer to a differentembodiment. It is intended, for example, that claimed subject matterinclude combinations of example embodiments in whole or in part.

In general, terminology may be understood at least in part from usage incontext. For example, terms, such as “and”, “or”, or “and/or,” as usedherein may include a variety of meanings that may depend at least inpart upon the context in which such terms are used. Typically, “or” ifused to associate a list, such as A, B or C, is intended to mean A, B,and C, here used in the inclusive sense, as well as A, B or C, here usedin the exclusive sense. In addition, the term “one or more” as usedherein, depending at least in part upon context, may be used to describeany feature, structure, or characteristic in a singular sense or may beused to describe combinations of features, structures or characteristicsin a plural sense. Similarly, terms, such as “a,” “an,” or “the,” again,may be understood to convey a singular usage or to convey a pluralusage, depending at least in part upon context. In addition, the term“based on” may be understood as not necessarily intended to convey anexclusive set of factors and may, instead, allow for existence ofadditional factors not necessarily expressly described, again, dependingat least in part on context.

The present disclosure is described below with reference to blockdiagrams and operational illustrations of methods and devices. It isunderstood that each block of the block diagrams or operationalillustrations, and combinations of blocks in the block diagrams oroperational illustrations, can be implemented by means of analog ordigital hardware and computer program instructions. These computerprogram instructions can be provided to a processor of a general purposecomputer to alter its function as detailed herein, a special purposecomputer, ASIC, or other programmable data processing apparatus, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, implement thefunctions/acts specified in the block diagrams or operational block orblocks. In some alternate implementations, the functions/acts noted inthe blocks can occur out of the order noted in the operationalillustrations. For example, two blocks shown in succession can in factbe executed substantially concurrently or the blocks can sometimes beexecuted in the reverse order, depending upon the functionality/actsinvolved.

These computer program instructions can be provided to a processor of: ageneral purpose computer to alter its function to a special purpose; aspecial purpose computer; ASIC; or other programmable digital dataprocessing apparatus, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, implement the functions/acts specified in the block diagramsor operational block or blocks, thereby transforming their functionalityin accordance with embodiments herein.

For the purposes of this disclosure a computer readable medium (orcomputer-readable storage medium/media) stores computer data, which datacan include computer program code (or computer-executable instructions)that is executable by a computer, in machine readable form. By way ofexample, and not limitation, a computer readable medium may comprisecomputer readable storage media, for tangible or fixed storage of data,or communication media for transient interpretation of code-containingsignals. Computer readable storage media, as used herein, refers tophysical or tangible storage (as opposed to signals) and includeswithout limitation volatile and non-volatile, removable andnon-removable media implemented in any method or technology for thetangible storage of information such as computer-readable instructions,data structures, program modules or other data. Computer readablestorage media includes, but is not limited to, RAM, ROM, EPROM, EEPROM,flash memory or other solid state memory technology, CD-ROM, DVD, orother optical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other physical ormaterial medium which can be used to tangibly store the desiredinformation or data or instructions and which can be accessed by acomputer or processor.

For the purposes of this disclosure the term “server” should beunderstood to refer to a service point which provides processing,database, and communication facilities. By way of example, and notlimitation, the term “server” can refer to a single, physical processorwith associated communications and data storage and database facilities,or it can refer to a networked or clustered complex of processors andassociated network and storage devices, as well as operating softwareand one or more database systems and application software that supportthe services provided by the server. Servers may vary widely inconfiguration or capabilities, but generally a server may include one ormore central processing units and memory. A server may also include oneor more mass storage devices, one or more power supplies, one or morewired or wireless network interfaces, one or more input/outputinterfaces, or one or more operating systems, such as Windows Server,Mac OS X, Unix, Linux, FreeBSD, or the like.

For the purposes of this disclosure a “network” should be understood torefer to a network that may couple devices so that communications may beexchanged, such as between a server and a client device or other typesof devices, including between wireless devices coupled via a wirelessnetwork, for example. A network may also include mass storage, such asnetwork attached storage (NAS), a storage area network (SAN), or otherforms of computer or machine readable media, for example. A network mayinclude the Internet, one or more local area networks (LANs), one ormore wide area networks (WANs), wire-line type connections, wirelesstype connections, cellular or any combination thereof. Likewise,sub-networks, which may employ differing architectures or may becompliant or compatible with differing protocols, may interoperatewithin a larger network. Various types of devices may, for example, bemade available to provide an interoperable capability for differingarchitectures or protocols. As one illustrative example, a router mayprovide a link between otherwise separate and independent LANs.

A communication link or channel may include, for example, analogtelephone lines, such as a twisted wire pair, a coaxial cable, full orfractional digital lines including T1, T2, T3, or T4 type lines,Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines(DSLs), wireless links including satellite links, or other communicationlinks or channels, such as may be known to those skilled in the art.Furthermore, a computing device or other related electronic devices maybe remotely coupled to a network, such as via a wired or wireless lineor link, for example.

For purposes of this disclosure, a “wireless network” should beunderstood to couple client devices with a network. A wireless networkmay employ stand-alone ad-hoc networks, mesh networks, Wireless LAN(WLAN) networks, cellular networks, or the like. A wireless network mayfurther include a system of terminals, gateways, routers, or the likecoupled by wireless radio links, or the like, which may move freely,randomly or organize themselves arbitrarily, such that network topologymay change, at times even rapidly.

A wireless network may further employ a plurality of network accesstechnologies, including Wi-Fi, Long Term Evolution (LTE), WLAN, WirelessRouter (WR) mesh, or 2nd, 3rd, or 4th generation (2G, 3G, or 4G)cellular technology, or the like. Network access technologies may enablewide area coverage for devices, such as client devices with varyingdegrees of mobility, for example.

For example, a network may enable RF or wireless type communication viaone or more network access technologies, such as Global System forMobile communication (GSM), Universal Mobile Telecommunications System(UMTS), General Packet Radio Services (GPRS), Enhanced Data GSMEnvironment (EDGE), 3GPP Long Term Evolution (LTE), LTE Advanced,Wideband Code Division Multiple Access (WCDMA), Bluetooth, 802.11b/g/n,or the like. A wireless network may include virtually any type ofwireless communication mechanism by which signals may be communicatedbetween devices, such as a client device or a computing device, betweenor within a network, or the like.

A computing device may be capable of sending or receiving signals, suchas via a wired or wireless network, or may be capable of processing orstoring signals, such as in memory as physical memory states, and may,therefore, operate as a server. Thus, devices capable of operating as aserver may include, as examples, dedicated rack-mounted servers, desktopcomputers, laptop computers, set top boxes, integrated devices combiningvarious features, such as two or more features of the foregoing devices,or the like. Servers may vary widely in configuration or capabilities,but generally a server may include one or more central processing unitsand memory. A server may also include one or more mass storage devices,one or more power supplies, one or more wired or wireless networkinterfaces, one or more input/output interfaces, or one or moreoperating systems, such as Windows Server, Mac OS X, Unix, Linux,FreeBSD, or the like.

For purposes of this disclosure, a client (or consumer or user) devicemay include a computing device capable of sending or receiving signals,such as via a wired or a wireless network. A client device may, forexample, include a desktop computer or a portable device, such as acellular telephone, a smart phone, a display pager, a radio frequency(RF) device, an infrared (IR) device an Near Field Communication (NFC)device, a Personal Digital Assistant (PDA), a handheld computer, atablet computer, a phablet, a laptop computer, a set top box, a wearablecomputer, smart watch, an integrated or distributed device combiningvarious features, such as features of the forgoing devices, or the like.

A client device may vary in terms of capabilities or features. Claimedsubject matter is intended to cover a wide range of potentialvariations. For example, a simple smart phone, phablet or tablet mayinclude a numeric keypad or a display of limited functionality, such asa monochrome liquid crystal display (LCD) for displaying text. Incontrast, however, as another example, a web-enabled client device mayinclude a high resolution screen, one or more physical or virtualkeyboards, mass storage, one or more accelerometers, one or moregyroscopes, global positioning system (GPS) or otherlocation-identifying type capability, or a display with a high degree offunctionality, such as a touch-sensitive color 2D or 3D display, forexample.

A client device may include or may execute a variety of operatingsystems, including a personal computer operating system, such as aWindows, iOS or Linux, or a mobile operating system, such as iOS,Android, or Windows Mobile, or the like.

A client device may include or may execute a variety of possibleapplications, such as a client software application enablingcommunication with other devices, such as communicating one or moremessages, such as via email, for example Yahoo!® Mail, short messageservice (SMS), or multimedia message service (MMS), for example Yahoo!Messenger®, including via a network, such as a social network,including, for example, Tumblr®, Facebook®, LinkedIn®, Twitter®,Flickr®, or Google+®, Instagram™, to provide only a few possibleexamples. A client device may also include or execute an application tocommunicate content, such as, for example, textual content, multimediacontent, or the like. A client device may also include or execute anapplication to perform a variety of possible tasks, such as browsing,searching, playing or displaying various forms of content, includinglocally stored or streamed video, or games (such as fantasy sportsleagues). The foregoing is provided to illustrate that claimed subjectmatter is intended to include a wide range of possible features orcapabilities.

The detailed description provided herein is not intended as an extensiveor detailed discussion of known concepts, and as such, details that areknown generally to those of ordinary skill in the relevant art may havebeen omitted or may be handled in summary fashion.

The principles described herein may be embodied in many different forms.By way of background, the Internet, and/or other electroniccommunications networks, have been used to transmit content, such as andwithout limitation streaming audio, video, multimedia, etc. content, todevices, such as and without limitation end user devices including butnot limited to smartphones, tablets, notebook computing devices, desktopcomputing devices or the like. Recently, streaming live events, such asand without limitation sporting events, concerts or the like has becomemore prevalent.

With the widespread popularity of the Internet and end user devices forstreaming content such as live event content, there is currently a hugeneed for a content digital rights management approach to accommodateunique issues associated with their use. The use of the Internet forstreaming content typically involves the use, by end user devices, of IPaddresses, and changes in IP addresses as content is being streamed toan end user device poses issues related to secure content access tocontent and enforcement of restrictions placed on access to content.

Existing systems are incapable of identifying when to allow (orconversely when to deny) content requests when multiple different IPaddresses are being used in making the content requests by a userdevice. One option is to deny access whenever multiple different IPaddresses are used by a user device; however, such an approach resultsin an authorized user being denied access to the content which leads tofrustrations and dissatisfaction with the system by the user. Anotheroption is to grant access regardless of the IP address being used,however, such an approach would allow unauthorized access to thecontent.

As such, the instant disclosure provides a novel solution addressing theimmediate demand for an automated system, application and/or platformthat uses a number of tokens for secure content streaming. The presentdisclosure provides novel systems and methods for automaticallygenerating a secure token upon validation of an initial request toaccess content, which secure token is used to validate subsequentrequests to access content that include the secure token. According tosome embodiments, the disclosed systems and methods generate the securetoken which is associated with the IP address of the user device fromwhich the initial content access request is received, and transmits thesecure token to the user device. Thereafter, the user device transmitsthe secure token (along with a current IP address of the user device)with any subsequent request for the content made to the contentmanagement system, e.g., a subsequent request made to a CDN server todownload a playlist, media segment, etc. The secure token is used tomatch the initial IP address (i.e., the IP address used with the initialcontent access request) with the IP address being used with the currentrequest. If the initial and current IP address match, then the requestis granted. If the initial and current IP addresses do not match, thendisclosed systems and methods use a mismatch counter to determinewhether the number of different IP addresses being used with the securetoken to access the content exceeds a threshold number of mismatches. Ifthe count of the number of different IP address exceeds the thresholdnumber, access is denied; otherwise, access is granted. In so doing,present systems and methods provide flexibility to accommodate IPaddress changes while minimizing unauthorized (or abusive) attempts toaccess the content.

Examples of benefits derived from the disclosed systems and methodsare: 1) the disclosed systems and methods provide a technologicallybased mechanism for automatically determining the validity of a contentaccess request even in a case that multiple different IP addresses arebeing used; and (2) the proposed systems and methods provide atechnologically based mechanism for automatically identifyingunauthorized (or abusive) attempts to access content when multipledifferent IP addresses are being used. Thus, the disclosed systems andmethods, for example, are flexible enough to permit authorized use ofmultiple different IP addresses in accessing content and to prohibitunauthorized use of multiple different IP addresses to access content.

The disclosed systems and methods can be implemented for any type ofcontent item, including, but not limited to, video, audio, images, text,and/or any other type of multimedia content. While the discussion hereinwill focus on video content items, it should not be construed aslimiting, as any type of content or multimedia content, whether known orto be known, can be utilized without departing from the scope of theinstant disclosure.

In accordance with at least one embodiment, streaming protocols such asand without limitation HTTP Live Streaming (HLS) and Dynamic AdaptiveStreaming over HTTP (DASH), can be used for transmitting streamingcontent. Embodiments of the present disclosure allow multiple differentIP addresses per viewing session (e.g., per secure token). Embodimentsof the present disclosure can be used for content, including streamingcontent such as and without limitation streaming of content of a liveevent. In accordance with one or more embodiments, a threshold number(e.g., 3) IP addresses are permitted per a given time interval (e.g., 30seconds), where the time interval can be identified by the expirationinformation associated with the secure token. It should be apparent thatany threshold number and time interval can be used with embodiments ofthe present disclosure. In accordance with at least one embodiment, thenumber of distinct user IP addresses that are allowed to simultaneously(within the time interval) access a content item per secure token istracked and used to determine whether or not to permit access to thecontent.

Certain embodiments will now be described in greater detail withreference to the figures. In general, with reference to FIG. 1, a system100 in accordance with an embodiment of the present disclosure is shown.FIG. 1 shows components of a general environment in which the systemsand methods discussed herein may be practiced. Not all the componentsmay be required to practice the disclosure, and variations in thearrangement and type of the components may be made without departingfrom the spirit or scope of the disclosure. As shown, system 100 of FIG.1 includes local area networks (“LANs”)/wide area networks(“WANs”)—network 105, wireless network 110, mobile devices (clientdevices) 102-104 and client device 101. FIG. 1 additionally includes avariety of servers, such as content server 106, application (or “App”)server 108, search server 120 and advertising (“ad”) server 130.

One embodiment of mobile devices 102-104 is described in more detailbelow. Generally, however, mobile devices 102-104 may include virtuallyany portable computing device capable of receiving and sending a messageover a network, such as network 105, wireless network 110, or the like.Mobile devices 102-104 may also be described generally as client devicesthat are configured to be portable. Thus, mobile devices 102-104 mayinclude virtually any portable computing device capable of connecting toanother computing device and receiving information. Such devices includemulti-touch and portable devices such as, cellular telephones, smartphones, display pagers, radio frequency (RF) devices, infrared (IR)devices, Personal Digital Assistants (PDAs), handheld computers, laptopcomputers, wearable computers, smart watch, tablet computers, phablets,integrated devices combining one or more of the preceding devices, andthe like. As such, mobile devices 102-104 typically range widely interms of capabilities and features. For example, a cell phone may have anumeric keypad and a few lines of monochrome LCD display on which onlytext may be displayed. In another example, a web-enabled mobile devicemay have a touch sensitive screen, a stylus, and an HD display in whichboth text and graphics may be displayed.

A web-enabled mobile device may include a browser application that isconfigured to receive and to send web pages, web-based messages, and thelike. The browser application may be configured to receive and displaygraphics, text, multimedia, and the like, employing virtually any webbased language, including a wireless application protocol messages(WAP), and the like. In one embodiment, the browser application isenabled to employ Handheld Device Markup Language (HDML), WirelessMarkup Language (WML), WMLScript, JavaScript, Standard GeneralizedMarkup Language (SMGL), HyperText Markup Language (HTML), eXtensibleMarkup Language (XML), and the like, to display and send a message.

Mobile devices 102-104 also may include at least one client applicationthat is configured to receive content from another computing device. Theclient application may include a capability to provide and receivetextual content, graphical content, audio content, and the like. Theclient application may further provide information that identifiesitself, including a type, capability, name, and the like. In oneembodiment, mobile devices 102-104 may uniquely identify themselvesthrough any of a variety of mechanisms, including a phone number, MobileIdentification Number (MIN), an electronic serial number (ESN), or othermobile device identifier.

In some embodiments, mobile devices 102-104 may also communicate withnon-mobile client devices, such as client device 101, or the like. Inone embodiment, such communications may include sending and/or receivingmessages, searching for, viewing and/or sharing photographs, audioclips, video clips, or any of a variety of other forms ofcommunications. Client device 101 may include virtually any computingdevice capable of communicating over a network to send and receiveinformation. The set of such devices may include devices that typicallyconnect using a wired or wireless communications medium such as personalcomputers, multiprocessor systems, microprocessor-based or programmableconsumer electronics, network PCs, or the like. Thus, client device 101may also have differing capabilities for displaying navigable views ofinformation.

Client devices 101-104 computing device may be capable of sending orreceiving signals, such as via a wired or wireless network, or may becapable of processing or storing signals, such as in memory as physicalmemory states, and may, therefore, operate as a server. Thus, devicescapable of operating as a server may include, as examples, dedicatedrack-mounted servers, desktop computers, laptop computers, set topboxes, integrated devices combining various features, such as two ormore features of the foregoing devices, or the like.

Wireless network 110 is configured to couple mobile devices 102-104 andits components with network 105. Wireless network 110 may include any ofa variety of wireless sub-networks that may further overlay stand-alonead-hoc networks, and the like, to provide an infrastructure-orientedconnection for mobile devices 102-104. Such sub-networks may includemesh networks, Wireless LAN (WLAN) networks, cellular networks, and thelike.

Network 105 is configured to couple content server 106, applicationserver 108, or the like, with other computing devices, including, clientdevice 101, and through wireless network 110 to mobile devices 102-104.Network 105 is enabled to employ any form of computer readable media forcommunicating information from one electronic device to another. Also,network 105 can include the Internet in addition to local area networks(LANs), wide area networks (WANs), direct connections, such as through auniversal serial bus (USB) port, other forms of computer-readable media,or any combination thereof. On an interconnected set of LANs, includingthose based on differing architectures and protocols, a router acts as alink between LANs, enabling messages to be sent from one to another,and/or other computing devices.

Within the communications networks utilized or understood to beapplicable to the present disclosure, such networks will employ variousprotocols that are used for communication over the network. Signalpackets communicated via a network, such as a network of participatingdigital communication networks, may be compatible with or compliant withone or more protocols. Signaling formats or protocols employed mayinclude, for example, TCP/IP, UDP, QUIC (Quick UDP Internet Connection),DECnet, NetBEUI, IPX, APPLETALK™, or the like. Versions of the InternetProtocol (IP) may include IPv4 or IPv6. The Internet refers to adecentralized global network of networks. The Internet includes localarea networks (LANs), wide area networks (WANs), wireless networks, orlong haul public networks that, for example, allow signal packets to becommunicated between LANs. Signal packets may be communicated betweennodes of a network, such as, for example, to one or more sites employinga local network address. A signal packet may, for example, becommunicated over the Internet from a user site via an access nodecoupled to the Internet. Likewise, a signal packet may be forwarded vianetwork nodes to a target site coupled to the network via a networkaccess node, for example. A signal packet communicated via the Internetmay, for example, be routed via a path of gateways, servers, etc. thatmay route the signal packet in accordance with a target address andavailability of a network path to the target address.

According to some embodiments, the present disclosure may also beutilized within or accessible to an electronic social networking site. Asocial network refers generally to an electronic network of individuals,such as acquaintances, friends, family, colleagues, or co-workers, thatare coupled via a communications network or via a variety ofsub-networks. Potentially, additional relationships may subsequently beformed as a result of social interaction via the communications networkor sub-networks. In some embodiments, multi-modal communications mayoccur between members of the social network. Individuals within one ormore social networks may interact or communication with other members ofa social network via a variety of devices. Multi-modal communicationtechnologies refers to a set of technologies that permit interoperablecommunication across multiple devices or platforms, such as cell phones,smart phones, tablet computing devices, phablets, personal computers,televisions, set-top boxes, SMS/MMS, email, instant messenger clients,forums, social networking sites, or the like.

In some embodiments, the disclosed networks 110 and/or 105 may comprisea content distribution network(s). A “content delivery network” or“content distribution network” (CDN) generally refers to a distributedcontent delivery system that comprises a collection of computers orcomputing devices linked by a network or networks. A CDN may employsoftware, systems, protocols or techniques to facilitate variousservices, such as storage, caching, communication of content, orstreaming media or applications. A CDN may also enable an entity tooperate or manage another's site infrastructure, in whole or in part.

The content server 106 may include a device that includes aconfiguration to provide content via a network to another device. Acontent server 106 may, for example, host a site or service, such asstreaming media site/service (e.g., YouTube®), an email platform orsocial networking site, or a personal user site (such as a blog, vlog,online dating site, and the like). A content server 106 may also host avariety of other sites, including, but not limited to business sites,educational sites, dictionary sites, encyclopedia sites, wikis,financial sites, government sites, and the like. Devices that mayoperate as content server 106 include personal computers desktopcomputers, multiprocessor systems, microprocessor-based or programmableconsumer electronics, network PCs, servers, and the like.

Content server 106 can further provide a variety of services thatinclude, but are not limited to, streaming and/or downloading mediaservices, search services, email services, photo services, web services,social networking services, news services, third-party services, audioservices, video services, instant messaging (IM) services, SMS services,MMS services, FTP services, voice over IP (VOIP) services, or the like.Such services, for example a video application and/or video platform,can be provided via the application server 108, whereby a user is ableto utilize such service upon the user being authenticated, verified oridentified by the service. Examples of content may include images, text,audio, video, or the like, which may be processed in the form ofphysical signals, such as electrical signals, for example, or may bestored in memory, as physical states, for example.

An ad server 130 comprises a server that stores online advertisementsfor presentation to users. “Ad serving” refers to methods used to placeonline advertisements on websites, in applications, or other placeswhere users are more likely to see them, such as during an onlinesession or during computing platform use, for example. Variousmonetization techniques or models may be used in connection withsponsored advertising, including advertising associated with user. Suchsponsored advertising includes monetization techniques includingsponsored search advertising, non-sponsored search advertising,guaranteed and non-guaranteed delivery advertising, adnetworks/exchanges, ad targeting, ad serving and ad analytics. Suchsystems can incorporate near instantaneous auctions of ad placementopportunities during web page creation, (in some cases in less than 500milliseconds) with higher quality ad placement opportunities resultingin higher revenues per ad. That is advertisers will pay higheradvertising rates when they believe their ads are being placed in oralong with highly relevant content that is being presented to users.Reductions in the time needed to quantify a high quality ad placementoffers ad platforms competitive advantages. Thus higher speeds and morerelevant context detection improve these technological fields.

For example, a process of buying or selling online advertisements mayinvolve a number of different entities, including advertisers,publishers, agencies, networks, or developers. To simplify this process,organization systems called “ad exchanges” may associate advertisers orpublishers, such as via a platform to facilitate buying or selling ofonline advertisement inventory from multiple ad networks. “Ad networks”refers to aggregation of ad space supply from publishers, such as forprovision en masse to advertisers. For web portals like Yahoo!®,advertisements may be displayed on web pages or in apps resulting from auser-defined search based at least in part upon one or more searchterms. Advertising may be beneficial to users, advertisers or webportals if displayed advertisements are relevant to interests of one ormore users. Thus, a variety of techniques have been developed to inferuser interest, user intent or to subsequently target relevantadvertising to users. One approach to presenting targeted advertisementsincludes employing demographic characteristics (e.g., age, income, sex,occupation, etc.) for predicting user behavior, such as by group.Advertisements may be presented to users in a targeted audience based atleast in part upon predicted user behavior(s).

Another approach includes profile-type ad targeting. In this approach,user profiles specific to a user may be generated to model userbehavior, for example, by tracking a user's path through a web site ornetwork of sites, and compiling a profile based at least in part onpages or advertisements ultimately delivered. A correlation may beidentified, such as for user purchases, for example. An identifiedcorrelation may be used to target potential purchasers by targetingcontent or advertisements to particular users. During presentation ofadvertisements, a presentation system may collect descriptive contentabout types of advertisements presented to users. A broad range ofdescriptive content may be gathered, including content specific to anadvertising presentation system. Advertising analytics gathered may betransmitted to locations remote to an advertising presentation systemfor storage or for further evaluation. Where advertising analyticstransmittal is not immediately available, gathered advertising analyticsmay be stored by an advertising presentation system until transmittal ofthose advertising analytics becomes available.

Servers 106, 108, 120 and 130 may be capable of sending or receivingsignals, such as via a wired or wireless network, or may be capable ofprocessing or storing signals, such as in memory as physical memorystates. Devices capable of operating as a server may include, asexamples, dedicated rack-mounted servers, desktop computers, laptopcomputers, set top boxes, integrated devices combining various features,such as two or more features of the foregoing devices, or the like.Servers may vary widely in configuration or capabilities, but generally,a server may include one or more central processing units and memory. Aserver may also include one or more mass storage devices, one or morepower supplies, one or more wired or wireless network interfaces, one ormore input/output interfaces, or one or more operating systems, such asWindows Server, Mac OS X, Unix, Linux, FreeBSD, or the like.

In some embodiments, users are able to access services provided byservers 106, 108, 120 and/or 130. This may include in a non-limitingexample, authentication servers, search servers, email servers, socialnetworking services servers, SMS servers, IM servers, MMS servers,exchange servers, photo-sharing services servers, and travel servicesservers, via the network 105 using their various devices 101-104. Insome embodiments, applications, such as a streaming video application(e.g., YouTube®, Netflix®, Hulu®, iTunes®, Amazon Prime®, HBO Go®, andthe like), blog, photo storage/sharing application or social networkingapplication (e.g., Flickr®, Tumblr®, and the like), can be hosted by theapplication server 108 (or content server 106, search server 120 and thelike). Thus, the application server 108 can store various types ofapplications and application related information including applicationdata and user profile information (e.g., identifying and behavioralinformation associated with a user). It should also be understood thatcontent server 106 can also store various types of data related to thecontent and services provided by content server 106 in an associatedcontent database 107, as discussed in more detail below. Embodimentsexist where the network 105 is also coupled with/connected to a TrustedSearch Server (TSS) which can be utilized to render content inaccordance with the embodiments discussed herein. Embodiments existwhere the TSS functionality can be embodied within servers 106, 108, 120and/or 130.

Moreover, although FIG. 1 illustrates servers 106, 108, 120 and 130 assingle computing devices, respectively, the disclosure is not solimited. For example, one or more functions of servers 106, 108, 120and/or 130 may be distributed across one or more distinct computingdevices. Moreover, in one embodiment, servers 106, 108, 120 and/or 130may be integrated into a single computing device, without departing fromthe scope of the present disclosure.

FIG. 2 is a schematic diagram illustrating a client device showing anexample embodiment of a client device that may be used within thepresent disclosure. Client device 200 may include many more or lesscomponents than those shown in FIG. 2. However, the components shown aresufficient to disclose an illustrative embodiment for implementing thepresent disclosure. Client device 200 may represent, for example, clientdevices discussed above in relation to FIG. 1.

As shown in the figure, Client device 200 includes a processing unit(CPU) 222 in communication with a mass memory 230 via a bus 224. Clientdevice 200 also includes a power supply 226, one or more networkinterfaces 250, an audio interface 252, a display 254, a keypad 256, anilluminator 258, an input/output interface 260, a haptic interface 262,an optional global positioning systems (GPS) receiver 264 and acamera(s) or other optical, thermal or electromagnetic sensors 266.Device 200 can include one camera/sensor 266, or a plurality ofcameras/sensors 266, as understood by those of skill in the art. Thepositioning of the camera(s)/sensor(s) 266 on device 200 can change perdevice 200 model, per device 200 capabilities, and the like, or somecombination thereof.

Power supply 226 provides power to Client device 200. A rechargeable ornon-rechargeable battery may be used to provide power. The power mayalso be provided by an external power source, such as an AC adapter or apowered docking cradle that supplements and/or recharges a battery.

Client device 200 may optionally communicate with a base station (notshown), or directly with another computing device. Network interface 250includes circuitry for coupling Client device 200 to one or morenetworks, and is constructed for use with one or more communicationprotocols and technologies as discussed above. Network interface 250 issometimes known as a transceiver, transceiving device, or networkinterface card (NIC).

Audio interface 252 is arranged to produce and receive audio signalssuch as the sound of a human voice. For example, audio interface 252 maybe coupled to a speaker and microphone (not shown) to enabletelecommunication with others and/or generate an audio acknowledgementfor some action. Display 254 may be a liquid crystal display (LCD), gasplasma, light emitting diode (LED), or any other type of display usedwith a computing device. Display 254 may also include a touch sensitivescreen arranged to receive input from an object such as a stylus or adigit from a human hand.

Keypad 256 may comprise any input device arranged to receive input froma user. For example, keypad 256 may include a push button numeric dial,or a keyboard. Keypad 256 may also include command buttons that areassociated with selecting and sending images. Illuminator 258 mayprovide a status indication and/or provide light. Illuminator 258 mayremain active for specific periods of time or in response to events. Forexample, when illuminator 258 is active, it may backlight the buttons onkeypad 256 and stay on while the client device is powered. Also,illuminator 258 may backlight these buttons in various patterns whenparticular actions are performed, such as dialing another client device.Illuminator 258 may also cause light sources positioned within atransparent or translucent case of the client device to illuminate inresponse to actions.

Client device 200 also comprises input/output interface 260 forcommunicating with external devices, such as a headset, or other inputor output devices not shown in FIG. 2. Input/output interface 260 canutilize one or more communication technologies, such as USB, infrared,Bluetooth™, or the like. Haptic interface 262 is arranged to providetactile feedback to a user of the client device. For example, the hapticinterface may be employed to vibrate client device 200 in a particularway when the Client device 200 receives a communication from anotheruser.

Optional GPS transceiver 264 can determine the physical coordinates ofClient device 200 on the surface of the Earth, which typically outputs alocation as latitude and longitude values. GPS transceiver 264 can alsoemploy other geo-positioning mechanisms, including, but not limited to,triangulation, assisted GPS (AGPS), E-OTD, CI, SAI, ETA, BSS or thelike, to further determine the physical location of Client device 200 onthe surface of the Earth. It is understood that under differentconditions, GPS transceiver 264 can determine a physical location withinmillimeters for Client device 200; and in other cases, the determinedphysical location may be less precise, such as within a meter orsignificantly greater distances. In one embodiment, however, Clientdevice may through other components, provide other information that maybe employed to determine a physical location of the device, includingfor example, a MAC address, Internet Protocol (IP) address, or the like.

Mass memory 230 includes a RAM 232, a ROM 234, and other storage means.Mass memory 230 illustrates another example of computer storage mediafor storage of information such as computer readable instructions, datastructures, program modules or other data. Mass memory 230 stores abasic input/output system (“BIOS”) 240 for controlling low-leveloperation of Client device 200. The mass memory also stores an operatingsystem 241 for controlling the operation of Client device 200. It willbe appreciated that this component may include a general purposeoperating system such as a version of UNIX, or LINUX™, or a specializedclient communication operating system such as Windows Client™, or theSymbian® operating system. The operating system may include, orinterface with a Java virtual machine module that enables control ofhardware components and/or operating system operations via Javaapplication programs.

Memory 230 further includes one or more data stores, which can beutilized by Client device 200 to store, among other things, applications242 and/or other data. For example, data stores may be employed to storeinformation that describes various capabilities of Client device 200.The information may then be provided to another device based on any of avariety of events, including being sent as part of a header during acommunication, sent upon request, or the like. At least a portion of thecapability information may also be stored on a disk drive or otherstorage medium (not shown) within Client device 200.

Applications 242 may include computer executable instructions which,when executed by Client device 200, transmit, receive, and/or otherwiseprocess audio, video, images, and enable telecommunication with a serverand/or another user of another client device. Other examples ofapplication programs or “apps” in some embodiments include browsers,calendars, contact managers, task managers, transcoders, photomanagement, database programs, word processing programs, securityapplications, spreadsheet programs, games, search programs, and soforth. Applications 242 may further include search client 245 that isconfigured to send, to receive, and/or to otherwise process a searchquery and/or search result using any known or to be known communicationprotocols. Although a single search client 245 is illustrated it shouldbe clear that multiple search clients may be employed. For example, onesearch client may be configured to enter a search query message, whereanother search client manages search results, and yet another searchclient is configured to manage serving advertisements, IMs, emails, andother types of known messages, or the like.

Having described the components of the general architecture employedwithin the disclosed systems and methods, the components' generaloperation with respect to the disclosed systems and methods will now bedescribed below.

FIG. 3 is a block diagram illustrating the components for performing thesystems and methods discussed herein. FIG. 3 includes a secure tokengenerator 302, token-based validator 304, network 310 and database 320.The secure token generator 302 and token-based validator 304 can each bea special purpose machine or processor and can be hosted by anapplication server, content server, social networking server, webserver, search server, content provider, email service provider, adserver, and the like, or any combination thereof. According to someembodiments, secure token generator 302 is hosted by a contentmanagement system server (e.g., a backend server of a CMS) andtoken-based validator 304 is hosted by a CDN server.

According to some embodiments, secure token generator 302 andtoken-based validator 304 can each be embodied as a stand-aloneapplication. In some embodiments, such application can be a web-basedapplication accessed by the user device, such as and without limitationclient device 101, mobile devices 102-104, mobile device 200, or thelike, over a network, such as network 310, which can be (or cancomprise) network 105 and/or wireless network 110.

The database 320 can be any type of database or memory, and can beassociated with a content management system server, content deliverynetwork server, or the like on a network. Database 320 can comprise adataset of data and metadata associated with local and/or networkinformation related to users, services, applications, content (e.g.,video) and the like. Such information can be stored and indexed in thedatabase 320 independently and/or as a linked or associated dataset. Itshould be understood that the data (and metadata) in the database 320can be any type of information and type, whether known or to be known,without departing from the scope of the present disclosure.

According to some embodiments, database 320 can comprise a number ofinstances. For example, each server can have a local instance ofdatabase 320 storing variant media playlist files, media segment files,tokens, mismatch counts (each of which is associated with a securetoken), or the like. As yet another example, a database 320 can storedata including without limitation generated secure tokens, contentrestrictions, etc. As yet a further non-limiting example, database 320can store data such as and without limitation secure tokens, mappingsbetween secure tokens and IP addresses, etc.

According to some embodiments, user data stored in database 320 caninclude, but is not limited to, information associated with a user'sprofile, user interests, user behavioral information, user attributes,user preferences or settings, user demographic information, userlocation information, user biographic information, and the like, or somecombination thereof. In some embodiments, the user data can alsoinclude, for purposes of creating, recommending, rendering and/ordelivering content, user device information, including, but not limitedto, device identifying information, device capability information,voice/data carrier information, Internet Protocol (IP) address,applications installed or capable of being installed or executed on suchdevice, and/or any, or some combination thereof. It should be understoodthat the data (and metadata) in the database 320 can be any type ofinformation related to a user, content, a device, an application, aservice provider, a content provider, whether known or to be known,without departing from the scope of the present disclosure.

While the discussion below will involve content encoded using videostreaming protocols such as Hypertext Transport Protocol Live Streaming(HLS) or Dynamic Adaptive Streaming over Hypertext Transport Protocol(DASH), any content and any content encoding technique can be used. Inaddition and while the discussion below will involve content streaming,it should be apparent that any type of streaming or downloadablecontent, including for example text, audio, multimedia, RSS feedinformation can be used without departing from the scope of the instantapplication.

The network 310 can be any type of network such as, but not limited to,a wireless network, a local area network (LAN), wide area network (WAN),the Internet, or a combination thereof. The network 310 facilitatesconnectivity of user devices, secure token generator 302 token-basedvalidator 304, and the database of stored resources 320. Indeed, asillustrated in FIG. 3, the secure token generator 302 and thetoken-based validator 304 can each be directly connected with thedatabase 320 by any known or to be known method of connecting and/orenabling communication between such devices and resources.

In some embodiments, the principal processor(s), server(s), orcombination of devices that comprises hardware programmed in accordancewith the special purpose functions herein is referred to for convenienceas the secure token generator 302 and the token-based validator 304. Itshould be understood that the engine(s) and module(s) discussed hereinare non-exhaustive, as additional or fewer engines and/or modules (orsub-modules) may be applicable to the embodiments of the systems andmethods discussed. The operations, configurations and functionalities ofeach module, and their role within embodiments of the present disclosurewill be discussed with reference to FIG. 4.

The information processed by the secure token generator 302 and thetoken-based validator 304 can be supplied to the database 320 in orderto ensure that the information housed in the database 320 is up-to-dateas the disclosed systems and methods leverage real-time informationassociated with items of content, users and/or user devices during orresponsive to content streaming (or content retrieval and/or othercontent download), as discussed in more detail below.

FIG. 4 provides a process flow overview in accordance with one or moreembodiments of the present disclosure. Process 400 of FIG. 4 detailssteps performed in accordance with exemplary embodiments of the presentdisclosure for automatic token-based secure content streaming. Accordingto some embodiments, as discussed herein with relation to FIG. 4, theprocess involves automatically generating a secure token which is usedto validate content requests. An IP address associated with the securetoken (e.g., the IP address used in generating the secure token) ismatched with the IP address associated with a current request. If amismatch exists, a mismatch counter is incremented to reflect themismatch, and the mismatch counter is checked against a threshold numberof mismatches allowed in a given time period. If the mismatch counterexceeds the threshold, the request is denied. If the IP addresses matchor if the mismatch counter does not exceed the threshold, the request isgranted. In so doing, IP address changes associated with a user deviceare accommodated while preventing abuses such as unauthorized contentaccess associated with unauthorized publication of URLs.

At step 402, a request is received by secure token generator 302 from amedia playback component (e.g., a media player) of a user device (e.g.,client device 101, mobile devices 102-104, mobile device 200 or thelike). The request identifies the IP address of the user device. Therequest may be a user's request to experience (e.g., view and/or listento) an item of content identified in the request. The request might beinitiated in response to the user's content selection (e.g., a hyperlinkselection) in a web page displayed in a graphical user interface (GUI)of a browser application executing on the user device, a GUI of themedia player, etc.

By way of a non-limiting example, FIG. 5 illustrates the discussionrespective to the steps of FIG. 4. FIG. 5 provides non-limiting examplesof requests made by a user device 502, e.g., a media player applicationexecuting on the user device 502 (e.g., client device 101, mobiledevices 102-104, mobile device 200, or the like) to a CMS server 504implementing the secure token generator 302 and a CDN serverimplementing the token-based validator 304, and responses thereto.

In the example shown in FIG. 5, request 508 corresponds to the requestreceived at step 402 of FIG. 4. The request 508 is a request for acontent master playlist and includes a unique identifier of the item ofcontent for which the content master playlist is being requested. Therequest further includes the IP address of the user device 502.

In some embodiments, CMS server 504 can validate the content accessrequest to determine whether or not to authorize the content accessrequest. As one example, validation might be performed to ensure thatany geographic restrictions exist (a geo-restriction validation).Embodiments of the present disclosure can be used for validation ofanonymous users. In some embodiments of the present disclosure,token-based validation can be used in combination with other types ofvalidation, such as and without limitation geo-based validation (such asthe geo-restrictions discussed herein), user-based validation (e.g.,validation to ensure that the user based on identification information,such as and without limitation a username and password), or the like.

Referring again to FIG. 4, a secure token is generated, by the securetoken generator 302 implemented by the CMS server 504, and is associatedwith the IP address associated with the content access request, e.g.,request 508 of FIG. 5, at step 404. The IP address associated with thecontent access request can be the IP address received with the contentaccess request 508, in the example of FIG. 5. This IP address can beused alone or in combination with other information (e.g., an expirationtime) in generating the secure token. The secure token can be generatedafter a determination is made that there are no access restrictionsand/or the user is determined to be a user authorized to access therequested content.

In some embodiments, the secure token comprises an encrypted valuegenerated from information, such as and without limitation the IPaddress received with the content access request (e.g., request 508) anda short-lived expiration time. The secure token can be generated byencrypting the information using an encryption algorithm such as MD5. Atstep 406 of FIG. 4, the secure token is transmitted to the user device502 from which the content access request 508 is received, in responseto the received content access request 508.

In some embodiments, the secure token is transmitted as part of a URL(e.g., as a URL parameter of the URL). In other alternative embodiments,the secure token can be transmitted via a cookie (e.g., a HypertextTransport Protocol, or HTTP, session cookie) to the user device 502 fromwhich the content access request 508 is received (e.g., in a case thatcookies are supported by the user device and are not blocked).

FIG. 7 provides an example of a tokenized URL comprising a secure token.URL 702 includes a reference to the resource (e.g., a content masterplaylist, variant media playlist, content segment, etc.) and a number ofembedded parameters, i.e., ih, x and s. The ih parameter comprises ahash (e.g., MD5 hash) of the client IP address (e.g., the IP address ofthe user device 502 accompanying the content access request 508), the xparameter comprises an expiration of the secure token, and the sparameter comprises a URL signature (e.g., a hash, such as and withoutlimitation an MD5 hash, of the URL 702 including the ih and sparameters). The URL signature can be used to ensure that the URL hasnot been tampered with. In addition, the URL signature can be decrypted(e.g., using a decryption key that is shared between the CMS server 504and the CDN server 506) to retrieve the ih and s parameters.

FIG. 7 also provides an example of an HTTP session cookie comprising theih, x and s parameters. The ih, x and s parameters in the HTTP sessioncookie 704 are the same as those in the URL 702 example. In the example,the HTTP session cookie 704 is being transmitted by the media player ofa user device (e.g., user device 502), such as and without limitation inconnection with requests 512 and 518. An HTTP session cookie comprisingthe ih, x and s parameters can be sent to the user device 502, e.g., bythe CMS server 504 in response 510 and/or the CDN server in responses514 and 518. HTTP Session cookies (e.g., over Transport Layer Security(TLS)) allow the CDN (e.g., a number of servers of the CDN, such as CDNserver 506) and the user device 502 (and a media player of the userdevice 502) to maintain state during a session (e.g., an Adaptive VideoPlayback session) and ensure that there is no man-in-the-middle attackthat can intercept or steal the content.

At step 408 of FIG. 4, which is performed by the token-based validator(which can be implemented by CDN server 506 of FIG. 5), a contentdownload request (e.g., content download request 512 of FIG. 5) isreceived (e.g., by CDN server 506 of FIG. 5) from user device 502. Insome embodiments, the content download request 512 is in a form of a URLcomprising the secure token (e.g., the secure token transmitted to theuser device in response 510 to the content access request 508). Inaccordance with at least one embodiment, the secure token can betransmitted via an HTTP session cookie. The content download request 512can be a request (e.g., from the user device 502) for content (e.g., avariant media playlist, a number of media segments, etc.).

The request 512 and the secure token are received by the CDN server 506.In some embodiments, the secure token comprises at least the informationincluded in the ih and x parameters. The IP address of the user device502 from which the content download request 512 is received istransmitted with the content download request 512 to the CDN server 506.Before transmitting the requested content to the user device 502, thesecure token is validated.

An example of token-based validation is discussed in more detail belowin connection with FIG. 6. Generally and in accordance with someembodiments, token-based validation comprises a check to ensure that thesecure token is not expired (is still live), and that either an IPaddress match exists or that there is an IP address mismatch and thenumber of IP address mismatches does not exceed (is less than or equalto) a threshold number of IP address mismatches. By allowing a number ofmismatches, a user device that is moving and changing IP addresses as aresult can still access content, thereby accommodating a mobile userdevice (and user). In addition, the threshold number of mismatches in agiven time period limits the number of simultaneous users to thethreshold number, thereby minimizing unauthorized use (or publication)of a content URL (and minimizing unauthorized access to the content) toa limited number of (e.g., the threshold number) of unauthorized users(e.g., simultaneous unauthorized users).

At step 412, a response is transmitted to the user device (e.g., userdevice 502). The response is in accordance with the outcome of thetoken-based validation performed in step 410. If access to the requestedcontent is blocked as a result of an unsuccessful token-basedvalidation, the response can be a notification that access is beingblocked. If access to the requested content is permitted as a result ofa successful token-based validation, the CDN server 506 transmits therequested content and transmits the secure token.

With reference to FIG. 5, responses 514 and 518 are examples ofresponses transmitted to the user device 502 by the CDN server 506.Response 514 is transmitted in response to content download request 512and response 518 is transmitted in response to request 516. By way of anon-limiting example, content download request 512 can comprise arequest for a variant media playlist and response 514 can transmit therequested variant playlist in a case that the token-based validation issuccessfully performed in connection with request 512, or a notificationthat access is blocked in a case that the token-based validation isunsuccessfully performed in connection with request 512.

By way of a further non-limiting example, content download request 516can comprise a request for a media segment or a variant media playlistand response 518 can transmit the requested media segment or requestedvariant playlist in a case that the token-based validation issuccessfully performed in connection with request 516, or a notificationthat access is blocked in a case that the token-based validation isunsuccessfully performed in connection with request 516.

In the example shown in FIG. 5, request 516 can be repeated and aresponse 518 to each request 516 can be transmitted to the user deviceby the CDN server 506. With reference to FIG. 4, steps 408-412 areperformed in connection with each request 516 and associated response518.

FIG. 6 provides an example of a token-based validation performed at step410 of FIG. 4. In some embodiments, the received secure token cancomprise the short-lived expiration time which can be retrieved bydecrypting the received secure token. In some embodiments, theshort-lived expiration time can be transmitted as a parameter (e.g., thex parameter discussed herein). In any case, the retrieved expirationtime can be checked against a time of the content download request toensure that the secure token is not expired (e.g., is still live). Withreference to FIG. 7, the expiration information can be retrieved fromeither parameter x or from parameter s; and the IP address of the securetoken can be retrieved from either the ih or the s parameter

At step 602 of FIG. 6, the expiration time of the secure token isretrieved and a determination is made whether or not the secure token isexpired. If a determination is made that the URL (and secure token) isexpired, processing continues at step 614 to block access to therequested content. If a determination is made that the secure token isnot expired, processing continues at step 604 to make a determination ofwhether an IP address match exists. By way of an example, at step 604,the IP address received with the content download request 512 (orcontent download request 516) is compared with the IP address receivedwith the content access request 508 to make a determination whether thetwo IP addresses match.

By way of a further non-limiting example, parameter ih or parameter scan be decrypted by the CDN server to retrieve the IP address associatedwith the secure token (e.g., the IP address associated with the contentaccess request 508), and the retrieved IP address can be compared withthe IP address (e.g., of user device 502) associated with the contentdownload request 512 (or content download request 516). As yet anothernon-limiting example, the received secure token can be used to retrievethe IP address in a stored mapping, e.g., a mapping associating thesecure token with the IP address received with the content accessrequest.

If a mismatch is found (e.g., the IP address received with the contentaccess request 508 and retrieved using the secure token) does not matchthe IP address received with the content download request (e.g., contentdownload request 512 or 518) at step 604, processing continues at step606 to increment a mismatch counter associated with the secure token. Byway of a non-limiting example, incrementing the mismatch counter cancomprise initializing the mismatch counter to an initial value (e.g.,set to 1 to memorialize the first mismatch), if there is no previousmismatch; or, if there is a previous mismatch, incrementing an existingmismatch counter (e.g., by 1 to memorialize the current mismatch).

At step 608, a determination is made whether or not the number ofmismatches (using the mismatch counter) exceeds a threshold number ofmismatches. If not, the requested content (e.g., a variant mediaplaylist, a section of content, etc.) is transmitted to the user device(e.g., user device 502) in response to the received content downloadrequest (e.g., content download request 512 or 516). If the number ofmismatches exceeds the threshold number, the content download request(e.g., content download request 512 or 516) is denied (or blocked), atstep 614. In such a case, the user of the user device can make anothercontent access request, for example.

If a determination is made, at step 604, that the retrieved IP addressassociated with the secure token (e.g., the IP address associated withcontent access request 508) matches the IP address received with thecontent download request (e.g., content download request 512 or 516),the secure token is successfully validated, and the requested content istransmitted to the user device (e.g., user device 502), at step 610. Inaccordance with at least one embodiment, the IP address comparisonoperation is conditionally performed based on the outcome of adetermination that the secure token is not expired (e.g., still live).Thus, in accordance with at least one embodiment, the secure tokenvalidation can include both a IP address validation and a temporalvalidation.

As shown in FIG. 8, internal architecture 800 of a computing device(s),computing system, computing platform, user devices, set-top box, smartTV and the like includes one or more processing units, processors, orprocessing cores, (also referred to herein as CPUs) 812, which interfacewith at least one computer bus 802. Also interfacing with computer bus802 are computer-readable medium, or media, 806, network interface 814,memory 804, e.g., random access memory (RAM), run-time transient memory,read only memory (ROM), media disk drive interface 820 as an interfacefor a drive that can read and/or write to media including removablemedia such as floppy, CD-ROM, DVD, media, display interface 810 asinterface for a monitor or other display device, keyboard interface 816as interface for a keyboard, pointing device interface 818 as aninterface for a mouse or other pointing device, and miscellaneous otherinterfaces not shown individually, such as parallel and serial portinterfaces and a universal serial bus (USB) interface.

Memory 804 interfaces with computer bus 802 so as to provide informationstored in memory 804 to CPU 812 during execution of software programssuch as an operating system, application programs, device drivers, andsoftware modules that comprise program code, and/or computer executableprocess steps, incorporating functionality described herein, e.g., oneor more of process flows described herein. CPU 812 first loads computerexecutable process steps from storage, e.g., memory 804, computerreadable storage medium/media 806, removable media drive, and/or otherstorage device. CPU 812 can then execute the stored process steps inorder to execute the loaded computer-executable process steps. Storeddata, e.g., data stored by a storage device, can be accessed by CPU 812during the execution of computer-executable process steps.

Persistent storage, e.g., medium/media 806, can be used to store anoperating system and one or more application programs. Persistentstorage can also be used to store device drivers, such as one or more ofa digital camera driver, monitor driver, printer driver, scanner driver,or other device drivers, web pages, content files, playlists and otherfiles. Persistent storage can further include program modules and datafiles used to implement one or more embodiments of the presentdisclosure, e.g., listing selection module(s), targeting informationcollection module(s), and listing notification module(s), thefunctionality and use of which in the implementation of the presentdisclosure are discussed in detail herein.

Network link 828 typically provides information communication usingtransmission media through one or more networks to other devices thatuse or process the information. For example, network link 828 mayprovide a connection through local network 824 to a host computer 826 orto equipment operated by a Network or Internet Service Provider (ISP)830. ISP equipment in turn provides data communication services throughthe public, worldwide packet-switching communication network of networksnow commonly referred to as the Internet 832.

A computer called a server host 834 connected to the Internet 832 hostsa process that provides a service in response to information receivedover the Internet 832. For example, server host 834 hosts a process thatprovides information representing video data for presentation at display810. It is contemplated that the components of system 800 can bedeployed in various configurations within other computer systems, e.g.,host and server.

At least some embodiments of the present disclosure are related to theuse of computer system 800 for implementing some or all of thetechniques described herein. According to one embodiment, thosetechniques are performed by computer system 800 in response toprocessing unit 812 executing one or more sequences of one or moreprocessor instructions contained in memory 804. Such instructions, alsocalled computer instructions, software and program code, may be readinto memory 804 from another computer-readable medium 806 such asstorage device or network link. Execution of the sequences ofinstructions contained in memory 804 causes processing unit 812 toperform one or more of the method steps described herein. In alternativeembodiments, hardware, such as ASIC, may be used in place of or incombination with software. Thus, embodiments of the present disclosureare not limited to any specific combination of hardware and software,unless otherwise explicitly stated herein.

The signals transmitted over network link and other networks throughcommunications interface, carry information to and from computer system800. Computer system 800 can send and receive information, includingprogram code, through the networks, among others, through network linkand communications interface. In an example using the Internet, a serverhost transmits program code for a particular application, requested by amessage sent from computer, through Internet, ISP equipment, localnetwork and communications interface. The received code may be executedby processor 802 as it is received, or may be stored in memory 804 or instorage device or other non-volatile storage for later execution, orboth.

For the purposes of this disclosure a module is a software, hardware, orfirmware (or combinations thereof) system, process or functionality, orcomponent thereof, that performs or facilitates the processes, features,and/or functions described herein (with or without human interaction oraugmentation). A module can include sub-modules. Software components ofa module may be stored on a computer readable medium for execution by aprocessor. Modules may be integral to one or more servers, or be loadedand executed by one or more servers. One or more modules may be groupedinto an engine or an application.

For the purposes of this disclosure the term “user”, “subscriber”“consumer” or “customer” should be understood to refer to a user of anapplication or applications as described herein and/or a consumer ofdata supplied by a data provider. By way of example, and not limitation,the term “user” or “subscriber” can refer to a person who receives dataprovided by the data or service provider over the Internet in a browsersession, or can refer to an automated software application whichreceives the data and stores or processes the data.

Those skilled in the art will recognize that the methods and systems ofthe present disclosure may be implemented in many manners and as suchare not to be limited by the foregoing exemplary embodiments andexamples. In other words, functional elements being performed by singleor multiple components, in various combinations of hardware and softwareor firmware, and individual functions, may be distributed among softwareapplications at either the client level or server level or both. In thisregard, any number of the features of the different embodimentsdescribed herein may be combined into single or multiple embodiments,and alternate embodiments having fewer than, or more than, all of thefeatures described herein are possible.

Functionality may also be, in whole or in part, distributed amongmultiple components, in manners now known or to become known. Thus,myriad software/hardware/firmware combinations are possible in achievingthe functions, features, interfaces and preferences described herein.Moreover, the scope of the present disclosure covers conventionallyknown manners for carrying out the described features and functions andinterfaces, as well as those variations and modifications that may bemade to the hardware or software or firmware components described hereinas would be understood by those skilled in the art now and hereafter.

Furthermore, the embodiments of methods presented and described asflowcharts in this disclosure are provided by way of example in order toprovide a more complete understanding of the technology. The disclosedmethods are not limited to the operations and logical flow presentedherein. Alternative embodiments are contemplated in which the order ofthe various operations is altered and in which sub-operations describedas being part of a larger operation are performed independently.

While various embodiments have been described for purposes of thisdisclosure, such embodiments should not be deemed to limit the teachingof this disclosure to those embodiments. Various changes andmodifications may be made to the elements and operations described aboveto obtain a result that remains within the scope of the systems andprocesses described in this disclosure.

The invention claimed is:
 1. A method comprising: receiving, at a computing device and over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address; making a determination, via the computing device and using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and transmitting, via the computing device and over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download.
 2. The method of claim 1, the second determination determining whether the number of network address mismatches associated with the secure token exceeds a mismatch threshold is selectively performed if the first determination determines that the first and second network addresses mismatch.
 3. The method of claim 1, the secure token being generated in response to a content access request received prior to the content download request, generation of the secure token comprising encrypting the second network address and determining an expiration of the secure token.
 4. The method of claim 3, the user device is a first user device, the secure token is transmitted, over the electronic communications network, to a second user device using the second network address in response to the content access requested received from the second user device with the second network address, the secure token being transmitted to the second user device after a determination is made to grant access to the content item to an anonymous user of the second user device.
 5. The method of claim 4, the second user device is the first user device that has the second network address for the content access request and changes from the second network address to the first network address for the content download request after the content access request is made.
 6. The method of claim 4, the first and second user devices are different user devices and the first and second network addresses are different.
 7. The method of claim 4, the determination to grant access to the content item to the anonymous user of the second user device comprising determining, using the second network address, that the anonymous user is not geographically restricting from experiencing the content item.
 8. The method of claim 1, the mismatch threshold is set to a number of mismatches that accommodate a corresponding number of different network addresses used by the user device in connection with requests made in connection with the content item using the secure token.
 9. The method of claim 1, the mismatch threshold is set to a number of mismatches that limits requests made in connection with the content item using the secure token to a predetermined number of different user devices corresponding to the mismatch threshold.
 10. The method of claim 1, further comprising: transmitting, over the electronic communications network and to the second network address prior to receiving the content download request from the user device, a Universal Resource Locator (URL) corresponding to the content item and comprising the secure token, the secure token comprising first and second parameters of the URL, the first parameter of the URL comprising a hash of the second network address and the second parameter of the URL comprising an expiration of the secure token, the URL further comprising a third parameter comprising a signature of the URL including the first and second parameters.
 11. The method of claim 1, further comprising: transmitting, over the electronic communications network and to the second network address prior to receiving the content download request from the user device, a Hypertext Transport Protocol (HTTP) session cookie comprising the secure token, the secure token comprising first and second parameters of the HTTP session cookie, the first parameter of the HTTP session cookie comprising a hash of the second network address and the second parameter of the HTTP session cookie comprising an expiration of the secure token, the HTTP session cookie further comprising a third parameter comprising a signature of a URL corresponding to the content item, the URL from which the third parameter is generated comprising the first and second parameters.
 12. The method of claim 1, the determination further comprising a third determination that is performed before the first and second determinations and the first and second determinations are both selectively performed based on an outcome of the third determination, the third determination comprising determining whether or not the secure token is still live, the first and second determinations being performed in a case that the secure token is determined to be still live.
 13. The method of claim 1, the content download request comprising a request for at least one of a media playlist for the content item and a media segment of the content item, and the previous request made in connection with the content item comprising a request for a master playlist for the content item.
 14. A non-transitory computer-readable storage medium tangibly encoded with computer-executable instructions, that when executed by a processor associated with a computing device, performs a method comprising: receiving, over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address; making a determination, using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and transmitting, over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download.
 15. The non-transitory computer-readable storage medium of claim 14, the secure token being generated in response to a content access request received prior to the content download request, generation of the secure token comprising encrypting the second network address and determining an expiration of the secure token.
 16. The non-transitory computer-readable storage medium of claim 15, the user device is a first user device, the secure token is transmitted, over the electronic communications network, to a second user device using the second network address in response to the content access requested received from the second user device with the second network address, the secure token being transmitted to the second user device after a determination is made to grant access to the content item to an anonymous user of the second user device.
 17. The non-transitory computer-readable storage medium of claim 15, the second user device is the first user device that has the second network address for the content access request and changes from the second network address to the first network address for the content download request after the content access request is made.
 18. The non-transitory computer-readable storage medium of claim 15, the first and second user devices are different user devices and the first and second network addresses are different.
 19. The non-transitory computer-readable storage medium of claim 15, the determination to grant access to the content item to the anonymous user of the second user device comprising determining, using the second network address, that the anonymous user is not geographically restricting from experiencing the content item.
 20. The non-transitory computer-readable storage medium of claim 14, the mismatch threshold is set to a number of mismatches that accommodate a corresponding number of different network addresses used by the user device in connection with requests made in connection with the content item using the secure token.
 21. The non-transitory computer-readable storage medium of claim 14, the mismatch threshold is set to a number of mismatches that limits requests made in connection with the content item using the secure token to a predetermined number of different user devices corresponding to the mismatch threshold.
 22. A computing device comprising: a processor; a non-transitory storage medium for tangibly storing thereon program logic for execution by the processor, the program logic comprising: receiving logic executed by the processor for receiving, over an electronic communications network, a content download request from a user device, the content download request being a request for a download in connection with a content item and having an associated secure token and an associated first network address of the user device, the associated secure token being generated in connection with a previous request made in connection with the content item and having an associated second network address; determining logic executed by the processor for making a determination, using the secure token received from the user device with the content download request, whether or not to permit the requested download, the determination comprising a first determination whether the first and second network addresses are a match and a second determination that is selectively performed based on an outcome of the first determination, the second determination determining whether or not to block the requested download based on whether or not a number of network address mismatches associated with the secure token exceeds a mismatch threshold; and transmitting logic executed by the processor for transmitting, over the electronic communications network to the user device, a response to the content download request, the response comprising content requested by the content download request in a case that the first and second network addresses match and in a case that the first and second network addresses mismatch but the number of mismatches does not exceed the mismatch threshold, the response comprising information indicating denial of the content download request in a case that the second determination determines to block the requested download. 