白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Methods, systems, and media for authentication of user devices to a display device

專利號
US11997089B2
公開日期
2024-05-28
申請人
Google LLC(US CA Mountain View)
發(fā)明人
Justin Lewis; Scott Davies
IPC分類
H04L9/40; G06F21/44; H04N21/258
技術(shù)領(lǐng)域
user,device,token,display,in,server,can,some,acl,media
地域: CA CA Mountain View

摘要

Methods, systems, and media for authentication of user devices to a display device are provided. In some implementations, the method comprises: authenticating a first user device to a display device, where the first user device is provided with media playback control on the display device in response to the authentication; identifying a second user device in proximity to the first user device; transmitting, from the first user device to the second user device, an invitation message to authenticate the second user device to the display device; and transmitting, from the first user device to the second user device, an authentication token that causes the second user device to request authentication to the display device from the server, where the second user device is provided with media playback control on the display device in response to authenticating with the display device.

說明書

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 16/812,797, filed Mar. 9, 2020, which is a continuation of U.S. patent application Ser. No. 15/268,105, filed Sep. 16, 2016, each of which is hereby incorporated by reference herein in its entirety.

TECHNICAL FIELD

The disclosed subject matter relates to methods, systems, and media for authentication of second screen user devices to a display device.

BACKGROUND

Many people enjoy using a second screen device, such as a mobile phone or tablet computer, to select media content items to be presented on a primary device, such as a television, audio speakers, or a projector. Additionally, people may want to have multiple second screen devices be allowed to communicate with the primary device, for example, the multiple devices within a household. However, it can be time-consuming to authenticate each of the multiple devices to the primary device. For example, each second screen device may be individually authenticated with the primary device, such as a display device, with user account information, password information, device information, display device code information (e.g., a code of a display device that may itself be difficult to locate), etc. and only once such information is inputted can a user of a second screen device communicate with the primary device.

Accordingly, it is desirable to provide new methods, systems, and media for authentication of user devices to a display device.

SUMMARY

Methods, systems, and media for authentication of user devices to a display device are provided.

權(quán)利要求

1
What is claimed is:1. A method for authentication of user devices, the method comprising:performing an authentication of a first user device to a media device, wherein:an authentication token that indicates an identity of the media device is associated with the authentication of the first user device to the media device, andan identifier of the first user device is included in an access control list maintained by a server system, wherein the access control list indicates devices that are authenticated and provided with media playback control on the media device;identifying, using the first user device, a second user device in proximity to the first user device;transmitting, using the first user device to the second user device, an invitation message to authenticate the second user device to the media device, wherein:interaction with the invitation message causes the authentication token to be transferred from the first user device to the second user device,the authentication token is transmitted by the second user device to the server system to authenticate the second user device to the media device,the second user device is added to the access control list maintained by the server system, andafter the second user device has been authenticated by being added to the access control list, a media content item selected using the second user device is transmitted to the media device for playback; andremoving, by the server system, the second user device from the access control list maintained by the server system based on proximity of the second user device to the media device, whereinremoving the second user device from the access control list prevents the second user device from selecting media content items for playback by the media device.2. The method of claim 1, wherein the authentication token is stored on the server system in association with the identifier of the first user device.3. The method of claim 2, wherein the authentication token is used as a key in a key-value pair in connection with a corresponding access control list stored on the server system.4. The method of claim 1, further comprising:generating, using the first user device, the authentication token; andtransmitting the authentication token to a server.5. The method of claim 1, further comprising:transmitting, to a server, a request for the authentication token; andreceiving the authentication token from the server.6. The method of claim 1, further comprising receiving, from a contact list associated with a first user of the first user device, an indication of a second user of the second user device, wherein the second user device is identified based on the received indication.7. The method of claim 1, wherein identifying the second user device comprises detecting the second user device based on a connection to a communications network.8. The method of claim 1, wherein identifying the second user device comprises:detecting a movement of the first user device; andtransmitting, to a server, an indication of the movement and a first location associated with the first user device.9. The method of claim 8, further comprising receiving, from the server, an identifier associated with the second user device, wherein the second user device detected a movement of the second user device at a second location and wherein the first location and the second location are within a predetermined distance.10. The method of claim 1, further comprising:receiving, from a user of the first user device, an indication that the second user device is not to be authenticated to the media device; andtransmitting, to a server, a request to remove authentication permission for the second user device to the media device.11. A system for authentication of user devices, the system comprising:a hardware processor on a first user device that:performs an authentication of the first user device to a media device, wherein:an authentication token that indicates an identity of the media device is associated with the authentication of the first user device to the media device, andan identifier of the first user device is included in an access control list, wherein the access control list indicates devices that are authenticated and provided with media playback control on the media device upon authentication;identifies, using the first user device, a second user device in proximity to the first user device; andtransmits, using the first user device to the second user device, an invitation message to authenticate the second user device to the media device, wherein:interaction with the invitation message causes the authentication token to be transferred from the first user device to the second user device,the authentication token is used to authenticate the second user device to the media device,the second user device is added to the access control list maintained by a server system,after the second user device has been authenticated by being added to the access control list, a media content item selected using the second user device is transmitted to the media device for playback, andthe server system removes the second user device from the access control list based on proximity of the second user device to the media device, whereinremoving the second user device from the access control list prevents the second user device from selecting media content items for playback by the media device.12. The system of claim 11, wherein the authentication token is stored on the server system in association with the identifier of the first user device.13. The system of claim 12, wherein the authentication token is used as a key in a key-value pair in connection with a corresponding access control list stored on the server system.14. The system of claim 11, wherein the hardware processor also:generates, using the first user device, the authentication token; andtransmits the authentication token to a server.15. The system of claim 11, wherein the hardware processor also:transmits, to a server, a request for the authentication token; andreceives the authentication token from the server.16. The system of claim 11, wherein the hardware processor also receives, from a contact list associated with a first user of the first user device, an indication of a second user of the second user device, wherein the second user device is identified based on the received indication.17. The system of claim 11, wherein identifying the second user device comprises detecting the second user device based on a connection to a communications network.18. The system of claim 11, wherein identifying the second user device comprises:detecting a movement of the first user device; andtransmitting, to a server, an indication of the movement and a first location associated with the first user device.19. The system of claim 18, wherein the hardware processor also receives, from the server, an identifier associated with the second user device, wherein the second user device detected a movement of the second user device at a second location and wherein the first location and the second location are within a predetermined distance.20. The system of claim 11, wherein the hardware processor also:receives, from a user of the first user device, an indication that the second user device is not to be authenticated to the media device; andtransmits, to a server, a request to remove authentication permission for the second user device to the media device.21. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the processor to perform a method for authentication of user devices, the method comprising:performing an authentication of a first user device to a media device, wherein:an authentication token that indicates an identity of the media device is associated with the authentication of the first user device to the media device, andan identifier of the first user device is included in an access control list maintained by a server system, wherein the access control list indicates devices that are authenticated and provided with media playback control on the media device;identifying, using the first user device, a second user device in proximity to the first user device; andtransmitting, using the first user device to the second user device, an invitation message to authenticate the second user device to the media device, wherein:interaction with the invitation message causes the authentication token to be transferred from the first user device to the second user device,the authentication token is transmitted by the second user device to the server system to authenticate the second user device to the media device,the second user device is added to the access control list maintained by the server system, andafter the second user device has been authenticated by being added to the access control list, a media content item selected using the second user device is transmitted to the media device for playback, andthe server system removes the second user device from the access control list based on proximity of the second user device to the media device, whereinremoving the second user device from the access control list prevents the second user device from selecting media content items for playback by the media device.
微信群二維碼
意見反饋