US 11,960,316 B2
Media content provision in a computer network
Johan Billgren, Stockholm (SE); Juan Ignacio Jimenez de Luis, Stockholm (SE); Katie Rogers, Stockholm (SE); and Michael Lindfors, Stockholm (SE)
Assigned to Acast AB (publ), Stockholm (SE)
Appl. No. 17/594,785
Filed by Acast AB (publ), Stockholm (SE)
PCT Filed Apr. 29, 2019, PCT No. PCT/EP2019/060957
§ 371(c)(1), (2) Date Oct. 29, 2021,
PCT Pub. No. WO2020/221426, PCT Pub. Date Nov. 5, 2020.
Prior Publication US 2022/0222322 A1, Jul. 14, 2022
Int. Cl. G06F 21/10 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/10 (2013.01) [H04L 63/102 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A method of providing a media content in a computer network, comprising, in a server system of a media content provider:
a) obtaining a user identification, UID, of a user registered with a partner of the media content provider, and a content identification, CID, of a media content offered by the media content provider;
b) generating a first token associated with the obtained UID and CID;
c) storing the first token in a data storage;
d) providing a reference to a web resource to at least one of the user or to the partner, the reference including a second token equal to, or at least associated with, the first token;
e) receiving a first request from the user to access the web resource, the first request including the second token;
f) providing the web resource to the user, the web resource identifying a network location and including a third token equal to, or at least associated with, at least one of the first token or the second token;
g) receiving a second request from the user to access the network location, the second request including the third token;
h) confirming, based at least on a comparison of the third token with the first token stored in the data storage, whether the user is allowed an access to at least part of the media content; and
i) if confirming in step h) that the user is allowed the access, providing at least part of the media content to the user;
wherein the method further comprises obtaining, before step h), an indication from the partner on whether the user is allowed the access and invalidating or removing the first token in/from the data storage if it is indicated that the user is not allowed the access.