Skip to content

The Battle for Viewers: Competing against Piracy – Authentication

Can Security Improve the User Experience?

There are three main tenets for building a strategy, two of which – prevention and monitoring/traceability were covered in my most recent articles. The third security tenet, authentication, is about delivering a smooth user experience to access content across devices. Security should be frictionless. Any customer will tell you if it is too difficult to access your service, they won’t stick around to figure anything out. 

Progressive service providers are incorporating the latest passwordless authentication techniques to prevent theft of service and credentials, while making it simple for users to access the services and content they paid for. Even if a password is leaked, other details, like location and device IP addresses, are more difficult to emulate. This will also eliminate the problem of forgotten passwords when logging in to new viewing devices, such as smart TVs, or maintaining two different passwords for within a TV Everywhere experience.

Previously the viewer would either have to hunt and peck on a TV to type in authorization information. This is awkward, TVs aren’t the easiest device for this kind of user interaction. Passwordless authentication allows users to easily access content in a frictionless manner by using a QR code on a viewing device. Customers use the camera within their phone, point it at the code and they are automatically authorized for the service. 

Authentication business rules can ensure the user is at their usual location and using a device with a known ID. Business logic can also be used to limit credential sharing by tying authentication to both locations and devices. A user can be prompted on their phone to approve a movie purchase, or allow a child to watch specific content. 

Likewise, a geo-targeted, single sign-on experience for TV Everywhere content eliminates the need to sign in repeatedly. Consumers are more likely to abandon a service if they cannot easily enjoy their content wherever they are.

This is Part III of a five-part series dedicated to helping streaming service providers understand where their security vulnerabilities exist and what security methods will best protect, and ultimately enhance, their businesses in the most cost-efficient manner. Revisit Parts I-III

Do you have questions about applications and content security?

Book a call with one of our experts

Want to keep up with Verimatrix news?

Sign up to the newsletter

Recent Posts

Mobile Apps Are at Risk for Static and Dynamic Attacks

Mobile apps have become an ubiquitous presence in our lives. We use them to check our investment portfolios, order meals, and even find dating partners. But as we increasingly rely on these apps to manage our personal and professional lives, businesses struggle to prevent cyber attacks originating from within the app, and from the billions of app-connected devices.

chat gpt

ChatGPT: Friend or Foe?

The reward of engaging with a loyal customer base doesn’t come without risk. Hackers, often highly resourced cybercriminal gangs, recognize that mobile apps provide a gateway into the enterprise. As awareness grows about this risk, enterprises are increasingly seeking solutions to secure and protect their mobile apps.

Mobile RASP vs Shielding vs In-App Protection

The reward of engaging with a loyal customer base doesn’t come without risk. Hackers, often highly resourced cybercriminal gangs, recognize that mobile apps provide a gateway into the enterprise. As awareness grows about this risk, enterprises are increasingly seeking solutions to secure and protect their mobile apps.

Mobile Apps Are at Risk for Static and Dynamic Attacks

Mobile Apps Are at Risk for Static and Dynamic Attacks

Mobile apps have become an ubiquitous presence in our lives. We use them to check our investment portfolios, order meals, and even find dating partners.…
Rock Concerts, Blind Spots and a Widening Attack Surface

Rock Concerts, Blind Spots and a Widening Attack Surface

We are living in a mobile-first world, and the explosion of mobile applications is nothing short of remarkable. We're talking about 6-7 million apps on…
ChatGPT: Friend or Foe?

ChatGPT: Friend or Foe?

The reward of engaging with a loyal customer base doesn’t come without risk. Hackers, often highly resourced cybercriminal gangs, recognize that mobile apps provide a…
Want to take a deep dive?

Connect with us

Video Protection & Anti-Piracy