U.S. patent application number 13/150981 was filed with the patent office on 2012-12-06 for media usage monitoring and control.
This patent application is currently assigned to COMCAST CABLE COMMUNICATIONS, LLC. Invention is credited to Sunil Sodah.
Application Number | 20120311673 13/150981 |
Document ID | / |
Family ID | 47262776 |
Filed Date | 2012-12-06 |
United States Patent
Application |
20120311673 |
Kind Code |
A1 |
Sodah; Sunil |
December 6, 2012 |
MEDIA USAGE MONITORING AND CONTROL
Abstract
Systems and methods of monitoring access to media content across
disparate media devices are disclosed. Aspects relate to systems
and methods that may be implemented to control access to media
content. In one embodiment, rules may define usage parameters of a
user for several types of media content and/or disparate media
devices.
Inventors: |
Sodah; Sunil; (San
Francisco, CA) |
Assignee: |
COMCAST CABLE COMMUNICATIONS,
LLC
Philadelphia
PA
|
Family ID: |
47262776 |
Appl. No.: |
13/150981 |
Filed: |
June 1, 2011 |
Current U.S.
Class: |
726/4 |
Current CPC
Class: |
G06F 21/6218 20130101;
H04L 63/102 20130101; H04L 63/20 20130101; G06F 2221/2149
20130101 |
Class at
Publication: |
726/4 |
International
Class: |
G06F 21/00 20060101
G06F021/00 |
Claims
1. A non-transitory computer-readable medium comprising
computer-executable instructions that when executed by a processor,
cause the processor to perform a method comprising: receiving usage
control rules regarding usage parameters for a first user across a
plurality of disparate media devices, wherein the rules comprise at
least one media content rule and at least one media usage rule;
receiving a request from the first user to access media content on
one of said plurality of disparate media devices, and in response,
applying the usage control rules against stored usage data for the
first user to determine if the first user may access the requested
media content; if the first user is permitted to access the
requested media content, allowing access to such content while
storing additional usage data regarding the accessed media; and
2. The computer-readable medium of claim 1, wherein at least one of
the usage control rules or the usage data is stored on a device
separable from at least one of the disparate media devices having a
memory and an interface, and the processor further performs:
requiring that the interface of the device be operatively connected
to a corresponding interface of the disparate media device from
which the user requests to access media content on before the user
may access media content from that disparate media device.
3. The computer-readable medium of claim 1, wherein execution of
the computer-executable instructions cause the processor to
perform: requiring that a memory comprising a security key be
operatively connected to the disparate media device from which the
user requests media content on before the user may access media
content from that disparate media device, wherein the security key
has an interface that is configured to operatively connect with a
corresponding interface of at least two of the disparate media
devices.
4. The computer-readable medium of claim 1, wherein at least one of
the usage control rules or the usage data is stored on a device
remotely located from the disparate media device from which the
user is requesting media content.
5. The computer-readable medium of claim 1, wherein the usage
control rules further comprise a media type rule.
6. The computer-readable medium of claim 1, wherein the media usage
rule comprises a time restraint that the first user may access
media content on at least one of the disparate media devices.
7. The computer-readable medium of claim 1, wherein the usage
control rules further comprise a device specific rule.
8. The computer-readable medium of claim 1, wherein execution of
the computer-executable instructions further cause the processor to
perform: monitoring the usage data to determine if the first user's
usage of the disparate devices violates the usage control rules;
determining that at least one media usage rules has been violated;
and in response, transmitting a notification to a third party.
9. The computer-readable medium of claim 1, wherein execution of
the computer-executable instructions further cause the processor to
perform: detecting a new disparate media device communicating with
a gateway device; and blocking at least a portion of requested
media content directed towards the new disparate device.
10. A computer-implemented method comprising: storing usage control
rules regarding a usage parameter for a first user across a
plurality of disparate media devices on a non-transitory
computer-readable medium, wherein the rules comprise at least one
media content rule and at least one media type rule; receiving a
request from the first user to access media content, and in
response, applying the usage control rules to determine if the user
may access the requested media content; if the first user is
permitted to access the requested media content, storing additional
usage data regarding the accessed media; and
11. The computer-implemented method of claim 10, wherein the usage
control rules that are applied further comprise rules selected from
the group consisting of: media usage rules, device rules, and
combinations thereof.
12. The computer-implemented method of claim 10, further
comprising: storing at least one of the applied usage control rules
or the usage data on a device separable from at least one of the
disparate media devices, the device having a memory and an
interface, and determining whether the interface of the device is
operatively connected to a corresponding interface of the disparate
media device from which the user requests to access media content
on before the user may access media content from that disparate
media device.
13. The computer-implemented method of claim 10, further
comprising: requiring that a memory comprising a security key be
operatively connected to the disparate media device from which the
user requests media content on before the user may access media
content from that disparate media device.
14. The computer-implemented method of claim 11, wherein the media
usage rule of the applied usage control rules comprises a time
restraint that the first user may access media content on at least
one of the disparate media devices.
15. The computer-implemented method of claim 11, wherein the
request to access media content is received at one of the disparate
media devices, and the method further comprising: monitoring the
usage data to determine if the first user's usage of the disparate
devices violates the usage control rules; and determining that at
least one media usage rules has been violated, and in response,
transmitting a notification.
16. The computer-implemented method of claim 15, wherein the
notification is transmitted to a third party without the knowledge
of the first user.
17. The computer-implemented method of claim 11, further
comprising: detecting a new disparate media device communicating
with a gateway device; and blocking at least a portion of requested
media content directed towards the new disparate device.
18. A computer-implemented method comprising: applying the usage
control rules regarding usage parameters for a first user across a
plurality of disparate media devices to determine if the first user
may access media content requested on one of the plurality of
disparate media devices; determining whether a memory comprising a
security key is accessible by the disparate media device from which
the user requested the media content before the user may access
media content from that disparate media device, wherein the
security key has an interface that is configured to operatively
interact with a corresponding interface of at least two of the
disparate media devices; and if the first user is permitted to
access the requested media content, storing additional usage data
regarding the accessed media content.
19. The computer-readable medium of claim 18, wherein execution of
the computer-executable instructions further cause the processor to
perform: after providing access to the requested media content,
monitoring the usage data to determine if the first user's usage of
the disparate devices violates the usage control rules.
20. The computer-readable medium of claim 18, wherein the usage
control rules are selected from the group consisting of: device
rules, media usage rules, media type rules, content rules, and
combinations thereof.
Description
[0001] The features described herein relate generally to media
content. Some aspects relate to systems and methods for monitoring
access to media content across disparate media devices.
BACKGROUND
[0002] Historically, radio receivers and televisions were the sole
providers of media content for households and other locations, such
as for example, schools. Modern households (and other locations)
now have several sources of media content. For example, it is not
uncommon for a single household to have multiple personal computers
(e.g., desktops and/or laptops) which may operate under different
operating systems, interactive televisions capable of receiving
various types of media, media servers that may access or store
media content, as well as additional portable media devices, such
as PDA, smart phones, or media players, that can be used remotely
from the home.
[0003] Having multiple media devices provides an ability to receive
(and transmit) vast amounts of media content. Thus, certain
individuals, especially children, may spend several hours a day
accessing media from several devices. For example, a child may
spend two hours watching broadcast television programming, one hour
watching interactive media content from a media server, and then
spend another hour on a computer or playing games on a video game
console. In this regard, it is unlikely that each media device is
configurable to have parental control mechanisms. Further, even if
a parent or guardian properly configures parental controls for a
media device, such as for example, a television configured to
display multimedia content, a child may bypass such controls by
accessing media content on any other media device, such as for
example, a portable media device or computer. To further aggravate
this problem, presently available usage monitoring and control
systems may be restricted to individual media devices and do not
aggregate and converge usage restrictions across media content type
and/or across disparate media device types.
[0004] Therefore, there is a need in the art for improved systems
and methods for monitoring access to various types of media content
across disparate media devices.
SUMMARY
[0005] Aspects of this disclosure relate to systems and methods for
monitoring the access of media content by one or more users.
Further aspects relate to systems and methods that may be
implemented to control access to media content. Still further
aspects relate to aggregating media usage or control rules across
disparate media types. Yet still further aspects relate to
aggregating media usage or control rules across disparate
electronic devices. These and other aspects are discussed below in
relation to illustrative embodiments, which serve to provide the
reader with an understanding of the various aspects, but do no
limit this overall disclosure.
[0006] In accordance with one embodiment, usage control rules
regarding usage parameters for several users may be received. The
usage control rules may define usage parameters of a user for
several disparate media devices. Further embodiments are directed
towards the construction of such usage control rules. For example,
an individual (such as a parent or guardian) may provide
instructions utilized to construct one or more rules. The
instructions may be received from user inputs provided to a
graphical user interface accessible from one or more of the
disparate media devices. According to various embodiments, the
usage control rules may comprise several individual components,
including one or more of: a device rule, a media content rule, a
media usage rule, and/or a media type rule. Exemplary rules are
explained below in the Detailed Description.
[0007] In accordance with various embodiments, a request to access
media content may be received via a user input received at one of
the plurality of disparate media devices. In response, usage
control rules may be applied against stored usage data for that
user to determine if they are permitted to access the requested
media content. Authentication of the user requesting access the
media content may be required. In certain embodiments, a memory
comprising a security key may be required to be operatively
connected to the disparate media device for media content to be
accessed. An exemplary security key may have an interface that is
configured to operatively connect with a corresponding interface of
at least two of the disparate media devices, so as to enable its
connection with a plurality of media devices. The security key may
comprise a non-transitory memory configured to store one or more
usage control rules and/or usage data regarding aspects of the
media content accessed by the user. Other removable memories, in
addition to or in lieu of any security key, may be used to store
rules and/or usage data.
[0008] In certain embodiments, permitting or determining that a
user is permitted to access media content may result in storing
additional usage data regarding the media permitted to be accessed.
In one such embodiment, usage data may be utilized in conjunction
with the convergence of device and/or media usage rules. For
example, certain implementations may monitor the usage data to
determine if the user's usage of the disparate devices violates the
rules. In further embodiments, a determination that the user has
violated at least one of the media usage rules may result in
transmittal of a notification to a third party. The notification
may comprise information regarding the violation, including which
rule was violated and/or information regarding the media content
accessed by the user. The notification may further comprise
information, including for example, a link that allows the
recipient of the notification to override one or more rules, thus
permitting the requesting user to access media content blocked in
accordance with the applicable rules.
[0009] Further embodiments may detect a new disparate media device.
For example, in one embodiment, a gateway device may detect
communications with a new media device in a network. In certain
embodiments, at least a portion of requested media content directed
toward the new disparate device may be blocked.
[0010] Aspects of the embodiments may be provided in a
non-transitory computer-readable medium having computer-executable
instructions to perform one or more of the process steps described
herein. Other details and features will also be described in the
sections that follow. This summary is not intended to identify
critical or essential features of the inventions claimed herein,
but instead merely summarizes certain features and variations
thereof.
BRIEF DESCRIPTION
[0011] Some features herein are illustrated by way of example, and
not by way of limitation, in the figures of the accompanying
drawings and in which like reference numerals refer to similar
elements.
[0012] FIG. 1 illustrates an example content distribution network
in accordance with an aspect of the disclosure;
[0013] FIG. 2 illustrates an example content access device in
communication with a service provider system in accordance with an
aspect of the disclosure;
[0014] FIGS. 3 is an exemplary flowchart showing a method in
accordance with an aspect of the disclosure; and
[0015] FIG. 4 is an exemplary graphical user interface that may be
implemented in accordance with an aspect of the disclosure.
DETAILED DESCRIPTION
[0016] In accordance with various aspects of the embodiments,
methods, computer-readable media, and apparatuses are disclosed
that assist in the creation, implementation, monitoring, review,
and control of access rights for various users across different
media types and/or media devices.
[0017] FIG. 1 illustrates an example content distribution network
that may be used to access various types of information, such as
data, video content (movies, pay-per-view, etc.), audio content,
Internet or other network, etc., in accordance with an aspect of
the disclosure. Starting with a location, which may be a user's
home 100 (or any other location), the user may have a network
interface device such as a gateway 101. Gateway 101 may be a device
(such as a coaxial cable modem, optical fiber modem, wireless
device, etc.) that is configured to communicate with another
corresponding device 102 via intermediate communication links 103.
The nature of the devices 101/102 may depend on the type of
communication links 103 being used. For example, links 103 may be
coaxial cables, in which case the modems 101/102 may be a coaxial
cable modem and a cable modem termination server, respectively.
Other types of links may be used as well, such as wireless links,
optical lines, hybrid fiber/coaxial cable, satellite, cellular
telephone, local wireless WIMAX, etc., and different corresponding
types of interface devices 101/102 may be used. Those skilled in
the art will appreciate that links 103 may be used to distribute
media content to other locations, such as location 100a, which may
also have a plurality of media content devices.
[0018] In certain embodiments, a device, such as device 102, may be
located external to the home 100, such as at a service provider's
headend or central office 150. Device 102 may communicate with one
or more other servers 104, which may in turn be connected to an
even larger communication network 105. Communication network 105
may be any desired type of network, such as a wide area network
(WAN), cellular telephone, satellite network, Internet, intranet,
etc., and may offer connection to even more servers 106. Those
other servers 106 may, in turn, provide various types of services
such as delivery of media content, shopping, etc.
[0019] In an embodiment, data corresponding to services may be
transmitted and received from device 102 or central office 150.
Data may include broadcast data (e.g. television broadcast
programming), narrowcast data (e.g., VOD and switched digital video
(SDV) programming) and unicast data (e.g., high speed data (HSD)
service providing Internet connectivity to users and VoIP or other
type of telephone service). The backbone network may be, e.g., a
service provider's national IP network, the Internet, and/or a
combination of the Internet and a service operator's network.
Therefore, as would be understood by a person of ordinary skill in
the art, one or more users at locations 100 and 100a may
simultaneously access different media content through one or more
different media devices.
[0020] Within home 100, gateway 101 may allow any device in the
home to access device 102 and, in turn, any of the other servers
104/106 and network 105. To provide this connectivity, gateway 101
may be connected to one or more in-home communication networks 107
(e.g., in-home coaxial cable, wireless, optical fiber, MoCA
(Multimedia Over Coax Alliance), Ethernet, power line network,
etc.). Other devices, such as a media interface device 108 (e.g.,
set-top box, digital video recorder, mobile television, television,
computer, mobile telephone, etc.) may also be utilized in
accordance with various implementations. Indeed, any device which
is configured to access or receive media content is within the
scope of this disclosure. Further devices which may be configured
to receive media content in accordance with various embodiments may
include, for example, computer 109, and/or wireless access point
110 which may permit connectivity to wireless computer 113. In some
embodiments, a home may have multiple gateways, and in other
embodiments, some or all of the gateways may be integrated into the
various devices described herein. So, for example, video interface
device 108 may include gateway 101, but to simplify the present
discussion, FIG. 1 discusses media interface device 108 and gateway
101 separately.
[0021] The in-home devices may use gateway 101 for any variety of
purposes, such as accessing the Internet, accessing servers 106,
etc. Some devices, such as media interface device 108, may use
gateway 101 to receive media content that is then displayed on a
display device such as a television, mobile device, or computer
monitor 111. As discussed in more detail below, one or more
devices, such as media interface device may comprise interface 112
to allow the operative but removable connection of a memory.
[0022] Media interface device 108, computer 109, wireless computer
113, display 111 and/or other media devices may be disparate
devices that are configured to utilize different protocols and
processes to access media content that differ from another media
device. For example, media interface device 108 may be a set-top
box configured to receive media in MPEG-2 format. Display 111 may
be an interactive display device comprising a network connection
through gateway 101 independent of media interface device 108. In
one embodiment, display 111 may directly receive media content in a
format different than received from media interface device 108 and
then viewable on display 111. For example, display 111 may be
configured to receive video data through the TCP/IP protocol or
another protocol. Similarly, computer 109 and/or wireless computer
113 may allow various users to navigate (such as with a software
browser) to an HTTP site and download, stream, or otherwise access
media content. In this regard, computer 109 and/or wireless
computer 113 may operate totally independently of media interface
device 108. Thus, in certain embodiments, media interface device
108 may not be required to be present or powered on for the
functionality of display 111, computer 109 or wireless computer
113. In fact, in certain embodiments, even if media interface
device 108 is powered on, it would have no effect on the usage of
computer 109 or wireless computer 113. In this regard, usage of
computer 109, wireless computer 113, and/or media interface device
108 cannot be universally monitored or controlled under prior art
systems and methods.
[0023] Exemplary components of an illustrative media device, such
as one or more of media interface device 108, computer 109,
wireless computer 113, display 111 are shown in FIG. 2 as device
220. Those skilled in the art will readily appreciate that the
components shown and described in relation to FIG. 2 are merely
illustrative and that more or fewer components may be present in
one or more disparate media devices. Device 220 may include one or
more processors 201. Processor 201 may be general purpose or
application specific, and may be configured to execute software
instructions that are stored on a non-transitory computer-readable
memory 202 to cause the device 108 to perform any of the features
described herein. Memory 202 may be any desired type of
computer-readable medium, such as one or more hard drives, magnetic
and/or optical disk drives, FLASH memory, etc. Memory 202 may store
one or more computer-executable instructions that when executed by
a processor, such as processor 201, execute methods disclosed
herein.
[0024] Turning briefly to FIG. 3, flowchart 300 shows an exemplary
method in accordance with various embodiments. One or more portions
of flowchart 300 may be implemented in applying media usage or
control rules across disparate media types and/or devices. In one
embodiment, step 302 may be implemented to receive rules regarding
usage control parameters for a first user across a collection of
disparate media devices. In one embodiment, usage parameters may be
associated with a user account. Depending on the embodiment, a
first user may comprise a group or collection of individuals
associated with a first account, such as members of a family, or
employees of a business. Indeed, any group or collection of
individuals may be a user in accordance with various embodiments.
Yet in other embodiments, a user account may be associated with a
single user. For example, each family member or person in a
household may have their own user account. In certain embodiments,
a user, such as a parent or a guardian of a child or minor at a
location, may use one or more of the disparate media devices to
provide the usage control rules. For example, in one embodiment,
processor 201 of media interface device 108 may receive inputs and
commands from a user via one or more user input interfaces 203. A
wide variety of user input interfaces 203 may be used. For example,
the user input interface 203 may include an infrared receiver
circuit, configured to receive inputs from a handheld infrared
remote control. The input interface 203 may include one or more
pushbuttons physically located on a chassis of the device 108.
Other user input interfaces may include keyboards, mice, touch
pads, microphones, trackballs, and optical devices, such as
cameras. Thus, in certain embodiments, a user may provide inputs
directly into one of the disparate media devices that affect
another individual's access of media content across one or more of
the disparate media devices.
[0025] Processor 201 may also provide outputs to an individual via
one or more output user interfaces 204. Any desired type of output
user interface can be used. For example, the output interface 204
may include a video signal interface (e.g., HDMI--High Definition
Multimedia Interface video, analog/component/composite video,
VGA--Video Graphics Adapter, DVI--Digital Video Interface, etc.),
audio signal interface (e.g., multiple audio channel output lines,
piezoelectric buzzers, etc.), wireless output (may be combined with
wireless user input interface 203 as well). In one embodiment, a
display, such as display 111, may output audiovisual information
from any of the media devices, including for example, media
interface device 108.
[0026] FIG. 4 shows an exemplary graphical user interface ("GUI")
400 that may be provided on a display, such as display 111, to
allow a user to input one or more usage control rules. It is to be
understood that the exemplary rules discussed herein are merely
exemplary and that the reader is advised that any usage control
rules may comprise a combination of individual rules. For example,
some individual rules that may form the usage control rules are
described below and may include, for example, device rules, content
rules, media usage rules, media type rules and combinations thereof
Examples of these various rules will now be provided.
[0027] A device rule (e.g. "Device Rule 1"), for example, may allow
a user to set restrictions, including but not limited to, content
rules, media type rules, and/or media usage rules, in regard to a
specific device or groups of devices. For example, a parent or
guardian may desire to limit the reception of certain media content
on a first device, such as wireless computer 113, which may be a
gaming console. The parent or guardian, however, may not wish to
apply the same restrictions on another device such as computer 109,
which may be commonly used to perform school work or is in a
general family area that may be monitored. Therefore, Device Rule 1
may be configured to provide further restrictions for that
particular user on specific devices, such as computer 113 without
affecting (or at least to the same extent) usage of another device
by the same user. However, as will be discussed immediately below,
other rules may be combined with device rules or other rules, for
example, to create further limitations.
[0028] Certain aspects disclosed herein relate to providing a
graphical user interface (GUI) that allows a parent or guardian to
readily apply one or more rules, including device rules, to various
user accounts. Looking to exemplary GUI 400 of FIG. 4, a user input
may be received from a user input device. For example, a received
user input may be configured to select icon 402 labeled "DEVICE"
and choose among exemplary choices 404 to initiate establishing a
device rule for one or more of the disparate or similar media
devices. Upon selecting one or more devices from choices 404,
certain embodiments may permit the user to set other restrictions
for that device, such as content restrictions with icon 406 to
establish a content rule. Content (or any other) rules, however,
may apply to all disparate media devices chosen absent a device
rule to the contrary. For example, usage control rules may be
similar to:
[0029] Rule Set #1:
[0030] DEVICE #1=Device Rule 1 AND Content Rule 1; DEVICE #2=Device
Rule 2 AND Content Rule 2
[0031] Rule Set #2:
[0032] Content Rule 1
[0033] Therefore, under the first exemplary usage control rule
(Rule Set #1), application of the use of Device Rule 1 results in
"Content Rule 1" being applied to "DEVICE #1" and use of Device
Rule 2 results in "Content Rule 2" applied to "DEVICE #2". For
example, this rule may be implemented to create a usage rule where
a first device, such as media interface device 108, may view PG-13
video content, however, a second device, such as wireless computer
113, may only view or play media content rated PG or G. Conversely,
the second usage control rule (Rule Set #2) may not limit the
content rule to a specific media device or group of devices. Thus,
perhaps every device in the group may view or play PG-13 rated
media content. Those skilled in the art with the benefit of this
disclosure will appreciate that a usage control rule may have more
than one device rule for a given device. For example, one device
rule may apply to devices 1-3 while a second device rule applies to
devices 2-4, therefore, devices 2 and 3 are affected by each rule.
In this regard, a device rule may be a flag or other indicator
indicative that a command string applies to certain identified
devices, whereas absence of the device rule indicates that a
portion of the command string does not apply to that device.
[0034] In certain embodiments, a content rule, such as "Content
Rule #1" may limit or exclude certain content from being accessed
by the user (or, depending on other combinations of rules, a
content rule may only apply to a user when using a certain device).
Depending on the embodiment, content rules, or any other rule
disclosed herein, may be based upon a white-list dictating what
content is allowed or a black-list dictating what content is not
allowed to be accessed. Looking to exemplary GUI 400, content
choices (see, e.g., choices 408) may include ratings, such as G,
PG, PG-13 and R. In other embodiments, content rules may exclude
certain content, such as violence, regardless of the rating. Those
skilled in the art with the benefit of this disclosure will
appreciate that any combination of these and/or other criteria may
be combined. For example, content rules may be set in which a user
may set a first content rule to allow PG rated media content, but
allow PG-13 rated material if its content is marked as
"educational." Further, as discussed above, content rules may be
combined with other rules, including those disclosed herein. For
example, a user may be permitted to use media interface device 108
to view any and all G and PG rated materials but may use computer
109 (which may be a gaming console), to access G, PG and PG-13
games and other content. For example, such as rule may be generally
expressed as Rule Set #3:
[0035] Rule Set #3:
[0036] Device #1=Device Rule 1 AND Content Rule 1; Device #2=Device
Rule 2 AND Content Rule 3
[0037] Yet in further embodiments, rules may be configured to allow
a specific user of a group of devices to access G, PG and PG-13
materials unless such materials are accessed on computer 109 and
flagged as containing nudity or unless such materials are accessed
on wireless computer 113 and contain nudity or violence. Thus, in
this regard certain embodiments may create custom content rules,
which may include, for example, Rule Set #4:
[0038] Rule Set #4:
[0039] Content Rule 4 AND (Device #1=Device Rule 1 AND Content Rule
1) AND (Device #2=Device Rule 2 AND Content Rule 3)
[0040] Usage rules may dictate when and how the content may be
accessed. For example, icon 410 (labeled "Time Restraint") may
allow a user to select one or more media usage rules. In one
embodiment, a media usage rule may comprise time restraints for one
or more different devices. For example, time restraints may monitor
and/or limit the amount of time that a particular user or group of
users may use a device, group of devices, or utilize specific types
of media on one or more devices. As shown in choices 412, exemplary
time restraints may apply to one or more specific devices and/or a
collection of disparate media devices. Further, the time restraints
may vary according to the date. For example, extra time may be
allotted on one or more devices to access media content on weekends
or holidays. In certain embodiments, access restraints may be
further restricted by the content rules. For example, a user may be
allotted more time on certain days only in regards to content rated
PG or for games having educational content.
[0041] Further usage restraints may dictate how the accessed media
is used. For example, restraints may be set in regards to whether a
user may view, record, or play certain content (such as a game).
For example, illustrative usage control rules may include:
[0042] Rule Set #5:
[0043] Media Usage Rule 1 AND (Media Usage Rule 2 OR Media Usage
Rule 3)
[0044] Rule Set #6:
[0045] Media Usage Rule 1 AND (DEVICE #1=Device Rule 1 AND Media
Usage Rule 2 OR Media Usage Rule 3 AND CONTENT RULE 5)
[0046] Those skilled in the art with the benefit of this disclosure
will appreciate that any restraint regarding the usage of the
accessed information is within the scope of this disclosure.
[0047] Media type rules may dictate what type of media content may
be accessed. For example, icon 414 of exemplary GUI 400 shown in
FIG. 4 may allow a user to select one or more media type rules. In
one embodiment, a media type rule may comprise categories of media
types that may be considered, either alone or in combination with
other rules, such as device rules, content rules, or other rules.
As shown in choices 416, exemplary categories may comprise "VIDEO,"
"AUDIO," "VIDEO GAME," "VIDEO FROM SITE 1," or "VIDEO GAME FROM
SITE 2." For example, a usage rule may dictate that a user may only
view fifteen (15) hours of video and play five (5) hours of video
games each week, regardless of what disparate devices are utilized
to do so and thus such viewing or playing must be rated PG-13 or
lower. An exemplary rule may generally appear with an overall usage
control rule as, for example, Rule Set #7:
[0048] Rule Set #7:
[0049] (Media Type Rule 1 AND Media Usage Rule 2) AND Media Content
Rule 1
[0050] Those skilled in the art with the benefit of this disclosure
will readily appreciate that one or more media type rules may
overlap with other rules, such as content rules. Therefore, it
should be understood that discussion of different types of rules is
to provide examples of specific embodiments, and that the reader is
advised that there may be embodiments where a content rule may
encompass instructions that are described in relation to media type
rules herein.
[0051] Icon 418 may be provided to receive a user input regarding
actions to be taken if a violation occurred. In certain
embodiments, one or more of choices 420 may be executed to provide
a notification and/or terminate further access to the media
content. As discussed in more detail below in relation to block
310, a notification may be transmitted to the user accessing the
information and/or a third party, such as a parent or guardian.
[0052] The control rules may be stored across one or more
computer-readable media, such as memory 202, or any
computer-readable medium, including for example, on gateway 101,
corresponding device 102, device 104 or any of servers 106. The
determination of which devices are to be monitored and/or presented
on GUI 400 (such as described in relation to icon 402) may vary
according to certain implementations. In one embodiment, a user may
manually select or set up one or more media devices to be
monitored. In certain embodiments, one or more of the devices may
be electronically detected (either automatically or with assistance
by a user input). For example, some embodiments may utilize
Universal Plug and Play (UPnP) or other technologies to allow one
or more of the disparate media devices to be detected. Generally,
UPnP networking is typically based on IP addressing. Certain media
devices may have a Dynamic Host Configuration Protocol (DHCP)
client and searches for a DHCP server when the device is first
connected to the network. If no DHCP (or other type of technology)
server is available, a device may assign itself an address. If
during the DHCP transaction, a device obtains a domain name through
a DNS server or via DNS forwarding, the device may use that name in
subsequent network operations; otherwise, the device may use its IP
address. In certain embodiments, a discovery protocol may allow a
device to advertise its services to control points on the network.
Thus, GUI may utilize such information to determine information
about one or more of the devices in which a user wishes to
monitor.
[0053] Further, while icons 402, 406, 410, 414, and 418 are shown
as being presented on a single screenshot of GUI 400, those skilled
in the art will readily appreciate that the layout and design the
exemplary GUI 400 is merely for illustrative purposes to
demonstrate an exemplary implementation of receiving inputs from a
user, such as within the scope of block 302. Further drop down
menus, additional pages, and other mechanisms may be implemented to
create the rules. In another embodiment, a user may access a device
page. For example, a user may use computer 109 to access a HTTP
page accessible on another device, such as gateway 101, to create
and modify one or more rules. Yet in further embodiments, GUI 400
may be hosted from remote devices, such as any device in central
office 150 and/or from servers 106.
[0054] Turning again to FIG. 3, block 304 may be implemented to
authenticate a user requesting media content. Authentication may be
done through any process using any known system and devices known
to those of ordinary skill in the art. Authentication may include
the use of a password, biometric data, or any other security
feature. In certain embodiments, a user attempting to access media
content (or providing authentication before they may obtain media
content) may be required to provide a physical security key. For
example, in one embodiment, one or more media devices may include a
key interface, such as key interface 112. For example, key
interface is shown operatively connected to media interface device
108. Key interface 112 may be external or internal to any media
device. As shown in FIG. 2, key interface 112 may be configured to
operatively connect to physical key 209 through interface 211. In
one embodiment, interfaces 209/211 may comprise a Universal Serial
Bus (USB) interface. Those skilled in the art will appreciate that
any media interface that permits the operative communication of
physical key 209 with a device, such as media interface device 208
is within the scope of this disclosure.
[0055] Looking to the embodiment shown in FIG. 2, physical key 209
may consist essentially of a memory, such as memory 213. Yet, in
other embodiments, physical key 209 comprises memory 213, processor
215 and possibly additional components. Memory 213 may be a
read/write memory and may comprise identifying information
regarding the user attempting to access media content. In further
embodiments, the identifying information may comprise
authentication information. In still yet further embodiments,
memory 213 may comprise one or more usage rules applied to the user
account. In other embodiments, memory 213 may comprise information
relating to or regarding aspects of the media content accessed by
user ("usage data") during a monitoring period. In certain
embodiments, memory 213 may comprise both usage rules and usage
data for the user. As discussed above, aspects of this disclosure
permit the aggregation of rules across electronic devices and/or
media types. In accordance with various implementations, this may
be advantageous, for example, to ensure that all usage data is
recorded, even for devices that may not be tracked according to one
or more usage rules. Further, certain embodiments may be used to
monitor and/or restrict access to media content to devices that may
not be always connected to a communications network, such as
through gateway 101. In certain embodiments, connection of physical
key 209 to certain media devices, such as media interface device
108, may permit the access of usage data for collection or analysis
in another device, such as gateway 101 or servers 106. Other
embodiments, however, may not store any usage data on physical key
209.
[0056] Block 306 may be implemented in accordance with certain
embodiments to receive a request from the first user to access
media content on one of the disparate (and similar) media devices,
such as for example, wireless computer 113. As discussed above,
connection of physical key 209 may form at least a portion of this
request. In another embodiment, the connection of physical key 209
or an input of authentication information at block 304 is merely a
prerequisite of receiving a request for media content. In other
embodiment, the request may be received through user input
interface 203, such as through an infrared receiver circuit
configured to receive inputs from a handheld infrared remote
control.
[0057] In accordance with certain embodiments, the viewing of media
program guides (EPGs), menus or the like may not be quantified as
viewing media content that would be subtracted from the user's
remaining time. In other embodiments, limited viewing such as
scrolling or scanning channels may not be considered. For example,
memory 202 may comprise computer-executable instructions that when
executed by a processor, such as processor 201, initiate a timer
that detects when different media, such as a different channel of
TV programming, or a different game is loaded or accessed. The
timer may permit a predefined amount of media content to be viewed
before applying one or more rules. The amount of media content may
be measured in units of time or by units of received/transmitted
information through a device. In certain embodiments, certain rules
will always be applied. For example, if a user attempts to access
an R-rated movie in violation of the content rules (for example,
rules set through icon 406 of GUI 400), this may always be deemed a
restriction. However, accessing various PG-13 rated movies for a
few minutes in an attempt to locate media content of interest may
not apply one or more time restraint rules (such as set through
icon 410 of GUI 400).
[0058] At block 308, rules (including, for example, device rules,
content rules, media usage rules, media type rules and combinations
thereof) may be applied against usage data for the user accessing
the media content to determine if the user may access the requested
media content. The usage data may be based on the aggregate usage
of at least two disparate media devices or media types. If it is
determined that the user is not permitted to access the requested
media content, block 310 may be implemented. In one embodiment,
block 310 may prevent the viewing of the requested content and/or
transmitting a notification. The notification may be transmitted to
the display device, such as display 111, utilized to attempt to
view the requested media content. The notification may indicate
that the requested action violates one of the rules. The
notification may indicate which rule was violated.
[0059] Further embodiments may comprise transmitting a notification
to a media device or address associated with a third party, such as
a parent or guardian. For example, one or more media signals may be
transmitted via gateway 101 to an external location, such as
through, for example, optical lines, hybrid fiber/coaxial cable,
satellite, cellular telephone, local wireless WIMAX, or any other
communication pathways. For example, a user may use GUI 400 to
provide an email address or phone number to transmit a notification
to indicate the violation. The notification may include an
indication that a violation occurred. Other information that may be
included in the notification may include, but is not limited to:
time of the violation, any content accessed causing the violation,
further actions taken on one or more devices following the
violation, and combinations thereof. In further embodiments, the
notification may include a selectable link or other address that a
user may access that provides information regarding media access
for one or more user accounts that provides information regarding
usage of the devices. In certain embodiments, the third party may
over ride the violation and approve a request that was deemed to
violate one or more rules. Transmittal and reception of
notifications and related information may occur with or without the
knowledge of the user requesting the media content.
[0060] If it is determined that the user is permitted to access the
requested media content, the requested content may be transmitted
or otherwise made accessible for viewing or playing (see, block
312), and usage data regarding aspects of the accessed media
content may be recorded (see, block 314). For example, the content,
media type, time and duration of the access, and/or the device the
media is accessed from may be stored on a tangible, non-transitory
computer-readable medium. As discussed above, the usage data may be
stored on one or more local or remote computer-readable mediums.
Using usage data, a process may be implemented to determine if one
or more rules are violated. In certain embodiments, one or more
processes of may be similar to one or more processes discussed in
relation to block 310. For example, in the illustrated embodiment,
block 310 may be conducted to determine whether any violations have
occurred.
[0061] Further embodiments may issue notifications to provide a
warning or advisory that a threshold may be approaching (see, e.g.
block 316). For example, a user may have used 4.5 of 5 hours that
are allotted for PG-13 rated movies during the weekdays on certain
devices, therefore, in accordance with one embodiment, a
notification may provide an indication to the user that they only
have 0.5 hours left of viewing certain media content having content
meeting certain criteria (such as rated PG-13). In another
embodiment, a user may not be permitted to view any media content
on a device after 9:00 pm; therefore, a notification may be
transmitted at 8:30 pm indicating that the user has only 30 minutes
of viewing before a violation will occur.
[0062] Block 318 may be implemented to receive an indication that a
new media device is to monitored, such as a new device being
present. In certain embodiments, one or more processes may
determine that a new media device has been detected. For example,
gateway 101 may detect a new UPnP device or a device assigned an
address such as a DHCP address. The detection of media devices may
be performed in accordance with any of the processes described
herein and/or other processes known to those skilled in the art. In
certain embodiments, detection of a media device configured to
allow the access of media content may trigger a notification. One
or more notifications may prompt a user to set usage rules for the
device or otherwise incorporate the reception of media content
through the new device into the usage rules. The transmission of
notifications has been discussed throughout this disclosure and is
not repeated here.
[0063] In certain embodiments, certain users may not be permitted
to receive media content with new media devices until the device
has been approved by a third party, such as a parent or guardian,
or until usage rules for or regarding the device have been
established. For example, the detection of a new disparate media
device may be made by assignment of an address by a gateway device,
such as gateway device 101. In further embodiments, an indication
of traffic to a device may serve as detection of a new device. As
used in this context, a single housing, such as an interactive
television set may comprise two or more detectable devices. For
example, a first device may be a transceiver configured to receive
broadcast television services and the second device may be a
network interface configured to receive video through the a
protocol differing from the protocol delivering broadcast
television service, such as the TCP/IP protocol. In certain
embodiments, traffic received via gateway 101 directed towards a
media device may be blocked. In certain embodiments, only a portion
of traffic may be blocked. Blockage may depend on rules set for
similar devices. Such enforcement may be performed by
computer-executable instructions on a memory located locally, such
as on gateway 101 or remotely, such as on servers 106. Further,
those skilled in the art will appreciate that block 318 may occur
during, before, or after any process disclosed herein.
[0064] Aspects of the embodiments have been described in terms of
illustrative embodiments thereof Numerous other embodiments,
modifications and variations within the scope and spirit of the
appended claims will occur to persons of ordinary skill in the art
from a review of this disclosure. Although example embodiments are
described above, the various features and steps may be combined,
divided, omitted, and/or augmented in any desired manner, depending
on the specific secure process desired. For example, one of
ordinary skill in the art will appreciate that the steps
illustrated in the illustrative figures may be performed in other
than the recited order, and that one or more steps illustrated may
be optional in accordance with aspects of the embodiments. This
patent should not be limited to the example embodiments described,
but rather should have its scope determined by the claims that
follow.
* * * * *