US20120311673A1 - Media usage monitoring and control - Google Patents
Media usage monitoring and control Download PDFInfo
- Publication number
- US20120311673A1 US20120311673A1 US13/150,981 US201113150981A US2012311673A1 US 20120311673 A1 US20120311673 A1 US 20120311673A1 US 201113150981 A US201113150981 A US 201113150981A US 2012311673 A1 US2012311673 A1 US 2012311673A1
- Authority
- US
- United States
- Prior art keywords
- media
- user
- usage
- disparate
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the features described herein relate generally to media content. Some aspects relate to systems and methods for monitoring access to media content across disparate media devices.
- radio receivers and televisions were the sole providers of media content for households and other locations, such as for example, schools.
- Modern households (and other locations) now have several sources of media content.
- personal computers e.g., desktops and/or laptops
- interactive televisions capable of receiving various types of media
- media servers that may access or store media content
- additional portable media devices such as PDA, smart phones, or media players, that can be used remotely from the home.
- Having multiple media devices provides an ability to receive (and transmit) vast amounts of media content.
- certain individuals especially children, may spend several hours a day accessing media from several devices.
- a child may spend two hours watching broadcast television programming, one hour watching interactive media content from a media server, and then spend another hour on a computer or playing games on a video game console.
- each media device is configurable to have parental control mechanisms.
- a parent or guardian properly configures parental controls for a media device, such as for example, a television configured to display multimedia content
- a child may bypass such controls by accessing media content on any other media device, such as for example, a portable media device or computer.
- presently available usage monitoring and control systems may be restricted to individual media devices and do not aggregate and converge usage restrictions across media content type and/or across disparate media device types.
- aspects of this disclosure relate to systems and methods for monitoring the access of media content by one or more users. Further aspects relate to systems and methods that may be implemented to control access to media content. Still further aspects relate to aggregating media usage or control rules across disparate media types. Yet still further aspects relate to aggregating media usage or control rules across disparate electronic devices.
- usage control rules regarding usage parameters for several users may be received.
- the usage control rules may define usage parameters of a user for several disparate media devices. Further embodiments are directed towards the construction of such usage control rules.
- an individual such as a parent or guardian
- the usage control rules may comprise several individual components, including one or more of: a device rule, a media content rule, a media usage rule, and/or a media type rule. Exemplary rules are explained below in the Detailed Description.
- a request to access media content may be received via a user input received at one of the plurality of disparate media devices.
- usage control rules may be applied against stored usage data for that user to determine if they are permitted to access the requested media content.
- Authentication of the user requesting access the media content may be required.
- a memory comprising a security key may be required to be operatively connected to the disparate media device for media content to be accessed.
- An exemplary security key may have an interface that is configured to operatively connect with a corresponding interface of at least two of the disparate media devices, so as to enable its connection with a plurality of media devices.
- the security key may comprise a non-transitory memory configured to store one or more usage control rules and/or usage data regarding aspects of the media content accessed by the user.
- Other removable memories in addition to or in lieu of any security key, may be used to store rules and/or usage data.
- permitting or determining that a user is permitted to access media content may result in storing additional usage data regarding the media permitted to be accessed.
- usage data may be utilized in conjunction with the convergence of device and/or media usage rules. For example, certain implementations may monitor the usage data to determine if the user's usage of the disparate devices violates the rules. In further embodiments, a determination that the user has violated at least one of the media usage rules may result in transmittal of a notification to a third party.
- the notification may comprise information regarding the violation, including which rule was violated and/or information regarding the media content accessed by the user.
- the notification may further comprise information, including for example, a link that allows the recipient of the notification to override one or more rules, thus permitting the requesting user to access media content blocked in accordance with the applicable rules.
- a gateway device may detect communications with a new media device in a network.
- at least a portion of requested media content directed toward the new disparate device may be blocked.
- FIG. 1 illustrates an example content distribution network in accordance with an aspect of the disclosure
- FIG. 2 illustrates an example content access device in communication with a service provider system in accordance with an aspect of the disclosure
- FIGS. 3 is an exemplary flowchart showing a method in accordance with an aspect of the disclosure.
- FIG. 4 is an exemplary graphical user interface that may be implemented in accordance with an aspect of the disclosure.
- methods, computer-readable media, and apparatuses are disclosed that assist in the creation, implementation, monitoring, review, and control of access rights for various users across different media types and/or media devices.
- FIG. 1 illustrates an example content distribution network that may be used to access various types of information, such as data, video content (movies, pay-per-view, etc.), audio content, Internet or other network, etc., in accordance with an aspect of the disclosure.
- a location which may be a user's home 100 (or any other location)
- the user may have a network interface device such as a gateway 101 .
- Gateway 101 may be a device (such as a coaxial cable modem, optical fiber modem, wireless device, etc.) that is configured to communicate with another corresponding device 102 via intermediate communication links 103 .
- the nature of the devices 101 / 102 may depend on the type of communication links 103 being used.
- links 103 may be coaxial cables, in which case the modems 101 / 102 may be a coaxial cable modem and a cable modem termination server, respectively.
- Other types of links may be used as well, such as wireless links, optical lines, hybrid fiber/coaxial cable, satellite, cellular telephone, local wireless WIMAX, etc., and different corresponding types of interface devices 101 / 102 may be used.
- links 103 may be used to distribute media content to other locations, such as location 100 a , which may also have a plurality of media content devices.
- a device such as device 102
- Device 102 may communicate with one or more other servers 104 , which may in turn be connected to an even larger communication network 105 .
- Communication network 105 may be any desired type of network, such as a wide area network (WAN), cellular telephone, satellite network, Internet, intranet, etc., and may offer connection to even more servers 106 .
- WAN wide area network
- Those other servers 106 may, in turn, provide various types of services such as delivery of media content, shopping, etc.
- data corresponding to services may be transmitted and received from device 102 or central office 150 .
- Data may include broadcast data (e.g. television broadcast programming), narrowcast data (e.g., VOD and switched digital video (SDV) programming) and unicast data (e.g., high speed data (HSD) service providing Internet connectivity to users and VoIP or other type of telephone service).
- the backbone network may be, e.g., a service provider's national IP network, the Internet, and/or a combination of the Internet and a service operator's network. Therefore, as would be understood by a person of ordinary skill in the art, one or more users at locations 100 and 100 a may simultaneously access different media content through one or more different media devices.
- gateway 101 may allow any device in the home to access device 102 and, in turn, any of the other servers 104 / 106 and network 105 .
- gateway 101 may be connected to one or more in-home communication networks 107 (e.g., in-home coaxial cable, wireless, optical fiber, MoCA (Multimedia Over Coax Alliance), Ethernet, power line network, etc.).
- in-home communication networks 107 e.g., in-home coaxial cable, wireless, optical fiber, MoCA (Multimedia Over Coax Alliance), Ethernet, power line network, etc.
- Other devices, such as a media interface device 108 e.g., set-top box, digital video recorder, mobile television, television, computer, mobile telephone, etc.
- any device which is configured to access or receive media content is within the scope of this disclosure.
- Further devices which may be configured to receive media content in accordance with various embodiments may include, for example, computer 109 , and/or wireless access point 110 which may permit connectivity to wireless computer 113 .
- a home may have multiple gateways, and in other embodiments, some or all of the gateways may be integrated into the various devices described herein. So, for example, video interface device 108 may include gateway 101 , but to simplify the present discussion, FIG. 1 discusses media interface device 108 and gateway 101 separately.
- the in-home devices may use gateway 101 for any variety of purposes, such as accessing the Internet, accessing servers 106 , etc. Some devices, such as media interface device 108 , may use gateway 101 to receive media content that is then displayed on a display device such as a television, mobile device, or computer monitor 111 . As discussed in more detail below, one or more devices, such as media interface device may comprise interface 112 to allow the operative but removable connection of a memory.
- Media interface device 108 , computer 109 , wireless computer 113 , display 111 and/or other media devices may be disparate devices that are configured to utilize different protocols and processes to access media content that differ from another media device.
- media interface device 108 may be a set-top box configured to receive media in MPEG-2 format.
- Display 111 may be an interactive display device comprising a network connection through gateway 101 independent of media interface device 108 .
- display 111 may directly receive media content in a format different than received from media interface device 108 and then viewable on display 111 .
- display 111 may be configured to receive video data through the TCP/IP protocol or another protocol.
- computer 109 and/or wireless computer 113 may allow various users to navigate (such as with a software browser) to an HTTP site and download, stream, or otherwise access media content.
- computer 109 and/or wireless computer 113 may operate totally independently of media interface device 108 .
- media interface device 108 may not be required to be present or powered on for the functionality of display 111 , computer 109 or wireless computer 113 .
- even if media interface device 108 is powered on it would have no effect on the usage of computer 109 or wireless computer 113 .
- usage of computer 109 , wireless computer 113 , and/or media interface device 108 cannot be universally monitored or controlled under prior art systems and methods.
- Device 220 may include one or more processors 201 .
- Processor 201 may be general purpose or application specific, and may be configured to execute software instructions that are stored on a non-transitory computer-readable memory 202 to cause the device 108 to perform any of the features described herein.
- Memory 202 may be any desired type of computer-readable medium, such as one or more hard drives, magnetic and/or optical disk drives, FLASH memory, etc.
- Memory 202 may store one or more computer-executable instructions that when executed by a processor, such as processor 201 , execute methods disclosed herein.
- flowchart 300 shows an exemplary method in accordance with various embodiments.
- One or more portions of flowchart 300 may be implemented in applying media usage or control rules across disparate media types and/or devices.
- step 302 may be implemented to receive rules regarding usage control parameters for a first user across a collection of disparate media devices.
- usage parameters may be associated with a user account.
- a first user may comprise a group or collection of individuals associated with a first account, such as members of a family, or employees of a business. Indeed, any group or collection of individuals may be a user in accordance with various embodiments.
- a user account may be associated with a single user.
- processor 201 of media interface device 108 may receive inputs and commands from a user via one or more user input interfaces 203 .
- user input interfaces 203 may be used.
- the user input interface 203 may include an infrared receiver circuit, configured to receive inputs from a handheld infrared remote control.
- the input interface 203 may include one or more pushbuttons physically located on a chassis of the device 108 .
- Other user input interfaces may include keyboards, mice, touch pads, microphones, trackballs, and optical devices, such as cameras.
- a user may provide inputs directly into one of the disparate media devices that affect another individual's access of media content across one or more of the disparate media devices.
- Processor 201 may also provide outputs to an individual via one or more output user interfaces 204 .
- the output interface 204 may include a video signal interface (e.g., HDMI—High Definition Multimedia Interface video, analog/component/composite video, VGA—Video Graphics Adapter, DVI—Digital Video Interface, etc.), audio signal interface (e.g., multiple audio channel output lines, piezoelectric buzzers, etc.), wireless output (may be combined with wireless user input interface 203 as well).
- a display such as display 111 , may output audiovisual information from any of the media devices, including for example, media interface device 108 .
- FIG. 4 shows an exemplary graphical user interface (“GUI”) 400 that may be provided on a display, such as display 111 , to allow a user to input one or more usage control rules.
- GUI graphical user interface
- the exemplary rules discussed herein are merely exemplary and that the reader is advised that any usage control rules may comprise a combination of individual rules.
- some individual rules that may form the usage control rules are described below and may include, for example, device rules, content rules, media usage rules, media type rules and combinations thereof Examples of these various rules will now be provided.
- a device rule may allow a user to set restrictions, including but not limited to, content rules, media type rules, and/or media usage rules, in regard to a specific device or groups of devices.
- a parent or guardian may desire to limit the reception of certain media content on a first device, such as wireless computer 113 , which may be a gaming console.
- the parent or guardian may not wish to apply the same restrictions on another device such as computer 109 , which may be commonly used to perform school work or is in a general family area that may be monitored.
- Device Rule 1 may be configured to provide further restrictions for that particular user on specific devices, such as computer 113 without affecting (or at least to the same extent) usage of another device by the same user.
- other rules may be combined with device rules or other rules, for example, to create further limitations.
- GUI 400 graphical user interface
- a user input may be received from a user input device.
- a received user input may be configured to select icon 402 labeled “DEVICE” and choose among exemplary choices 404 to initiate establishing a device rule for one or more of the disparate or similar media devices.
- DEVICE graphical user interface
- certain embodiments may permit the user to set other restrictions for that device, such as content restrictions with icon 406 to establish a content rule.
- Content (or any other) rules may apply to all disparate media devices chosen absent a device rule to the contrary.
- usage control rules may be similar to:
- this rule may be implemented to create a usage rule where a first device, such as media interface device 108 , may view PG-13 video content, however, a second device, such as wireless computer 113 , may only view or play media content rated PG or G.
- the second usage control rule may not limit the content rule to a specific media device or group of devices. Thus, perhaps every device in the group may view or play PG-13 rated media content.
- a usage control rule may have more than one device rule for a given device. For example, one device rule may apply to devices 1 - 3 while a second device rule applies to devices 2 - 4 , therefore, devices 2 and 3 are affected by each rule.
- a device rule may be a flag or other indicator indicative that a command string applies to certain identified devices, whereas absence of the device rule indicates that a portion of the command string does not apply to that device.
- a content rule such as “Content Rule # 1 ” may limit or exclude certain content from being accessed by the user (or, depending on other combinations of rules, a content rule may only apply to a user when using a certain device).
- content rules, or any other rule disclosed herein may be based upon a white-list dictating what content is allowed or a black-list dictating what content is not allowed to be accessed.
- content choices see, e.g., choices 408
- ratings such as G, PG, PG-13 and R.
- content rules may exclude certain content, such as violence, regardless of the rating.
- content rules may be set in which a user may set a first content rule to allow PG rated media content, but allow PG-13 rated material if its content is marked as “educational.” Further, as discussed above, content rules may be combined with other rules, including those disclosed herein. For example, a user may be permitted to use media interface device 108 to view any and all G and PG rated materials but may use computer 109 (which may be a gaming console), to access G, PG and PG-13 games and other content. For example, such as rule may be generally expressed as Rule Set # 3 :
- Device # 1 Device Rule 1 AND Content Rule 1 ;
- Device # 2 Device Rule 2 AND Content Rule 3
- rules may be configured to allow a specific user of a group of devices to access G, PG and PG-13 materials unless such materials are accessed on computer 109 and flagged as containing nudity or unless such materials are accessed on wireless computer 113 and contain nudity or violence.
- rules may create custom content rules, which may include, for example, Rule Set # 4 :
- Usage rules may dictate when and how the content may be accessed.
- icon 410 labeled “Time Restraint” may allow a user to select one or more media usage rules.
- a media usage rule may comprise time restraints for one or more different devices.
- time restraints may monitor and/or limit the amount of time that a particular user or group of users may use a device, group of devices, or utilize specific types of media on one or more devices.
- exemplary time restraints may apply to one or more specific devices and/or a collection of disparate media devices. Further, the time restraints may vary according to the date. For example, extra time may be allotted on one or more devices to access media content on weekends or holidays. In certain embodiments, access restraints may be further restricted by the content rules. For example, a user may be allotted more time on certain days only in regards to content rated PG or for games having educational content.
- Further usage restraints may dictate how the accessed media is used. For example, restraints may be set in regards to whether a user may view, record, or play certain content (such as a game). For example, illustrative usage control rules may include:
- Media type rules may dictate what type of media content may be accessed.
- icon 414 of exemplary GUI 400 shown in FIG. 4 may allow a user to select one or more media type rules.
- a media type rule may comprise categories of media types that may be considered, either alone or in combination with other rules, such as device rules, content rules, or other rules.
- exemplary categories may comprise “VIDEO,” “AUDIO,” “VIDEO GAME,” “VIDEO FROM SITE 1 ,” or “VIDEO GAME FROM SITE 2 .”
- a usage rule may dictate that a user may only view fifteen (15) hours of video and play five (5) hours of video games each week, regardless of what disparate devices are utilized to do so and thus such viewing or playing must be rated PG-13 or lower.
- An exemplary rule may generally appear with an overall usage control rule as, for example, Rule Set # 7 :
- media type rules may overlap with other rules, such as content rules. Therefore, it should be understood that discussion of different types of rules is to provide examples of specific embodiments, and that the reader is advised that there may be embodiments where a content rule may encompass instructions that are described in relation to media type rules herein.
- Icon 418 may be provided to receive a user input regarding actions to be taken if a violation occurred.
- one or more of choices 420 may be executed to provide a notification and/or terminate further access to the media content.
- a notification may be transmitted to the user accessing the information and/or a third party, such as a parent or guardian.
- the control rules may be stored across one or more computer-readable media, such as memory 202 , or any computer-readable medium, including for example, on gateway 101 , corresponding device 102 , device 104 or any of servers 106 .
- the determination of which devices are to be monitored and/or presented on GUI 400 may vary according to certain implementations.
- a user may manually select or set up one or more media devices to be monitored.
- one or more of the devices may be electronically detected (either automatically or with assistance by a user input).
- UPI Universal Plug and Play
- UPnP networking is typically based on IP addressing.
- Certain media devices may have a Dynamic Host Configuration Protocol (DHCP) client and searches for a DHCP server when the device is first connected to the network. If no DHCP (or other type of technology) server is available, a device may assign itself an address. If during the DHCP transaction, a device obtains a domain name through a DNS server or via DNS forwarding, the device may use that name in subsequent network operations; otherwise, the device may use its IP address.
- a discovery protocol may allow a device to advertise its services to control points on the network. Thus, GUI may utilize such information to determine information about one or more of the devices in which a user wishes to monitor.
- GUI 400 is merely for illustrative purposes to demonstrate an exemplary implementation of receiving inputs from a user, such as within the scope of block 302 .
- Further drop down menus, additional pages, and other mechanisms may be implemented to create the rules.
- a user may access a device page.
- a user may use computer 109 to access a HTTP page accessible on another device, such as gateway 101 , to create and modify one or more rules.
- GUI 400 may be hosted from remote devices, such as any device in central office 150 and/or from servers 106 .
- block 304 may be implemented to authenticate a user requesting media content. Authentication may be done through any process using any known system and devices known to those of ordinary skill in the art. Authentication may include the use of a password, biometric data, or any other security feature. In certain embodiments, a user attempting to access media content (or providing authentication before they may obtain media content) may be required to provide a physical security key.
- one or more media devices may include a key interface, such as key interface 112 .
- key interface is shown operatively connected to media interface device 108 . Key interface 112 may be external or internal to any media device. As shown in FIG.
- key interface 112 may be configured to operatively connect to physical key 209 through interface 211 .
- interfaces 209 / 211 may comprise a Universal Serial Bus (USB) interface.
- USB Universal Serial Bus
- physical key 209 may consist essentially of a memory, such as memory 213 .
- physical key 209 comprises memory 213 , processor 215 and possibly additional components.
- Memory 213 may be a read/write memory and may comprise identifying information regarding the user attempting to access media content. In further embodiments, the identifying information may comprise authentication information.
- memory 213 may comprise one or more usage rules applied to the user account. In other embodiments, memory 213 may comprise information relating to or regarding aspects of the media content accessed by user (“usage data”) during a monitoring period. In certain embodiments, memory 213 may comprise both usage rules and usage data for the user.
- aspects of this disclosure permit the aggregation of rules across electronic devices and/or media types. In accordance with various implementations, this may be advantageous, for example, to ensure that all usage data is recorded, even for devices that may not be tracked according to one or more usage rules. Further, certain embodiments may be used to monitor and/or restrict access to media content to devices that may not be always connected to a communications network, such as through gateway 101 . In certain embodiments, connection of physical key 209 to certain media devices, such as media interface device 108 , may permit the access of usage data for collection or analysis in another device, such as gateway 101 or servers 106 . Other embodiments, however, may not store any usage data on physical key 209 .
- Block 306 may be implemented in accordance with certain embodiments to receive a request from the first user to access media content on one of the disparate (and similar) media devices, such as for example, wireless computer 113 .
- connection of physical key 209 may form at least a portion of this request.
- the connection of physical key 209 or an input of authentication information at block 304 is merely a prerequisite of receiving a request for media content.
- the request may be received through user input interface 203 , such as through an infrared receiver circuit configured to receive inputs from a handheld infrared remote control.
- memory 202 may comprise computer-executable instructions that when executed by a processor, such as processor 201 , initiate a timer that detects when different media, such as a different channel of TV programming, or a different game is loaded or accessed.
- the timer may permit a predefined amount of media content to be viewed before applying one or more rules.
- the amount of media content may be measured in units of time or by units of received/transmitted information through a device. In certain embodiments, certain rules will always be applied.
- rules may be applied against usage data for the user accessing the media content to determine if the user may access the requested media content.
- the usage data may be based on the aggregate usage of at least two disparate media devices or media types. If it is determined that the user is not permitted to access the requested media content, block 310 may be implemented. In one embodiment, block 310 may prevent the viewing of the requested content and/or transmitting a notification.
- the notification may be transmitted to the display device, such as display 111 , utilized to attempt to view the requested media content.
- the notification may indicate that the requested action violates one of the rules.
- the notification may indicate which rule was violated.
- a media device or address associated with a third party such as a parent or guardian.
- one or more media signals may be transmitted via gateway 101 to an external location, such as through, for example, optical lines, hybrid fiber/coaxial cable, satellite, cellular telephone, local wireless WIMAX, or any other communication pathways.
- GUI 400 to provide an email address or phone number to transmit a notification to indicate the violation.
- the notification may include an indication that a violation occurred.
- Other information that may be included in the notification may include, but is not limited to: time of the violation, any content accessed causing the violation, further actions taken on one or more devices following the violation, and combinations thereof.
- the notification may include a selectable link or other address that a user may access that provides information regarding media access for one or more user accounts that provides information regarding usage of the devices.
- the third party may over ride the violation and approve a request that was deemed to violate one or more rules. Transmittal and reception of notifications and related information may occur with or without the knowledge of the user requesting the media content.
- the requested content may be transmitted or otherwise made accessible for viewing or playing (see, block 312 ), and usage data regarding aspects of the accessed media content may be recorded (see, block 314 ).
- the content, media type, time and duration of the access, and/or the device the media is accessed from may be stored on a tangible, non-transitory computer-readable medium.
- the usage data may be stored on one or more local or remote computer-readable mediums.
- a process may be implemented to determine if one or more rules are violated.
- one or more processes of may be similar to one or more processes discussed in relation to block 310 .
- block 310 may be conducted to determine whether any violations have occurred.
- Further embodiments may issue notifications to provide a warning or advisory that a threshold may be approaching (see, e.g. block 316 ). For example, a user may have used 4.5 of 5 hours that are allotted for PG-13 rated movies during the weekdays on certain devices, therefore, in accordance with one embodiment, a notification may provide an indication to the user that they only have 0.5 hours left of viewing certain media content having content meeting certain criteria (such as rated PG-13). In another embodiment, a user may not be permitted to view any media content on a device after 9:00 pm; therefore, a notification may be transmitted at 8:30 pm indicating that the user has only 30 minutes of viewing before a violation will occur.
- Block 318 may be implemented to receive an indication that a new media device is to monitored, such as a new device being present.
- one or more processes may determine that a new media device has been detected.
- gateway 101 may detect a new UPnP device or a device assigned an address such as a DHCP address.
- the detection of media devices may be performed in accordance with any of the processes described herein and/or other processes known to those skilled in the art.
- detection of a media device configured to allow the access of media content may trigger a notification.
- One or more notifications may prompt a user to set usage rules for the device or otherwise incorporate the reception of media content through the new device into the usage rules. The transmission of notifications has been discussed throughout this disclosure and is not repeated here.
- certain users may not be permitted to receive media content with new media devices until the device has been approved by a third party, such as a parent or guardian, or until usage rules for or regarding the device have been established.
- a third party such as a parent or guardian
- the detection of a new disparate media device may be made by assignment of an address by a gateway device, such as gateway device 101 .
- an indication of traffic to a device may serve as detection of a new device.
- a single housing, such as an interactive television set may comprise two or more detectable devices.
- a first device may be a transceiver configured to receive broadcast television services and the second device may be a network interface configured to receive video through the a protocol differing from the protocol delivering broadcast television service, such as the TCP/IP protocol.
- traffic received via gateway 101 directed towards a media device may be blocked.
- only a portion of traffic may be blocked. Blockage may depend on rules set for similar devices. Such enforcement may be performed by computer-executable instructions on a memory located locally, such as on gateway 101 or remotely, such as on servers 106 . Further, those skilled in the art will appreciate that block 318 may occur during, before, or after any process disclosed herein.
Abstract
Systems and methods of monitoring access to media content across disparate media devices are disclosed. Aspects relate to systems and methods that may be implemented to control access to media content. In one embodiment, rules may define usage parameters of a user for several types of media content and/or disparate media devices.
Description
- The features described herein relate generally to media content. Some aspects relate to systems and methods for monitoring access to media content across disparate media devices.
- Historically, radio receivers and televisions were the sole providers of media content for households and other locations, such as for example, schools. Modern households (and other locations) now have several sources of media content. For example, it is not uncommon for a single household to have multiple personal computers (e.g., desktops and/or laptops) which may operate under different operating systems, interactive televisions capable of receiving various types of media, media servers that may access or store media content, as well as additional portable media devices, such as PDA, smart phones, or media players, that can be used remotely from the home.
- Having multiple media devices provides an ability to receive (and transmit) vast amounts of media content. Thus, certain individuals, especially children, may spend several hours a day accessing media from several devices. For example, a child may spend two hours watching broadcast television programming, one hour watching interactive media content from a media server, and then spend another hour on a computer or playing games on a video game console. In this regard, it is unlikely that each media device is configurable to have parental control mechanisms. Further, even if a parent or guardian properly configures parental controls for a media device, such as for example, a television configured to display multimedia content, a child may bypass such controls by accessing media content on any other media device, such as for example, a portable media device or computer. To further aggravate this problem, presently available usage monitoring and control systems may be restricted to individual media devices and do not aggregate and converge usage restrictions across media content type and/or across disparate media device types.
- Therefore, there is a need in the art for improved systems and methods for monitoring access to various types of media content across disparate media devices.
- Aspects of this disclosure relate to systems and methods for monitoring the access of media content by one or more users. Further aspects relate to systems and methods that may be implemented to control access to media content. Still further aspects relate to aggregating media usage or control rules across disparate media types. Yet still further aspects relate to aggregating media usage or control rules across disparate electronic devices. These and other aspects are discussed below in relation to illustrative embodiments, which serve to provide the reader with an understanding of the various aspects, but do no limit this overall disclosure.
- In accordance with one embodiment, usage control rules regarding usage parameters for several users may be received. The usage control rules may define usage parameters of a user for several disparate media devices. Further embodiments are directed towards the construction of such usage control rules. For example, an individual (such as a parent or guardian) may provide instructions utilized to construct one or more rules. The instructions may be received from user inputs provided to a graphical user interface accessible from one or more of the disparate media devices. According to various embodiments, the usage control rules may comprise several individual components, including one or more of: a device rule, a media content rule, a media usage rule, and/or a media type rule. Exemplary rules are explained below in the Detailed Description.
- In accordance with various embodiments, a request to access media content may be received via a user input received at one of the plurality of disparate media devices. In response, usage control rules may be applied against stored usage data for that user to determine if they are permitted to access the requested media content. Authentication of the user requesting access the media content may be required. In certain embodiments, a memory comprising a security key may be required to be operatively connected to the disparate media device for media content to be accessed. An exemplary security key may have an interface that is configured to operatively connect with a corresponding interface of at least two of the disparate media devices, so as to enable its connection with a plurality of media devices. The security key may comprise a non-transitory memory configured to store one or more usage control rules and/or usage data regarding aspects of the media content accessed by the user. Other removable memories, in addition to or in lieu of any security key, may be used to store rules and/or usage data.
- In certain embodiments, permitting or determining that a user is permitted to access media content may result in storing additional usage data regarding the media permitted to be accessed. In one such embodiment, usage data may be utilized in conjunction with the convergence of device and/or media usage rules. For example, certain implementations may monitor the usage data to determine if the user's usage of the disparate devices violates the rules. In further embodiments, a determination that the user has violated at least one of the media usage rules may result in transmittal of a notification to a third party. The notification may comprise information regarding the violation, including which rule was violated and/or information regarding the media content accessed by the user. The notification may further comprise information, including for example, a link that allows the recipient of the notification to override one or more rules, thus permitting the requesting user to access media content blocked in accordance with the applicable rules.
- Further embodiments may detect a new disparate media device. For example, in one embodiment, a gateway device may detect communications with a new media device in a network. In certain embodiments, at least a portion of requested media content directed toward the new disparate device may be blocked.
- Aspects of the embodiments may be provided in a non-transitory computer-readable medium having computer-executable instructions to perform one or more of the process steps described herein. Other details and features will also be described in the sections that follow. This summary is not intended to identify critical or essential features of the inventions claimed herein, but instead merely summarizes certain features and variations thereof.
- Some features herein are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements.
-
FIG. 1 illustrates an example content distribution network in accordance with an aspect of the disclosure; -
FIG. 2 illustrates an example content access device in communication with a service provider system in accordance with an aspect of the disclosure; -
FIGS. 3 is an exemplary flowchart showing a method in accordance with an aspect of the disclosure; and -
FIG. 4 is an exemplary graphical user interface that may be implemented in accordance with an aspect of the disclosure. - In accordance with various aspects of the embodiments, methods, computer-readable media, and apparatuses are disclosed that assist in the creation, implementation, monitoring, review, and control of access rights for various users across different media types and/or media devices.
-
FIG. 1 illustrates an example content distribution network that may be used to access various types of information, such as data, video content (movies, pay-per-view, etc.), audio content, Internet or other network, etc., in accordance with an aspect of the disclosure. Starting with a location, which may be a user's home 100 (or any other location), the user may have a network interface device such as agateway 101. Gateway 101 may be a device (such as a coaxial cable modem, optical fiber modem, wireless device, etc.) that is configured to communicate with anothercorresponding device 102 viaintermediate communication links 103. The nature of thedevices 101/102 may depend on the type ofcommunication links 103 being used. For example,links 103 may be coaxial cables, in which case themodems 101/102 may be a coaxial cable modem and a cable modem termination server, respectively. Other types of links may be used as well, such as wireless links, optical lines, hybrid fiber/coaxial cable, satellite, cellular telephone, local wireless WIMAX, etc., and different corresponding types ofinterface devices 101/102 may be used. Those skilled in the art will appreciate thatlinks 103 may be used to distribute media content to other locations, such aslocation 100 a, which may also have a plurality of media content devices. - In certain embodiments, a device, such as
device 102, may be located external to thehome 100, such as at a service provider's headend orcentral office 150.Device 102 may communicate with one or moreother servers 104, which may in turn be connected to an evenlarger communication network 105.Communication network 105 may be any desired type of network, such as a wide area network (WAN), cellular telephone, satellite network, Internet, intranet, etc., and may offer connection to evenmore servers 106. Thoseother servers 106 may, in turn, provide various types of services such as delivery of media content, shopping, etc. - In an embodiment, data corresponding to services may be transmitted and received from
device 102 orcentral office 150. Data may include broadcast data (e.g. television broadcast programming), narrowcast data (e.g., VOD and switched digital video (SDV) programming) and unicast data (e.g., high speed data (HSD) service providing Internet connectivity to users and VoIP or other type of telephone service). The backbone network may be, e.g., a service provider's national IP network, the Internet, and/or a combination of the Internet and a service operator's network. Therefore, as would be understood by a person of ordinary skill in the art, one or more users atlocations - Within
home 100,gateway 101 may allow any device in the home to accessdevice 102 and, in turn, any of theother servers 104/106 andnetwork 105. To provide this connectivity,gateway 101 may be connected to one or more in-home communication networks 107 (e.g., in-home coaxial cable, wireless, optical fiber, MoCA (Multimedia Over Coax Alliance), Ethernet, power line network, etc.). Other devices, such as a media interface device 108 (e.g., set-top box, digital video recorder, mobile television, television, computer, mobile telephone, etc.) may also be utilized in accordance with various implementations. Indeed, any device which is configured to access or receive media content is within the scope of this disclosure. Further devices which may be configured to receive media content in accordance with various embodiments may include, for example,computer 109, and/orwireless access point 110 which may permit connectivity towireless computer 113. In some embodiments, a home may have multiple gateways, and in other embodiments, some or all of the gateways may be integrated into the various devices described herein. So, for example,video interface device 108 may includegateway 101, but to simplify the present discussion,FIG. 1 discussesmedia interface device 108 andgateway 101 separately. - The in-home devices may use
gateway 101 for any variety of purposes, such as accessing the Internet, accessingservers 106, etc. Some devices, such asmedia interface device 108, may usegateway 101 to receive media content that is then displayed on a display device such as a television, mobile device, orcomputer monitor 111. As discussed in more detail below, one or more devices, such as media interface device may compriseinterface 112 to allow the operative but removable connection of a memory. -
Media interface device 108,computer 109,wireless computer 113,display 111 and/or other media devices may be disparate devices that are configured to utilize different protocols and processes to access media content that differ from another media device. For example,media interface device 108 may be a set-top box configured to receive media in MPEG-2 format.Display 111 may be an interactive display device comprising a network connection throughgateway 101 independent ofmedia interface device 108. In one embodiment,display 111 may directly receive media content in a format different than received frommedia interface device 108 and then viewable ondisplay 111. For example,display 111 may be configured to receive video data through the TCP/IP protocol or another protocol. Similarly,computer 109 and/orwireless computer 113 may allow various users to navigate (such as with a software browser) to an HTTP site and download, stream, or otherwise access media content. In this regard,computer 109 and/orwireless computer 113 may operate totally independently ofmedia interface device 108. Thus, in certain embodiments,media interface device 108 may not be required to be present or powered on for the functionality ofdisplay 111,computer 109 orwireless computer 113. In fact, in certain embodiments, even ifmedia interface device 108 is powered on, it would have no effect on the usage ofcomputer 109 orwireless computer 113. In this regard, usage ofcomputer 109,wireless computer 113, and/ormedia interface device 108 cannot be universally monitored or controlled under prior art systems and methods. - Exemplary components of an illustrative media device, such as one or more of
media interface device 108,computer 109,wireless computer 113,display 111 are shown inFIG. 2 asdevice 220. Those skilled in the art will readily appreciate that the components shown and described in relation toFIG. 2 are merely illustrative and that more or fewer components may be present in one or more disparate media devices.Device 220 may include one ormore processors 201.Processor 201 may be general purpose or application specific, and may be configured to execute software instructions that are stored on a non-transitory computer-readable memory 202 to cause thedevice 108 to perform any of the features described herein.Memory 202 may be any desired type of computer-readable medium, such as one or more hard drives, magnetic and/or optical disk drives, FLASH memory, etc.Memory 202 may store one or more computer-executable instructions that when executed by a processor, such asprocessor 201, execute methods disclosed herein. - Turning briefly to
FIG. 3 ,flowchart 300 shows an exemplary method in accordance with various embodiments. One or more portions offlowchart 300 may be implemented in applying media usage or control rules across disparate media types and/or devices. In one embodiment, step 302 may be implemented to receive rules regarding usage control parameters for a first user across a collection of disparate media devices. In one embodiment, usage parameters may be associated with a user account. Depending on the embodiment, a first user may comprise a group or collection of individuals associated with a first account, such as members of a family, or employees of a business. Indeed, any group or collection of individuals may be a user in accordance with various embodiments. Yet in other embodiments, a user account may be associated with a single user. For example, each family member or person in a household may have their own user account. In certain embodiments, a user, such as a parent or a guardian of a child or minor at a location, may use one or more of the disparate media devices to provide the usage control rules. For example, in one embodiment,processor 201 ofmedia interface device 108 may receive inputs and commands from a user via one or more user input interfaces 203. A wide variety of user input interfaces 203 may be used. For example, theuser input interface 203 may include an infrared receiver circuit, configured to receive inputs from a handheld infrared remote control. Theinput interface 203 may include one or more pushbuttons physically located on a chassis of thedevice 108. Other user input interfaces may include keyboards, mice, touch pads, microphones, trackballs, and optical devices, such as cameras. Thus, in certain embodiments, a user may provide inputs directly into one of the disparate media devices that affect another individual's access of media content across one or more of the disparate media devices. -
Processor 201 may also provide outputs to an individual via one or moreoutput user interfaces 204. Any desired type of output user interface can be used. For example, theoutput interface 204 may include a video signal interface (e.g., HDMI—High Definition Multimedia Interface video, analog/component/composite video, VGA—Video Graphics Adapter, DVI—Digital Video Interface, etc.), audio signal interface (e.g., multiple audio channel output lines, piezoelectric buzzers, etc.), wireless output (may be combined with wirelessuser input interface 203 as well). In one embodiment, a display, such asdisplay 111, may output audiovisual information from any of the media devices, including for example,media interface device 108. -
FIG. 4 shows an exemplary graphical user interface (“GUI”) 400 that may be provided on a display, such asdisplay 111, to allow a user to input one or more usage control rules. It is to be understood that the exemplary rules discussed herein are merely exemplary and that the reader is advised that any usage control rules may comprise a combination of individual rules. For example, some individual rules that may form the usage control rules are described below and may include, for example, device rules, content rules, media usage rules, media type rules and combinations thereof Examples of these various rules will now be provided. - A device rule (e.g. “
Device Rule 1”), for example, may allow a user to set restrictions, including but not limited to, content rules, media type rules, and/or media usage rules, in regard to a specific device or groups of devices. For example, a parent or guardian may desire to limit the reception of certain media content on a first device, such aswireless computer 113, which may be a gaming console. The parent or guardian, however, may not wish to apply the same restrictions on another device such ascomputer 109, which may be commonly used to perform school work or is in a general family area that may be monitored. Therefore,Device Rule 1 may be configured to provide further restrictions for that particular user on specific devices, such ascomputer 113 without affecting (or at least to the same extent) usage of another device by the same user. However, as will be discussed immediately below, other rules may be combined with device rules or other rules, for example, to create further limitations. - Certain aspects disclosed herein relate to providing a graphical user interface (GUI) that allows a parent or guardian to readily apply one or more rules, including device rules, to various user accounts. Looking to
exemplary GUI 400 ofFIG. 4 , a user input may be received from a user input device. For example, a received user input may be configured to selecticon 402 labeled “DEVICE” and choose amongexemplary choices 404 to initiate establishing a device rule for one or more of the disparate or similar media devices. Upon selecting one or more devices fromchoices 404, certain embodiments may permit the user to set other restrictions for that device, such as content restrictions withicon 406 to establish a content rule. Content (or any other) rules, however, may apply to all disparate media devices chosen absent a device rule to the contrary. For example, usage control rules may be similar to: - Rule Set #1:
-
DEVICE # 1=Device Rule 1 ANDContent Rule 1;DEVICE # 2=Device Rule 2 ANDContent Rule 2 - Rule Set #2:
-
Content Rule 1 - Therefore, under the first exemplary usage control rule (Rule Set #1), application of the use of
Device Rule 1 results in “Content Rule 1” being applied to “DEVICE # 1” and use ofDevice Rule 2 results in “Content Rule 2” applied to “DEVICE # 2”. For example, this rule may be implemented to create a usage rule where a first device, such asmedia interface device 108, may view PG-13 video content, however, a second device, such aswireless computer 113, may only view or play media content rated PG or G. Conversely, the second usage control rule (Rule Set #2) may not limit the content rule to a specific media device or group of devices. Thus, perhaps every device in the group may view or play PG-13 rated media content. Those skilled in the art with the benefit of this disclosure will appreciate that a usage control rule may have more than one device rule for a given device. For example, one device rule may apply to devices 1-3 while a second device rule applies to devices 2-4, therefore,devices 2 and 3 are affected by each rule. In this regard, a device rule may be a flag or other indicator indicative that a command string applies to certain identified devices, whereas absence of the device rule indicates that a portion of the command string does not apply to that device. - In certain embodiments, a content rule, such as “
Content Rule # 1” may limit or exclude certain content from being accessed by the user (or, depending on other combinations of rules, a content rule may only apply to a user when using a certain device). Depending on the embodiment, content rules, or any other rule disclosed herein, may be based upon a white-list dictating what content is allowed or a black-list dictating what content is not allowed to be accessed. Looking toexemplary GUI 400, content choices (see, e.g., choices 408) may include ratings, such as G, PG, PG-13 and R. In other embodiments, content rules may exclude certain content, such as violence, regardless of the rating. Those skilled in the art with the benefit of this disclosure will appreciate that any combination of these and/or other criteria may be combined. For example, content rules may be set in which a user may set a first content rule to allow PG rated media content, but allow PG-13 rated material if its content is marked as “educational.” Further, as discussed above, content rules may be combined with other rules, including those disclosed herein. For example, a user may be permitted to usemedia interface device 108 to view any and all G and PG rated materials but may use computer 109 (which may be a gaming console), to access G, PG and PG-13 games and other content. For example, such as rule may be generally expressed as Rule Set #3: - Rule Set #3:
-
Device # 1=Device Rule 1 ANDContent Rule 1;Device # 2=Device Rule 2 AND Content Rule 3 - Yet in further embodiments, rules may be configured to allow a specific user of a group of devices to access G, PG and PG-13 materials unless such materials are accessed on
computer 109 and flagged as containing nudity or unless such materials are accessed onwireless computer 113 and contain nudity or violence. Thus, in this regard certain embodiments may create custom content rules, which may include, for example, Rule Set #4: - Rule Set #4:
- Content Rule 4 AND (
Device # 1=Device Rule 1 AND Content Rule 1) AND (Device # 2=Device Rule 2 AND Content Rule 3) - Usage rules may dictate when and how the content may be accessed. For example, icon 410 (labeled “Time Restraint”) may allow a user to select one or more media usage rules. In one embodiment, a media usage rule may comprise time restraints for one or more different devices. For example, time restraints may monitor and/or limit the amount of time that a particular user or group of users may use a device, group of devices, or utilize specific types of media on one or more devices. As shown in
choices 412, exemplary time restraints may apply to one or more specific devices and/or a collection of disparate media devices. Further, the time restraints may vary according to the date. For example, extra time may be allotted on one or more devices to access media content on weekends or holidays. In certain embodiments, access restraints may be further restricted by the content rules. For example, a user may be allotted more time on certain days only in regards to content rated PG or for games having educational content. - Further usage restraints may dictate how the accessed media is used. For example, restraints may be set in regards to whether a user may view, record, or play certain content (such as a game). For example, illustrative usage control rules may include:
- Rule Set #5:
-
Media Usage Rule 1 AND (Media Usage Rule 2 OR Media Usage Rule 3) - Rule Set #6:
-
Media Usage Rule 1 AND (DEVICE # 1=Device Rule 1 ANDMedia Usage Rule 2 OR Media Usage Rule 3 AND CONTENT RULE 5) - Those skilled in the art with the benefit of this disclosure will appreciate that any restraint regarding the usage of the accessed information is within the scope of this disclosure.
- Media type rules may dictate what type of media content may be accessed. For example,
icon 414 ofexemplary GUI 400 shown inFIG. 4 may allow a user to select one or more media type rules. In one embodiment, a media type rule may comprise categories of media types that may be considered, either alone or in combination with other rules, such as device rules, content rules, or other rules. As shown inchoices 416, exemplary categories may comprise “VIDEO,” “AUDIO,” “VIDEO GAME,” “VIDEO FROMSITE 1,” or “VIDEO GAME FROMSITE 2.” For example, a usage rule may dictate that a user may only view fifteen (15) hours of video and play five (5) hours of video games each week, regardless of what disparate devices are utilized to do so and thus such viewing or playing must be rated PG-13 or lower. An exemplary rule may generally appear with an overall usage control rule as, for example, Rule Set #7: - Rule Set #7:
- (
Media Type Rule 1 AND Media Usage Rule 2) ANDMedia Content Rule 1 - Those skilled in the art with the benefit of this disclosure will readily appreciate that one or more media type rules may overlap with other rules, such as content rules. Therefore, it should be understood that discussion of different types of rules is to provide examples of specific embodiments, and that the reader is advised that there may be embodiments where a content rule may encompass instructions that are described in relation to media type rules herein.
-
Icon 418 may be provided to receive a user input regarding actions to be taken if a violation occurred. In certain embodiments, one or more ofchoices 420 may be executed to provide a notification and/or terminate further access to the media content. As discussed in more detail below in relation to block 310, a notification may be transmitted to the user accessing the information and/or a third party, such as a parent or guardian. - The control rules may be stored across one or more computer-readable media, such as
memory 202, or any computer-readable medium, including for example, ongateway 101,corresponding device 102,device 104 or any ofservers 106. The determination of which devices are to be monitored and/or presented on GUI 400 (such as described in relation to icon 402) may vary according to certain implementations. In one embodiment, a user may manually select or set up one or more media devices to be monitored. In certain embodiments, one or more of the devices may be electronically detected (either automatically or with assistance by a user input). For example, some embodiments may utilize Universal Plug and Play (UPnP) or other technologies to allow one or more of the disparate media devices to be detected. Generally, UPnP networking is typically based on IP addressing. Certain media devices may have a Dynamic Host Configuration Protocol (DHCP) client and searches for a DHCP server when the device is first connected to the network. If no DHCP (or other type of technology) server is available, a device may assign itself an address. If during the DHCP transaction, a device obtains a domain name through a DNS server or via DNS forwarding, the device may use that name in subsequent network operations; otherwise, the device may use its IP address. In certain embodiments, a discovery protocol may allow a device to advertise its services to control points on the network. Thus, GUI may utilize such information to determine information about one or more of the devices in which a user wishes to monitor. - Further, while
icons GUI 400, those skilled in the art will readily appreciate that the layout and design theexemplary GUI 400 is merely for illustrative purposes to demonstrate an exemplary implementation of receiving inputs from a user, such as within the scope ofblock 302. Further drop down menus, additional pages, and other mechanisms may be implemented to create the rules. In another embodiment, a user may access a device page. For example, a user may usecomputer 109 to access a HTTP page accessible on another device, such asgateway 101, to create and modify one or more rules. Yet in further embodiments,GUI 400 may be hosted from remote devices, such as any device incentral office 150 and/or fromservers 106. - Turning again to
FIG. 3 , block 304 may be implemented to authenticate a user requesting media content. Authentication may be done through any process using any known system and devices known to those of ordinary skill in the art. Authentication may include the use of a password, biometric data, or any other security feature. In certain embodiments, a user attempting to access media content (or providing authentication before they may obtain media content) may be required to provide a physical security key. For example, in one embodiment, one or more media devices may include a key interface, such askey interface 112. For example, key interface is shown operatively connected tomedia interface device 108.Key interface 112 may be external or internal to any media device. As shown inFIG. 2 ,key interface 112 may be configured to operatively connect tophysical key 209 throughinterface 211. In one embodiment, interfaces 209/211 may comprise a Universal Serial Bus (USB) interface. Those skilled in the art will appreciate that any media interface that permits the operative communication ofphysical key 209 with a device, such as media interface device 208 is within the scope of this disclosure. - Looking to the embodiment shown in
FIG. 2 ,physical key 209 may consist essentially of a memory, such asmemory 213. Yet, in other embodiments,physical key 209 comprisesmemory 213,processor 215 and possibly additional components.Memory 213 may be a read/write memory and may comprise identifying information regarding the user attempting to access media content. In further embodiments, the identifying information may comprise authentication information. In still yet further embodiments,memory 213 may comprise one or more usage rules applied to the user account. In other embodiments,memory 213 may comprise information relating to or regarding aspects of the media content accessed by user (“usage data”) during a monitoring period. In certain embodiments,memory 213 may comprise both usage rules and usage data for the user. As discussed above, aspects of this disclosure permit the aggregation of rules across electronic devices and/or media types. In accordance with various implementations, this may be advantageous, for example, to ensure that all usage data is recorded, even for devices that may not be tracked according to one or more usage rules. Further, certain embodiments may be used to monitor and/or restrict access to media content to devices that may not be always connected to a communications network, such as throughgateway 101. In certain embodiments, connection ofphysical key 209 to certain media devices, such asmedia interface device 108, may permit the access of usage data for collection or analysis in another device, such asgateway 101 orservers 106. Other embodiments, however, may not store any usage data onphysical key 209. -
Block 306 may be implemented in accordance with certain embodiments to receive a request from the first user to access media content on one of the disparate (and similar) media devices, such as for example,wireless computer 113. As discussed above, connection ofphysical key 209 may form at least a portion of this request. In another embodiment, the connection ofphysical key 209 or an input of authentication information atblock 304 is merely a prerequisite of receiving a request for media content. In other embodiment, the request may be received throughuser input interface 203, such as through an infrared receiver circuit configured to receive inputs from a handheld infrared remote control. - In accordance with certain embodiments, the viewing of media program guides (EPGs), menus or the like may not be quantified as viewing media content that would be subtracted from the user's remaining time. In other embodiments, limited viewing such as scrolling or scanning channels may not be considered. For example,
memory 202 may comprise computer-executable instructions that when executed by a processor, such asprocessor 201, initiate a timer that detects when different media, such as a different channel of TV programming, or a different game is loaded or accessed. The timer may permit a predefined amount of media content to be viewed before applying one or more rules. The amount of media content may be measured in units of time or by units of received/transmitted information through a device. In certain embodiments, certain rules will always be applied. For example, if a user attempts to access an R-rated movie in violation of the content rules (for example, rules set throughicon 406 of GUI 400), this may always be deemed a restriction. However, accessing various PG-13 rated movies for a few minutes in an attempt to locate media content of interest may not apply one or more time restraint rules (such as set throughicon 410 of GUI 400). - At
block 308, rules (including, for example, device rules, content rules, media usage rules, media type rules and combinations thereof) may be applied against usage data for the user accessing the media content to determine if the user may access the requested media content. The usage data may be based on the aggregate usage of at least two disparate media devices or media types. If it is determined that the user is not permitted to access the requested media content, block 310 may be implemented. In one embodiment, block 310 may prevent the viewing of the requested content and/or transmitting a notification. The notification may be transmitted to the display device, such asdisplay 111, utilized to attempt to view the requested media content. The notification may indicate that the requested action violates one of the rules. The notification may indicate which rule was violated. - Further embodiments may comprise transmitting a notification to a media device or address associated with a third party, such as a parent or guardian. For example, one or more media signals may be transmitted via
gateway 101 to an external location, such as through, for example, optical lines, hybrid fiber/coaxial cable, satellite, cellular telephone, local wireless WIMAX, or any other communication pathways. For example, a user may useGUI 400 to provide an email address or phone number to transmit a notification to indicate the violation. The notification may include an indication that a violation occurred. Other information that may be included in the notification may include, but is not limited to: time of the violation, any content accessed causing the violation, further actions taken on one or more devices following the violation, and combinations thereof. In further embodiments, the notification may include a selectable link or other address that a user may access that provides information regarding media access for one or more user accounts that provides information regarding usage of the devices. In certain embodiments, the third party may over ride the violation and approve a request that was deemed to violate one or more rules. Transmittal and reception of notifications and related information may occur with or without the knowledge of the user requesting the media content. - If it is determined that the user is permitted to access the requested media content, the requested content may be transmitted or otherwise made accessible for viewing or playing (see, block 312), and usage data regarding aspects of the accessed media content may be recorded (see, block 314). For example, the content, media type, time and duration of the access, and/or the device the media is accessed from may be stored on a tangible, non-transitory computer-readable medium. As discussed above, the usage data may be stored on one or more local or remote computer-readable mediums. Using usage data, a process may be implemented to determine if one or more rules are violated. In certain embodiments, one or more processes of may be similar to one or more processes discussed in relation to block 310. For example, in the illustrated embodiment, block 310 may be conducted to determine whether any violations have occurred.
- Further embodiments may issue notifications to provide a warning or advisory that a threshold may be approaching (see, e.g. block 316). For example, a user may have used 4.5 of 5 hours that are allotted for PG-13 rated movies during the weekdays on certain devices, therefore, in accordance with one embodiment, a notification may provide an indication to the user that they only have 0.5 hours left of viewing certain media content having content meeting certain criteria (such as rated PG-13). In another embodiment, a user may not be permitted to view any media content on a device after 9:00 pm; therefore, a notification may be transmitted at 8:30 pm indicating that the user has only 30 minutes of viewing before a violation will occur.
-
Block 318 may be implemented to receive an indication that a new media device is to monitored, such as a new device being present. In certain embodiments, one or more processes may determine that a new media device has been detected. For example,gateway 101 may detect a new UPnP device or a device assigned an address such as a DHCP address. The detection of media devices may be performed in accordance with any of the processes described herein and/or other processes known to those skilled in the art. In certain embodiments, detection of a media device configured to allow the access of media content may trigger a notification. One or more notifications may prompt a user to set usage rules for the device or otherwise incorporate the reception of media content through the new device into the usage rules. The transmission of notifications has been discussed throughout this disclosure and is not repeated here. - In certain embodiments, certain users may not be permitted to receive media content with new media devices until the device has been approved by a third party, such as a parent or guardian, or until usage rules for or regarding the device have been established. For example, the detection of a new disparate media device may be made by assignment of an address by a gateway device, such as
gateway device 101. In further embodiments, an indication of traffic to a device may serve as detection of a new device. As used in this context, a single housing, such as an interactive television set may comprise two or more detectable devices. For example, a first device may be a transceiver configured to receive broadcast television services and the second device may be a network interface configured to receive video through the a protocol differing from the protocol delivering broadcast television service, such as the TCP/IP protocol. In certain embodiments, traffic received viagateway 101 directed towards a media device may be blocked. In certain embodiments, only a portion of traffic may be blocked. Blockage may depend on rules set for similar devices. Such enforcement may be performed by computer-executable instructions on a memory located locally, such as ongateway 101 or remotely, such as onservers 106. Further, those skilled in the art will appreciate that block 318 may occur during, before, or after any process disclosed herein. - Aspects of the embodiments have been described in terms of illustrative embodiments thereof Numerous other embodiments, modifications and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure. Although example embodiments are described above, the various features and steps may be combined, divided, omitted, and/or augmented in any desired manner, depending on the specific secure process desired. For example, one of ordinary skill in the art will appreciate that the steps illustrated in the illustrative figures may be performed in other than the recited order, and that one or more steps illustrated may be optional in accordance with aspects of the embodiments. This patent should not be limited to the example embodiments described, but rather should have its scope determined by the claims that follow.
Claims (20)
1. A non-transitory computer-readable medium comprising computer-executable instructions that when executed by a processor, cause the processor to perform a method comprising:
receiving usage control rules regarding usage parameters for a first user across a plurality of disparate media devices, wherein the rules comprise at least one media content rule and at least one media usage rule;
receiving a request from the first user to access media content on one of said plurality of disparate media devices, and in response, applying the usage control rules against stored usage data for the first user to determine if the first user may access the requested media content;
if the first user is permitted to access the requested media content, allowing access to such content while storing additional usage data regarding the accessed media; and
2. The computer-readable medium of claim 1 , wherein at least one of the usage control rules or the usage data is stored on a device separable from at least one of the disparate media devices having a memory and an interface, and the processor further performs:
requiring that the interface of the device be operatively connected to a corresponding interface of the disparate media device from which the user requests to access media content on before the user may access media content from that disparate media device.
3. The computer-readable medium of claim 1 , wherein execution of the computer-executable instructions cause the processor to perform:
requiring that a memory comprising a security key be operatively connected to the disparate media device from which the user requests media content on before the user may access media content from that disparate media device, wherein the security key has an interface that is configured to operatively connect with a corresponding interface of at least two of the disparate media devices.
4. The computer-readable medium of claim 1 , wherein at least one of the usage control rules or the usage data is stored on a device remotely located from the disparate media device from which the user is requesting media content.
5. The computer-readable medium of claim 1 , wherein the usage control rules further comprise a media type rule.
6. The computer-readable medium of claim 1 , wherein the media usage rule comprises a time restraint that the first user may access media content on at least one of the disparate media devices.
7. The computer-readable medium of claim 1 , wherein the usage control rules further comprise a device specific rule.
8. The computer-readable medium of claim 1 , wherein execution of the computer-executable instructions further cause the processor to perform:
monitoring the usage data to determine if the first user's usage of the disparate devices violates the usage control rules;
determining that at least one media usage rules has been violated; and
in response, transmitting a notification to a third party.
9. The computer-readable medium of claim 1 , wherein execution of the computer-executable instructions further cause the processor to perform:
detecting a new disparate media device communicating with a gateway device; and
blocking at least a portion of requested media content directed towards the new disparate device.
10. A computer-implemented method comprising:
storing usage control rules regarding a usage parameter for a first user across a plurality of disparate media devices on a non-transitory computer-readable medium, wherein the rules comprise at least one media content rule and at least one media type rule;
receiving a request from the first user to access media content, and in response, applying the usage control rules to determine if the user may access the requested media content;
if the first user is permitted to access the requested media content, storing additional usage data regarding the accessed media; and
11. The computer-implemented method of claim 10 , wherein the usage control rules that are applied further comprise rules selected from the group consisting of: media usage rules, device rules, and combinations thereof.
12. The computer-implemented method of claim 10 , further comprising:
storing at least one of the applied usage control rules or the usage data on a device separable from at least one of the disparate media devices, the device having a memory and an interface, and
determining whether the interface of the device is operatively connected to a corresponding interface of the disparate media device from which the user requests to access media content on before the user may access media content from that disparate media device.
13. The computer-implemented method of claim 10 , further comprising:
requiring that a memory comprising a security key be operatively connected to the disparate media device from which the user requests media content on before the user may access media content from that disparate media device.
14. The computer-implemented method of claim 11 , wherein the media usage rule of the applied usage control rules comprises a time restraint that the first user may access media content on at least one of the disparate media devices.
15. The computer-implemented method of claim 11 , wherein the request to access media content is received at one of the disparate media devices, and the method further comprising:
monitoring the usage data to determine if the first user's usage of the disparate devices violates the usage control rules; and
determining that at least one media usage rules has been violated, and in response, transmitting a notification.
16. The computer-implemented method of claim 15 , wherein the notification is transmitted to a third party without the knowledge of the first user.
17. The computer-implemented method of claim 11 , further comprising:
detecting a new disparate media device communicating with a gateway device; and
blocking at least a portion of requested media content directed towards the new disparate device.
18. A computer-implemented method comprising:
applying the usage control rules regarding usage parameters for a first user across a plurality of disparate media devices to determine if the first user may access media content requested on one of the plurality of disparate media devices;
determining whether a memory comprising a security key is accessible by the disparate media device from which the user requested the media content before the user may access media content from that disparate media device, wherein the security key has an interface that is configured to operatively interact with a corresponding interface of at least two of the disparate media devices; and
if the first user is permitted to access the requested media content, storing additional usage data regarding the accessed media content.
19. The computer-readable medium of claim 18 , wherein execution of the computer-executable instructions further cause the processor to perform:
after providing access to the requested media content, monitoring the usage data to determine if the first user's usage of the disparate devices violates the usage control rules.
20. The computer-readable medium of claim 18 , wherein the usage control rules are selected from the group consisting of: device rules, media usage rules, media type rules, content rules, and combinations thereof.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/150,981 US20120311673A1 (en) | 2011-06-01 | 2011-06-01 | Media usage monitoring and control |
US16/441,204 US20200036718A1 (en) | 2011-06-01 | 2019-06-14 | Media usage monitoring and control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/150,981 US20120311673A1 (en) | 2011-06-01 | 2011-06-01 | Media usage monitoring and control |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/441,204 Continuation US20200036718A1 (en) | 2011-06-01 | 2019-06-14 | Media usage monitoring and control |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120311673A1 true US20120311673A1 (en) | 2012-12-06 |
Family
ID=47262776
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/150,981 Abandoned US20120311673A1 (en) | 2011-06-01 | 2011-06-01 | Media usage monitoring and control |
US16/441,204 Pending US20200036718A1 (en) | 2011-06-01 | 2019-06-14 | Media usage monitoring and control |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/441,204 Pending US20200036718A1 (en) | 2011-06-01 | 2019-06-14 | Media usage monitoring and control |
Country Status (1)
Country | Link |
---|---|
US (2) | US20120311673A1 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150281056A1 (en) * | 2014-03-31 | 2015-10-01 | Metaswitch Networks Ltd | Data center networks |
US20150281065A1 (en) * | 2014-03-31 | 2015-10-01 | Metaswitch Networks Ltd | Data center networks |
US20150281070A1 (en) * | 2014-03-31 | 2015-10-01 | Metaswitch Networks Ltd | Data center networks |
US9485206B2 (en) | 2013-12-19 | 2016-11-01 | Websafety, Inc. | Devices and methods for improving web safety and deterrence of cyberbullying |
US9521143B2 (en) * | 2015-02-20 | 2016-12-13 | Qualcomm Incorporated | Content control at gateway based on audience |
US9661469B2 (en) | 2008-08-08 | 2017-05-23 | Websafety, Inc. | Safety of a mobile communications device |
US9692878B1 (en) | 2014-03-31 | 2017-06-27 | Saul Rosenthal | Device management system |
US20170339067A1 (en) * | 2016-05-18 | 2017-11-23 | Echostar Technologies L.L.C. | Systems, methods and apparatus for restricting network access |
US10237280B2 (en) | 2015-06-25 | 2019-03-19 | Websafety, Inc. | Management and control of mobile computing device using local and remote software agents |
US20190230091A1 (en) * | 2018-01-22 | 2019-07-25 | Todd Jeremy Marlin | Method for Implementing Intelligent Parental Controls |
US10552584B1 (en) * | 2013-03-08 | 2020-02-04 | Amazon Technologies, Inc. | Content access control across media devices |
US20230222080A1 (en) * | 2022-01-07 | 2023-07-13 | Dell Products L.P. | System and method for distributed subscription management |
US11789718B2 (en) | 2022-01-07 | 2023-10-17 | Dell Products L.P. | System and method for subscription based solution modification implementation |
US11829740B2 (en) | 2022-01-07 | 2023-11-28 | Dell Products L.P. | System and method for deployment level management of subscription based solutions |
US11861577B2 (en) | 2022-01-07 | 2024-01-02 | Dell Products L.P. | System and method for distributed enforcement of configuration limitations |
US11888690B2 (en) | 2022-01-07 | 2024-01-30 | Dell Products L.P. | System and method for subscription limitation enforcement in distributed system |
US11947433B2 (en) | 2022-01-07 | 2024-04-02 | Dell Products L.P. | System and method for subscription based solution management |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240056356A1 (en) * | 2022-08-10 | 2024-02-15 | Dish Network, L.L.C. | Gateway anti-distraction mode for an establishment |
Citations (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030028622A1 (en) * | 2001-08-06 | 2003-02-06 | Mitsuhiro Inoue | License management server, terminal device, license management system and usage restriction control method |
US20060272014A1 (en) * | 2005-05-26 | 2006-11-30 | Mcrae Matthew B | Gateway notification to client devices |
US20070124785A1 (en) * | 2005-09-02 | 2007-05-31 | Tekelec | Methods, systems, and computer program products for providing third party control of access to media content available via broadcast and multicast service (BCMCS) |
US7231450B1 (en) * | 2002-04-24 | 2007-06-12 | At&T Corporation | Method for providing reliable soft goods license authorization |
US20070294715A1 (en) * | 2006-06-16 | 2007-12-20 | Dale Mountain | Broadcast data receiver network |
US20080046978A1 (en) * | 2006-08-07 | 2008-02-21 | Time Warner Cable, Inc. | System and method for establishing and enforcing service rules in a service provider network |
US20080049767A1 (en) * | 2006-08-25 | 2008-02-28 | At&T Corp. | Method for controlling multiple network services based on a user profile |
US7356836B2 (en) * | 2002-06-28 | 2008-04-08 | Microsoft Corporation | User controls for a computer |
US7380135B2 (en) * | 2002-08-28 | 2008-05-27 | Nippon Hoso Kyokai | Diligent control of preview of stored contents |
US20080222707A1 (en) * | 2007-03-07 | 2008-09-11 | Qualcomm Incorporated | Systems and methods for controlling service access on a wireless communication device |
US20080256641A1 (en) * | 2007-04-13 | 2008-10-16 | Qualcomm Incorporated | Mobile unit parental control |
US20090113039A1 (en) * | 2007-10-25 | 2009-04-30 | At&T Knowledge Ventures, L.P. | Method and system for content handling |
US20090151006A1 (en) * | 2005-08-31 | 2009-06-11 | Sony Corporation | Group registration device, group registration release device, group registration method, license acquisition device, license acquisition method, time setting device, and time setting method |
US7565529B2 (en) * | 2004-03-04 | 2009-07-21 | Directpointe, Inc. | Secure authentication and network management system for wireless LAN applications |
US7574731B2 (en) * | 2002-10-08 | 2009-08-11 | Koolspan, Inc. | Self-managed network access using localized access management |
US7587718B1 (en) * | 2008-10-31 | 2009-09-08 | Synopsys, Inc. | Method and apparatus for enforcing a resource-usage policy in a compute farm |
US20090254656A1 (en) * | 2008-03-03 | 2009-10-08 | Kidzui, Inc | Method and apparatus for custodial monitoring, filtering, and approving of content |
US20090259738A1 (en) * | 2008-01-21 | 2009-10-15 | Gottfried Zimmermann | Online resource server for allowing device control and access to digital content through pluggable user interfaces |
US20100015926A1 (en) * | 2008-07-18 | 2010-01-21 | Luff Robert A | System and methods to monitor and analyze events on wireless devices to predict wireless network resource usage |
US20100015956A1 (en) * | 2008-07-18 | 2010-01-21 | Qualcomm Incorporated | Rating of message content for content control in wireless devices |
US20100100898A1 (en) * | 2008-10-16 | 2010-04-22 | Lucent Technologies Inc. | Method and apparatus for personalized multi-user centralized control and filtering of iptv content |
US20100121744A1 (en) * | 2008-11-07 | 2010-05-13 | At&T Intellectual Property I, L.P. | Usage data monitoring and communication between multiple devices |
US20100162342A1 (en) * | 2008-12-22 | 2010-06-24 | At&T Intellectual Property I, L.P. | Parental controls for multiple devices |
US20110045811A1 (en) * | 2009-08-20 | 2011-02-24 | T-Mobile Usa, Inc. | Parent Telecommunication Device Configuration of Activity-Based Child Telecommunication Device |
US20110065419A1 (en) * | 2009-04-07 | 2011-03-17 | Juniper Networks | System and Method for Controlling a Mobile |
US7954136B2 (en) * | 2002-10-08 | 2011-05-31 | Koolspan, Inc. | Self-management network access using localized access management |
US20110185437A1 (en) * | 2010-01-04 | 2011-07-28 | Samsung Electronics Co., Ltd. | Method and system for multi-user, multi-device login and content access control and metering and blocking |
US20110191859A1 (en) * | 2008-10-06 | 2011-08-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Digital Rights Management in User-Controlled Environment |
US20110209206A1 (en) * | 2010-02-23 | 2011-08-25 | Microsoft Corporation | Access restriction for computing content |
US8024225B1 (en) * | 2004-01-27 | 2011-09-20 | Amazon Technologies, Inc. | Controlling access to services via usage models |
US20110283311A1 (en) * | 2010-05-14 | 2011-11-17 | Rovi Technologies Corporation | Systems and methods for media detection and filtering using a parental control logging application |
US20120071132A1 (en) * | 2005-01-20 | 2012-03-22 | Carrie Carlander | Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications |
US20120089699A1 (en) * | 2010-10-08 | 2012-04-12 | Chris Cholas | Apparatus and methods for enforcing content protection rules during data transfer between devices |
US20120143978A1 (en) * | 2010-12-02 | 2012-06-07 | Microsoft Corporation | Enabling plural computing devices to communicate using a master account |
US8201220B2 (en) * | 2008-12-23 | 2012-06-12 | Qwest Communications International Inc. | Network user usage profiling |
US20120147769A1 (en) * | 2007-11-27 | 2012-06-14 | Umber Systems, Inc. | System and method for collecting, reporting, and analyzing data on application-level activity and other user information on a mobile data network |
US8312484B1 (en) * | 2008-03-28 | 2012-11-13 | United Video Properties, Inc. | Systems and methods for blocking selected commercials |
US8347362B2 (en) * | 2009-09-30 | 2013-01-01 | Alcatel Lucent | Usage control services performed in an end user device |
US8387118B2 (en) * | 2009-12-02 | 2013-02-26 | At&T Mobility Ii, Llc | System and method for monitoring usage of a user device |
US8688971B2 (en) * | 2007-05-11 | 2014-04-01 | Ntt It Corporation | Remote access method |
US8706864B1 (en) * | 2010-11-30 | 2014-04-22 | Amazon Technologies, Inc. | Behavior monitoring and compliance for multi-tenant resources |
US8898303B2 (en) * | 2010-09-09 | 2014-11-25 | Albert J. McGowan | Enterprise grade rights management |
US9251519B1 (en) * | 2003-12-31 | 2016-02-02 | Google Inc. | Systems and methods for monetizing subscription and archival news content |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8428036B2 (en) * | 2009-01-22 | 2013-04-23 | Belair Networks Inc. | System and method for providing wireless local area networks as a service |
-
2011
- 2011-06-01 US US13/150,981 patent/US20120311673A1/en not_active Abandoned
-
2019
- 2019-06-14 US US16/441,204 patent/US20200036718A1/en active Pending
Patent Citations (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030028622A1 (en) * | 2001-08-06 | 2003-02-06 | Mitsuhiro Inoue | License management server, terminal device, license management system and usage restriction control method |
US7231450B1 (en) * | 2002-04-24 | 2007-06-12 | At&T Corporation | Method for providing reliable soft goods license authorization |
US7818789B2 (en) * | 2002-06-28 | 2010-10-19 | Microsoft Corporation | User controls for a computer |
US7797735B2 (en) * | 2002-06-28 | 2010-09-14 | Microsoft Corporation | User controls for a computer |
US7356836B2 (en) * | 2002-06-28 | 2008-04-08 | Microsoft Corporation | User controls for a computer |
US7380135B2 (en) * | 2002-08-28 | 2008-05-27 | Nippon Hoso Kyokai | Diligent control of preview of stored contents |
US7574731B2 (en) * | 2002-10-08 | 2009-08-11 | Koolspan, Inc. | Self-managed network access using localized access management |
US7954136B2 (en) * | 2002-10-08 | 2011-05-31 | Koolspan, Inc. | Self-management network access using localized access management |
US9251519B1 (en) * | 2003-12-31 | 2016-02-02 | Google Inc. | Systems and methods for monetizing subscription and archival news content |
US8024225B1 (en) * | 2004-01-27 | 2011-09-20 | Amazon Technologies, Inc. | Controlling access to services via usage models |
US7565529B2 (en) * | 2004-03-04 | 2009-07-21 | Directpointe, Inc. | Secure authentication and network management system for wireless LAN applications |
US20120071132A1 (en) * | 2005-01-20 | 2012-03-22 | Carrie Carlander | Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications |
US20060272014A1 (en) * | 2005-05-26 | 2006-11-30 | Mcrae Matthew B | Gateway notification to client devices |
US20090151006A1 (en) * | 2005-08-31 | 2009-06-11 | Sony Corporation | Group registration device, group registration release device, group registration method, license acquisition device, license acquisition method, time setting device, and time setting method |
US20070124785A1 (en) * | 2005-09-02 | 2007-05-31 | Tekelec | Methods, systems, and computer program products for providing third party control of access to media content available via broadcast and multicast service (BCMCS) |
US20070294715A1 (en) * | 2006-06-16 | 2007-12-20 | Dale Mountain | Broadcast data receiver network |
US20080046978A1 (en) * | 2006-08-07 | 2008-02-21 | Time Warner Cable, Inc. | System and method for establishing and enforcing service rules in a service provider network |
US20080049767A1 (en) * | 2006-08-25 | 2008-02-28 | At&T Corp. | Method for controlling multiple network services based on a user profile |
US20080222707A1 (en) * | 2007-03-07 | 2008-09-11 | Qualcomm Incorporated | Systems and methods for controlling service access on a wireless communication device |
US20080256641A1 (en) * | 2007-04-13 | 2008-10-16 | Qualcomm Incorporated | Mobile unit parental control |
US8688971B2 (en) * | 2007-05-11 | 2014-04-01 | Ntt It Corporation | Remote access method |
US20090113039A1 (en) * | 2007-10-25 | 2009-04-30 | At&T Knowledge Ventures, L.P. | Method and system for content handling |
US20120147769A1 (en) * | 2007-11-27 | 2012-06-14 | Umber Systems, Inc. | System and method for collecting, reporting, and analyzing data on application-level activity and other user information on a mobile data network |
US20090259738A1 (en) * | 2008-01-21 | 2009-10-15 | Gottfried Zimmermann | Online resource server for allowing device control and access to digital content through pluggable user interfaces |
US20090254656A1 (en) * | 2008-03-03 | 2009-10-08 | Kidzui, Inc | Method and apparatus for custodial monitoring, filtering, and approving of content |
US8312484B1 (en) * | 2008-03-28 | 2012-11-13 | United Video Properties, Inc. | Systems and methods for blocking selected commercials |
US20100015956A1 (en) * | 2008-07-18 | 2010-01-21 | Qualcomm Incorporated | Rating of message content for content control in wireless devices |
US20100015926A1 (en) * | 2008-07-18 | 2010-01-21 | Luff Robert A | System and methods to monitor and analyze events on wireless devices to predict wireless network resource usage |
US20110191859A1 (en) * | 2008-10-06 | 2011-08-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Digital Rights Management in User-Controlled Environment |
US20100100898A1 (en) * | 2008-10-16 | 2010-04-22 | Lucent Technologies Inc. | Method and apparatus for personalized multi-user centralized control and filtering of iptv content |
US7587718B1 (en) * | 2008-10-31 | 2009-09-08 | Synopsys, Inc. | Method and apparatus for enforcing a resource-usage policy in a compute farm |
US20100121744A1 (en) * | 2008-11-07 | 2010-05-13 | At&T Intellectual Property I, L.P. | Usage data monitoring and communication between multiple devices |
US20100162342A1 (en) * | 2008-12-22 | 2010-06-24 | At&T Intellectual Property I, L.P. | Parental controls for multiple devices |
US8201220B2 (en) * | 2008-12-23 | 2012-06-12 | Qwest Communications International Inc. | Network user usage profiling |
US20110065419A1 (en) * | 2009-04-07 | 2011-03-17 | Juniper Networks | System and Method for Controlling a Mobile |
US20110045811A1 (en) * | 2009-08-20 | 2011-02-24 | T-Mobile Usa, Inc. | Parent Telecommunication Device Configuration of Activity-Based Child Telecommunication Device |
US8347362B2 (en) * | 2009-09-30 | 2013-01-01 | Alcatel Lucent | Usage control services performed in an end user device |
US8387118B2 (en) * | 2009-12-02 | 2013-02-26 | At&T Mobility Ii, Llc | System and method for monitoring usage of a user device |
US20110185437A1 (en) * | 2010-01-04 | 2011-07-28 | Samsung Electronics Co., Ltd. | Method and system for multi-user, multi-device login and content access control and metering and blocking |
US20110209206A1 (en) * | 2010-02-23 | 2011-08-25 | Microsoft Corporation | Access restriction for computing content |
US20110283311A1 (en) * | 2010-05-14 | 2011-11-17 | Rovi Technologies Corporation | Systems and methods for media detection and filtering using a parental control logging application |
US8898303B2 (en) * | 2010-09-09 | 2014-11-25 | Albert J. McGowan | Enterprise grade rights management |
US20120089699A1 (en) * | 2010-10-08 | 2012-04-12 | Chris Cholas | Apparatus and methods for enforcing content protection rules during data transfer between devices |
US8706864B1 (en) * | 2010-11-30 | 2014-04-22 | Amazon Technologies, Inc. | Behavior monitoring and compliance for multi-tenant resources |
US20120143978A1 (en) * | 2010-12-02 | 2012-06-07 | Microsoft Corporation | Enabling plural computing devices to communicate using a master account |
US8621056B2 (en) * | 2010-12-02 | 2013-12-31 | Microsoft Corporation | Enabling plural computing devices to communicate using a master account |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9986385B2 (en) | 2008-08-08 | 2018-05-29 | Websafety, Inc. | Safety of a mobile communications device |
US9661469B2 (en) | 2008-08-08 | 2017-05-23 | Websafety, Inc. | Safety of a mobile communications device |
US10552584B1 (en) * | 2013-03-08 | 2020-02-04 | Amazon Technologies, Inc. | Content access control across media devices |
US9485206B2 (en) | 2013-12-19 | 2016-11-01 | Websafety, Inc. | Devices and methods for improving web safety and deterrence of cyberbullying |
US9584340B2 (en) * | 2014-03-31 | 2017-02-28 | Tigera, Inc. | Data center networks |
US9800496B2 (en) * | 2014-03-31 | 2017-10-24 | Tigera, Inc. | Data center networks |
US9559950B2 (en) * | 2014-03-31 | 2017-01-31 | Tigera, Inc. | Data center networks |
US20150281056A1 (en) * | 2014-03-31 | 2015-10-01 | Metaswitch Networks Ltd | Data center networks |
US20170104674A1 (en) * | 2014-03-31 | 2017-04-13 | Tigera, Inc. | Data center networks |
US9344364B2 (en) * | 2014-03-31 | 2016-05-17 | Metaswitch Networks Ltd. | Data center networks |
US9692878B1 (en) | 2014-03-31 | 2017-06-27 | Saul Rosenthal | Device management system |
US20150281065A1 (en) * | 2014-03-31 | 2015-10-01 | Metaswitch Networks Ltd | Data center networks |
US9813258B2 (en) * | 2014-03-31 | 2017-11-07 | Tigera, Inc. | Data center networks |
US10771618B1 (en) | 2014-03-31 | 2020-09-08 | Digital Media Health, LLC | Device management system |
US20150281070A1 (en) * | 2014-03-31 | 2015-10-01 | Metaswitch Networks Ltd | Data center networks |
US10171264B2 (en) | 2014-03-31 | 2019-01-01 | Tigera, Inc. | Data center networks |
US10212271B1 (en) | 2014-03-31 | 2019-02-19 | Saul Rosenthal | Device management system |
US10693678B2 (en) * | 2014-03-31 | 2020-06-23 | Tigera, Inc. | Data center networks |
US9521143B2 (en) * | 2015-02-20 | 2016-12-13 | Qualcomm Incorporated | Content control at gateway based on audience |
US10237280B2 (en) | 2015-06-25 | 2019-03-19 | Websafety, Inc. | Management and control of mobile computing device using local and remote software agents |
US20170339067A1 (en) * | 2016-05-18 | 2017-11-23 | Echostar Technologies L.L.C. | Systems, methods and apparatus for restricting network access |
US11196825B2 (en) * | 2016-05-18 | 2021-12-07 | DISH Technologies L.L.C. | Systems, methods and apparatus for restricting network access |
US11665252B2 (en) | 2016-05-18 | 2023-05-30 | DISH Technologies L.L.C. | Systems, methods and apparatus for restricting network access |
US20190230091A1 (en) * | 2018-01-22 | 2019-07-25 | Todd Jeremy Marlin | Method for Implementing Intelligent Parental Controls |
US20230222080A1 (en) * | 2022-01-07 | 2023-07-13 | Dell Products L.P. | System and method for distributed subscription management |
US11789718B2 (en) | 2022-01-07 | 2023-10-17 | Dell Products L.P. | System and method for subscription based solution modification implementation |
US11829740B2 (en) | 2022-01-07 | 2023-11-28 | Dell Products L.P. | System and method for deployment level management of subscription based solutions |
US11861577B2 (en) | 2022-01-07 | 2024-01-02 | Dell Products L.P. | System and method for distributed enforcement of configuration limitations |
US11888690B2 (en) | 2022-01-07 | 2024-01-30 | Dell Products L.P. | System and method for subscription limitation enforcement in distributed system |
US11907153B2 (en) * | 2022-01-07 | 2024-02-20 | Dell Products L.P. | System and method for distributed subscription management |
US11947433B2 (en) | 2022-01-07 | 2024-04-02 | Dell Products L.P. | System and method for subscription based solution management |
Also Published As
Publication number | Publication date |
---|---|
US20200036718A1 (en) | 2020-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200036718A1 (en) | Media usage monitoring and control | |
US9536233B2 (en) | Purchasing a gift using a service provider network | |
US10686770B2 (en) | Apparatus and method for managing software applications of a mobile device server | |
US9350725B2 (en) | Enabling access to a secured wireless local network without user input of a network password | |
US8584186B2 (en) | Method and apparatus to provide supplemental media content | |
US8850532B2 (en) | Systems and methods to control access to multimedia content | |
US9307288B2 (en) | Television sign on for personalization in a multi-user environment | |
JP5692552B2 (en) | Activation of licensable components provided to audio-video devices by third parties | |
US8838815B2 (en) | Systems and methods to make a resource available via a local network | |
US8589986B2 (en) | Method and aparatus for sharing internet assets or content URLs via a second display device | |
US10225604B2 (en) | Digital multimedia recorder with functionality following loss of provider network service | |
US8621576B2 (en) | System and method of multimedia access | |
US10645440B2 (en) | System and method for configuring media services | |
US9936251B2 (en) | Television channel display device and method thereof | |
US20060020960A1 (en) | System, method, and apparatus for secure sharing of multimedia content across several electronic devices | |
US20100306815A1 (en) | System and method for sharing user content through a set-top box | |
US9338494B2 (en) | Method and apparatus for providing recommended content playback on a display device | |
US9084030B1 (en) | Unified management and control of users and devices of a service network | |
US9420339B2 (en) | Method and system for determining subscriber demand for multimedia content | |
US20090019497A1 (en) | System for configuring satellite communication services | |
US20150150148A1 (en) | Configuring and controlling digital ecosystem of devices, user profiles, and content | |
US9369663B2 (en) | Remote-controlled recording |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: COMCAST CABLE COMMUNICATIONS, LLC, PENNSYLVANIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SODAH, SUNIL;REEL/FRAME:026402/0683 Effective date: 20110523 |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: TC RETURN OF APPEAL |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |