The subject disclosure relates generally to video on demand media services, and more particularly to providing automated authorization for video on demand television services.
With the advent of the Internet and widespread consumer access to network data content, conventional media has expanded to Internet media services. For instance, television content providers traditionally offering television services over television airwaves or direct cable line, etc., have begun storing television media on network data stores and offering the television media for consumption over the Internet in the form of streaming media. Likewise, radio providers have begun storing audio content on network data stores, and offering streaming media audio services to subscribers, or the general Internet public. Computers configured to communicate on the Internet and playback media content can generally be employed to access, acquire and consume various networked media content. As networked computer users have become more ubiquitous throughout the world, a rapidly growing demand has arisen for more traditional media content to be made available over the Internet.
To satisfy some of this demand, the type and variety of electronic devices configured to communicate and access content on the Internet has begun to expand. For instance, radios and television sets—devices long accustomed by the consuming public for use in acquiring and playing media content—have been configured as computing devices capable of accessing a network, employing various network communication protocols, and downloading and playing media content stored on the network. For instance, Internet-ready television sets have appeared on the market, providing access to websites that provide streaming media content. This has provided a paradigm-shift in viewing television content. Whereas consumers traditionally were required to tune to a particular television station (e.g., a cable station, a broadcast station, a satellite television station, etc.) and receive content broadcast or otherwise transmitted by respective stations at a given time, consumers are now available to access and play any content stored on a networked data store and made available through a website or other server mechanism. In other words, in replacing the broadcast television transmitter with a multiple access computer server, respective playback devices can form respective communication channels with the computer server, each independently receiving selected content.
To facilitate provision of Internet media content, content providers establish user accounts and authenticate users or playback devices on the user accounts as a condition to providing the content. A common case is to require login and authentication for user accounts, before media content is delivered. This can be tedious, however, and diminish user experience of online media content. In addition, online media functionality can often become cumbersome when accessed through traditional television interfaces. Upcoming technological advances aim to improve user experience of online media content and ease-of-use for networked-enabled media playback devices.
The following description and the annexed drawings set forth in detail certain illustrative aspects of the disclosed subject matter. These aspects are indicative, however, of but a few of the various ways in which the principles of the various embodiments may be employed. The disclosed subject matter is intended to include all such aspects and their equivalents. Other advantages and distinctive features of the disclosed subject matter will become apparent from the following detailed description of the various embodiments when considered in conjunction with the drawings.
In various aspects of the subject disclosure, automated user authentication is provided in conjunction with video on demand streaming media services. A network-enabled media playback device, such as a television, can be configured to initiate a network process in response to being powered-on. The network process can initiate communication over a network communicatively connected to the network-enabled playback device, and access a network data store. Stored data indicative of whether a user account is currently authenticated can be extracted from the network data store, and used to load user profile data, and to configure media content for playback according to the user profile data. If no user account is currently authenticated, a login and authorization message is sent to a communication account associated with the network-enabled playback device to facilitate authenticating and logging a user into the network-enabled playback device.
According to particular aspects of the subject disclosure, a login and authorization message can be displayed on the network-enabled television set, or sent via an electronic messaging network (e.g., e-mail, short message service, text message, multimedia messaging service, Internet messaging service, website messaging service, social media messaging service, and so forth) to a communication or messaging account stored on the network data store. The login and authorization message can include personal identification data suitable for authorizing the identity of a user of the user account. The personal identification data can then be entered onto the network-enabled playback device, and utilized for authenticating and logging a user into a user account. In at least one aspect of the subject disclosure, the personal identification data can be configured particularly for a user input device of the network-enabled playback device (e.g., a series of button-presses particular to a television remote control). This can facilitate quick and non-cumbersome entry of data for logging into the network-enabled playback device.
According to one or more other aspects, the network-enabled playback device can be configured to auto play content upon successful authorization and login to a user account. User usage profile information can be utilized to filter available media content, and identify a subset of the media content for a user of the user account. A media program of the subset of media content can be selected for automatic playback upon logging into or powering-on the network-enabled playback device. In alternative aspects, selection of the media program can be random, patterned, or predictive based on usage history of the user, user preferences, and so on. In conjunction with automatic playback of the media program, a subset of a display screen can present graphical icons depicting other media programs of the media content, providing quick access to a subset of content preferred by the user. In one aspect, playback, content or navigation controls can be loaded in conjunction with login to the user account, which can regulate access to media content, amount of content for playback, time for playback, control of output device, or the like.
The following description and the annexed drawings set forth in detail certain illustrative aspects of the disclosed subject matter. These aspects are indicative, however, of but a few of the various ways in which the principles of the innovation can be employed and the disclosed subject matter is intended to include all such aspects and their equivalents. Other advantages and novel features of the disclosed subject matter will become apparent from the following detailed description of the innovation when considered in conjunction with the drawings.
The disclosed subject matter is described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout the description. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the disclosed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram or schematic form in order to facilitate describing the subject innovation.
Reference throughout this specification to “one embodiment,” or “an embodiment,” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, the appearances of the phrase “in one embodiment,” “in one aspect,” or “in an embodiment,” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
As utilized herein, terms “component,” “system,” “module”, “interface,” “user interface”, and the like are intended to refer to a computer-related entity, hardware, software (e.g., in execution), and/or firmware. For example, a component can be a processor, a process running on a processor, an object, an executable, a program, a storage device, and/or a computer. By way of illustration, an application running on a server and the server can be a component. One or more components can reside within a process, and a component can be localized on one computer and/or distributed between two or more computers.
Further, these components can execute from various computer readable media having various data structures stored thereon. The components can communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network, e.g., the Internet, a local area network, a wide area network, etc. with other systems via the signal).
As another example, a component can be an apparatus with specific functionality provided by mechanical parts operated by electric or electronic circuitry; the electric or electronic circuitry can be operated by a software application or a firmware application executed by one or more processors; the one or more processors can be internal or external to the apparatus and can execute at least a part of the software or firmware application. As yet another example, a component can be an apparatus that provides specific functionality through electronic components without mechanical parts; the electronic components can include one or more processors therein to execute software and/or firmware that confer(s), at least in part, the functionality of the electronic components. In an aspect, a component can emulate an electronic component via a virtual machine, e.g., within a cloud computing system.
In addition, the disclosed subject matter can be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, computer-readable carrier, or computer-readable media. For example, computer-readable media can include, but are not limited to, a magnetic storage device, e.g., hard disk; floppy disk; magnetic strip(s); an optical disk (e.g., compact disk (CD), a digital video disc (DVD), a Blu-ray Disc™ (BD)); a smart card; a flash memory device (e.g., card, stick, key drive); and/or a virtual device that emulates a storage device and/or any of the above computer-readable media.
The word “exemplary” where used herein means serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary,” “demonstrative,” or the like, is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the appended claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements. Moreover, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
As used herein, the term “infer” or “inference” refers generally to the process of reasoning about, or inferring states of, the system, environment, user, and/or intent from a set of observations as captured via events and/or data. Captured data and events can include user data, device data, environment data, data from sensors, sensor data, application data, implicit data, explicit data, etc. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states of interest based on a consideration of data and events, for example.
Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources. Various classification schemes and/or systems (e.g., support vector machines, neural networks, expert systems, Bayesian belief networks, fuzzy logic, and data fusion engines) can be employed in connection with performing automatic and/or inferred action in connection with the disclosed subject matter.
Referring now to the drawings,
Network-enabled television 102 can comprise any suitable video playback device having an interface to a conventional broadcast video and audio signal (e.g., licensed television frequency, cable television hookup, optical fiber television hookup, satellite television hookup, or the like, or a suitable combination thereof) and an interface to a data network 106. Data network 106 can be, for instance, an Internet Protocol (IP) based network, such as the Internet, a local network, a wide area network, an intranet, or the like. It should be appreciated that data network 106 can be a network that employs other communication or data transfer protocols, or that uses IP in conjunction with one or more other protocols, in one or more aspects of the subject disclosure.
Upon being powered-on (e.g., by remote control, by button-press on network-enabled television, . . . ), a power-on signal is sent to network authentication system 104. In response to receiving the power-on signal, network authentication system 104 can be configured to automatically initiate a communication session (e.g., an IP session) on data network 106. A login and authentication query can be sent to a network data store 108, which maintains a data file 110 comprising information pertaining to one or more user accounts associated with network-enabled television 102, or a content provider associated with network-enabled television 102. In addition, data file 110 can store information indicative of whether one or more of the user accounts is activated, currently logged on, authenticated, or the like.
User accounts stored in data file 110 can be subscriber accounts maintained by a television service provider, in one aspect of the subject disclosure (e.g., cable television provider, satellite television provider, Internet television provider, . . . ). In at least one aspect, however, data file 110 can comprise user accounts related to additional communication or media services. For instance, data file 110 can store information pertaining to a user's Facebook account, and facilitate user-login to the Facebook account through data network 106 at least in part via network-enabled television 102 and network authentication system 104. Other communication or media service account information can be stored in data file 110 as well, including e-mail account information, Twitter or other social media account information, mobile communication account information, and so on. In a particular aspect, rules related to billing and charging services, content access, content distribution, etc., associated with the respective accounts established by shared billing or content agreements between respective service providers can be stored in data file 110, so that content accessed through one or more accounts stored on data file 110 can be in accordance with those rules, and charging and billing functionality can be in accordance with those rules as well. In another aspect, rules established by an aggregate provider for a combination of media services (e.g., a provider that offers any suitable subset of television, Internet service, and mobile communications services, for instance) can be stored separate from any rules derived from shared content agreements. Further, data file 110 can store associations between user accounts, service provider agreements related to those accounts, and respective service provider rules and agreements affecting content consumed by respective accounts. Thus, data store 108 can store information facilitating simple or complex arrangements of content access and availability, and associated billing costs and rates, for a single content provider, an aggregate content provider, or multiple content providers, for different accounts having different agreements with one or more of the providers and types of providers.
In response to receiving the logon and authentication query, network data store 108 can send a logon status to network authentication system 104. The logon status can include data that indicates whether one or more associated user accounts is logged on or otherwise currently authenticated. If so, the response can also include user account profile information stored in a user profile 112 on network data store 112. User profile 112 can store user preference parameters for various user accounts associated with network-enabled television 102. Suitable user preference parameters can include accessible media content (e.g., accessible channels, media titles, etc.), content controls (e.g., parental access controls), operation controls (e.g., limits or permissions for access to configuration functions of network-enabled television 102), a preferred genre or other type of media content, a preferred media format (e.g., video media, audio media, multimedia, . . . ), various time of day related preferences (e.g., a genre for a particular time of day), day of the week related preferences, or the like, or a suitable combination thereof. Network data store 108 can be configured to automatically pass any suitable subset of user profile information stored in user profile 112 pertaining to a logged-on account, within the response containing the login status.
If one or more accounts are active, network authentication system 104 can be configured to load user profile information on network-enabled television 102, activating a user account thereon. The user profile information can be utilized to govern access to or display of television content (or other communication or media content) associated with the logged-on account. If no accounts are active, network authentication system 104 can be configured to generate and transmit an authentication message 114 over data network 106 to a communication server/network associated with a default user account. The default user account and addressing/routing information required to send the message can be retrieved by network authentication system 104 from network data store 108 (or, e.g., can be retrieved from a local data store connected to network authentication system 104—not depicted). Authentication message 114 can include personal identification data for logging onto a default account associated with network-enabled television 102. In various aspects, authentication message 114 can be an e-mail message transmitted to an e-mail server, a text message transmitted to a text messaging server, a short message service (SMS) message transmitted to a mobile network providing SMS services, a multimedia message service (MMS) message transmitted to a mobile network providing MMS services, a forum message posted on a forum website or other user account website, a social media message transmitted to a social media server, or the like, or a suitable combination thereof.
In one or more alternative aspects, authentication message 114 can provide log-on information for an aggregate of accounts associated with a user. These accounts can comprise a set of media or communication accounts stored in data file 110, as described above. The log-on information can optionally be utilized to log a user onto all accounts associated with the user within data file 110. For instance, where a user maintains a Facebook account, mobile subscriber account, and television content account within data file 110, a common set of log-on data can be stored in data file 110 for purposes of logging the user into all of these accounts concurrently. As a further option, the user can store different sets of log-on data configured to log the user into a subset of the accounts associated with the user. For instance, a first subset of log-on data can log the user only into the television content account, whereas a second subset of log-on data can log the user only into the Facebook account, whereas a third subset of log-on data can log the user into all three accounts, and so on, or other suitable combinations thereof. According to additional aspects, data file 110 can store a login status for each account separately from other accounts. In this case, where the user logs into one account but not into another, turning on network-enabled television 102 can cause network authentication system 104 to identify the logged on account and provide communication or content services for that account, but not the non-logged on accounts. Authentication message 114 can be configured, in this instance, to include log-on information associated with non-logged on accounts of the user, which can include separate log-on data for separate accounts, a set of log-on data configured to log the user into all associated accounts, or the like. Once logged into additional accounts, content associated with those accounts can be made available at least in part via network-enabled television 102, as described in more detail below.
Upon transmitting authentication message 114, network authentication system 104 can cause network-enabled television 102 to output a data input field 118 on a video/graphical display screen 116 of network-enabled television 102. User input data responsive to data input field 118 can be received via suitable user input device (e.g., remote control, button press on network-enabled television, . . . ) and compared with the personal identification data transmitted with authentication message 114. If the user input data matches the personal identification data, network-enabled television 102 can log onto a default user account, and obtain user preferences for the default user account from user profile 112. A user can then access and playback media associated with the default user account (e.g., a television program), access configuration and settings parameters of network-enabled television that are authorized to the default user account, switch accounts to a user account other than the default user account (e.g., by providing log-on information for the other user account), and so on.
In some aspects of the subject disclosure, user input data can be received in response to authentication message 114, instead of being entered into data input field 118. For instance, a reply message can be received in response to authentication message 114 from the communication server or network to which authentication message 114 was sent. If the reply message includes a suitable set of authentication data (e.g., the personal identification data, a password, a personal identification number (PIN), . . . ), network authentication system 104 can authenticate a user account associated with the suitable set of authentication data, terminate graphical input field 118, load user profile information from user profile 112 associated with the authenticated user account, and allow access to media, settings, content, etc., on network-enabled television 102 associated with the authenticated user account.
System 100 provides significant benefits over conventional network-enabled television systems. For instance, system 100 can facilitate automated login and authentication of a user account associated with the network-enabled television 102. Once the television is powered-on, system 100 can automatically check user account authentication, and load user account profile information associated with a pre-authenticated user account. If no pre-authenticated user account is available, a message can be sent to a stored communication/network account, such as to a mobile phone account, an e-mail account, etc., facilitating user authentication. A response input into the network-enabled television 102, or sent in reply to the message, (a reply mobile phone message, e-mail message, text message, . . . ) can be utilized to authenticate or activate a user account, and load preferences associated with the user account. Thus, system 100 can provide a quick and convenient mechanism for accessing an account associated with a network-enabled television 102.
In addition to the foregoing, network-enabled television 200 can comprise a network authentication system 204 that can be configured to provide user authentication, media content filtering, or automated playback functionality, as described herein. Network authentication system 204 can comprise a processor 208 configured to perform one or more functionality or configurations of network authentication system 204, in response to instructions stored in a memory 210. Processor 208 and memory 210 can be any suitable processor and memory device, and can comprise multiple processors and multiple memories, where suitable.
Network authentication system 200 can comprise an activation component 214 configured to receive a signal from a power source 212 of network-enabled television 200, in response to a power-up of the network-enabled television 200. In response to receiving the signal, activation component 214 can trigger an interface component, which can be configured to automatically access a network data store over a communication network (e.g., the data network) associated with network-enabled television. For instance, interface component 216 can access network interface 206 through a communication bus 218 communicatively connecting network interface 206 and network authentication system 204. Through communication bus 218, interface component 216 can send and receive data to/from the network data store located on the data network.
Upon accessing the network data store, a login component 220 configured to employ the interface component 216 can retrieve data from the network data store that is indicative of an authorization status of a set of user accounts associated with network-enabled television 200. Login component 220 can identify any user accounts that have a positive authorization status (or pre-authorized, etc.). Login component 220 can be configured to access and load profile information (e.g., account settings, media content filtering, configuration controls, and so on) associated with an activated account(s) onto network-enable television 200. In some aspects, once profile information is loaded, media content filtering and auto playback can be initiated, as described in more detail below.
In login component 220 determines that no user account has positive authorization status, no user account information is loaded for network-enabled television 200. A query component 222 can be employed that is configured to transmit, in response to data indicating a negative authorization status for the set of user accounts associated with network-enabled television 200, an authorization message to a mobile device account associated with at least one of the set of user accounts. The authorization message can comprise authorization data configured to authenticate an identity of a user of one or more of the set of user accounts.
In conjunction with sending the message, a data entry component 224 can be configured to provide an input field on a display of network-enabled television 200. Data entry component 224 can be further configured to receive a set of user input data from a user input device (e.g., a remote control) associated with the network-enabled television. Data entry component 224 can be further configured to compare the set of user input data to the authorization data, and authenticate an identity of a user of at least one of the set of user accounts in response to the set of user data matching the authorization data. If the set of user input data does not match the authorization data, data entry component 224 can be further configured to compare the set of user input data to a set of authorization data having respective subsets of authorization data associated with respective ones of a set of user accounts. Moreover, data entry component 224 can be configured to authenticate an identity of another user (e.g., a user having a different user account, a user sharing a user account(s) associated with the at least one of the set of user accounts and the mobile device account, etc.) in response to the set of user input data matching one of the respective subsets of authorization data, and authorize or log the user into an associated respective one of the set of user accounts associated with the one of the respective subsets of the authorization data. Once this user is logged in, profile information and user preferences (if any) related to the respective one of the set of user accounts can be loaded onto network-enabled television 200, to facilitate identifying preferred media content for the user, providing access to functionality, configurations and settings of network-enabled television 200 associated with the user, and so on.
As depicted, network-enabled television 200 can further comprise an automated playback component 226. Automated playback component 226 can be configured to reference a user profile, or user profile information loaded onto network-enabled television, for an authenticated user of network-enabled television. Further, automated playback component 226 can be configured to filter available content from a content provider (e.g., television programming) utilizing one or more stored parameters of the user profile. The stored parameters can relate to a preferred genre(s) of content, a preferred show title, a preferred type of show (e.g., sitcom, movie, news and current events, . . . ), and can be based on usage history associated with the authenticated user. Moreover, automated playback component 226 can be configured to select a subset of preferred media programs from the available content that result from the filtering, and to automatically playback one or more of the subset of preferred media programs. In a particular aspect, stored user preference selections or user preference input data can be utilized to select a particular media program from the preferred media programs, and automatically play the selected media program in response to network-enabled television being powered-on—if a user account is pre-authorized, or in response to authorizing such an account and loading profile or preference information of such account (e.g., see
In the event that network authentication system 304 retrieves data from authorization data file 310 indicating multiple user accounts are pre-authorized, a process for selecting one of the multiple user accounts can be initiated. In one aspect, the process can comprise referencing user accounts file 308 and identifying a default user account, and load user preference or account profile information associated with the default user account. In an alternative, or additional aspect, the process can comprise displaying a user input data field onto a display screen of network-enabled television 302. User input from a remote control 320 can be utilized to select one of the multiple user accounts for loading onto network-enabled television 302.
In the event that network authorization system 304 determines that no user account is pre-authorized for network-enabled television 302, a message (e.g., e-mail, text mail, voice mail, SMS, MMS, social network message, social media website page, . . . ) can be generated and transmitted, comprising personal identification data. The personal identification data can include a PIN, a password, an account name, or the like, or a suitable combination thereof. In at least one aspect, the personal identification data can comprise a sequence of key presses of remote control 320. As one illustrative example, if remote control 302 includes a playback, skip back, skip forward, pause and stop playback buttons (among others), the personal identification data can comprise a sequence of these buttons. This can provide a much more user-friendly code entry system, than displaying an alphabet, numbering system, or the like on the display, and requiring a user authenticate with such methods.
In a particular aspect of the subject disclosure, the message generated and transmitted by network authentication system 304 can comprise a mobile network message (e.g., text, SMS, MMS, . . . ) transmitted to a mobile network 316 and addressed for a user mobile device 318. In this case, the message could include authentication data configured for easy entry on a user interface of user mobile device 318. The configuration can be particular to a single user mobile device 318 (e.g., having user-assigned key functionality), a particular type or class of user mobile device (e.g., having a particular keyboard), a particular manufacturer of user mobile device 318, and so forth. Accordingly, the configuration can facilitate ease of entry, depending on hardware or software peculiarities of user mobile device 318.
In at least one further aspect, distribution of the message can be by one of various methods. In a first aspect, network authentication system 304 can distribute the message to one or more default mobile devices (e.g., mobile device 318) associated with account log-in. In a second aspect, network authentication system 304 can instead receive information identifying a user, retrieve an account associated with the user, and distribute the message to a mobile device stored in relation to the account associated with the user. In this aspect, a user could provide some input on remote control 320 identifying the user, and the message can include personal identification data sent to the mobile device for the purposes of verifying that identity. In a third aspect, upon receiving authentication data from network-enabled television 302, mobile network 316 can be configured to acquire position locations of mobile devices (e.g., by network-generated position location, mobile device generated position location, . . . ,) within a predetermined or user-established distance of network-enabled television 302. Those mobile devices within such distance, and that are stored in data store 306 in association with one or more user accounts or default accounts, can be sent the message. Thus, mobile network 316 can be employed to discriminately send the message only to devices within a certain range of network-enabled television. In a fourth aspect, network authentication system 304 can transmit the message to all mobile devices stored in data store 306 in associated with the one or more user accounts or default accounts.
Upon entering the authentication data, a reply message is sent to network-enabled television 302 and retrieved by network authentication system 304. If the authentication data matches stored authentication data, an associated user account, user preferences, account profile, filtered media content, etc., can be loaded onto network-enabled television 302 to simplify the logon and media selection experience of a user of network-enables television 302.
In at least one aspect of the subject disclosure, a message sent by network authentication system 304 over a particular media type (e.g., mobile network, e-mail server, user data input field on a display on network-enabled television 302, . . . ) can be replied over a different media type. For instance, a code sent in an SMS message can be entered by remote control 320 into a user data input field on network-enabled television 302, instead of via data entry on user mobile device 318. In another instance, the reverse can be implemented, and so on.
Network-enabled television 400 can comprise a network authentication system 402 having a data store 404 for storing information pertaining to one or more users, or one or more user accounts for network-enabled television 400. To authorize user accounts for future user use, network authentication system 402 can transmit a login message to an electronic communication account stored in data store 404. The electronic communication account can include an e-mail account, mobile phone account, social media account, or the like, or a suitable combination thereof. The login message includes authentication data associated with verifying identity of a user(s) of the one or more user accounts. In response to the login message, network-enabled television 400 can receive a set of user input data in response. A data entry component 406 can be configured to compare the user input data with security, password, login, authorization, etc., information related to the one or more user accounts. Data entry component 406 can determine whether the user input data matches any information related to the user accounts, and authorize an account matching the user input data. If the user input data does not match stored account information, authorization is denied.
Upon authorizing a user account, data entry component 406 can provide information identifying the authorized account to an automated playback component 410. Utilizing the identifying information, automated playback component 410 can access data store 404 and extract user preference data for the authorized account from a user preferences file 412, and account profile data for the authorized account from an account profile 414. Additionally, automated playback component 410 can receive a listing of available media content associated with the authorized account. The media content can include media content configured for the authorized account by a content service provider, for instance. Automated playback component 410 can compare information related to the media content (e.g., metadata information, or the like) to account profile information, and filter a subset of the media content based on one or more parameters within the account profile information. In at least one aspect, account profile information can contain usage history information derived from patterns of media playback associated with the authorized account. The usage history information can identify one or more programs, genres, types of programs, etc., often selected by a user of the authorized account. This information can be utilized to filter the subset of the media content from a superset of the media content.
Further to the above, automated playback component 410 can further filter the subset of the media content based on the user preference information. User provided user preferences for a favorite, preferred, non-preferred, disliked, etc., program, type of program, genre, and so forth, can be employed in selecting a media program of the subset of the media content. Automated playback component 410 can then initiate playback of the selected media program on a main display of network-enabled television 400. Accordingly, network authentication system 402 can enable automated authentication and login of a user account, automated content filtering, and playback of a selected media program chosen from available media content with reference to user usage history and user preferences as a filtering mechanism for the media content.
According to a particular aspect of the subject disclosure, one or more media programs of the subset of the media content can be displayed on a portion of a display screen of network-enabled television 400. For instance, a graphical, pictorial or video clip of respective media programs can be displayed within respective display icons in the portion of the display screen. A user input selection can facilitate display of different subsets of display icons, depicting different media programs of the subset of media content. Moreover, a user selection of one of the display icons can initiate playback of an associated media program. If automated playback of a media program selected by automated playback component 410 has already been initiated, automated playback component 410 can be configured to terminate the automated playback, and initiate the playback of the user selected media program.
The aforementioned diagrams have been described with respect to interaction between several systems, apparatuses, components, user interfaces, and display indicators. It should be appreciated that such diagrams can include those components or systems specified therein, some of the specified components, or additional components. For example, a system could include network-enabled television 200 comprising network authentication system 204, and data store 404. Sub-components could also be implemented as components electrically connected to other sub-components rather than included within a parent component. Additionally, it should be noted that two or more components could be combined into a single component providing aggregate functionality. For instance, activation component 214 can include interface component 216 to facilitate receiving a power-on signal and initiating a communication session on a network over network interface 206, by way of a single component. Components of the disclosed systems and apparatuses can also interact with one or more other components not specifically described herein but known by those of skill in the art, or made known to one of skill in the art by way of the context provided herein.
In view of the exemplary diagrams described supra, process methods that may be implemented in accordance with the disclosed subject matter will be better appreciated with reference to the flow chart of
In some aspects, executing the authentication process can further comprise sending user authentication data to an electronic communication account associated with the user account. In these aspects, receiving the user authentication data can further comprise receiving the user authentication data from the electronic communication account in response to verification of the identity of the user by the electronic communication account.
In other disclosed aspects, method 600 can additionally comprise displaying a request for user input of the user authentication data in response to receiving the user authentication data over the IP network. In still other aspects, method 600 can further comprise receiving a set of user input data in response to the request, and either granting access to content associated with the user account in response to the set of user input data matching the user authentication data, or denying access to the content associated with the user account in response to the set of user input data matching the user authentication data. In one aspect, receiving the set of user input data can comprise receiving the set of user input data via a user input device associated with the network-enabled television (e.g., a remote control, . . . ). In another aspect, receiving the set of user input data can comprise receiving the set of user input data via the IP network from an electronic communication account (e.g., a mobile network subscriber account, an e-mail account, a Twitter® account, Facebook® account, . . . ) associated with the user account. In still further aspect, method 600 can comprise referencing a content profile associated with the user account and retrieving preferred content information associated with the user profile in response to granting access to content associated with the user account. Additionally, the method can comprise referencing service provider content associated with the user account, identifying a subset of the service provider content that satisfies a condition associated with the preferred content information. In response to identifying the subset of the service provider content, the method can comprise selecting a media program from the subset of the service provider content, and tuning the network-enabled television to a channel or source of the media program, to facilitate automatic playback of the media program on the network-enabled television. In a particular aspect, selecting the media content can further comprise referencing a stored user profile associated with the user account and filtering the subset of the service provider content with one or more content filtering parameters of the stored user profile.
At 712, method 700 can comprise sending a login message to a communication network account (e.g., mobile phone, SMS, MMS, text, e-mail, . . . ) associated with the network-enabled television. At 714, method 700 can comprise receiving authentication data in response to the login message. The authentication data can be received in a user input field of the network-enabled television, or alternatively in from the communication network account in response to the login message. At 716, method 700 can comprise matching the received authentication data to user account authentication data stored in the network data store. At 718, method 700 can comprise identifying a user account matching the authentication data. At 720, method 700 can comprise authenticating the user account and logging a user into the user account in response to the authentication data matching user account authentication data. At 722, method 700 can comprise storing data at the network data store indicating pre-authorization of the user account for reference in regard to a subsequent power-on event for the network-enabled television. From 722, method 700 can proceed to 724 at
Referring now to
With reference to
The system bus 908 can be any of several types of bus structure that can further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. The system memory 906 includes read-only memory (ROM) 910 and random access memory (RAM) 912. A basic input/output system (BIOS) is stored in a non-volatile memory 910 such as ROM, EPROM, EEPROM, which BIOS contains the basic routines that help to transfer information between elements within the computer 902, such as during start-up. The RAM 912 can also include a high-speed RAM such as static RAM for caching data.
The computer 902 further includes an internal hard disk drive (HDD) 914 (e.g., EIDE, SATA), which internal hard disk drive 914 can also be configured for external use in a suitable chassis (not shown), a magnetic floppy disk drive (FDD) 916, (e.g., to read from or write to a removable diskette 918) and an optical disk drive 920, (e.g., reading a CD-ROM disk 922 or, to read from or write to other high capacity optical media such as the DVD). The hard disk drive 914, magnetic disk drive 916 and optical disk drive 911 can be connected to the system bus 908 by a hard disk drive interface 924, a magnetic disk drive interface 926 and an optical drive interface 928, respectively. The interface 924 for external drive implementations includes at least one or both of Universal Serial Bus (USB) and IEEE 994 interface technologies. Other external drive connection technologies are within contemplation of the subject innovation.
The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For the computer 902, the drives and media accommodate the storage of any data in a suitable digital format. Although the description of computer-readable media above refers to a HDD, a removable magnetic diskette, and a removable optical media such as a CD or DVD, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as zip drives, magnetic cassettes, flash memory cards, cartridges, and the like, can also be used in the exemplary operating environment, and further, that any such media can contain computer-executable instructions for performing the methods of the disclosed innovation.
A number of program modules can be stored in the drives and RAM 912, including an operating system 930, one or more application programs 932, other program modules 934 and program data 936. All or portions of the operating system, applications, modules, and/or data can also be cached in the RAM 912. It is to be appreciated that aspects of the subject disclosure can be implemented with various commercially available operating systems or combinations of operating systems.
A user can enter commands and information into the computer 902 through one or more wired/wireless input devices, e.g., a keyboard 938 and a pointing device, such as a mouse 940. Other input devices (not shown) may include a microphone, an IR remote control, a joystick, a game pad, a stylus pen, touch screen, or the like. These and other input devices are often connected to the processing unit 904 through an input device interface 942 that is coupled to the system bus 908, but can be connected by other interfaces, such as a parallel port, an IEEE 2394 serial port, a game port, a USB port, an IR interface, etc.
A monitor 944 or other type of display device is also connected to the system bus 908 through an interface, such as a video adapter 946. In addition to the monitor 944, a computer typically includes other peripheral output devices (not shown), such as speakers, printers, etc.
The computer 902 can operate in a networked environment using logical connections by wired and/or wireless communications to one or more remote computers, such as a remote computer(s) 948. The remote computer(s) 948 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 902, although, for purposes of brevity, only a memory/storage device 950 is illustrated. The logical connections depicted include wired/wireless connectivity to a local area network (LAN) 952 and/or larger networks, e.g., a wide area network (WAN) 954. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, e.g., the Internet.
When used in a LAN networking environment, the computer 902 is connected to the local network 952 through a wired and/or wireless communication network interface or adapter 956. The adapter 956 may facilitate wired or wireless communication to the LAN 952, which may also include a wireless access point disposed thereon for communicating with the wireless adapter 956.
When used in a WAN networking environment, the computer 902 can include a modem 958, or can be connected to a communications server on the WAN 954, or has other means for establishing communications over the WAN 954, such as by way of the Internet. The modem 958, which can be internal or external and a wired or wireless device, is connected to the system bus 908 through the serial port interface 942. In a networked environment, program modules depicted relative to the computer 902, or portions thereof, can be stored in the remote memory/storage device 950. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
The computer 902 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g., a printer, scanner, desktop and/or portable computer, portable data assistant, communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone. This includes at least Wi-Fi® and Bluetooth™ wireless technologies. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
Wi-Fi, allows connection to the Internet from a couch at home, a bed in a hotel room, or a conference room at work, without wires. Wi-Fi is a wireless technology similar to that used in a cell phone that enables such devices, e.g., computers, to send and receive data indoors and out; anywhere within the range of a base station. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b, g, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, or with products that contain both bands (dual band), or other bands (e.g., 802.11g, 802.11n, . . . ) so the networks can provide real-world performance similar to the basic 10BaseT wired Ethernet networks used in many offices.
Each computing object 1010, 1012, etc. and computing objects or devices 1020, 1022, 1024, 1026, 1028, etc. can communicate with one or more other computing objects 1010, 1012, etc. and computing objects or devices 1020, 1022, 1024, 1026, 1028, etc. by way of the communications network 1042, either directly or indirectly. Even though illustrated as a single element in
There are a variety of systems, components, and network configurations that support distributed computing environments. For example, computing systems can be connected together by wired or wireless systems, by local networks or widely distributed networks. Currently, many networks are coupled to the Internet, which provides an infrastructure for widely distributed computing and encompasses many different networks, though any network infrastructure can be used for exemplary communications made incident to the systems for search augmented menu and configuration functions as described in various embodiments.
Thus, a host of network topologies and network infrastructures, such as client/server, peer-to-peer, or hybrid architectures, can be utilized. One or more of these network topologies can be employed by network-enabled television 102, 200, 302, 400, 500 for communicating with a network. The “client” is a member of a class or group that uses the services of another class or group to which it is not related. A client can be a process, i.e., roughly a set of instructions or tasks, that requests a service provided by another program or process. The client process utilizes the requested service without having to “know” any working details about the other program or the service itself.
In a client/server architecture, particularly a networked system, a client is usually a computer that accesses shared network resources provided by another computer, e.g., a server. In the illustration of
A server is typically a remote computer system accessible over a remote or local network, such as the Internet or wireless network infrastructures. The client process may be active in a first computer system, and the server process may be active in a second computer system, communicating with one another over a communications medium, thus providing distributed functionality and allowing multiple clients to take advantage of the information-gathering capabilities of the server. Any software objects utilized pursuant to the techniques described herein can be provided standalone, or distributed across multiple computing devices or objects.
In a network environment in which the communications network 1042 or bus is the Internet, for example, the computing objects 1010, 1012, etc. can be Web servers with which other computing objects or devices 1020, 1022, 1024, 1026, 1028, etc. communicate via any of a number of known protocols, such as the hypertext transfer protocol (HTTP). Computing objects 1010, 1012, etc. acting as servers may also serve as clients, e.g., computing objects or devices 1020, 1022, 1024, 1026, 1028, etc., as may be characteristic of a distributed computing environment.
In the disclosed subject matter, in addition to receiving and processing CS-switched traffic and signaling, PS gateway node(s) 1118 can authorize and authenticate PS-based data sessions with served mobile devices. Data sessions can include traffic, or content(s), exchanged with networks external to the wireless network platform 1110, like wide area network(s) (WANs) 1150, enterprise network(s) 1170, and service network(s) 1180, which can be embodied in local area network(s) (LANs), as well as other types of networks not herein disclosed 1190, can also be interfaced with mobile network platform 1110 through PS gateway node(s) 1118. It is to be appreciated that mobile network platform 1110 can communicate with network-enabled television 102, 200, 302, 400, 500 via WAN 1150, enterprise network(s) 1170, or service network(s) 1180, where network-enabled television 102, 200, 302, 400, 500 maintains a suitable connection to one or more of the foregoing networks. It is to be further noted that WANs 1150 and enterprise network(s) 1160 can embody, at least in part, a service network(s) like IP multimedia subsystem (IMS). Based on radio technology layer(s) available in technology resource(s) 1117, packet-switched gateway node(s) 1118 can generate packet data protocol contexts when a data session is established; other data structures that facilitate routing of packetized data also can be generated. To that end, in an aspect, PS gateway node(s) 1118 can include a tunnel interface (e.g., tunnel termination gateway (TTG) in 3GPP UMTS network(s) (not shown)) which can facilitate packetized communication with disparate wireless network(s), such as Wi-Fi networks.
In embodiment 1100, wireless network platform 1110 also includes serving node(s) 1116 that, based upon available radio technology layer(s) within technology resource(s) 1117, convey the various packetized flows of data streams received through PS gateway node(s) 1118. It is to be noted that for technology resource(s) 1117 that rely primarily on CS communication, server node(s) can deliver traffic without reliance on PS gateway node(s) 1118; for example, server node(s) can embody at least in part a mobile switching center. As an example, in a 3GPP UMTS network, serving node(s) 1116 can be embodied in serving GPRS support node(s) (SGSN).
For radio technologies that exploit packetized communication, server(s) 1114 in wireless network platform 1110 can execute numerous applications (e.g., location services, online gaming, wireless banking, wireless device management, wireless link characterization, mobile device capability acquisition, . . . ) that can generate multiple disparate packetized data streams or flows, and manage (e.g., schedule, queue, format . . . ) such flows. Such application(s) can include add-on features to standard services (for example, provisioning, billing, customer support . . . ) provided by wireless network platform 1110. Data streams (e.g., content(s) that are part of a voice call or data session) can be conveyed to PS gateway node(s) 1118 for authorization/authentication and initiation of a data session, and to serving node(s) 1116 for communication thereafter. In addition to application server, server(s) 1114 can include utility server(s); a utility server can include a provisioning server, an operations and maintenance server, a security server that can implement at least in part a certificate authority and firewalls as well as other security mechanisms, and the like. In an aspect, security server(s) secure communication served through wireless network platform 1110 to ensure network's operation and data integrity in addition to authorization and authentication procedures that CS gateway node(s) 1112 and PS gateway node(s) 1118 can enact. Moreover, provisioning server(s) can provision services from external network(s) like networks operated by a disparate service provider; for instance, WAN 1150 or Global Positioning System (GPS) network(s) (not shown). Provisioning server(s) can also provision coverage through networks associated to wireless network platform 1110 (e.g., deployed and operated by the same service provider), such as Femto cell network(s) (not shown) that enhance wireless service coverage within indoor confined spaces and offload RAN resources in order to enhance subscriber service experience within a home or business environment.
It is to be noted that server(s) 1114 can include one or more processors configured to confer at least in part the functionality of macro network platform 1110. To that end, the one or more processor can execute code instructions stored in memory 1130, for example. It is should be appreciated that server(s) 1114 can include a content manager 1115, which operates in substantially the same manner as described hereinbefore.
In example embodiment 1100, memory 1130 can store information related to operation of wireless network platform 1110. In particular, memory 1130 can include contents of data store 108 in example system 100, data store 306 of example system 300, or data store 404 in example network-enabled television 400. Other operational information can include provisioning information of mobile devices served through wireless platform network 1110, subscriber databases; application intelligence, pricing schemes, e.g., promotional rates, flat-rate programs, couponing campaigns; technical specification(s) consistent with telecommunication protocols for operation of disparate radio, or wireless, technology layers; and so forth. Memory 1130 can also store information from at least one of telephony network(s) 1140, WAN 1150, enterprise network(s) 1160, or SS7 network 1170.
It is to be noted that aspects, features, or advantages of the disclosed subject matter described in the subject specification can be exploited in substantially any wireless communication technology. For instance, Wi-Fi, WiMAX, Enhanced GPRS, 3GPP LTE, 3GPP2 UMB, 3GPP UMTS, HSPA, HSDPA, HSUPA, GERAN, UTRAN, LTE Advanced. Additionally, substantially all aspects of the disclosed subject matter as disclosed in the subject specification can be exploited in legacy telecommunication technologies; e.g., GSM. In addition, mobile as well non-mobile networks (e.g., internet, data service network such as internet protocol television (IPTV)) can exploit aspects or features described herein.
What has been described above includes examples of systems and methods that provide aspects of the disclosed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the disclosed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the subject matter are possible. Furthermore, to the extent that the terms “includes,” “has,” “possesses,” and the like are used in the detailed description, claims, appendices and drawings such terms are intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.