Method and interface for video content acquisition security on a set-top box

Abstract
A method of providing access to downloadable protected video content includes providing parental controls. The parental controls include a parental control password. Purchase controls are also provided and include a purchase control password. The purchase control password is different from the parental control password. Further, protected video content is downloaded and stored to a memory within a set top box when both the parental controls and the purchase controls are satisfied. A number of attempts to correctly input the parental control password or the purchase control password are monitored. When the number of attempts for either password exceeds a predetermined threshold, a user is prevented from further attempts to input the respective password. Moreover, the attempt to download protected video content is canceled, and further downloads of protected video content are prevented for a predetermined time period.
Description
FIELD OF THE DISCLOSURE

The present disclosure relates generally to video content security using set top boxes.


BACKGROUND

For years, televisions have been a staple of consumer electronics sales. As such, a large majority of households in the United States owns at least one television. Providing content to those televisions is a lucrative business and there are numerous types of television content to choose from. For example, viewers can subscribe to digital broadband television networks and digital satellite television networks in order to receive standard digital television content or high definition television content via a broadband connection or a satellite connection. In addition, many companies now offer digital video recorders (DVRs) that can be incorporated into standard set top boxes. A DVR can be used to record digital television content transmitted to the set top box.


Many service providers also offer streaming video content and pre-cache video content in order to provide a user with content that is tailored to his or her needs or tastes. A user can simply order video content, e.g., a movie, and the video content is downloaded to a set top box for display at a television. A standard set top box typically may not include security for the control of purchased content or it may include a single global password that controls all content access functions. Many times the global password is a default password, such as 1-2-3-4, that is never reset by the master account holder. Thus, protected video content may be easily downloaded and saved at the set top box.


Accordingly, there is a need for an improved method and system for video content acquisition security.




BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is pointed out with particularity in the appended claims. However, other features are described in the following detailed description in conjunction with the accompanying drawings in which:



FIG. 1 is a block diagram representative of an entertainment system;



FIG. 2 is a flow chart to illustrate general operating logic that can be used to provide security for acquiring video content;



FIG. 3 is a general diagram illustrating a parental control authorization screen;



FIG. 4 is a general diagram illustrating a purchase control authorization screen; and



FIG. 5 is a flow chart to illustrate alternative general operating logic that can be used to provide security for acquiring video content.




DETAILED DESCRIPTION OF THE DRAWINGS

A method of providing access to downloadable protected video content includes providing parental controls. The parental controls include a parental control password. Purchase controls are also provided and include a purchase control password. The purchase control password is different from the parental control password. Further, protected video content is downloaded and stored to a memory within a set top box when both the parental controls and the purchase controls are satisfied.


In a particular embodiment, the method further includes detecting when parental controls are active. Thereafter, a rating of the protected video content is determined. When the rating exceeds a threshold rating, a parental control authorization screen is displayed. Further, a parental control password is received and verified. Access to the protected video content is denied when the parental control password is incorrect. Moreover, a number of attempts to correctly input the parental control password is monitored. When the number of attempts exceeds a predetermined threshold, a user is prevented from further attempts to input the parental control password, the attempt to download protected video content is canceled, and further downloads of protected video content are prevented for a predetermined time period.


The method further includes detecting when the purchase controls are active and determining when a spending limit has been reached. When the spending limit is reached, the attempt to download the protected video content is canceled and further downloads of protected video content are prevented for a predetermined time period. Further, any additional downloads of protected video content can be prevented until the spending limit is waived, e.g., by a master user or a content provider.


In an illustrative embodiment, the method can also include displaying a purchase control authorization screen. Next, a purchase control password can be received and verified. Access to the protected video file is denied when the purchase control password is incorrect. Also, a number of attempts to correctly input the correct purchase control password is monitored. When the number of attempts exceeds a predetermined threshold, a user is prevented from further attempting to input the purchase control password and the present attempt to download the protected video file is canceled. Further, when the number of attempts exceeds a predetermined threshold, all attempts to download protected video content are prevented for a predetermined time period.


In another embodiment, a device is provided for managing acquisition of video content. The device includes a processor that has a computer readable medium. A computer program is embedded within the computer readable medium. The computer program includes instructions to prevent downloading of protected video content after a predetermined spending limit is reached.


In yet another embodiment, a system for managing video content is provided. The system includes a display device, a remote control, and a set top box that is coupled to the display device and responsive to the remote control. The set top box includes a processor that has a computer readable medium. Moreover, the computer readable medium stores a user defined spending limit. When the user defined spending limit is exceeded, downloading of protected video content is blocked.


Referring to FIG. 1, a system for managing movies provided at a television is illustrated and is generally designated 100. As illustrated in FIG. 1, in an exemplary, non-limiting embodiment, the system 100 includes a television 102, but it can be appreciated that the system 100 can include any display device on which video content can be displayed. FIG. 1 indicates that a set top box 104 can be connected to the television 102 via a first broadband connection 106. The set top box 104 is also connected to a video content provider, e.g., a cable company or a digital satellite company, via a second broadband connection 108. FIG. 1 also depicts a remote control unit 110 that can communicate with the set top box 104 to allow user interaction with the system 100 during operation. The remote control unit 110 can communicate with the set top box 104 via one or more infrared (IR) signals, or other wireless signals.


As indicated in FIG. 1, the set top box 104 includes a processor 112 in which logic, such as user interface logic, can be executed. Further, the set top box 104 includes a memory 114 in which content from the content provider can be downloaded and stored. FIG. 1 also shows that the set top box 104 can include a receiver 116, e.g., an IR receiver, that is configured to receive one or more IR signals from the remote control unit 110. Moreover, as depicted in FIG. 1, the remote control unit 110 can include a plurality of buttons 118 that can be toggled by a user during operation in order to downloaded protected content, e.g., video files, music files, photographs, etc. FIG. 1 further shows that the set top box 104 can also include a plurality of buttons 120 that can be toggled by a user during operation in order to download protected content.


Referring to FIG. 2, a particular embodiment of operating logic of the system 100 (FIG. 1) is shown and commences at block 200, wherein when protected video content is requested, the succeeding steps are performed. In an illustrative embodiment, the protected video content includes movies that can be stored as video files at the memory 114 (FIG. 1) within the set top box 104 (FIG. 1). Typically, the movies are pre-stored at a content provider and are not live real-time video content. When requested, the movies can be transmitted, e.g., streamed, to the set top box 104 (FIG. 1) and stored at the memory 114 (FIG. 1). In another embodiment, the content can be downloaded to the set top box 104 in its entirety before it is available for viewing at the set top box 104, i.e., the content is not streamed. At step 202, a decision is undertaken in order to determine whether any security controls are active. If there are no active security controls, the logic moves to block 204 and the protected video content is downloaded to the set top box 104 (FIG. 1). At block 206, the protected video content is displayed at the display device 102 (FIG. 1). The logic then ends at state 208.


Returning to step 202, if there are active security controls, the logic proceeds to step 210. At step 210, a decision is made to ascertain if parental controls are active. If parental controls are not active, the logic continues to step 212 and a decision is made to determine whether purchase controls are active. Returning to step 210, if parental controls are active, the logic moves to step 214. At step 214, a determination is made in order to check whether the rating of the protected video content exceeds a limit that is set by a master user, e.g., a parent. The rating of the video content can be a Motion Picture Association of America (MPAA) rating such as G, PG, PG-13, R, NC-17, and NR. Alternatively, the rating can be a V-chip rating or a parent's music resource center rating (PMRC). A master user can set the rating limit used in decision step 214 in order to prevent video content with a rating above the limit from being downloaded to the set top box 104 (FIG. 1). As such, if the rating of the protected video content does not exceed the predetermined limit, the logic continues to step 212 in order to determine if the purchase controls are active.


If the rating of the protected content does exceed the limit imposed by the master user, the logic continues to block 216 and a parental control authorization window is presented. Moving to step 218, a decision is made to determine if the user has cancelled the attempt to download the protected video content. If so the logic ends at state 208.


If the user does not cancel the attempt to download the protected video content, the logic continues to block 220 and a parental control password is received. Next, at step 222, a decision is undertaken in order to determine whether the parental control password is correct. If the password is incorrect, the logic moves to block 224 where the user is advised that the password is incorrect. Then, at step 226 a determination is made to determine whether the number of attempts to input the correct password is greater than a predetermined number of attempts, N. If the number of attempts exceeds the predetermined limit, the logic moves to block 228 and the user is advised that the transaction is cancelled. Proceeding to block 230, protected video content downloads are prevented for a predetermined time period, T, or until a master account holder overrides the security controls and authorizes downloads. In an illustrative embodiment, a master user can set the number of attempts, N, which, if exceeded, will cause the transaction to be cancelled in block 228.


If the password is correct at decision step 222, the logic moves to step 212 and a decision is undertaken in order to determine whether purchase controls are active. If purchase controls are not active, the logic continues to block 204 and continues as described above. On the other hand, if purchase controls are active, the logic proceeds to step 232 and a decision is made in order to ascertain whether a pre-defined spending limit has been reached. In an illustrative embodiment, the spending limit can be imposed by the master user for a period of a week, a month, etc. However, the spending limit can also be imposed by the content provider if a particular customer has had previous difficulty paying for downloads, if the customer has an outstanding unpaid bill, or if the user pre-paid for video content and has exceeded the amount that was pre-paid. If the spending limit has been reached, the logic moves to block 228 and the set top box 104 (FIG. 1) advises that the transaction is cancelled. At block 230, protected video content downloads are prevented for a time period, T, e.g., until payment has been received for previous downloads or until the master account holder overrides the purchase controls. The logic then ends at state 208.


Returning to step 232, if the pre-set spending limit has not been reached, or there is not a pre-set spending limit, the logic continues to block 234 and a purchase control authorization window is displayed. Thereafter, at step 236, a decision is made in order to determine if the user has cancelled the attempt to download the protected content. If so, the logic ends at state 208. Conversely, if the attempt to download the protected content is not cancelled, the logic moves to block 238 and a purchase control password is received by the set top box 104 (FIG. 1).


Continuing to step 240, a determination is made in order to verify the purchase control password. If the password is incorrect, the logic moves to block 242 where the user is advised that the password is incorrect. Then, at step 244 a determination is undertaken in order to determine whether the number of attempts to input the correct password is greater than a predetermined number of attempts, N. If the number of attempts exceeds the predetermined limit, the logic moves to block 228 and continues as described above. If the number of attempts, N, does not exceed the limit, the logic returns to block 238 and another purchase control password is received. The logic then returns to step 240 and continues as described above. At step 240, if the purchase control password is correct, the logic proceeds to step 204 and the video content is allowed to download. The video content can then be displayed at block 206. The logic then ends.


Referring now to FIG. 3, an exemplary parental control authorization screen is shown and is designated 300. As shown, the parental control authorization screen 300 includes an admonishment to a user 302 that reads, “The movie you are trying to purchase has a rating that requires your Parental Control password. Please enter your Parental Control password and press ‘Ok’.” Moreover, the parental control authorization screen 300 includes a password input window 304 into which a user can input an alphanumeric password which will allow protected video content above a rating limit to be downloaded. The parental control authorization screen 300 also includes an “Ok” button 306 and a “Cancel” button 308. The “Ok” button 306 can be selected in order to submit the parental control password to the set top box 104 (FIG. 1). The “Cancel” button 308 can be used to cancel the transaction.



FIG. 4 shows an exemplary purchase control authorization screen, which is designated 400. As shown, the purchase control authorization screen 400 includes an admonishment to a user 402 that reads, “You are about to purchase a movie and will be charged $3.99. Please enter your Purchase Control password.” Moreover, the purchase control authorization screen 400 includes a password input window 402 into which a user can input an alphanumeric password which will allow protected video content above a rating limit to be downloaded. The purchase control authorization screen 400 also includes an “Ok” button 406 and a “Cancel” button 408. The “Ok” button 406 can be selected in order to submit the purchase control password to the set top box 104 (FIG. 1). The “Cancel” button 408 can be used to cancel the transaction.


In an alternative embodiment, protected music files and protected photographs can be downloaded in addition to protected video files, or instead of protected video files. Moreover, in an alternative embodiment, the content can reside on the set top box 104 and instead of downloading the content, the set top box 104 can unlock the content, or otherwise provide access to the content, before the content is displayed. However, the controls can work the same and prevent access to the content in the same manner as described herein. Moreover, in the case that a user picks the same password for the parental controls and the purchase controls, the system would ask a single combined question for the password.


Referring now to FIG. 5, an alternative embodiment of operating logic of the system 100 (FIG. 1) is shown and commences at block 500 when protected content is requested. At block 502, the protected content is downloaded. The protected content is locked to prevent access at step 504. Moving to decision step 506, a decision is undertaken in order to ascertain whether any security controls are active. If there are no active security controls, the logic moves to block 508 and the protected video content is unlocked at the set top box 104 (FIG. 1). At block 510, the protected video content is delivered to the display device 102 (FIG. 1) where it can be viewed, listened to, etc. The logic then ends at state 512.


At decision step 506, if there are active security controls, the logic continues to step 514. At step 514, a decision is made in order to determine if any of the security controls have been violated 514. If not, the logic moves to block 508 and continues as described above. On the other hand, if any security control has been violated at step 514, the logic moves to block 516 and where the user is indicated that one or more security controls have been violated.


Proceeding to decision step 518, a determination is made in order to ascertain whether an attempt to access protected content has been made. If an attempt is not made to access protected content, the logic ends at state 512. However, if an attempt is made, the logic moves to block 520 and a control password authorization window is displayed, e.g., at the display device 102 (FIG. 1). At block 522, a control password is received. Next, at step 524, a decision is undertaken in order to determine whether the control password is correct. If the password is incorrect, the logic moves to block 526 where the user is advised that the password is incorrect. Then, at step 528 a determination is made to determine whether the number of attempts to input the correct password is greater than a predetermined number of attempts, N. If the number of attempts exceeds the predetermined limit, the logic moves to block 530 and the user is advised that the transaction is cancelled. Proceeding to block 532, access is prevented to protected content until indicated by a master account holder.


At step 528, if the number of attempts does not exceed the threshold, the logic returns to block 522 and a control password is received, again. Thereafter, if the control password is correct at decision step 524, the protected content is unlocked at block 508 and delivered to the display device 102 at block 510. The logic then ends at state 512.


With the configuration of structure described above, the system and method for video content acquisition security provides a flexible way to prevent unauthorized access to protected video content. The system breaks the security into two components: parental control security and purchase control security. The parental control security can allow or prevent access to video content based on the rating it has received from the MPAA, the Federal Communication Commission (FCC) V-chip rating system, the Recoding Industry Association of America (RIAA) rating system, or the parent's music resource center (PMRC) rating system. The access to protected video content is determined by the master account holder and can be set during the setup of the set-top box. The parental controls can be changed at any time by the master account holder or disabled completely.


The purchase control security operates in conjunction with the parental control security. The purchase control security uses password authentication to authorize the charge for downloading protected video content. That charge can be added to the master account holder's bill or a credit card. The purchase controls can be established during the set up process and later changed by the master account holder.


In a particular embodiment, the parental controls are invoked first and once the parental controls are satisfied, or if they are disabled, the purchase controls are invoked, if activated. Once the purchase controls are satisfied, the protected video content can be downloaded to the set top box and stored in the memory. Under each set of controls, if a password entry is attempted and fails a predetermined number of times the transaction can be cancelled. The system can then prevent any additional downloads for a predetermined time period or until a master account holder unlocks the system.


The two-stages of security provided by the present disclosure call allow unlimited downloading of protected video content by de-activating or disabling the parental controls and the purchase controls. Access to all acceptable protected video content can be granted by enabling the parental controls and disabling the purchase controls. Further, if the master account holder is only interested in cost control, the parental controls can be disabled by the master account holder while the purchase controls are enabled. Additionally, if the master account holder wants to allow unlimited downloads of acceptable protect video content, but only to trusted users, the parental controls can be enabled and the purchase control password could be released to the trusted users.


The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.

Claims
  • 1. A method of providing access to downloadable protected video content, the method comprising: providing parental controls, the parental controls including a parental control password; providing purchase controls, the purchase controls including a purchase control password, the purchase control password being different from the parental control password; and downloading the protected video content and storing the downloaded video content in a memory within a set top box when both the parental controls and the purchase controls are satisfied.
  • 2. The method of claim 1, further comprising: detecting when parental controls are active; determining a rating of the protected video content; determining when the rating exceeds a threshold rating; and displaying a parental control authorization screen.
  • 3. The method of claim 2, further comprising: receiving a parental control password; and verifying the parental control password.
  • 4. The method of claim 3, further comprising: denying access to the protected video content when the parental control password is incorrect.
  • 5. The method of claim 4, further comprising: monitoring a number of attempts to correctly input the parental control password; and preventing a user from attempting to input the parental control password, when the number of attempts exceeds a predetermined threshold.
  • 6. The method of claim 5, further comprising: canceling an attempt to download the protected video content.
  • 7. The method of claim 6, further comprising: preventing downloads of protected video content for a predetermined time period.
  • 8. The method of claim 1, further comprising: detecting when the purchase controls are active; and determining when a spending limit has been reached;
  • 9. The method of claim 8, further comprising: canceling the attempt to download the protected video content in response to determining that the spending limit has been reached.
  • 10. The method of claim 9, further comprising: preventing downloads of protected video content for a predetermined time period.
  • 11. The method of claim 10, further comprising: preventing downloads of protected video content until the spending limit is waived.
  • 12. The method of claim 11, wherein the spending limit is waived by a master user.
  • 13. The method of claim 11, wherein the spending limit is waived by a content provider.
  • 14. The method of claim 8, further comprising: displaying a purchase control authorization screen.
  • 15. The method of claim 14, further comprising: receiving the purchase control password; and verifying the purchase control password.
  • 16. The method of claim 15, further comprising: denying access to the protected video file when the purchase control password is incorrect.
  • 17. The method of claim 16, further comprising: monitoring a number of attempts to correctly input the correct purchase control password; and preventing a user from attempting to input the purchase control password, when the number of attempts exceeds a predetermined threshold.
  • 18. The method of claim 17, further comprising: canceling an attempt to download the protected video file.
  • 19. The method of claim 18, further comprising: preventing downloads of protected video content for a predetermined time period.
  • 20. A device for managing acquisition of video content, the device comprising: a processor, the processor comprising a computer readable medium and a computer program embedded within the computer readable medium, the computer program comprising: instructions to prevent downloading of protected video content after a predetermined spending limit is reached.
  • 21. The device of claim 20, wherein the computer program further comprises: instructions to prevent downloading of protected video content until the predetermined spending limit is waived by a content provider.
  • 22. The device of claim 21, wherein the computer program further comprises: instructions to prevent downloading of protected video content until the predetermined spending limit is waived by a master user.
  • 23. The device of claim 20, wherein the computer program further comprises: instructions to detect a number of attempts to input a correct password.
  • 24. The device of claim 21, wherein the computer program further comprises: instructions to lock out downloading for a predetermined time period when the number of attempts exceeds a predetermined limit.
  • 25. The device of claim 24, wherein the computer program further comprises: instructions to override the lockout when authorization is provided by a master user.
  • 26. A system for managing video content, the system comprising: a display device; a remote control; and a set top box coupled to the display device and responsive to the remote control, the set top box comprising: a processor, the processor including a computer readable medium, the computer readable medium storing a user defined spending limit, wherein when the user defined spending limit is exceeded downloading of protected video content is blocked.
  • 27. The system of claim 25, wherein the set top box communicates a parental control authorization screen to the display device, wherein when a number of attempts to input a correct parental control password exceeds a predetermined threshold, downloading of protected video content is blocked.
  • 28. The system of claim 27, wherein the set top box communicates a purchase control authorization screen at the display device, wherein when a plurality of attempts to input a correct purchase control password exceeds a predetermined threshold, downloading of protected video content is prevented.
  • 29. The system of claim 28, wherein the computer readable medium further comprises: instructions to prevent downloading of protected video content until a spending limit is waived.
  • 30. The system of claim 29, wherein the spending limit is waived by a master user.
  • 31. The system of claim 29, wherein the spending limit is waived by a content provider.
  • 32. A method of providing access to protected content via a set top box, the method comprising: downloading protected content to the set top box; blocking access to the protected content at the set top box; providing a first security control; and preventing access to the protected content at the set top box until the first security control is satisfied.
  • 33. The method of claim 32, further comprising: providing a second security control; and preventing access to the protected content at the set top box until the first security control and the second security control are satisfied.
  • 34. The method of claim 32, wherein the first security control comprises a first password and the second security control comprises a second password that is different from the first password.