Method and interface for video content acquisition security on a set-top box

Information

  • Patent Grant
  • 8584257
  • Patent Number
    8,584,257
  • Date Filed
    Tuesday, August 10, 2004
    20 years ago
  • Date Issued
    Tuesday, November 12, 2013
    10 years ago
Abstract
A method of providing access to downloadable protected video content includes providing parental controls. The parental controls include a parental control password. Purchase controls are also provided and include a purchase control password. The purchase control password is different from the parental control password. Further, protected video content is downloaded and stored to a memory within a set top box when both the parental controls and the purchase controls are satisfied. A number of attempts to correctly input the parental control password or the purchase control password are monitored. When the number of attempts for either password exceeds a predetermined threshold, a user is prevented from further attempts to input the respective password. Moreover, the attempt to download protected video content is canceled, and further downloads of protected video content are prevented for a predetermined time period.
Description
FIELD OF THE DISCLOSURE

The present disclosure relates generally to video content security using set top boxes.


BACKGROUND

For years, televisions have been a staple of consumer electronics sales. As such, a large majority of households in the United States owns at least one television. Providing content to those televisions is a lucrative business and there are numerous types of television content to choose from. For example, viewers can subscribe to digital broadband television networks and digital satellite television networks in order to receive standard digital television content or high definition television content via a broadband connection or a satellite connection. In addition, many companies now offer digital video recorders (DVRs) that can be incorporated into standard set top boxes. A DVR can be used to record digital television content transmitted to the set top box.


Many service providers also offer streaming video content and pre-cache video content in order to provide a user with content that is tailored to his or her needs or tastes. A user can simply order video content, e.g., a movie, and the video content is downloaded to a set top box for display at a television. A standard set top box typically may not include security for the control of purchased content or it may include a single global password that controls all content access functions. Many times the global password is a default password, such as 1-2-3-4, that is never reset by the master account holder. Thus, protected video content may be easily downloaded and saved at the set top box.


Accordingly, there is a need for an improved method and system for video content acquisition security.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is pointed out with particularity in the appended claims. However, other features are described in the following detailed description in conjunction with the accompanying drawings in which:



FIG. 1 is a block diagram representative of an entertainment system;



FIG. 2 is a flow chart to illustrate general operating logic that can be used to provide security for acquiring video content;



FIG. 3 is a general diagram illustrating a parental control authorization screen;



FIG. 4 is a general diagram illustrating a purchase control authorization screen; and



FIG. 5 is a flow chart to illustrate alternative general operating logic that can be used to provide security for acquiring video content.





DETAILED DESCRIPTION OF THE DRAWINGS

A method of providing access to downloadable protected video content includes providing parental controls. The parental controls include a parental control password. Purchase controls are also provided and include a purchase control password. The purchase control password is different from the parental control password. Further, protected video content is downloaded and stored to a memory within a set top box when both the parental controls and the purchase controls are satisfied.


In a particular embodiment, the method further includes detecting when parental controls are active. Thereafter, a rating of the protected video content is determined. When the rating exceeds a threshold rating, a parental control authorization screen is displayed. Further, a parental control password is received and verified. Access to the protected video content is denied when the parental control password is incorrect. Moreover, a number of attempts to correctly input the parental control password is monitored. When the number of attempts exceeds a predetermined threshold, a user is prevented from further attempts to input the parental control password, the attempt to download protected video content is canceled, and further downloads of protected video content are prevented for a predetermined time period.


The method further includes detecting when the purchase controls are active and determining when a spending limit has been reached. When the spending limit is reached, the attempt to download the protected video content is canceled and further downloads of protected video content are prevented for a predetermined time period. Further, any additional downloads of protected video content can be prevented until the spending limit is waived, e.g., by a master user or a content provider.


In an illustrative embodiment, the method can also include displaying a purchase control authorization screen. Next, a purchase control password can be received and verified. Access to the protected video file is denied when the purchase control password is incorrect. Also, a number of attempts to correctly input the correct purchase control password is monitored. When the number of attempts exceeds a predetermined threshold, a user is prevented from further attempting to input the purchase control password and the present attempt to download the protected video file is canceled. Further, when the number of attempts exceeds a predetermined threshold, all attempts to download protected video content are prevented for a predetermined time period.


In another embodiment, a device is provided for managing acquisition of video content. The device includes a processor that has a computer readable medium. A computer program is embedded within the computer readable medium. The computer program includes instructions to prevent downloading of protected video content after a predetermined spending limit is reached.


In yet another embodiment, a system for managing video content is provided. The system includes a display device, a remote control, and a set top box that is coupled to the display device and responsive to the remote control. The set top box includes a processor that has a computer readable medium. Moreover, the computer readable medium stores a user defined spending limit. When the user defined spending limit is exceeded, downloading of protected video content is blocked.


Referring to FIG. 1, a system for managing movies provided at a television is illustrated and is generally designated 100. As illustrated in FIG. 1, in an exemplary, non-limiting embodiment, the system 100 includes a television 102, but it can be appreciated that the system 100 can include any display device on which video content can be displayed. FIG. 1 indicates that a set top box 104 can be connected to the television 102 via a first broadband connection 106. The set top box 104 is also connected to a video content provider, e.g., a cable company or a digital satellite company, via a second broadband connection 108. FIG. 1 also depicts a remote control unit 110 that can communicate with the set top box 104 to allow user interaction with the system 100 during operation. The remote control unit 110 can communicate with the set top box 104 via one or more infrared (IR) signals, or other wireless signals.


As indicated in FIG. 1, the set top box 104 includes a processor 112 in which logic, such as user interface logic, can be executed. Further, the set top box 104 includes a memory 114 in which content from the content provider can be downloaded and stored. FIG. 1 also shows that the set top box 104 can include a receiver 116, e.g., an IR receiver, that is configured to receive one or more IR signals from the remote control unit 110. Moreover, as depicted in FIG. 1, the remote control unit 110 can include a plurality of buttons 118 that can be toggled by a user during operation in order to downloaded protected content, e.g., video files, music files, photographs, etc. FIG. 1 further shows that the set top box 104 can also include a plurality of buttons 120 that can be toggled by a user during operation in order to download protected content.


Referring to FIG. 2, a particular embodiment of operating logic of the system 100 (FIG. 1) is shown and commences at block 200, wherein when protected video content is requested, the succeeding steps are performed. In an illustrative embodiment, the protected video content includes movies that can be stored as video files at the memory 114 (FIG. 1) within the set top box 104 (FIG. 1). Typically, the movies are pre-stored at a content provider and are not live real-time video content. When requested, the movies can be transmitted, e.g., streamed, to the set top box 104 (FIG. 1) and stored at the memory 114 (FIG. 1). In another embodiment, the content can be downloaded to the set top box 104 in its entirety before it is available for viewing at the set top box 104, i.e., the content is not streamed. At step 202, a decision is undertaken in order to determine whether any security controls are active. If there are no active security controls, the logic moves to block 204 and the protected video content is downloaded to the set top box 104 (FIG. 1). At block 206, the protected video content is displayed at the display device 102 (FIG. 1). The logic then ends at state 208.


Returning to step 202, if there are active security controls, the logic proceeds to step 210. At step 210, a decision is made to ascertain if parental controls are active. If parental controls are not active, the logic continues to step 212 and a decision is made to determine whether purchase controls are active. Returning to step 210, if parental controls are active, the logic moves to step 214. At step 214, a determination is made in order to check whether the rating of the protected video content exceeds a limit that is set by a master user, e.g., a parent. The rating of the video content can be a Motion Picture Association of America (MPAA) rating such as G, PG, PG-13, R, NC-17, and NR. Alternatively, the rating can be a V-chip rating or a parent's music resource center rating (PMRC). A master user can set the rating limit used in decision step 214 in order to prevent video content with a rating above the limit from being downloaded to the set top box 104 (FIG. 1). As such, if the rating of the protected video content does not exceed the predetermined limit, the logic continues to step 212 in order to determine if the purchase controls are active.


If the rating of the protected content does exceed the limit imposed by the master user, the logic continues to block 216 and a parental control authorization window is presented. Moving to step 218, a decision is made to determine if the user has cancelled the attempt to download the protected video content. If so the logic ends at state 208.


If the user does not cancel the attempt to download the protected video content, the logic continues to block 220 and a parental control password is received. Next, at step 222, a decision is undertaken in order to determine whether the parental control password is correct. If the password is incorrect, the logic moves to block 224 where the user is advised that the password is incorrect. Then, at step 226 a determination is made to determine whether the number of attempts to input the correct password is greater than a predetermined number of attempts, N. If the number of attempts exceeds the predetermined limit, the logic moves to block 228 and the user is advised that the transaction is cancelled. Proceeding to block 230, protected video content downloads are prevented for a predetermined time period, T, or until a master account holder overrides the security controls and authorizes downloads. In an illustrative embodiment, a master user can set the number of attempts, N, which, if exceeded, will cause the transaction to be cancelled in block 228.


If the password is correct at decision step 222, the logic moves to step 212 and a decision is undertaken in order to determine whether purchase controls are active. If purchase controls are not active, the logic continues to block 204 and continues as described above. On the other hand, if purchase controls are active, the logic proceeds to step 232 and a decision is made in order to ascertain whether a pre-defined spending limit has been reached. In an illustrative embodiment, the spending limit can be imposed by the master user for a period of a week, a month, etc. However, the spending limit can also be imposed by the content provider if a particular customer has had previous difficulty paying for downloads, if the customer has an outstanding unpaid bill, or if the user pre-paid for video content and has exceeded the amount that was pre-paid. If the spending limit has been reached, the logic moves to block 228 and the set top box 104 (FIG. 1) advises that the transaction is cancelled. At block 230, protected video content downloads are prevented for a time period, T, e.g., until payment has been received for previous downloads or until the master account holder overrides the purchase controls. The logic then ends at state 208.


Returning to step 232, if the pre-set spending limit has not been reached, or there is not a pre-set spending limit, the logic continues to block 234 and a purchase control authorization window is displayed. Thereafter, at step 236, a decision is made in order to determine if the user has cancelled the attempt to download the protected content. If so, the logic ends at state 208. Conversely, if the attempt to download the protected content is not cancelled, the logic moves to block 238 and a purchase control password is received by the set top box 104 (FIG. 1).


Continuing to step 240, a determination is made in order to verify the purchase control password. If the password is incorrect, the logic moves to block 242 where the user is advised that the password is incorrect. Then, at step 244 a determination is undertaken in order to determine whether the number of attempts to input the correct password is greater than a predetermined number of attempts, N. If the number of attempts exceeds the predetermined limit, the logic moves to block 228 and continues as described above. If the number of attempts, N, does not exceed the limit, the logic returns to block 238 and another purchase control password is received. The logic then returns to step 240 and continues as described above. At step 240, if the purchase control password is correct, the logic proceeds to step 204 and the video content is allowed to download. The video content can then be displayed at block 206. The logic then ends.


Referring now to FIG. 3, an exemplary parental control authorization screen is shown and is designated 300. As shown, the parental control authorization screen 300 includes an admonishment to a user 302 that reads, “The movie you are trying to purchase has a rating that requires your Parental Control password. Please enter your Parental Control password and press ‘Ok’.” Moreover, the parental control authorization screen 300 includes a password input window 304 into which a user can input an alphanumeric password which will allow protected video content above a rating limit to be downloaded. The parental control authorization screen 300 also includes an “Ok” button 306 and a “Cancel” button 308. The “Ok” button 306 can be selected in order to submit the parental control password to the set top box 104 (FIG. 1). The “Cancel” button 308 can be used to cancel the transaction.



FIG. 4 shows an exemplary purchase control authorization screen, which is designated 400. As shown, the purchase control authorization screen 400 includes an admonishment to a user 402 that reads, “You are about to purchase a movie and will be charged $3.99. Please enter your Purchase Control password.” Moreover, the purchase control authorization screen 400 includes a password input window 402 into which a user can input an alphanumeric password which will allow protected video content above a rating limit to be downloaded. The purchase control authorization screen 400 also includes an “Ok” button 406 and a “Cancel” button 408. The “Ok” button 406 can be selected in order to submit the purchase control password to the set top box 104 (FIG. 1). The “Cancel” button 408 can be used to cancel the transaction.


In an alternative embodiment, protected music files and protected photographs can be downloaded in addition to protected video files, or instead of protected video files. Moreover, in an alternative embodiment, the content can reside on the set top box 104 and instead of downloading the content, the set top box 104 can unlock the content, or otherwise provide access to the content, before the content is displayed. However, the controls can work the same and prevent access to the content in the same manner as described herein. Moreover, in the case that a user picks the same password for the parental controls and the purchase controls, the system would ask a single combined question for the password.


Referring now to FIG. 5, an alternative embodiment of operating logic of the system 100 (FIG. 1) is shown and commences at block 500 when protected content is requested. At block 502, the protected content is downloaded. The protected content is locked to prevent access at step 504. Moving to decision step 506, a decision is undertaken in order to ascertain whether any security controls are active. If there are no active security controls, the logic moves to block 508 and the protected video content is unlocked at the set top box 104 (FIG. 1). At block 510, the protected video content is delivered to the display device 102 (FIG. 1) where it can be viewed, listened to, etc. The logic then ends at state 512.


At decision step 506, if there are active security controls, the logic continues to step 514. At step 514, a decision is made in order to determine if any of the security controls have been violated 514. If not, the logic moves to block 508 and continues as described above. On the other hand, if any security control has been violated at step 514, the logic moves to block 516 and where the user is indicated that one or more security controls have been violated.


Proceeding to decision step 518, a determination is made in order to ascertain whether an attempt to access protected content has been made. If an attempt is not made to access protected content, the logic ends at state 512. However, if an attempt is made, the logic moves to block 520 and a control password authorization window is displayed, e.g., at the display device 102 (FIG. 1). At block 522, a control password is received. Next, at step 524, a decision is undertaken in order to determine whether the control password is correct. If the password is incorrect, the logic moves to block 526 where the user is advised that the password is incorrect. Then, at step 528 a determination is made to determine whether the number of attempts to input the correct password is greater than a predetermined number of attempts, N. If the number of attempts exceeds the predetermined limit, the logic moves to block 530 and the user is advised that the transaction is cancelled. Proceeding to block 532, access is prevented to protected content until indicated by a master account holder.


At step 528, if the number of attempts does not exceed the threshold, the logic returns to block 522 and a control password is received, again. Thereafter, if the control password is correct at decision step 524, the protected content is unlocked at block 508 and delivered to the display device 102 at block 510. The logic then ends at state 512.


With the configuration of structure described above, the system and method for video content acquisition security provides a flexible way to prevent unauthorized access to protected video content. The system breaks the security into two components: parental control security and purchase control security. The parental control security can allow or prevent access to video content based on the rating it has received from the MPAA, the Federal Communication Commission (FCC) V-chip rating system, the Recoding Industry Association of America (RIAA) rating system, or the parent's music resource center (PMRC) rating system. The access to protected video content is determined by the master account holder and can be set during the setup of the set-top box. The parental controls can be changed at any time by the master account holder or disabled completely.


The purchase control security operates in conjunction with the parental control security. The purchase control security uses password authentication to authorize the charge for downloading protected video content. That charge can be added to the master account holder's bill or a credit card. The purchase controls can be established during the set up process and later changed by the master account holder.


In a particular embodiment, the parental controls are invoked first and once the parental controls are satisfied, or if they are disabled, the purchase controls are invoked, if activated. Once the purchase controls are satisfied, the protected video content can be downloaded to the set top box and stored in the memory. Under each set of controls, if a password entry is attempted and fails a predetermined number of times the transaction can be cancelled. The system can then prevent any additional downloads for a predetermined time period or until a master account holder unlocks the system.


The two-stages of security provided by the present disclosure call allow unlimited downloading of protected video content by de-activating or disabling the parental controls and the purchase controls. Access to all acceptable protected video content can be granted by enabling the parental controls and disabling the purchase controls. Further, if the master account holder is only interested in cost control, the parental controls can be disabled by the master account holder while the purchase controls are enabled. Additionally, if the master account holder wants to allow unlimited downloads of acceptable protect video content, but only to trusted users, the parental controls can be enabled and the purchase control password could be released to the trusted users.


The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.

Claims
  • 1. A computer readable storage device including processor-executable instructions that, when executed by a processor, cause the processor to perform operations including: receiving a request for protected digital video content associated with a user account;determining whether security controls associated with the user account are active, wherein the security controls include parental controls, purchase controls, or a combination thereof;initiating a first download of the protected digital video content without streaming in response to determining that the security controls are not active;determining whether the parental controls are active in response to determining that the security controls are active;determining whether the purchase controls are active in response to determining that the parental controls are not active;determining whether a rating associated with the protected digital video content exceeds a rating limit in response to determining that the parental controls are active;determining whether the purchase controls are active in response to determining that the rating associated with the protected digital video content does not exceed the rating limit;initiating a first prompt requesting a parental control password in response to determining that the rating associated with the protected digital video content exceeds the rating limit;receiving a first parental password entry in response to the first prompt;determining whether the first parental password entry is a correct parental control password;in response to determining that the first parental password entry is the correct parental control password and a determination that a number of attempts to enter the correct parental control password does not exceed a first entry limit, determining whether the purchase controls are active;determining whether a spending limit associated with the user account has been reached in response to determining that the purchase controls are active;initiating a second prompt requesting a purchase control password in response to determining that the spending limit has not been reached;receiving a first purchase control password entry in response to the second prompt;determining whether the first purchase control password entry is a correct purchase control password;in response to determining that the first purchase control password entry is the correct purchase control password and a determination that a number of attempts to enter the correct purchase control password does not exceed a second entry limit, initiating a second download of the protected digital video content without streaming the protected digital video content;in response to downloading the protected digital video content, storing the downloaded protected digital video content at a memory of a set top box and locking the downloaded protected digital video content after the downloaded protected digital video content is stored at the memory;detecting an attempt to access the downloaded protected digital video content after the protected video content is locked;in response to detecting the attempt to access the downloaded protected digital video content that is locked, determining whether the rating associated with the downloaded protected digital video content exceeds the rating limit;in response to a determination that the rating associated with the downloaded protected digital video content exceeds the rating limit, initiating a third prompt requesting the parental control password;receiving a second parental password entry in response to the third prompt;determining whether the second parental password entry is the correct parental control password; andin response to determining that the second parental password entry is the correct parental control password, unlocking the downloaded protected digital video content, wherein the parental control password is different from the purchase control password.
  • 2. The computer readable storage device of claim 1, wherein the operations further include prohibiting protected digital video content downloads for a time period in response to a determination that the spending limit associated with the user account has been reached.
  • 3. The computer readable storage device of claim 1, wherein the operations further include: detecting the number of attempts to input the correct purchase control password; anddetermining whether the number of attempts to input the correct purchase control password exceeds the second entry limit.
  • 4. The computer readable storage device of claim 3, wherein the operations further include preventing downloading during a lockout period in response to a determination that the number of attempts to input the correct purchase control password exceeds the second entry limit.
  • 5. The computer readable storage device of claim 4, wherein the operations further include permitting downloading during the lockout period in response to receipt of an authorization by a master account user associated with the account.
  • 6. An apparatus comprising: a processor; anda memory of a set top box accessible to the processor, the memory including instructions that are executable by the processor to cause the processor to perform operations including: receiving a request for protected digital video content associated with a user account;determining whether security controls associated with the user account are active, wherein the security controls include parental controls, purchase controls, or a combination thereof;initiating a first download of the protected digital video content without streaming in response to determining that the security controls are not active;determining whether the parental controls are active in response to determining that the security controls are active;determining whether the purchase controls are active in response to determining that the parental controls are not active;determining whether a rating associated with the protected digital video content exceeds a rating limit in response to determining that the parental controls are active;determining whether the purchase controls are active in response to determining that the rating associated with the protected digital video content does not exceed the rating limit;initiating a first prompt requesting a parental control password in response to a determination that the rating associated with the protected digital video content exceeds the rating limit;receiving a first parental password entry in response to the first prompt;determining whether the first parental password entry is a correct parental control password;in response to determining that the first parental password entry is the correct parental control password and a determination that a number of attempts to enter the correct parental control password does not exceed a first entry limit, determining whether the purchase controls are active;determining whether a spending limit associated with the user account has been reached in response to determining that the purchase controls are active;initiating a second prompt requesting a purchase control password in response to determining that the spending limit has not been reached;receiving a purchase control password entry in response to the second prompt;determining whether the purchase control password entry is a correct purchase control password;in response to determining that the purchase control password entry is the correct purchase control password and a determination that a number of attempts to enter the correct purchase control password does not exceed a second entry limit, initiating a second download of the protected digital video content without streaming the protected digital video content;in response to downloading the protected digital video content, storing the downloaded protected digital video content at the memory and locking the downloaded protected digital video content after the downloaded protected digital video content is stored at the memory;detecting an attempt to access the downloaded protected digital video content after the protected video content is locked;in response to detecting the attempt to access the downloaded protected digital video content that is locked, determining whether the rating associated with the downloaded protected digital video content exceeds the rating limit;in response to a determination that the rating associated with the downloaded protected digital video content exceeds the rating limit, initiating a third prompt requesting the parental control password;receiving a second parental password entry in response to the third prompt;determining whether the second parental password entry is the correct parental control password; andin response to determining that the second parental password entry is the correct parental control password, unlocking the downloaded protected digital video content, wherein the parental control password is different from the purchase control password.
  • 7. The apparatus of claim 6, wherein the operations further comprise: determining the number of attempts to input the correct purchase control password; andblocking the second download of the protected digital video content for a time period in response to the number of attempts exceeding the second entry limit.
  • 8. The apparatus of claim 6, wherein the operations further comprise prohibiting downloading the protected digital video content for a time period based on the spending limit being reached.
  • 9. A method comprising: receiving a request for protected digital video content associated with a user account, the user account associated with a set-top box;determining whether security controls associated with the user account are active, wherein the security controls include parental controls, purchase controls, or a combination thereof;initiating a first download of the protected digital video content without streaming in response to determining that the security controls are not active;determining whether the parental controls are active in response to determining that the security controls are active;determining whether the purchase controls are active in response to determining that the parental controls are not active;determining whether a rating associated with the protected digital video content exceeds a rating limit in response to determining that the parental controls are active;determining whether the purchase controls are active in response to determining that the rating associated with the protected digital video content does not exceed the rating limit;initiating a first prompt requesting a parental control password in response to a determination that the rating associated with the protected digital video content exceeds the rating limit;receiving a first parental password entry in response to the first prompt;determining whether the first parental password entry is a correct parental control password;in response to determining that the first parental password entry is the correct parental control password and a determination that a number of attempts to enter the correct parental control password does not exceed a first entry limit, determining whether the purchase controls are active;determining whether a spending limit associated with the user account has been reached in response to determining that the purchase controls are active;initiating a second prompt requesting a purchase control password in response to determining that the spending limit has not been reached;receiving a purchase control password entry in response to the second prompt;determining whether the purchase control password entry is a correct purchase control password;in response to determining that the purchase control password entry is the correct purchase control password and a determination that a number of attempts to enter the correct purchase control password does not exceed a second entry limit, initiating a second download of the protected digital video content without streaming the protected digital video content;in response to downloading the protected digital video content, storing the downloaded protected digital video content at a memory of a set top box and locking the downloaded protected digital video content after the protected digital video content is stored at the memory;detecting an attempt to access the downloaded protected digital video content after the downloaded protected digital video content is locked;in response to detecting the attempt to access the downloaded protected digital video content that is locked, determining whether the rating associated with the downloaded protected digital video content exceeds the rating limit;in response to a determination that the rating associated with the downloaded protected digital video content exceeds the rating limit, initiating a third prompt requesting the parental control password;receiving a second parental password entry in response to the third prompt;determining whether the second parental password entry is the correct parental control password; andunlocking the downloaded protected digital video content in response to determining the second parental password entry is the correct parental control password, wherein the parental control password and the purchase control password are different.
  • 10. The method of claim 9, wherein the spending limit is imposed for a predetermined amount of time.
  • 11. The apparatus of claim 6, wherein the spending limit is imposed by a content provider when the account has an outstanding unpaid balance.
  • 12. The apparatus of claim 6, wherein the operations further comprise preventing downloading the protected digital video content, based on the spending limit, until a balance associated with the user account is a zero balance.
  • 13. The computer readable storage device of claim 1, wherein the operations further include prohibiting downloading the protected digital video content for a time period in response to the number of attempts to input the correct parental control password in response to the first prompt exceeding the first entry limit, wherein the time period is selected based on a master account user input.
  • 14. The computer readable storage device of claim 1, wherein locking the downloaded protected digital video content prevents access to the downloaded protected digital video content when the security controls are active.
  • 15. The computer readable storage device of claim 14, wherein unlocking the downloaded protected digital video content enables access to the downloaded protected digital video content.
  • 16. The computer readable storage device of claim 14, wherein the operations further include initiating display of the downloaded protected digital video content after the downloaded protected digital video content is unlocked at the memory.
  • 17. The computer readable storage device of claim 1, wherein the operations further include: in response to determining that the first parental password entry is not the correct parental password, providing an indication of an incorrect parental password; andinitiating a fourth prompt requesting the parental control password in response to the determination that the number of attempts to enter the correct parental control password does not exceed the first entry limit.
  • 18. The computer readable storage device of claim 17, wherein the operations further include: receiving a third parental password entry in response to the fourth prompt; anddetermining whether the third parental password entry is the correct parental control password.
  • 19. The computer readable storage device of claim 18, wherein the operations further include determining whether the purchase controls are active in response to determining that the third parental password entry is the correct parental control password and that the number of attempts to enter the correct parental control password does not exceed the first entry limit.
  • 20. The computer readable storage device of claim 1, wherein the first entry limit and the second entry limit are set based on a master account user input associated with the user account.
  • 21. The apparatus of claim 6, wherein an entirety of the protected digital video content is stored and locked at the memory prior to the attempt to access the downloaded protected digital video content, and wherein the memory is associated with the set top box.
  • 22. The apparatus of claim 6, wherein the rating limit is set based on a master account user input associated with the user account.
US Referenced Citations (361)
Number Name Date Kind
4243147 Twitchell et al. Jan 1981 A
4356509 Skerlos et al. Oct 1982 A
4768926 Gilbert, Jr. Sep 1988 A
4907079 Turner et al. Mar 1990 A
5126731 Cromer, Jr. et al. Jun 1992 A
5163340 Bender Nov 1992 A
5475835 Hickey Dec 1995 A
5532748 Naimpally Jul 1996 A
5541917 Farris Jul 1996 A
5589892 Knee et al. Dec 1996 A
5592477 Farris et al. Jan 1997 A
5610916 Kostreski et al. Mar 1997 A
5613012 Hoffman et al. Mar 1997 A
5650831 Farwell Jul 1997 A
5651332 Moore et al. Jul 1997 A
5656898 Kalina Aug 1997 A
5675390 Schindler et al. Oct 1997 A
5708961 Hylton et al. Jan 1998 A
5722041 Freadman Feb 1998 A
5724106 Autry et al. Mar 1998 A
5729825 Kostreski et al. Mar 1998 A
5734853 Hendricks et al. Mar 1998 A
5774357 Hoffberg et al. Jun 1998 A
5793438 Bedard Aug 1998 A
5805719 Pare, Jr. et al. Sep 1998 A
5818438 Howe et al. Oct 1998 A
5838384 Schindler et al. Nov 1998 A
5838812 Pare, Jr. et al. Nov 1998 A
5864757 Parker Jan 1999 A
5867223 Schindler et al. Feb 1999 A
5878141 Daly et al. Mar 1999 A
5892508 Howe et al. Apr 1999 A
5900867 Schindler et al. May 1999 A
5910970 Lu Jun 1999 A
5933498 Schneck et al. Aug 1999 A
5953318 Nattkemper et al. Sep 1999 A
5956024 Strickland et al. Sep 1999 A
5956716 Kenner et al. Sep 1999 A
5969748 Casement et al. Oct 1999 A
5970088 Chen Oct 1999 A
5987061 Chen Nov 1999 A
5990927 Hendricks et al. Nov 1999 A
5995155 Schindler et al. Nov 1999 A
5999518 Nattkemper et al. Dec 1999 A
5999563 Polley et al. Dec 1999 A
6002722 Wu Dec 1999 A
6014184 Knee et al. Jan 2000 A
6021158 Schurr et al. Feb 2000 A
6021167 Wu Feb 2000 A
6028600 Rosin et al. Feb 2000 A
6029045 Picco et al. Feb 2000 A
6038251 Chen Mar 2000 A
6044107 Gatherer et al. Mar 2000 A
6052120 Nahi et al. Apr 2000 A
6055268 Timm et al. Apr 2000 A
6072483 Rosin et al. Jun 2000 A
6084584 Nahi et al. Jul 2000 A
6111582 Jenkins Aug 2000 A
6118498 Reitmeier Sep 2000 A
6122660 Baransky et al. Sep 2000 A
6124799 Parker Sep 2000 A
6137839 Mannering et al. Oct 2000 A
6144401 Casement et al. Nov 2000 A
6163272 Goode et al. Dec 2000 A
6166734 Nahi et al. Dec 2000 A
6181335 Hendricks et al. Jan 2001 B1
6192282 Smith et al. Feb 2001 B1
6195692 Hsu Feb 2001 B1
6215483 Zigmond Apr 2001 B1
6237022 Bruck et al. May 2001 B1
6243366 Bradley et al. Jun 2001 B1
6252588 Dawson Jun 2001 B1
6252989 Geisler et al. Jun 2001 B1
6260192 Rosin et al. Jul 2001 B1
6269394 Kenner et al. Jul 2001 B1
6275268 Ellis et al. Aug 2001 B1
6275989 Broadwin et al. Aug 2001 B1
6281813 Vierthaler et al. Aug 2001 B1
6286142 Ehreth Sep 2001 B1
6295057 Rosin et al. Sep 2001 B1
6311214 Rhoads Oct 2001 B1
6314409 Schneck et al. Nov 2001 B2
6344882 Shim et al. Feb 2002 B1
6357043 Ellis et al. Mar 2002 B1
6359636 Schindler et al. Mar 2002 B1
6363149 Candelore Mar 2002 B1
6385693 Gerszberg et al. May 2002 B1
6396480 Schindler et al. May 2002 B1
6396531 Gerszberg et al. May 2002 B1
6396544 Schindler et al. May 2002 B1
6397387 Rosin et al. May 2002 B1
6400407 Zigmond et al. Jun 2002 B1
6411307 Rosin et al. Jun 2002 B1
6442285 Rhoads et al. Aug 2002 B2
6442549 Schneider Aug 2002 B1
6445398 Gerba et al. Sep 2002 B1
6449601 Friedland et al. Sep 2002 B1
6450407 Freeman et al. Sep 2002 B1
6460075 Krueger et al. Oct 2002 B2
6463585 Hendricks et al. Oct 2002 B1
6481011 Lemmons Nov 2002 B1
6486892 Stern Nov 2002 B1
6492913 Vierthaler et al. Dec 2002 B2
6496983 Schindler et al. Dec 2002 B1
6502242 Howe et al. Dec 2002 B1
6505348 Knowles et al. Jan 2003 B1
6510519 Wasilewski et al. Jan 2003 B2
6515680 Hendricks et al. Feb 2003 B1
6516467 Schindler et al. Feb 2003 B1
6519011 Shendar Feb 2003 B1
6522769 Rhoads et al. Feb 2003 B1
6526577 Knudson et al. Feb 2003 B1
6529949 Getsin et al. Mar 2003 B1
6535590 Tidwell et al. Mar 2003 B2
6538704 Grabb et al. Mar 2003 B1
6542740 Olgaard et al. Apr 2003 B1
6557030 Hoang Apr 2003 B1
6567982 Howe et al. May 2003 B1
6587873 Nobakht et al. Jul 2003 B1
6598231 Basawapatna et al. Jul 2003 B1
6599199 Hapshie Jul 2003 B1
6607136 Atsmon et al. Aug 2003 B1
6609253 Swix et al. Aug 2003 B1
6611537 Edens et al. Aug 2003 B1
6614987 Ismail et al. Sep 2003 B1
6622148 Noble et al. Sep 2003 B1
6622307 Ho Sep 2003 B1
6631523 Matthews, III et al. Oct 2003 B1
6640239 Gidwani Oct 2003 B1
6643495 Gallery et al. Nov 2003 B1
6643684 Malkin et al. Nov 2003 B1
6650761 Rodriguez et al. Nov 2003 B1
6658568 Ginter et al. Dec 2003 B1
6678215 Treyz et al. Jan 2004 B1
6678733 Brown et al. Jan 2004 B1
6690392 Wugoski Feb 2004 B1
6693236 Gould et al. Feb 2004 B1
6701523 Hancock et al. Mar 2004 B1
6704931 Schaffer et al. Mar 2004 B1
6714264 Kempisty Mar 2004 B1
6725281 Zintel et al. Apr 2004 B1
6731393 Currans et al. May 2004 B1
6732179 Brown et al. May 2004 B1
6745223 Nobakht et al. Jun 2004 B1
6745392 Basawapatna et al. Jun 2004 B1
6754206 Nattkemper et al. Jun 2004 B1
6756997 Ward, III et al. Jun 2004 B1
6760918 Rodriguez et al. Jul 2004 B2
6763226 McZeal, Jr. Jul 2004 B1
6765557 Segal et al. Jul 2004 B1
6766305 Fucarile et al. Jul 2004 B1
6769128 Knee et al. Jul 2004 B1
6771317 Ellis et al. Aug 2004 B2
6773344 Gabai et al. Aug 2004 B1
6778559 Hyakutake Aug 2004 B2
6779004 Zintel Aug 2004 B1
6781518 Hayes et al. Aug 2004 B1
6784804 Hayes et al. Aug 2004 B1
6785716 Nobakht Aug 2004 B1
6788709 Hyakutake Sep 2004 B1
6804824 Potrebic et al. Oct 2004 B1
6826775 Howe et al. Nov 2004 B1
6828993 Hendricks et al. Dec 2004 B1
6909874 Holtz et al. Jun 2005 B2
6922843 Herrington et al. Jul 2005 B1
6938021 Shear et al. Aug 2005 B2
8006262 Rodriguez et al. Aug 2011 B2
20010011261 Mullen-Schultz Aug 2001 A1
20010016945 Inoue Aug 2001 A1
20010016946 Inoue Aug 2001 A1
20010034664 Brunson Oct 2001 A1
20010038033 Habib Nov 2001 A1
20010044794 Nasr et al. Nov 2001 A1
20010048677 Boys Dec 2001 A1
20010049826 Wilf Dec 2001 A1
20010052077 Fung et al. Dec 2001 A1
20010054008 Miller et al. Dec 2001 A1
20010054009 Miller et al. Dec 2001 A1
20010054067 Miller et al. Dec 2001 A1
20010056350 Calderone et al. Dec 2001 A1
20020001303 Boys Jan 2002 A1
20020001310 Mai et al. Jan 2002 A1
20020002496 Miller et al. Jan 2002 A1
20020003166 Miller et al. Jan 2002 A1
20020007307 Miller et al. Jan 2002 A1
20020007313 Mai et al. Jan 2002 A1
20020007485 Rodriguez et al. Jan 2002 A1
20020010639 Howey et al. Jan 2002 A1
20020010745 Schneider Jan 2002 A1
20020010935 Sitnik Jan 2002 A1
20020016736 Cannon et al. Feb 2002 A1
20020022963 Miller et al. Feb 2002 A1
20020022970 Noll et al. Feb 2002 A1
20020022992 Miller et al. Feb 2002 A1
20020022993 Miller et al. Feb 2002 A1
20020022994 Miller et al. Feb 2002 A1
20020022995 Miller et al. Feb 2002 A1
20020023959 Miller et al. Feb 2002 A1
20020026357 Miller et al. Feb 2002 A1
20020026358 Miller et al. Feb 2002 A1
20020026369 Miller et al. Feb 2002 A1
20020026475 Marmor Feb 2002 A1
20020029181 Miller et al. Mar 2002 A1
20020030105 Miller et al. Mar 2002 A1
20020032603 Yeiser Mar 2002 A1
20020035404 Ficco et al. Mar 2002 A1
20020040475 Yap et al. Apr 2002 A1
20020042915 Kubischta et al. Apr 2002 A1
20020046093 Miller et al. Apr 2002 A1
20020049635 Mai et al. Apr 2002 A1
20020054087 Noll et al. May 2002 A1
20020054750 Ficco et al. May 2002 A1
20020059163 Smith May 2002 A1
20020059425 Belfiore et al. May 2002 A1
20020059599 Schein et al. May 2002 A1
20020065717 Miller et al. May 2002 A1
20020067438 Baldock Jun 2002 A1
20020069220 Tran Jun 2002 A1
20020069282 Reisman Jun 2002 A1
20020069294 Herkersdorf et al. Jun 2002 A1
20020072970 Miller et al. Jun 2002 A1
20020078442 Reyes et al. Jun 2002 A1
20020097261 Gottfurcht et al. Jul 2002 A1
20020099842 Jennings et al. Jul 2002 A1
20020106119 Foran et al. Aug 2002 A1
20020112239 Goldman Aug 2002 A1
20020116392 McGrath et al. Aug 2002 A1
20020124055 Reisman Sep 2002 A1
20020128061 Blanco Sep 2002 A1
20020129094 Reisman Sep 2002 A1
20020133402 Faber et al. Sep 2002 A1
20020138840 Schein et al. Sep 2002 A1
20020142750 Gill, III Oct 2002 A1
20020152264 Yamasaki Oct 2002 A1
20020169611 Guerra et al. Nov 2002 A1
20020170063 Ansari et al. Nov 2002 A1
20020173344 Cupps et al. Nov 2002 A1
20020184159 Tadayon et al. Dec 2002 A1
20020188955 Thompson et al. Dec 2002 A1
20020193997 Fitzpatrick et al. Dec 2002 A1
20020194601 Perkes et al. Dec 2002 A1
20020198874 Nasr et al. Dec 2002 A1
20030005445 Schein et al. Jan 2003 A1
20030005453 Rodriguez et al. Jan 2003 A1
20030009771 Chang Jan 2003 A1
20030012365 Goodman Jan 2003 A1
20030014367 Tubinis Jan 2003 A1
20030014750 Kamen Jan 2003 A1
20030018975 Stone Jan 2003 A1
20030023435 Josephson Jan 2003 A1
20030023440 Chu Jan 2003 A1
20030028890 Swart et al. Feb 2003 A1
20030033416 Schwartz Feb 2003 A1
20030043915 Costa et al. Mar 2003 A1
20030046091 Arneson et al. Mar 2003 A1
20030046689 Gaos Mar 2003 A1
20030055785 Lahiri Mar 2003 A1
20030056223 Costa et al. Mar 2003 A1
20030058277 Bowman-Amuah Mar 2003 A1
20030061611 Pendakur Mar 2003 A1
20030071792 Safadi Apr 2003 A1
20030088784 Ginter et al. May 2003 A1
20030093793 Gutta May 2003 A1
20030100340 Cupps et al. May 2003 A1
20030110161 Schneider Jun 2003 A1
20030110503 Perkes Jun 2003 A1
20030126136 Omoigui Jul 2003 A1
20030135771 Cupps et al. Jul 2003 A1
20030141987 Hayes Jul 2003 A1
20030145321 Bates et al. Jul 2003 A1
20030149989 Hunter et al. Aug 2003 A1
20030151621 McEvilly et al. Aug 2003 A1
20030153353 Cupps et al. Aug 2003 A1
20030153354 Cupps et al. Aug 2003 A1
20030159026 Cupps et al. Aug 2003 A1
20030160830 DeGross Aug 2003 A1
20030163601 Cupps et al. Aug 2003 A1
20030163666 Cupps et al. Aug 2003 A1
20030163811 Luehrs Aug 2003 A1
20030172380 Kikinis Sep 2003 A1
20030182237 Costa et al. Sep 2003 A1
20030182420 Jones et al. Sep 2003 A1
20030185232 Moore et al. Oct 2003 A1
20030187641 Moore et al. Oct 2003 A1
20030187646 Smyers et al. Oct 2003 A1
20030187800 Moore et al. Oct 2003 A1
20030189509 Hayes et al. Oct 2003 A1
20030189589 LeBlanc et al. Oct 2003 A1
20030194141 Kortum et al. Oct 2003 A1
20030194142 Kortum et al. Oct 2003 A1
20030208396 Miller et al. Nov 2003 A1
20030208758 Schein et al. Nov 2003 A1
20030226044 Cupps et al. Dec 2003 A1
20030226145 Marsh Dec 2003 A1
20030229898 Babu et al. Dec 2003 A1
20030229900 Reisman Dec 2003 A1
20040003041 Moore et al. Jan 2004 A1
20040003403 Marsh Jan 2004 A1
20040006769 Ansari et al. Jan 2004 A1
20040006772 Ansari et al. Jan 2004 A1
20040010602 Van Vleck et al. Jan 2004 A1
20040015985 Kweon Jan 2004 A1
20040015997 Ansari et al. Jan 2004 A1
20040030750 Moore et al. Feb 2004 A1
20040031058 Reisman Feb 2004 A1
20040031856 Atsmon et al. Feb 2004 A1
20040034877 Nogues Feb 2004 A1
20040049728 Langford Mar 2004 A1
20040064351 Mikurak Apr 2004 A1
20040068740 Fukuda et al. Apr 2004 A1
20040068753 Robertson et al. Apr 2004 A1
20040070491 Huang et al. Apr 2004 A1
20040073918 Ferman et al. Apr 2004 A1
20040098571 Falcon May 2004 A1
20040107125 Guheen et al. Jun 2004 A1
20040107439 Hassell et al. Jun 2004 A1
20040111745 Schein et al. Jun 2004 A1
20040111754 Bushey et al. Jun 2004 A1
20040111756 Stuckman et al. Jun 2004 A1
20040117813 Karaoguz et al. Jun 2004 A1
20040117824 Karaoguz et al. Jun 2004 A1
20040117831 Ellis et al. Jun 2004 A1
20040123325 Ellis et al. Jun 2004 A1
20040128342 Maes et al. Jul 2004 A1
20040139173 Karaoguz et al. Jul 2004 A1
20040143600 Musgrove et al. Jul 2004 A1
20040143652 Grannan et al. Jul 2004 A1
20040148408 Nadarajah Jul 2004 A1
20040150676 Gottfurcht et al. Aug 2004 A1
20040183839 Gottfurcht et al. Sep 2004 A1
20040194136 Finseth et al. Sep 2004 A1
20040198386 Dupray Oct 2004 A1
20040201600 Kakivaya et al. Oct 2004 A1
20040204998 Shah et al. Oct 2004 A1
20040210633 Brown et al. Oct 2004 A1
20040210935 Schein et al. Oct 2004 A1
20040213271 Lovy et al. Oct 2004 A1
20040221302 Ansari et al. Nov 2004 A1
20040223485 Arellano et al. Nov 2004 A1
20040226035 Hauser, Jr. Nov 2004 A1
20040226045 Nadarajah Nov 2004 A1
20040239624 Ramian Dec 2004 A1
20040252119 Hunleth et al. Dec 2004 A1
20040252120 Hunleth et al. Dec 2004 A1
20040252769 Costa et al. Dec 2004 A1
20040252770 Costa et al. Dec 2004 A1
20040260407 Wimsatt Dec 2004 A1
20040261116 McKeown et al. Dec 2004 A1
20040267729 Swaminathan et al. Dec 2004 A1
20040267880 Patiejunas Dec 2004 A1
20040268393 Hunleth et al. Dec 2004 A1
20050027851 McKeown et al. Feb 2005 A1
20050038814 Iyengar et al. Feb 2005 A1
20050044280 Reisman Feb 2005 A1
20050049934 Nakayama et al. Mar 2005 A1
20050097612 Pearson et al. May 2005 A1
20050120373 Thomas et al. Jun 2005 A1
20050132295 Noll et al. Jun 2005 A1
20050195961 Pasquale et al. Sep 2005 A1
20060010467 Segel Jan 2006 A1
20070033419 Kocher et al. Feb 2007 A1
Foreign Referenced Citations (11)
Number Date Country
WO 9963759 Dec 1999 WO
WO 0028689 May 2000 WO
WO 0160066 Aug 2001 WO
WO 0217627 Feb 2002 WO
WO 02058382 Jul 2002 WO
WO 03003710 Jan 2003 WO
WO 03025726 Mar 2003 WO
WO 2004018060 Mar 2004 WO
WO 2004032514 Apr 2004 WO
WO 2004062279 Jul 2004 WO
WO 2005045554 May 2005 WO
Non-Patent Literature Citations (35)
Entry
Kapinos, S., “Accenda Universal Remote Control Tartgets Needs of Elderly, Visually Impaired, Physically Challenged . . . and the Rest of Us” Innotech Systems, Inc., Press Release, Port Jefferson, NY, Dec. 15, 2002.
U.S. Appl. No. 10/752,301, filed Jan. 6, 2004.
U.S. Appl. No. 11/158,926, filed Jun. 22, 2005.
U.S. Appl. No. 10/929,888, filed Aug. 26, 2004.
U.S. Appl. No. 10/915,684, filed Aug. 10,2004.
U.S. Appl. No. 10/960,771, filed Oct. 7, 2004.
U.S. Appl. No. 10/901,921, filed Jul. 29, 2004.
U.S. Appl. No. 11/148,967, filed Jun. 9, 2005.
U.S. Appl. No. 11/001,676, filed Dec. 1, 2004.
U.S. Appl. No. 10/993,411, filed Nov. 19, 2004.
U.S. Appl. No. 11/179,048, filed Jul. 11, 2005.
U.S. Appl. No. 11/001,683, filed Dec. 1, 2004.
U.S. Appl. No. 11/005,496, filed Dec. 6, 2004.
U.S. Appl. No. 11/049,629, filed Feb. 2, 2005.
U.S. Appl. No. 11/043,443, filed Jan. 26, 2005.
U.S. Appl. No. 11/057,858, filed Feb. 14, 2005.
U.S. Appl. No. 11/064,775, filed Feb. 24, 2005.
U.S. Appl. No. 11/140,616, filed May 27, 2005.
U.S. Appl. No. 11/057,859, filed Feb. 14, 2005.
U.S. Appl. No. 11/093,736, filed Mar. 30, 2005.
U.S. Appl. No. 11/191,154, filed Jul. 27, 2005.
U.S. Appl. No. 11/158,892, filed Jun. 22, 2005.
U.S. Appl. No. 11/106,361, filed Apr. 14, 2005.
U.S. Appl. No. 11/158,927, filed Jun. 22, 2005.
U.S. Appl. No. 10/696,395, filed Oct. 29, 2003.
U.S. Appl. No. 11/077,167, filed Mar. 10, 2005.
U.S. Appl. No. 11/034,223, filed Jan. 12, 2005.
U.S. Appl. No. 11/051,553, filed Feb. 4, 2005.
U.S. Appl. No. 11/046,191, filed Jan. 28, 2005.
U.S. Appl. No. 11/052,006, filed Feb. 4, 2005.
U.S. Appl. No. 11/039,063, filed Jan. 20, 2005.
U.S. Appl. No. 11/037,951, filed Jan. 20, 2005.
U.S. Appl. No. 11/166,785, filed Jun. 24, 2005.
U.S. Appl. No. 11/166,908, filed Jun. 24, 2005.
U.S. Appl. No. 11/166,907, filed Jun. 24, 2005.
Related Publications (1)
Number Date Country
20060037083 A1 Feb 2006 US