The invention is explained in further detail in the following by means of an embodiment in connection with the drawings:
This application claims priority from German patent application 10 2006 042 014.4, the entire disclosure of which is expressly incorporated by reference.
The basic principle of the invention consists in a first hardware feature for recognition of persons, that is, for identifying authorized persons to the remote control, and in identifying the remote control to a remote control identifier, such as a set-top box, associated with the media device being controlled, by an interchangeable hardware feature. The first hardware feature is a person identifier, which is a mechanism which can identify a person, and in the preferred embodiment shown here, for example, is in particular a device for reading and recognition of a human fingerprint. The second hardware feature in the preferred embodiment is a data carrier, which is shown here as at least one SIM card in the remote control. In addition, yet another SIM card can also be provided in the device being controlled. An effective remote controlling or remote attendance is only possible when both hardware features—the device for recognizing persons and the device for identifying the remote control to the device being controlled—cumulatively grant access authorization. In other words, only a remote control outfitted with the appropriate SIM card can establish a communications link with a remote control identifier associated with the media device, which here is shown as a set-top box, and also it can only do even this if the fingerprint reader has recognized an authorized person.
It is also provided that a programming of another user, with reading in of his fingerprint, is possible only when the corresponding SIM card is present.
The device identification for the first time can take place such that it is only possible with SIM card inserted. For future access, the corresponding access data of the SIM card can be stored in a memory of the remote control, so that access later on does not require the SIM card, but only the identification of authorized users via the fingerprint reader.
Later changes to the access authorizations of authorized users or the adding of further authorized users are only possible with the SIM card inserted.
SIM (Subscriber Identity Module) cards are usually chip cards which are inserted into a mobile telephone and serve to identify the user in the network. They have been used in the millions, are obtainable at a reasonable price, and are still considered to be extremely secure and reliable means of encryption. What is more, SIM cards also have the benefit that data can be stored on them, and thus presettings can be transmitted to other devices, for example, when one device is faulty.
Another feature to enhance the security can be that the identification code or codes between remote control and set-top box are changed during each activation, in the sense of a code incrementing, as is described in DE 35 18 827. The disclosure content of this publication is hereby included by reference. Also, it is in this way no longer possible, for example, to use a reading device to read out all codes of one remote control and transfer them to another remote control. Such reading devices or learning remote controls are commercially available today as replacements for defective remote controls, and are described, for example, in the U.S. Pat. Nos. 4,626,848 and 4,623,887.
After a modification of the invention, the remote control also has additional communication possibilities, such as a microphone, a camera and/or a USB port for acoustic and visual communication of the subscribers within a network, as well as for data exchange.
In general, it should be further noted that the term “remote control” in the sense of the present specification not only includes the traditional remote controls for home electronics, such as television sets, video recorders, set-top boxes, etc., but also devices with expanded functions, such as an alphanumeric keyboard and other input/output devices for mostly wireless transmission of signals to other devices, with the limitation that these are controlled. In the sense of the present invention, there is primarily a bidirectional communication between the remote control and the remotely controlled device, although a bidirectional communication between the controlled device, such as a set-top box, and a remote station, such as a provider, can also take place. Thus, the remote control can also contain further components, such as a computer mouse, a so-called joystick, a so-called track ball, a so-called touchpad or a so-called touch screen, and all of these latter-mentioned devices are input devices in the broadest sense of the word, producing control codes for a device being controlled.
The network shown in
The functions of the set-top boxes are being constantly expanded with the aim of constructing a universal multimedia communication and information center.
As a rule, at least one television receiver 7 is connected to a set-top box 5, basically having only the function of a monitor for the visual display of the information provided by the set-top box. Most of the information, such as channel selection, loudness, etc., is controlled via the set-top box 5. In addition, further peripherals such as a video recorder 8, a DVD player 9, a CD player 10 or even a personal computer 11 can be connected to the set-top box 5 or to the television set 7.
All functions of the set-top box, and for the most part, also all other functions of the devices 7-11 connected to it, are controlled via a remote control 12, which as a rule communicates with the set-top box 5 via a wireless link 13, such as an infrared link or a radio link. All common methods of wireless information transmission are possible here, such as the Bluetooth protocol. Of course, a wireline connection via an electrical cable is also possible.
The remote control 12 usually has a keypad 14 with a number of keys, which when activated relay predetermined signals to the set-top box 5 or its peripherals 7-11. The functions assigned to the individual keys of the key pad 14 are programmable such that different functions can be assigned to the individual keys for the different users, and thus the remote control 12 is “customizable.” Various possibilities as to how this customization can be done have been described in the prior art discussed at the outset. From this, and from the other prior art, the practitioner is aware of many options for the hardware and software implementation, so that details need not be given here.
One preferred mechanism for this customization in the present invention is a fingerprint reader 15 integrated in the remote control 12. Such fingerprint readers are commercially available and are being used with success in various fields, for example, in personal computers, access controls to protected rooms, etc. The essential function of the fingerprint reader 15 consists in reading the fingerprint, for example, that of the thumb of a user, ascertaining certain identification features from that and transforming them into identification data which are compared with previously stored identification data. Thus, a user can be identified with a given degree of agreement between the presently read and the stored identification data. After such an identification, various functions of the remote control 12 can be called up, such as key assignment of the functions of the individual keys of the key pad 14, or blocking or access authorizations for certain functions or programs of the set-top box 5. It is also possible to activate the send function of the remote control 12 via this customization.
However, certain problems arise in the configuration described heretofore, which are solved with the present invention.
In the known remote controls, the reading in of a new user or also the changing of the access authorization and the user profile of an already detected user is effected simply by calling up a given menu item, which is possible by pressing a key. Some security against establishing a new user or changes to an already authorized user is afforded, however, in that a password has to be entered to call up these functions, which usually consists of a four-place digit sequence. It will be very hard to keep this password secret within a household or a family, and it is also easy to “crack” with a little skill and a certain amount of time, so that the child protection function is already inadequate. In particular, juveniles will try to defeat this protection. Another problem is that the set-top box of one station, such as station 1, can also be controlled with other remote controls, such as with the remote control 12n of station n, or the set-top box 5n of station n with the remote control 12 of station 1. This is at least easily possible when a remote control is available for the same type of set-top box.
Also, many programmable remote controls are on the market today which are adaptable to practically all commercially available set-top boxes, so that it is no problem to replace a remote control protected by fingerprint reader with another one and thereby gain access to all functions of a set-top box, including pay for view broadcasts, ordering of goods or even internet banking. The particular set-top box is as a rule identified to the provider 3 by the return channel 4 or by other known security measures in the set-top box, while the transmission route 13 is largely unprotected.
To solve this problem, the remote control 12 of the invention has an additional hardware feature, which is preferably realized by a SIM card reader 16a and a SIM card 16. Each remote control has an individual SIM card, to which various functions can be assigned alternatively or cumulatively, such as
The particular remote control 12 thus identifies itself in conjunction with the SIM card 16 to a single assigned set-top box 5, while the individual user identifies himself via the fingerprint reader 15.
In order to organize the initialization phase, i.e., the first making of a connection between remote control 12 and set-top box 5, in both a flexible and a secure fashion, it can be provided that the set-top box also has a reader 20 for a SIM card. During the initialization, the SIM card 16 can be inserted into the reader 20, thereby storing the identification code in the set-top box 5. After this, the same SIM card 16 can be removed from the reader 20 and inserted into the SIM card reader 16a of the remote control 12 to accomplish its programming or customization. Of course, it is also possible to use two SIM cards matched up with each other, namely, one for the reader 20 of the set-top box 5 and the other for the SIM card reader 16a of the remote control 12.
Moreover, it can be provided that many functions which demand heightened security, such as paid orders for goods or services, access to bank accounts, etc., are only possible when the SIM card 16 is inserted in the SIM card reader 16a of the remote control 12.
To expand the functions of the remote control, it can also contain a microphone 17, by which voice-control commands are relayed to the set-top box and by which an acoustic communication is also possible in the manner of a telephone call via the set-top box and the return channel 4. The sound reproduction can then occur via the loudspeaker of the television set. In addition, it would also be possible to effect a voice recognition of the individual user in conjunction with the microphone 17.
Moreover, the remote control 12 has a video camera 18 by means of which images are recorded, in order to relay them via the set-top box to other set-top boxes, where the images are displayed on the television set.
Finally, the remote control 12 also has a USB interface 19 for connection to a personal computer or for coupling to other peripherals, such as a game console or the like. Via this USB interface 19, the remote control 12 can also be programmed from a PC, and here as well all security-relevant functions remain intact thanks to the SIM card 16.
The memory 27 contains on the one hand the operating system as well as all necessary data, such as assignment tables, user code, memorized data of the fingerprint reader 15, user profiles, etc., even including the identification data of the SIM card 16, insofar as this is implemented according to the above explained embodiment.
The SIM card 16 can also save various data. Thus, for example, its operating system resides in the ROM 23. The volatile data required at the moment are kept in the RAM 24, while user data are kept in the EEPROM 25. The EEPROM 25 can be a mirror of part of the memory 27, in order to transmit certain user data to another remote control.
In this embodiment, the set-top box 1 in similar fashion also has a SIM card reader 20 which is connected to the rest of the electronics 28. Of course, this also has in familiar manner a central unit, at least one memory, and various interfaces for peripherals such as the television receiver 7, as well as a sending and receiving unit 29 that can exchange data bidirectionally with the sending and receiving unit 22 via the link 13.
Of course, the set-top box and/or the remote control can be configured and in particular programmed so that all usual functions and also the expanded functions of home networks are implemented.
When introducing elements of the present invention or the preferred embodiment(s) thereof, the articles “a”, “an”, “the” and “said” are intended to mean that there are one or more of the elements. For example, that the foregoing description and following claims refer to “an” interconnect means that there are one or more such interconnects. The terms “comprising”, “including” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
As various changes could be made in the above without departing from the scope of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense. The scope of invention is defined by the appended claims and modifications to the embodiments above may be made that do not depart from the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
102006042014.4 | Sep 2006 | DE | national |