This application claims the benefit under 35 U.S.C. ยง 119 (a) of Korean Patent Application No. 10-2005-0012311 filed on Feb. 15, 2005, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference.
1. Field of the Invention
Apparatuses and methods consistent with the present invention relate to creating an access authority and a remote controller using the same, and more particularly, to a system and a method for creating an access authority by which a specific user can provide another user an access authority to a device and a remote controller using the same.
2. Description of the Related Art
In modern society there has been a flood of information, such that various types of contents are indiscreetly offered. Anyone can view programs provided through image display devices, such as televisions, which anyone can use to easily access image media, regardless of the programs' contents.
Thus, a program ranking system has been introduced to classify programs by contents that may have harmful influences on children and young adults, for example, violence, sexuality, and language usage. Also, the ranks of the programs are displayed on screens of televisions.
In other words, ages allowed to view specific programs are displayed on predetermined portions of the screens so that the minor's guardians, for example, in the homes restrict program viewing based on the program's rank. However, this mode of restriction is possible only when the guardians view television together with the minors. Thus, self-controlled viewing regulations of curious minors cannot be expected.
To solve these problems, there has been used a method by which users can check information regarding ranks of corresponding programs through data of vertical blanking interval (VBI) areas called V-chips and input passwords so that only users knowing the passwords can view the corresponding programs.
In the V-chip-based viewing regulation method, passwords are differently set depending on the types of devices. Thus, it is difficult to set the passwords, and the set passwords must be remembered.
Also, the passwords may be exposed. Even in a case where guardians, who do not need to be regulated, desire to view adult programs, in addition to programs that can be viewed regardless of age, such as education programs, the guardians must input passwords to view the programs.
U.S. Patent Publication No. 2003-0237088 discloses a method of separately configuring a remote controller for guardians and a remote controller for their children, to regulate minors' viewing of adult programs.
In other words, all kinds of programs including adult programs can be viewed through the remote controller for the guardians, but only programs corresponding to set ranks can be viewed through the remote controller for the children.
In a manner different from the V-chip-based viewing regulation method, this method solves the troublesomeness of remembering passwords. However, the remote controller for the guardians must be especially managed so that the children cannot use it.
An aspect of the present invention is to provide a system and a method for creating an access authority by which a specific user can provide another user with access authority to a device so as to communicate with the device within a range of an access authority authorized to the specific user and a remote controller using the system and the method.
According to an exemplary aspect of the present invention, there is provided a system for creating an access authority, including: at least one lower remote controller requesting a creation of an access authority; a higher remote controller receiving the request for the creation of the access authority from the at least one lower remote controller, creating an access authority to be granted to the lower remote controller, and requesting a registration of the created access authority; and a device receiving the request for the registration of the created access authority from the higher remote controller and registering the access authority of the lower remote controller created by the higher remote controller.
The lower remote controller may request the higher remote controller to create the access authority through a location limited channel.
According to another exemplary aspect of the present invention, there is provided a system for creating an access authority, including: a remote controller granting higher and lower authorities to a plurality of users through a user authentication, and if the user having the higher access authority creates an access authority to be granted to the user having the lower access authority, requesting a registration of the created access authority; and a device receiving the request for the registration of the created access authority from the remote controller and registering the access authority of the user having the lower access authority, the access authority being created by the user having the higher access authority.
Before creating the access authority to be granted to the user having the lower access authority, the remote controller may request the device for permission information. The remote controller may transmit the request for the permission information along with a hash of a public key of the user having the lower access authority.
The device may offer the remote controller the permission information in a webpage form. The device may offer the permission information along with a hash of its public key.
If the access authority of the user having the lower access authority is higher than an access authority of the user having the higher access authority, the device may reject to create the access authority.
The device and the remote controller may perform communications with each other within a range of the created access authority using a public key-based algorithm.
According to still another exemplary aspect of the present invention, there is provided a method of creating an access authority in a system including a higher remote controller, at least one lower remote controller, and a device operated by the higher remote controller and the at least one lower remote controller, including: requesting the higher remote controller to create an access authority via the at least one lower remote controller; creating an access authority to be granted to the lower remote controller via the higher remote controller and requesting the device to register the created access authority; and registering the access authority of the lower remote controller created by the higher remote controller via the device. The lower remote controller may request the higher remote controller to create the access authority through a location limited channel.
According to yet another exemplary aspect of the present invention, there is provided a method of creating an access authority in a system including a remote controller and a device operated by the remote controller, including: granting, by the remote controller, higher and lower access authorities to a plurality of users through a user authentication; creating, by the remote controller, an access authority to be granted to the user having the lower access authority via the user having the higher access authority and requesting the device to register the created access authority; and registering, by the device, the access authority of the user having the lower access authority, the access authority being created by the user having the higher access authority.
Before creating the access authority, the method may further include: requesting the device for permission information via the remote controller. The remote controller may transmit the request for the permission information along with a hash of a public key of the user having the lower access authority.
The method may further include: offering the remote controller the permission information in a webpage form via the device. The device may offer the permission information along with a hash of its public key.
If the access authority of the user having the lower access authority is higher than the access authority of the user having the higher access authority, the device may reject to create the access authority.
The method may further include: performing communications between the device and the remote controller within a range of the created access authority using a public key-based algorithm.
According to yet another exemplary aspect of the present invention, there is provided a remote controller including: a user authenticator granting higher and lower access authorities to a plurality of users via a predetermined serial key; if the user having the lower access authority requests a creation of an access authority, a controller creating an access authority to a device via the user having the higher access authority, the access authority to be granted to the user having the lower access authority; and a device interface requesting the device to register the created access authority.
According to yet another exemplary aspect of the present invention, there is provided a remote controller including: a remote controller interface receiving a request for a creation of an access authority through a location limited channel from another remote controller; a controller receiving the request for the creation of the access authority and creating an access authority to a device, the access authority to be granted to the another remote controller; and a device interface requesting the device to register the created access authority.
The above aspects of the present invention will be more apparent by describing certain exemplary embodiments of the present invention with reference to the accompanying drawings, in which:
Certain embodiments of the present invention will be described in greater detail with reference to the accompanying drawings. In the following description, same drawing reference numerals are used for the same elements even in different drawings.
The device 100 is controlled by the remote controller 200 that will be described later. The device 100 may be one of various types of devices requiring restrictions on access authorities of individual users such as Audio/Video devices, for example, televisions providing various contents, personal computers (PCs), home games, and the like.
If the remote controller 200 requests the device 100 of the present exemplary embodiment for predetermined permission information, the device 100 offers the corresponding permission information to the remote controller 200. Here, the device 100 may offer the remote controller 200 the permission information in a webpage form. The device 100 may offer the permission information with a hash of a public key thereof.
If the remote controller 200 requests the device 100 to register an access authority, the device 100 may register an access authority of a user having a lower access authority, the access authority being created by a user having a higher access authority, such as a guardian, for example.
If the access authority of the user having the lower access authority is indicated as being higher or greater than an access authority of the user having the higher access authority, the device 100 may reject to register the access authority of the user having the lower access authority. Here, it is presumed that the access authority of the user having the higher access authority has been already registered in the device 100.
The remote controller 200 can control the device 100 at a remote distance and may be a portable wireless terminal, such as a cellular phone or personal digital assistant (PDA).
The remote controller 200 of the present exemplary embodiment grants higher and lower access authorities to a plurality of users. Also, if the user having the higher access authority creates an access authority to be granted to the user having the lower access authority, the remote controller 200 requests the device 100 to register the created access authority. The remote controller 200 will be described in more detail later with reference to
The device 100 and the remote controller 200 may perform communications with each other within a range of the access authority created by the user having the higher access authority using a public key-based algorithm
The user interface 210 interfaces the users with the remote controller 200 and may receive a serial key for authenticating the users through manipulations of the users.
The user authenticator 220 compares the serial key input through the user interface 210 with a serial key stored in the memory 230 that will be described later to authenticate the users. The user authenticator 220 may grant the higher and lower access authorities through serial keys associated with the plurality of users.
The memory 230 stores the serial keys of the plurality of users and the public key of the remote controller 200. Here, the public key includes public keys of the users having the higher and lower access authorities.
The device interface 240 interfaces the device 100 with the remote controller 200 and is controlled by the controller 250, which will be described later, to request the device 100 to register access authorities. The device interface 240 is also controlled by the controller 250 to request the device 100 for the permission information.
The controller 250 controls the overall operation of the remote controller 200 and controls inputs and outputs of a signal among the user interface 210, the user authenticator 220, the memory 230, and the device interface 240.
If the user having the lower access authority requests the remote controller 200 to create an access authority through the user interface 210, the controller 250 creates an access authority that the user having the higher access authority is to grant to the user having the lower access authority.
The controller 250 controls the device interface 240 to request the device 100 for the permission information. Here, the controller 250 controls the device interface 240 to transmit the request for the permission information together with a hash of the public key of the user having the lower access authority.
After the controller 250 creates the access authority to be granted to the user having the lower access authority, the controller 250 may control the device interface 240 to request the device 100 to register the access authority.
The device 100a and the plurality of remote controllers 300 and 400 shown in
In the present exemplary embodiment, a PC 100a is taken as an example of the device 100. However, as described with reference to
In the present exemplary embodiment of
The higher remote controller 300 may be a PDA, and the lower remote controller 400 includes a PDA 400a and a cellular phone 400b, for example. However, the higher remote controller 300 and the lower remote controller 400 may not be necessarily limited to these.
The higher remote controller 300 may be a PDA or a cellular phone used by parents and guardians, and the lower remote controller 400 may be a PDA or cellular phone used by children or minors.
If the lower remote controller 400 requests the higher remote controller 300 to create an access authority, the higher remote controller 300 creates an access authority to be granted to the lower remote controller 400 and requests a registration of the created access authority. The higher remote controller 300 will be described in more detail later with reference to
The lower remote controller 400 attaches a hash of a public key thereof to request the higher remote controller 300 to create the access authority. Here, the lower remote controller 400 requests the higher remote controller 300 to create the access authority through a location limited channel. Communications between the lower remote controller 400 and the device 100a may be performed within a range of the access authority created by the higher remote controller 300.
The user interface 300 interfaces users with the higher remote controller 300 and offers the controller 350 various request signals input through manipulations of the users.
The remote controller interface 320 interfaces the higher remote controller 300 with another remote controller, i.e., the lower remote controller 400, and receives the request of the creation of the access authority from the lower remote controller 400.
The memory 330 stores a public key of the higher remote controller 300 and offers the public key to the controller 350 when the controller 350 makes a request for the public key. The memory 330 may store a public key of the lower remote controller 400 which can be input through the remote controller interface 320.
The device interface 340 interfaces the higher remote controller 300 with the device 100a and requests the device 100a to register the access authority of the lower remote controller 400 created by the controller 350.
The controller 350 controls the overall operation of the higher remote controller 300 and controls a flow of a signal among the user interface 310, the remote controller interface 320, the memory 330, and the device interface 340.
If the controller 350 receives a request for the creation of access authority through the remote controller interface 320, the controller 350 may control the device interface 340 to request permission information from the device 100a.
The controller 350 transmits the request for the permission information together with the hash of the public key of the lower remote controller 400 received through the remote controller interface 320. The controller 350 also creates the access authority to be granted to the lower remote controller 400 and controls the device interface 340 to request the device 100a to register the created access authority.
In operation S500, a plurality of users input a predetermined serial key through the user interface 210 to the remote controller 200 to receive corresponding access authorities from the remote controller 200. For example, guardians receive a higher access authority, and minors receive a lower access authority.
To create an access authority to the device 100 of a user having a lower access authority in the remote controller 200, the controller 250 controls the device interface 240 to request the device 100 for permission information. Here, the controller 250 attaches a hash of a public key of the user having the lower access authority to the request for the permission information. In operation S510, the device 100 offers the permission information together with a hash of a public key thereof to the remote controller 200 in response to the request of the remote controller 200, and the remote controller 200 receives the permission information through the device interface 240 from the device 100.
If a user having a higher access authority creates an access authority to be granted to the user having the lower access authority in the remote controller 200, the controller 250 controls the device interface 240 to request the device 100 to register the created access authority in operation S520.
In operation S530, the device 100 determines whether the access authority requested by the remote controller 200 is correct. In other words, the device 100 determines whether the requested access authority is lower than an access authority of the user having the higher access authority.
If the device 100 determines in operation S530 that the requested access authority is correct, the device 100 registers the requested access authority as an access authority of the user having the lower access authority in operation S540.
If the device 100 determines in operation 530 that the requested access authority is not correct, i.e., the requested access authority is higher than the access authority of the user having the higher access authority, the device 100 rejects to register the requested access authority in operation S550.
In operation S600, the lower remote controller 400 requests the higher remote controller 300 to create an access authority through a local limited channel. Here, the lower remote controller 400 attaches a hash of a public key thereof to the request for the creation of the access authority.
If the controller 350 of the higher remote controller 300 receives the request for the creation of the access authority through the remote controller interface 320, the controller 350 controls the device interface 340 to request the device 100 for permission information. Here, the controller 350 attaches the hash of the public key of the lower remote controller 400 received from the lower remote controller 400 to the request for the permission information. In operation S610, the device 100 offers the permission information in a webpage form.
After receiving the permission information from the device 100, the controller 350 of the higher remote controller 300 creates an access authority to be granted to the lower remote controller 400 based on the permission information. In operation S620, the controller 350 controls the device interface 340 to request the device 100 to register the created access authority.
In operation S630, the device 100 determines whether the requested access authority is correct. In other words, the device 100 determines whether the requested access authority is lower than an access authority of the higher remote controller 300.
If the device 100 determines in operation S630 that the requested access authority is lower than the access authority of the higher remote controller 300, the device 100 registers the requested access authority as an access authority of the lower remote controller 400 in operation S640.
If the device 100 determines in operation S630 that the requested access authority is higher than the access authority of the higher remote controller 300, the device 100 rejects to register the requested access authority in operation S650.
As described above, in a system and a method for creating an access authority and a remote controller using the system and the method according to the exemplary embodiments of the present invention, specific users, i.e., guardians, protectors and parents, can endow other users, i.e., their children and minors, with an access authority to a device. Thus, the children and the minors can use the device within a range of the access authority endowed by the guardians and the parents.
Also, the system and the method may be applied to devices requiring restrictions on access authority, for example, PCs, games, or the like as well as to existing image display devices. Thus, children and minors can be protected from indiscreet contents.
The foregoing embodiments are merely exemplary and are not to be construed as limiting the present invention. The present teachings can be readily applied to other types of apparatuses. Also, the description of the exemplary embodiments of the present invention is intended to be illustrative, and not to limit the scope of the claims, and many alternatives, modifications, and variations will be apparent to those skilled in the art.
Number | Date | Country | Kind |
---|---|---|---|
2005-0012311 | Feb 2005 | KR | national |