Computer displays are increasingly network capable and can support multiple users publishing to a particular display device remotely. Although this capability has its advantages, there is a need to lock a display device so that only local users can quickly access the display and preclude the use of the display by remote users.
A method is disclosed that locks the remote display capability of a particular display device and displays an access key on the display itself. In this way, users local to the display can use the visible key to gain access to the display device while display input from remote users remains locked.
Distinctions between the present approach and traditional ‘all or nothing’ passwords include:
In operation, an alphanumeric key is generated and displayed on a display device. The key is entered into the system by a user within sight of the display device and authenticated by the system. Media sent to the display device by the user is then displayed on the display device. The present method allows users to quickly lock a display device to avoid unwanted media entering a session in which the display device is being shared among multiple users.
In one embodiment, media modules 102 first negotiate for access to the display device 101 via communication with the access management module 103, as modules 102 are able to transmit images and video to a display only after successful authentication with access management module 103. Access management module 103 is a traditional password protection and authentication system that restricts users who do not have the proper password from gaining access to any of the display devices 101 in the system.
The present system creates a key 106 and authenticates users that are attempting to use a display device, based on their physical location, i.e., their being within viewing proximity of a display device 101 that is displaying a password or ‘key’. The present technique thus easily distinguishes between remote and physically present users during the access management module authentication phase, as only users that are within eyesight of the display device can (visually) determine the current key value.
Once a key 106 has been generated in this way, future requests by media modules to publish data to the display 101 require authentication via the password/key 106. Users within eyesight of the display simply read the key from the display to which they want to connect. When presented with a password query, the user, who is in visual communication with the display device (i.e., who can see the displayed key on the display), enters the visible alphanumeric key via a media module 102, at step 220, and, after authentication by access management module 103, is then able to send media (any form of displayable data) to that display. Once a user wants to open the display to remote viewers, the user requests the access management module 103 to remove the key. A key removal message is sent to the content production module(s) 104 and the key is removed visibly from the display.
Once authenticated (i.e., where the value of the key entered is the same as the value of the displayed key), at step 225, media transmitted into / received by the system from media modules 102 is drawn by the content production module 104 at step 230, and then displayed, at step 235, by the physical display device 101. For example, media modules 102 can be laptop computers on a network (represented by cloud 105). The access management module 103 and content production module 104 can be software running on a computer that is physically connected to the display device 101. In one embodiment, users must first type the password upon request from the access management module on the laptop computer 102. Once authenticated, the laptop 102 then sends data for display to the content production module 104 via the (now open) access management module 103. Content production module 104 then draws the data and displays it on display device 101. In one embodiment, as indicated by step 232, the user is granted access to a predetermined software application if the key is authenticated.
In an alternative embodiment, content production modules 104 can execute on the laptop computers 102 themselves, each of which is physically connected to the display 101. In this embodiment, the access management module 103 must first provide each laptop 102 with credentials for direct access to the display device.
Certain changes may be made in the above methods and systems without departing from the scope of that which is described herein. It is to be noted that all matter contained in the above description or shown in the accompanying drawings is to be interpreted as illustrative and not in a limiting sense. The elements and steps shown in the present drawings may be modified in accordance with the methods described herein, and the steps shown therein may be sequenced in other configurations without departing from the spirit of the system thus described. The following claims are intended to cover all generic and specific features described herein, as well as all statements of the scope of the present method, system and structure, which, as a matter of language, might be said to fall therebetween.
This application claims priority to U.S. Provisional Patent Application No. 61/707,058 filed Sep. 28, 2012, incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61707058 | Sep 2012 | US |