The present disclosure relates to set top boxes and to controlling access to video content.
Cable television providers and satellite television providers can restrict access to television content based on parental controls. For example, a parent can program a set top box to not allow content from particular channels. Also, the set top box can be programmed to prevent access to content based on the rating of the content. In either case, if a user wants to watch restricted content he or she can be challenged by the set top box to provide a personal identification number (PIN) to unlock the content. If a correct PIN is entered, the video service allows the user to watch the content. If an incorrect PIN is received, access to the content is denied. Current PIN-based systems are based on simple policy mechanisms and do not support more flexible rule-based policy mechanisms and dynamic decision-making associated with such mechanisms.
Accordingly, there is a need for an improved system and method of controlling access to television content.
The present invention is pointed out with particularity in the appended claims. However, other features are described in the following detailed description in conjunction with the accompanying drawings in which:
A method of providing access to content is described and includes receiving a selection of content. Then, the method includes determining whether access is allowed to the content. A personal identification number (PIN) entry screen is presented at a television. Further, a request permission soft button is presented at the television.
In a particular embodiment, the method further includes indicating that access to the content is denied. When a correct PIN is received, access is provided to the content. The method also includes receiving a request for permission to access the content. Particularly, the request for permission is received after the request permission soft button is selected. Further, in a particular embodiment, the method includes determining whether a guardian is available to receive the request for permission. The request can be transmitted to an end user terminal of the guardian after determining that the guardian is available. In a particular embodiment, the method includes indicating that access to the content is denied after determining that the guardian is not available.
Further, in another particular embodiment, the method can include determining whether a response is received from the guardian within a predetermined time period and indicating that access to the content is denied after determining that the response from the guardian is not received within the predetermined time period. Additionally, the method can include determining whether the guardian has granted permission to access the content after determining that the response from the guardian is received. It can be indicated that access to the content is denied after determining that the guardian has not granted permission to access the content. Alternatively, access can be provided to the content after determining that the guardian has granted permission to access the content.
In another embodiment, a set top box is described and includes a processor and a computer readable medium that is accessible to the processor. A computer program is embedded within the computer readable medium. The computer program can include instructions to present a graphical user interface that has a PIN entry field and a request permission to access content soft button at a display device coupled to the set top box when a user selects restricted content.
In yet another embodiment, a server is described and includes a processor and a computer readable medium that is accessible to the processor. A computer program is embedded within the computer readable medium and includes instructions to request permission from an end user terminal of a guardian to provide access to restricted content at a set top box coupled to the server via a data network
Referring initially to
In a particular embodiment, the set top box 108 includes a return data path back to the content provider. For example, the set top box 108 can be an IP-TV set top box that has a return data path to the content provider. Alternatively, the set top box 108 can be a combination satellite-IP set top box that has a return data path to the content provider.
As further depicted in
In a particular embodiment, the notification server 134 can determine if a guardian is available to receive a permission request and route the permission request to an appropriate device for the guardian, e.g., an IM enabled device, a short message service (SMS) enabled telephone, a two-way pager, or an analog telephone. In particular, the IM gateway 136 allows the parental control module 132 within the application server 122 to query for the guardian's presence in an IM network and facilitates interfacing with the IM network. Additionally, the gateway 126 can allow the parental control module 132 to access subscriber presence information on a telephone network and allows for interfacing to the circuit switched network 144 and cellular messaging network via the soft switch 140.
As illustrated in
Referring to
Referring to
In a particular embodiment, the decision made at decision step 302 is based on policies that are local to the set top box. Further, the policies can be stored at a policy database that is coupled to an application server that communicates with the set top box. The policies can set by a guardian via a web interface with the application server. Thereafter, the policies can be transmitted from the application server to the set top box. The policies can be transmitted at regular intervals or when changes are made to the policies. In an alternative embodiment, the policies are stored at the database coupled to the application server and the decision of whether access to the content is allowed can be made at the application server. The result of the decision can be transmitted to the set top box.
At decision step 302, if access is not allowed, the method continues to block 308 and the set top box presents an indication that authorization is required to access the content. Thereafter, at block 310, the set top box presents a personal identification number (PIN) entry screen with a request permission soft button. At decision step 312, the set top box determines whether a PIN is received from a user. If a PIN is received, the method moves to decision step 314, and the set top box determines whether the PIN is correct. If the PIN is correct, the method proceeds to block 304 and access is provided to the content. The method then ends at state 306. If an incorrect PIN is received at decision step 314, the method moves to block 316 and the set top box indicates an error to the user. The logic then returns to decision step 312 and continues as described above.
At decision step 312, if a PIN is not received, the method moves to decision step 318 and the set top box determines whether the user has requested permission to access the television content, e.g., by selecting a request permission soft button using the remote control device. If permission is not requested, the method ends at state 306. On the other hand, at decision step 318, if permission is requested, the method moves to block 320 and the set top box determines whether to transmit the permission request. For example, a controlling user, such as a parent, may have indicated that access is denied and that no permission may be granted to a subordinate user. Or, the parent may have indicated that he or she will not accept any requests to authorize access to the restricted content. If the set top box determines not to transmit the request, the method proceeds to block 322 and the set top box indicates that access to the content is denied. The method then ends at state 306.
Returning to decision step 320, if the set top box determines to transmit the request to the application server, the method continues to decision step 324. At decision step 324, the application server, e.g., a parental control module within the application server, determines whether the parent or guardian is available. In a particular embodiment, the application server may determine whether the parent is available through a relatively simple subscribe/notify request to a network-based presence server, or through directly querying the presence server using an application program interface (API), such as a parlay user status service capability server (SCS).
If the guardian is not available, the method proceeds to block 326 and the application server transmits an indication to the set top box that the guardian is not available. Then, the method moves to block 322 and the set top box indicates that access to the content is denied. The method then ends at state 306. Returning to decision step 324, if the guardian is available, the application server transmits the request for permission to the guardian via the end user terminal at block 328. For example, if the parent is logged on to an instant messaging service and the parent is active, i.e., the parent is not in a do not disturb mode, the application server can transmit an instant message to the parent with a request for permission to access the restricted content.
Further, the application server can transmit a text message to a short message system device or an email to a two-way pager. The parent can respond to any of these messages and grant or deny access to the restricted content. Additionally, the application server can initiate a voice call to the subscriber with a recorded message requesting permission to access the restricted content. An interactive voice response system can be used to authenticate the parent, e.g., by requesting a PIN. Alternatively, the parent can be prompted to enter a “1” to grant permission or a “2” to deny permission.
Moving to decision step 330, the application server determines whether a response has been received within a predetermined time period. If a response is not received, the method proceeds to block 332 and the application server transmits an indication to the set top box that the guardian is not responding. Thereafter, the method moves to block 322 and the set top box indicates that access to the content is denied. Then, the method ends at state 306.
Returning to decision step 330, if a response is received, the method moves to decision step 334 and the gateway server determines whether the guardian has granted permission to access the content. If the guardian has not granted permission, the application server transmits an indication to the set top box that the guardian has not granted permission to the content, at block 336. Then, at block 322, the set top box indicates that access to the content is denied and the method ends at state 306. If the guardian has granted permission, at decision step 334, the method moves to block 338. At block 338, the application server transmits an indication to the set top box that the guardian has granted permission to the content. Thereafter, at block 304, the set top box provides access to the content. The method then ends at state 306.
In an alternative embodiment, after a user selects a protected channel or content item and the user is presented with a PIN entry screen and the request permission soft button, the user can leave the channel on the PIN screen, in lieu of selecting the request permission to access the content soft button. Thereafter, when the guardian logs on to a web sit associated with the service provider, the guardian can be presented with a request to unlock the protected channel or content. The guardian can then decide whether or not to unlock the protected channel or content.
With the configuration of structure described above, the system and method of providing access to television content provides a content control system that allows parents or guardians to be away from home and still control what their children are watching. Further, the system and method allows parents and guardians to determine policies to control television viewing and gaming habits for their children. The policies can be dependent on the type of content, i.e., on the rating of the content; the channel line-up; and the total amount of television watched per day, week, or month. The system and method can also be used to enforce disciplinary actions taken by a parent in which he or she has instituted a television “blackout” for a predetermined time period. Further, the system and method can be used to enforce a monthly allowance for purchasing premium content, e.g., movies on demand, pay-per-view, video games, etc. Also, the system and method can be used to block certain channels or block recording by a digital video recorder within the set top box access during certain time periods.
The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.