The present invention provides a device-independent authentication system and method of controlling access to selected versions of multimedia content. This allows parents or guardians, for example, to prevent underage viewers from accessing inappropriate material. The multimedia content may comprise, for example, one or more different versions of a movie or game distributed on a disk, or a movie or game ordered from a service provider. A person is permitted to view and/or hear a selected version of the multimedia content upon is successful authentication.
System 10 comprises a television set (TV) 12 or video monitor and a DVD player 14 that may be located in a user's home, and a remotely located server 16. The server 16 may be connected to the user's home via a publicly accessible IP network 18 such as the Internet. A remote control unit 22 allows the user to generally control the operation of the TV 12 and the DVD player 14 from a remote position and, as described in more detail later, to input data in response to on-screen prompts.
In one embodiment, the DVD player 14 prompts a parent to input authentication data during a registration process or other initial set-up routine. The parent may input the authentication data using keys disposed on the remote control 22, or directly via a user interface 24 disposed on a face of the DVD player 14. The DVD player 14 then communicates the authentication data to the remote server 16 via the Internet 18 to register the user. The authentication data may comprise, for example, a credit card number and a Personal Identification Number (PIN) selected by the user. Thereafter, whenever a user inserts a DVD 20 into the DVD player 14, DVD player 14 solicits the user to select a movie version.
In this embodiment, DVD 20 comprises multiple versions of the same movie. Some may be viewable by all family members (e.g., rated “G” movies), while others may contain material a parent deems inappropriate for underage viewers (e.g., rated “R” movies). In response to the user selecting a version of the movie, DVD player 14 prompts the user for the authentication data and communicates that data to the remote server 16. Based on the authentication data, the remote server 16 determines whether the user attempting to play the movie is or is not permitted to view the selected version and returns corresponding positive acknowledgment (ACK) or negative acknowledgment (NACK) to the DVD player 14.
Controller 32 also generates one or more control signals to cause the multimedia read assembly 36 to read the data on DVD 20 for display to the user. Different manufacturers of DVD player 14 may design their multimedia read assemblies to comprise various components. However in one embodiment, the multimedia read assembly 36 includes a drive motor (not shown) to rotate DVD 20, a laser/lens system (not shown) to read the data from the DVD 20, and a tracking mechanism (not shown) to move the laser/lens assembly over the rotating DVD 20. The operation of each of these mechanisms is well-known in the art, and thus, not described in detail here.
Controller 32 is also connected to interface circuit 38, which may comprise various busses, circuitry, and ports, to perform a variety of input/output operations. In this embodiment, interface circuit 38 includes a first port 42 to connect the DVD player 14 to the remote server 16 over the Internet, a second port 44 to receive commands and data from remote control 22, and a third port to connect the audio and video outputs of DVD player 14 to the TV 12.
Controller 32 transmits and receives signals and data to and from the remote server 16 via port 42. Port 42 may be, for example, an Ethernet port or a wireless port that operates according to standards defined for BLUETOOTH or the IEEE 802.11 family of standards. Where port 42 comprises a wireless port, DVD player 14 would also include a corresponding wireless transceiver. Port 44 may comprise an infra-red port that operates according to any of the Infrared Data Association (IrDA) family of standards. Generally, port 44 facilitates free-space communications between the DVD player 14 and the remote control 22 so that the user may control the operation of the DVD player 14 and enter the authentication data. Port 46 may be one or more video and audio connections that allow controller 32 to output the video and audio data read from DVD 20 to the TV 12. Controller 32 also outputs the various prompts for the authentication data to TV 12 over port 46.
Both the user code and the PIN may be any alphanumeric string selected by the user inputting the data. For example, in one embodiment, the user code comprises a valid credit card number to show that the person entering the authentication data is not a minor child. Likewise, the PIN may comprise a multi-digit number known only to the user. Once the user inputs the authentication data, the user may actuate a control button 78 to send the data to the remote server 16 provided the user has an active communications link with the server 16 (box 56).
After receiving the authentication data, the remote server 16 may check to determine whether the data is valid by validating the user's credit card number (box 58). Invalid data causes the remote server 16 to return a NACK to the DVD player 14, while valid data causes the DVD player 14 to return an ACK to the DVD player 14 and save the authentication data in its memory (box 62). The user may then repeat the process as many times as desired to set additional user code/PIN combinations for other versions (box 64). After each user code/PIN combination is set, controller 32 may cause a message to be displayed on screen 70 to apprise the user of the outcome.
It should be noted that parents and guardians may control access to each version independently of other versions by entering unique user code and/or PIN combinations for each version. However, some embodiments of the present invention also permit the control of a plurality of versions in a hierarchical manner using a single user code/PIN combination. By way of example, the parent needs only to input a single user code/PIN combination for “PG” movies to control access to any movie having a rating of “PG” or above (e.g., PG,” PG-13,” “R,” or NR-17”). This would also allow uncontrolled access to rated “G” movies. In other embodiments, a parent may control access to both “PG” and “PG-13” movies by inputting a first user code/PIN combination for “PG” rated movies, and to “R” and “NC-17” movies using a second user code/PIN combination for “R” rated movies.
Once registered, a person wishing to view a movie on DVD 20 would be required to authenticate him or her self by inputting the correct user code-PIN combination for the particular requested version.
Method 80 may begin when controller 32 receives a command to play a version of a movie that has a rating that the parent or guardian wishes to block access to (box 82). The person issuing the command may be a minor child of the parent. If the person selects “G” (box 84), controller 32 simply generates a control signal to the multimedia read assembly 36 to read and render the “G” rated version of the movie. If the person selects “PG” or higher, however, controller 32 prompts the person to enter the user code (box 86) (
The above embodiment describes the present invention in the context of a parent selectively controlling access to multiple versions of a movie available on DVD 20. However, the present invention is not so limited.
When the user chooses a movie offered by the service provider 112, the user might be prompted to input a user code/PIN combination that is valid for the version of the selected movie. Upon receipt of the user code/PIN combination, the service provider 112 authenticates the user. By way of example, the service provider 112 might use the user code as an index into a table stored on remote server 16 to determine whether a parent or guardian has previously indicated the requested version as one requiring controlled access. If so, and provided the user code/PIN combination are valid for the requested version, the service provider 112 streams the requested movie to the person's TV 12 via the cable network 114.
In the previous embodiments, the circuit 30 includes the authentication logic 40 necessary for prompting the user for the authentication data, and for authenticating the user based on that data. In other embodiments, however, the authentication logic 40 comprises one or more software modules burned onto DVD 20 along with the one or more versions of a movie. Authentication logic 40 may be stored in a fixed location agreed to by DVD makers, which is read executed before the movie is played. The software modules might comprise the instructions necessary to cause controller 32 to prompt a parent or guardian for the authentication data, communicate with the remote server 16, and generate control signals to render the requested movie based on the validity of the authentication data. Distributing the authentication logic 40 in this manner would allow the present invention to function on already existing devices without having to upgrade their components and/or firmware. It also permits the present invention to function at any location such as the user's home, or vacation spot.
In addition to movies and video, the present invention may also be used to control access to music on CDs. Some CDs, for example, might contain different versions of the same song wherein one version includes explicit lyrics while another version does not. Currently, separate versions are burned onto individual CDs and labeled accordingly. With the present invention, however, both songs may be included on the same CD saving time and distribution costs for the manufacturers. Parents or guardians may restrict access to songs having explicit lyrics in a manner similar to that described above.
The present invention may be used to restrict access to various games. As is known in the art, games have different ratings such as “E” for everyone, “T” for teen, and “M” for mature. Regardless of whether the games are offered on discs or on-line, parents or guardians may employ the present invention to restrict access to games with versions that identify them as having inappropriate content.
It should be noted that the above embodiments discuss the authentication data as being alphanumeric strings. However, other non-alphanumeric representations and symbols are also possible. By way of example, the user may choose to define the user code and/or PIN using a predetermined sequence of one or more function keys or buttons on remote control 22. In addition, controller 32 and/or authentication logic 40 may be disposed in any type of consumer electronics device capable of rendering multimedia content to a user.
The present invention may, of course, be carried out in other ways than those specifically set forth herein without departing from essential characteristics of the invention. The present embodiments are to be considered in all respects as illustrative and not restrictive, and all changes coming within the meaning and equivalency range of the appended claims are intended to be embraced therein.