WO2003063488A1 - Television controller with secutiry device reader - Google Patents

Television controller with secutiry device reader Download PDF

Info

Publication number
WO2003063488A1
WO2003063488A1 PCT/US2002/000419 US0200419W WO03063488A1 WO 2003063488 A1 WO2003063488 A1 WO 2003063488A1 US 0200419 W US0200419 W US 0200419W WO 03063488 A1 WO03063488 A1 WO 03063488A1
Authority
WO
WIPO (PCT)
Prior art keywords
controller
limitations
device reader
security device
television
Prior art date
Application number
PCT/US2002/000419
Other languages
French (fr)
Inventor
Ratha Reth
Original Assignee
Ub Port, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ub Port, Inc. filed Critical Ub Port, Inc.
Priority to PCT/US2002/000419 priority Critical patent/WO2003063488A1/en
Publication of WO2003063488A1 publication Critical patent/WO2003063488A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4182External card to be used in combination with the client device, e.g. for conditional access for identification purposes, e.g. storing user identification data, preferences, personal settings or data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/422Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
    • H04N21/42203Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS] sound input device, e.g. microphone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/43615Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • H04N21/4415Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card using biometric characteristics of the user, e.g. by voice recognition or fingerprint scanning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only

Definitions

  • the field of the invention is television controllers.
  • Televisions are self-contained units that include a radio signal receiver to receives audio and image information, a screen in the form of a cathode ray tube, a speaker, and control buttons or knobs to select channels, control image characteristics, and control the audio output level.
  • a radio signal receiver to receives audio and image information
  • a screen in the form of a cathode ray tube
  • a speaker and control buttons or knobs to select channels, control image characteristics, and control the audio output level.
  • Many television sets are equipped to cooperate with hand-held remote controls that allow a viewer to operate the television from a distance of several feet.
  • Many television sets also have video input ports that receive input from video/DVD players, and that cooperate with cable demodulation boxes.
  • set top box is somewhat of a misnomer because the computer portion need not be physically located on top of the television set, and indeed is often positioned to the side of, below, or even within the housing of a television set. Moreover, set top boxes do not need to have a separate housing at all, and certainly do not need to have a boxy housing.
  • the more accurate term for a set-top box would be a "television controller".
  • the key feature that distinguishes a television controller from a PC or other computer that can receive and display television images accessed via Internet is that a television controller cooperates with a television set rather than a dedicated computer monitor.
  • the term Internet is used herein as a euphemism for any public package switched network.
  • One of the advantages of using a television controller is that the television screen can be used for both (a) viewing television programming and (b) operating standard computer applications.
  • a user may choose to use the television controller and the television screen to "surf the Internet, operate a word processing or spreadsheet program, or place an Internet phone call. Interaction with many such applications is commonly handled with a keyboard, and several wireless keyboards are now available that facilitate just such operations.
  • One of the problems with using network enabled set top boxes is that it provides access to a computer and one or more networks that are deemed to be improper or otherwise undesirable. For example, children or other users may have access to information deemed to be off- limits. A particular concern among many parents is that children will access material on web sites that cater especially to adults. Other worries are that children will use the Internet to make inappropriate purchases. With the advent of e-phones, another worry is that children will use the e- phones to talk to strangers, or to talk outside designated hours. There may even be a desire to restrict use of locally installed game or other software.
  • the present invention provides apparatus and methods in which a controller operates a television receiver and a display, where the controller includes a network interface, a remote control interface, and a security device reader.
  • the network interface preferably includes circuitry for accessing the Internet, or other public package switched network.
  • Other contemplated communication devices include a cable signal descrambler, and a broadcast radio wave receiver.
  • Security device readers are those that read a security card, pin, or other carryable item, but readers are also contemplated that read such things as a finger print or other biometric. Excluded are keypads because they do not interact with an external item that contains the security information. Security cards and the like will usually contain electronic memory, and may also contain a microprocessor. It is preferred that the security device reader is physically located in the television housing along with the remote control interface.
  • Software preferably cooperates with the security device reader to place a limitation on information in some manner.
  • the software may limit a television station or web site that can be viewed through the display.
  • An application may also be limited, and such limits may be especially useful with respect to games, phone calling, making purchases, and so forth. Limitations may preclude access altogether, or may manifest in some other manner such as imposing a usage fee, or a maximum time or dollar limit.
  • Other contemplated limitations may involve access to a computer peripheral, such as a video camera or game console.
  • a remote control handset can communicate with the controller using a wireless connection.
  • Preferred handsets include at least a microphone, and more preferably a speaker.
  • the microphone is preferably used in conjunction with software to recognize voice commands, and especially voice intonations of the sequencing designations associated with the icons.
  • the handset can also be used as a telephone to make calls through HPNA or other electronics employed by the controller.
  • Figure 1 is a block diagram of an interactive television system according to the present invention.
  • FIG. 2 is a block diagram of a controller and interactive television system elements coupled to the controller according to the present invention.
  • an interactive television system 10 generally includes a controller 20, a television 80, and a remote control handset 40.
  • the controller 20 communicates with a plurality of built-in or peripheral devices, optionally including a security device reader 50, a digital camera 82, a phone 84, a video recorder 86, a DVD player 88, and household appliances 90.
  • Television system 10 receives signals from Internet service providers 60, and television program providers 70.
  • the television screen (i.e. display) 30 preferably includes a high definition screen having a dot pitch of no more than 0.25 Mm.
  • Sequentially designated icons 32 are displayed on the display 30 of the television screen for operation of the various peripheral devices, web browsing, television access, and other functions. For simplicity of description, sequentially designated icons are referred from time to time herein simply as sequenced icons. In this particular instance, numerals 34 are utilized to sequentially designate the sequenced icons 32.
  • Security card 50 can take many different shapes or forms, but would preferably meet the
  • Security card 50 would preferably include a microprocessor 52 and a memory 54, but may alternatively include only a microprocessor 52 or only a memory 54. It is further contemplated that the security card 50 may not even be a card, but instead be some other type of device that can be read by the security device reader 55 (see Figure 2).
  • the controller 20 generally comprises a memory 100, a microprocessor 110, a security device reader 55, and various interfaces.
  • the interfaces depicted are a television interface 120, a modem 130, a remote control interface 45, a network interface 65, television signal receiver 75, peripheral device control 91, audio transmitter 93, and an audio receiver 95.
  • Each of these components by itself is well known in the electronic industry, with the exception of the programming of the microprocessor in accordance with the functionality set forth herein.
  • controller 20 may be co-located in a single housing (not shown).
  • the controller housing may or may not be physically coupled to the television set 80 housing.
  • one or more of the various components of controller 20 may be disposed in the television set 80 housing.
  • Controller 20 is an example of a "set-top box", and may be used to access the Internet or other network through the network interface 65 or a telephone modem 130. Alternatively, network access can be made through a cable television line, satellite dish, or any other suitable equipment.
  • Security device reader 55 is intended to receive the security card 50, or some other physical source of information.
  • Other contemplated information sources include anatomical objects such as fingers, from which the security device reader could obtain a fingerprint or other biometric.
  • security card is used as a euphemism where applicable to mean any physical information source that cooperates with the security device reader to provide access limitations.
  • Security device reader 55 may have any suitable location with respect to other elements of the controller, and the security device reader may itself by an add-on peripheral device, coupled to the controller through an RS-232 or other communications port. Security device reader 55 is still considered herein to be part of the controller 20 even if it is only coupled through a communications port.
  • security device reader 55 will have a slot to receive security card 50, although the slot could be replaced or supplemented by a sensor pad or other information receiving element. Positioning of the slot or other information receiving component is not especially critical, as long as it can be reasonably accessed.
  • security card 50 When security card 50 is inserted into the security device reader 55 slot, the card makes contact with electrical connectors that transfer data to and from the card's microprocessor 52 and memory 54. Alternatively, the security card 50 may communicate with the microprocessor 52 in a contactless manner, perhaps using an antenna to transfer data.
  • the information stored in security card 50 is used by software to enforce limitations on electronic devices, processes, programs, or commands.
  • the software can be installed in the controller 20, in the card 50, or some combination of the two. There would likely be multiple cards for the different family members, or in the case of a business, multiple cards for the different employees.
  • security cards may be configured to operate in conjunction with only one controller 20. Security cards can also be used in conjunction with additional security features, including the entering of a PIN number, authentication of the user by fingerprint analysis or other security measures.
  • the information stored in the security card 50 could be entered at any appropriate time. It is possible for security cards to be made non-alterable, and it may be cost effective to broadly market cards having standard sets of limitations. That way parents could purchase different cards for girls or boys, for tweens, junior high schoolers, high schoolers, and so forth. Most likely, however, the information on the cards can be updated using the security device reader 55 to modify the cards.
  • Limitations can be stored in an exclusive or inclusive format. Thus, one card may list exclusions on access (exclusive format), and another card may exclude all access except that expressly listed (inclusive format). Limitations can be included in any practicable combination.
  • Limitations can be directed to virtually anything included in, or accessed by, the system 10. Some limitations, for example, may be directed to television stations that can be viewed through the display 30. Other limitations may be directed to particular web sites, or more globally to web sites that contain certain types of content. Limitations can even be directed to entire networks and subnets such VPNs. Still other limitations may be directed to availability of user applications, such as a videophone program, or office programs such as word processing and spreadsheets. Still other limitations may be directed to peripherals such as joysticks or electronic a game controller, or a camera. It is especially contemplated that limitations can be directed to information stored in a hard disk or other medium of the controller 20.
  • Such limitations can advantageously be used to prevent all access to some or all of a hard disk, or other memory storage, during times when no security card is being used. That would provide a relatively high barrier to attack on the controller 20 through a network connection, even if the connection were permanent.
  • Limitations can also be viewed from time or other perspectives. For example, limitations can be temporal, precluding (or allowing) access only certain times of the day, or only on certain days. Thus, a child could be precluded from watching television or surfing the Internet after 9:00 pm. Limitations can also be financial. For example, a user could be precluded from making on-line purchases of more than a given amount, or that total more than a given amount in a particular time period.
  • a teenager comes home from school at 3:00 pm and wants to play an electronic game 90. He inserts his personal security card 50 into the security device reader 55, and the reader accesses his access-control limitations stored on the card. That information 50 allows access to the electronic game 90 only between the hours of 7:00 pm to 11 :00 pm, and the the controller 20 enforces that restriction. Therefore, the teenager will not be able to play the electronic game 90 at 3:00 pm.
  • the teenager observes there is a program on HBO that he would like to watch, and tries to access the corresponding channel using the remote control handset 40.
  • the information on the security card 50 includes a restriction that prevents access to the HBO station. The teenager cannot watch that program.
  • a consumer completes a financial transaction using the security card 50, either separately or in combination with a credit card.
  • the security device reader 55 reads limitation information from the security card 50, and enforces that limitation on an electronic transaction.
  • the reader may read other information as well, including a credit card number, name, expiration date, and so forth.
  • a preferred type of limitation is imposition of a usage fee for executing the transaction, over and above any fees that may be charged by the vendor, shipper, or credit card company.
  • the usage fee may be calculated as a function of the monetary amount or alternatively it may be a set fee that is independent of the monetary amount.
  • the usage fee would like be very modest, perhaps a few cents per transaction, but may be more.
  • the usage fee could be added to the credit card amount, or perhaps charged through to a phone number, or a cable, Internet, or other access account.
  • Other contemplated limitations are limitations on the amount of a single financial transaction by a card user, the total amount of financial transactions that can be made against a given credit card, total amount of financial transactions for a given day, week, etc.
  • a teenager may try to purchase some videos from a Web Site for $500. The transaction is prevented by a limitation as to dollar amount of purchase. He then reduces the order to $100, and the sale goes through with a $.05 usage fee.
  • Remote control handset 40 is preferably used to access the devices, programs, processes, and commands of system 10.
  • a preferred handset is a cross between a telephone handset and a television handset.
  • a telephone handset there is a speaker 200 near the upper end, a microphone 290 near the lower end, and in between various telephone control keys (not shown): call/talk button, a send button, a redial button, a mute button, and a numeric/alphabetic keypad.
  • function selectors not shown: TV button, TV/STB (set top box) selector button, STB button, channel and volume controls, and AM/FM radio button.
  • handset 40 may also advantageously include buttons (not shown) for main menu, print, and surf.
  • buttons (not shown) for main menu, print, and surf.
  • a trackball (not shown) or other cursor control device can also be included that cooperates with a "left-click” or select button (not shown), and a "right click” button (not shown)for cursor control.
  • Remote control handset 40 can be used in many different ways to access the icons 32, or perhaps more strictly speaking can be used to access the functions or devices designated by the icons 32.
  • icons 32 are sequenced, it is preferred that a particular icon 32 is selected via its corresponding sequencing designation (not shown). This can be done in numerous ways, one of which is to press on a numeric or other key carried by the handset. Thus, to access a sequenced icon 32 having the numeral 11 as its corresponding sequencing designation, one could press the numeral 1 key twice in relatively rapid succession. Icons 32 having letters as their corresponding sequencing designations could be accessed using letter keys, which may be laid out for example, in the manner of the letter keys on a cellular telephone. Thus, a key for the numeral 2 may also suffice for the letters A, B, and C, with the user pressing the key twice in rapid succession to obtain the letter B, and three times to obtain the letter C. Access can also be accomplished by voice.
  • Voice recognition software could be installed in the remote control handset 40, the controller 20, or some combination of the two. Since a single household may well have users that speak different languages, the voice recognition software preferably contains sample voice patterns in at least ten different languages, at the very least for each of the numerals zero through nine. However, the voice recognition software may contain sample voice patterns for less than or more than ten different languages. More preferred is that the voice recognition software contains at least 100 sample voice patterns for each of the ten different languages for each of the numerals zero through nine, requiring at least 10,000 total sample voice patterns. Even more preferred software recognizes at least 25,000 total sample voice patterns, and still more preferred software recognizes at least 50,000 total sample voice patterns.
  • the voice command does not have to be received by the microphone 290 disposed in the remote control handset 40.
  • the voice command may be received directly by a microphone in the controller 20, or elsewhere.
  • a typical universal remote control handset has electronics that wirelessly couples the remote control handset to a television controller to control the television, video recorder and other devices that are connected to the television set.
  • the remote control handset 40 has similar electronics to a universal remote control handset for the control of the television, video recorder and other devices that are connected to the television set.
  • the remote control handset 40 selects icons 32 by selecting a sequencing designation overlaid on the icon 32 that represents various processes, programs or commands involving elements that are a part of an interactive television system 10. It is further contemplated that the remote control handset 40 will, in cooperation with the controller 20, be used to conduct telephone calls through a conventional telephone, videophone, e-phone or other type of phone.
  • the remote control handset 40 is wirelessly coupled to the controller 20, and cooperates with the controller 20 to conduct telephone calls over the Internet. This is accomplished through the network interface 65, with the controller 20 running any necessary e-phone software. Appropriate home phone line networking alliance (HPNA) or other electronics is included in, or coupled to, the controller 20 as needed.
  • HPNA home phone line networking alliance

Abstract

A television controller (20) includes a network interface, and a security device reader. The security device reader reads a security card (55), pin, or other carryable item, that contains electronic memory storing limitations that affect access to information in some manner. Limitations can be directed to virtually anything included in, or accessed by, the television (80) and controller (20). Thus, limitations can be directed to specific television channels, networks, particular web sites, or more globally to web sites that contain certain types of content. Other limitations may be directed to availability of user applications, such as a videophone program, or office programs such as word processing and spreadsheets. Still other limitations may be directed to peripherals such as joysticks or electronic a game controller, or a camera (82). It is especially contemplated that limitations can be directed to information stored in a hard disk or other medium of the controller. Still other limitations can be temporal, precluding (or allowing) access only certain times of the day, or only on certain days. Limitations can also be financial, and may include a usage fee.

Description

TELEVISION CONTROLLER WITH SECURITY DEVICE READER
Field of the Invention
The field of the invention is television controllers.
Background of the Invention
Televisions are self-contained units that include a radio signal receiver to receives audio and image information, a screen in the form of a cathode ray tube, a speaker, and control buttons or knobs to select channels, control image characteristics, and control the audio output level. Many television sets are equipped to cooperate with hand-held remote controls that allow a viewer to operate the television from a distance of several feet. Many television sets also have video input ports that receive input from video/DVD players, and that cooperate with cable demodulation boxes.
Early personal computers frequently utilized a television screen as the computer display. The resolution was extremely poor, however, and such usage gave way to higher resolution dedicated computer monitors. When digital television became available, it once again became practical to utilize a television screen as the display for a computer. The much-publicized interactive television concept attempts to marry television and computing, usually with a "set top box" computer coupled to a digital television.
The name "set top box" is somewhat of a misnomer because the computer portion need not be physically located on top of the television set, and indeed is often positioned to the side of, below, or even within the housing of a television set. Moreover, set top boxes do not need to have a separate housing at all, and certainly do not need to have a boxy housing.
The more accurate term for a set-top box would be a "television controller". The key feature that distinguishes a television controller from a PC or other computer that can receive and display television images accessed via Internet is that a television controller cooperates with a television set rather than a dedicated computer monitor. The term Internet is used herein as a euphemism for any public package switched network. One of the advantages of using a television controller is that the television screen can be used for both (a) viewing television programming and (b) operating standard computer applications. Thus, a user may choose to use the television controller and the television screen to "surf the Internet, operate a word processing or spreadsheet program, or place an Internet phone call. Interaction with many such applications is commonly handled with a keyboard, and several wireless keyboards are now available that facilitate just such operations.
One of the problems with using network enabled set top boxes, however, is that it provides access to a computer and one or more networks that are deemed to be improper or otherwise undesirable. For example, children or other users may have access to information deemed to be off- limits. A particular concern among many parents is that children will access material on web sites that cater especially to adults. Other worries are that children will use the Internet to make inappropriate purchases. With the advent of e-phones, another worry is that children will use the e- phones to talk to strangers, or to talk outside designated hours. There may even be a desire to restrict use of locally installed game or other software.
Thus, there is a continuing need to provide systems and methods that limit the access provided by a television controller.
Summary of the Invention
The present invention provides apparatus and methods in which a controller operates a television receiver and a display, where the controller includes a network interface, a remote control interface, and a security device reader.
The network interface preferably includes circuitry for accessing the Internet, or other public package switched network. Other contemplated communication devices include a cable signal descrambler, and a broadcast radio wave receiver.
Security device readers are those that read a security card, pin, or other carryable item, but readers are also contemplated that read such things as a finger print or other biometric. Excluded are keypads because they do not interact with an external item that contains the security information. Security cards and the like will usually contain electronic memory, and may also contain a microprocessor. It is preferred that the security device reader is physically located in the television housing along with the remote control interface.
Software preferably cooperates with the security device reader to place a limitation on information in some manner. Thus, the software may limit a television station or web site that can be viewed through the display. An application may also be limited, and such limits may be especially useful with respect to games, phone calling, making purchases, and so forth. Limitations may preclude access altogether, or may manifest in some other manner such as imposing a usage fee, or a maximum time or dollar limit. Other contemplated limitations may involve access to a computer peripheral, such as a video camera or game console.
A remote control handset can communicate with the controller using a wireless connection.
Preferred handsets include at least a microphone, and more preferably a speaker. The microphone is preferably used in conjunction with software to recognize voice commands, and especially voice intonations of the sequencing designations associated with the icons. The handset can also be used as a telephone to make calls through HPNA or other electronics employed by the controller.
Various objects, features, aspects, and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.
Brief Description of the Drawings
Figure 1 is a block diagram of an interactive television system according to the present invention.
Figure 2 is a block diagram of a controller and interactive television system elements coupled to the controller according to the present invention.
Detailed Description
In Figure 1 an interactive television system 10 generally includes a controller 20, a television 80, and a remote control handset 40. The controller 20 communicates with a plurality of built-in or peripheral devices, optionally including a security device reader 50, a digital camera 82, a phone 84, a video recorder 86, a DVD player 88, and household appliances 90. The double- ended arrows, not numbered, depict communication pathways. Television system 10 receives signals from Internet service providers 60, and television program providers 70. The television screen (i.e. display) 30 preferably includes a high definition screen having a dot pitch of no more than 0.25 Mm. Sequentially designated icons 32 are displayed on the display 30 of the television screen for operation of the various peripheral devices, web browsing, television access, and other functions. For simplicity of description, sequentially designated icons are referred from time to time herein simply as sequenced icons. In this particular instance, numerals 34 are utilized to sequentially designate the sequenced icons 32.
Security card 50 can take many different shapes or forms, but would preferably meet the
International Organization for Standardization (ISO) 7810 standard for smart card size, and the ISO 7816 standard for the smart card physical characteristics of the plastic, including the temperature range and flexibility, position of the electrical contacts and how the microchip communicates with the outside world. Security card 50 would preferably include a microprocessor 52 and a memory 54, but may alternatively include only a microprocessor 52 or only a memory 54. It is further contemplated that the security card 50 may not even be a card, but instead be some other type of device that can be read by the security device reader 55 (see Figure 2).
In Figure 2 the controller 20 generally comprises a memory 100, a microprocessor 110, a security device reader 55, and various interfaces. The interfaces depicted are a television interface 120, a modem 130, a remote control interface 45, a network interface 65, television signal receiver 75, peripheral device control 91, audio transmitter 93, and an audio receiver 95. Each of these components by itself is well known in the electronic industry, with the exception of the programming of the microprocessor in accordance with the functionality set forth herein.
The various components of controller 20 may be co-located in a single housing (not shown). The controller housing may or may not be physically coupled to the television set 80 housing. Alternatively, one or more of the various components of controller 20 may be disposed in the television set 80 housing. Controller 20 is an example of a "set-top box", and may be used to access the Internet or other network through the network interface 65 or a telephone modem 130. Alternatively, network access can be made through a cable television line, satellite dish, or any other suitable equipment.
Security device reader 55 is intended to receive the security card 50, or some other physical source of information. Other contemplated information sources include anatomical objects such as fingers, from which the security device reader could obtain a fingerprint or other biometric. To simplify the language used herein, the term security card is used as a euphemism where applicable to mean any physical information source that cooperates with the security device reader to provide access limitations.
Security device reader 55 may have any suitable location with respect to other elements of the controller, and the security device reader may itself by an add-on peripheral device, coupled to the controller through an RS-232 or other communications port. Security device reader 55 is still considered herein to be part of the controller 20 even if it is only coupled through a communications port.
Most likely security device reader 55 will have a slot to receive security card 50, although the slot could be replaced or supplemented by a sensor pad or other information receiving element. Positioning of the slot or other information receiving component is not especially critical, as long as it can be reasonably accessed. When security card 50 is inserted into the security device reader 55 slot, the card makes contact with electrical connectors that transfer data to and from the card's microprocessor 52 and memory 54. Alternatively, the security card 50 may communicate with the microprocessor 52 in a contactless manner, perhaps using an antenna to transfer data.
The information stored in security card 50 is used by software to enforce limitations on electronic devices, processes, programs, or commands. The software can be installed in the controller 20, in the card 50, or some combination of the two. There would likely be multiple cards for the different family members, or in the case of a business, multiple cards for the different employees.
Typically, insertion of a particular card into the security device reader 55 triggers downloading of limitations applicable to the holder of that particular card. To thwart counterfeiting of cards, or passing around of cards in an unauthorized manner, it is also contemplated that security cards may be configured to operate in conjunction with only one controller 20. Security cards can also be used in conjunction with additional security features, including the entering of a PIN number, authentication of the user by fingerprint analysis or other security measures.
The information stored in the security card 50 could be entered at any appropriate time. It is possible for security cards to be made non-alterable, and it may be cost effective to broadly market cards having standard sets of limitations. That way parents could purchase different cards for girls or boys, for tweens, junior high schoolers, high schoolers, and so forth. Most likely, however, the information on the cards can be updated using the security device reader 55 to modify the cards.
Limitations can be stored in an exclusive or inclusive format. Thus, one card may list exclusions on access (exclusive format), and another card may exclude all access except that expressly listed (inclusive format). Limitations can be included in any practicable combination.
Limitations can be directed to virtually anything included in, or accessed by, the system 10. Some limitations, for example, may be directed to television stations that can be viewed through the display 30. Other limitations may be directed to particular web sites, or more globally to web sites that contain certain types of content. Limitations can even be directed to entire networks and subnets such VPNs. Still other limitations may be directed to availability of user applications, such as a videophone program, or office programs such as word processing and spreadsheets. Still other limitations may be directed to peripherals such as joysticks or electronic a game controller, or a camera. It is especially contemplated that limitations can be directed to information stored in a hard disk or other medium of the controller 20. Such limitations can advantageously be used to prevent all access to some or all of a hard disk, or other memory storage, during times when no security card is being used. That would provide a relatively high barrier to attack on the controller 20 through a network connection, even if the connection were permanent.
Limitations can also be viewed from time or other perspectives. For example, limitations can be temporal, precluding (or allowing) access only certain times of the day, or only on certain days. Thus, a child could be precluded from watching television or surfing the Internet after 9:00 pm. Limitations can also be financial. For example, a user could be precluded from making on-line purchases of more than a given amount, or that total more than a given amount in a particular time period.
In an exemplary configuration, a teenager comes home from school at 3:00 pm and wants to play an electronic game 90. He inserts his personal security card 50 into the security device reader 55, and the reader accesses his access-control limitations stored on the card. That information 50 allows access to the electronic game 90 only between the hours of 7:00 pm to 11 :00 pm, and the the controller 20 enforces that restriction. Therefore, the teenager will not be able to play the electronic game 90 at 3:00 pm. At 10:00 pm the teenager observes there is a program on HBO that he would like to watch, and tries to access the corresponding channel using the remote control handset 40. However, the information on the security card 50 includes a restriction that prevents access to the HBO station. The teenager cannot watch that program. At 11 :00 the teenager goes to bed, and removes his card from the security device reader 55. Early in the morning a hacker tries to gain entry into the hard drive of the controller 20, but is prevented from even accessing the controller 20 because there is no security card in the reader.
With respect to financial transactions, a consumer completes a financial transaction using the security card 50, either separately or in combination with a credit card. To that end, the security device reader 55 reads limitation information from the security card 50, and enforces that limitation on an electronic transaction. Optionally, the reader may read other information as well, including a credit card number, name, expiration date, and so forth. A preferred type of limitation is imposition of a usage fee for executing the transaction, over and above any fees that may be charged by the vendor, shipper, or credit card company. The usage fee may be calculated as a function of the monetary amount or alternatively it may be a set fee that is independent of the monetary amount. The usage fee would like be very modest, perhaps a few cents per transaction, but may be more. The usage fee could be added to the credit card amount, or perhaps charged through to a phone number, or a cable, Internet, or other access account. Other contemplated limitations are limitations on the amount of a single financial transaction by a card user, the total amount of financial transactions that can be made against a given credit card, total amount of financial transactions for a given day, week, etc. In a specific example, a teenager may try to purchase some videos from a Web Site for $500. The transaction is prevented by a limitation as to dollar amount of purchase. He then reduces the order to $100, and the sale goes through with a $.05 usage fee.
Remote control handset 40 is preferably used to access the devices, programs, processes, and commands of system 10. A preferred handset is a cross between a telephone handset and a television handset. In the manner of a telephone handset, there is a speaker 200 near the upper end, a microphone 290 near the lower end, and in between various telephone control keys (not shown): call/talk button, a send button, a redial button, a mute button, and a numeric/alphabetic keypad. In the manner of a television handset, there are function selectors (not shown): TV button, TV/STB (set top box) selector button, STB button, channel and volume controls, and AM/FM radio button. Since the television set 80 is to be used as a computer monitor for Internet access and other computer type functions, handset 40 may also advantageously include buttons (not shown) for main menu, print, and surf. A trackball (not shown) or other cursor control device can also be included that cooperates with a "left-click" or select button (not shown), and a "right click" button (not shown)for cursor control.
Remote control handset 40 can be used in many different ways to access the icons 32, or perhaps more strictly speaking can be used to access the functions or devices designated by the icons 32. One can, of course, us the trackball 240 to move a cursor around the display, and then access a particular icon by clicking on or near the icon using the select button.
Where icons 32 are sequenced, it is preferred that a particular icon 32 is selected via its corresponding sequencing designation (not shown). This can be done in numerous ways, one of which is to press on a numeric or other key carried by the handset. Thus, to access a sequenced icon 32 having the numeral 11 as its corresponding sequencing designation, one could press the numeral 1 key twice in relatively rapid succession. Icons 32 having letters as their corresponding sequencing designations could be accessed using letter keys, which may be laid out for example, in the manner of the letter keys on a cellular telephone. Thus, a key for the numeral 2 may also suffice for the letters A, B, and C, with the user pressing the key twice in rapid succession to obtain the letter B, and three times to obtain the letter C. Access can also be accomplished by voice. Instead of manually depressing a number on the remote control handset 40, an individual could access a particular sequenced icon 32 by speaking a number, letter, color, or other word or phrase corresponding to one of the sequencing designations. Voice recognition software could be installed in the remote control handset 40, the controller 20, or some combination of the two. Since a single household may well have users that speak different languages, the voice recognition software preferably contains sample voice patterns in at least ten different languages, at the very least for each of the numerals zero through nine. However, the voice recognition software may contain sample voice patterns for less than or more than ten different languages. More preferred is that the voice recognition software contains at least 100 sample voice patterns for each of the ten different languages for each of the numerals zero through nine, requiring at least 10,000 total sample voice patterns. Even more preferred software recognizes at least 25,000 total sample voice patterns, and still more preferred software recognizes at least 50,000 total sample voice patterns.
It is further contemplated that the voice command does not have to be received by the microphone 290 disposed in the remote control handset 40. The voice command may be received directly by a microphone in the controller 20, or elsewhere.
Historically, a typical universal remote control handset has electronics that wirelessly couples the remote control handset to a television controller to control the television, video recorder and other devices that are connected to the television set. In embodiments disclosed herein, the remote control handset 40 has similar electronics to a universal remote control handset for the control of the television, video recorder and other devices that are connected to the television set. Additionally, the remote control handset 40 selects icons 32 by selecting a sequencing designation overlaid on the icon 32 that represents various processes, programs or commands involving elements that are a part of an interactive television system 10. It is further contemplated that the remote control handset 40 will, in cooperation with the controller 20, be used to conduct telephone calls through a conventional telephone, videophone, e-phone or other type of phone.
In preferred embodiments, the remote control handset 40 is wirelessly coupled to the controller 20, and cooperates with the controller 20 to conduct telephone calls over the Internet. This is accomplished through the network interface 65, with the controller 20 running any necessary e-phone software. Appropriate home phone line networking alliance (HPNA) or other electronics is included in, or coupled to, the controller 20 as needed.
Thus, specific embodiments and applications of a television controller with a security device reader have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claim.

Claims

CLAIMSWhat is claimed is:
1. A controller that operates a television receiver and a display, comprising:
a network interface;
a remote control interface; and
a security device reader.
2. The controller of claim 1, wherein the network interface includes circuitry for accessing a public package switched network.
3. The controller of claim 2, wherein the public package switched network comprises the Internet.
4. The controller of claim 1, wherein the security device reader reads a security card.
5. The controller of claim 4, wherein the security card includes a microprocessor.
6. The controller of claim 1, wherein the security device reader is physically located in a housing along with the remote control interface.
7. The controller of claim 1, further comprising software that cooperates with the security device reader to place a limitation on a television station that can be viewed through the display.
8. The controller of claim 1, further comprising software that cooperates with the security device reader to place a limitation on web sites that can be viewed through the display.
9. The controller of claim 1, further comprising software that cooperates with the security device reader to place a limitation on a user application that can be viewed through the display.
10. The controller of claim 9, wherein the user application comprises an electronic game.
11. The controller of claim 9, wherein the user application comprises a video phone program.
12. The controller of claim 1, further comprising software that cooperates with the security device reader to place a limitation on a transaction involving a monetary amount.
13. The controller of claim 12, wherein the limitation comprises imposing a usage fee.
14. The controller of claim 13, wherein the usage fee is calculated as a function of the monetary amount.
15. The controller of claim 13, wherein the usage fee is independent of the monetary amount.
16. The controller of claim 1, wherein the television receiver comprises a cable signal descrambler.
17. The controller of claim 1, wherein the television receiver contains electronics that receives a broadcast radio wave.
18. The controller of claim 1, wherein the remote control interface receives a signal from a hand-held remote control that includes a microphone.
19. The controller of claim 1, wherein the hand-held remote control includes a speaker.
20. The controller of claim 1, further comprising software that cooperates with the security device reader to limit access to a peripheral device.
21. The controller of claim 1 , wherein the peripheral device comprises a camera.
22. The controller of claim 1, wherein the peripheral device comprises a game console.
PCT/US2002/000419 2002-01-08 2002-01-08 Television controller with secutiry device reader WO2003063488A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2002/000419 WO2003063488A1 (en) 2002-01-08 2002-01-08 Television controller with secutiry device reader

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2002/000419 WO2003063488A1 (en) 2002-01-08 2002-01-08 Television controller with secutiry device reader

Publications (1)

Publication Number Publication Date
WO2003063488A1 true WO2003063488A1 (en) 2003-07-31

Family

ID=27608956

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/000419 WO2003063488A1 (en) 2002-01-08 2002-01-08 Television controller with secutiry device reader

Country Status (1)

Country Link
WO (1) WO2003063488A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1814322A1 (en) * 2004-12-13 2007-08-01 Matsushita Electric Industrial Co., Ltd. Tv receiver

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5880769A (en) * 1994-01-19 1999-03-09 Smarttv Co. Interactive smart card system for integrating the provision of remote and local services
US5923379A (en) * 1996-12-02 1999-07-13 Samsung Electronics Co., Ltd. DSS/DVD picture in picture with internet

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5880769A (en) * 1994-01-19 1999-03-09 Smarttv Co. Interactive smart card system for integrating the provision of remote and local services
US5923379A (en) * 1996-12-02 1999-07-13 Samsung Electronics Co., Ltd. DSS/DVD picture in picture with internet

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1814322A1 (en) * 2004-12-13 2007-08-01 Matsushita Electric Industrial Co., Ltd. Tv receiver
EP1814322A4 (en) * 2004-12-13 2009-12-23 Panasonic Corp Tv receiver

Similar Documents

Publication Publication Date Title
US6978933B2 (en) Card for service access
US7802728B2 (en) Microprocessor card defining a custom user interface
US7259710B2 (en) User input device
US20030093812A1 (en) System and method for delivering data to an information appliance using the ISO07816
US6915957B2 (en) User interface for interaction with smart card applications
US20020067283A1 (en) Remote control with status indicator
US6330021B1 (en) Interactive television reception console
JP2009506593A (en) Non-release digital butler consumer electronic device and method
EP1701523B1 (en) Apparatus and method for providing user assistance in a wireless terminal employing an avatar
US7236978B2 (en) Configurable input buffer
WO2003051040A2 (en) Methods, systems, and apparatus for tuning television components using an internet appliance
WO2003063488A1 (en) Television controller with secutiry device reader
KR20040005237A (en) device for distinguishing cards and digital set-top box using the device
US6971583B2 (en) Method of securely preserving volatile data while powering down a smart card
EP1348155A2 (en) Display generating device
KR20060036587A (en) Method and system for payment by using digital tv set top box and mobile phone
AU2001287368B2 (en) Card for service access
KR100288779B1 (en) Servo system for optical pickup
KR19990086441A (en) Home Shopping Method Using Credit Card in Satellite Broadcast Receiver
AU2001287367A1 (en) Card reading device for service access
AU2001287368A1 (en) Card for service access
AU2001285607A1 (en) System for card-based service access
KR20100131734A (en) System and method for entering password by using on-screen keyboard
JP2013081192A (en) Tethered digital butler consumer electronic device and method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP