TELEVISION CONTROLLER WITH SECURITY DEVICE READER
Field of the Invention
The field of the invention is television controllers.
Background of the Invention
Televisions are self-contained units that include a radio signal receiver to receives audio and image information, a screen in the form of a cathode ray tube, a speaker, and control buttons or knobs to select channels, control image characteristics, and control the audio output level. Many television sets are equipped to cooperate with hand-held remote controls that allow a viewer to operate the television from a distance of several feet. Many television sets also have video input ports that receive input from video/DVD players, and that cooperate with cable demodulation boxes.
Early personal computers frequently utilized a television screen as the computer display. The resolution was extremely poor, however, and such usage gave way to higher resolution dedicated computer monitors. When digital television became available, it once again became practical to utilize a television screen as the display for a computer. The much-publicized interactive television concept attempts to marry television and computing, usually with a "set top box" computer coupled to a digital television.
The name "set top box" is somewhat of a misnomer because the computer portion need not be physically located on top of the television set, and indeed is often positioned to the side of, below, or even within the housing of a television set. Moreover, set top boxes do not need to have a separate housing at all, and certainly do not need to have a boxy housing.
The more accurate term for a set-top box would be a "television controller". The key feature that distinguishes a television controller from a PC or other computer that can receive and display television images accessed via Internet is that a television controller cooperates with a television set rather than a dedicated computer monitor. The term Internet is used herein as a euphemism for any public package switched network.
One of the advantages of using a television controller is that the television screen can be used for both (a) viewing television programming and (b) operating standard computer applications. Thus, a user may choose to use the television controller and the television screen to "surf the Internet, operate a word processing or spreadsheet program, or place an Internet phone call. Interaction with many such applications is commonly handled with a keyboard, and several wireless keyboards are now available that facilitate just such operations.
One of the problems with using network enabled set top boxes, however, is that it provides access to a computer and one or more networks that are deemed to be improper or otherwise undesirable. For example, children or other users may have access to information deemed to be off- limits. A particular concern among many parents is that children will access material on web sites that cater especially to adults. Other worries are that children will use the Internet to make inappropriate purchases. With the advent of e-phones, another worry is that children will use the e- phones to talk to strangers, or to talk outside designated hours. There may even be a desire to restrict use of locally installed game or other software.
Thus, there is a continuing need to provide systems and methods that limit the access provided by a television controller.
Summary of the Invention
The present invention provides apparatus and methods in which a controller operates a television receiver and a display, where the controller includes a network interface, a remote control interface, and a security device reader.
The network interface preferably includes circuitry for accessing the Internet, or other public package switched network. Other contemplated communication devices include a cable signal descrambler, and a broadcast radio wave receiver.
Security device readers are those that read a security card, pin, or other carryable item, but readers are also contemplated that read such things as a finger print or other biometric. Excluded are keypads because they do not interact with an external item that contains the security information. Security cards and the like will usually contain electronic memory, and may also
contain a microprocessor. It is preferred that the security device reader is physically located in the television housing along with the remote control interface.
Software preferably cooperates with the security device reader to place a limitation on information in some manner. Thus, the software may limit a television station or web site that can be viewed through the display. An application may also be limited, and such limits may be especially useful with respect to games, phone calling, making purchases, and so forth. Limitations may preclude access altogether, or may manifest in some other manner such as imposing a usage fee, or a maximum time or dollar limit. Other contemplated limitations may involve access to a computer peripheral, such as a video camera or game console.
A remote control handset can communicate with the controller using a wireless connection.
Preferred handsets include at least a microphone, and more preferably a speaker. The microphone is preferably used in conjunction with software to recognize voice commands, and especially voice intonations of the sequencing designations associated with the icons. The handset can also be used as a telephone to make calls through HPNA or other electronics employed by the controller.
Various objects, features, aspects, and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.
Brief Description of the Drawings
Figure 1 is a block diagram of an interactive television system according to the present invention.
Figure 2 is a block diagram of a controller and interactive television system elements coupled to the controller according to the present invention.
Detailed Description
In Figure 1 an interactive television system 10 generally includes a controller 20, a television 80, and a remote control handset 40. The controller 20 communicates with a plurality of built-in or peripheral devices, optionally including a security device reader 50, a digital camera 82,
a phone 84, a video recorder 86, a DVD player 88, and household appliances 90. The double- ended arrows, not numbered, depict communication pathways. Television system 10 receives signals from Internet service providers 60, and television program providers 70. The television screen (i.e. display) 30 preferably includes a high definition screen having a dot pitch of no more than 0.25 Mm. Sequentially designated icons 32 are displayed on the display 30 of the television screen for operation of the various peripheral devices, web browsing, television access, and other functions. For simplicity of description, sequentially designated icons are referred from time to time herein simply as sequenced icons. In this particular instance, numerals 34 are utilized to sequentially designate the sequenced icons 32.
Security card 50 can take many different shapes or forms, but would preferably meet the
International Organization for Standardization (ISO) 7810 standard for smart card size, and the ISO 7816 standard for the smart card physical characteristics of the plastic, including the temperature range and flexibility, position of the electrical contacts and how the microchip communicates with the outside world. Security card 50 would preferably include a microprocessor 52 and a memory 54, but may alternatively include only a microprocessor 52 or only a memory 54. It is further contemplated that the security card 50 may not even be a card, but instead be some other type of device that can be read by the security device reader 55 (see Figure 2).
In Figure 2 the controller 20 generally comprises a memory 100, a microprocessor 110, a security device reader 55, and various interfaces. The interfaces depicted are a television interface 120, a modem 130, a remote control interface 45, a network interface 65, television signal receiver 75, peripheral device control 91, audio transmitter 93, and an audio receiver 95. Each of these components by itself is well known in the electronic industry, with the exception of the programming of the microprocessor in accordance with the functionality set forth herein.
The various components of controller 20 may be co-located in a single housing (not shown). The controller housing may or may not be physically coupled to the television set 80 housing. Alternatively, one or more of the various components of controller 20 may be disposed in the television set 80 housing.
Controller 20 is an example of a "set-top box", and may be used to access the Internet or other network through the network interface 65 or a telephone modem 130. Alternatively, network access can be made through a cable television line, satellite dish, or any other suitable equipment.
Security device reader 55 is intended to receive the security card 50, or some other physical source of information. Other contemplated information sources include anatomical objects such as fingers, from which the security device reader could obtain a fingerprint or other biometric. To simplify the language used herein, the term security card is used as a euphemism where applicable to mean any physical information source that cooperates with the security device reader to provide access limitations.
Security device reader 55 may have any suitable location with respect to other elements of the controller, and the security device reader may itself by an add-on peripheral device, coupled to the controller through an RS-232 or other communications port. Security device reader 55 is still considered herein to be part of the controller 20 even if it is only coupled through a communications port.
Most likely security device reader 55 will have a slot to receive security card 50, although the slot could be replaced or supplemented by a sensor pad or other information receiving element. Positioning of the slot or other information receiving component is not especially critical, as long as it can be reasonably accessed. When security card 50 is inserted into the security device reader 55 slot, the card makes contact with electrical connectors that transfer data to and from the card's microprocessor 52 and memory 54. Alternatively, the security card 50 may communicate with the microprocessor 52 in a contactless manner, perhaps using an antenna to transfer data.
The information stored in security card 50 is used by software to enforce limitations on electronic devices, processes, programs, or commands. The software can be installed in the controller 20, in the card 50, or some combination of the two. There would likely be multiple cards for the different family members, or in the case of a business, multiple cards for the different employees.
Typically, insertion of a particular card into the security device reader 55 triggers downloading of limitations applicable to the holder of that particular card. To thwart counterfeiting
of cards, or passing around of cards in an unauthorized manner, it is also contemplated that security cards may be configured to operate in conjunction with only one controller 20. Security cards can also be used in conjunction with additional security features, including the entering of a PIN number, authentication of the user by fingerprint analysis or other security measures.
The information stored in the security card 50 could be entered at any appropriate time. It is possible for security cards to be made non-alterable, and it may be cost effective to broadly market cards having standard sets of limitations. That way parents could purchase different cards for girls or boys, for tweens, junior high schoolers, high schoolers, and so forth. Most likely, however, the information on the cards can be updated using the security device reader 55 to modify the cards.
Limitations can be stored in an exclusive or inclusive format. Thus, one card may list exclusions on access (exclusive format), and another card may exclude all access except that expressly listed (inclusive format). Limitations can be included in any practicable combination.
Limitations can be directed to virtually anything included in, or accessed by, the system 10. Some limitations, for example, may be directed to television stations that can be viewed through the display 30. Other limitations may be directed to particular web sites, or more globally to web sites that contain certain types of content. Limitations can even be directed to entire networks and subnets such VPNs. Still other limitations may be directed to availability of user applications, such as a videophone program, or office programs such as word processing and spreadsheets. Still other limitations may be directed to peripherals such as joysticks or electronic a game controller, or a camera. It is especially contemplated that limitations can be directed to information stored in a hard disk or other medium of the controller 20. Such limitations can advantageously be used to prevent all access to some or all of a hard disk, or other memory storage, during times when no security card is being used. That would provide a relatively high barrier to attack on the controller 20 through a network connection, even if the connection were permanent.
Limitations can also be viewed from time or other perspectives. For example, limitations can be temporal, precluding (or allowing) access only certain times of the day, or only on certain days. Thus, a child could be precluded from watching television or surfing the Internet after 9:00 pm. Limitations can also be financial. For example, a user could be precluded from making on-line
purchases of more than a given amount, or that total more than a given amount in a particular time period.
In an exemplary configuration, a teenager comes home from school at 3:00 pm and wants to play an electronic game 90. He inserts his personal security card 50 into the security device reader 55, and the reader accesses his access-control limitations stored on the card. That information 50 allows access to the electronic game 90 only between the hours of 7:00 pm to 11 :00 pm, and the the controller 20 enforces that restriction. Therefore, the teenager will not be able to play the electronic game 90 at 3:00 pm. At 10:00 pm the teenager observes there is a program on HBO that he would like to watch, and tries to access the corresponding channel using the remote control handset 40. However, the information on the security card 50 includes a restriction that prevents access to the HBO station. The teenager cannot watch that program. At 11 :00 the teenager goes to bed, and removes his card from the security device reader 55. Early in the morning a hacker tries to gain entry into the hard drive of the controller 20, but is prevented from even accessing the controller 20 because there is no security card in the reader.
With respect to financial transactions, a consumer completes a financial transaction using the security card 50, either separately or in combination with a credit card. To that end, the security device reader 55 reads limitation information from the security card 50, and enforces that limitation on an electronic transaction. Optionally, the reader may read other information as well, including a credit card number, name, expiration date, and so forth. A preferred type of limitation is imposition of a usage fee for executing the transaction, over and above any fees that may be charged by the vendor, shipper, or credit card company. The usage fee may be calculated as a function of the monetary amount or alternatively it may be a set fee that is independent of the monetary amount. The usage fee would like be very modest, perhaps a few cents per transaction, but may be more. The usage fee could be added to the credit card amount, or perhaps charged through to a phone number, or a cable, Internet, or other access account. Other contemplated limitations are limitations on the amount of a single financial transaction by a card user, the total amount of financial transactions that can be made against a given credit card, total amount of financial transactions for a given day, week, etc. In a specific example, a teenager may try to purchase some videos from a Web Site for $500. The transaction is prevented by a limitation as to dollar
amount of purchase. He then reduces the order to $100, and the sale goes through with a $.05 usage fee.
Remote control handset 40 is preferably used to access the devices, programs, processes, and commands of system 10. A preferred handset is a cross between a telephone handset and a television handset. In the manner of a telephone handset, there is a speaker 200 near the upper end, a microphone 290 near the lower end, and in between various telephone control keys (not shown): call/talk button, a send button, a redial button, a mute button, and a numeric/alphabetic keypad. In the manner of a television handset, there are function selectors (not shown): TV button, TV/STB (set top box) selector button, STB button, channel and volume controls, and AM/FM radio button. Since the television set 80 is to be used as a computer monitor for Internet access and other computer type functions, handset 40 may also advantageously include buttons (not shown) for main menu, print, and surf. A trackball (not shown) or other cursor control device can also be included that cooperates with a "left-click" or select button (not shown), and a "right click" button (not shown)for cursor control.
Remote control handset 40 can be used in many different ways to access the icons 32, or perhaps more strictly speaking can be used to access the functions or devices designated by the icons 32. One can, of course, us the trackball 240 to move a cursor around the display, and then access a particular icon by clicking on or near the icon using the select button.
Where icons 32 are sequenced, it is preferred that a particular icon 32 is selected via its corresponding sequencing designation (not shown). This can be done in numerous ways, one of which is to press on a numeric or other key carried by the handset. Thus, to access a sequenced icon 32 having the numeral 11 as its corresponding sequencing designation, one could press the numeral 1 key twice in relatively rapid succession. Icons 32 having letters as their corresponding sequencing designations could be accessed using letter keys, which may be laid out for example, in the manner of the letter keys on a cellular telephone. Thus, a key for the numeral 2 may also suffice for the letters A, B, and C, with the user pressing the key twice in rapid succession to obtain the letter B, and three times to obtain the letter C.
Access can also be accomplished by voice. Instead of manually depressing a number on the remote control handset 40, an individual could access a particular sequenced icon 32 by speaking a number, letter, color, or other word or phrase corresponding to one of the sequencing designations. Voice recognition software could be installed in the remote control handset 40, the controller 20, or some combination of the two. Since a single household may well have users that speak different languages, the voice recognition software preferably contains sample voice patterns in at least ten different languages, at the very least for each of the numerals zero through nine. However, the voice recognition software may contain sample voice patterns for less than or more than ten different languages. More preferred is that the voice recognition software contains at least 100 sample voice patterns for each of the ten different languages for each of the numerals zero through nine, requiring at least 10,000 total sample voice patterns. Even more preferred software recognizes at least 25,000 total sample voice patterns, and still more preferred software recognizes at least 50,000 total sample voice patterns.
It is further contemplated that the voice command does not have to be received by the microphone 290 disposed in the remote control handset 40. The voice command may be received directly by a microphone in the controller 20, or elsewhere.
Historically, a typical universal remote control handset has electronics that wirelessly couples the remote control handset to a television controller to control the television, video recorder and other devices that are connected to the television set. In embodiments disclosed herein, the remote control handset 40 has similar electronics to a universal remote control handset for the control of the television, video recorder and other devices that are connected to the television set. Additionally, the remote control handset 40 selects icons 32 by selecting a sequencing designation overlaid on the icon 32 that represents various processes, programs or commands involving elements that are a part of an interactive television system 10. It is further contemplated that the remote control handset 40 will, in cooperation with the controller 20, be used to conduct telephone calls through a conventional telephone, videophone, e-phone or other type of phone.
In preferred embodiments, the remote control handset 40 is wirelessly coupled to the controller 20, and cooperates with the controller 20 to conduct telephone calls over the Internet. This is accomplished through the network interface 65, with the controller 20 running any necessary
e-phone software. Appropriate home phone line networking alliance (HPNA) or other electronics is included in, or coupled to, the controller 20 as needed.
Thus, specific embodiments and applications of a television controller with a security device reader have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claim.