Presence-based content control
First Claim
1. A method implemented by a computing device, comprising:
- supplying feedback to an application, the feedback regarding a recognized presence of one or more users in relation to the computing device, the feedback including content restrictions associated with a recognized user who is not logged in via the computing device during a presentation of content authorized for an account that is logged-in via the computing device;
initiating a transition from an account-based content control to a presence-based content control that correlates with the content restrictions of the presentation of the content; and
restoring the presentation of the content to a previous state without the content restrictions based on the recognized user who is not authorized to view the presentation of the content no longer being detected as a presence in relation to the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users'"'"' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
-
Citations
20 Claims
-
1. A method implemented by a computing device, comprising:
-
supplying feedback to an application, the feedback regarding a recognized presence of one or more users in relation to the computing device, the feedback including content restrictions associated with a recognized user who is not logged in via the computing device during a presentation of content authorized for an account that is logged-in via the computing device; initiating a transition from an account-based content control to a presence-based content control that correlates with the content restrictions of the presentation of the content; and restoring the presentation of the content to a previous state without the content restrictions based on the recognized user who is not authorized to view the presentation of the content no longer being detected as a presence in relation to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented by a computing device, comprising:
-
recognizing a presence of a user in relation to the computing device who is not logged-in via the computing device during a presentation of content authorized for an account that is logged-in via the computing device; detecting that the recognized user who is not authorized to view the presentation of the content is no longer present; and responsive to the detecting, restoring the presentation of the content to a previous state without content restrictions. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computing device, comprising:
-
a processing system operable to implement an access manager configured to; obtain content permissions for each of two or more users who have a recognized presence with respect to the presentation of content for display; initiate a transition from an account-based content control to a presence based content control; and control the presentation of the content using the presence-based content control in accordance with the content permissions obtained for each of the two or more users independent of which of the two or more users are currently logged in via the computing device and independent of user-input from the two or more users. - View Dependent Claims (17, 18, 19, 20)
-
Specification