Systems and Methods For Detecting Improper Use of Telecommunications Reception Device
First Claim
1. A method of detecting and verifying improper use of a telecommunications reception device comprising:
- interrupting a user'"'"'s use of or access to a media content received through a telecommunications receptive device;
informing the user or providing information to a third party to inform the user that the interruption can be eliminated after the user verifies his or her information;
detecting the user'"'"'s location by determining the IP address, triangulation, GPS location or geotag of the electronic device when or after the user verifies his or her information;
comparing the location of the user with location of where the telecommunications reception device is authorized to be used; and
determining whether the telecommunications reception device is being used within an authorized location or that the telecommunications reception device is authorized or authentic.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods of detecting and verifying the unauthorized use of media content using a telecommunication reception device which, in one embodiment, comprises interrupting a user'"'"'s use of or access to media content; informing the user that the interruption can be eliminated after the user verifies his or her information through an electronic device; detecting the user'"'"'s location based on the user'"'"'s use of the electronic device; verifying whether user'"'"'s location is within area where the use of the media content is permitted; verifying whether the user is authorized by the content owner to receive the media content and allowing the user to resume the use of media content once the user passes the verification.
-
Citations
20 Claims
-
1. A method of detecting and verifying improper use of a telecommunications reception device comprising:
-
interrupting a user'"'"'s use of or access to a media content received through a telecommunications receptive device; informing the user or providing information to a third party to inform the user that the interruption can be eliminated after the user verifies his or her information; detecting the user'"'"'s location by determining the IP address, triangulation, GPS location or geotag of the electronic device when or after the user verifies his or her information; comparing the location of the user with location of where the telecommunications reception device is authorized to be used; and determining whether the telecommunications reception device is being used within an authorized location or that the telecommunications reception device is authorized or authentic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of detecting and verifying improper use of a telecommunications reception device comprising:
-
interrupting a user'"'"'s use of or access to a media content, wherein the user accesses the media content through a telecommunications receptive device; displaying a message on the media content that the interruption can be eliminated after the user verifies his or her information at a given website or through text message; detecting the user'"'"'s location by IP address, triangulation, GPS location or geotag when or after the user accesses the given website or sends the text message; comparing the location of the user with location of where the telecommunications reception device is authorized to use; determining whether the telecommunications reception device is being used within an authorized location or that the telecommunications reception device is authorized and authentic; verifying whether the information provided by the user is authentic; and informing the user that the user can resume the use of media content if it is determined that the telecommunications reception device is being used within an authorized location and the information provided by the user is authentic. - View Dependent Claims (12, 13, 14)
-
-
15. A system for detecting and verifying use of telecommunication reception d device comprising:
-
a database which stores information about a user; a computer or processor that sends a signal which interrupts the user'"'"'s use of or access to media content and informs the user that the interruption can be eliminated after the user verified his or her information; a computer or processor which receives information from the user; and a computer or processor that determines the user'"'"'s location and compares the location information obtained with the information provided by the user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification