ACCESS TRACKING AND RESTRICTION
First Claim
1. On a computing device, a method of enforcing access restriction information for a content item, the method comprising:
- monitoring a use environment with an environmental sensor;
determining an identity of a first person in the use environment via sensor data from the environmental sensor;
receiving a request for presentation of a content item for which the first person has authorized access and presenting the content item in response;
detecting entry of a second person into the use environment and identifying the second person via the sensor data;
determining based upon the identity and upon the access restriction information that the second person does not have authorized access to the content item; and
modifying presentation of the content item based upon determining that the second person does not have authorized access to the content item.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are disclosed that relate to monitoring and controlling access based upon data from an environmental sensor. For example, one embodiment provides a method including monitoring a use environment with an environmental sensor, determining an identity of a first person in the use environment via sensor data from the environmental sensor, receiving a request for presentation of a content item for which the first person has authorized access, and presenting the content item in response. The method further comprises detecting entry of a second person into the use environment, identifying the second person via the sensor data, determining based upon the identity and upon the access restriction that the second person does not have authorized access to the content item, and modifying presentation of the content item based upon determining that the second person does not have authorized access to the environment.
21 Citations
20 Claims
-
1. On a computing device, a method of enforcing access restriction information for a content item, the method comprising:
-
monitoring a use environment with an environmental sensor; determining an identity of a first person in the use environment via sensor data from the environmental sensor; receiving a request for presentation of a content item for which the first person has authorized access and presenting the content item in response; detecting entry of a second person into the use environment and identifying the second person via the sensor data; determining based upon the identity and upon the access restriction information that the second person does not have authorized access to the content item; and modifying presentation of the content item based upon determining that the second person does not have authorized access to the content item. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing system, comprising:
-
a logic machine; and a storage machine comprising instructions that are executable by the logic machine to receive sensor data from an environmental sensor; present a computer graphics presentation using a first set of graphical content based upon an identity of a first person in the use environment as determined from the sensor data; detect entry of a second person into the use environment and identify the second person via the sensor data; and change the computer graphics presentation to use a second, different set of graphical content based upon an identity of the second person. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. On a computing device, a method of obtaining information regarding interactions of people with objects, the method comprising:
-
monitoring a use environment with an environmental sensor; determining an identity of a first person in the use environment via sensor data from the environmental sensor; detecting an interaction of the first person with an object in the use environment; recording information regarding the interaction of the first person with the object; determining an identity of a second person in the use environment via sensor data from the environmental sensor; detecting an interaction of the second person with the object in the use environment; recording information regarding the interaction of the second person with the object in the use environment; receiving a request for presentation of information regarding recorded interactions with the object; and presenting the information regarding the interaction of the first person with the object and the interaction of a second person with the object. - View Dependent Claims (17, 18, 19, 20)
-
Specification