Presence-Based Content Control
First Claim
1. A method implemented by a computing device comprising:
- registering at least one application, registered applications being configured to receive feedback regarding presence of users in relation to the computing device;
recognizing a presence of one or more users in relation to the computing device independently of authentication of the users to access user accounts associated with the computing device; and
supplying feedback indicative of the one or more users that are recognized to the at least one registered application.
3 Assignments
0 Petitions
Accused Products
Abstract
Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users'"'"' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
60 Citations
20 Claims
-
1. A method implemented by a computing device comprising:
-
registering at least one application, registered applications being configured to receive feedback regarding presence of users in relation to the computing device; recognizing a presence of one or more users in relation to the computing device independently of authentication of the users to access user accounts associated with the computing device; and supplying feedback indicative of the one or more users that are recognized to the at least one registered application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented by a computing device comprising:
-
recognizing a presence of a user in relation to the computing device who is not logged-in via the computing device during a presentation of content authorized for an account that is logged-in via the computing device; ascertaining content restrictions associated with the recognized user; and performing one or more operations to control the presentation of content responsive to ascertaining and in accordance with the content restrictions associated with the recognized user. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computing device comprising:
-
a display device; a processing system operable to render a presentation of content for display via the display device; an access manager configured to; recognize a presence of multiple users in relation to the computing device; obtain content permissions for each of the multiple users that are recognized with respect to the presentation of content; and control the presentation of content in accordance with the content permissions obtained for each of the multiple users independent of which of the multiple users currently is logged in via the computing device. - View Dependent Claims (18, 19, 20)
-
Specification