MOBILE UNIT PARENTAL CONTROL
First Claim
1. A method for managing content viewing upon a mobile device, comprising:
- comparing a rating of content against a threshold retained upon secure storage; and
formulating if the content can be viewed based upon a result of the comparison between the content rating and the retained threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Parents can desire to limit content viewable upon a mobile device and a universal integrated circuit card can be programmed to limit viewing upon the mobile device. A user completes a service request form that includes an allowable view threshold for content upon the mobile device. The request can transfer to a service provider, sometimes via a base station. A subscription manager can forward the threshold back to the mobile device and the mobile device can program the threshold upon secure storage. When content is received, it can be compared against the threshold and a determination can be made on if the content is allowable to view in light of the threshold.
-
Citations
60 Claims
-
1. A method for managing content viewing upon a mobile device, comprising:
-
comparing a rating of content against a threshold retained upon secure storage; and formulating if the content can be viewed based upon a result of the comparison between the content rating and the retained threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus that operates in a wireless communication system, the apparatus comprising:
-
at least one processor configured to compare a rating of content against a threshold retained upon secure storage and formulate if the content can be viewed based upon a result of the comparison between the content rating and the retained threshold; and a memory coupled to the at least one processor. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A wireless communications apparatus that facilitates viewing remote content on a mobile device, comprising:
-
means for comparing a rating of content against a threshold retained upon secure storage; and means for formulating if the content can be viewed based upon a result of the comparison between the content rating and the retained threshold. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer program product, comprising:
a computer-readable medium comprising; code for comparing a rating of content against a threshold retained upon secure storage; and code for formulating if the content can be viewed based upon a result of the comparison between the content rating and the retained threshold. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
41. A method that facilitates programming upon secure storage a threshold to regulate content viewing, comprising:
-
reading the threshold from communication provided by an auxiliary entity; and generating a command set for the secure storage to implement the read threshold, the generated command set is used to program the threshold upon the secure storage. - View Dependent Claims (42, 43, 44, 45)
-
-
46. An apparatus that operates in a wireless communication system, the apparatus comprising:
-
at least one processor configured to read a threshold from communication provided by an auxiliary entity, and a generate a command set for secure storage to implement the read threshold, the generated command set is used to program the threshold upon the secure storage; and a memory coupled to the at least one processor. - View Dependent Claims (47, 48, 49, 50)
-
-
51. A wireless communications apparatus that facilitates programming upon secure storage a threshold to regulate content viewing, comprising:
-
means for reading the threshold from communication provided by an auxiliary entity; and means for generating a command set for the secure storage to implement the read threshold, the generated command set is used to program the threshold upon the secure storage. - View Dependent Claims (52, 53, 54, 55)
-
-
56. A computer program product, comprising:
a computer-readable medium comprising; code for reading the threshold from communication provided by an auxiliary entity; and code for generating a command set for the secure storage to implement the read threshold, the generated command set is used to program the threshold upon the secure storage. - View Dependent Claims (57, 58, 59, 60)
Specification