Detecting a person who does not satisfy a threshold age within a predetermined area

ABSTRACT

A system is provided that during a presentation of digital media content on a media presentation device automatically determines that a person within a predetermined area does not satisfy a threshold age. Based on the determination, the system applies one or more content rules to the presentation of the digital media content on the media presentation device. The content rules cause an alteration of the presentation of the digital media content. The system can also scan the digital media content of a content data store and estimate an age threshold value of the files of the digital media content. Based on the estimated age threshold value of the files, the system can determine that the device is used by a person who does not satisfy a threshold age and applies one or more content rules to a presentation of the digital media content.

BACKGROUND

An increasing amount of digital media content is available to userselectronically. While the available digital media content may beacceptable to adults, in many instances, some content is not appropriatefor children or adolescents due to language, violence, dialogue, druguse, indecency, etc. In some circumstances, an adult may be willing towatch or listen to age inappropriate content so long as children are notnearby. For example, parents of a child may be willing to watch a PG-13or R-rated movie after their child has gone to bed or so long as theirchild is not in the room.

However, despite an adult's desire to keep a child out of a room whilewatching a movie or listening to an audio book, it can be difficult todetermine whether a child is nearby and whether the digital mediacontent that is being presented should be edited. For example, an adultmay repeatedly, and unsuccessfully, scan a room or look at the entranceto a room to ensure a child is not present. In addition, when the adultis not present the child can access the movie or audio book with ageinappropriate content.

Furthermore, with the ubiquity of electronic devices, many children useelectronic devices, such as smart phones, tablets, laptops, etc. In manyinstances, with the consent of an adult, the child may be allowed todownload content that is age appropriate, such as songs, learning tools,games, movies, etc. However, in some circumstances, a child mayinadvertently download or access digital media content with ageinappropriate content that is stored in the electronic device, found ina digital media store, or accessed via a network. For example, in someinstances, the digital media content may simply be mislabeled.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a digital media content monitoringenvironment.

FIGS. 2A and 2B are diagrams illustrative of an embodiment of thedigital media content monitoring environment where a content monitoringdevice detects a person within a predetermined area who does not satisfya threshold age by detecting an electronic device associated with theperson within the predetermined area.

FIGS. 2C-2E are diagrams illustrative of embodiments of the digitalmedia content monitoring environment where a content monitoring devicedetects a person within a predetermined area who does not satisfy athreshold age based on physical characteristics of the person.

FIG. 3 is a flow diagram of an illustrative routine implemented by acontent monitoring device for determining that a person who does notsatisfy a threshold age is within a predetermined area.

FIG. 4 is a flow diagram of an illustrative routine implemented by acontent monitoring device for identifying a device that is associatedwith a person who does not satisfy a threshold age.

DETAILED DESCRIPTION

Generally described, aspects of the present disclosure relate toactivating one or more content rules based on the presence of a personwho does not satisfy a threshold age. More specifically, a device isdescribed that can detect the presence of a child or a person who doesnot satisfy a threshold age within a predetermined area (e.g., home,television room, etc.) of a media presentation device (e.g., networkenabled television, smart phone, tablet, laptop, desktop, projector,digital media receiver, digital media recorder, audio book reader,digital media player, screen, speakers, etc.). Once the child or personwho does not satisfy a threshold age is detected within thepredetermined area, one or more content rules can be applied to thepresentation of the digital media content being presented on the mediapresentation device so as to protect the child from consuming ageinappropriate content.

As a non-limiting example of the present disclosure, Parent1 beginswatching a movie with age inappropriate content for children on anetwork enabled television (TV) in a TV room. The movie can be streamedor downloaded from a remote data store accessible via a network, such asthe Internet, or accessed from a local content data store, such as aDVD, Blu-ray disc, solid-state drive, hard-drive, etc. As the movieplays, a content monitoring device in communication with the contentdata store and the TV monitors for the presence of a child. The contentmonitoring device can use a variety of methods to detect the child, suchas scanning physical characteristics of a person(s) detected within theTV room, or detecting the presence of an electronic device (e.g., phone,tablet, laptop, GPS device, RFID, etc.) associated with a person.

To detect a child by scanning physical characteristics, the contentmonitoring device can perform a voice, facial, or body scan of a persondetected in the room. Based on the scan performed, the contentmonitoring device can analyze the data collected to determine whetherthe scanned person is a child. If a voice scan is performed, the contentmonitoring device can perform a voice analysis on the voice scan data todetermine whether the voice belongs to a child. Similarly, for a facialscan, the content monitoring device can perform a facial analysis on thefacial scan data to determine whether the face scanned is likely that ofa child. As part of the body scan, the content monitoring device canestimate the height and/or body mass of the person to determine whetherthe person detected in the room is likely a child.

As mentioned, in one embodiment, the content monitoring device candetect the presence of a child by detecting an electronic deviceassociated with the child. In some embodiments, the content monitoringdevice can detect the presence of the electronic device associated witha child by identifying the location of the electronic device andcomparing the location of the electronic device with the location of theTV, the predetermined area, and/or content monitoring device. In certaininstances, the content monitoring device can detect a child bycommunicating with the child's electronic device or by determining thatthe child's electronic device is connected to a particular network, suchas a local Wi-Fi network, local area network (LAN), personal areanetwork (PAN), etc.

With continued reference to the example given above, Child1 carrying hisor her smart phone enters the TV room while Parent1 is watching themovie. As mentioned, the content monitoring device can detect thepresence of Child1 based on the physical characteristics of Child1 or bydetecting Child1's smart phone. Once the content monitoring devicedetects the presence of Child1, the content monitoring device can applyone or more content rules to the presentation of the movie on the mediapresentation device, which can alter the presentation of the movie.Continuing with the example given, once Child1 leaves the TV room, thecontent monitoring device can detect that Child1 has left and ceaseapplying the content rules. Accordingly, normal presentation of thedigital media content can resume.

The one or more content rules can alter the presentation of the movie ina variety of ways. For example, the one or more rules can stop orinterrupt the movie. Once stopped, the content monitoring device canrequest an authentication, such as a password, before continuing themovie. In another example, the content monitoring device can also alterthe movie. For instance, based on the content rules, the contentmonitoring device can distort the movie, such as by whiting it out orblacking it out, making the movie fuzzy, or otherwise unintelligible.Furthermore, the content monitoring device can cause a mediapresentation device, such as a network enabled TV, to skip parts of themovie that have been identified as containing age inappropriate content.In some instances, the content monitoring device can mute the movieeither completely or mute the portions of the movie identified as havingage inappropriate content. In certain other instances, the contentmonitoring device can replace what is displayed on the network enabledTV with alternate content, such as a landscape drawing, or otheralternate content. In yet other instances, the content monitoring devicecauses the network enabled TV to display a message indicating that achild is in the TV room.

In addition, Parent1 can setup multiple predetermined areas that usedifferent rules. For example, the TV room may be considered Area 1 andthe house may be considered Area 2. The content rules for Area 2 can bedifferent than the content rules of Area 1. For example, when thecontent monitoring device detects that Child1 has entered the home, thecontent monitoring device can cause the media presentation device todisplay a message indicating that Child1 is in the home. When thecontent monitoring device detects that Child1 has entered the TV room,the content monitoring device can stop the movie or begin altering theage inappropriate content in the movie, as desired.

In another embodiment, the content monitoring device can be used todetermine whether a child is the primary user of the media presentationdevice (e.g., in the case of a smart phone or tablet), or whether themedia presentation device is associated with a child. To identifywhether a child is the primary user of the media presentation device orthe media presentation device is associated with a child, the contentmonitoring device can determine whether the media presentation device isregistered as belonging to or being associated with a child and/or thecontent monitoring device can analyze the digital media content storedor accessed by the media presentation device.

As part of the registration, a media presentation device can bedesignated as a child device, adolescent device, adult device, etc. Oneor more different content rules can be applied to the media presentationdevice based on the association. For example, if the media presentationdevice is associated with an adult, no content rules need be applied. Ifthe media presentation device is associated with a child or adolescentvarying levels of content rules can be applied as desired.

In one embodiment, the content monitoring device scans the files of thedigital media content locally stored by the media presentation device toanalyze the digital media content of stored or accessed by the mediapresentation device. During the scan, the content monitoring device canestimate an age threshold value (or age range) for each of the digitalmedia content files. The estimated age threshold value of each file canbe determined based at least in part on genre, language of the content,lyrics, words, rating for content (e.g., G, PG, etc. for movies, “T” forteen, “E” for everyone for video games, etc.), information associatedwith an account or profile belonging to the user of the file (e.g., ageor other demographic information, credit card information, sub-accountinformation, social network information, etc.). In some embodiments, theestimated age of the user of the media presentation devices is thendetermined as a function (e.g., average, median, etc.) of the estimatedage threshold values of each file analyzed. Although described in termsof a media presentation device, it will be understood that the contentmonitoring device can similarly determine an estimated age of anelectronic device.

As a practical example of the above, the content monitoring device canscan digital media content files locally stored in a media presentationdevice used by Child1. During the scan, the content monitoring deviceencounters various songs for 5-10 year olds, games for 6-12 year oldsand multiplication and spelling learning tools for 4^(th)-6^(th)graders. As the content monitoring device encounters the differentsongs, games, and learning tools, the content monitoring device canestimate an age threshold value for each of the different songs, gamesand learning tools. In this example, the age threshold value estimatedfor each of the songs is 5-10 years old, the age threshold valueestimated for each of the games is 6-12 years old, and the age thresholdvalue estimated for each of the learning tools is 10-12 years old. Basedon the age threshold value estimates of the various files, the contentmonitoring device can estimate the age of the user of the electronicdevice (Child1) to be between 10 and 12 years old and associate theelectronic device with a child. Accordingly, one or more content rulescan then be applied to the content presented the media presentationdevice, which rule(s) can alter the presentation of content on thedevice when used by the child.

FIG. 1 is a block diagram depicting an illustrative embodiment of adigital media content monitoring environment 100 in which a contentmonitoring device 102 detects a person within a predetermined area of amedia presentation device 106 who does not satisfy a threshold age. Upondetecting the presence of a person who does not satisfy a threshold age,the content monitoring device 102 applies one or more content rules tothe presentation of the digital media content, which rules may alter thepresentation of the digital media content on the media presentationdevice 106 so as to make it more difficult for the detected person toconsume age inappropriate content.

The predetermined area can be based on the distance between the mediapresentation device 106 or the content monitoring device 102 and theperson or the electronic device 108 associated with the person, or anycombination thereof. In some embodiments, the predetermined area can bea room within a house or building, the house or building itself, someother geographic area, or a network, such as, a Wi-Fi network, LAN, orPAN, etc.

In some embodiments, the predetermined area can be based on the mannerin which the detection component 114 detects a person. For example, ifthe detection component 114 detects the presence of one more personsusing the cameras 116 or 3-D depth sensors 120, the predetermined areacan be the range of the cameras 116 or 3-D depth scanners 120, or somepredefined subset. Similarly, if the detection component 114 detects thepresence of one more persons using the microphones 118, thepredetermined area can be the range of the microphones or some subset ofthe range.

Furthermore, if the detection component 114 detects the presence of aperson based on the detection of an electronic device 108 associatedwith the person, the predetermined area can be based on the type oftechnology used to detect the electronic device 108. For example, if thedetection component 114 uses Bluetooth to communicate with and/or detectthe electronic device 108, the predetermined area can be the range of aPAN created using the Bluetooth devices, or some subset of the PAN.Similarly, if the detection component 114 uses a Wi-Fi to communicatewith and/or detect the electronic device 108, the predetermined area canbe the range of the Wi-Fi network, or some subset of the Wi-Fi network.Further, if the electronic device 108 is a GPS device, the predeterminedarea can be based on a predefined distance between the GPS and thecontent monitoring device 102 and/or the media presentation 106 device.If the electronic device 108 is an RFID tag or similar device, thepredetermined area can be based on distance at which the contentmonitoring device 108 is able to communicate with and/or read data fromthe RFID tag.

In the illustrated embodiment, the content monitoring device 102 appliesthe content rules to digital media content obtained or accessed from acontent data store 104, which may be local or remote to the contentmonitoring device 102. The content monitoring device 102 may then alterthe digital media content in accordance with the rule(s) and provide thealtered content to the media presentation device 106. In otherembodiments, the content monitoring device may provide the rule(s) tothe media presentation device 106, which, in turn, applies the rule(s)and alters the content for presentation. In the illustrated embodiment,the content monitoring device 102 is also in communication with one ormore electronic devices 108 that may belong to persons who also utilizethe media presentation device 106. As will be described in more detailbelow, the content monitoring device 102 may determine that a personwithin a predetermined area of the media presentation device 106 is achild based at least in part on detecting the presence of an electronicdevice 108 that is associated with a child. Those skilled in the artwill appreciate that an electronic device 108 may itself be or functionas a media presentation device.

In the illustrated embodiment, each of the content monitoring device102, the content data store 104, the media presentation device 106, andthe electronic device 108 are depicted as separate and distinct devices.For example, the content data store 104 may be remotely located andassociated with a content server or service that downloads or streamsdigital media content to media presentation devices, such as networkenabled TVs, smart phones, laptops, desktops, tablets, etc. In suchembodiments, the content monitoring device 102 and/or media presentationdevice 106 can communicate with the content data store 104 over anetwork or other communication link. The content monitoring device 102may communicate with the media presentation device 106 and/or electronicdevices 108 via a network or other communication link as well.Accordingly, the content monitoring device 102 may be remote from themedia presentation device 106 and/or electronic devices. Such networksmay include, but are not limited to, any wired network, wirelessnetwork, or combination thereof. In addition, such a network may be apersonal area network, local area network, wide area network, cablenetwork, satellite network, cellular telephone network, or combinationthereof. For example, the network may be a publicly accessible networkof linked networks, possibly operated by various distinct parties, suchas the Internet. In some embodiments, the network may be a private orsemi-private network, such as a corporate or university intranet. Othercommunication links may include, but are not limited to, Wi-Fi networks,WiMax networks, short wavelength radio transmissions, etc.

Although depicted in FIG. 1 as discrete devices, those skilled in theart will recognize that any one or more of the content monitoring device102, the content data store 104, the media presentation device 106, andthe electronic device 108 can be implemented as a single device or asseparate and distinct devices and/or that the operations or functions ofany one of these devices may be shared or distributed across one or moreof the other devices. In some embodiments, a single device embodies thefunctions and/or operations of the content monitoring device 102, thecontent data store 104, the media presentation device 106, and theelectronic device 108. For example, an electronic device 108, such as asmart phone or tablet, can include a content data store (e.g., localmemory), a content monitoring device, and a media presentation device(e.g., a display screen and/or speakers). It will be understood thatother combinations of the content monitoring device, the content datastore, the media presentation device, and the electronic device or theirrespective functions/operations can be implemented in a device. Forexample, the content data store 104 can be remote from a single devicethat includes the content monitoring device and the media presentationdevice, etc.

As noted above, the content data store 104 can be implemented as a localstorage device or remote storage device from the content monitoringdevice 102 and/or the media presentation device 106. For example, thecontent data store 104 can be maintained by a third party (such as astorage web service or a content delivery service) or maintained by onemore virtual machines implemented in a hosted computing environment. Thehosted computing environment may include one or more rapidly provisionedand released computing resources, which computing resources may includecomputing, networking and/or storage devices. A hosted computingenvironment may also be referred to as a cloud computing environment. Incertain embodiments, the content data store 104 can be a local storagedevice, such as a hard-drive of a computer, a DVD, a Blu-ray disc,solid-date drive, or other non-transitory computer-readable storagedevice or medium. The digital media content may be streamed ordownloaded to the media presentation device 106 for presentation. Forexample, the content data store 104 can store video, audio, audio/visualfiles, etc. Accordingly, as the digital media content is streamed fromthe content data store 104 and presented by the media presentationdevice 106, the content monitoring device 102 may detect that a personwho does not satisfy an age threshold is in the vicinity of the mediapresentation device 106 and apply the appropriate content rule(s).Accordingly, the content monitoring device 102 can alter (e.g.,interrupt, stop, modify, distort, etc.) the digital media content in itsentirety or in portions, such as those portions identified as containingage inappropriate content.

The media presentation device 106 can be implemented as one or moredevices that can present the digital media content to a person. Forexample, the media presentation device 106 can include, but is notlimited to, a television, disc player, audio book reader, digital mediaplayer, phone or smart phone, laptop, desktop, projector, tablet,screen, speakers, computer, etc. The electronic devices 108 can beimplemented as one or more devices that can communicate with, or containinformation that can be accessed by, the content monitoring device 102,such as, but not limited to, a cell phone, smart phone, laptop (or othercomputer), digital music player, tablet, GPS device, RFID tag, etc.

The content monitoring device 102 can include a computing device 110, acontent rules data store 112 and a detection component 114. Thecomputing device 110 may include a network interface, memory, processingunit, and computer-readable medium drive, all of which may communicatewith each other by way of a communication bus. The network interface mayprovide connectivity over a network to the content data store 104, themedia presentation device 106, and/or the electronic devices 108. Theprocessing unit may communicate to and from memory containing programinstructions that the processing unit executes in order to operate thecontent monitoring device 102. The memory may generally include RAM,ROM, and/or other persistent and auxiliary non-transitorycomputer-readable media.

The detection component 114 can detect the presence of one or morepersons within a predetermined area, and can include one or more cameras116, microphones 118, 3-D depth sensors 120, and/or network interfacedevices 122, such as a Bluetooth, Wi-Fi, cellular, or radio interfacedevice. The components of the detection component 114 can be used tocollect data regarding persons within the predetermined area. Forexample, the cameras 116 and/or 3-D depth sensors 120 can be used tocollect facial scan data and/or body scan data of persons within thepredetermined area. The microphones 118 can be used to collect voicescan data of persons within the predetermined area, and the networkinterface devices 122 can be used to detect the presence of electronicdevices 108 within the predetermined area.

The detection component 114 can use the one or more cameras 116, 3-Ddepth sensors 120, and digital signal processing techniques to detectthe face of a person within the predetermined area. Once detected, thedetection component 114 can collect facial scan data of the person. Thedetection component 114 can compare the facial scan data with facialdata of one or more persons that is stored within the content data store104, the content rules data store 112, or elsewhere. The stored facialdata can include indications as to the identity of the person. Forexample, pictures or other facial information can be included as part ofthe information associated with an account or profile of a user.

Using the stored facial data, the detection component 114 can match thefacial scan data with a person. If the facial scan data matches facialdata of a person who does not satisfy a threshold age, the detectioncomponent 114 can apply content rules from the content rules data store112 to the presentation of the digital media content. In someembodiments, the detection component 114 can perform a facial analysisof the facial scan data to determine whether characteristics of theanalyzed face more closely correspond to facial features of a child,adolescent, teenager, or adult. For example, the detection component 114can detect the size of the face, nose, ears, the presence of facialhair, etc., to determine the age of the person. Larger faces, noses,ears, and/or the presence of facial hair can be used to determine thatthe scanned person is an adult.

Similarly, the detection component 114 can use the one or more cameras116, 3-D depth sensors 120, and digital signal processing techniques toanalyze the size of a person within the predetermined area. Upondetecting the person, the detection component 114 can collect body scandata of the person, such as the height and size of the person using thecameras 116 and 3-D depth sensors 120. The detection component 114 cancompare the body scan data with body data of one or more persons that isstored within the content data store 104, the content rules data store112, or elsewhere. For example, height and weight information can beincluded as part of the information associated with an account orprofile of a user. The information associated with an account can alsoinclude information as to whether the person is an adult, child, etc.

The detection component 114 can compare the body scan data with thestored body data to determine whether the detected person satisfies athreshold age. In some embodiments, the detection component 114 cancompare the body scan data with generally known characteristics ofpeople to detect a person who does not satisfy a threshold age. Forexample, if the detection component 114 determines that the personscanned is less than five feet, the content monitoring device 102 canapply the content rules in the content rules data store 112 to thepresentation of the digital media content

In addition, the detection component 114 can use the one or moremicrophones 118 and digital signal processing techniques to detect thevoice of a person within the predetermined area. Upon detecting thevoice of a person, the detection component 114 can collect voice scandata of the person. The voice scan data can be compared with one or morevoice samples stored within the content data store 104, the contentrules data store 112, or elsewhere. The samples can be from differentusers of the media presentation device 106, such as adults and childrenthat use the media presentation device. Further, the voice samples canbe part of the information associated with an account or profilebelonging to the persons.

The detection component 114 can compare the stored voice samples withthe voice scan data. If the detection component 114 matches the voicescan data with a voice sample of a child, the content monitoring device102 can apply the content rules in the content rules data store 112 tothe presentation of the digital media content. In some embodiments, thedetection component 114 can perform a voice analysis of the voice scandata to determine whether characteristics of the voice more closelycorrespond to an adult's voice or a child's voice. For example, thedetection component 114 can analyze the pitch, frequency, and/or tone ofthe voice to determine whether the voice scan data is likely to be achild or an adult. In some instances, deeper voices can be used todetermine that the scanned person is an adult.

Similarly, the detection component 114 can collect and analyze hand scandata and/or foot scan data of a person. The detection component 114 cancollect the data using the camera 116 and/or via touch. For example, aperson can touch the screen of the media presentation device with theirhand. The detection component 114 can compare the hand scan data withstored samples of hand scans. If the detection component 114 matches thehand scan data with a sample from a child, the content monitoring device102 can apply the content rules in the content rules data store 112 tothe presentation of the digital media content. In some embodiments, thedetection component 114 can perform a hand analysis of the hand scandata to determine whether characteristics of the hand more closelycorrespond to an adult's hand or a child's hand. For example, thedetection component 114 can analyze the size of the hand and/or fingerlength to determine whether the hand scan data is likely to be from achild or an adult. The content monitoring device 102 can apply thecontent rules if the size of the hand and/or finger length does notsatisfy a hand size and/or finger size threshold. The detectioncomponent 114 can similarly analyze foot scan data or other physicalcharacteristics of a person to determine if the person satisfies athreshold age.

The detection component 114 can use the one or more network interfacesto detect an electronic device 108 in the predetermined area that isassociated with a person who does not satisfy the threshold age. Thenetwork interfaces can communicate with the electronic devices 108 usinga variety of communication standards, such as, but not limited to,Bluetooth, Wi-Fi, WiMax, RFID, short wavelength radio, mobiletelecommunication standards, etc. In some embodiments, the electronicdevices 108 can provide their location to the content monitoring device102. The content monitoring device 102 can compare the provided locationinformation with its own location information, the location of the mediapresentation device 106, and/or the predetermined area to determinewhether the electronic device 108 is within the predetermined area. Forexample the electronic device 108 can be a smart phone and/or GPS unitthat provides it location information to the detection component 114.

In some embodiments, the detection component 114 identifies theelectronic devices with which it can communicate or that are connectedto a particular network, such as a LAN, Wi-Fi network, and/or personalarea network (PAN). For example, when a person arrives home they oftenconnect their electronic device 108 with a home network in order toaccess the Internet, or other network, etc. Similarly, Bluetooth devicesthat are paired can connect when within range of each other, and RIFDtag readers can read RFID tags when the RFID tag comes within range ofthe RFID tag reader.

The detection component 114 can identify the electronic devices 108 thatconnect to the particular network, and determine whether the electronicdevices 108 are associated with a person who does not satisfy thethreshold age. Upon determining that an electronic device 108 isassociated with a person who does not satisfy the threshold age isconnected to the particular network, the content monitoring device 102can apply the content rules to the presentation of the digital mediacontent.

It will be understood that the detection component 114 can use any oneor a combination of the techniques described above, or other techniques,to determine that a person who does not satisfy a threshold age iswithin the predetermined area. In some embodiments, the detectioncomponent 114 can detect the electronic device 108 of a person when theelectronic device 108 enters the predetermined area. Following thedetection of the electronic device 108, the detection component 114 canperform a facial scan, voice scan, and/or body scan of the person toimprove the accuracy of the detection. For example, the detectioncomponent 114 may detect an electronic device 108 associated with achild, but following a facial, voice, or body scan determine that theperson within the predetermined area is an adult. Similarly, the contentmonitoring device 102 can be configured to account for variationsbetween adults, such as short adults, adults with higher-pitched voices,etc.

Furthermore, it will be understood that factors other than the actual orestimated age of a person can be used to determine whether the personsatisfies the threshold age. For example, in some embodiments, anadministrator can grant a particular child access to content consideredage inappropriate for children and deny an adult access to contentconsidered age appropriate for an adult. For example, an administratorcan indicate that a device used by Child1 can access content consideredage appropriate for adults and teens (but not age appropriate forchildren). Similarly, an administrator can indicate that when Child1'sfacial scan data, voice scan data or other data is detected, Child1 isto be given access to content considered age appropriate for teens andadults, as determined by the administrator. Similarly, an administratorcan limit an adult's access to content considered age appropriate for anadult. In certain embodiments, the detection component 114 can receivedata indicating that a particular person does not satisfy a thresholdage (regardless of the age of the actual person). For example, using auser interface, an administrator can identify a person that does notsatisfy a threshold age is within the predetermined area.

As mentioned, the detection component 114 can determine whether adevice, such as the electronic device 108 or the media presentationdevice 106 is associated with a person who does not satisfy a thresholdage or a person who does satisfy the threshold age. In some embodiments,the device can be registered with the content monitoring device 102. Aspart of the registration, the devices can be associated with an adult orchild. For example, a smart phone, tablet, GPS device, and/or an RFIDtag can be registered with the content monitoring device 102 and beassociated with a child. Accordingly, when the child enters thepredetermined area with the registered device, the detection component114 can determine that the device is associated with a child and applythe content rules.

In certain embodiments, to determine whether the user of a device is aperson who does not satisfy a threshold age, the detection component 114can scan a content data store 104 containing digital media content thatcorresponds to the device or a user. In some embodiments, the scan canoccur as part of the process of determining whether the contentmonitoring device 102 should apply the content rules to the presentationof the digital media content on the media presentation device or to apresentation on the electronic device 108.

As part of the scan, the detection component 114 can estimate an agethreshold value for each of the files of the digital media content. Insome embodiments, the age threshold value is a number or numericalrange. In certain embodiments, the estimated age threshold value is adescription, such as “child,” “youth,” “adolescent,” “teenager,” “youngadult,” and/or “adult.” Based on the estimated age threshold value ofthe various files, the detection component 114 can estimate the agethreshold value of the device and/or the age of the user. Similar to theestimated age threshold value of each of the digital media contentfiles, the estimated age threshold value of the device or user age, insome embodiments, is a number or numerical range. In certainembodiments, the estimated age threshold value of the device or user ageis a description, such as “child,” “youth,” “adolescent,” “teenager,”“young adult,” and/or “adult.” The detection component 114 can determinewhether the estimated age threshold value of the device or user agesatisfies the threshold age. If the estimated user age does not satisfythe threshold age, the content monitoring device 102 can apply thecontent rules to a presentation on the media presentation device 106 oron the electronic device 108.

For example, the detection component 114 can scan Smartphone1, which isused by Child1. During the scan, the detection component 114 identifiesvarious children's songs, children's audio books, games, and learningtools. In addition, the detection component 114 can analyze metadata ofthe various digital media content to determine that the estimated agethreshold value of each file of the identified digital media content is10-12 years old. Using this information, the detection component canestimate that the user for Smartphone1 is 10-12 years old. Accordingly,the content monitoring device 102 can apply content rules topresentations on the Smartphone1 and/or to another device when theChild1 enters a predetermined area.

Conversely during a scan of Tablet1, which is used by Adult1, thedetection component 114 identifies various rock and roll songs from the70's, financial and investment audio books, software programs thatprovide national and political news, games rated as “Mature,” and videofiles of R-rated movies. Using the metadata of the various files, thedetection component 114 estimates an age range of greater than 21 forthe rock and roll songs, financial and investment audio books, andsoftware programs that provide national and political news. Thedetection component 114 also estimates an age range of 15-25 for thegame rated as “Mature” and an age range of greater than 17 for the videofile of the R-rated movie. Based on the estimated age threshold value ofthe various files, the content monitoring device 102 can determine thatTablet1 is associated with an adult.

Furthermore, as part of the scan, the detection component 114 cananalyze the amount of digital media content with an estimated agethreshold value of a child, adolescent, teenager, adult, etc. Forexample, a parent and child may both use a tablet, smart phone, laptop,etc. Thus, the device may have digital media content with an estimatedage threshold value of an adult, as well as digital media content withan estimated age threshold value of a child, teenager, etc.

The detection component 114 can compare the amount of digital mediacontent with different estimated age threshold values to determinewhether the user of the device is likely a child or an adult. Forexample, if 100 files of digital media content are analyzed and 70 filesare identified as having age inappropriate content or have an estimatedage threshold value of an adult, the detection component 114 candetermine that the estimated age threshold value of the device is anadult and/or that the device should be associated with an adult.

In certain embodiments, the detection component 114 associates thedevice with an adult when there are more files with an estimated agethreshold value of an adult than of a child, or when a majority of thescanned files are associated with an adult. For example, in someinstances, a device can have various files with an estimated agethreshold value of a child, other files with an estimated age thresholdvalue of a teenager, and other files with an estimated age thresholdvalue of an adult. In such instances, the detection component 114 canestimate the age threshold value of the device, or age of the user ofthe device, based on the estimated age threshold value of the largestnumber of files. In certain embodiments, the estimated age of the userof the device is determined as a function of the estimated age thresholdvalues of each analyzed file. For example, the estimated age of the userof the device can be determined as the mean, median, and/or mode of theestimated age threshold values for the analyzed files.

In some embodiments, the detection component can analyze the frequencyof use of the various media content files to determine the estimated ageof the user of the device. For example, if an electronic device 108includes different files with estimated age threshold values of a child,teenager, and an adult, the detection component 114 can analyze whichfiles are used most frequently to determine the estimated age of theuser of the device. The files used most frequently can be based on thenumber of times the files are accessed, the amount of time the filesand/or programs are used, and the like. It will be understood that thenumber of files identified as the most frequently used can be apredetermined number, such as the top ten, or dynamically determinedusing a function, such as the files with a use time in the top quartileas compared to the other files, etc.

In some embodiments, the detection component 114 determines an estimatedage of the user of the device based on the most recently used files. Forexample, even though an adult may be the primary user of an electronicdevice 108, the adult may allow a child to use it in the evenings or onthe weekends. Based on the files that are used, the detection componentcan determine whether a child or an adult is the likely user. The mostrecently used files can be based on a succession of files that areaccessed, an analysis of the most recently accessed files (e.g., averageage threshold value of the ten most recently accessed files), amount oftime a file that is currently in use has been open, etc. The number offiles that constitutes the most recently accessed files can bedetermined by a user.

As an example, and not to be construed as limiting, if five of the lasteight digital media content files accessed have an estimated agethreshold value of a child, the detection component 114 can estimate theage of the user of the device as a child and the content monitoringdevice 102 can begin applying the content rules to the electronic device108 or to the media presentation device 106. Conversely, if an adultaccesses several songs, games, or other programs in succession with anestimated age threshold value of an adult, the detection component 114can change the estimated age of the user of the device to an adult. Insome embodiments, a user can change the estimated age of the user of theelectronic device 108/media presentation device manually, such as byentering a passcode, etc.

With continued reference to FIG. 1, the content rules data store 112 caninclude the rules that specify how the content monitoring device 102responds once a person who does not satisfy a threshold age is detectedwithin the predetermined area. In some embodiments, the contentmonitoring device 102 can stop the presentation of the digital mediacontent based on the content rules. For example, the content rules canturn off a TV, stop the play of a streaming or downloaded video, DVD orBlu-ray, stop the play of an audio book, etc.

In certain embodiments, the content monitoring device 102 can alter thepresentation of the digital media content based on the content rules.For example, based on the content rules, the content monitoring device102 can distort the images of a video that is being played so as to makethe video unintelligible to a user. In some embodiments, the contentmonitoring device 102, based on the content rules, can black out orwhite out the presentation or make it fuzzy. In certain embodiments,based on the content rules, the content monitoring device 102 can skipor mute portions of the presentation that have been identified ascontaining age inappropriate content. In some embodiments, the contentmonitoring device 102 can indicate that a child is present.

In some embodiments, the content monitoring device 102 can replace partsof the presentation with alternate content based on the content rules.For example, the content monitoring device 102 can replace the scene ofa movie with a landscape drawing or an animal. For audio books, thecontent monitoring device 102 can replace one or more age inappropriatewords with age appropriate words. Similarly, the content monitoringdevice 102, based on the content rules, can replace one or moresentences or paragraphs of age inappropriate content with a summary ofthe sentences or paragraphs that are age appropriate.

The age inappropriate content can be identified in a variety of ways. Insome embodiments, the age inappropriate content can be identified usingmetadata of the files. The metadata can identify a particular portion ofthe file as containing age inappropriate content and the reason forwhich the content is considered age inappropriate. For example, themetadata can identify the content as age inappropriate due to language,violence, dialogue, drug use, indecency, etc. Accordingly, when thecontent rules are applied to the presentation of the digital mediacontent, the content monitoring device 102 can monitor the metadata andalter the presentation based on the metadata and the content rules.

In certain embodiments, the age inappropriate content can be identifiedby comparing words and/or images from the files with a data storecontaining words and/or images that have been determined to be ageinappropriate. Accordingly, when the content rules are applied to thepresentation of the digital media content, the content monitoring device102 can monitor the words and/or images of the digital media content andalter the presentation based at least on the content rules and thecomparison of the digital media content with the age inappropriate wordsand/or images in the data store.

To analyze the digital media content prior to its presentation on themedia presentation device, the content monitoring device 102 can use abuffer. For example, the content monitoring device 102 can analyze thedigital media content that will be presented on the media presentationdevice 30 seconds or 1 minute prior to its presentation. When ageinappropriate content is identified, the presentation can be alteredbased on the content rules.

FIGS. 2A-2E are diagrams of illustrative embodiments of a digital mediacontent monitoring environment 200. FIGS. 2A and 2B are diagramsillustrative of an embodiment of the digital media content monitoringenvironment 200 where a content monitoring device 202, (similar to thecontent monitoring device 102 described above) detects a person within apredetermined area who does not satisfy a threshold age by detecting anelectronic device 212 (similar to the electronic device 108 describedabove) within the predetermined area that is associated with the person.FIGS. 2C-2E are diagrams illustrative of embodiments of the digitalmedia content monitoring environment 200 where a content monitoringdevice 202, detects a person within a predetermined area who does notsatisfy a threshold age based on physical characteristics of the person.

In the illustrated embodiment of FIG. 2A, an adult 208 is watching amovie with age inappropriate content on a media presentation device (TV204). As mentioned previously, the movie can be streamed or downloadedfrom a remote data store accessible via a network, such as the Internet,or accessed from a local content data store, such as a DVD, Blu-raydisc, solid-state drive, hard-drive, etc. As the adult 208 watches themovie, the content monitoring device 202 monitors the predetermined area206. As described in greater detail above, the predetermined area 206can be a particular room in a home or building, a home or building, aWi-Fi network, LAN, PAN, etc. As illustrated, a person 210 holding anelectronic device (smart phone 212) is located just outside thepredetermined area 206. As the content monitoring device 202 does notdetect the smart phone 212 of the person 210 within the predeterminedarea 206, the adult 208 is able to watch the movie without interruption.

However, in the illustrated embodiment of FIG. 2B, the contentmonitoring device 202 detects that the smart phone 212 has entered thepredetermined area 206, and that the smart phone 212 is associated witha child (person 210). As discussed in greater detail above, in someembodiments, the content monitoring device 202 can detect that the smartphone 212 associated with a child has entered the predetermined area 206by comparing location information of the smart phone 210 with locationinformation of the content monitoring device 202, the TV 204, and/orpredetermined area 206. In certain embodiments, the content monitoringdevice 202 can detect that the smart phone 212 has entered thepredetermined area 206 by determining that the smart phone 212 hasconnected to a particular network, such as a Wi-Fi network, LAN, PAN,etc. Once the content monitoring device 202 detects that the smart phone212 has entered the predetermined area 206 and that the smart phone isassociated with a child, the content monitoring device 202 applies thecontent rules to the movie. In the illustrated embodiment, based on thecontent rules, the content monitoring device 202 stops the movie.Although not illustrated in FIG. 2A, it will be understood that otherelectronic devices 108 can be used instead of the smart phone 212. Forexample, as described above, a GPS device, RFID tag, tablet, etc. can beused as the electronic device 108.

In the illustrated embodiment of FIG. 2C, the content monitoring device202 detects a person 210 within the predetermined area using one or moredetection devices, such as a camera 203, 3-D depth sensors, etc. Oncedetected, body scan data of the person 210 can be collected by thecamera 203 and the 3-D depth sensors and used by the content monitoringdevice 202 to determine various physical characteristics of the person210. For example, the content monitoring device 202 can determine theheight, relative size, and/or body mass of the person 210.

In some embodiments, the content monitoring device 202 can compare thephysical characteristics of the person 210 with expected values of achild or of an adult. For example, the content monitoring device 202 candetermine a person shorter than 4′ 6″ is a child. In some embodiments,the content monitoring device 202 compares the body scan data of theperson 210 with stored data that is associated with an account of thechild or other registered users. If the body scan data matches thestored data that is associated with an account of a child, the contentmonitoring device 202 determines that the person 210 is a child. Asillustrated, once the content monitoring device 202 determines that theperson 210 is a child, the content monitoring device 202 applies thecontent rules. In the illustrated embodiment, based on the contentrules, the content monitoring device 202 replaces the digital mediacontent with the scene of a sunset as alternate content.

FIG. 2D is a diagram illustrative of an embodiment of a mediapresentation device 214 that includes a content monitoring device 102.In the illustrated embodiment, the content monitoring device 102 detectsa person who does not satisfy a threshold age within a predeterminedarea based on a facial scan of the person. Once detected, the camera 203collects and the content monitoring device 102 analyzes facial scan dataof the person 210.

As part of the analysis, the content monitoring device 102 can comparethe facial scan data of the person 210 with facial data that has beenpreviously stored, either on the media presentation device 214 or at aremote location. If the facial scan data of the person 210 matchespreviously stored facial data of a child, the content monitoring device102 can determine that the person 210 is a child. As described ingreater detail above, in some embodiments, the content monitoring devicecan perform a facial analysis of the facial scan data to determinewhether characteristics of the person 210 more closely correspond tofacial features of a child or of an adult. In the illustratedembodiment, once the content monitoring device 202 determines that theperson 210 is a child, the content monitoring device 102 stops thepresentation of the digital media content and requests a passcode beforecontinuing.

FIG. 2E is a diagram illustrative of an embodiment of a mediapresentation device 214 that includes a content monitoring device 102.In the illustrated embodiment, the content monitoring device 102 detectsa person who does not satisfy a threshold age within a predeterminedarea based on a voice scan of the person. Once detected, the microphone205 collects and the content monitoring device 102 analyzes voice scandata of the person 210.

As part of the analysis, the content monitoring device 202 can comparethe voice scan data of the person 210 with voice data that has beenpreviously stored, either on the electronic device 214 or at a remotelocation. If the voice scan data of the person 210 matches previouslystored voice data of a child, the content monitoring device candetermine that the person 210 is a child. As described in greater detailabove, in some embodiments, the content monitoring device can perform avoice analysis of the voice scan data to determine whethercharacteristics of the voice of the person 210 more closely correspondto aural features of a child or of an adult. In the illustratedembodiment, once the content monitoring device 202 determines that theperson 210 is a child, the content monitoring device mutes some or allof the presentation of the digital media content.

FIG. 3 is a flow diagram of an illustrative routine 300 implemented bythe content monitoring device 102 for determining that a person who doesnot satisfy a threshold age is within a predetermined area. One skilledin the relevant art will appreciate that the elements outlined forroutine 300 may be implemented by one or more computingdevices/components that are associated with the content monitoringdevice 102, described in greater detail above with reference to FIG. 1.For example, routine 300 can be implemented by any one or a combinationof, the computing device 110, the content rules data store 112, thedetection component 114, and the like. Accordingly, routine 300 has beenlogically associated as being generally performed by the contentmonitoring device 102, and the following illustrated embodiment shouldnot be construed as limiting.

At block 302 the content monitoring device 102 initiates the routine 300during presentation on a media presentation device 106 of digital mediacontent. The digital media content can include any digital mediacontent, such as, but not limited to videos, music, audio recordings,etc. For example, the routine 300 can be initiated while a person isviewing a movie on a TV, or listening to a song or audio book on adigital media player, etc.

Further, the digital media content can be stored in a content data store104 that is local to, or remotely located from, the media presentationdevice 106 and/or the content monitoring device 102. For example, insome embodiments, the digital media content is stored on a remotecontent data store over a network, such as the Internet. In certainembodiments, the digital media content can be stored on a local contentdata store, such as a DVD, Blu-ray disc, video cassette, hard-drive,solid-state drive, etc.

At block 304, the content monitoring device 102 automatically determinesthat a person who does not satisfy a threshold age is within apredetermined area of the media presentation device 106. A user of themedia presentation device 106, such as the owner, parent, etc., candetermine the threshold age and the predetermined area associated withthe decision block 306. For example, a parent can determine what contentis age appropriate for a child. Similarly, a parent can determine thatthe content rules should be applied when the content monitoring device102 determines that a child is in the same room as or is within 20 feetof the media presentation device. Accordingly, when the contentmonitoring device 102 detects a person within the predetermined area,the content monitoring device 102 can automatically determine whetherthat person does not satisfy the threshold age.

As discussed in greater detail above, with reference to FIGS. 1 and2A-2E, the content monitoring device can automatically determine that aperson who does not satisfy the threshold age is within thepredetermined area by scanning physical characteristics of one or morepersons detected within the predetermined area and/or or detecting thepresence of an electronic device within the predetermined area that isassociated with the person who does not satisfy the threshold age.Further, the content monitoring device 102 can use multiple physicalcharacteristics and/or the detection of the electronic device todetermine that the person who does not satisfy the threshold age iswithin the predetermined area.

At block 306, the content monitoring device 102 applies one or morecontent rules to the presentation of the digital media content based atleast in part on the determination that the person who does not satisfythe threshold age is within the predetermined area. As described ingreater detail above, the content rules can be selected by a user, suchas a parent or adult, and can prescribe how the content monitoringdevice 102 will alter the presentation of the digital media content.

At block 308, the content monitoring device 102 causes alterations tothe presentation of the digital media content in accordance with the oneor more content rules. As discussed in greater detail above, withreference to FIGS. 1 and 2A-2E, the content monitoring device 102 cancause the presentation to be altered in a variety of ways. For example,the content monitoring device 102 can stop, interrupt, distort, skip,mute and/or replace the presentation or portions thereof identified asage inappropriate content based on the content rules. At block 310, theroutine 300 ends.

Additional, fewer, or different blocks can be used as part of theroutine 300. For example, the content monitoring device 102 can monitormultiple predetermined areas and apply different rules based on thelocation of the person who does not satisfy the threshold age within themultiple predetermined areas. For example, a home may be onepredetermined area and a TV room may be another predetermined area.Similarly, a Wi-Fi network in a home may be one predetermined area and aPAN that includes the content monitoring device 102 can be a secondpredetermined area. When the content monitoring device 102 determinesthat the person who does not satisfy the threshold age is within thefirst predetermined area, it can apply a first set of rules to thepresentation of the digital media content. For example, the contentmonitoring device 102 can alert an adult watching a movie or listeningto an audio book that a child has entered the house or connected to theWi-Fi network. Once the content monitoring device detects a person inthe second predetermined area who does not satisfy the threshold age, itcan apply a second set of content rules. For example, the contentmonitoring device 102 can stop the movie or audio book, or beginskipping, muting, blacking out, or otherwise altering portionsidentified as containing age inappropriate content, as described ingreater detail above.

In addition, the content monitoring device 102 can detect when theperson who does not satisfy the threshold age has left the predeterminedarea. Upon determining that the person who does not satisfy thethreshold age has left the predetermined area, the content monitoringdevice can cease application of the content rules to the presentation.

Furthermore, although described in terms of applying content rules towhen a person within a predetermined area does not satisfy a thresholdage, it will be understood that the embodiments described above can alsobe used to protect secure, sensitive, and/or confidential informationfrom an unauthorized person or persons. The content monitoring device102 can determine that the information is sensitive based on themetadata of the files, a comparison of words and/or images in the fileswith a data store including words and/or images determined to besensitive, or an identification by a user. Further, the contentmonitoring device 102 can detect and identify the unauthorized personusing the techniques described above with respect to identifying aperson who does not satisfy a threshold age. For example, the contentmonitoring device 102 can determine a person is unauthorized based onphysical characteristics of the person and/or by detecting an electronicdevice that is associated with the unauthorized person, as described ingreater detail above. Further, if the content monitoring device 102detects an unauthorized person within the predetermined area duringpresentation of confidential information, the content monitoring devicecan apply one or more content rules to the presentation of theinformation. For example, based on the content rules, the contentmonitoring device 102 can alter, stop, distort, skip, mute, and/orreplace the confidential information, or portions thereof.

FIG. 4 is a flow diagram of an illustrative routine 400 implemented bythe content monitoring device 102 for identifying a device that isassociated with a person who does not satisfy a threshold age. Oneskilled in the relevant art will appreciate that the elements outlinedfor routine 400 may be implemented by one or more computingdevices/components that are associated with the content monitoringdevice 102, described in greater detail above with reference to FIG. 1.For example routine 400 can be implemented by any one, or combinationof, the computing device 110, the content rule data store 112, and/orthe detection component 114. Accordingly routine 400 has been logicallyassociated as being generally performed by the content monitoring device102, and the following illustrative embodiment should not be construedas limiting.

At block 402, the content monitoring device 102 initiates the routine400. At block 404, the content monitoring device 102 scans digital mediacontent stored on a content data store 104 that is associated with anelectronic device 108 or a media presentation device 106. As mentionedpreviously, the content data store 104 can be located remotely orlocally from the device that is scanned.

In some instances, such as when the content data store 104 is remotelylocated, the content monitoring device 102 can scan the digital mediacontent in the content data store 104 that is associated with aparticular user(s) of the device. For example, the remotely locatedcontent data store 104 may include digital media content for hundreds orthousands of users. Accordingly, the content monitoring device 102 canscan the digital media content that is associated with the particularuser(s) of the device (e.g., the digital media content purchased and/oraccessed by the user). In some instances, such as when the content datastore 104 is located locally, the content monitoring device 102 can scanall of the digital media content in the content data store 104.

At block 406, the content monitoring device 102 determines an estimatedage threshold value of each of the one or more files of the digitalmedia content stored on the content data store 104. In some embodiments,the age threshold value is a number or numerical range. In certainembodiments, the estimated age threshold value is a description, such as“child,” “youth,” “adolescent,” “teenager,” “young adult,” and/or“adult.” The estimated age threshold value of each file can bedetermined based at least in part on genre, language of the content,lyrics, words, rating for content (e.g., G, PG, etc. for movies, “T” forteen, “E” for everyone for video games, etc.), information associatedwith an account or profile belonging to the user of the device (e.g.,age or other demographic information, credit card information,sub-account information, social network information, etc.). For example,if the digital media content is identified as being one or morechildren's songs, the content monitoring device 102 can determine anestimated age threshold value of 5-10, or “child” for the children'ssongs. Similarly, if the content monitoring device 102 identifies one ormore files of the digital media content as being R-rated movies, thecontent monitoring device 102 can determine an estimated age thresholdvalue of 18 years, or “adult” for the R-rated movie. In addition, thelength, complexity, or obscurity of the words in the files can be usedto determine the estimated age threshold value of the file. For example,large, complex, or obscure words can be rated as “adult,” while simple,frequently used words can be rated as “child.” Based on the frequency ofthe “adult” words, the file can be given an estimated age thresholdvalue of an “adult” or “child.” For example, if a large number of“adult” words are used, the filed can be given an estimated agethreshold value of “adult.” Conversely, if there are few or no “adult”words, the file can be given an estimated age threshold value of“child,” etc.

At block 408, the content monitoring device 102 automatically determinesthat an estimated age of the user of the device does not satisfy athreshold age based at least in part on the estimated age thresholdvalue of the one or more files of the digital media content. Asdescribed in greater detail above with reference to FIG. 1, theestimated age of the device can be determined after analyzing the numberof files identified for each age threshold value, the most recently usedfiles, the frequency of use of the files, etc. For example, if themajority of the files have an estimated age threshold value of 30 or“adult,” the content monitoring device 102 can determine that the deviceis associated with an adult. In some embodiments, if the most recentlyused files are files have an estimated age threshold value of 10-12years old or “adolescent,” the content monitoring device 102 candetermine that the estimated age of the user of the device is anadolescent. In certain embodiments, if the most frequently used fileshave an estimated age threshold value of 5-8 years old or “child,” thecontent monitoring device 102 can determine that the estimated age ofthe user of the device is a child.

At block 410, the content monitoring device 102 applies one or morecontent rules to a presentation of digital media content based at leastin part on the determination that the estimated age of the user of thedevice does not satisfy a threshold age. As described in greater detailabove, the content monitoring device 102 can alter, stop, interrupt,distort, skip, mute and/or replace the presentation of the digital mediacontent, or portions thereof, based on the content rules.

The routine 400 can include additional, fewer or different blocks thanthose described above. For example, the content monitoring device 102can block access to one or more files of digital media content based onthe content rules. For example, if a user tries to access digital mediacontent that includes age inappropriate content, the content monitoringdevice 102 can ignore the request, provide a message indicating that thedigital media content contains age inappropriate content, requestauthentication before proceeding, alert another user, initiate an alarm,etc.

All of the processes described herein may be embodied in, and fullyautomated via, software code modules executed by one or more generalpurpose computers or processors. The code modules may be stored in anytype of computer-readable medium or other computer storage device. Someor all the methods may alternatively be embodied in specialized computerhardware. In addition, the components referred to herein may beimplemented in hardware, software, firmware or a combination thereof.

Conditional language such as, among others, “can,” “could,” “might” or“may,” unless specifically stated otherwise, are otherwise understoodwithin the context as used in general to convey that certain embodimentsinclude, while other embodiments do not include, certain features,elements and/or steps. Thus, such conditional language is not generallyintended to imply that features, elements and/or steps are in any wayrequired for one or more embodiments or that one or more embodimentsnecessarily include logic for deciding, with or without user input orprompting, whether these features, elements and/or steps are included orare to be performed in any particular embodiment.

Conjunctive language such as the phrase “at least one of X, Y and Z,”unless specifically stated otherwise, is otherwise understood with thecontext as used in general to convey that an item, term, etc. may beeither X, Y or Z, or a combination thereof. Thus, such conjunctivelanguage is not generally intended to imply that certain embodimentsrequire at least one of X, at least one of Y and at least one of Z toeach be present.

Any process descriptions, elements or blocks in the flow diagramsdescribed herein and/or depicted in the attached figures should beunderstood as potentially representing modules, segments, or portions ofcode which include one or more executable instructions for implementingspecific logical functions or elements in the process. Alternateimplementations are included within the scope of the embodimentsdescribed herein in which elements or functions may be deleted, executedout of order from that shown, or discussed, including substantiallyconcurrently or in reverse order, depending on the functionalityinvolved as would be understood by those skilled in the art.

It should be emphasized that many variations and modifications may bemade to the above-described embodiments, the elements of which are to beunderstood as being among other acceptable examples. All suchmodifications and variations are intended to be included herein withinthe scope of this disclosure and protected by the following claims.

What is claimed is:
 1. A computer-implemented method comprising: undercontrol of one or more computing devices configured with specificcomputer-executable instructions, during presentation on a mediapresentation device of digital media content acquired from an electronicdata store: detecting that a person who does not satisfy a threshold ageis within a first predetermined area of the media presentation device,the detecting comprising at least one of: detecting that an electronicdevice within the first predetermined area is associated with the personwho does not satisfy the threshold age, and detecting that a physicalcharacteristic of the person within the first predetermined areaindicates the person does not satisfy the threshold age; based at leastin part on the detecting that the person who does not satisfy thethreshold age is within the first predetermined area, using one or morefirst content rules to monitor the presentation of the digital mediacontent; causing presentation of an indication that the person who doesnot satisfy the threshold age is within the first predetermined areabased at least in part on the one or more first content rules; detectingthat the person who does not satisfy the threshold age is within asecond predetermined area of the media presentation device, wherein thesecond predetermined area is different from the first predeterminedarea; based at least in part on detecting that the person who does notsatisfy the threshold age is within the second predetermined area, usingone or more second content rules to monitor the presentation of thedigital media content; identifying an age inappropriate portion of thedigital media content based at least in part on the one or more secondcontent rules; and interrupting the presentation of the digital mediacontent on the media presentation device at the age inappropriateportion.
 2. The computer-implemented method of claim 1, wherein thefirst predetermined area comprises at least a portion of the secondpredetermined area.
 3. The computer-implemented method of claim 1,wherein identifying the age inappropriate portion of the digital mediacontent comprises analyzing metadata of the digital media content thatidentifies a particular portion of the digital media content ascontaining age inappropriate content.
 4. A computer-implemented methodcomprising: under control of one or more computing devices configuredwith specific computer-executable instructions, during presentation on amedia presentation device of digital media content obtained from anelectronic data store: detecting that a person who does not satisfy athreshold age is within a first predetermined area of the mediapresentation device; based at least in part on detecting that the personwho does not satisfy the threshold age is within the first predeterminedarea, using one or more first content rules to monitor the presentationof the digital media content; causing a first alteration of thepresentation of the digital media content on the media presentationdevice; detecting that the person who does not satisfy the threshold ageis within a second predetermined area of the media presentation device,wherein the second predetermined area is different from the firstpredetermined area; based at least in part on detecting that the personwho does not satisfy the threshold age is within the secondpredetermined area, using one or more second content rules to monitorthe presentation of the digital media content; and causing a secondalteration of the presentation of the digital media content on the mediapresentation device, wherein the second alteration is different from thefirst alteration.
 5. The computer-implemented method of claim 4, whereindetecting that the person who does not satisfy the threshold age iswithin the first predetermined area comprises: detecting a presence ofan electronic device within the first predetermined area; anddetermining that the electronic device is associated with the person whodoes not satisfy the threshold age.
 6. The computer-implemented methodof claim 5, wherein detecting the presence of the electronic devicewithin the first predetermined area comprises determining that thedetected electronic device is connected to a particular network.
 7. Thecomputer-implemented method of claim 5, wherein the electronic device isat least one of a personal computing device and a location detectiondevice.
 8. The computer-implemented method of claim 4, wherein detectingthat the person who does not satisfy the threshold age is within thesecond predetermined area comprises: detecting a presence of the personwithin the second predetermined area; performing a facial scan of theperson; and determining from the facial scan of the person that theperson does not satisfy the threshold age.
 9. The computer-implementedmethod of claim 4, wherein detecting that the person who does notsatisfy the threshold age is within the second predetermined areacomprises: detecting a presence of the person within the secondpredetermined area; performing a voice scan of the person; anddetermining from the voice scan of the person that the person does notsatisfy the threshold age.
 10. The computer-implemented method of claim9, wherein determining from the voice scan that the person does notsatisfy the threshold age comprises determining that audio data from thevoice scan correlates to previously obtained audio data of the personwho does not satisfy the threshold age.
 11. The computer implementedmethod of claim 9, wherein determining from the voice scan that theperson does not satisfy the threshold age comprises conducting a voiceanalysis of the voice scan.
 12. The computer-implemented method of claim4, wherein detecting that the person who does not satisfy the thresholdage is within the second predetermined area comprises: detecting apresence of the person within the second predetermined area; estimatingat least one of an height and mass of the person; and determining fromthe estimated at least one of height and mass that the person does notsatisfy the threshold age.
 13. The computer-implemented method of claim4, wherein the second alteration of the presentation of the digitalmedia content comprises interruption of the presentation of the digitalmedia content.
 14. The computer-implemented method of claim 13, furthercomprising obtaining authentication to continue the presentation of thedigital media content.
 15. The computer-implemented method of claim 4,wherein the second alteration of the presentation of the digital mediacontent comprises at least one of: issuance of an indication that theperson who does not satisfy the threshold age is present; skipping oneor more portions of the digital media content considered inappropriatefor the person who does not satisfy the threshold age; distortingpresentation of the one more portions of the digital media contentconsidered inappropriate for the person who does not satisfy thethreshold age; muting aural presentation of one or more portions of thedigital media content considered inappropriate for the person who doesnot satisfy the threshold age; modifying visual presentation of one ormore portions of the digital media content considered inappropriate forthe person who does not satisfy the threshold age; and replacing, withalternate content, one or more portions of the digital media contentconsidered inappropriate for the person who does not satisfy thethreshold age.
 16. The computer-implemented method of claim 4, furthercomprising: detecting that the person who does not satisfy the thresholdage is no longer within the second predetermined area of the mediapresentation device; ceasing application of the one or more secondcontent rules to the presentation of the digital media content; andresuming presentation of the digital media content on the digital mediadevice without alteration.
 17. The computer-implemented method of claim4, wherein the first predetermined area comprises at least a portion ofthe second predetermined area.
 18. A system comprising: a detectiondevice configured to obtain data corresponding to one or more personswithin a first predetermined area of a media presentation device andwithin a second predetermined area, wherein the second predeterminedarea is different from the first predetermined area, and the mediapresentation device is configured to present digital media content; acomputing device in communication with one or more content data storescomprising the digital media content and further in communication withthe media presentation device, wherein during presentation on the mediapresentation device of the digital media content, the computing deviceis configured to: detect that a person who does not satisfy a thresholdage is within the first predetermined area of the media presentationdevice based at least in part on the data obtained by the detectiondevice; based at least in part on detecting that the person who does notsatisfy the threshold age is within the first predetermined area, useone or more first content rules to monitor the presentation of thedigital media content; cause a first alteration of the presentation ofthe digital media content on the media presentation device; detect thatthe person who does not satisfy the threshold age is within the secondpredetermined area; use one or more second content rules to monitor thepresentation of the digital media content; and cause a second alterationof the presentation of the digital media content on the mediapresentation device, wherein the second alteration is different from thefirst alteration.
 19. The system of claim 18, wherein to detect that theperson who does not satisfy the threshold age is within the firstpredetermined area, the computing device is configured to: detect apresence of an electronic device within the first predetermined area;and determine that the detected electronic device is associated with theperson who does not satisfy the threshold age.
 20. The system of claim18, wherein to detect that the person who does not satisfy the thresholdage is within the second predetermined area, the computing device isconfigured to: detect a presence of the person within the secondpredetermined area; perform a facial scan of the person; and determinefrom the facial scan of the person that the person does not satisfy thethreshold age.
 21. The system of claim 18, wherein to detect that theperson who does not satisfy the threshold age is within the secondpredetermined area, the computing device is configured to: detect apresence of the person within the second predetermined area; perform avoice scan of the person; and determine from the voice scan of theperson that the person does not satisfy the threshold age.
 22. Thesystem of claim 18, wherein to detect that the person who does notsatisfy the threshold age is within the second predetermined area, thecomputing device is configured to: detect a presence of the personwithin the second predetermined area; estimate at least one of an heightand mass of the person; and determine from the estimated at least one ofheight and mass that the person does not satisfy the threshold age. 23.The system of claim 18, wherein the first predetermined area comprisesat least a portion of the second predetermined area.
 24. Acomputer-readable, non-transitory storage medium having one or morecomputer-executable modules, the one or more computer-executable modulescomprising: a first module in communication with one or more contentdata stores comprising digital media content and further incommunication with a media presentation device configured to present thedigital media content, wherein during presentation on the mediapresentation device of the digital media content, the first module isconfigured to: automatically determine detect that a person who does notsatisfy a threshold age is within a first predetermined area of themedia presentation device based at least in part on data received from adetection device; based at least in part on detecting that the personwho does not satisfy the threshold age is within the first predeterminedarea, use one or more first content rules to monitor the presentation ofthe digital media content; cause a first alteration of the presentationof the digital media content on the media presentation device inaccordance with the one or more first content rules; detect that theperson who does not satisfy the threshold age is within a secondpredetermined area of the media presentation device that is differentfrom the first predetermined area; based at least in part on detectingthat the person who does not satisfy the threshold age is within thesecond predetermined area, use one or more second content rules tomonitor the presentation of the digital media content; and cause asecond alteration of the presentation of the digital media content onthe media presentation device, wherein the second alteration isdifferent from the first alteration.
 25. The computer-readable,non-transitory storage medium of claim 24, wherein to detect that theperson who does not satisfy the threshold age is within the firstpredetermined area, the first module is configured to: detect a presenceof an electronic device within the first predetermined area; anddetermine that the detected electronic device is associated with theperson who does not satisfy the threshold age.
 26. Thecomputer-readable, non-transitory storage medium of claim 24, wherein todetect that the person who does not satisfy the threshold age is withinthe second predetermined area, the first module is configured to: detecta presence of the person within the second predetermined area; perform abody part scan of the person; and determine from the body part scan ofthe person that the person does not satisfy the threshold age.
 27. Thecomputer-readable, non-transitory storage medium of claim 24, wherein todetect that the person who does not satisfy the threshold age is withinthe second predetermined area, the first module is configured to: detecta presence of the person within the second predetermined area; perform avoice scan of the person; and determine from the voice scan of theperson that the person does not satisfy the threshold age.
 28. Thecomputer-readable, non-transitory storage medium of claim 24, wherein todetect that the person who does not satisfy the threshold age is withinthe second predetermined area, the first module is configured to: detecta presence of the person within the second predetermined area; estimateat least one of an height and mass of the person; and determine from theestimated at least one of height and mass that the person does notsatisfy the threshold age.
 29. The computer-readable, non-transitorystorage medium of claim 24, wherein the first predetermined areacomprises at least a portion of the second predetermined area.