Merging Permissions and Content Access

ABSTRACT

Aspects of the disclosure relate to determining that a wireless device associated with one user account is proximate to a computing device associated with another user account. In response to determining the proximity of the two devices, one or more of the devices may receive merged access to permissions and/or content associated with the two user accounts. In response to determining that the wireless device is not proximate to the computing device, the devices may no longer receive merged access to permissions and/or content associated with the two user accounts.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/008,350, filed on Jun. 14, 2018, which is a continuation of U.S.application Ser. No. 14/456,601, filed on Aug. 11, 2014 (now U.S. Pat.No. 10,045,090), which are hereby incorporated by reference in theirentirety.

BACKGROUND

Television services—such as cable television—offer different bundles ofchannels that viewers may subscribe to. Different subscription bundlesmay include different channels. Different users may have differenttastes, and therefore subscribe to different channels. There will alwaysbe a need for improved user convenience in accessing desired televisioncontent.

SUMMARY

Some aspects of the disclosure relate to methods and systems for viewingcontent included in a user's subscription. When a user goes to adifferent location—e.g., a friend's house with a different subscription,a hotel, an office, a restaurant, a bar, a vacation home, a boat, anairplane—a set-top box at the different location may be granted mergedaccess privileges for the content associated with the user's account andwith the different location's account.

For example, aspects of the disclosure may relate to determining, by acomputing device associated with a first user account, that a wirelessdevice associated with a second user account is proximate to thecomputing device, and receiving, in response to determining that thewireless device is proximate to the computing device, merged access tocontent associated with the first and second user accounts.

A method may include determining that the wireless device is notproximate to the computing device, and denying access to the permissionsand the content associated with the second user account, wherein denyingaccess to the permissions and the content associated with the seconduser account may include reverting to providing access to only thepermissions and the content associated with the first user account. Thecomputing device may lose access to the permissions and the contentassociated with the second user account after a timeout period. Thecontent associated with the second user account may include a videoprogram, and the timeout period may be at least as long as the remainderof the video program.

The method may include determining that the content associated with thesecond user account includes currently playing content, determining thatthe first user account does not have permissions or access to thecurrently playing content, and displaying a prompt for the first useraccount to purchase access to the currently playing content. The seconduser account may receive a reward in response to the first user accountpurchasing access to the currently playing content.

The computing device may receive access to the content associated withthe second user account including receiving permissions and access toonly some of the content associated with the second user account. Thesome of the content associated with the second user account that thecomputing device receives access to may include a type of content.

The computing device may grant to the wireless device permission toremotely control the computing device. The permission to remotelycontrol the computing device may be restricted to controlling thecomputing device while the computing device is accessing the contentassociated with the second user account.

Alternatively or additionally, aspects of the disclosure may relate toreceiving, at a server, from a mobile device associated with a firstaccount, acknowledgement of the mobile device detecting a beaconbroadcast by a computing device associated with a second account, andgranting, to the computing device, merged permissions and access tocontent associated with the first account and the second account, inresponse to the mobile device detecting the beacon broadcast by thecomputing device.

The method may include transmitting content associated with both thefirst and second user accounts, and reducing a number of advertisementsto be displayed during playback of the content associated with the firstand second user accounts. Granting the merged permissions may includedetermining a content restriction placed on the second user account, andapplying the content restriction to the first user account. The methodmay include aggregating information associated with the first useraccount and the second user account, and making a recommendation basedon the aggregated information.

The method may include requesting a confirmation of the mobile devicedetecting the beacon broadcast by the computing device, receiving amessage from the mobile device including an indication that the mobiledevice is no longer is detecting the beacon broadcast by the computingdevice, and revoking, for the computing device, the merged permissionsand access to the content associated with the first account and thesecond account.

The method may include receiving a message from the mobile deviceincluding an indication of the computing device requesting a grant ofpermissions and access for the computing device to at least part of thecontent associated with the second account, and updating the permissionsand the access to content associated with the first account to includethe at least part of the content associated with the second account.

The method may include granting to the mobile device, merged permissionsand access to content associated with the first account and the secondaccount, in response to the mobile device detecting the beacon broadcastby the computing device.

Alternatively or additionally, aspects of the disclosure may relate toconnecting, by a computing device associated with a first profile, to amobile device associated with a second profile, and receiving mergedpermissions including permissions associated with the first and secondprofiles and merged access to content including content associated withthe first and second profiles.

The method may include displaying a list of content accessible to thecomputing device including the merged access to content. The method mayinclude disconnecting from the mobile device, and losing the mergedpermissions and the merged access to content in response todisconnecting from the mobile device.

The preceding presents a simplified summary in order to provide a basicunderstanding of some aspects of the disclosure. The summary is not anextensive overview of the disclosure. It is neither intended to identifykey or critical elements of the disclosure nor to delineate the scope ofthe disclosure. The summary merely presents some concepts of thedisclosure in a simplified form as a prelude to the description below.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIG. 1 illustrates an example information distribution network.

FIG. 2 illustrates an example hardware platform on which the variouselements described herein may be implemented.

FIGS. 3A and 3B depict an example embodiment of a set-top boxcommunicating with a mobile device.

FIG. 4 depicts an example television program guide for displaying mergedcontent access rights.

FIG. 5 depicts an example graphical user interface that may be displayedwhen a computing device determines that a wireless device has left theproximity of the computing device.

FIGS. 6-7 depict flow diagrams illustrating logic between a computingdevice, a wireless device, and a server for granting merged permissionsand access to content associated with two or more user accounts.

FIG. 8 depicts a flow diagram illustrating logic between a computingdevice, a wireless device, and a server for gifting content from oneuser account to another.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

FIG. 1 illustrates an example information distribution network 100 onwhich many of the various features described herein may be implemented.The network 100 may be any type of information distribution network,such as satellite, telephone, cellular, wireless, etc. One example maybe an optical fiber network, a coaxial cable network or a hybridfiber/coax distribution network. Such networks 100 may use a series ofinterconnected communication lines 101 (e.g., coaxial cables, opticalfibers, wireless, etc.) to connect multiple premises (e.g., businesses,homes 102, consumer dwellings, etc.) to a central office (e.g., headend)103. The central office 103 may transmit downstream information signalsonto the lines 101, and each home 102 may have a receiver used toreceive and process those signals.

There may be one line 101 originating from the central office 103, andit may be split a number of times to distribute the signal to the homes102 in the vicinity (which may be many miles) of the central office 103.The lines 101 may include components not illustrated, such as splitters,filters, amplifiers, etc. to help convey the signal clearly, but ingeneral each split introduces a bit of signal degradation. Portions ofthe lines 101 may also be implemented with fiber-optic cable, whileother portions may be implemented with coaxial cable, other lines, orwireless communication paths. By running fiber optic cable along someportions, for example, signal degradation in those portions may besignificantly minimized, allowing a single central office 103 to reacheven farther with its network of lines 101 than before.

The central office 103 may include a modem termination system (MTS) 104,such as a cable modem termination system (CMTS), which may be acomputing device configured to manage communications between devices onthe network of lines 101 and backend devices such as servers 105-107 (tobe discussed more below). The MTS may be as specified in a standard,such as the Data Over Cable Service Interface Specification (DOCSIS)standard, published by Cable Television Laboratories, Inc. (a.k.a.CableLabs), or it may be a similar or modified device instead. The MTSmay be configured to place data on one or more downstream frequencies tobe received by modems at the various homes 102, and to receive upstreamcommunications from those modems on one or more upstream frequencies.The central office 103 may also include one or more network interfaces108, which may permit the central office 103 to communicate with variousother external networks 109. These networks 109 may include, forexample, networks of Internet devices, telephone networks, cellulartelephone networks, fiber optic networks, local wireless networks (e.g.,WiMAX), satellite networks, and any other desired network, and theinterface 108 may include the corresponding circuitry needed tocommunicate on the network 109, and to other devices on the network suchas a cellular telephone network and its corresponding cell phones.

As noted above, the central office 103 may include a variety of servers105-107 that may be configured to perform various functions. Forexample, the central office 103 may include a push notification server105. The push notification server 105 may generate push notifications todeliver data or commands to the various homes 102 in the network (ormore specifically, to the devices in the homes 102 that are configuredto detect such notifications). The central office 103 may also include acontent server 106. The content server 106 may be one or more computingdevices that are configured to provide content to users in the homes.This content may be, for example, video on demand movies, televisionprograms, songs, text listings, etc. The content server 106 may includesoftware to validate user identities and entitlements, locate andretrieve requested content, encrypt the content, and initiate delivery(e.g., streaming) of the content to the requesting user or device.

The central office 103 may also include one or more application servers107. An application server 107 may be a computing device configured tooffer any desired service, and may run various languages and operatingsystems (e.g., servlets and JSP pages running on Tomcat/MySQL, OSX, BSD,Ubuntu, Redhat, HTML5, JavaScript, AJAX, and COMET). For example, anapplication server may be responsible for collecting television programlistings information and generating a data download for electronicprogram guide listings. An application server may be responsible formonitoring user viewing habits and collecting that information for usein selecting advertisements. An application server may be responsiblefor formatting and inserting advertisements in a video stream beingtransmitted to the homes 102. An application server may be responsiblefor receiving user remote control commands, and processing them toprovide an intelligent remote control experience. An application servermay perform multiple functions (e.g., a combination of one or more ofthe above-described functions), or an application server may bededicated to one function.

An example home 102 a may include a modem 110, which may includetransmitters and receivers used to communicate on the lines 101 and withthe central office 103. The modem 110 may be, for example, a coaxialcable modem (for coaxial cable lines 101), a fiber interface node (forfiber optic lines 101), or any other desired modem device. The modem 110may be connected to, or be a part of, a gateway interface device 111.The gateway interface device 111 may be a computing device thatcommunicates with the modem 110 to allow one or more other devices inthe home to communicate with the central office 103 and other devicesbeyond the central office. The gateway interface device 111 may be aset-top box (STB), digital video recorder (DVR), computer server, or anyother desired computing device. The gateway interface device 111 mayalso include (not shown) local network interfaces to providecommunication signals to devices in the home, such as televisions 112,additional STBs 113, personal computers 114, laptop computers 115,wireless devices 116 (wireless laptops and netbooks, mobile phones,mobile televisions, personal digital assistants (PDA), etc.), and anyother desired devices. Examples of the local network interfaces includeMultimedia Over Coax Alliance (MoCA) interfaces, Ethernet interfaces,universal serial bus (USB) interfaces, wireless interfaces (e.g., IEEE802.11), BLUETOOTH interfaces, and others.

FIG. 2 illustrates general hardware elements that may be used toimplement any of the various computing devices discussed above. Thecomputing device 200 may include one or more processors 201, which mayexecute instructions of a computer program to perform any of thefeatures described herein. The instructions may be stored in any type ofcomputer-readable medium or memory, to configure the operation of theprocessor 201. For example, instructions may be stored in a read-onlymemory (ROM) 202, random access memory (RAM) 203, removable media 204,such as a Universal Serial Bus (USB) drive, compact disk (CD) or digitalversatile disk (DVD), floppy disk drive, or any other desired electronicstorage medium. Instructions may also be stored in an attached (orinternal) hard drive 205. The computing device 200 may include one ormore output devices, such as a display 206 (or an external television),and may include one or more output device controllers 207, such as avideo processor. There may also be one or more user input devices 208,such as a remote control, keyboard, mouse, touch screen, microphone,etc. The computing device 200 may also include one or more networkinterfaces, such as input/output circuits 209 (such as a network card)to communicate with an external network 210. The network interface maybe a wired interface, wireless interface, or a combination of the two.In some embodiments, the interface 209 may include a modem (e.g., acable modem), and network 210 may include the communication lines 101discussed above, the external network 109, an in-home network, aprovider's wireless, coaxial, fiber, or hybrid fiber/coaxialdistribution system (e.g., a DOCSIS network), or any other desirednetwork.

Various features described herein offer improved remote controlfunctionality, for example, to users accessing content from the centraloffice 103. For example, one such user may be a viewer who is watching atelevision program being transmitted from the central office 103 or anycontent provider. Particular aspects of the disclosure may relate totransmissions between a remote control and a gateway interface device111. Such and other aspects of the disclosure will be described indetail below.

FIG. 3A and FIG. 3B depict an example embodiment of a set-top boxcommunicating with a mobile device. A set-top box (e.g., the STB 113)may be connected to a television (e.g., television 112). The televisionmay display content received by the set-top box. The set-top box may beassociated with a user account. For example, if the set-top box is in auser's home, the set-top box may be associated with a user account forthe home's cable-television subscription. Alternatively or additionally,the set-top box may be associated with another or an additional useraccount. For example, the set-top box may be associated with a person'ssocial media account (e.g., Facebook, Twitter, Google Plus), a streamingvideo service account (e.g., Netflix, Amazon Prime Instant Video), oranother television service (e.g., satellite television). The set-top boxmay be associated with user accounts for multiple services. The set-topbox may be associated with multiple user accounts for a single service.

A user may have a wireless device associated with a user account. Thewireless device may have access to the internet (e.g., smartphone 302,laptop, tablet, iPod touch, Google Glass, wearable device).Alternatively, the wireless device may not have access to the internet(e.g., radio-frequency identification (RFID) device, near-fieldcommunication (NFC) device, keyfob). In either case, the wireless devicemay be associated with one or more user accounts and facilitateentitlement merging. For example, the wireless device may be associatedwith the user's social media account, streaming video service account,or television service account (e.g., the user's home cable-televisionsubscription account). The wireless device may be associated with useraccounts for multiple services. The wireless device may be associatedwith multiple user accounts for a single service.

In the example depicted in FIG. 3, the device (e.g., smartphone 302) maybe associated with one or more user accounts, such as a cell phoneaccount (e.g., Sprint, Verizon), the user's social media account,streaming video service account, or television service (e.g., the user'shome cable-television subscription account).

A user account associated with a service may include permissions andaccess to content. For example, a user account associated with a home'scable-television subscription may include permissions to watch thetelevision channels that the home subscribes to, on-demand content (suchas videos and television shows), games, and other content.

A home's cable-television subscription may be associated with multipleuser accounts. For example, each member of the home may have anindividual account. Each individual account may include a user'stelevision preferences, links to the user's other accounts (e.g., socialmedia accounts), and more. The cable-television service provider may usethe individual's account information for providing a personalizedexperience for the user (e.g., recommending television shows,recommending movies, personalizing advertisements, or targetingadvertisements). An individual account may have certain accesslimitations (e.g., no pay-per-view, parental controls, contentrestrictions).

A set-top box (e.g., STB 113) may determine that another device (e.g.,smartphone 302) is within a certain range of the set-top box. Forexample, the set-top box may implement BLUETOOTH, Wifi, near-fieldcommunication (NFC), a transmitter, a beacon, or some other technologyfor detecting the presence of another device. The range 301 of theset-top box's detection may be limited to a room in a home (e.g., aliving room), an entire home, an office, a floor of an office building,or some other fixed boundary. The set-top box may determine that thedevice is within the range 301 of the set-top box when the device iswithin a threshold distance of the set-top box (e.g., within 20 feet).

The set-top box may detect another device by communicating back andforth with the device (e.g., pair with the device using BLUETOOTH).Alternatively or additionally, the set-top box may determine that thedevice is within the range 301 of the set-top box without communicatingback and forth with the device. For example, the device may be a keyfob,and the set-top box may determine that the keyfob is within the range301 of the set-top box.

In another embodiment, the set-top box may not directly detect thedevice, but may determine that the device is within a range 301. Forexample, the set-top box may use global-positioning system (GPS)coordinates of the device and the set-top box to determine that thedevice is within a certain range of the set-top box. Alternatively oradditionally, the STB may use some other method of determining therespective locations of the device and the set-top box to determinewhether the device is within a certain range of the set-top box.

In FIG. 3A, the device (e.g., smartphone 302) may come into the set-topbox's range 301. In one embodiment, the set-top box may determine thatthe device comes into the set-top box's range 301. In anotherembodiment, the device may determine that the device comes into theset-top box's range 301.

The device may receive an indication that the device came into theset-top box's range 301. The device may prompt the user as to whether toshare permissions and content access with the set-top box. A user mayhave the option to “remember” one or more set-top boxes (e.g., the STB113) to automatically connect with. In this manner, a device mayautomatically connect to and share permissions and content access withknown devices without prompting a user every time.

Similarly, the set-top box may require a confirmation before receivingmerged content access. For example, the set-top box may output a displayincluding a prompt indicating the detection of or connection with thedevice, and ask whether to receive merged access to content. Similarlyto the device (e.g., the smartphone 302), the set-top box may “remember”one or more visiting wireless devices (e.g., the smartphone 302) toautomatically connect with and receive merged content access.

For example, an on-screen verification process may allow a user toidentify how the device should interact with the set-top box. Forexample, the set-top box may output a display including a code thatappears on the television. The user may enter the code that appears onthe television into the device, thereby confirming that the user issharing permissions or merged content access to the set-top box. Inconfirming the sharing permissions or merged content access, the usermay specify what content or permissions should be granted to the set-topbox (e.g., differentiate between a set-top box at the user's home and aset-top box at the user's friend's home).

A server (e.g., the content server 106) may receive a notification thatthe device came into the set-top box's range 301. For example, thedevice may transmit to the server a message that the device and theset-top box paired via BLUETOOTH. In another example, the set-top boxmay transmit to the server a message that the device and the set-top boxpaired via BLUETOOTH. In another example, both the set-top box and thedevice may transmit to the server a message that the device and theset-top box paired via BLUETOOTH. As described earlier, the set-top boxand the device may communicate or detect each other or be detected usingother methods, any or all of which may trigger a message to the server.

As is described in more detail below, the server may grant access toadditional content in response to receiving a notification that thedevice is within the range 301 of the set-top box. For example, theserver may merge the content associated with the user accountsrespectively associated with the set-top box and the device. Forexample, the set-top box may be associated with a cable-television useraccount for Jane Doe, who lives at the home where the set-top box islocated. John Smith, who may live across town but frequently visit JaneDoe at her home, may own the device, which may be associated with JohnSmith's cable-television user account for his home across town. JaneDoe's cable subscription may include different channels than JohnSmith's cable subscription. In response to receiving notification thatJohn Smith is visiting Jane Doe, the server may provide, on Jane Doe'sset-top box, merged access to the content accessible to Jane Doe throughher cable subscription and to John Smith through his cable subscription.

Merged content associated with the user accounts may include access toaccounts with multiple services that the respective users subscribe to.For example, the user of the device may have Netflix, Amazon Prime, HuluPlus, and online cloud storage accounts, in addition to a cablesubscription. The set-top box, when receiving merged content associatedwith the user accounts respectively associated with the set-top box andthe device, may receive merged content associated with the services thatboth users have (e.g., merged content access of two different cablesubscription plans), and also receive access to content associated withother services that only one of the users have (e.g., only one of theusers have a Netflix subscription, but both the set-top box and thedevice receive access to the Netflix subscription). Additionally, mergedcontent associated with the user accounts may include access topreviously purchased content available on one or more services orapplications (e.g., access the user's previously purchased content oniTunes).

Alternatively or additionally, one or more connected devices may receiveadditional permissions and access to additional digital media or goods,such as applications, access to websites, shared premium access orcontent, or the like. For example, a tablet computer associated with thesame user account as a set-top box may receive access to additional appswhen the set-top box connects with a device (e.g., a smartphone)associated with a different user account than the set-top box.

Thus, one embodiment may include determining, by a computing deviceassociated with a first user account, that a wireless device associatedwith a second user account is proximate to the computing device, andreceiving, by the computing device, in response to determining that thewireless device is proximate to the computing device, merged access tocontent associated with the first and second user accounts.

Thus, one embodiment may include granting, by a server, to a mobiledevice, merged permissions and access to content associated with a firstaccount and a second account, in response to the mobile device detectinga beacon broadcast by a computing device.

In FIG. 3B, the device (e.g., smartphone 302) moved outside the range301 of the set-top box. Similarly as to what was described above inconnection with the device or the set-top box or both determining thatthe device is within the range 301 of the set-top box, the device or theset-top box or both may determine that the device is outside the range301 of the set-top box.

The server (e.g., the content server 106) may receive a notificationthat the device moved outside the set-top box's range 301. Similarly towhat was described above, the server may receive a notification of thedevice moving outside the set-top box's range 301 from the device, theset-top box, or both.

Thus, one embodiment may include determining, by the computing device,that the wireless device is not proximate to the computing device, anddenying, by the computing device, access to the permissions and thecontent associated with the second user account. Denying access to thepermissions and the content associated with the second user account mayinclude reverting, by the computing device, to providing access to onlythe permissions and the content associated with the first user account.

In some embodiments, a user may have the ability to revoke permissionsand content access while the device is within range 301 of the set-topbox (e.g., the set-top box may lose access to content in situationsother than when the device goes out of range 301 of the set-top box).

In FIG. 4, an example television program guide 400 is depicted fordisplaying merged content associated with multiple user accounts. In thedepicted example, the television program guide 400 displays the mergedcontent associated with John Smith and Jane Doe's cable-televisionsubscription accounts. A set-top box (e.g., the STB 113) may receive thetelevision program guide 400 from a server (e.g., the content server106), and display the television program guide 400 on a television(e.g., the television 112).

The left-most column 401 may include the television channels availableto view (in the depicted example: NBC, CNBC, USA, SyFy, Bravo). Themiddle columns 407 may include the various programs playing on thevarious available channels at different times (e.g., 6:00, 6:30, 7:00,7:30). The right-most column 408 may include an indication (e.g., name)of the subscriber whose access enabled the content to be available. Forexample, NBC 402 and USA 404 may be common across all cablesubscriptions, and therefore available through both John Smith and JaneDoe's cable-television subscription accounts. Therefore, John and Jane'snames are both listed in the column 408 next to NBC 402. By contrast,CNBC 403 may be only available on certain cable subscription plans,including the cable subscription plan that John Smith subscribes to, butnot the cable plan that Jane Doe subscribes to. Therefore, John's nameis listed in the column 408 next to CNBC 403. Similarly, SyFy 405 andBravo 406 may only be available on other cable subscription plans,including the cable subscription plan that Jane Doe subscribes to, butnot on the cable subscription plan that John subscribes to. Therefore,Jane's name is listed in the column 408 next to SyFy 405 and Bravo 406.Thus, because the set-top box receives merged permissions and access tothe content associated with both John Smith and Jane Doe'scable-television subscription accounts, the television program guide 400displays content available to both John Smith and Jane Doe.

Alternatively or additionally, the set-top box may display contentaccess in one or more additional manners. For example, the set-top boxmay display subscriber names on a different part of the screen, forexample in the corner of the screen when playing a channel, next to achannel's number and name when changing channels, on the screen of aremote control or a mobile device, or in another manner.

Alternatively or additionally, the set-top box receiving access to thecontent associated with the second user account (e.g., John Smith'scable-television subscription account) may include receiving permissionsand access to only some of the content associated with the second useraccount. For example, John Smith's cable-television subscription mayalso include access to MSNBC. Even if Jane Doe's cable-televisionsubscription does not include MSNBC, the set-top box may not receiveaccess to MSNBC when receiving access to content through John Smith'saccount. For example, a content provider or owner (e.g., owner orprovider of channel, movie, or television show) may not wish to have itscontent be shareable when a subscriber, licensee, or owner is visitinganother residence. For example, MSNBC may tell the cable-televisionprovider not to make MSNBC available to devices associated withnon-subscribers. In another example, a channel may be available, but nota certain program. For example, MSNBC may allow a certain show (e.g.,Morning Joe) to be viewed on a device associated with a non-subscriber,but not another show (e.g., Hardball). Alternatively or additionally,another entity may determine whether a show, channel, movie, or othercontent is available for sharing or not. Thus, content-sharingrestrictions may be broad (e.g., an entire channel) or narrow (e.g., aparticular show, a particular episode of a show, or a particular movie).

The shared content associated with the visitor's user account may be atype of content. For example, content-sharing restrictions may be basedon a channel—as discussed above. Alternatively or additionally, contentsharing may be limited to movies or television shows. Alternatively oradditionally, content sharing may be limited to only new programs,programs recently aired within a certain time, programs aired at leastan amount of time previously, reruns, or some other delineation ofcontent.

A user may have the option to select what content to share. For example,a user may only want to bring access to a certain show when visiting afriend's house. For example, John may want to watch a football game atJane's house, but not the cooking channel. Therefore, John may selectcertain shows (e.g., using a set-top box at John's house, a website,calling the cable company, an app on John's smartphone, or the like) toshare when John visits another's house. The selection of shared contentmay be location specific (e.g., John wants to bring football access toJane's house, but bring the cooking channel to Jeff's house). Theselection of shared content may be time specific (e.g., if John isvisiting at night, bring football, but if John is visiting in themorning, bring the cooking channel).

A user may be restricted to sharing a certain number of channels or acertain number of shows or a certain number of movies in a certain timeperiod. For example, a subscriber account may be limited to sharing twomovies per week. In another example, a subscriber may be limited toselecting three channels at a time for sharing. Alternatively oradditionally, a subscriber may be limited to adjusting sharing settingsonly a certain number of times within a certain time period (e.g., oncea week, once a month, twice every three months, or some other timeperiod).

Thus, in one embodiment, a computing device receiving access to contentassociated with a second user account may include the computing devicereceiving permissions and access to only some of the content associatedwith the second user account. Some of the content associated with thesecond user account that the computing device receives access to mayinclude a type of content.

FIG. 5 depicts an example graphical user interface (GUI) that a set-topbox (e.g., STB 113) may output to a display (e.g., television 112) whenthe set-top box determines that the device (e.g., smartphone 302) hasleft the proximity of the set-top box.

The set-top box may monitor the users that are in the proximity of theset-top box. The set-top box may use similar methods for monitoring theusers that are in proximity to the set-top box as the set-top box usesfor initially detecting one or more users in the proximity of theset-top box (e.g., BLUETOOTH, Wifi, etc.).

The television 112 may display a video program 502. The video program502 may be a video program 502 for which content access is enabledbecause of the cable subscription of a user associated with the set-topbox. Alternatively or additionally, the video program 502 may be a videoprogram 502 for which content access is enabled because of the cablesubscription of a user not associated with the set-top box, but that theset-top box has determined is within a threshold proximity of theset-top box, as described above. In the depicted example, the videoprogram 502 is playing on CNBC 403, which in the depicted example isonly available through the access of John Smith, a user who is visitingJane Doe. The set-top box may be associated with Jane Doe, but may havedetermined that John Smith is visiting, and therefore the set-top boxmay have received merged content access to content associated with JaneDoe and John Smith's respective cable subscription accounts.

Partway through the playback of the video program 502, John Smith maydecide to leave the proximity of the set-top box. For example, JohnSmith may receive a call on his mobile phone, and step out of the roomwhere the set-top box is located. Or potentially John Smith got calledinto work, and had to leave Jane Doe's house in the middle of the show.For whatever reason, John Smith left the proximity of the set-top box.The set-top box may determine the departure of John Smith, and maydisplay the depicted GUI in response.

The television 112 may display the name of the show currently playing504. In the depicted example, the name 504 of the video program 502 is“Nightly News Now with Bob Jones.” The television 112 may display thechannel that the video program 502 is currently playing on—in thedepicted example, CNBC 403—with the name 504 of the video program 502.

The set-top box may pause the playback of the video program 502 in thebackground, and output to the display a pop-up window 506. In thedepicted example, Bob Jones may have been reporting on the latest sportsfishing events happening in Alaska when John Smith left the room. Theset-top box may have determined that John Smith left the room, pausedthe playback of the video program 502 in response to determining thatJohn Smith left the room, determined that the channel currently playingCNBC 403 is a channel that the set-top box had permissions and contentaccess to because of the permissions and content access of John Smith,determined that the remaining user or users do not have permissions andcontent access to view the current video program 502, and displayed aprompt 506 that prompts the remaining user or users to purchase accessto the channel.

The prompt 506 may include a message indicating that the user throughwhom the set-top box had access to the playing video program 502 is nolonger in the proximity of the set-top box. The prompt 506 may include aprompt that prompts the remaining user or users whether or not topurchase access to the content. For example, the prompt 506 may offerthe remaining user or users the option to subscribe to a specificchannel, such as the channel CNBC 403 that Jane Doe and John Smith werewatching. Alternatively or additionally, the prompt 506 may offer theremaining user or users the option to purchase access to a specificshow, such as a certain series. The specific show or series may be thecurrently playing video program 502. The prompt 506 may offer theremaining user or users the option to purchase access to a particularepisode of a certain series, such as an episode of the certain seriesthat is the currently playing video program 502.

The purchased access may include an add-on to the purchasing user'saccount. The purchased access may alternatively or additionally includealtering the subscription or plan that the purchasing user was signed upfor at the time of the purchase. The purchased access may include videoon demand (VOD) content. The purchased access may include downloadablecontent. The purchased access may add additional rights to thepurchasing user's account. For example, the purchasing user may haveaccess to view purchased content on another device, such as a mobilephone or a tablet. The purchased access may be for a certain duration oftime (e.g., one month or six months) or the purchased access may beindefinitely. The purchased access may expire after a certain number ofviews (e.g., one view, three views, etc.). The different features orpermissions included with the purchased access may include differentprices. A price of purchasing access may depend on another feature orpermission already associated with the purchasing user's account, oralternatively or additionally the price may depend on another feature orpermission associated with the account of the user through whom theset-top box originally received access to the content.

The prompt 506 may include a method for the remaining user to accept orreject the option to purchase access to the currently playing videoprogram 502. For example, the SUBSCRIBE button 514, when selected, maysubscribe the selecting user to the currently playing channel for theindicated amount of time. The user may be subscribed indefinitely (e.g.,until the user cancels), or alternatively may only be subscribed for afixed period of time (e.g., one month or six months). In someembodiments, the user may select a subscription option (e.g., a periodof time) using, for example, a radio button 518. If multiple users arestill watching the television (e.g., within the proximity of the STB113), then the set-top box may, in response to receiving an indicationto purchase access to content, display a prompt that allows theselection of a user account with which to purchase content. For example,if John Smith, Jane Doe, and Frank O'Connor were watching televisiontogether, the access to the currently playing video content beingreceived through John Smith's account, and if John Smith left in themiddle of the program, the set-top box may, in response to the selectionof the SUBSCRIBE button 514, display an additional prompt asking whetherto purchase access to the currently playing video content on Jane Doe'saccount, on Frank O'Connor's account, or both. Access to the purchasedcontent may then be added to the selected account.

If the user elects to purchase permissions or content access, a contentservice provider may provide a reward or incentive to the user whoseaccount originally was used to access the content. For example, if JaneDoe and John Smith were watching CNBC on Jane Doe's set-top box thatreceived merged content access to Jane Doe and John Smith's respectivecable subscription accounts, where CNBC was part of John Smith's cablesubscription account but not part of Jane Doe's cable subscriptionaccount, then John Smith left, then Jane Doe purchased access to CNBC,John Smith may receive a reward or incentive. For example, a reward orincentive may include an account credit, access to an additional channelor channels, access to additional VOD content, access to downloadablecontent, more sharing permissions or rights, a statement credit, a giftcard, a cash reward, or some other reward or incentive. The reward orincentive may be associated with the content that the purchasing userpurchased after viewing through a friend's access rights. For example,John Smith may receive a CNBC t-shirt or mug after Jane Doe purchasedaccess to CNBC. The purchasing user may also receive an incentive orreward.

Alternatively, when presented with the prompt 506 to purchase access tothe currently playing video program 502, the user may select the NOTHANKS button 516, indicating that the user does not desire to purchaseaccess to the content. The set-top box may then determine or receive anindication of whether the user may continue to watch the currentlyplaying video program 502. In the depicted example, if Jane Doe selectsthe NO THANKS button 516, the prompt 506 would simply minimize, and JaneDoe may watch the remaining 35 minutes and 43 seconds of Nightly NewsNow with Bob Jones.

The television 112 may display an indication 508 of the users remainingin the proximity of the set-top box. In the depicted example, Jane Doeis the only user still in the proximity of the set-top box after JohnSmith left the proximity of the set-top box. The indication 508 maydynamically update as users come and go. That is, the set-top box mayconstantly be receiving updated permissions associated with the userscurrently in proximity to the set-top box, and the indication 508 mayaccordingly update according to the users whose permissions and contentaccess rights the set-top box currently has access through.

The television 112 may display a timeline 510 that indicates the currentprogress of the currently playing video program 502. In the depictedexample, Nightly News Now with Bob Jones has a runtime of 60 minutes.John Smith left the proximity of the set-top box when the video program502 was at time 24 minutes and 17 seconds, which is displayed on thetimeline 510.

The set-top box may continue to receive access to the currently playingcontent for a time after the user with access to the currently playingvideo program leaves the proximity of the set-top box. For example, theset-top box may receive access for a time period at least as long as theremainder of the currently playing video program 502. In the depictedexample, Jane Doe may be granted access to view the remainder of thecurrently playing Nightly News Now with Bob Jones. Alternatively, theset-top box may receive continued access for a different time period(e.g., 15 minutes). Alternatively, the set-top box may not receivecontinued access after the user with access leaves the proximity of theset-top box. Whether or not the set-top box receives continued access,or the amount of time of that continued access, may depend onpermissions or content associated with the accounts associated with theuser profiles of the user with access or the user without access or acombination thereof. For example, John Smith's cable subscription planmay allow continued access for shared content until the end of thecurrently playing video program. Therefore, Jane Doe may be grantedaccess to watch the remainder of Nightly News Now with Bob Jones, thecurrently playing video program 502, even though John Smith left beforethe currently playing video program 502.

The set-top box may receive continued access for a combination of thedescribed methods. For example, the set-top box may receive continuedaccess for watching the remainder of the currently playing video program502 within a certain time frame. For example, if there are 35 minutesremaining in the video program 502, the set-top box may receivecontinued access until either the video program 502 finishes playing orone hour passes.

Different content—such as specific channels, shows, etc.—may havedifferent restrictions or requirements for continued access.

The set-top box may continue to receive access to the currently playingvideo program 502 even after power cycling (e.g., turning off theset-top box and turning back on the set-top box). Alternatively, accessmay end when the set-top box or the television 112 is powered off.

The set-top box may receive continued access to all of the departeduser's permissions and content access, or may receive continued accessto only a part of the departed user's permissions and content access.The continued access to all or only a part of the departed permissionsand content access may be in accordance with the continued access to thecurrently playing video program 502, described above.

The television 112 may display an indication 512 of the amount of timethat the set-top box has continued access. In the depicted example, theset-top box may be 24 minutes and 17 seconds into playing the currentlyplaying video content 502, which is 60 minutes long. In the depictedexample, the set-top box receives continued access until the end of thecurrently playing video program, and therefore the indication 512 of theamount of time that the set-top box has continued access is 35 minutesand 43 seconds.

Thus, in one embodiment, the computing device may lose access to thepermissions and the content associated with a second user account aftera timeout period. The content associated with the second user accountmay include a video program, and the timeout period is at least as longas the remainder of the video program.

Alternatively or additionally, a method may include determining that thecontent associated with the second user account includes currentlyplaying content, determining that the first user account does not havepermissions or access to the currently playing content, and displaying aprompt for the first user account to purchase access to the currentlyplaying content. The second user account may receive a reward inresponse to the first user account purchasing access to the currentlyplaying content.

The set-top box may have restricted functions during playback of a videoprogram through continued access. For example, if the set-top boxincludes DVR capability, the set-top box may not be able to record acurrently playing program. Alternatively or additionally, the DVR maynot be allowed to perform other functions, such as pause, fast forward,rewind, or some combination thereof.

A user profile associated with a visiting wireless device (e.g.,smartphone 302) may, in response to sharing content with a differentcomputing device (e.g., STB 113) later alter playback of content ondevices associated with the user profile. For example, after John Smithleaves Jane Doe's house and returns to his home, John Smith's wirelessdevice may no longer be in proximity to Jane Doe's set-top box. WhenJohn Smith returns home, if John Smith wishes to watch the remainder ofa video program that he and Jane Doe watched in part at Jane Doe'shouse, John Smith's set-top box may automatically resume playback whereJane Doe's set-top box left off when John Smith left Jane Doe's house.Even if Jane Doe continued watching the remainder of the program (e.g.,accessing the content during a timeout period), John Smith's set-top boxmay resume playback of the content at the point that John Smith left,based on the time that John Smith's wireless device left the thresholdproximity of Jane Doe's set-top box.

FIG. 6 depicts a flow diagram of illustrative logic between a set-topbox (e.g., STB 113), a device (e.g., smartphone 302, tablet, iPod touch,Google Glass, wearable device), and a server (e.g., content server 106)for granting, to the set-top box, additional permissions and access tocontent associated with a user account or user profile associated withthe device, by the server.

In step 602, the set-top box may transmit a beacon that is received bythe device. For example, the device may detect a Wifi signal broadcastby the device. The beacon may include information about the set-top box,such as the location, one or more user profiles associated with theset-top box, and the like.

In step 604, the device may transmit to the server a confirmation ofreceiving the beacon broadcast by the set-top box in step 602. Forexample, the device may transmit the confirmation over a cell network.Alternatively or additionally, the device may transmit the confirmationto the server over the Wifi signal provided by the set-top box. Theconfirmation may include information associated with the set-top box,such as the information that may be included in the set-top box's beacontransmitted in step 602. The confirmation may include information aboutthe device, such as the location, one or more user profiles associatedwith the device, and the like.

After receiving the confirmation of the device receiving the beacon fromthe set-top box, the server may determine whether to grant access toadditional content based on receiving the confirmation. For example, theserver may determine whether the one or more user profiles associatedwith the device are the same as the one or more user profiles associatedwith the set-top box. Alternatively or additionally, the server maydetermine whether the one or more user profiles associated with thedevice are associated with the one or more user profiles associated withthe set-top box. For example the server may determine whether the userof the device is the same as the user associated with the set-top box.If the user associated with the device is not the same as the userassociated with the set-top box, the server may grant additional accessto the set-top box.

In step 606, the server may grant access to permissions or content basedon permissions or content access rights of the user associated with thedevice. For example, if the user of the device has a cable subscriptionwith access to different content (e.g., channels, VOD content) than thecable subscription of the user associated with the set-top box, theserver may grant to the set-top box permissions and access rights to thecontent different than the content that the cable subscription of theuser associated with the set-top box. The server may grant access to allof the different content, or may grant access to some of the differentcontent, or the server may grant access to none of the differentcontent.

In step 608, the set-top box may request content from the server. Therequested content may be content that the set-top box has permissions oraccess rights to view. The requested content may be content that theset-top box has permissions or access rights to view based on the rightsof the user profile associated with the set-top box, the rights of theuser profile associated with the device, or the merged rights of theuser profiles associated with the set-top box and the device.

The server may confirm that the set-top box has permissions or accessrights to access the requested content. In step 610, the server maytransmit the requested content to the set-top box.

In step 612, the set-top box may request a recommendation for content toview. A content service provider may provide content recommendations toa user. For example, a content recommendation may be based on a user'sviewing history (e.g., content that the viewer has viewed in the past),based on content that the user has indicated interest in via a socialnetwork, content viewed or liked by other viewers with similar tastes orviewing histories to the user, or the like. The content server maydetermine a merged content recommendation based on the user profileassociated with the device and the user profile associated with theset-top box. For example, if the server would normally recommend shows Aand B to the user associated with the set-top box, and if the serverwould normally recommend shows B and C to the user associated with thedevice, then the server may merge those recommendations, recommendingshow B when the device is receiving the beacon (e.g., in the proximity)of set-top box. Similarly, the server may merge recommendations based ondislikes of one or more users. In step 614, the server may transmit themerged recommendation to the set-top box.

Thus, in one embodiment, a method may include aggregating informationassociated with a first user account and a second user account, andmaking a recommendation based on the aggregated information.

In some embodiments, a user may have the ability to not share the user'sviewing history for purpose of building content recommendations.Additionally, a user may selectively share the user's viewing historyfor purpose of building content recommendations (e.g., include someshows in the shared or merged viewing history, and exclude other showsin the shared or merged viewing history).

In some embodiments, the users may have the option to filter contentbased on the merged viewing histories of the users. For example, theusers may have the option to filter the available content to includeonly content that neither user has previously viewed. Thus, multipleusers may easily find content that none of the users have previouslyseen.

Alternatively or additionally, the server may, in conjunction with themerged permissions, adjust the advertisements that are received by theset-top box. For example, if three people who live in separate places,each with their own cable subscriptions that include CNBC, are watchingCNBC together at a single place, the server may require that a fewernumber of advertisements are played during the playback of videocontent.

Thus, one embodiment may include transmitting, by the server, contentassociated with both the first and second user accounts, and reducing anumber of advertisements to be displayed during playback of the contentassociated with the first and second user accounts.

In another example, the server may deliver advertisements based on thepreferences listed in a user profile (e.g., targeted advertising), andthe server may merge the preferences of all the current viewers of thedisplay device attached to the set-top box in order to deliver targetedadvertising that is relevant to all the current viewers. For example, ifJohn Smith indicated on his social media account that he likes puppiesand cupcakes, but dislikes kittens, and Jane Doe indicated on her socialmedia account that she likes soldiers and cupcakes, but dislikespuppies, then the server may increase the number of advertisementsrelated to cupcakes, while filtering or decreasing the number ofadvertisements related to puppies and kittens.

Alternatively or additionally, the server may filter content based onother merged elements from the user accounts associated with the set-topbox and the one or more devices in proximity to the set-top box. Forexample, the server may filter available content based on parentalcontrols or other content-filtering applied to one or more of the useraccounts. For example, if John Smith is visiting Jane Doe's house, andJohn Smith's cable subscription is set to disallow R-rated movies frombeing played using his account, then the set-top box, when receivingmerged permissions from Jane Doe and John Smith's accounts, may onlydisplay non-R-rated movies, even if Jane Doe's account does not includea restriction against R-rated movies. In other words, the mergedpermissions may include the most restricted subset of content common toall merged accounts.

Thus, in one embodiment, granting the merged permissions may includedetermining, by the server, a content restriction placed on a seconduser account, and applying the content restriction to a first useraccount.

Alternatively, the merged permissions may include the most expansivecombination of content common to all merged accounts. For example, JohnSmith's smartphone may receive merged permissions while he is inproximity to Jane Doe's set-top box. Even though John Smith's accountnormally does not allow the viewing of R-rated movies, John Smith'ssmartphone may receive access to R-rated movies through Jane Smith'saccount while his smartphone is receiving merged permissions while he isat Jane Smith's house.

The server may occasionally require a confirmation of the device'scontinued proximity to the set-top box. For example, in step 616, theserver may request from the device a confirmation that the device is inproximity to the set-top box. The device may determine whether thedevice is receiving the beacon broadcast by the set-top box. If thedevice determines that the device is receiving the beacon broadcast bythe set-top box, then the device may transmit a confirmation of thedevice's continued proximity to the set-top box. Alternatively, if thedevice determines that the device is no longer receiving the beaconbroadcast by the set-top box (e.g., because the device left theproximity of the set-top box), then the device may transmit, as in step618, an indication that the device is no longer receiving the beaconbroadcast by the set-top box.

Upon determining that the device is no longer receiving the beaconbroadcast by the set-top box (e.g., the device is no longer in proximityto the set-top box), the server may revoke access to the contentassociated with the user profile associated with the device. The servermay revoke access immediately. The server may revoke access to all ofthe content associated with the user profile associated with the device,or alternatively only a subset of the content associated with the userprofile associated with the device. The set-top box's permissions andcontent access rights may revert to receiving access to only thepermissions and the content associated with the user account associatedwith the set-top box.

Thus, in one embodiment, a method may include requesting, by a server, aconfirmation of a mobile device detecting the beacon broadcast by acomputing device, receiving, by the server, a message from the mobiledevice including an indication that the mobile device no longer isdetecting the beacon broadcast by the computing device, and revoking, bythe server, for the computing device, the merged permissions and accessto the content associated with a first account and a second account.

Alternatively or additionally, as described above, the set-top box mayreceive some kind of timeout period to continue to access some content,some kind of offer to purchase access to the content, or some othermethod for continued access. For example, if the device determines thatthe device again is receiving the beacon broadcast by the set-top box(e.g., the device is again in proximity to the set-top box), then thedevice may transmit a confirmation of continued receipt of the beacon,and the server may again grant to the set-top box access to content.

FIG. 7 depicts a flow diagram of different illustrative logic between aset-top box (e.g., STB 113), a device (e.g., smartphone 302, tablet,iPod touch, Google Glass, wearable device), and a server (e.g., contentserver 106) for granting, to the set-top box, additional permissions andaccess to content associated with a user account or user profileassociated with the device, by the server.

In step 702, the set-top box may connect with the device. For example,the set-top box and the device may pair with each other via BLUETOOTH,Wifi, NFC, or some other two-way communication method, as describedearlier. After connecting, the set-top box may transmit a confirmationof the connection to the server. Alternatively or additionally, thedevice may transmit a confirmation of the connection to the server. Theserver may require receipt of confirmation from one or both of theset-top box and the device before granting merged access to content tothe set-top box.

In step 704, the set-top box may receive permission to access content(e.g., the server may grant merged access to content or permission toaccess content, as described above). The set-top box may receive theaccess to the content in response to the connection in step 702 of theset-top box to the device. Alternatively or additionally, the server maygrant merged access to content to the device. Alternatively oradditionally, the server may grant merged content access to one or moredevices associated with the user profile associated with the set-top boxor to one or more devices associated with user profile associated withthe device.

Alternatively, the server may only grant merged permission or access toone or more devices at a location other than the location associatedwith the user profile associated with that device. For example, theserver may determine that two devices (e.g., smartphones belonging to amarried couple) are at a location other than the home address associatedwith the user profiles associated with the two devices (e.g., themarried couple is visiting a friend's house). The server may then grantmerged content access to the two smartphones and the set-top box at thelocation other than the home address (e.g., the friend's set-top box),but not to one or more additional devices not located at that locationother than the home address (e.g., a tablet left at the married couple'shome may not receive additional content access).

In step 706, the set-top box may request content from the server, asdescribed in connection with FIG. 6. In step 708, the set-top box mayreceive, in response to the request, the content from the server (e.g.,the server may transmit content, as described in connection with FIG.6).

In step 710, the set-top box may disconnect from the device. Forexample, the device may leave the proximity of the set-top box, and theBLUETOOTH, Wifi, NFC, or other connection may disconnect. Therefore, instep 712, as described in connection with FIG. 6, the set-top box maylose permission to access the content (e.g., the server may revokeaccess to the set-top box, the device, or another device's additionalcontent).

Thus, in one embodiment, a method may include receiving, at a server,from a mobile device associated with a first account, acknowledgement ofthe mobile device detecting a beacon broadcast by a computing deviceassociated with a second account, and granting, by the server, to thecomputing device, merged permissions and access to content associatedwith the first account and the second account, in response to the mobiledevice detecting the beacon broadcast by the computing device.

Alternatively or additionally, a method may include connecting, by acomputing device associated with a first profile, to a mobile deviceassociated with a second profile, and receiving, by the computingdevice, merged permissions including permissions associated with thefirst and second profiles and merged access to content including contentassociated with the first and second profiles. The method may includedisplaying, by the computing device, a list of content accessible to thecomputing device including the merged access to content. The method mayinclude disconnecting, by the computing device, from the mobile device,and losing, by the computing device, the merged permissions and themerged access to content in response to disconnecting from the mobiledevice.

FIG. 8 depicts a flow diagram of illustrative logic between a set-topbox (e.g., STB 113), a device (e.g., smartphone 302, tablet, iPod touch,Google Glass, wearable device), and a server (e.g., content server 106)for gifting content from one user to another.

In one example, a user may wish to give a friend access to content. Theuser may give temporary (e.g., short-term) access, or permanent access(e.g., purchase a license or rights for another). Gifting access tocontent may be associated with granting additional or merged contentaccess.

For example, a user may be visiting a friend, and the user and thefriend are watching, on the friend's television, content that the userhas access to through the user's cable subscription. If the user decidesto leave in the middle of the content, rather than the friend losingaccess to the content without finishing watching the content, the usermay wish to gift to the friend access to the content.

In another example, the user may wish to give a friend access to theuser's cable subscription for a period of time. For example, if the useris going out of the country for a month, and the user will not be usingthe user's cable subscription, the user may gift the user's cablesubscription to a friend for the period of time that the user is out ofthe country. The friend may receive merged content access for theduration of the gift (e.g., the month that the user is out of thecountry).

In step 802, the device may transmit a gift request to the server. Thegift request may include an identifier associated with each of the giverand the recipient (e.g., name, phone number, address, email address,etc.), an identification of the content, or a method for purchase (e.g.,credit card, gift card, online payment service, a charge to the giver'scable bill, etc.). In some examples, a user's cable subscription mayallow for a certain number of gifts within a certain time period. Forexample, a cable subscription may allow a user to gift five televisionshows and two movies to a friend each month. A gift request may includeother information.

The server may authenticate the information transmitted in the giftrequest. In step 804, the server may transmit a confirmation that thegift request and the information in the gift request are valid.

In step 806, the server may grant, to the set-top box, access to thegifted content. In step 808, the set-top box may request playback of thegifted content. In step 810, the server may transmit, to the set-topbox, for playback the gifted content.

In one example, the user profile associated with the set-top box mayshare with another user the gifted content. For example, if the owner ofthe set-top box goes to a different friend's home, the differentfriend's set-top box may receive merged permissions and access tocontent including the gifted content.

Thus, one embodiment may include receiving, by a server, a message froma mobile device including an indication of a computing device requestinga grant of permissions and access for the computing device to at leastpart of the content associated with a second account, and updating, bythe server, the permissions and the access to content associated with afirst account to include the at least part of the content associatedwith the second account.

One or more embodiments may alternatively or additionally include thefeature of granting, to the wireless device, permission to remotelycontrol the computing device. For example, a set-top box that detects adevice associated with a different user account than the set-top boxmay, in addition to receiving merged content access rights to thecontent associated with the user accounts respectively associated withthe set-top box and the device may grant the device rights orpermissions to act as a remote control device to control the set-topbox.

The permission for the device to act as a remote control device tocontrol the set-top box may be limited or restricted to certain featuresor functions. For example, the device may only have permissions toadjust the volume, brightness, pause, rewind, or fast forward.Alternatively or additionally, the device may be limited to adjustingsettings while a display attached to the set-top box is displayingcontent received through the permissions of the user account associatedwith the device. Alternatively or additionally, the device may berestricted to acting as a remote control device during the time thedevice is in the proximity of the set-top box.

Thus, in one embodiment, the permission to remotely control thecomputing device may be restricted to controlling the computing devicewhile the computing device is accessing the content associated with thesecond user account.

The sharing of content access and permissions as described herein may beapplied to any location that a user visits outside of the user's home.For example, if a user visits a friend's home, a restaurant, a school, ahotel, a resort, an office, a bar, a boat, or another location, the usermay receive access at that location to some or all of the contentavailable to the user through the user's subscription. The access to thecontent may be limited or restricted based on the location (e.g.,geographic restrictions), characteristics of the location (e.g., privateor public), a subscription of the user or a subscription at the location(e.g., some subscriptions may not be combinable, while others may becombinable in part, while others may be combinable in full), or someother factor.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. While illustrative systems and methods as describedherein embodying various aspects of the present disclosure are shown, itwill be understood by those skilled in the art, that the disclosure isnot limited to these embodiments. Modifications may be made by thoseskilled in the art, particularly in light of the foregoing teachings.For example, each of the features of the aforementioned illustrativeexamples may be utilized alone or in combination or subcombination withelements of the other examples. For example, any of the above describedsystems and methods or parts thereof may be combined with the othermethods and systems or parts thereof described above. For example, oneof ordinary skill in the art will appreciate that the steps illustratedin the illustrative figures may be performed in other than the recitedorder, and that one or more steps illustrated may be optional inaccordance with aspects of the disclosure. It will also be appreciatedand understood that modifications may be made without departing from thetrue spirit and scope of the present disclosure. The description is thusto be regarded as illustrative instead of restrictive on the presentdisclosure.

It is noted that various connections are set forth between elements inthe following description. These connections are described in generaland, unless specified otherwise, may be direct or indirect; thisspecification is not intended to be limiting in this respect.

1. A method comprising: receiving data indicating one or more contentitems accessible, by a mobile device, based on a first permissionassociated with the mobile device; determining, by a first computingdevice and based on a signal from a second computing device, a proximityof the mobile device to the second computing device; and causing, by thefirst computing device and based on the determined proximity, output ofan indication that the second computing device can access the one ormore content items indicated by the data, wherein the one or morecontent items are inaccessible, by the second computing device, based ona second permission associated with the second computing device.
 2. Themethod of claim 1, further comprising: determining a content restrictionassociated with the mobile device; and applying, to the second computingdevice and while the second computing device can access the one or morecontent items, the content restriction.
 3. The method of claim 1,wherein determining the proximity further comprises receiving, by thefirst computing device, an indication that the mobile device detected abeacon output by the second computing device.
 4. The method of claim 1,further comprising: based on receiving, by the first computing device,an indication that a threshold period of time has elapsed since themobile device was within a threshold proximity of the second computingdevice, causing output of an indication that the second computing devicecannot access the one or more content items.
 5. The method of claim 1,further comprising: determining, based on a time associated with themobile device leaving a threshold proximity of the second computingdevice, a remaining amount of time that the second computing device willbe permitted access to the one or more content items; and causingoutput, via the second computing device, of an indication of theremaining amount of time.
 6. The method of claim 1, further comprising:causing, by the first computing device, the mobile device to output arequest for a user of the mobile device to confirm that the one or morecontent items are shareable with the second computing device.
 7. Themethod of claim 1, further comprising: receiving, by the first computingdevice and from the mobile device, data indicating that a user of themobile device confirms that the one or more content items are shareablewith the second computing device.
 8. The method of claim 1, furthercomprising: receiving, by the first computing device, an indication thatthe mobile device is within a threshold proximity of a third computingdevice; and sending, to the third computing device, a time, in playbackof a content item of the one or more content items, corresponding to amost-recent time that the mobile device was within the thresholdproximity of the second computing device.
 9. The method of claim 1,wherein the data indicates that the one or more content items can beshared, by the mobile device, based on a determined time period.
 10. Themethod of claim 1, wherein the data indicates that the one or morecontent items can be shared, by the mobile device, based on a determinedlocation of the mobile device.
 11. An apparatus comprising: one or moreprocessors; and memory storing instructions that, when executed by theone or more processors, cause the apparatus to: receive data indicatingone or more content items accessible, by a mobile device, based on afirst permission associated with the mobile device; determine, based ona signal from a second computing device, a proximity of the mobiledevice to the second computing device; and cause, based on thedetermined proximity, output of an indication that the second computingdevice can access the one or more content items indicated by the data,wherein the one or more content items are inaccessible, by the secondcomputing device, based on a second permission associated with thesecond computing device.
 12. The apparatus of claim 11, wherein theinstructions, when executed by the one or more processors, cause theapparatus to: determine a content restriction associated with the mobiledevice; and apply, to the second computing device and while the secondcomputing device can access the one or more content items, the contentrestriction.
 13. The apparatus of claim 11, wherein the instructions,when executed by the one or more processors, cause the apparatus to:receive an indication that the mobile device detected a beacon output bythe second computing device.
 14. The apparatus of claim 11, wherein theinstructions, when executed by the one or more processors, cause theapparatus to: receive an indication that a threshold period of time haselapsed since the mobile device was within a threshold proximity of thesecond computing device; and cause output of an indication that thesecond computing device cannot access the one or more content items. 15.The apparatus of claim 11, wherein the instructions, when executed bythe one or more processors, cause the apparatus to: determine, based ona time associated with the mobile device leaving a threshold proximityof the second computing device, a remaining amount of time that thesecond computing device will be permitted access to the one or morecontent items; and cause output, via the second computing device, of anindication of the remaining amount of time.
 16. The apparatus of claim11, wherein the instructions, when executed by the one or moreprocessors, cause the apparatus to: cause output, via the mobile device,of a request for a user of the mobile device to confirm that the one ormore content items are shareable with the second computing device. 17.The apparatus of claim 11, wherein the instructions, when executed bythe one or more processors, cause the apparatus to: receive, from themobile device, data indicating that a user of the mobile device confirmsthat the one or more content items are shareable with the secondcomputing device.
 18. The apparatus of claim 11, wherein theinstructions, when executed by the one or more processors, cause theapparatus to: receive an indication that the mobile device is within athreshold proximity of a third computing device; and send, to the thirdcomputing device, a time, in playback of a content item of the one ormore content items, corresponding to a most-recent time that the mobiledevice was within the threshold proximity of the second computingdevice.
 19. The apparatus of claim 11, wherein the data indicates thatthe one or more content items can be shared, by the mobile device, basedon a determined time period.
 20. The apparatus of claim 11, wherein thedata indicates that the one or more content items can be shared, by themobile device, based on a determined location of the mobile device. 21.A non-transitory computer-readable medium storing instructions that,when executed, cause: receiving data indicating one or more contentitems accessible, by a mobile device, based on a first permissionassociated with the mobile device; determining, by a first computingdevice and based on a signal from a second computing device, a proximityof the mobile device to the second computing device; and causing, by thefirst computing device and based on the determined proximity, output ofan indication that the second computing device can access the one ormore content items indicated by the data, wherein the one or morecontent items are inaccessible, by the second computing device, based ona second permission associated with the second computing device.
 22. Thenon-transitory computer-readable medium of claim 21, wherein theinstructions, when executed, further cause: determining a contentrestriction associated with the mobile device; and applying, to thesecond computing device and while the second computing device can accessthe one or more content items, the content restriction.
 23. Thenon-transitory computer-readable medium of claim 21, wherein theinstructions, when executed, further cause: receiving, by the firstcomputing device, an indication that the mobile device detected a beaconoutput by the second computing device.
 24. The non-transitorycomputer-readable medium of claim 21, wherein the instructions, whenexecuted, further cause: receiving, by the first computing device, anindication that a threshold period of time has elapsed since the mobiledevice was within a threshold proximity of the second computing device;and causing output of an indication that the second computing devicecannot access the one or more content items.
 25. The non-transitorycomputer-readable medium of claim 21, wherein the instructions, whenexecuted, further cause: determining, based on a time associated withthe mobile device leaving a threshold proximity of the second computingdevice, a remaining amount of time that the second computing device willbe permitted access to the one or more content items; and causingoutput, via the second computing device, of an indication of theremaining amount of time.
 26. The non-transitory computer-readablemedium of claim 21, wherein the instructions, when executed, furthercause: causing, by the first computing device, the mobile device tooutput a request for a user of the mobile device to confirm that the oneor more content items are shareable with the second computing device.27. The non-transitory computer-readable medium of claim 21, wherein theinstructions, when executed, further cause: receiving, by the firstcomputing device and from the mobile device, data indicating that a userof the mobile device confirms that the one or more content items areshareable with the second computing device.
 28. The non-transitorycomputer-readable medium of claim 21, wherein the instructions, whenexecuted, further cause: receiving, by the first computing device, anindication that the mobile device is within a threshold proximity of athird computing device; and sending, to the third computing device, atime, in playback of a content item of the one or more content items,corresponding to a most-recent time that the mobile device was withinthe threshold proximity of the second computing device.
 29. Thenon-transitory computer-readable medium of claim 21, wherein the dataindicates that the one or more content items can be shared, by themobile device, based on a determined time period.
 30. The non-transitorycomputer-readable medium of claim 21, wherein the data indicates thatthe one or more content items can be shared, by the mobile device, basedon a determined location of the mobile device.
 31. A system comprising:a first computing device; a second computing device; and a mobiledevice, wherein the first computing device comprises: one or more firstprocessors; and first memory storing first instructions that, whenexecuted by the one or more first processors, cause the first computingdevice to: receive data indicating one or more content items accessible,by the mobile device, based on a first permission associated with themobile device; determine, based on a signal from the second computingdevice, a proximity of the mobile device to the second computing device;and cause, based on the determined proximity, output of an indicationthat the second computing device can access the one or more contentitems indicated by the data, wherein the one or more content items areinaccessible, by the second computing device, based on a secondpermission associated with the second computing device, wherein thesecond computing device comprises: one or more second processors; andsecond memory storing second instructions that, when executed by the oneor more second processors, cause the second computing device to: sendthe signal to the first computing device.
 32. The system of claim 31,wherein the first instructions, when executed by the one or more firstprocessors, cause the first computing device to: determine a contentrestriction associated with the mobile device; and apply, to the secondcomputing device and while the second computing device can access theone or more content items, the content restriction.
 33. The system ofclaim 31, wherein the first instructions, when executed by the one ormore first processors, cause the first computing device to: receive anindication that the mobile device detected a beacon output by the secondcomputing device.
 34. The system of claim 31, wherein the firstinstructions, when executed by the one or more first processors, causethe first computing device to: receive an indication that a thresholdperiod of time has elapsed since the mobile device was within athreshold proximity of the second computing device; and cause output ofan indication that the second computing device cannot access the one ormore content items.
 35. The system of claim 31, wherein the firstinstructions, when executed by the one or more first processors, causethe first computing device to: determine, based on a time associatedwith the mobile device leaving a threshold proximity of the secondcomputing device, a remaining amount of time that the second computingdevice will be permitted access to the one or more content items; andcause output, via the second computing device, of an indication of theremaining amount of time.
 36. The system of claim 31, wherein the firstinstructions, when executed by the one or more first processors, causethe first computing device to: cause output, via the mobile device, of arequest for a user of the mobile device to confirm that the one or morecontent items are shareable with the second computing device.
 37. Thesystem of claim 31, wherein the first instructions, when executed by theone or more first processors, cause the first computing device to:receive, from the mobile device, data indicating that a user of themobile device confirms that the one or more content items are shareablewith the second computing device.
 38. The system of claim 31, whereinthe first instructions, when executed by the one or more firstprocessors, cause the first computing device to: receive an indicationthat the mobile device is within a threshold proximity of a thirdcomputing device; and send, to the third computing device, a time, inplayback of a content item of the one or more content items,corresponding to a most-recent time that the mobile device was withinthe threshold proximity of the second computing device.
 39. The systemof claim 31, wherein the data indicates that the one or more contentitems can be shared, by the mobile device, based on a determined timeperiod.
 40. The system of claim 31, wherein the data indicates that theone or more content items can be shared, by the mobile device, based ona determined location of the mobile device.