System and method for screening video communications within an interactive television system

ABSTRACT

Outgoing video communication requests are intercepted and screened by one or more unauthorized recipient lists, authorized recipient lists, caller-specific authorized/unauthorized recipient lists, and/or various combinations of these. The video communication requests may be blocked or forwarded to the recipient depending on whether the recipient is included or not included in one of the various lists.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.09/935,195, filed Aug. 22, 2001, for “System and Method for ScreeningIncoming and Outgoing Video Communication Within an InteractiveTelevision System,” which is fully incorporated hereby by reference.

FIELD OF THE INVENTION

The present invention relates generally to the field of interactivetelevision systems. More specifically, the present invention relates toa system and method for screening incoming and outgoing videocommunications within an interactive television system.

DESCRIPTION OF RELATED BACKGROUND ART

In recent years, a growing number of personal computers and interactivetelevision systems are equipped with digital video cameras. As such,two-way video communication, or “videoconferencing”, is increasing inpopularity. Videoconferencing offers a new dimension to traditionalelectronic communication, allowing participants to convey informationmore rapidly and completely than ever before.

Unfortunately, new technology often results in new abuses. Asvideoconferencing offers a greater degree of intimacy than traditionalaudio-only communication, it has an increased capacity for misuse byirresponsible persons. For instance, some users may transmit lewd and/oroffensive images through the video medium. Additionally, becausevideoconferencing is typically two-way, it may attract stalkers,pedophiles, and others with criminal intentions.

Thus, parents and other responsible parties have an increased burden toprotect their children by monitoring and filtering video communications.However, no system and method currently exists for comprehensivelysafeguarding children and the like from the potential abuses ofvideoconferencing.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-exhaustive embodiments of the invention are described with referenceto the figures, in which:

FIG. 1 is a block diagram of a system for two-way video communication;

FIG. 2 is an illustration of an interactive television system;

FIG. 3 is a block diagram of physical components of a set top box (STB);

FIG. 4 is a dataflow diagram of a first embodiment of the invention;

FIG. 5 is a dataflow diagram of a second embodiment of the invention;

FIG. 6 is a dataflow diagram of a third embodiment of the invention;

FIG. 7 is a dataflow diagram of a fourth embodiment of the invention;

FIG. 8 is a dataflow diagram of a fifth embodiment of the invention;

FIG. 9 is a dataflow diagram of a sixth embodiment of the invention;

FIG. 10 is a block diagram of logical components of a system forscreening incoming video communications;

FIG. 11 is a block diagram of logical components of an alternativesystem for screening incoming video communications;

FIG. 12 illustrates an unauthorized caller list and an authorized callerlist;

FIG. 13 illustrates a recipient-specific unauthorized caller list;

FIG. 14 illustrates a user interface for third-party screening of videocommunication requests;

FIG. 15 is a dataflow diagram of a seventh embodiment of the invention;

FIG. 16 is a dataflow diagram of an eighth embodiment of the invention;

FIG. 17 is a flowchart of a method for screening incoming videocommunications within an interactive television system;

FIG. 18 is a dataflow diagram of a ninth embodiment of the invention;

FIG. 19 is a dataflow diagram of a tenth embodiment of the invention;

FIG. 20 is a dataflow diagram of an eleventh embodiment of theinvention; and

FIG. 21 is a dataflow diagram of an eleventh embodiment of theinvention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention solves the foregoing problems and disadvantages byproviding a system and method for screening incoming and outgoing videocommunications within an interactive television system.

In one embodiment, a video communication request is sent from a callerto a recipient (i.e. from a caller's system to a recipient's system).The identity of the caller, which may be obtained from the request, iscompared with those in an unauthorized caller list. If a match is found,the video communication request is rejected by default. Recipients onthe unauthorized caller list may include, for example, previouslyoffensive callers, callers known to be convicted felons, and the like.If no match is found, the video communication request may be accepted bydefault, subject to acceptance by the recipient. Rejected videocommunication requests may be recorded in a log for later review by theintended recipient or a parent or responsible party.

In an alternative embodiment, the caller's identity may be compared withthose in an authorized caller list. In this embodiment, the videocommunication request may be accepted only if the caller's identity isincluded within the authorized caller list. All other videocommunication requests may be rejected by default. This allows a parentor responsible party to limit video communications to a set ofpre-screened individuals, which also has the effect of screening outvideo communication requests from telemarketers and other unknownparties.

In the above-described embodiments, screening may occur within a set topbox (STB) used by the recipient. In an alternative embodiment, screeningmay occur at an intermediate node of a communications network linkingSTBs associated with the caller and the recipient.

In one implementation, the unauthorized caller list and/or theauthorized caller list may be recipient-specific. Recipient-specificlists operate like the general lists described above, but are applicableonly to a particular recipient. Furthermore, recipient-specific listsmay be combined, in certain embodiments, with generalauthorized/unauthorized caller lists, allowing a parent or guardian tospecify, for example, restricted callers for the family, as well asrestricted callers for individual family members.

In yet another embodiment, the video communication request isintercepted and a third party (e.g., parent or responsible person) isprompted to accept or reject the request. The third party may beprovided with the identities of the caller and the recipient to assistin the determination. If the third party accepts the request, thecommunication may be allowed to proceed; otherwise, the request isrejected.

When a third party rejects a request, the identity of the caller may beadded to a general or recipient-specific unauthorized caller list.Alternatively, when the third party accepts a request, the identity ofthe caller may be added to a general or recipient-specific authorizedcaller list.

In some cases, the third party may be at a remote location when thevideo communication request is received. For example, a parent may be atwork while the request is received by a home STB. Accordingly, the thirdparty may be prompted to accept or reject the communication at a remotelocation.

In certain embodiments, temporary video communication may be establishedbetween the caller and the third party to allow the third party toinquire as to the nature and purpose of the communication. Similarly,the request may include live video from the caller to assist the thirdparty in making a determination. Where live video from the caller is notavailable, or where the caller is not willing or able to establishtwo-way video communication with the third party, the request may berejected by default.

Third-party screening may be combined with screening using an authorizedcaller list, an unauthorized caller list, and/or recipient-specificauthorized/unauthorized caller lists. For example, callers not found onan unauthorized caller list may not be automatically rejected. Instead,a third party may be prompted to accept or reject the caller.

In one embodiment, where a caller listed in an unauthorized caller listmakes repeated attempts to contact a recipient, a notification may beautomatically sent to a law enforcement agency. The notification mayidentify the caller as well as other details concerning the unwantedvideo communication requests.

In one implementation, outgoing video communication requests are alsoscreened using similar techniques. For example, the identity of therecipient may be obtained and compared with those in an unauthorizedrecipient list, similar to the unauthorized caller list described above.If the recipient is found in the unauthorized recipient list, therequest may be blocked by default (e.g., not forwarded to therecipient). Alternatively, if the recipient is not found in the list,the request may be forwarded to the recipient for rejection oracceptance.

Various other lists may be provided, such as authorized recipient lists,which are used in the same manner as the authorized caller listspreviously described. Any of these lists may be caller-specific, toallow different lists for different callers. Also, third-party screeningmay be provided for outgoing video calls in the same manner thatthird-party screening is provided for incoming calls.

Thus, a system and method in accordance with the present inventionallows users to adopt the latest video communications capabilities ofmodern video communication systems without fear of exposing theirhouseholds or offices to the increased dangers associated withvideoconferencing.

Reference throughout this specification to “one embodiment” or “anembodiment” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment of the present invention. Thus, appearancesof the phrases “in one embodiment” or “in an embodiment” in variousplaces throughout this specification are not necessarily all referringto the same embodiment.

Furthermore, the described features, structures, or characteristics maybe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided, such asexamples of programming, user selections, network transactions, databasequeries, database structures, etc., to provide a thorough understandingof embodiments of the invention. One skilled in the relevant art willrecognize, however, that the invention can be practiced without one ormore of the specific details, or with other methods, components,materials, etc. In other instances, well-known structures, materials, oroperations are not shown or described in detail to avoid obscuringaspects of the invention.

The following discussion makes particular reference tovideoconferencing. However, those skilled in the art recognize thatvideoconferencing typically involves two-way audio communication. Thus,where components for video communication are specifically illustrated,components for audio communication may also be included.

Referring now to FIG. 1, there is shown a system 100 for enablingtwo-way video communication. In one implementation, the system 100 usesa broadband network 101 for communication, such as a cable network or adirect satellite broadcast (DBS) network.

In one configuration, the system 100 includes a plurality of set topboxes (STBs) 102 located, for instance, at customer homes or offices.Generally, an STB 102 is a consumer electronics device that serves as agateway between a customer's television 104 and the network 101. Inalternative embodiments, an STB 102 may be embodied more generally as apersonal computer (PC), an advanced television 104 with STBfunctionality, or another type of client terminal.

An STB 102 receives encoded television signals and other informationfrom the network 101 and decodes the same for display on the television104 or other display device (such as a computer monitor, flat paneldisplay, or the like). As its name implies, an STB 102 is typicallylocated on top of, or in close proximity to, the television 104.

Each STB 102 may be distinguished from other network components by aunique identifier, number, code, or address, examples of which includean Internet Protocol (IP) address (such as an lPv6 address), a MediaAccess Control (MAC) address, or the like. Thus, video streams and otherinformation may be transmitted from the network 101 to a specific STB102 by specifying the corresponding address, after which the network 101routes the transmission to its destination using conventionaltechniques.

A remote control 106 is provided, in one configuration, for convenientremote operation of the STB 102 and the television 104. The remotecontrol 106 may use infrared (IR), radio frequency (RF), or otherwireless technologies to transmit control signals to the STB 102 and thetelevision 104. Other remote control devices are also contemplated, suchas a wired or wireless mouse (not shown).

Additionally, a keyboard 108 (either wireless or wired) is provided, inone embodiment, to allow a user to rapidly enter text information intothe STB 102. Such text information may be used for e-mail, instantmessaging (e.g. text-based chat), or the like. In various embodiments,the keyboard 108 may use infrared (IR), radio frequency (RF), or otherwireless technologies to transmit keystroke data to the STB 102.

Each STB 102 may be coupled to the network 101 via a broadcast center110. In the context of a cable network, a broadcast center 110 may beembodied as a head-end, which is generally a centrally-located facilitywithin a community where television programming is received from a localcable TV satellite downlink or other source and packaged together fortransmission to customer homes. In one configuration, a head-end alsofunctions as a Central Office (CO) in the telephone industry, routingvideo streams and other data to and from the various STBs 102 servicedthereby.

A broadcast center 110 may also be embodied as a satellite broadcastcenter within a direct broadcast satellite (DBS) system. A DBS systemmay utilize a small 18-inch satellite dish (which is an antenna forreceiving a satellite broadcast signal). Each STB 102 may be integratedwith a digital integrated receiver/decoder (IRD), which separates eachchannel, and decompresses and translates the digital signal from thesatellite dish to be displayed by the television 104.

Programming for a DBS system may be distributed, for example, bymultiple high-power satellites in geosynchronous orbit, each withmultiple transponders. Compression (e.g., MPEG) is used to increase theamount of programming that can be transmitted in the availablebandwidth.

The broadcast centers 110 may be used to gather programming content,ensure its digital quality, and transmit the signal up to thesatellites. Programming may come to the broadcast centers 110 fromcontent providers (CNN, ESPN, HBO, TBS, etc.) via satellite, fiber opticcable and/or special digital tape. Satellite-delivered programming istypically immediately digitized, encrypted and uplinked to the orbitingsatellites. The satellites retransmit the signal back down to everyearth-station, e.g., every compatible DBS system receiver dish atcustomers' homes and businesses.

Some programs may be recorded on digital videotape in the broadcastcenter 110 to be broadcast later. Before any recorded programs areviewed by customers, technicians may use post-production equipment toview and analyze each tape to ensure audio and video quality. Tapes maythen be loaded into a robotic tape handling systems, and playback may betriggered by a computerized signal sent from a broadcast automationsystem. Back-up videotape playback equipment may ensure uninterruptedtransmission at all times.

Regardless of the nature of the network 101, the broadcast centers 110may be coupled directly to one another or through the network 101. Inalternative embodiments, broadcast centers 110 may be connected via aseparate network, one particular example of which is the Internet 112.The Internet 112 is a “network of networks” and is well known to thoseskilled in the art. Communication over the Internet 112 is accomplishedusing standard protocols, such as TCP/IP (Transmission ControlProtocol/Internet Protocol) and the like.

A broadcast center 110 may receive television programming fordistribution to the STBs 102 from one or more television programmingsources 114 coupled to the network 101. Preferably, television programsare distributed in an encoded format, such as MPEG (Moving PictureExperts Group). Various MPEG standards are known, such as MPEG-2,MPEG-4, MPEG-7, and the like. Thus, the term “MPEG,” as used herein,contemplates all MPEG standards. Moreover, other videoencoding/compression standards exist other than MPEG, such as JPEG,JPEG-LS, H.261, and H.263. Accordingly, the invention should not beconstrued as being limited only to MPEG.

Broadcast centers 110 may enable audio and video communications betweenSTBs 102. Transmission between broadcast centers 110 may occur (i) via adirect peer-to-peer connection between broadcast centers 110, (ii)upstream from a first broadcast center 110 to the network 101 and thendownstream to a second broadcast center 110, or (iii) via the Internet112. For instance, a first STB 102 may send a video transmissionupstream to a first broadcast center 110, then to a second broadcastcenter 110, and finally downstream to a second STB 102.

Referring now to FIG. 2, there is shown an interactive television (ITV)system 200 according to an embodiment of the invention. As depicted, thesystem 200 may include an STB 102, a television 104 (or other displaydevice), a remote control 106, and, in certain configurations, akeyboard 108.

The remote control 106 is provided for convenient remote operation ofthe STB 102 and the television 104. In one configuration, the remotecontrol 106 includes a wireless transmitter 202 for transmitting controlsignals (and possibly audio/video data) to a wireless receiver 203within the STB 102 and/or the television 104. In certain embodiments,the remote control 106 also includes a wireless receiver 204 forreceiving signals from a wireless transmitter 205 within the STB 102.

In one implementation, the wireless transmitters 202, 205 and receivers203, 204, are configured to use radio frequency (RF) signals. In otherembodiments, infrared (IR) or other frequencies along theelectromagnetic spectrum may be used. Operational details regarding thewireless transmitters 202, 205 and receivers 203, 204 are generally wellknown to those of skill in the art.

The remote control 106 preferably includes a number of buttons or othersimilar controls. For instance, the remote control 106 may include apower button 206, an up arrow button 208, a down arrow button 210, aleft arrow button 212, a right arrow button 214, a “Select” button 216,an “OK” button 218, channel adjustment buttons 220, volume adjustmentbuttons 222, alphanumeric buttons 224, a “Call” button 226, and thelike.

In one embodiment, the remote control 106 includes a microphone 242 forcapturing an audio signal. The captured audio signal is preferablytransmitted to the STB 102 via the wireless transmitter 202. Inaddition, the remote control 106 may include a speaker 244 forgenerating audible output from an audio signal received from the STB 102via the wireless receiver 204. Of course, in alternative embodiments,the microphone 242 and speaker 244 may be integrated with the STB 102.

In certain embodiments, the remote control 106 includes a video camera246, such as a CCD (charge-coupled device) digital video camera. Thevideo camera 246 allows a user to capture and send video signals to theSTB 102. For example, the video camera 246 may capture images of theuser. In one implementation, the video camera 246 is in electricalcommunication with the wireless transmitter 202 for sending the capturedvideo signal to the STB 102. Like the microphone 242 and speaker 244,the video camera 246 may be integrated with the STB 102 in otherembodiments.

The various components of the remote control 106 may be positioned indifferent locations for functionality and ergonomics. For example, asshown in FIG. 2, the speaker 244 may be positioned near the “top” of theremote control 106 (when viewed from the perspective of FIG. 2) and themicrophone 242 may be positioned at the “bottom” of the remote control106. Thus, in one embodiment, a user may conveniently position thespeaker 244 near the user's ear and the microphone 242 near the user'smouth in order to operate the remote control 106 in the manner of atelephone.

Alternatively, or in addition, a hands-free headset 248 may be coupledto the remote control 106 or keyboard 108. The headset 248 may becoupled using a standard headset jack 250. The headset 248 may include amicrophone 242 and/or speaker 244. Such a headset 248 may be used toreduce audio interference from the television 104 (improving audioquality) and to provide the convenience of hands-free operation.

The optional keyboard 108 facilitates rapid composition of textmessages. The keyboard 108 includes a plurality of standard alphanumerickeys 236. In one configuration, the keyboard 108 includes a wirelesstransmitter 202, similar or identical to the wireless transmitter 202 ofthe remote control 106. The wireless transmitter 202 transmits keystrokedata from the keyboard 108 to the STB 102. Additionally, the keyboard108 may include one or more of the buttons illustrated on the remotecontrol 106.

Referring now to FIG. 3, there is shown a block diagram of physicalcomponents of an STB 102 according to an embodiment of the invention. Asnoted above, the STB 102 includes a wireless receiver 203 and a wirelesstransmitter 205 for receiving/transmitting control signals from/to theremote control 106.

The STB 102 also includes, in one implementation, a network interface302 for communicating with the network 101 via the broadcast center 110.The interface 302 may include conventional circuitry for receiving,demodulating, and demultiplexing MPEG (Moving Picture Experts Group)packets. The interface 302 may also include conventional cable modemcircuitry for sending or receiving data. For example, the interface 302may conform to the DOCSIS (Data Over Cable Service InterfaceSpecification) or DAVIC (Digital Audio-Visual Council) cable modemstandards.

In one configuration, one or more frequency bands (for example, from 5to 30 MHz) may be reserved for upstream transmission. Digital modulation(for example, quadrature amplitude modulation or vestigial sidebandmodulation) may be used to send digital signals in the upstreamtransmission. Of course, upstream transmission may be accomplisheddifferently for different networks 101. Alternative ways to accomplishupstream transmission include using a back channel transmission, whichis typically sent via an analog telephone line, ISDN, DSL, or othertechniques.

The STB 102 also preferably includes a codec (encoder/decoder) 304,which serves to encode audio/video signals into a network-compatibledata stream for transmission over the network 101. The codec 304 alsoserves to decode a network-compatible data stream received from thenetwork 101. The codec 304 may be implemented in hardware and/orsoftware. Moreover, the codec 304 may use various algorithms, such asMPEG or Voice over IP (VoIP), for encoding and decoding.

The STB 102 further includes a memory device 306, such as a randomaccess memory (RAM), for storing temporary data. Similarly, a read-onlymemory (ROM) may be provided for storing more permanent data, such asfixed code and configuration information.

In one embodiment, an audio/video (A/V) controller 308 is provided forconverting digital audio/video signals into analog signals forplayback/display on the television 104. The A/V controller 308 may beimplemented using one or more physical devices, such as a separategraphics and sound controllers. The AN controller 308 may includegraphics hardware for performing bit-block transfers (bit-blits) andother graphical operations for displaying a graphical user interface(GUI) on the television 104.

In some implementations, the STB 102 may include a storage device 310,such as a hard disk drive or the like. The storage device 310 may beconfigured to store encoded television broadcasts and retrieve the sameat a later time for display. The storage device 310 may be configured,in one embodiment, as a digital video recorder (DVR), enabling scheduledrecording of television programs, pausing (buffering) live video, etc.

The storage device 310 may also be used in various embodiments to storeviewer preferences, parental lock settings, electronic program guide(EPG) data, passwords, e-mail messages, and the like. In oneimplementation, the storage device 310 also stores an operating system(OS) for the STB 102, such as Windows CE® or Linux®.

As noted above, the STB 102 may include, in certain embodiments, amicrophone 242 and a speaker 244 for capturing and reproducing audiosignals, respectively. The STB 102 may also include a video camera 246for capturing video signals. These components may be included in lieu ofor in addition to similar components in the remote control 106, keyboard108, and/or television 104.

A CPU 312 controls the operation of the STB 102, including the othercomponents thereof, which are coupled to the CPU 312 in one embodimentvia a bus 314. The CPU 312 may be embodied as a microprocessor, amicrocontroller, a digital signal processor (DSP) or other device knownin the art. As noted above, the CPU 312 may perform logical andarithmetic operations based on program code stored within the memory 306or the storage device 310.

Of course, FIG. 3 illustrates only one possible configuration of an STB102. Those skilled in the art will recognize that various otherarchitectures and components may be provided within the scope of theinvention. In addition, various standard components are not illustratedin order to avoid obscuring aspects of the invention.

FIGS. 4-9 are high-level dataflow diagrams illustrating operations andtransactions according to several embodiments of the invention. Ofcourse, the illustrated embodiments may be combined in various wayswithout departing from the spirit and scope of the invention.

As shown in FIG. 4, a caller 402 at a first STB 102 a may attempt toestablish video communication with a recipient 404 at a second STB 102b. Of course, those skilled in the art will recognize that other devicesmay be used for video communication, such as video phones, PDAs,personal computers, and the like.

In one embodiment, the caller's STB 102 a sends a video communicationrequest to the recipient's STB 102 b. The precise format of the requestis not crucial to the invention and will vary depending on theparticular hardware and software being used. Typically, however, therequest will identify the caller 402 and the recipient 404, e.g., byname, network address, or the like. In essence, the request is aninvitation to the recipient 404 to establish video communication withthe caller 402.

In one embodiment, the request is intercepted by the recipient's STB 102b before the recipient 404 is notified of the request or before two-wayvideo communication is established. Thereafter, the caller's identity isdetermined from information contained within the request. For example,the caller's name or network address may be extracted from the request.

As used herein, the terms “caller 402” and “recipient 404” aresynonymous with “the caller's identity” and the “recipient's identity”,respectively. The terms “caller 402” and “STB 102 a” may also besynonymous, where a request only identifies a caller 402 by the name oraddress of the STB 102 a.

After the caller 402 is identified, the STB 102 b determines whether thecaller 402 (i.e. the caller's identity) is included within anunauthorized caller list 406. In one embodiment, the unauthorized callerlist 406 is a list of callers 402 who are not allowed to communicatewith the recipient 404 and/or other users of the STB 102 b. Theunauthorized caller list 406 may contain, for example, previouslyoffensive callers 406, callers 406 who are known felons, etc.

If the caller 402 is in the unauthorized caller list 406, the videocommunication request may be rejected by default. If the caller 402 isnot in the unauthorized caller list 406, the video communication requestmay be accepted, subject, of course, to acceptance by the recipient 404.

In some cases, the caller 402 or the caller's STB 102 a may not beidentified by the request. For example, a caller 402 may configure theSTB 102 a to mask his or her identity. Where the caller 402 or thecaller's STB 102 a is not identifiable, the request is automaticallyrejected in one embodiment, since the STB 102 b is not capable ofdetermining whether the caller 402 is a threat to the recipient 404.

Preferably, the unauthorized caller list 406 is administered by a parentor other responsible party. The recipient's STB 102 b may provide aninterface for adding, deleting, or modifying the callers 402 included inthe unauthorized caller list 406. Security measures (e.g., passwords)may be provided to limit access to the unauthorized caller list 406 tothe parent or other responsible party.

Based on the foregoing, the unauthorized caller list 406 provides aneffective mechanism for screening a video communication request. Videocommunication requests from parties known to be potentially threateningto the recipient 404 may be automatically blocked by including thoseparties in the unauthorized caller list 406.

In an alternative embodiment, as shown in FIG. 5, the recipient's STB102 b may include an authorized caller list 502, which is a list ofpre-screened callers 402 who are permitted to contact the recipient 404.An authorized caller list 502 is more restrictive than an unauthorizedcaller list 406, since a request may be accepted only if the caller 402is contained within the list 502. This has the effect of screening outrequests from unknown parties, such as telemarketers and the like.

In certain embodiments, the aforementioned lists 406, 502 may berecipient-specific. For example, as shown in FIG. 6, an STB 102 b mayinclude a general unauthorized caller list 602, similar to the list 406of FIG. 4, which applies to all recipients 404. In addition, or in thealternative, the STB 102 b may include a recipient-specific unauthorizedcaller list 604, which is only applicable to the recipient 404.

In such an embodiment, the recipient 404 may be identified usinginformation contained within the video communication request. Forexample, a request may include an e-mail address, e.g., dave@myhome.net,which may identify both a destination STB 102 b, e.g., myhome.net, aswell as a recipient 404, e.g., dave. Alternatively, a unique identifier,e.g., an IPv6 address, may be used to uniquely identify each recipient404.

Also possible are a general authorized caller list 606 (similar to thelist 502 of FIG. 5) and/or a recipient-specific authorized caller list608 (which applies only to the recipient 404). Various combinations oflists (authorized, unauthorized, general, recipient-specific) areencompassed within the scope of the present invention.

In certain embodiments, as shown in FIG. 7, a third party 702 maydetermine whether the video communication request should be accepted orrejected. The third party 702 may be a parent or another partyresponsible for the well-being of one or more recipients 404 associatedwith an STB 102 b.

As discussed above, a caller's STB 102 a sends a video communicationrequest to a recipient's STB 102 b, where the request is intercepted.The STB 102 b may then identify the caller 402 and the recipient 404using information within the video communication request.

Unlike the previous embodiments, however, the STB 102 b prompts a thirdparty 702 for an indication of acceptance or rejection. In oneembodiment, the third party 702 is prompted with the identities of boththe caller 402 and the recipient 404 to enable the third party 702 toproperly screen the video communication. In some cases, the request mayinclude live video captured by the caller's STB 102 a, which may help toidentify the caller 402. Where the request does not identify the caller402, the third party 702 may be always prompted, or never prompted,depending on the third party's preference.

If the third party 702 indicates that the request should be rejected,the STB 102 b rejects the request. If, however, the third party 702indicates acceptance of the request, the STB 102 b may accept therequest, subject to acceptance by the recipient 404. In certainconfigurations, if the third party 702 does not respond within anestablished time interval, the STB 102 b may automatically reject therequest as though the third party 702 indicated that the request shouldbe rejected.

As illustrated, the third party 702 may be associated with a differentSTB 102 c than the recipient's STB 102 b. The third party's STB 102 cand recipient's STB 102 b may be located in different rooms of the samehouse or office, or in completely different geographic areas of theworld.

The third party 702 may be prompted using any conventional mechanism.For example, a pop-up window, graphical text overlay, or the like, maybe displayed notifying the third party 702 of the request and theidentities of the caller 402 and the recipient 404. Acceptance orrejection of the request may be indicated by pressing a particularbutton on a remote control 106, selecting a menu option displayed on atelevision 104, or the like.

As shown in FIG. 8, third-party screening may be combined with any ofthe screening embodiments using unauthorized/authorized lists 406, 502,as described in connection with FIGS. 4-7. For example, a caller 402 maybe pre-screened using an unauthorized caller list 406. If the caller 402is not found within the list 406, the third party 702 may then beprompted for acceptance or rejection of the request.

Even where a caller 402 is found within an unauthorized caller list 406,the third party 702 may still wish to be notified so that the thirdparty 702 may confer with the caller 402 regarding the attemptedcommunication. As described in greater detail below, the third party702, in one embodiment, may establish temporary video communication withthe caller 402 to facilitate the screening process.

In certain embodiments, the STB 102 b may be configured to updatescreening lists 406, 502, 602, 604, 606, 608 based on the response(e.g., reject or accept) from the third party 702. For example, arejection from the third party 702 may cause the STB 102 b to add thecaller 402 to a general unauthorized caller list 602 or arecipient-specific unauthorized caller list 604. Similarly, anacceptance response may cause the caller 402 to be added to a generalauthorized caller list 606 or a recipient-specific authorized callerlist 608.

As shown in FIG. 9, the screening process need not be performed at therecipient's STB 102 b. For instance, a broadcast center 110, Internetserver, or other intermediate network node may be configured tointercept and screen requests based on the above-described lists 406,502, 602, 604, 606, 608, which may be stored within, or may beaccessible to, the broadcast center 110. Preferably, all such lists 406,502, 602, 604, 606, 608 are specific to the recipient's STB 102 b,allowing the broadcast center 110 to provide screening services formultiple customers.

As previously noted, a broadcast center 110 may be embodied, forexample, as a cable head-end or a satellite broadcast center. In thedepicted embodiment, video communication between STBs 102 passes throughat least one broadcast center 110, enabling the broadcast center 110 tointercept the request.

The broadcast center 110 may also be configured to prompt a third party702 at a remote STB 102 c to accept or reject a request. Thus, all ofthe embodiments disclosed in FIGS. 4-8 may be accomplished within thecontext of the broadcast center 110.

A parent or other responsible party may be permitted to interact withthe broadcast center 110 using a Web browser or other interface tocreate or update the various lists 406, 502, 602, 604, 606, 608 for therecipient's STB 102 b. As previously noted, security mechanisms, such aspasswords, may be used to limit access to authorized persons.

Referring now to FIG. 10, a system 1000 for screening incoming videocommunications within an interactive television system is illustrated.In one embodiment, the system 1000 includes an interception component1002, which intercepts a video communications request 1004 as describedin connection with FIG. 4.

The interception component 1002 provides the video communication request1004 to an identification component 1006, which identifies the caller402 (and, in certain embodiments, the recipient 404). In oneconfiguration, the identification component 1006 extracts an identifier1008 of the caller 402 from the request 1004. The identifier 1008 mayinclude, for example, the caller's name, the caller's network address,the network address of the caller's STB 102 a, and the like. In thedepicted embodiment, the extracted identifier 1008 is then passed to anauthorization component 1012.

The authorization component 1012 is coupled, in one embodiment, to anunauthorized caller list 406. The unauthorized caller list 406, as wellas the other screening lists 502, 602, 604, 606, 608 described above,may be implemented using well known data structures including arrays,linked lists, stacks, queues, databases, etc.

In an alternative embodiment, as described with reference to FIG. 6, theauthorization component 1012 may be further configured to use anidentifier (not shown) of the recipient 404 to locate arecipient-specific unauthorized caller list 604. As previously noted,recipient-specific lists 604, 608 are similar to the general lists 406,502, 602, 606, except that the list applies to a specific recipient 404.

To determine whether a caller 402 is included within the unauthorizedcaller list 406, the authorization component 1012 searches the list 406for a match with the extracted caller identifier 1008. If an exact orsufficiently close match is found, then a reject message is sent to avideo communications component 1014. If a match is not found, then anaccept message is sent to a video communications component 1014. In oneconfiguration, if rejected, the video communication request 1004 and anyrelated meta-data may be stored in a call log 1016 for later review by arecipient 404, a parent, or other responsible person.

In fact, all video communication requests (inbound or outbound) may berecorded in a “message detail record” log (not shown) which can servemultiple purposes, e.g., reconciliation of the billing for usage of thevideo communications, recording or documenting abusive behavior,allowing the user to select a “calling area” for high frequency of callsto other users in a calling area (similar to telephone billing plans).

If the authorization component 1012 provides an accept message, thevideo communications component 1014 prompts the recipient 404 foracceptance of the video communication. If the recipient accepts, thevideo communications component 1014 establishes two-way videocommunication between the caller 402 and recipient 404

If the authorization component 1012 provides a reject message, the videocommunications component 1014 may terminate the communication process.In one embodiment, the video communications component 1014 may send amessage to the STB 102 a notifying the caller 402 of the rejection,including information on re-directing the call to a parent or otherauthorized person.

FIG. 11 illustrates a system 1100 for screening incoming videocommunications using a authorized caller list 502 as described above inrelation to FIG. 5. Similar to the system 1000 in FIG. 10, a videocommunication request 1004 is processed by an interception component1002 and an identification component 1006, after which a calleridentifier 1008 is provided to an authorization component 1012.

In this embodiment, the caller identifier 1008 is used to search for amatch within an authorized caller list 502. As in FIG. 5, if the calleridentifier 1008 is found in the authorized caller list 502, an acceptmessage is sent to the video communication component 1014. If, however,the caller identifier 1008 is not found in the authorized caller list502, a reject message is sent to the video communication component 1014.

In the depicted embodiment, the accept message causes the videocommunication component 1014 to establish two-way video communication1102 between the caller's STB 102 a and the recipient's STB 102 b,subject, of course, to acceptance by the recipient 404.

In one implementation, the video communication component 1014 managesthe two-way video communication 1102 from establishment to termination.Various systems are known for providing two-way video communication,such as Microsoft Netmeeting® and CuSeeMe®.

During two-way video communication, a video camera 246 (not shown)integrated with the caller's Interactive television system (ITV) 200 a,captures video signals of the caller 402 and transmits them through thenetwork 101 to the recipient's ITV 200 b. Likewise, a microphone 242(not shown) integrated with the caller's ITV 200 a captures audiosignals and transmits them to the recipient's ITV 200 b where speakers244 (not shown) convert the audio signals to sound waves. Similarly, therecipient's ITV 200 b sends audio and video signals to the caller's ITV200 a.

In certain embodiments, a televisions 104 of the caller 402 and therecipient 404 display remote 1104 and local 1106 views in a split-screenarrangement. For example, in the case of the recipient 404, the remotevideo view 1104 includes video images of the caller 402 and the localvideo view 1106 includes video images of the recipient 404. Of course,other display configurations may be used to conduct videocommunications, including Picture-in-Picture (PIP), multi-sectioneddisplays and the like.

FIG. 12 illustrates an exemplary unauthorized caller list 406 and anexemplary authorized caller list 502 according to an embodiment of theinvention. In the depicted embodiment, the unauthorized caller list 406includes a name field 1202, a reason field 1204, and an address field1206 for each caller 402. Of course, more or fewer fields may beprovided in other embodiments.

The address field 1206 may include a network address, such as an IPaddress, of the caller's STB 102 a. Preferably, either the name field1202 or the address field 1206 is unique for each caller 402.

The reason field 1204 allows a parent or guardian to identify why thecaller 402 was placed on the list 406. For example, “Brad Smith” wasplaced on the list because he was “Convicted of a Felony.” The reasonfield may 1204 be automatically generated, for example, in response to athird party 702 accepting or rejecting a request, as described inconnection with FIG. 7.

The authorized caller list 502 may include similar fields 1202, 1204,1206 for each caller 402. Here, the reason field 1204 may not relatedirectly to why the caller 402 is on the list 502, but, instead, mayindicate a relationship between the caller 402 and the recipient 404.For example, “Bert Abrahms” may be a “Relative” of those in a householdassociated with the recipient's STB 102 b.

Of course the unauthorized caller list 406 and authorized caller list502 may include as many callers 402 as necessary. Those of relevantskill in the art will recognize that the unauthorized caller list 406and authorized caller list 502 need not be contained within separatedata structures. For example, a single table may be provided, with afield (not shown) for indicating whether an entry corresponds to theunauthorized caller list 406 or the authorized caller list 502.

FIG. 13 illustrates a table representing a recipient-specificunauthorized caller list 604. As mentioned above, the recipient-specificunauthorized caller list 604 facilitates screening for a particularrecipient 404. For example, the age of son #1 and other circumstancesmay have lead to a court order forbidding video communication between afather, “Frank Jones” and son #1. Accordingly, the father “Frank Jones”is added to the recipient-specific unauthorized caller list 604 for son#1.

FIG. 14 illustrates a user interface 1400 for prompting a third party702 to accept or reject a request. In one embodiment, the promptincludes a caller identifier 1008 and a recipient identifier 1401. Forexample, the caller identifier 1008 may include the name of the caller402, “George Burton.” In addition, the prompt may include a video view1402 of the caller 402. The video view 1402 may include live or recordedvideo images of the caller 402. The video view 1402 allows the thirdparty 702 to get a visual impression of the caller 402 to facilitate thescreening process.

To facilitate a response from the third party 702, the user interface1400 may include a plurality of buttons 1404, 1406, 1408. An acceptbutton 1404 provides an accept response to the authorization component1012, indicating that the request is accepted, while the reject button1406 provides a reject response.

In one embodiment, an interview button 1408 may allow the third party702 to establish two-way video communication with the caller 402 priorto authorizing the video communication request. A video view 1402 maydisplay live video received from the caller's STB 102 a, allowing thethird party 702 to see the caller 402 before making a decision whetherto accept or reject the request. The live video may be part of therequest or may follow the request. In certain embodiments, where livevideo is not available, a third party may opt to have the STB 102 breject the request by default.

FIG. 15 illustrates one embodiment of the invention that allows a thirdparty 702 to interview the caller 402. As with most forms ofcommunication, video communication that employs screening may besusceptible to “spoofing”, where the caller 402 pretends to be anotherperson. For example, the caller 402 may configure his STB 102 a to senda false name or address, or to provide a pre-recorded video clippurported to be live video.

The third party 702 can dispel all doubt about the identity of thecaller 402 by activating the interview button 1408 and conducting aninterview with the caller 402. In one embodiment, the interview button1408 causes the video communication component 1014 to establishtemporary two-way video communication 1502 between the caller 402 andthe third party 702. The third party 702 may then question the caller402 while watching the video view 1402 to verify that the video view1402 does contain live video. For example, the third party 702 may askthe caller 402 to perform visual acts (e.g., close your eyes) that wouldnot be possible to predict and pre-record.

FIG. 16 illustrates yet another embodiment of the invention in which arecipient's STB 102 b is configured to notify a law enforcement agency1602 in response to receiving one or more requests from a caller 402 onthe unauthorized caller list 406.

For example, a caller 402 may make multiple requests to communicate witha recipient 404 either in an attempt to overload STB 102 b or harass therecipient 404. In one embodiment, STB 102 b maintains a count of thenumber of failed attempts by the caller 402, which may be included in anotification to the law enforcement agency 1602. In some cases, anotification is not sent until the number of failed attempts reaches anestablished threshold, which may be set by local law.

The notification may be sent via email, instant messaging, fax or othercommunication medium. Preferably, the notification includes the calleridentifier 1008, the number of video communication request attemptsmade, and details surrounding each video communication request, such asthe time and date of the request and the reason for which the caller 402was added to the list 406, e.g., court order, known felon, etc.Additionally, the notification may include a recipient identifier 1401and any live video information captured of the caller 402. Informationincluded in the notification may enable the law enforcement agency 1602to act to stop video communication requests from the caller 402 to therecipient 404, and may be useful in enforcing court orders, etc.

Referring now to FIG. 17, there is shown a flowchart of a method 1700for screening incoming video communications in an interactive televisionsystem 200. The illustrated method 1700 screens incoming calls based onan unauthorized caller list 406, an authorized caller list 502, and athird party 702. Of course, the invention need not use both lists 406,502, or rely on a third party 702 for screening.

The method 1700 begins by intercepting 1702 a video communicationrequest sent from a caller 402 to a recipient 404. Thereafter, thecaller 402 is identified 1704 using information within the videocommunication request.

In certain configurations, a determination 1706 is then made whether thecaller 402 is within an unauthorized caller list 406. If so, the videocommunication request is rejected 1708. If not, a determination 1710 ismade whether the caller 402 is within an authorized caller list 502. Ifso, the video communication request is accepted 1712, subject toacceptance by the recipient 404.

If the caller is not within the authorized caller list 502, then a thirdparty 702 is notified 1714 of the caller's identity in one embodiment.The third party 702 is also prompted 1716 to accept or reject the videocommunication request.

Thereafter, a determination 1718 is made whether the third party 702accepted or rejected the video communication request. If the third party702 accepted the request, then the video communication request isaccepted 1712; otherwise, the request is rejected 1708.

As noted previously, the above-described systems and methods may beapplied to outgoing, as well as incoming, video communication requests.Just as it is important for parents to screen calls directed to theirchildren, it is also important for parents to screen calls made by theirchildren. People with criminal intentions may attempt to defeat theunauthorized/authorized caller lists 406, 502 described above byproviding children with their video communication addresses (e.g.,videophone numbers) and allowing the children to become the callers 402.

FIG. 18 illustrates a system 1800 for screening outgoing videocommunications according to an embodiment of the present invention. Asshown, the caller's STB 102 a may be configured with an interceptioncomponent 1802 that intercepts an outgoing video communication requestgenerated by a video communication component 1804. The interceptioncomponent 1802 and the video communication component 1804 may be similaror identical to those described with reference to FIG. 10.

The interception component 1804 may provide the intercepted request toan authorization component 1806, which may include or have access to oneor more unauthorized recipient lists 1808, authorized recipient lists1810, caller-specific unauthorized recipient lists 1812, and/orcaller-specific authorized recipient lists 1814. These lists 1808, 1810,1812, 1814 are similar or identical to the corresponding lists 602, 606,604, 608 illustrated in FIG. 6, except that they are applied to therecipient's identity rather than the caller's identity. Anidentification component (not shown) may be provided to determine theidentity of the recipient 404 based on information contained within therequest, as previously discussed.

For example, the authorization component 1806 may determine whether therecipient 404 is identified within the unauthorized recipient list 1808.If the recipient 404 is in the list 1808, the authorization component1806 may block the request, e.g., not allow the request to be sent tothe recipient's STB 102 b. The authorization component 1806 may notifythe caller 402 that the request was blocked due to the recipient 404being in the list 1808.

Alternatively (or in addition), the authorization component 1806 maydetermine whether the recipient 404 is identified within the authorizedrecipient list 1810. In one embodiment, the authorization component 1806forwards the request to the recipient's STB 102 b for acceptance orrejection only if the recipient 404 is in the list 1810. Thus, thecaller 402 may only contact those recipients 404 who are in the list1810.

Of course, the above-described lists may be caller-specific in certainembodiments. This is advantageous in that certain callers 402, such asolder children or adults, may not need any restrictions, while youngercallers 402 may be limited to, or restricted from, certain recipients404.

As shown in FIG. 19, a third party 702 may also be involved in thescreening process. For example, the authorization component 1806 maysend the request to a third party 702 for acceptance or rejection. Ifthe third party 702 accepts the request, the request may be forwarded tothe recipient 404 for acceptance or rejection. If the third party 702rejects the request, the request is blocked, e.g., not forwarded to therecipient 404.

In an alternative embodiment, the third party 702 notifies theauthorization component 1806 whether the request was accepted orrejected. Thereafter, if the request was accepted by the third party702, the authorization component 1806 forwards the request to therecipient 404; otherwise, the authorization component 1806 blocks therequest.

In certain embodiments, the request may include live video of the caller402 captured by the video camera 246 of FIGS. 2-3. The third party 702may view the live video to determine whether the caller 402 is, in fact,who he or she claims to be. This prevents, for example, a younger childusing an older child's identifier to spoof the screening system.

In some cases, the third party 702 may establish temporary two-waycommunication with the caller 402 in order, for example, to query thecaller 402 regarding the identity of recipient 404 and/or the purpose ofthe communication. This may allow the caller 402 to ask the third party702 for permission to contact the recipient 402 where such would notnormally be permitted by the unauthorized recipient list 1808 or theauthorized recipient list 1810 alone.

As illustrated in FIG. 20, the above-described screening process neednot be performed within the STB 102 a. For example, the variouscomponents described above may operate within an intermediate networknode linking the STBs 102 a, 102 of the caller 402 and recipient 404,respectively. The intermediate network node may be embodied as a cablehead-end, a satellite broadcast center, an Internet server, or the like.

Of course, as shown in FIG. 21, screening of both incoming and outgoingvideo communications may be provided. The authorization component 1806may be configured to use both unauthorized/authorized caller lists 602,604 and unauthorized/authorized recipient lists 1802, 1804, as well asrecipient/caller-specific variations thereof. The same or differentlists may be used for incoming and outgoing calls.

In alternative embodiments of the invention, parents or otherresponsible persons may block expensive outbound video calls, e.g., thevideo equivalent of a telephony long distance call, using theabove-described techniques. For example, the parent may block all callsthat exceed a particular preset rate. Moreover, parents may establish acommunication quota based on a set number of minutes per day, acumulative number minutes per week, or a combination of both. In stillother embodiments, parents may tie the above-described limits to achild's spending allowance, which may be redeemed, for example, in videocommunication minutes, instant messaging minutes, kilobytes of e-mailmessages, and the like.

Based on the foregoing, the present invention offers a number ofadvantages not available in conventional approaches. Incoming/outgoingvideo communications from/to certain individuals or devices may beselectively restricted. Likewise, incoming/outgoing video communicationsmay be limited to those from/to certain individuals or devices. Inaddition, a parent or other responsible party may selectively screenincoming/outgoing video communications from/to unknown individuals ordevices.

While specific embodiments and applications of the present inventionhave been illustrated and described, it is to be understood that theinvention is not limited to the precise configuration and componentsdisclosed herein. Various modifications, changes, and variationsapparent to those skilled in the art may be made in the arrangement,operation, and details of the methods and systems of the presentinvention disclosed herein without departing from the spirit and scopeof the invention.

1. A method for screening outgoing video communications within aninteractive television system, the method comprising: intercepting avideo communication request sent by a caller to a recipient; identifyingthe recipient using information contained within the video communicationrequest; determining whether the recipient is included within anunauthorized recipient list; and blocking the video communicationrequest in response to the recipient being included within theunauthorized recipient list.
 2. The method of claim 1, wherein theunauthorized recipient list is caller-specific.
 3. The method of claim2, further comprising: identifying the caller using informationcontained within the video communication request; and locating anunauthorized recipient list specific to the caller.
 4. The method ofclaim 1, wherein the video communication request is intercepted by aninteractive television system associated with the caller.
 5. The methodof claim 1, wherein the video communication request is intercepted by anintermediate network node linking the recipient and the caller.
 6. Themethod of claim 5, wherein the intermediate network node is selectedfrom the group consisting of a cable head-end, an Internet server, and asatellite broadcast center.
 7. The method of claim 1, whereinidentifying comprises: extracting an identifier of the recipient fromthe video communication request.
 8. The method of claim 7, wherein theidentifier is selected from the group consisting of a name of therecipient, a network address of the recipient, and a network address ofa communication system of the recipient.
 9. The method of claim 7,wherein the unauthorized recipient list comprises a list of unauthorizedidentifiers, and wherein determining comprises: determining whether theextracted identifier is an unauthorized identifier.
 10. The method ofclaim 1, wherein blocking comprises: notifying the caller that the videocommunication request has been blocked.
 11. A method for screening videocommunications in an interactive television system, the methodcomprising: intercepting a video communication request sent by a callerto a recipient; identifying the recipient using information containedwithin the video communication request; determining whether therecipient is identified within an authorized recipient list; andforwarding the video communication request to the recipient only if therecipient is identified within the authorized recipient list.
 12. Themethod of claim 11, wherein the authorized recipient list iscaller-specific.
 13. The method of claim 127 further comprising:identifying the caller using information contained within the videocommunication request; and locating an authorized recipient listspecific to the caller.
 14. The method of claim 11, wherein the videocommunication request is intercepted by an interactive television systemassociated with the caller.
 15. The method of claim 11, wherein thevideo communication request is intercepted by an intermediate networknode linking the recipient and the caller.
 16. The method of claim 15,wherein the intermediate network node is selected from the groupconsisting of a cable head-end, an Internet server, and a satellitebroadcast center.
 17. The method of claim 11, wherein identifyingcomprises: extracting an identifier of the recipient from the videocommunication request.
 18. The method of claim 17, wherein theidentifier is selected from the group consisting of a name of therecipient, a network address of the recipient, and a network address ofan interactive television system of the recipient.
 19. The method ofclaim 17, wherein the authorized recipient list comprises a list ofauthorized identifiers, and wherein determining comprises: determiningwhether the extracted identifier is an authorized identifier.
 20. Themethod of claim 11, wherein accepting comprises: establishing two-wayvideo communication between the recipient and the caller.
 21. A systemfor screening video communications in an interactive television system,the system comprising: an interception component configured to intercepta video communication request sent by a caller to a recipient; anidentification component configured to identify the recipient usinginformation contained within the video communication request; and anauthorization component configured to determine whether the recipient isidentified within the unauthorized recipient list and to block the videocommunication request in response to the recipient being identifiedwithin the unauthorized recipient list.
 22. The system of claim 21,wherein the unauthorized recipient list is caller-specific.
 23. Thesystem of claim 22, wherein the identification component is furtherconfigured to identify the caller using information contained within thevideo communication request, and wherein the authorization component isfurther configured to locate an unauthorized recipient list specific tothe caller.
 24. The system of claim 21, wherein the interceptioncomponent operates within an interactive television system of thecaller.
 25. The system of claim 21, wherein the interception componentoperates within an intermediate network node linking the recipient andthe caller.
 26. The system of claim 25, wherein the intermediate networknode is selected from the group consisting a cable head-end, an Internetserver, and a satellite broadcast center.
 27. The system of claim 21,wherein the identification component is further configured to extract anidentifier of the recipient from the video communication request. 28.The system of claim 27, wherein the identifier is selected from thegroup consisting of a name of the recipient, a network address of therecipient, and a network address of an interactive television system ofthe recipient.
 29. The system of claim 27, wherein the unauthorizedrecipient list comprises a list of unauthorized identifiers, and whereinthe authorization component is further configured to determine whetherthe extracted identifier is an unauthorized identifier.
 30. The systemof claim 21, wherein the authorization component is further configuredto notify the caller that the video communication request has beenblocked.
 31. A system for screening video communications in aninteractive television system, the system comprising: an interceptioncomponent configured to intercept a video communication request sent bya caller to a recipient; an identification component configured toidentify the recipient using information contained within the videocommunication request; and an authorization component configured todetermine whether the recipient is identified within an authorizedrecipient list and to forward the video communication request to therecipient only if the recipient is identified within the authorizedrecipient list.
 32. A method for screening video communications in aninteractive television system, the method comprising: intercepting avideo communication request sent by a particular caller from a group ofcallers to a recipient; identifying the particular caller and therecipient using information contained within the video communicationrequest; locating an unauthorized recipient list specific to theparticular caller; determining whether the recipient is identifiedwithin the caller-specific unauthorized recipient list; and blocking thevideo communication request in response to the recipient beingidentified within the caller-specific unauthorized recipient list. 33.The method of claim 32, further comprising: determining whether therecipient is identified within a general unauthorized recipient list;and blocking the video communication request in response to therecipient being identified within the general unauthorized recipientlist.
 34. A method for screening outgoing video communications within aninteractive television system, the method comprising: intercepting anoutgoing video communication request; identifying a caller usinginformation contained within the request; determining whether acommunication quota for the caller has been exceeded; and blocking thevideo communication request in response to the communication quota forthe caller being exceeded.
 35. The method of claim 33, wherein thecommunication quota comprises a set number of minutes within a timeinterval selected from the group consisting of a day and a week.
 36. Themethod of claim 33, wherein the communication quota comprises an amountof money allocated to the caller for communication.