Negotiating content controls

ABSTRACT

Access to an electronic conference may be administered by receiving an electronic instruction configured to establish the electronic conference, enabling more than one user to generate content restrictions that limit content rendered during the electronic conference, analyzing one or more participant devices to ensure compliance with the content restrictions, establishing the electronic conference in accordance with the content restrictions, and enabling user access to the electronic conference consistent with the content restrictions.

TECHNICAL FIELD

This document relates to conferencing technologies.

BACKGROUND

Electronic conferencing generally describes a process wherebyconferencing participants can communicate remotely with one anotherthrough the use of a client. The client may include one or more of akeyboard to exchange text communications, a microphone to exchange audiocommunications, and/or a video camera to exchange video communications.

SUMMARY

In one general sense, access to an electronic conference may beadministered by receiving an electronic instruction configured toestablish the electronic conference, enabling more than one user togenerate content restrictions that limit content rendered during theelectronic conference, analyzing one or more participant devices toensure compliance with the content restrictions, establishing theelectronic conference in accordance with the content restrictions, andenabling user access to the electronic conference consistent with thecontent restrictions.

Implementations may include one or more of the following features. Forexample, access to the electronic conference may be enabled through atelephone network or through an instant messaging interface. Enablinguser access to the electronic conference may include regulating whichuser identities are subsequently allowed to access reproductions of theelectronic conference. Enabling user access to the electronic conferencemay include regulating which systems are subsequently allowed to accessreproductions of the electronic conference. Enabling user access to theelectronic conference may include regulating which streams of contentwithin the electronic conference may be accessed.

A watermark capability may be negotiated between the users prior toestablishment of the electronic conference, and a watermark indicativeof the content restrictions may be inserted into content of theelectronic conference.

Proposed content restrictions provided by the more than one user may bereceived. The proposed content restrictions may be compared to identifyone or more disputed parameters in the proposed content restrictions.The more than one user may be prompted to resolve the disputedparameters by highlighting the disputed parameters and asking the morethan one user to select a value for the disputed parameters. Agreed-toparameters appearing in the proposed content restrictions may be lockeddown so that the more than one user cannot change a status of theagreed-to parameters.

Identifying the disputed parameters may include identifying parametersin the proposed content restrictions for which all of the more than oneusers do not agree. Identifying the disputed parameters may includeidentifying parameters in the proposed content restrictions for which amajority of the more than one user do not agree.

Prompting the more than one user to resolve the disputed parameters mayinclude removing parameters having less than a threshold of support.

Removing parameters having less than a threshold of support may includeremoving parameters that none of the users supported, removingparameters that less than a specified portion of users supported, andremoving parameters that less than a specified number of userssupported.

Prompting the more than one user to resolve the disputed parameters mayinclude removing parameters associated with a greater risk for improperuse. Prompting the more than one user to resolve the disputed parametersmay include enabling the users to select from smaller subset of defaultparameters.

Proposed content restrictions provided by the more than one user may bereceived and compared. One or more disputed parameters may be identifiedin the proposed content content restrictions so that the disputedparameters may be substituted with default parameters.

Proposed content restrictions provided by the more than one user may bereceived and compared. One or more disputed parameters may be identifiedin the proposed content content restrictions. A limited exchange ofprompts may be exchanged with the more than one user to resolve thedisputed parameters by highlighting the disputed parameters and askingthe more than one users to select a value for the disputed parameters.After the limited exchange of prompts has been performed, the disputedparameters may be substituted with default parameters.

Content restrictions from the more than one user that differ by at leastparameter between different users may be received. The contentrestrictions may be assimulated into an electronic agreement.

Assimilating the content restrictions into an electronic agreement mayinclude exchanging proposals and counterproposals until all conferenceparticipants agree to identical content restrictions.

Agreeing to identical content restrictions may include agreeing to allowa first user to have a different capability than a second user.

Assimilating the content restrictions into the electronic agreement mayinclude exchanging proposals and counterproposals until a majority ofusers agree to identical content restrictions. Assimilating the contentrestrictions into the electronic agreement may include exchangingproposals and counterproposals using content restrictions provided by aconference manager designated as required parameters and using othercontent restrictions that are not required parameters. Assimilating thecontent restrictions into the electronic agreement may include enablinga limited exchange of proposals and counterproposals, identifyingcompromise parameters likely to be acceptable to one or more users, andusing the compromise parameters for the electronic agreement.

Establishing the electronic conference may include enabling one or moreusers to exchange sidebar communications, wherein the sidebarcommunications represent private communications exchanged between auser-defined subset of conference participants. Enabling user access tothe electronic conference consistent with the content restrictionsincludes selectively enabling users to exchange sidebar communicationsconsistent with sidebar-oriented content restrictions. Enabling one ormore users to generate content restrictions includes specifying whethera user may (1) use screen capture software, (2) use stream recordingsoftware, (3) access archived content, (4) refuse participation whenother users do not agree to specified content restrictions, (5) requirespecified content restrictions, (6) specify how input from the user maybe used, or (7) specify that a royalty must be paid. Analyzing theparticipant devices may include probing for screen capture software,stream recording software, or an electronic microphone attached to theparticipant device.

DESCRIPTION OF DRAWINGS

FIG. 1 illustrates an exemplary user interface enabling a user tospecify content restrictions.

FIG. 2 illustrates an exemplary user interface presented on a clientduring establishment of an electronic conference.

FIG. 3 illustrates an exemplary user interface with an executive summaryof content restrictions used in an electronic conference beingestablished.

FIG. 4 illustrates an exemplary user interface enabling a user toparticipate in an online conference.

FIG. 5 illustrates an exemplary user interface presented when the userrequests access to archived content.

FIG. 6 illustrates an exemplary communications system capable ofestablishing an electronic conference between multiple participants.

FIG. 7 illustrates a content control system that may be used to generateand enforce content controls for a multiparty electronic conference.

FIG. 8 illustrates the operation of an electronic conference betweenfour conferencing participants.

FIG. 9 is a flow chart of an exemplary process by which a client mayparticipate in an electronic conference by accessing a host.

FIG. 10 is a flow chart of an exemplary process by which one or morenon-sponsored clients may participate in an event sponsored by a client.

FIG. 11 is a flow chart of an exemplary process by which clientsgenerate content restrictions for archiving and later access archivedcontent through the host.

DETAILED DESCRIPTION

The ever-increasing power of communications networks and the increasingsophistication of communications applications have placed electronicconferencing tools in the hands of many users. These electronicconferencing tools may be used. For example, as a collaborative businessapplication, a social tool, or a source of entertainment. Often, arobust electronic conferencing application may be invoked through aseemingly simpler communications application, such as an instantmessaging application. For example, an instant messaging application mayinclude an audio or videoconferencing client that enables an instantmessaging user to use a microphone or video camera in an electronicconference. Even where a user does not have a microphone or videocamera, the user may perceive content rendered by others so equipped,and may enjoy the electronic conference as a passive participant or mayparticipate by entering text using a keyboard.

While the electronic conferencing applications are become increasinglysophisticated and popular, a number of factors cause user concern. Someof the concerns may include fears that content exchanged during anelectronic conference may be freely distributed. The free distributionof electronic conferencing content may violate a copyright provision,threaten privacy interests, prevent conference participants from havingfrank exchanges, and even preclude some conference participants fromparticipating altogether. In some cases, the content generated andexchanged during an electronic conference may represent originallycreated or derivative copyrighted works.

Furthermore, the content generated and exchanged during an electronicconference may represent valuable content. Depending on the underlyingpurpose of the electronic conference, the content may represent valuableinstruction and feedback, marketing data, or cherished communicationsbetween family members. Entertainers may use an electronic conference toincrease the presence and accessibility of a popular media asset, suchas a talk show host. Businesses may use the electronic conference tocollaborate and exchange ideas.

To realize the full potential of electronic conferencing, access to anelectronic conference may be administered in accordance with contentrestrictions designed to protect the interests of one or more parties tothe electronic conference. Thus, an electronic conferencing host mayreceive an electronic instruction configured to establish an electronicconference. Users may generate content restrictions that limit contentrendered during the electronic conference. Electronic clients that areto participate in the conference may be analyzed to ensure compliancewith the content restrictions. The electronic conference is establishedin accordance with the content restrictions to enable user access to theelectronic conference consistent with the content restrictions.

For example, a media company may seek to use electronic conferencing toincrease the appeal of popular artists affiliated with the company. Thecompany may work with an online service provider, such as AmericaOnline, to host an electronic conference accessible to a largeelectronic conferencing audience. Prior to establishing the electronicconference, conference participants may engage in a negotiation overcontent restrictions that regulate how the electronic conferenceoperates. For example, America Online may request that archives of theelectronic conference may not be accessed after 30 days unless a smallroyalty of $1 is paid. The artists may agree to America Online's royaltyprovisions in exchange for a percentage of the royalties. The companymay insist that stream ripping programs not be used, and may insist onverifying that such stream ripping programs are not being used. Usersmay similarly request an ability to sing alongside the popular artistsand to generate a personal recording so that the users may subsequentlyaccess an archive of the recorded ‘sing along’. The users also mayinsist that the recorded ‘sing along’ only be accessible to the user andthe user's immediate friends.

After assimilating the proposed content restrictions from one or moreusers, possibly through a sequence of negotiations, content restrictionsfor the electronic conference are established. For example, the contentrestrictions proposed by America Online, the company, and the user(e.g., content restrictions related to the ‘sing along’ recording) maybe adopted, while the proposed artist content restrictions are notincluded in the content restrictions. The electronic conference isestablished using the content restrictions so that users may access theelectronic conference in a manner consistent with the contentrestrictions. As a result, America Online may collect royalties foraccess to an archive of the electronic conference and the users may beallowed to access their personal ‘sing along’ recordings.

FIG. 1 illustrates an exemplary user interface (UI) 100 that enables auser to specify desired content restrictions. For example, UI 100 may bepresented to a user when the user attempts to establish an electronicconference. The UI 100 includes a general preferences section 110, anarchive preferences section 120, and a sidebar preference section 130.In general, a version of the UI 100 is presented to each potentialconference participant, so that each participant can set forth desiredrestrictions. As discussed below, a negotiation process then is used todefine a final set of restrictions.

General preference section 110 enables users to specify generalpreferences pertaining to content distributed during an electronicconference. In particular, a user may select one or more elements inorder to generate content restrictions using the selected elements. Asshown, element 111 may be selected to not allow stream ripping programs.Element 112 may be selected to not allow screen capture. Element 113allows an indication of rights to be inserted into the content. In oneexample shown by element 114, inserting an indication of rights includesinserting an audio of visual representation of the content restrictionswhen the content is rendered. Separately or in addition, inserting anindication of rights may include inserting a watermark into the content.The watermark may identify the content, identify the protected nature ofthe content, identify the electronic conference participants, and/oridentify a set of permissions regulating how the content may be used. Inone implementation, when the watermark does not explicitly indicatecontent restrictions for the content, the watermark may be used as areference to retrieve the content restrictions for the content. Element115 may be selected to archive an electronic conference for subsequentaccess while element 116 may be selected to indicate a refusal toparticipate if content from the electronic conference is archived. Otherexamples of content restrictions may include, but are not limited to,requirements that the content may never be accessed after a certaindate, without user's expressed consent, and/or without a payment.

Archive preference section 120 specifies how information distributedduring the conference may be archived. In particular, a user may selectone or more elements in order to generate content restrictions relatedto archiving using the selected elements. As shown, element 121 may beselected to not allow archiving of INPUT_A. For example, INPUT_A mayrepresent a user's personal camera or microphone. The user may selectelement 121 to prevent subsequent access to the user's contributions tothe electronic conference. In another example, the user may elect tofilter out the content provided by a particular user. By selectingelement 122, a user is provided more granular control over theirarchiving preferences. For example, a user may preclude the user'sinputs from ever being used (element 123), to be used after 30 days(element 124), or to be used without the user's expressed writtencontent (element 125). Separately or in addition, element 126 enablesthe user to selectively enable access to the archive so that the contentmay not be accessed unless the requestor is a subscriber (element 127),pays a specified amount, such as $1 (element 128), and/or was aconference participant (element 129).

Other examples of archive preferences may include, but are not limitedto, enabling archival of content at specified bit-rates (e.g., highbit-rate video capturing is available only to paying customers),specifying a duration of recording allowed (e.g., 10 minutes of freepreview for non-paying customers), and/or types of content/documentsthat may be saved on the user's computer (e.g., MP3, NSV, PDF, or Word).

Typically, sidebar preference section 130 specifies whether sidebarcommunications are permitted, what forms of sidebar communications arepermitted, and how sidebar communications may be archived. Generally,sidebar communications describe private communications between a subsetof conference participants. As shown, sidebar preference section 130includes checkboxes that may be checked to allow sidebar chats (element131) or audio exchanges (element 132), and to provide a chat transcriptof the main conversation during sidebar communications (element 133). Anadditional checkbox may be used to specify whether sidebar chats may bearchived (element 134).

FIG. 2 illustrates an exemplary UI 200 presented on a client duringestablishment of an electronic conference. UI 200 illustrates anegotiating feature set that enables clients to resolve disagreementsrelated to content restrictions. For example, UI 200 may be presented toa user in response to differing content restrictions entered bydifferent users while completing UI 100. As shown, the recipient,PERSON_A and PERSON_B desire to establish a conference with conflictingcontent restrictions. Prior to joining an electronic conference, therecipient requests that the conference be archived for subsequentaccess, e.g., by selecting element 115 in UI 100. PERSON_B requires theconference to be archived, and asks for consent upon subsequent accessto the archived content. PERSON_A, on the other hand, refuses toparticipate if the conference is archived, e.g., by selecting element116 in UI 100. Therefore, the initial archiving requirements set forthbe PERSON_A disagree with those proposed by the recipient and PERSON_B.

To resolve the disagreement between PERSON_A and other clients, UI 200proposes that conference participants agree to the archiving of theconference for 30 days, except for PERSON_A's contributions. Theproposal by the UI 200 may be generated automatically by an automatednegotiating agent or created by a person overseeing a conference, suchas a discussion or conference moderator. Alternatively, the conferenceparticipants may themselves propose new content restrictions to resolvethe disagreements. Once a new proposal for content restrictions isready, an electronic conference manager prompts conference participantsto agree to the new set of content restrictions and, upon receivingconfirmation that the participants agree, proceeds to establish anelectronic conference.

FIG. 3 illustrates an exemplary UI 300 with an executive summary ofcontent restrictions used in an electronic conference being established.The UI 300 presents the summary to the participating users uponsuccessful resolution of disputed parameters in the proposed contentrestrictions. The UI 300 includes a list of general content restrictionsapplicable to all participants. For example, elements 310 and 320indicate that no stream ripping programs or screen capture programs areallowed. Element 330 indicates that a discrete notification of rightswill be included. Element 340 indicates that the conference will bearchived for 15 days. In addition, UI 300 may include a list ofindividual restrictions applicable only to the specific participants. Asshown, elements 350 and 360 illustrate that some of the contentrestrictions relate to a particular group of users, in this case,CONFERENCE_PARTICIPANTS. In particular, element 350 indicates that onlyCONFERENCE_PARTICIPANTS may access the stored archive, and element 360indicates that CONFERENCE_PARTICIPANTS will receive notification ofsubsequent access. As illustrated by the underlining, theCONFERENCE_PARTICIPANTS link presents access to an active form that maybe used to retrieve information about the group of users who areparticipating in the conference and to propose changes to the contentrestrictions or to another parameter of the conference. Elements 370 and380 indicate that sidebar conversations are allowed, and texttranscripts will be provided during sidebar conversations.

FIG. 4 illustrates an exemplary UI 400 that enables a user toparticipate in an online conference. The UI 400 may include one or moreof the following sections: a video conferencing section 410, an imageconferencing section 420, an audio conferencing section 430, a sidebarsection 440, a text conferencing section 450, and a summary of contentrestrictions section 460.

Typically, video conferencing section 410 features video exchangedduring an electronic conference. In one implementation, eachconferencing participant has related text and audio conferencingapplications, and a conferencing participant currently active may berendered by the video conferencing section 410.

Image conferencing section 420 is configured to present imaginginformation in conjunction with an electronic conference. Examples ofthe imaging information may include photographs of a current speaker orother conference participants, a map, an album cover, a photo fordiscussion, an emblem, a motif, or a symbol. As desired, the imageconferencing section 420 (or the video conferencing section 410) may beexpanded to cover the entirety of the UI 400.

The audio conferencing section 430 depicts an audio control orapplication used in an electronic conference application. The audioconferencing section 430 may represent the audio exchanged between allusers as the primary content in an electronic conference. Alternatively,the audio conferencing section 430 may represent the audio associatedwith a particular conference participant, regardless of whether theconference participant is the primary content.

In some instances, general audio sources generated simultaneously maycause destructive interference that makes them difficult to understand.For this reason, the audio channel may be structured so that one audiochannel is broadcast at a time. For example, implementations maycommonly manage all audio conferencing applications and apply the sameoperating instructions to all received audio signals. In one example,receiving several different audio sources simultaneously may cause userconfusion or comprehension difficulties that may be avoided through theapplication of filtering criteria generic to several users.Alternatively, it may be desirable to provide source-specific operatingand/or filtering instructions. For example, where the different audiosignals are received at different strengths, the conferencingparticipant may wish to reduce the volume from one conferencingparticipant and increase the volume from another conferencingparticipant. In another implementation, a conferencing participant maywish to listen to everything from a first conferencing participant and“mute” or suppress the audio from a second conferencing participant.Each function may be enabled through filtering controls (not shown) thatmay be accessed using audio conferencing section 430.

The sidebar section 440 relates to communications exchanged between asubset of conference participants. Generally, sidebar sections are usedso that smaller communities may privately exchange communications. Forexample, a conference participant may attempt to privately build aconsensus between team members, a conference manager may attempt toprivately solicit feedback from a conference participant, or friends mayengage in more stimulating conversation if the primary content of theelectronic conference is lacking.

As shown, sidebar section 440 shows a sidebar chat exchange betweenPERSON_C and PERSON_D. Other types of sidebar sections may includevideoconferencing sidebars, audio sidebars, or a whiteboard sidebar.

Text conferencing section 450 presents a textual communicationsinterface that enables textual information to be exchanged. In oneimplementation, text conferencing section 450 represents a transcript ofthe audio exchanged during the electronic conferencing. In anotherimplementation, text conferencing section 450 represents a chat windowused to chat or exchange instant messages.

Text conferencing section 450 may include a textual application commonto all conference participants or specific to particular conferenceparticipants. In one implementation where text conferencing is a commonapplication to all conference participants, when a conferenceparticipant enters a message to be communicated, the conferenceparticipant identification may appear next to the message. Inimplementations of participant-specific text conferencing, the messagemay be displayed so that it appears in association with its source(e.g., underneath the corresponding participant).

Summary of content restrictions section 460 displays the contentrestrictions in effect for the electronic conference. As shown, thesummary of content restrictions section 460 indicates that (1) no streamripping or screen capture is allowed; (2) the conference will bearchived for 15 days for CONFERENCE_PARTICIPANTS; and (3)CONFERENCE_PARTICIPANTS will receive notification of subsequent access.CONFERENCE_PARTICIPANTS may represent a group identity for one or moreconference_participants. Other examples of content restrictions mayinclude those applicable to a subset of those attending the electronicconference. The section 460 also may depict an alarm state when a userattempts to access content in contravention of the content restrictions.

The summary of content restrictions section 460 presents conferenceparticipants with content restrictions used during the conference. Thesummary of content restrictions 460 may include a list of generalcontent restrictions applicable to all participants. In addition, thesummary may include a list of individual restrictions applicable only tothe specific participants. Finally, some of the more importantrestriction requirements may be highlighted in the summary of contentrestrictions section 460 to capture participants' attention. Thehighlighted fields may emphasize one or more content restrictions.Hyperlinks may be provided to explain the content restrictions and/orprovide a tool for the user to control the content restrictions. After aconference is completed, an archived version of the conference may beaccessed.

FIG. 5 illustrates an exemplary UI 500 presented when a user requestsaccess to the archived content. In particular, UI 500 indicates that therequestor is attempting to access an archive of CONFERENCE_A. Theconsent of PERSON_B, who may be a conference participant that insistedon consent during negotiation of the content restrictions, is required.If PERSON_B approves the request, the cost of access is $1, and PERSONSA, B and C will be notified of the retrieval of the archived content.

The system's ability to provide notice of subsequent access to archivedcontent may be useful to a variety of users. For example, PERSON_A mayrepresent an administrator for an online service provider who sponsoredCONFERENCE_A, and may elect to receive notification to monitor forimproper use, and also to identify use patterns and popular content.PERSON_B may represent an entertainer who jealousy guards his right ofpublicity. PERSON_C may include a popular host who graciously agreed toparticipant in CONFERENCE_A, but was curious about how CONFERENCE_A wasbeing used.

FIG. 6 illustrates an exemplary communications system 600 that iscapable of establishing an electronic conference between multipleparticipants. Communication system 600 may be structured and arranged toinclude two or more clients 610 and communication software and hardwarethat enables communications between them. More particularly, thecommunications system 600 may include a first client 610, a secondclient 615, a network 620, and a host 630. A client 610 generallyexchanges one or more data units across network 620 with a host 630and/or with client 615 or other clients (not shown).

Each of the client 610 and the client 615 typically includes a computersystem that converts a media feed into a stream. The client 610 and theclient 615 each may be structured and arranged to send or receive amedia stream (e.g., a video or audio feed) across the network 620. Theclient 610 and the client 615 each may include a general-purposecomputer having a central processor unit (CPU) and memory/storagedevices that store data and various programs such as an operating systemand one or more application programs. Other examples of a client 610 ora client 615 include a workstation, a server, a device, a specialpurpose device or component, a broadcast system, other equipment, alaptop, a PDA (“Personal Digital Assistant”), a wireless phone, or somecombination thereof capable of responding to and executing instructionsin a defined manner. The client 610 or the client 615 also typicallyincludes an input/output (I/O) device (e.g., one or more devices havinga video and/or audio input and conversion capability) and peripheralequipment such as a communications card or device (e.g., a modem or anetwork adapter) for exchanging data with the network 620.

For instance, in one implementation, the client 610 includes one or moreinformation retrieval software applications (e.g., a browser, a mailapplication, an instant messaging client, an Internet service providerclient, or an AOL TV or other integrated client) capable of receivingone or more data units. The information retrieval applications may runon a general purpose operating system and a hardware platform thatincludes a general purpose processor and specialized hardware forgraphics, communications and/or other capabilities. In anotherimplementation, client 610 may include a wireless telephone running amicro-browser application on a reduced operating system with generalpurpose and specialized hardware capable of operating in mobileenvironments.

Generally, each of client 610 and client 615 participates in anelectronic conference by transmitting and receiving streams of dataunits. However, implementations may include having a client participatein an asynchronous mode. For example, an electronic conference mayincorporate a news feed that is being discussed and transmitted by atransmitting participant. In another example, a briefing may beincorporated into an electronic conference to enable widerparticipation. Other asynchronous modes may include conferencingparticipants that receive but do not transmit. The network 620 typicallyincludes hardware and/or software capable of enabling direct or indirectcommunications between the clients 610 and 615 and the host 630. Thenetwork 620 may include a direct link between the client 610 and thehost 630, or it may include one or more networks or subnetworks betweenthem (not explicitly shown). Each network or subnetwork may include, forexample, a wired or wireless data pathway capable of carrying andreceiving data. Examples of network 620 include the Internet, the WorldWide Web, a WAN (“Wide Area Network”), a LAN (“Local Area Network”), ananalog or a digital wired or wireless telephone network (e.g., a PSTN(“Public Switched Telephone Network”), an ISDN (“Integrated ServicesDigital Network”), or a xDSL (“any form of Digital Subscriber Loop”)),and/or a radio network, a television network, a cable network, asatellite network, or some other delivery mechanism for carrying data.

The host 630 may include one or more devices capable of enabling anelectronic conference of two or more conferencing participants. The host630 may include a controller (not shown) that processes instructionsreceived from or generated by a software application, a program, a pieceof code, a device, a computer, a computer system, or a combinationthereof, to direct operations of the host 630. The instructions may beembodied permanently or temporarily in any type of machine, component,equipment, storage medium, or propagated signal that is capable of beingdelivered to the host 630 or that may reside with the controller at thehost 630. The host 630 may include a general-purpose computer (e.g., apersonal computer) capable of responding to and executing instructionsin a defined manner, a system or a component in the duplicating switch,other equipment, or some combination of these items that is capable ofresponding to and executing instructions.

For instance, in one implementation, the host 630 includes one or morescheduling, management, digital rights management, and authenticationapplications (e.g., calendaring software) capable of establishing andmanaging one or more electronic conferences. These scheduling andauthentication applications may run on a general purpose operatingsystem and a hardware platform that includes a general purpose processorand specialized hardware for graphics, communications and/or othercapabilities. In another implementation, host 630 may include a contentdistribution component (e.g., a server or program) that determines whichsystems will be used to support an electronic conference. For example,the host 630 may be structured and arranged to provide to theconferencing participants with information identifying which specificdevice will host the conference (e.g., which device will duplicate andtransmit the streams of data units), or to provide to the designateddevice with the required information and authorization to host theconference.

Implementations of the host 630 may include a service provider or aconference organizer. For example, a service provider may offerconferencing services and arrange or set up conferences. In anotherexample, a conference organizer (e.g., a user putting together anelectronic conference) may act both as a host 630 and a client 610. Inyet another example, the host 630 includes one or more code segmentsconfigured to negotiate and administer content restrictions.

The host 630 may include or be configured to control the operation ofone or more distribution devices. In one implementation, thedistribution device includes a server. In another implementation, thedistribution device includes a duplicating switch. By enabling the host630 to control the operation of a duplicating switch, an electronicconferencing provider may maximize the performance of duplicatingswitches while using a more flexible, general-purpose processingcapability on a server to administer the more computationally-intensivecontent restriction system. For example, duplicating switches may beconfigured to perform content restriction operations associated withnetwork operations while a server is configured to perform contentrestriction operations that are not able to take advantage of thecapabilities of the duplicating switch.

In particular, a duplicating switch may represent a duplicating resourceable to distribute large amounts of content to a large number ofparticipants at high bandwidths. Therefore, it may be advantageous toallocate the switch resources to such distribution, and to allocateother resources to the execution of additional operations related tonegotiating and administering content restrictions, implementing adigital rights management suite, archiving content, and performing otheroperations. While many of the operations performed in support ofelectronic conferencing may be implemented using network operations(e.g., packet replication and filtering), availing to those operationsan opportunity to take advantage of the increased performance associatedwith using a duplicating switch, other operations may not be as wellsuited towards a duplicating switch implementation. Thus, increasedperformance may be realized by using a host to perform those electronicconferencing operations not suited for implementation within aduplicating switch, while using the duplicating switch to realizeincreased performance for those operations that are so suited. And, thegeneral-purpose processing capability of a host may be used to handlethe negotiations and establishment of content restrictions. The host maygenerate a configuration of network operations that is then pushed to aduplicating switch for implementation.

Below, details indicating componentry and functionality of a duplicatingswitch are described to more fully illustrate its capabilities incontent distribution and interoperability with other host resources thatmay be used to execute the above-noted additional operations. Theduplicating switch typically is structured and arranged to receive astream of data units (e.g., from the client 610), to duplicate thestream of data units, and to transmit the duplicated streams to two ormore conferencing participants.

In some implementations, the duplicating switch is structured andarranged to perform filtering and forwarding between different domainsat the same level of the protocol stack in the OSI (“Open SystemInterconnection”) reference model. For example, in some networks, theduplicating switch may forward Ethernet frames between differentEthernet segments. In another example, the duplicating switch mayforward IP packets between different IP subnets.

Generally, the duplicating switch includes a device that performsnetwork operations and functions in hardware (e.g., a chip or a part ofchip). In some implementations, the device may include an ASIC(“Application Specific Integrated Circuit”) that implements networkoperations logic directly on a chip (e.g., that includes logical gatesfabricated on a silicon wafer and then manufactured into a chip). Forexample, an ASIC chip may implement a logical gate structure in siliconto perform filtering by receiving a packet, examining the IP address ofthe received packet, and filtering based on the IP address.

Implementations of the device included in the duplicating switch may usea Field Programmable Gate Array (FPGA). A FPGA is generally defined asincluding a chip or chips fabricated to allow third party designers toimplement a variety of logical designs on the chip. For example, a thirdparty designer may load a design within a FPGA to replace the receivedIP addresses with different IP addresses, or may load a design withinthe FPGA to segment and reassemble IP packets as they are modified whilebeing transmitted through different networks. In another example, theFPGA is configured to perform key management/generation/distributionoperations. Other examples of operations may include hardware encryptionoperations and/or packet inspection/filtering.

Implementations of the device included in the duplicating switch mayinclude a network processor. A network processor generally is defined toinclude a chip or chips for allowing software to specify networkoperations to be performed. A network processor may perform a variety ofoperations. One example of a network processor may include severalinterconnected RISC (“Reduced Instruction Set Computer”) processorsfabricated in a network processor chip. The network processor chip mayimplement software on some of the RISC processors to change an IPaddress of an IP packet. Other RISC processors in the network processorchip may implement software that determines which conferencingparticipants are receiving an IP stream.

Although various examples of network operations were defined withrespect to different devices, each of the devices may to be programmableand capable of performing the operations of the other devices. Forexample, the FPGA device is described as the device used to replace IPaddresses and segment and reassemble packets; however, a networkprocessor and ASIC are generally capable of performing the sameoperations.

FIG. 7 illustrates a content control system 700 that may be used togenerate and enforce content controls for a multiparty electronicconference. The content control system 700 includes a contentdistribution module 710, a communications interface 720, a regulationmodule 730, a negotiation module 740, and an archiving module 750. Inthe system of FIG. 6, the content control system 700 may be implementedby the host 630.

Generally, the content control system 700 enables one or more users tointerface with an electronic conference manager and each other throughnegotiation module 740 to generate content restrictions. The contentrestrictions then are enforced using the regulation module 730, so thatthe content distribution module 710 and the archiving module 750distribute content in manner regulated in accordance with the contentrestrictions.

The content distribution module 710 may be used to exchange contentbetween conference participants. The content distribution module 710also may be used to retrieve content from the archiving module 750 forsubsequent access.

Generally, the communications interface 720 may be used to enableoperation and management of an electronic conference. The communicationsinterface 720 may interface with the content distribution module 710 todistribute content exchanged during an electronic conference, interfacewith a negotiation module 740 to negotiate parameters in the contentrestrictions, interface with a regulation module 730 to administer theelectronic conference, and/or interface with an archiving module 750 toenable subsequent access to archived content.

Typically, the regulation module 730 is a code segment configured toenforce content restrictions for an electronic conference. Becausecontent restrictions may encompass a variety of tools, formats, andoperating modes, the regulation module 730 may be configured to operatein a manner reflective of the underlying content restrictions.

For example, when content restrictions require the use of a trustedmedia player using a robust digital rights management (DRM) suite, theregulation module 730 may include a server program configured to pushDRM settings to the participating trusted media players. In one example,the regulation module 730 is configured to instruct trusted mediaplayers to (1) disable microphones and screen capture software; (2)provide the content regulation module 730 with a snapshot of otheractive applications and processes; and (3) periodically confirm that DRMsettings are still in effect.

Alternatively or in addition, when the content restrictions relate toeavesdropping provisions, the regulation module 730 may provide ananti-eavesdropping code segment configured to check for knowneavesdropping programs. The content regulation module then may suspendconference establishment until the regulation module 730 has confirmedthat conference participants have downloaded the program, checked foreavesdropping programs, and confirmed to the regulation module 730 thateavesdropping programs are not being used.

Another form of content restrictions may include providing asymmetricaccess to content, such that conference participants are allowed accessof differing scope to electronic conference content. For example, in thecase of some conference participants who are managers who engage insidebar conversations during the electronic conference, the regulationmodule 730 may ensure that only managers are accessing the sidebarconversation. The regulation module 730 also may regulate the manner inwhich archived content is accessed in a similar way.

Typically, negotiation module 740 is a code segment configured tosupport the exchange of proposals and counterproposals in order togenerate content restrictions used for an electronic conference. Forexample, the negotiation module 740 may present a user interface, suchas the user interface 100 of FIG. 1, that provides a series of promptswith proposed parameters for content restrictions. When two or moreusers disagree over one or more parameters, the negotiation module 740may present a user interface, such as the user interface 200 of FIG. 2,that enables exchange of a series of counterproposals so that contentrestrictions responsive to users' interests may be established.

In one implementation, the negotiation module 740 is configured toexchange counterproposals between conference participants until allconference participants agree to a common set of content restrictions.However, in some implementations, it may not be feasible to reachagreement between all conference participants. As a result, thenegotiation module 740 may be configured to establish contentrestrictions that are reflective of the expressed interest of the usercommunity, even where agreement cannot be reached. For example, thenegotiation module 740 may be configured to exchange three rounds ofproposed content restrictions. The first round may afford conferenceparticipants the opportunity to exchange content restrictions. Thesecond round may render the general sentiments of the conferenceparticipants (e.g., 7 of 9 conference participants prefer parameter 1 toparameter 2 and 5 of 9 conference participants prefer parameter 3 toparameter 4), and enables conference participants to change theirpreferences knowing the preferences of other conference participants. Athird round may reveal that some parameters have been ‘locked down’,that is, parameters previously agreed to can no longer be negotiated,and also affords conference participants a final opportunity to expressa preference for a parameter. A parameter may be ‘locked down’ whencomplete agreement has been reached, or when a threshold level ofsupport has been reached (e.g., more than 50% of the conferenceparticipants agree when three or more parameters are present or 70% ofthe conference participants agree when two parameters are present).Locking down a parameter may be used to secure a level of agreement sothat new disputes cannot be introduced in the later rounds ofnegotiations. In a similar variation, certain parameters may be removedfrom a list of available parameters when support for a particularparameter is less than a threshold level of support. Thus, when fouroptions are proposed for a particular parameter appearing in the contentrestrictions and conference participants only express a preference fortwo of the options, the two options without conference participantsupport may be removed from the list of available options.

The negotiation module 740 also may be configured to reduce thenegotiation complexity by adopting or favoring certain options in thecourse of the negotiation. For example, some portions of the content maybe deemed more sensitive, such that the consequences of improper use maybe associated with a greater adverse impact. In a trusted environment,it is possible that all conference participants will agree to provideall conference participants access to the sensitive information.However, if agreement cannot be reached, the negotiation module 740 mayremove the option that allows all conference participants access to thesensitive information. Thus, the negotiation module 740 may specify anoption when an agreement cannot be reached, and may do so by selectingone or more parameters for the content restrictions that maximizeprotection of the privacy interests of the conferencing participants.For instance, maximizing the privacy interests may prevent subsequentaccess to the contributions of a conference participant without expressapproval of the conference participant, with such approval beingconveyed electronically.

The content restrictions negotiated by the negotiation module 740 neednot be symmetric with respect to all conference participants and allcontent. Rather, the content restrictions may be 1) asymmetric withrespect to a piece of content; and/or 2) asymmetric with respect to aconference participant. A content restriction is asymmetric with respectto a piece of content if a first community of users has a differentcapability than a second community of users with respect to accessing,copying, modifying, and distributing the piece of content. Thus, someconference participants (e.g., a manager) may be allowed to access thepiece of content (e.g., a sidebar conversation) while other conferenceparticipants are not. Similarly, a content restriction is asymmetricwith respect to conference participants if a first user has a differentcapability than a second user. Thus, a first user may be allowed to usea wireless phone to access an electronic conference while a second useris not. Content restrictions with asymmetric aspects may be establishedthrough the negotiation process. For example, a first conferenceparticipant may enable universal access without restriction to contentprovided by the first conference participant while a second conferenceparticipant may refuse all access to any content provided by the secondconference participant. While the first and second conferenceparticipants have specified different options for content restrictions,the asymmetric difference in capabilities does not preclude contentrestrictions from being generated.

The negotiation module 740 also may manage negotiations betweendifferent classes of conference participants, and, in particular,between classes of conference participants where a first class ofconference participants is preferred over a second class of conferenceparticipants. In one example, the preferred class of conferenceparticipants includes a sponsor, creditor, or manager for an electronicconference. The negotiation module 740 may be configured to use one ormore parameters in content restrictions provided by the preferred classof conference participants over parameters provided by the non-preferredclass. For example, when an electronic conference is sponsored by apreeminent media company (e.g., Time Warner) to enable fan access to apopular entertainer, and the popular entertainer will provide valuablecontent (e.g., by singing the song by which the artist is known), thenegotiation module 740 may be configured to use parameters provided bythe preeminent media company. In one implementation, the negotiationmodule 740 is only configured to favor a subset of content restrictions,such as those parameters designed to protect the interest of thepreferred class (e.g., to prevent illicit copying of an artist's song).In another example, the negotiation module 740 is configured to useparameters for any content restrictions, regardless of whether theparameters protect the interest of the preferred class. Thus, anegotiation module 740 may be configured to enable sponsor control overa simultaneous chat to prevent disparaging remarks from being enteredinto the forum.

The archiving module 750 includes a system configured to archive contentgenerated during the electronic conference so that the content may besubsequently accessed. Because content generated during an electronicconference may include contributions from a number of conferenceparticipants, the archive module 750 may be configured to reconstructportions of the electronic conference to reflect the contributions ofspecified conference participants. In one implementation, an electronicconference is used as a marketing survey. The marketing survey mayintroduce one or more items and elicit user response (e.g., by verbal ortextual communications). Conference participants may be segmented bydemographic so that a marketing manager may replay the response ofdifferent segments of the conference participants to gauge the responseof particular segments of interest.

FIG. 8 illustrates the operation of an electronic conference betweenfour conferencing participants. Conferencing participants 810, 820, 830and 840 each generally correspond to the clients described with respectto FIG. 6 and duplicating switch 850 generally corresponds to the hostduplicating switch described with respect to FIG. 6.

Each of conferencing participants 810, 820, 830, and 840 transmits onestream of data units to the duplicating switch 850 for duplication, andreceives the duplicated streams of the other participants in return fromthe duplicating switch 850. When each conferencing participant receivesthe stream of data units of all the other conferencing participants, thetotal number of streams sent out by the switch is 2(N−1), where N is thenumber of conferencing participants (i.e., the switch sends out sixstreams when there are four participants). Although FIG. 8 illustrateshaving each conferencing participant receive the stream of every otherconferencing participant, some implementations, particularly thosehaving a large number of conferencing participants, may use intelligentselection and filtering techniques to reduce the number of streams thatare transmitted to each participant.

Furthermore, although one duplicating switch is depicted,implementations may include using more than one duplicating switch. Forexample, several users may initiate an electronic conference at oneduplicating switch. However, as additional users join the electronicconference, an electronic conference manager may desire to preserve theintimacy associated with smaller audiences in an electronic conference.Thus, the electronic conference manager may invoke additionalduplicating switches, and transfer additional conference participants tothe additional duplicating switches as required, so as to keep thenumber of audience members below an ‘intimacy’ threshold. The thresholdmay be specified in the content restrictions. Still, in anotherimplementation, a first duplicating switch with limited availablecapacity may initiate a connection to a second switch and send all newconnections to the second switch. Initiating the connection to thesecond duplicating switch may include exchanging duplicated data unitsbetween the first and second duplicating switches. In another example,when the second duplicating switch is activated, several users may betransferred to the second duplicating switch to be hosted by the secondduplicating switch. Implementations also may include intelligent switchselection criteria that activate use of a second duplicating switch. Forexample, when the duplicating switch determines that several users arelocated in the same proximity, the duplicating switch may activate anadditional switch that is closer to the users to host the conference sothat duplicated streams are not being transmitted across large portionsof the network. The users may be organized by proximity according tocontent restrictions so as to align proximate users in an electronicconference.

Referring to FIG. 9, flow chart 900 illustrates an exemplary process bywhich a client 901 may participate in an electronic conference byaccessing a host 903. For convenience, particular components andmessaging formats described earlier are referenced as performing theprocess. However, similar methodologies may be applied in otherimplementations where different components are used to define thestructure of the system, or where the functionality is distributeddifferently among the components shown. For example, users may beorganized into a series of chat rooms during a video conference. Theusers may be organized by location, by interest, by age or by anotherparameter. The organization may be expressly noted, such as, forexample, by notifying the users of the organization in the chat room.Alternatively, the organization may be passive and not expresslyprovided.

Initially, clients 901 and 902 generate an electronic instruction tohost 903 (905). The instruction may include a request to join an onlinechat session, an electronic conference, or an automated discussion.Typically, the instruction is generated by client software that allowseach of the client 901 and the client 902 to exchange information withcorresponding software running on the host 903. Each of the clientsystem 901 and the client system 902 communicates with the host 903through various channels, such as a modem connected to a telephone lineor a direct Internet connection using a transfer protocol such asTransfer Control Protocol/Internet Protocol (TCP/IP).

Once the host 903 receives electronic requests from the clients wishingto join a chat session or an electronic conference (910), the host 903prompts for content restrictions (915). The client 901 receives theprompt (920). For example, the prompt displayed on clients 901 and 902may present the prompt for content restrictions shown in UI 100.Typically, prompting for content restrictions enables a user to select aset of desired content restrictions for an electronic conference.Content restrictions may regulate the subsequent reproduction of thecontent generated during the electronic conference. Examples of contentrestrictions may include, but are not limited to, preferences related toscreen capture, stream ripping, or archiving. Clients 901 and 902generate content restrictions (920) and transmit content restrictionsback to the host 903 (925).

Host 903 receives content restrictions (930). The host 903 determineswhether content restrictions support establishing a conference (935).For example, the host 903 determines whether the content restrictionsspecified by clients are in accord with each other and thus allowconference establishment. If content restrictions do not supportestablishment, (e.g., users cannot agree on content restrictions), thehost 903 may once again prompt clients for content restrictions (915).For example, if one of the clients initially disallowed screen capturewhile other clients revised the screen capture feature, the host 903 maygenerate an additional prompt indicating that the conference cannot beestablished due to a disagreement related to screen capture.Furthermore, the prompt may indicate that the conference will notproceed unless conference participants are in agreement. Alternativelyor in addition, ‘superior’ negotiating privileges may be provided tospecially-designated clients. Thus, a client wishing to distribute someelectronic material, such as a first draft of a book, may electronicallyacquire an ability to block all other users from joining an electronicconference until conference participants agree that the electronicconference may not be reproduced or archived.

When content restrictions support establishing a conference, the host903 launches a probe for compliance with content restrictions (940). Forexample, when the host 903 identifies an acceptable set of contentrestrictions for the conference, the host 903 may check whetherparticipating clients comply with the content restrictions (e.g., whenno stream ripping is permitted, the host may confirm that theparticipating clients are not running programs capable of streamripping).

Clients 901 and 902 probe for compliance with content restrictions(945). For example, the host 903 may launch a security-checking softwareprogram on each of the participating clients. The probe scans theclients and determines whether the client complies with the contentrestrictions established for the electronic conference. In one example,the probe reports, blocks, or disables software/features that violatecontent restrictions established for the electronic conference.Separately or in addition, the probe may block client access to theelectronic conference until the client manually configures his/hersystem to comply with the content restrictions. Thus, if use of streamripping programs is not permitted, the probe may scan the client forstream ripping programs and block client access to the conference when astream ripping program is found in client memory. In another example, ifcontent restrictions disallow screen capture, the probe may disable anysoftware or keyboard shortcuts used for screen capture on the client.

When the host 903 determines that clients 901 and 902 comply with thecontent restrictions, the host 903 establishes the electronic conferencein accordance with content restrictions (950) and enables clients 901and 902 to access the electronic conference (955). Clients 901 and 902then access the electronic conference (960).

Referring to FIG. 10, a flow chart 1000 illustrates an exemplary processby which one or more non-sponsoring clients 1001 may participate in anevent sponsored by a client 1002. For convenience, particular componentsand messaging formats described earlier are referenced as performing theprocess. Similar methodologies may be applied in other implementationswhere different components are used to define the structure of thesystem, or where the functionality is distributed differently among thecomponents shown. Typically, flow chart 1000 relates to architectureswhere the client 1002 sponsors an event and distributes the content toone or more non-sponsoring clients 1001 through the host 1003. Such anevent may be a chat session with a celebrity or a webcast of a musicconcert, sports event, or any other live/recorded media presentation. Ineach of the situations described above, the sponsoring client 1002 maywant to impose content restrictions on the non-sponsoring client 1001 toprotect his/her intellectual property rights for the distributedcontent.

Initially, the host 1003 advertises and/or transmits an electronicannouncement for sponsored event to the non-sponsoring client 1001(1005). The announcement may appear in a form of a web page inviting theclient 1001 to click on a link to connect to the online event. Inanother example, the host 1003 may advertise directly to the client 1001through a chat program, an Instant Messenger (IM) application, a mediaplayer application, or other client software.

The non-sponsoring client 1001 then requests to join the sponsored event(1010). In general, requesting to join the event is generated by clientsoftware that allows the client 1001 to exchange information withcorresponding software running on the host system 1003. The host 1003receives an electronic request from the non-sponsoring client 1001 tojoin the event (1015). The host 1003 then prompts the sponsoring client1002 to initiate the event and to specify the desired contentrestrictions. The sponsoring client 1002 may specify contentrestrictions regulating the subsequent reproduction of the contentgenerated during the event. Other examples of content restrictions mayinclude, but are not limited to, preferences related to screen capture,stream ripping, or archiving. The sponsoring client 1002 then specifiescontent restrictions and initiates the event (1020).

The host 1003 receives content restrictions from the sponsoring client1002 (1025). The host 1003 establishes a baseline for contentrestrictions (1030). The baseline for content restrictions includes theminimum requirements established by the sponsoring client 1002 for theevent. To join the event, the non-sponsoring client 1001 has to complywith the content restrictions specified by the sponsoring client 1002.Once the host 1003 establishes the baseline content restrictions, thehost the non-sponsoring client 1001 for additional content restrictions(1030). In response, client 1001 may specify additional contentrestrictions. For example, client 1001 may specify content restrictionsthat apply to content generated by client 1001, such as contentrestrictions indicating that other participating clients may not archiveinputs from client 1001 during the event (1040).

Once the host 1003 receives the content restrictions, host 1003 verifiesthat client 1001 complies with the established restrictions. Forexample, the host 1003 may verify that stream ripping programs are notbeing used (1045). The client 1001 checks for stream ripping programs(1050). Separately or in addition, the host 1003 may block access to theevent for the client 1001 until the client 1001 complies with the othercontent restrictions for the event.

When the host 1003 determines that the client 1001 complies with thecontent restrictions including those content restrictions provided bythe sponsoring client 1002, the host 1003 enables the client 1001 toaccess the sponsored event (1060). Clients 1001 and 1002 thenparticipate in the event (1065).

Referring to FIG. 11, flow chart 1100 illustrates an exemplary processby which clients 1101 and 1102 generate content restrictions forarchiving and later access archived content through the host 1103. Forconvenience, particular components and messaging formats describedearlier are referenced as performing the process. However, similarmethodologies may be applied in other implementations where differentcomponents are used to define the structure of the system, or where thefunctionality is distributed differently among the components shown.

Initially, the host 1103 prompts participating clients 1101 and 1102 tospecify content restrictions (1105). Clients 1101 and 1102 generateelectronic instructions to the host 1103 (1110). Client 1101 generatesan instruction that others may not archive inputs from any client, whileclient 1102 generates an instruction that others may not archive inputsfrom client 1102. For example, client 1102 may want to retainintellectual property rights to the content they distribute during theconference, and, hence, may wish to block other clients from eitherarchiving or accessing that content.

Once the host 1103 receives the electronic instructions specifyingcontent restrictions for clients 1101 and 1102 (1115), the host 1103analyzes the received restrictions and proposes a compromise for contentrestrictions for the electronic conference (1120). As shown, host 1103may recommend a 30 day archival for conference participants withnotification upon subsequent access (1120), and may prompt clients 1101and 1102 for additional content restrictions (1125).

Clients 1101 and 1102 receive the recommendation (1130). Client 1101adopts the recommendation (1135). Client 1102 modifies therecommendation. In particular, the client 1102 specifies a 15-dayarchival for conference participants with notification upon subsequentaccess and a fee (e.g., a $1 royalty) (1140). Put differently, thecontent restrictions from client 1102 require that any client requestingaccess to the archived content must (1) be a conference participant and(2) do so within a 15-day period by paying a fee to the client 1102.

The host 1103 receives the content restrictions and elects to terminatethe negotiations by accepting the content restrictions from client 1102.Upon agreement by the client 1102, the host 1103 establishes theelectronic conference in accordance with the content restrictions(1145). Clients 1101 and 1102 then participate in the conference (1150),which is archived on the host 1103 according to the contentrestrictions. Archiving content may include enabling subsequent accessto the content through various user software interfaces, such as webpages or an Instant Messenger (IM) interface.

Within fifteen days of the electronic conference's completion, client1101 may request access to the archived content (1155). As describedabove, client 1102 receives notification (e.g., through a web page,instant messenger, or other user interface) (1170). The host 1103receives the request from the client 1101, notifies the client 1102about the request, and challenges client 1101 for a fee (1160). Theclient 1101 provides the fee (1165), and the host 1103 enables theclient 1101 to access the archive (1175). At that point, the client 1101accesses the archive (1180).

Other implementations are within the scope of the following claims. Forexample, the content restrictions may regulate the use and/or insertionof a watermark to identify how the content is being used. The watermarkmay be used to identify a conference participant affiliated withimproper use. For example, before enabling access to an archive ofcontent to a conference participant, an electronic conference mayinstruct a content distributor to insert a discrete watermarkidentifying the conference participant requesting the archive. In theevent that the content is improperly distributed thereafter, thewatermark may be used to identify the conference manager as the sourceof the improper distribution.

The conference manager may be configured to support a diverse communityof device types. For example, the conference manager may support accessto a video conference by PCs, wireless PDAs, and wireless phones. If thewireless phone has a different capability, the conference manager maystructure the negotiations, content restrictions, and content toaccommodate differences in the underlying capability. For example, ifthe wireless phone lacks the ability to chat, record streams, and accessarchives of content, the conference manager may simplify the prompt fornegotiations so that only parameters relating to a wireless phonescapability are provided (e.g., can content provide by the wireless phonebe archived?). Similarly, the conference manager may adjust the bit rateto accommodate different network constraints associated with wirelessnetworks. Finally, the conference manager may interact with features onone platform that are not available on other platforms. For example, ifwireless phones with video cameras and PCs without video cameras areused as clients in an electronic conference, the wireless phones may bepresented with content restrictions to video.

1. A method of administering access to an electronic conference with aplurality of users over a network, the network including at least onehost device and a plurality of client devices, the method comprising:receiving at the host device, an electronic instruction configured toestablish the electronic conference; enabling more than one user of theplurality of users to generate content restrictions that limit contentrendered during the electronic conference, wherein each of the more thanone user is associated with one of said client devices; receiving at thehost device, proposed content restrictions provided by each of the morethan one user; comparing, by the host device, the proposed contentrestrictions received from each user of the more than one user to thecontent restrictions received from each other user of the more than oneuser; identifying one or more disputed parameters in the proposedcontent restrictions based on the comparing, prompting each clientdevice associated with the more than one user to resolve the disputedparameters by: automatically identifying, based on identifying the oneor more disputed parameters, a list of potential solutions; presenting,to a conference administrator in association with the disputedparameters, a list of potential solutions that may be selected by theuser in order to identify a solution to the disputed parameters, askingthe more than one user to select a value, from among the list ofpotential solutions, for the disputed parameters, determining if a valuefrom the list of potential solutions is agreed-to by the more than oneuser based on the more than one user selecting a value in response tothe asking the more than one user to select the value, removingparameters having less than a threshold of support, and using theselected value as the value for the disputed parameters if the value isagreed-to by the more than one user; locking down agreed-to parametersappearing in the proposed content restrictions so that the more than oneuser cannot change a status of the agreed-to parameters; enabling themore than one user to engage in continued negotiations to resolveremaining disputed parameters of the one or more disputed parameterwhile precluding the more than one user from modifying the agreed toparameters that have been locked down; analyzing one or more participantdevices to ensure compliance with the content restrictions; establishingthe electronic conference in accordance with the content restrictions;and enabling user access to the electronic conference consistent withthe content restrictions.
 2. The method of claim 1 further comprisingenabling access to the electronic conference through a telephonenetwork.
 3. The method of claim 1 further comprising enabling access tothe electronic conference through an instant messaging interface.
 4. Themethod of claim 1 wherein enabling user access to the electronicconference includes regulating which user identities are subsequentlyallowed to access reproductions of the electronic conference.
 5. Themethod of claim 1 wherein enabling user access to the electronicconference includes regulating which systems are subsequently allowed toaccess reproductions of the electronic conference.
 6. The method ofclaim 1 wherein enabling user access to the electronic conferenceincludes regulating which streams of content within the electronicconference may be accessed.
 7. The method of claim 1 further comprising:negotiating a watermark capability between the users prior toestablishment of the electronic conference; and inserting into contentof the electronic conference a watermark indicative of the contentrestrictions.
 8. The method of claim 1 wherein identifying the disputedparameters includes identifying parameters in the proposed contentrestrictions for which all of the more than one users do not agree. 9.The method of claim 1 wherein identifying the disputed parametersincludes identifying parameters in the proposed content restrictions forwhich a majority of the more than one user do not agree.
 10. The methodof claim 1 wherein removing parameters having less than a threshold ofsupport includes removing parameters that none of the users supported,removing parameters that less than a specified portion of userssupported, and removing parameters that less than a specified number ofusers supported.
 11. The method of claim 1 wherein prompting the morethan one user to resolve the disputed parameters includes removingparameters associated with a greater risk for improper use.
 12. Themethod of claim 1 wherein prompting the more than one user to resolvethe disputed parameters includes enabling the users to select fromsmaller subset of default parameters.
 13. The method of claim 1 furthercomprising receiving proposed content restrictions provided by the morethan one user; comparing the proposed content restrictions; identifyingone or more disputed parameters in the proposed content restrictions;and substituting the disputed parameters with default parameters. 14.The method of claim 1 further comprising receiving proposed contentrestrictions provided by the more than one user; comparing the proposedcontent restrictions; identifying one or more disputed parameters in theproposed content restrictions; engaging in a limited exchange of promptswith the more than one user to resolve the disputed parameters byhighlighting the disputed parameters and asking the more than one usersto select a value for the disputed parameters; and after the limitedexchange of prompts has been performed, substituting the disputedparameters with default parameters.
 15. The method of claim 1 furthercomprising: receiving content restrictions from the more than one userthat differ by at least parameter between different users; andassimilating the content restrictions into an electronic agreement. 16.The method of claim 15 wherein assimilating the content restrictionsinto an electronic agreement includes exchanging proposals andcounterproposals until all conference participants agree to identicalcontent restrictions.
 17. The method of claim 16 wherein agreeing toidentical content restrictions includes agreeing to allow a first userto have a different capability than a second user.
 18. The method ofclaim 15 wherein assimilating the content restrictions into theelectronic agreement includes exchanging proposals and counterproposalsuntil a majority of users agree to identical content restrictions. 19.The method of claim 15 wherein assimilating the content restrictionsinto the electronic agreement includes exchanging proposals andcounterproposals using content restrictions provided by a conferencemanager designated as required parameters and using other contentrestrictions that are not required parameters.
 20. The method of claim19 wherein assimilating the content restrictions into the electronicagreement includes: enabling a limited exchange of proposals andcounterproposals; identifying compromise parameters likely to beacceptable to one or more users; and using the compromise parameters forthe electronic agreement.
 21. The method of claim 1 wherein establishingthe electronic conference includes enabling one or more users toexchange sidebar communications, wherein the sidebar communicationsrepresent private communications exchanged between a user-defined subsetof conference participants.
 22. The method of claim 21 wherein enablinguser access to the electronic conference consistent with the contentrestrictions includes selectively enabling users to exchange sidebarcommunications consistent with sidebar-oriented content restrictions.23. The method of claim 1 wherein enabling one or more users to generatecontent restrictions includes enabling a user to specify a user to (1)use screen capture software, (2) use stream recording software, (3)access archived content, (4) refuse participation when other users donot agree to specified content restrictions, (5) require specifiedcontent restrictions, (6) specify how input from the user may be used,or (7) specify that a royalty must be paid.
 24. The method of claim 1wherein analyzing the participant devices includes probing for screencapture software, stream recording software, or an electronic microphoneattached to the participant device.