Television schedule system with access control

ABSTRACT

The present invention is directed to a television schedule system with a user interface which allows a user to control access to television programs by time, rating, content, and/or channel. Furthermore, the user may set a limit on pay-per-view (PPV) spending to limit the purchase of PPV programs.

BACKGROUND OF THE INVENTION

The present invention relates to a system for providing televisionschedule information, and more particularly to a television scheduleinformation guide with capability for controlling access to televisionprograms.

Systems are available for providing television schedule information to auser. For example, U.S. Pat. No. B1 4,706,121 (Young), provides atelevision schedule system and process. In one embodiment of Young, thetelevision schedule information is provided on the user's televisionscreen. The user may supply selection criteria which are utilized by theYoung system to make program selections, and the like. In addition,Young discloses a system which controls a television receiver to allowfor automatic selection of programs and the automatic, unattendedrecording of programs that are listed in the television scheduleinformation guide. The automatic, unattended recording of programs isachieved by controlling a videotape recorder (VCR) or other recordingdevice.

SUMMARY OF THE INVENTION

The present invention is directed to a television schedule system with auser interface that allows a user to control access to televisionprograms by time, rating, content, and/or channel. Furthermore, the usermay set a limit on pay-per-view (PPV) spending to limit the purchase ofPPV programs.

In a preferred embodiment, the television schedule system has a mainmenu. A user may select the “Parental Control” (parental control) menufrom the main menu to enter the parental password. The parental passwordmay be established from the main menu. After establishing and enteringthe parental password, the user may lock-out programs by channel, byrating, content, and/or by time from the parental control menu. Thecontent description of the show may further have a corresponding“V-chip” classification based on V-chip rating data supplied by the FCC.Hence, the user may further lock out programs by V-chip classification.In order to tune to a locked program, the parental password ispreferably supplied.

In one embodiment, the user may select a “control viewing.” menu fromthe main menu to enter a purchase password. The purchase password mayalso be established from the main menu. After establishing and enteringthe purchase password, the user may specify a PPV spending limit therebylimiting the purchase of PPV programs. The user may further specify thetype of PPV programs allowed based on rating and content. In order topurchase beyond the spending limit, the purchase password is preferablysupplied. In order to purchase restricted programs, both the parentaland purchase passwords are preferably supplied.

If the user does not remember a password, the user may, for example,call the cable operator. The cable operator may set the password to nullso the user may establish a new password.

Other features and advantages of the present invention will becomeapparent to those skilled in the art upon a perusal of the remainingportions of the specification and drawings. In the drawings, likereference numerals indicate identical or functionally similar elements.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a preferred embodiment of a television systemaccording to the present invention;

FIG. 2A shows a preferred embodiment of a pop-up menu shown to a user ifa password has not been established, and the user selects parentalcontrol from the main menu of a television schedule guide;

FIG. 2B shows a preferred embodiment of a parental control menu shown toa user after a parental password has been established and entered;

FIG. 2C shows a preferred embodiment of a pop-up shown when the userselects a “lock by channel” feature;

FIG. 2D shows a preferred embodiment of a pop-up shown when the userselects a “lock by rating and content” feature;

FIG. 2E shows a preferred embodiment of a pop-up shown when the userselects a “lock by time” feature;

FIG. 2F shows a preferred embodiment of a pop-up shown to a user if apurchase password has not been established, and the user selects a “SetIPPV Spending limits” feature from the control viewing menu;

FIG. 2G shows a preferred embodiment of a pop-up shown to a user if apurchase password has been established, and the user selects the “SetIPPV Spending limits” feature from the control viewing menu;

FIG. 2H shows a preferred embodiment of a IPPV spending limit pop-upshown to a user after a proper purchase password has been establishedand entered;

FIG. 3 is a process flow chart for determining whether a user could tuneto a program;

FIG. 4 ia a process flow chart for the operation of the parental controlfeature;

FIG. 5 is a process flow chart for the operation of the purchase controlfeature;

FIG. 6 is a process flow chart for verifying a password and limiting auser's number of tries in entering the parental control or purchasepassword;

FIG. 7 is a process flow chart for determining whether a program has arestricted V-chip classification, and whether access should be allowed;

FIG. 8 is a process flow chart for changing the parental control orpurchase password;

FIG. 9 is a process flow chart for establishing the parental control orpurchase password; and

FIG. 10 is a process flow chart for removing the parental control orpurchase password.

DESCRIPTION OF PREFERRED EMBODIMENTS

The present invention provides a television (TV) schedule system withcapability for controlling access to TV programs. FIG. 1 illustrates apreferred embodiment of TV system 1 in which the invention may beutilized. As shown, system 1 includes a distribution center 10 andmultiple receiving locations. Distribution center 10 compiles data for adata-stream. In a preferred embodiment, this data-stream is broadcast toreceiving locations 16, 18, 20, and 22. Several methods are availablefor broadcasting the data-stream from distribution center 10 toreceiving locations 16-22. For example, satellite 15 may broadcast thisdata-stream within the vertical blanking interval (VBI) of a televisionchannel (e.g., PBS) or a dedicated channel to receiving locations 16,18, 20, and 22. Alternatively, the data may be broadcast out of band,i.e., using non channel specific mechanisms. In another embodiment, thedata-stream is provided to receiving locations 16, 18, 20, and 22 viatransmission line 13. Transmission line 13 may be, for example, opticalfiber, coax cable, telephone line, or the like. In yet anotherembodiment, peripheral devices, which are located within the receivinglocations, receive the data-stream from, for example, a local serviceprovider 40. Service provider 40 receives the data-stream fromdistribution center 10 via line 17, and broadcasts the data-stream tothe receiving peripheral devices via satellite 15 (or anothersatellite), or via lines 19 and 13. The receiving peripheral devices maybe televisions 30, televisions 34, VCRs 32, VCRs 36, and/or set-topboxes 38. In still further embodiments, PCTVs may be utilized, or thedata-stream may be provided to a personal computer for use with thecomputer and/or more of the above devices.

In the preferred embodiment, information in the data-stream includes TVschedule information. Software located within the peripheral devicesutilize the schedule information provided in the data-stream to generatea TV schedule guide. The software is stored on a computer-readablestorage medium 42 such as a ROM, RAM, disk, or other storage device. Ifthe TV schedule guide is in a grid format, for example, the availablechannels may be listed on the “y” axis and various times may be listedon the “x” axis. The user may tune to a program within the TV scheduleguide by highlighting the program within the guide, and selecting theprogram. The user may also select one or more desired programs which arelisted in the TV schedule guide for automatic, unattended recording. Formore information on how the TV schedule system displays information, andits tuning and automatic recording capabilities, see U.S. Pat. No. B14,706,121 and U.S. Pat. No. 5,151,789. Both these patents, like thepresent patent application, are assigned to StarSight Telecast, Inc.,and are hereby incorporated by reference in their entirety for allpurposes.

The system further has the capability of preventing viewers from tuningto or viewing one or more TV programs. TV programs may be blocked bychannel, rating, content, and/or time. If the user turns on the TVduring a locked time, or tunes to a channel with a show that containsthe locked rating or content/V-chip classification (for example), thetelevision schedule system mutes the audio and displays a solid bluescreen over the TV screen. A pop-up will appear asking for the parentalpassword. The solid blue screen will disappear, and mute will bedisabled when the correct password is entered.

FIG. 2A shows a preferred embodiment of pop-up 52 shown to a user if apassword has not been established, and the user selects parental controlfrom main menu 50. The various menus and pop-ups of the system may beshown as partial screens overlaying underlying full screens, or they maybe shown as full screens. As shown, the user is asked to create aparental password by pressing a SELECT key. The SELECT key may also bethe ENTER key, and may be on a user input device, or it may be locatedon the TV schedule guide and entered by directing a cursor to a screenbutton. If the SELECT key is on the TV schedule guide, a user mayhighlight it on the guide and input it by pressing an enter key, or anykey that functions as an enter key on the user input device. Other keysthat may be located on the user input device or the TV schedule guideinclude the CANCEL key, the REC key, and the EXIT key. Up, down, leftand right arrow keys are preferably included to allow a user to navigateand make selections within the pop-up menus. However, any keycombinations which allow a user to navigate within the pop-up menus maybe used. The parental password may be established from main menu 50 bystriking the SELECT key.

FIG. 2B shows a preferred embodiment of parental control menu 54 shownto a user when a parental password has been established, from main menu50, and the user has entered the correct password. The user may lock TVprograms by channel, by rating and/or content, or by time. If the userdesires, for example, to lock by time, the user may move the cursor tothe “Lock by Time” location and inputs the SELECT key. Alternatively, ifprograms have been locked, the user may unlock all programs that havebeen locked.

FIG. 2C is a preferred embodiment of pop-up 56 shown when the userselects the “lock by channel feature.” In the preferred embodiment,pop-up 56 includes a list of all channels available to the user. If theuser has more channels than will fit in pop-up 56, indicators or scrollbars will be shown at corners of the pop-up instructing the user to movefurther right or further down to display more channels. The user may usethe previously mentioned arrow keys to navigate within pop-up 56. Achannel is locked after a user highlights and selects the channel. Alock symbol will be placed next to the channel icon to indicate that thechannel is locked. To unlock a channel, the user may highlight andselect the locked channel. The lock symbol next to the channel icon willthen disappear to indicate the lock is removed. The user may use theEXIT key to return to pop-up 54 of the parental control menu.

Since the system stores program information, it is able to determinewhether a current or future program is shown on a restricted channel.The system may also determine whether a program falls within arestricted rating and/or content, V-chip classification, or time period.Hence, if a lock is placed on a channel on which there are programsscheduled for recording, a pop-up will appear warning the user of theconflict. If the user ignores the pop-up, it will time out in threeseconds, the channel will be locked, and the recording will occurwithout the need for a password as it was set before the lock wasenabled. Once a channel is locked, a user may not tune to, record, orpurchase any program on that channel unless the user enters the correctpassword. However, upon entering the correct password, the user mayschedule recording of future programs. At the time of the scheduledrecording, the system unlocks the locked channel, tunes to the channel,and records the program. When the program is over, the system relocksthe channel.

FIG. 2D is a preferred embodiment of pop-up 60 shown when the userelects to lock programs by rating and/or content. As can be seen, twolists are shown to the user, one by rating, and one by content. The usermay lock by content and/or rating by highlighting the relevant contentand/or rating on the pop-up and inputting the SELECT key. Programs maybe locked using more than one category of rating and/or content.Furthermore, the content description on pop-up 60 may includeinformation corresponding to data supplied by the V-chip. The V-chipdata may be enclosed within parenthesis and will indicate the V-chipattribute classification of the program. For example, the contentcategory “Violence” may have corresponding V-chip attribute mildlyviolent (V2), moderately violent (V3), and the like. When the user locksshows according to rating, all higher ratings are automatically locked.Since the show contents are not listed in order of severity, locking onecontent does not automatically lock any others.

The user may also lock specified time periods to prevent TV viewingduring those times. The user may further specify the frequency of thelock, e.g., for a single day, for Monday through Friday only, weekendsonly, or for every day of the week. FIG. 2E shows pop-up 62, whichrequests user input for the time period during which TV viewing shouldbe prevented. As shown, the user may specify the time to begin locking(the default time is 2:30 pm), the time to end locking (the default timeis 5 pm), and the frequency of the lock (the default frequency is for asingle day). In the situation where the user has set these valuesbefore, the system remembers the values and displays them when pop-up 62is shown.

If TV viewing is attempted during a locked period, the system will mutethe audio, and display a blue screen over video. A pop-up will appearasking for the parental password. When the correct password is entered,the solid blue screen will disappear, and audio will be re-enabled. If alock is placed on a time period during which there are programsscheduled for recording, a pop-up will appear warning the user of theconflict. If the user ignores the pop-up, it will time out in threeseconds, the channel will be locked, and the recording will occurwithout the requirement of a password as it was set before the lock wasenabled. However, all future recordings scheduled during the lockedperiod will require a password.

FIG. 2F shows a preferred embodiment of pop-up 64 shown to a user if apurchase password has not been established, and the user selects the“Set IPPV Spending limits” feature from control viewing menu 66. IPPVstands for impulse pay-per-view, and refers to PPV programs which arepurchased via a user input device, for example, a remote control. It isdifferent from traditional PPV programs which require the user to callthe program provider on a phone to purchase the program. The user mayestablish the purchase password, from main menu 50, by inputting theSELECT key either by pressing the key on the user input device, orselecting it on the TV schedule guide. FIG. 2G shows a preferredembodiment of pop-up 68 shown to a user if a purchase password has beenestablished, and the user selects the “Set IPPV Spending limits” featurefrom control viewing menu 66. In this case, the user would simply enterthe purchase password and input the SELECT key. As shown in FIG. 2G, ifthe user made a mistake, the user may input the CANCEL key and re-enterthe password.

Once the purchase password has been established and entered, the userwill see IPPV spending limit pop-up 70 (as shown in FIG. 2H), and theuser may enter the total dollar amount to which IPPV spending should belimited before the system requires a password to enable purchasing. Thedefault spending amount is zero, in which case, the user needs to enterthe purchase password for all purchases. Where a dollar amount greaterthan zero is set, this is the amount the user may spend before thepurchase password is required to make additional purchases. To set theamount, the user may input the right arrow key, and with each input ofthe right arrow key, a dollar would be added to the limit. To decreasethe amount, the user may use the left arrow key. The user may use thearrow keys to reset the dollar amount whenever desired.

To access a locked program, the user may select the “Unlock All Locks”feature from parental control menu 54, and all locked programs will beunlocked. Alternatively, the user may unlock all locks from thetelevision schedule information guide by inputting the SELECT key forabout 1 second while within the guide. A pop-up will appear, and theuser may choose the “Unlock All” option. The system will ask the userfor the parental password, and upon entering the correct password, theuser may tune to all programs on all the available channels. While theprograms are unlocked, the “Unlock All Locks” feature toggles andbecomes the “Relock All Locks” feature and the gray lock symbols in theguides become red unlocked lock symbols. The user may relock all thepreviously locked programs by selecting “Relock All Locks” from parentalcontrol menu 54. Turning off the TV will also automatically restore allparental locks.

Alternatively, the user may unlock individual programs by tuningdirectly to the programs from either the TV or the TV schedule guide,and entering the correct password. If the user tunes to a lockedchannel, the system displays a blue screen over the TV screen, and mutesthe audio. A pop-up will appear requesting the parental password. If thecorrect password is supplied, the system removes the blue screen andrestores the audio. However, in this case, when the user tunes off apreviously locked channel, the parental lock will be automaticallyrestored. Hence, if the user tunes off the locked channel, and thentunes back, the user must re-enter the password to view the lockedchannel.

To access individual locked programs from the guide, the user may selectwhichever locked program the user wishes to view by highlighting it onthe guide, and inputting the SELECT key. A password pop-up will appear.If the user enters the correct password, the system tunes to the channelwith the desired program. The user may also input the SELECT key formore than 1 second, and a pop-up will appear asking the user whether totune to or record the locked program. When the user has made aselection, the password pop-up will appear and the user may enter thepassword. After the correct password has been entered, the system willeither tune to or record the locked program. Instead of inputting theSELECT key and selecting the record option on the pop-up, the user mayalso highlight a locked program and input the REC key to requestrecording of the program. Recording will proceed when the user hassupplied the correct password.

FIG. 3 illustrates a process flow chart for determining whether a usercould tune to a program. In preferred embodiments, the various processesdescribed herein operate under software control, such software beingstored on a computer readable storage medium. In a preferred embodiment,the system has checked whether a parental password is necessary at step100. At step 102 the system determines whether the user has supplied thecorrect parental password. If the correct parental password has beenentered, the process will check whether the program is a free event atstep 104. A free event is a non pay-per-view event. If the event isfree, the system will tune to the program at step 110. If the event isnot free, the system will request that the user enter the purchasepassword at step 106. At step 108, the password entered is verified. Ifthe password is correct, the system will tune to the program at step110. For both verifying steps 102 and 108, if incorrect passwords aresupplied, the system will not tune to the program requested.

FIG. 4 illustrates a process flow chart for the operation of theparental control feature. When a user turns on the TV, or tunes to aprogram or channel, the system checks at step 150 whether a parentalpassword is needed before the program(s) will be shown. If a parentalpassword exists, a step 152 of the system checks whether a BOX lock hasbeen set. A BOX lock is essentially a special TIME lock as it keeps theTV locked for 24 hours a day, everyday. If a BOX lock exists, a step 154displays a pop-up informing the viewer that a password is necessarybefore the viewer may watch TV, and a step 172 requests that the userenters the parental password. When the user supplies the correctpassword, the user may tune to the program, schedule an auto-tune, orschedule a recording of the program at step 168.

If a BOX lock has not been set, the system checks for channel locks atstep 156. If none exists, a step 158 checks for a TIME lock. If a TIMElock exists, a step 170 checks whether the current time is within therange of the restricted times. The user is asked to supply the parentalpassword at step 172 if the user is trying to watch TV at a restrictedtime. Similarly, if a channel lock exists, and the user is trying totune to a locked channel, the user would be asked to supply the passwordat step 172. If the user is watching TV at an unrestricted time, theuser may proceed to step 168 and may tune to the program, record theprogram and the like.

If no TIME lock has been set, a step 160 checks for a rating/MPAA lock,as the ratings correspond to those set by Motion Pictures of AmericaAssociation. If a rating lock has been set, a step 164 determineswhether the program has a restricted rating. If so, the user is asked tosupply the parental password at step 172. On the other hand, if there isno rating lock, a step 162 checks for a content/ATTRIBUTE lock. Thesystem checks at step 166 whether the program contains restrictedcontent, and if so, the user is asked to supply the parental password atstep 172. A step 176 further checks whether the program has a V-chipclassification if the program does not contain restricted content. Ifso, a step 178 (details shown in FIG. 7) determines whether the user istrying to gain access to a program with restricted V-chipclassifications.

FIG. 5, which describes step 106 in greater detail, illustrates aprocess flow chart for the operation of the purchase control feature.When a user tunes to a program, a step 200 checks whether a purchasepassword has been established. If so, a step 204 checks whether thelimit has been exceeded. Step 172 requests for the purchase password ifthe limit has been exceeded; if not, the system proceeds with the buyingprocess at step 208. If step 200 determines that a purchase password hasnot been established, the system will also proceed with the buyingprocess at step 208.

FIG. 6, which describes step 172 in greater detail, illustrates aprocess flow chart for verifying a password and limiting a user's numberof tries in entering the purchase or parental password. At step 250, theuser is asked to supply the applicable password. A step 252 receives theuser's input, and a step 254 checks whether the password is in a properformat. If the password is improper, for e.g., it has too manycharacters, a step 256 displays a message informing the user thepassword is illegal. Step 252 is repeated, and the user may re-enter aproper password. As shown, the user may re-enter the password aninfinite number of times if the password is rejected as being improper.

Once the user has entered a proper password, a step 258 verifies thatthe password entered is correct. If so, a step 260 allows the useraccess to the locked program. However, when the password entered isincorrect, a step 262 tracks the number of times the user attempts toenter an incorrect password. A step 264 compares the count at 262 withthe number 3. If the count at 262 is less than 3, a step 256 displaysthe illegal password pop-up and the user may re-enter the password atstep 252. If the user has attempted to enter a correct password morethan three times, a step 266 shows a pop-up informing the user there hasbeen too many attempts to enter the password, and the user has to waitfifteen minutes before attempting to enter the password again. Steps 268and 270 set the Flag, and start the fifteen minute restriction beforeallowing the user to re-enter a password.

In a preferred embodiment, disconnecting the system from the powersupply will not circumvent the fifteen minute restriction; instead, theuser will have to wait longer to re-enter the password as the systemresets the fifteen minute period when it is re-connected to the powersupply. The system restricts the user to three attempts at entering thecorrect password to ensure the security of the password. Since anunauthorized user will preferably have to wait at least 15 minutes afterevery three tries, the unauthorized user is not as likely to crack thepassword.

FIG. 7, which describes step 178 in greater detail, illustrates aprocess flow chart for determining whether a program has restrictedV-chip classification, and whether the user should be allowed access.Since V-chip data comes from the video stream of a channel, one way todetermine whether a program has restricted V-chip classification is tofirst tune to the channel to access the data. For example, the user maybe watching channel 9, and desires to tune to channel 3. Referring toFIG. 7, if the system determines that the program on channel 3 hasV-chip classification, a step 300 saves the video and audio volumeinformation of channel 9. The system determines at step 302 whether theuser is changing channels from the TV screen or from within guide. Ifthe user is changing channels from the TV screen, a step 304 puts a bluescreen over the TV screen.

Alternatively, where the user is changing channels from within theguide, a step 306 applies a blue border around the guide to block outparts of the screen that are not covered by the guide. At step 308, thesystem mutes the audio so the user may not hear the program. A step 310tunes to the requested channel, which is channel 3 in this example, anda step 312 reads the V-chip data from the video stream of the channel. Astep 314 determines whether the V-chip classification is a restrictedclassification. If not, the user may tune to the program on channel 3.However if the program has a restricted V-chip classification, the useris asked to supply the parental password at step 172. A step 316 checksthat the user has supplied the correct parental password, if so, a step318 restores the audio volume of the channel (in this case, channel 3).Depending on whether the user was changing channels while within the TVscreen or the guide, either step 324 will remove the blue screen put onby step 304, or a step 322 will clear the guide and the blue borderapplied by step 306. If access was not verified at step 316, audioremains muted, and the blue screen or the blue border and the guideremains on the screen. The user may, however, attempt to access otherchannels/programs, which will be shown if they are unrestricted.

In another embodiment, the system need not first tune to the channel toaccess V-chip data. Since V-chip rating data may be included in the datastream, and received in a similar manner as data regarding programtitle, description, and the like, the system may receive the V-chiprating data in advance, and store the data in a database. In thisembodiment, the system may apply parental control without having tofirst tune to the channel to access V-chip data, as the system maysimply retrieve the data from the database. Referring to the FIG. 7example, the system may determine, while the user is still withinchannel 9, whether the program on channel 3 has V-chip classification byretrieving V-chip data information regarding the channel 3 program fromthe database. After retrieving this information, if the program hasV-chip classification, the system may determine whether the V-chipclassification is a restricted classification. If so, the parentalpassword is requested, if not, the system tunes to the channel 3program. Hence, this embodiment eliminates the need for the system tomute the audio and put up a blue screen or a blue border around theguide, as the system need not first tune to the channel.

FIG. 8 illustrates a process flow chart for changing the parentalcontrol or purchase password. A step 350 requests for the password, anda step 352 receives the user password input. A step 354 checks whetherthe password is in proper form, if not, a step 356 displays an illegalpassword pop-up, and the user has an unlimited number of times tore-enter a proper password at step 352. When the password entered is inproper form, a step 358 verifies that the password is in fact thecorrect password. A step 360 keeps count of the number of times anincorrect password is entered. As shown by steps 360 and 362, the useris given three attempts to enter a correct password. If after threeattempts, the password entered is still incorrect, a step 364 displays a“Too Many Attempts” pop-up. The user has to wait fifteen minutes beforethe system will allow any further password input attempts, as steps 366and 368 set the flag and start the fifteen minute restriction. Asmentioned, the user preferably may not circumvent the fifteen minutewait by disconnecting the system from the power supply.

The user is allowed to change the old password and enter a new passwordat step 370 if the user supplied the correct password at step 352. Astep 372 ensures that the new password is in proper form, if not, a step374 displays an illegal password pop-up, and the user has an unlimitednumber of times to re-enter a proper new password at step 370. If thenew password entered is in proper form, the user is requested tore-enter the new password at step 376 to confirm the new passwordentered is indeed the password desired. At step 378, the system comparesthe password entered at step 370 with the password entered at step 376.If the two passwords are different, the user is asked to re-enter thenew password again at step 376 to confirm the new password entered isthe password desired, and step 378 again compares the passwords entered.

Steps 376 and 378 are repeated until the password entered at step 376matches the password entered at step 370. Or, the user may exit theprocess, in which case, the password is unchanged. Alternatively, afterstep 378 made its comparison, if password 370 is different from password376, steps 370-378 are repeated. This means that the user may re-enterthe new password at step 370 to ensure that the entry at step 370 iscorrect, and reconfirm the password at step 376. Step 378 will comparethe two passwords, if they are the same, a step 380 changes the oldpassword to the new password.

FIG. 9 illustrates a process flow chart for establishing the parentalcontrol or purchase password. A step 400 requests for the password, anda step 402 receives the user password input. At step 404, the systemchecks whether the password is in proper form, if not, a step 406displays an illegal password pop-up, and the user has an unlimitednumber of times to re-enter a proper password at step 402. If thepassword entered is in proper form, the user is requested to re-enterthe password at step 408 to confirm the password entered is indeed thepassword desired. A step 410 compares the password entered at step 402with the password entered at step 408. If the two passwords aredifferent, the user is asked to re-enter the password again at step 408to confirm the password entered is the password desired, and step 410again compares the passwords entered.

Steps 408 and 410 are repeated until the password entered at step 408matches the password entered at step 402. Or, the user may exit theprocess, in which case, a password is not created. Alternatively, afterstep 410 made its comparison, if password 402 is different from password408, steps 402-410 are repeated. This means that the user may re-enterthe password at step 402 to ensure that the entry at step 402 iscorrect, and re-confirm the password at step 408. A step 410 willcompare the two passwords. If they are the same, a step 412 establishesthe password as the current password.

FIG. 10 illustrates a process flow chart for removing the parentalcontrol or purchase password. At step 450, the system displays a pop-upexplaining to the user that all programs may be viewed free ofrestrictions if the user removes the password and asks whether the userwishes to proceed. If the user decides to proceed at step 452, a step454 requests that the user enters the password. If not, the user exitsthe process. A step 456 receives the user input if the user decides toproceed, and a step 458 checks whether the password is in proper form.If not, a step 460 displays an illegal password pop-up, and the user hasan unlimited number of times to re-enter a proper password at step 456.If the password entered is in proper form, a step 462 verifies that thepassword is in fact the correct password. A step 464 keeps count of thenumber of times an incorrect password is entered.

As shown by steps 466, 460 and 456, the user is given three attempts toenter a correct password. After three attempts, if the password enteredis still incorrect, step 468 displays a “Too Many Attempts” pop-up. Theuser has to wait fifteen minutes before the system will allow anyfurther password input attempts, as steps 470 and 472 set the flag andstart the fifteen minute restriction. As mentioned, the user preferablymay not circumvent the fifteen minute wait by disconnecting the systemfrom the power supply. The user is allowed to remove the password atstep 474 if the user supplied the correct password at step 462.

The above description is illustrative and not restrictive. Variations ofthe invention will become apparent to those skilled in the art uponreview of this disclosure. The scope of the invention should, therefore,be determined not with reference to the above description, but insteadshould be determined with reference to the appended claims along withtheir full scope of equivalents.

1. A method of exercising access control over television programscomprising the steps of: storing a first password; entering a criterionfor blocking a television program from being viewed; displaying aplurality of television program listings on a screen; selecting one ofthe displayed listings for viewing or recording; requesting a viewer toinput a password if the selected program meets the blocking criterion;and unblocking the selected program that meets the blocking criterion soit can be viewed or recorded if the viewer inputs a password thatmatches the first password responsive to the request.
 2. The method ofclaim 1, in which the step of entering a criterion comprises: displayingon the screen a list of criteria; and selecting the criterion to enterfrom the list of criteria.
 3. The method of claim 1, in which the stepof entering a criterion comprises: displaying on the screen a prompt tothe viewer to enter a password; displaying on the screen a list ofcriteria if the viewer inputs a password that matches the first passwordresponsive to the prompt; selecting the criterion to enter from the listof criteria; removing the list of criteria from the screen after thecriterion has been entered; and preventing selection of anothercriterion until a matching password is input.
 4. The method of claim 1,in which the step of entering a criterion enters a program rating. 5.The method of claim 1, in which the step of entering a criterion entersa channel identification.
 6. The method of claim 5, further comprisingthe step of displaying a lock symbol next to the channel identificationin the program listings.
 7. The method of claim 1, in which the step ofentering a criterion enters a time period.
 8. The method of claim 1, inwhich the step of entering a criterion enters a spending limit forpay-per-view programs.
 9. The method of claim 1, further comprising thestep of tuning to the selected program for viewing or recording if theselected program does not meet the blocking criterion.
 10. The method ofclaim 1, in which the unblocking step comprises the step of unblockingall of the programs.
 11. The method of claim 1, in which the step ofunblocking the selected program comprises verifying the password andpreventing the viewer from entering the password for a predeterminedperiod of time if the password was entered incorrectly for apredetermined number of attempts.
 12. A parental control systemcomprising: a display screen; an input device for entering a firstpassword and a criterion for blocking television programs from beingviewed; a display processor for displaying a plurality of televisionprogram listings on the screen; a pointing device for selecting one ofthe displayed listings for viewing or recording; a pop up window forprompting a viewer to enter a second password if the selected programmeets the blocking criterion; and a processor for unblocking theselected program that meets the blocking criterion so it can be viewedor recorded if the viewer enters a second password that matches thefirst password.
 13. The system of claim 12, in which the displayprocessor displays on the screen a list of criteria if the viewer entersa password that matches the first password and processes a selectedcriterion from the list of criteria.
 14. The system of claim 12, inwhich the display processor displays on the screen a list of criteria;and the processor processes a selected criterion from the list ofcriteria and prevents selection of another criterion until a matchingpassword is entered.
 15. The system of claim 12, in which the inputdevice enters a program rating as a criterion.
 16. The system or claim12, in which the input device enters a channel identification as acriterion.
 17. The system of claim 16, in which the display processorfurther displays a lock symbol next to the channel identification in theprogram listings.
 18. The system of claim 12, in which the input deviceenters a time period as a criterion.
 19. The system of claim 12, inwhich the input device enters a spending limit for pay-per-view programsas a criterion.
 20. The system of claim 12, in which the processorverifies the password and prevents the viewer from entering the passwordfor a predetermined period of time if the password was enteredincorrectly for a predetermined number of attempts. 21-26. (canceled)