AU2019101282A4 - The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular. - Google Patents

The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular. Download PDF

Info

Publication number
AU2019101282A4
AU2019101282A4 AU2019101282A AU2019101282A AU2019101282A4 AU 2019101282 A4 AU2019101282 A4 AU 2019101282A4 AU 2019101282 A AU2019101282 A AU 2019101282A AU 2019101282 A AU2019101282 A AU 2019101282A AU 2019101282 A4 AU2019101282 A4 AU 2019101282A4
Authority
AU
Australia
Prior art keywords
screen
controller
rules
rule
management system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2019101282A
Inventor
Gary Borham
Peter Kakris
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tech Life Balance Pty Ltd
Original Assignee
Tech Life Balance Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tech Life Balance Pty Ltd filed Critical Tech Life Balance Pty Ltd
Priority to AU2019101282A priority Critical patent/AU2019101282A4/en
Application granted granted Critical
Publication of AU2019101282A4 publication Critical patent/AU2019101282A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Abstract A system, method, hardware and software product, the system comprising: a controller with multiple input sources configured to managing usage of a screen in 5 accordance with one or more rules, the controller enforces customizable rules and sends commands to the screen and exchanges data and commands with the management system and administration applications. The controller can block usage, force login, track usage and show messages on the screen, thereby managing usage of the screen for the applicability time periods (based on rules), wherein the 10 controller enforces the rules for the screen and all connected devices. A user can interact with the controller by using the screen's own remote control. FIGURE 1 of 4 controuer 2 Gaming consle 3 4 Pay TV E D Strangn service DVD player COher

Description

EDITORIAL NOTE
There are 20 pages of the description only.
2019101282 31 Oct 2019
System and method for controlling screen usage for multiple users
TECHNICAL FIELD
The present application relates to a system and method for managing the usage of a screen and electronic devices, in combination. In preferred embodiments, the present application relates to systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage in particular.
BACKGROUND
Children and others in modern society spend long hours using electronic devices including tablets, mobile phones, computers, gaming consoles and televisions (watching live and streamed content).
Parents are interested in having tools available to them to limit the amount of time children spend on such electronic devices and screens. One system that is available has significant limitations, including the fact that it works for controlling one type of device only. In other instances, the systems described previously only allow for a single time-period to be set that applies to all users - there is no ability to set separate limitations or controls that are specific to separate individuals who use the devices, nor any visual feedback or message on the screen.
In addition to providing control of access to electronic devices and screen usage, it would also be beneficial for preferred embodiments to provide the ability for parents/guardians or other controller administrators of the system to bespoke the system for their own needs.
BRIEF SUMMARY
According to the present application, there is provided a system for controlling access by multiple users to a screen and to multiple devices, the system comprising:
- a management system for controlling access by multiple users to the screen and multiple devices, the management system being accessible to an administrator to allow setting of rules for controlling the access of multiple users to the screen and devices; and
- a controller connected to or associated with the screen and with multiple devices, the controller managing multiple input sources and configured to control the screen output in response to the commands of the management system, wherein the system further controls the screen output to display information to the user relating to a rule that has been set for the user.
The system enables the display of messages to the screen relating to a rule that has been set for the user. Other messages may also be displayed, relating to rules that are applicable to all users, or information that the administrator wishes to communicate to one or more users.
2019101282 31 Oct 2019
The controller in preferred embodiments is connected to the internet and/or local network. This enables commands to be passed from the management system to the controller.
The management system and/or controller may in some embodiments allow and block access to applications (which may also referred to as secondary applications, or “apps”, to distinguish from the devices (primary devices) connected to the controller) in response to the commands of the management system. By way of example, the secondary applications may be in the form of applications accessed by the user on a tablet or mobile phone.
In some embodiments, the management system enables the administrator to set separate time periods for access by each of two or more users to the screen and devices. The access may be to selected devices across a multiplicity of devices controlled by the system, such that each user may have access to a subset of the screen(s) and devices managed by the system. The management system may enable the administrator to set customisable rules for controlling access to the screen and devices by each user. In some embodiments, the management system can be configured by an internet connected device. The internet connected device is suitably a device that has been authorised.
In some embodiments, there may be an exchange of data and messages with the controller or applications. This could be in a single cloud based server or distributed with/amongst other applications on multiple devices in multiple locations for implementation purposes.
In some embodiments, the controller enforces customisable rules and sends commands to the screen and exchanges data and commands with the management system and administration applications. The controller and/or management system can block usage, force login, track usage and show messages on the screen, thereby managing usage of the screen for the applicability time periods (based on rules), wherein the controller enforces the rules for the screen and all connected devices.
In some embodiments, users can interact with the controller by using the screen’s own remote control. In other embodiments, the user can interact with the controller using a user interface associated with the controller specifically. In other embodiments, the user can interact with the controller using another device such as a smartphone or tablet. This may be through an application (“app”) downloaded onto that device.
According to the present application, there is also provided a method for controlling access by multiple users to a screen and to multiple devices, the method comprising:
- using a management system to control access by multiple users to the screen and multiple devices, the management system being accessible to an administrator to allow setting of rules for controlling the access of multiple users to the screen and devices;
and
- sending commands from the management system to screen via a controller, the controller managing multiple input sources and controlling the screen output in response
2019101282 31 Oct 2019 to the commands of the management system, to thereby control access by multiple users to the devices, and
- displaying information relating to a rule that has been set for a user to the screen when that user has access to the screen.
According to the present application, there is also provided a controller (i.e. a controller device) for controlling a screen, the controller device comprising:
- An outlet or outlet connector for connecting to the screen; and
- Multiple inlets or inlet connectors for connecting to devices;
wherein the controller device is operable in response to the commands of a management system which manages the ability for multiple users to access the devices, and the controller device controls the visual display on the screen to allow or block access to individual devices connected to the controller, based on the identity of the user seeking to access a device and the rules set by an administrator for that use, and wherein the controller device controls the screen output to display information to the user relating to a rule that has been set for the user.
The controller (or “controller device”) is the hardware component. The outlet may be in the form of an outlet port, or a connector/chord, that connects to an inlet port of the screen. The inlets may be in the form of ports, of any suitable type, for receiving a signal (e.g. a signal for the image to appear on the screen). The controller device contains suitable programming to operate in response to the commands of the management system to enable to display on the screen to be controlled in accordance with the settings of the management system. The user may interact with the screen with the screen’s own remote control or with an application (“app”) connected wirelessly. The wireless connection may be either a direct wireless connection or via the internet, or otherwise. The controller and its operation is described in further detail below with reference to preferred embodiments of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosed subject matter will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawings. Unless indicated otherwise, the drawings provide exemplary embodiments or aspects of the disclosure and do 120 not limit the scope of the disclosure. In the drawings:
FIGURE 1 shows a generalized diagram of an exemplary configuration of a system for controlling screen usage, showing external devices (C) physically connected to the controller (B), and the controller physically connected to the screen (A), and with the controller connected 125 to a cloud management system via an internet connection. Also shown are additional optional applications (D) connected via one or more communication methods such as WIFI, Bluetooth, RFID, NFC or another wireless technology;
FIGURES 2A and 2B show exemplary displays of dialogs with which the administrator can
130 define rules, in accordance with some exemplary embodiments of the disclosure;
2019101282 31 Oct 2019
FIGURES 3A - 3D show exemplary user displays based on rules created by administrators, in accordance with some exemplary embodiments of the disclosure; and
FIGURE 4 shows a generalized diagram of a tamper proof module, in accordance with some exemplary embodiments of the disclosure.
DETAILED DESCRIPTION
Figure 1 illustrates schematically the relationship between the screen (A), the controller (B), and the devices (C). The controller (or controller unit, or control unit) A is the physical device that is connected to the screen. The controller manages the screen and its devices, enforcing login, tracking of time per person, user selection and displaying messages and other content. The controller supports multiple users.
In a modified embodiment, the controller could be imbedded inside a television set or incorporated into the firmware of a television. In this case, the controller would need to be controllable by the management system to control access in response to customisable rules set by an administrator.
The management system is the system that contains the data, business rules, logic and programming for the family / entity/ organisation and exchanges data and messages with the controller (and optionally any secondary applications). This could be in a single cloud based server (E), or the management system may be distributed with/amongst other applications on multiple devices in multiple locations for implementation purposes. As an example, the management system may be embedded within the controller (B).
The term “screen” as used herein is used in its broadest sense as encompassing any display (e.g. a computerised display) displaying content, such as a TV monitor; a display monitor; a projector, a desktop monitor or the like.
The term “user” as used herein refers to a person wishing to watch, to be exposed to or to use the screen. The term extends to an individual or group, such as a child, an employee, a student, a member of the public in private, public, or commercial premises, or the like. Where 165 reference is made to multiple users, this refers to separately identifiable persons or groups of persons, whose access to the screen can be controlled separately. Thus, a single group of persons does not constitute “multiple users”.
The term “administrator” as used herein is used expansively to include any person in charge of 170 controlling access by users to the screen. Examples of the types of persons who may be given the role of administrator include a parent, a teacher, a manager, a caregiver, a site administrator, a clinic manager, a shopping center manager, a hospital or department staff member, a school principal, or the like.
2019101282 31 Oct 2019
The term “powered off”, “turn off” or “shut down”, means any of the supported options such as, device in sleep mode or device in standby mode or blocking the screen, thus preventing it from being used in any meaningful way..
The term “powered on” or “turn on”, means any of the supported options such as device woken sleep mode or re-enabled after being in standby mode.
One exemplary embodiment of the disclosed subject matter is a system for managing screen usage comprises a controller unit configured to transmit a multiplicity of commands related to managing usage of one or more screens in accordance with one or more rules, the multiplicity of commands sent at intervals during an applicability time period of a rule; and a controller operatively connected to the screen, the controller configured to receive the commands from the management system and apply the commands to the screen, thereby managing usage of the screens for the applicability time period of the rule..
Within the system, the controller optionally comprises: a user interface for receiving a description of the rules from a management system; a command generator for generating the multiplicity of commands upon the rules; a command enforcer for determining a command from the multiplicity of commands to be transmitted to the screen; and a communication module for transmitting the command to the screen. Within the system, the controller optionally comprises: a communication module for receiving a command from the management system ; and a command application module for applying the command to the screen, thereby limiting operation of the screen in accordance with the at least one rule.
The system can further comprise: a cloud management system for receiving a description of the rules; and a rule storage accessible via the Internet, wherein the controller further comprises a rule or command communicator for receiving rules or commands from the rule storage, and wherein a description via the cloud management system is stored on the rule storage and is provided to the controller. The system can further comprise one or more additional controllers.
Within the system, the controller optionally comprises a tamper proof module for identifying tamper or tamper attempt to the controller, and the controller is optionally configured to notify the management system about the tamper or tamper attempts. Within the system, the tamper proof module optionally comprises a battery and other tamper proof mechanisms. Within the system, one or more of the rules optionally relates to turning the screen off at predetermined 210 time, turning the screen on at predetermined time, blocking the screen, and showing information on the screen. There may be a rule, or multiple rules, specifically for the showing of information on the screen. The system can further comprise one or more additional controllers, wherein the controller is also configured to transmit a second multiplicity of commands to the second controller. Within the system, the management system optionally transmits to the controller 215 notifications related to usage of the screen or to compliance of the user with the rules.
Another exemplary embodiment of the disclosed subject matter is method of controlling usage over a screen, comprising: transmitting a multiplicity of commands related to limiting usage of a
2019101282 31 Oct 2019 screen in accordance with one or more rules, the multiplicity of commands sent by a management system to a controller operatively connected to the screen at time intervals during an applicability time period of a rule, wherein the controller is configured to apply the commands to the screen, wherein the management system and the controller communicate in an authenticated manner. The method can further comprise: receiving a description of the rules from the management system; generating the multiplicity of commands upon the rules; and determining a command from the multiplicity of commands to be transmitted to the screen.
The method can further comprise: storing the rules or the multiplicity of commands in a rule storage accessible via the Internet, and transmitting the rule or the multiplicity of commands to the controller. Within the method, one or more of the rules can relate to turning the screen off (or standby /sleep mode) at predetermined time, turning the screen on (waking up) at predetermined time, blocking the screen, and showing information on the screen or to limiting content displayed on the screen. The method can further comprise receiving a notification related to tampering or tampering attempt of the controller.
Yet another exemplary embodiment of the disclosed subject matter is a system for controlling usage over a screen comprising: a controller configured to transmit a multiplicity of commands related to limiting usage of a screen in accordance with one or more rules, the multiplicity of commands sent at intervals during an applicability time period of a rule, the controller comprising a tamper proof module for identifying tampering or tampering attempts to the controller, the tamper proof module comprising a battery; and a controller operatively connected to the screen, the controller configured to receive the management system or from another controller and apply the commands to the screen, thereby limiting usage of the screen for the applicability time period of the rule, wherein the wherein the controller and the management system communicate in an authenticated manner.
One technical problem handled by the disclosed subject matter is the need to exercise parental control over the duration of usage or the time of day screens can be used, per user, for multiple users.
250 One technical solution comprises a controller device, responsible for receiving and transmitting content to be displayed on a screen, or commands related to activation of the screen in accordance with one or more rules set by the administrator to a controller that controls the screen. For example, the administrator can set a rule that blocks the screen in a specific time frame, such that will not be able to watch any other content throughout the timeframe. In
255 another example, the administrator can set a rule that will enforce displaying of allowed devices.
Thus, the commands sent by the controller may relate to whether the screen is to be blocked or powered off, a message to be displayed on the screen, on usage time of the screen, or the like. In some embodiments, the controller may comprise, execute, or receive rules from a
260 management system, the rules arranged for example as a rule schedule. The rules may be entered by the administrator, imported from a computerized source, or otherwise obtained, as detailed below. The controller may then generate commands in accordance with the rules.
2019101282 31 Oct 2019
Additionally or alternatively, the controller may receive commands from an external device, the commands generated upon rules entered by the administrator.
The administration can be performed on any internet connected device, such as a desktop computer, a laptop computer, a mobile phone, a tablet, a dedicated device, or the like.
The managed screen can be equipped with a controller component responsible for receiving commands or content from the management system, and manage the screen accordingly. In some exemplary embodiments, the controller can have inputs from external hardware such as streaming services, streaming devices, gaming consoles, apple TV, pay TV, DVD players or the like.
In other exemplary embodiments, the controller can be implemented as a part of the screen. In some exemplary embodiments the controller can be implemented as a software module internal to the screen, and controlling the screen operation. Moreover, the controller can be an application which is automatically or manually downloaded and installed on the screen. In other embodiments, the controller can be a hardware component that is part of the monitor, such as android TV, or a screen which supports cast protocols such as Google Cast protocol or DIAL protocol, a TV with an appropriate protocol for screen mirroring features, or the like. In further implementations, the controller can be implemented within the screen as well.
The controller may comprise a communication module for two-way communication with other controllers or nearby devices devices. In some embodiments the controller may be collocated with the screen, or within a small distance from the screen. Thus, the controller communicates with the management system, other controllers or devices using authenticated communication. For example: the controller will have a certificate from authorized entity like in SSL communication and controller will try to establish secure connection between it and the other source during which it will read the controller certificate and decide whether to connect to this device. In some embodiments, a controller can manage a multiplicity of screens.
The controller can transmit commands when a rule applicable to a specific user arises, or when a more general rule applies (e.g. based on the day and time). For example, the command may 295 be transmitted when it is time to turn the screen on or off, block the screen or enable the screen to display content, or when another limitation is to take effect. The controller may also transmit commands periodically afterwards as long as a rule is in effect, for example, every 0.1 second to every 5 seconds, in order to prevent a user from attempting to override the rule, thus providing a “watchdog” operation that keeps enforcing the rule. The user may therefore succeed 300 in temporarily overriding the rule, for example turning the screen back on, switching to another device, or the like, but only for a short and unrewarding period of time, and upon the next command being received from the controller the rule will take effect again. The controller may also transmit commands prior to a rule taking effect, for example for displaying reminders.
305 In some exemplary embodiments, the controller may be controlled by a remote device, for example through a cloud server, and physical access to the controller may not be required for
2019101282 31 Oct 2019 defining the rules. In these embodiments, the administrator can set or change the rules using a remote device communicating with the controller. The controller transmits the corresponding commands to the screen. In such embodiments, not only the administrator having physical access to the controller, but rather a multiplicity of administrators may change or set the rules. For example, when parental control is required, each caregiver can set or change the rules remotely, and not only a parent who is at home. Moreover, the administrator present at the location may also change the rules using remote access rather than physical access to the controller. It will be appreciated, however, that only authorized administrators can change the rules for a particular screen. Authorization may be determined upon changing the rules using a device from within the network or upon any other authentication mechanism.
In such embodiments in which the controller is in communication with a remote device, the controller can also receive content from the remote device, such as text messages, images, audio, video content, or the like, to be displayed on the screen. In such embodiments, the remote device may provide rules or commands to a multiplicity of controllers, each controlling one or more screens. This embodiment may be useful for multi-screen environment, such as a shopping center, a hospital, a school, or the like, wherein each screen may have to display different content or otherwise comply with different rules.
According to the system described herein, there is provided an overall solution allowing the management of a multiplicity of screens in one or more geographic locations. Each screen is operable by multiple users, as described above.
In one option, the system described herein can enable the management of multiple sites, each site containing multiple screens at any time or location. In such embodiments, the system enables a management to categorize the locations and screens by properties such as the field of interest and display relevant content per category.
In some embodiments, the controller allows for user interaction by using the screen’s own remote control. Optionally an additional remote control unit could be provided as part of the product, just for the screen, or another device such as a smartphone could be used as the remote control.
340 In some embodiments, users can login using a remote control. In further or alternative embodiments, a user could be identified to login on the controller with the use of an external device such as a smartphone or other device with near field technology or bluetooth etc.
Referring now to Figure 1, a generalized diagram of one embodiment of the system for
345 controlling screen usage is shown.
The controller is identified as B in Figure 1. The screen is identified as A in Figure 1. As described previously, the screen may be in the form of a projector, a television screen, a computer monitor or otherwise.
350
2019101282 31 Oct 2019
The system operates with a screen, and comprises a controller which can be implemented as a hardware component as detailed above, or as a software component operative to perform activation of various functions of the screen, such as putting the device into standby(sleep) mode, waking up, changing input source, displaying content provided over a communication channel, or the like.
The controller can comprise an internal two way communication module, for example exchanging commands with other controllers. The internal communication module can decrypt or decode the received commands as required. Communication can be on a network, such as a home network, or another local area network (LAN), or wireless LAN or point to point communication such as bluetooth or NFC.
The controller has its own software/firmware used to apply the rules. Applying the rules/commands may include sending notifications or content to the screen or blocking use exchanging data with the application or management system.
The application “D” in Figure 1 can be any device within the network of the controller, such as a mobile phone, a desktop computer, a tablet computer, a beam-forming device, or the like. The application can also be remote and connected to the management system via the internet so long as the controller is also connected to the internet. In particular, controller can be a mobile phone of the administrator, which provides for managing the rules, the application can also be in a form of an application, software, hardware, or any combination thereof.
The controller can work without an internet connection, however needs to be connected to the internet to obtain updates from the administration system, alternatively the updates can be applied by an application either automatically or manually that has had an internet connection to receive rule and configuration updates.
The controller can comprise a memory block and CPU (PCPU) operatively connected to a hardware-based input or output device, such as a display device, a touch screen, a voice activated interface, or the like. PCPU is configured to provide all processing necessary for operating the controller. PCPU comprises a processor and a memory. The processor of PCPU can be configured to execute several functional modules in accordance with computer-readable instructions implemented on a non-transitory computer-readable memory comprised in PCPU.
385 Such functional modules are referred to hereinafter as comprised in PCPU.
PCPU can also store and retrieve one or more rules to be applied.
When referring to the programming or logic of the controller, we are referring to the PCPU
390
PCPU can comprise a management system for defining rules, generating commands upon the rules and enforcing them.
2019101282 31 Oct 2019
Thus, management system can comprise a user interface for the administrator to define one or more rules, such as is shown in Figure 2. The user interface can be operative in storing the rules on a storage device. In further embodiments, user interface can make some checks, for example verifying that no contradiction exists between rules, or making sure that if a contradiction exists, then the user indicates which rule is to take effect. For example, the user interface can display a warning message in case of contradiction, or prevent the administrator from entering such contradicting rules.
In some embodiments, a rule can be defined using free text entered into a text field presented to the administrator. Using text analysis methods, a set of rules may be derived from the text. For example, the text “Dinner time is between 5PM and6 PM every day”, at this time, the lounge room TV blocked from use.
Reminder is “10 minutes” to be interpreted by the PCPU to be displayed on the screen at 4:50PM. The administrator can edit the rule using the dialog or via the text field. Optionally, some initial settings may be required before text can be entered, such as selecting the device or user, or the like.
According to the system of the present application, the rules are defined or set for a multiple of users (two or more). In the rule screen illustrated in Figure 2, one user is identified, but in place of this user, a second user name can be inserted or a group name. The system further provides for the administrator setting user identities for the system. Each user may be required to enter a password or other form of identification to obtain access to the screen. Users may also be required to enter a password or provide identification to obtain access to apps controlled by the system on secondary devices.
PCPU can autonomously generates commands or messages based on the stored applicable rules. For example, generate commands to be transmitted when a reminder is to be displayed prior to enforcing a rule, when a rule is in effect, or the like. The commands can be generated in advance, for example when the rule is received from user interface. The commands may be stored, and then retrieved prior to transmission. Alternatively, the commands may be generated 425 on-line prior to the rule taking effect.
PCPU module can independently generate one or more commands to be transmitted to controller at the relevant day, time, or other parameters in order to enforce the applicable rules. For example, PCPU may determine the transmission of a command at the beginning of the 430 applicability period of a rule, and at time intervals during the period, until the end of the applicable time period, such that a user cannot override the rule for substantial periods of time. The time intervals can be, in a non-limiting example, between 0.1 second and 1 minute. In some embodiments, in accordance with the defined rule, a reminder command may be transmitted prior to the enforcement of a rule, at the time defined for the reminder.
435
PCPU can further comprise communication receiving indications from other controllers or applications or the management system. PCPU may also communicate in any applicable
2019101282 31 Oct 2019 protocol, such as but not limited to the Discover and Launch (“DIAL)” protocol or Simple Service Discovery Protocol (SSDP). PCPU can encode or encrypt the commands prior to transmission.
In some embodiments, the controller can transmit content to be displayed on the screen, and one or more rules can allow controller such as a web page or video clip stored on a memory device of controller or from the internet or the management system. The transmission can include the content itself, for example in the form of coded video/content to be decoded and displayed. In other embodiments, controller can activate remote procedures, such that instead of transmitting the actual video/content, controller can transmit a command, for example to display a clip from a particular URL.
In some embodiments, controller can transmit notifications which may relate to actions of the user associated with the rules, such as whether and at what time the user turned the screen on or off, controller can utilize user interface to present the notifications, or some processing thereof, to a user or all users.
Thus the system may be configured so as to allow the administrator to monitor, limit, supervise, enforce or control the screen usage time and duration, or the content being displayed to a user at any given time. This configuration may require that controller is configured to communicate over a secure channel.
In preferred embodiments, the system requires users to log in, or to provide identification or other identifying information, to be able to access the screen. This provides additional control to the administrator to enable the monitoring supervision and/or control of screen usage time and duration to multiple users separately. If the system is set up to control secondary devices in accordance with preferred embodiments, the system allows for the contemporaneous monitoring/supervision and/or control of the activities of multiple users across multiple devices or applications.
In a system in accordance with the configuration of Figure 1, controller can control and manage the screen, as well as external devices connected to the screen, such as game consoles, video streamers, or the like.
470
Figures 2A and 2B show exemplary displays of dialogues in which the administrator can define a rule. The dialogue enables the administrator to assign a name for the rule, for example “After School Hours”, select the days and times for which the rule is applicable, the limitation applied by the rule, for example whether the screen is to be put into sleep mode, enabled or blocked 475 from usage. The dialog displayed to the user, one example of which is shown in Figure 3A, can be further modified by the administrator to change the configuration rules or text to be displayed when the rule is in effect.
Figure 2B shows an exemplary display of another dialog in which the administrator can define 480 another rule, related to the total amount of time the user is allowed to use one specific device that sends images to the screen being controlled by the system. In this example illustrated, the
2019101282 31 Oct 2019 device is a playstation, but the device could be any other specific selected device that sends images to the screen. The dialog enables the administrator to assign a name for the rule, for example “Playstation Quota”, and select the days and times for which the rule is applicable. The rule indicates a total usage time within the indicated hour range on each day on which the rule is applicable, for example 3 hours. The dialog can further enable the administrator to define a reminder for the rule to be displayed before the rule takes effect, and text to be displayed as a reminder or when the rule is in effect. An example of the text to be displayed in accordance with the rules is shown in Figures 3A and 3C.
Figures 2 and 2A are exemplary only. Various other forms of displays may be used as required. Modifications may therefore be made in relation to the defining the applicable rules, including additional or different details. Other exemplary dialogs can show the definition of a rule limiting the usage time of a screen per day or during a certain time frame. In some embodiments, as detailed below, the administrator may receive one or more screen captures, or a continuous transmission of the screen. Such usage can also be defined as rule to be enforced on the screen. It will also be appreciated that the dialog can comprise a free text field, wherein the free text may then be parsed into one or more rules.
The controller as shown as item B in Figure 1 can comprise a single device or be split into two or more components/devices that can interconnect with each other on a local network or via wireless communication such as bluetooth, RFID, infrared or otherwise.
The system may involve the use of a cloud management system, which may be implemented as an application, or as a web page, a mobile application, or web portal accessible via a corresponding interface. The rule set can be entered or edited by the administrator having compatible privileges and using any computing platform external to the network of the controller, to access a user interface component of cloud management system. The administrator may access cloud management system through a web browser, a mobile application interface, or the like. The cloud management system can communicate with rule storage on cloud server via wired or wireless communication channel, and may store the entered or edited rules on rule storage of the controller which can communicate via wired or wireless communication channel with rule storage for retrieving rules. Thus, the administrator edit the rules by accessing cloud management form any commuting platform in any location, including but not limited to the 515 network of the controller from which the rules may be downloaded to the controller.
Every predetermined period of time, or prior to activation of a rule, controller can pole the rule storage to download the latest version of the applicable rule set to be activated, in case a remote administrator edited the rules the rule has been downloaded.
520
It will be appreciated that rule storage can store additional data, such as revision history, user profiles, administrator profile(s), content to be displayed, commands derived from the rule, or the like.
2019101282 31 Oct 2019
This configuration enables multiple administrators, such as two or more caregivers to edit the rules whether any of them is in the vicinity of screen or not.
Furthermore, this configuration enables the controller to receive content from the Internet and transmit the content to another controller or to the screen.
This configuration thus allows multiple administrators to monitor, limit, supervise, review, enforce and control screen usage time and/or content that is being consumed by each user independently at any given time, and from any location as long as controller is connected to the internet. With this configuration, it is possible for multiple screens to be managed by shared rules across many controllers based on a widespread rule to cover a group of screens (and users of those screens).
A cloud management system can communicate with a multiplicity of controller devices, and can allocate to every controller in its network. Cloud management system can then verify successful engagement between each controller and screen. The rules edited by any administrator in accordance with a required schedule can then be applied automatically as long as the relevant controller is connected via the internet or to another controller that is connected to the internet.
Controlling or managing a multiplicity of controllers can also be used for categorizing the controllers and allowing different rules or content for each category, in accordance with needs, interests, or the like.
In some embodiments, there may be a dedicated device or an internal component of the controller. Since the controller is a dedicated device, it may be connected to the electricity network, to avoid the need for battery replacement or recharging.
The dedicated device or internal component may comprise additional capabilities over the PCPU. The additional capabilities of controller can include but are not limited to any one or more of the following: wider communication range, a multiplicity of channel frequencies that allows controller to control several controllers simultaneously, constant power input such that controller does not need to be charged, data storage capabilities, automatic synchronization feature, no dependency on phone operator server or signal, longer life span, light and sound indications, data process capabilities, log recording, or the like.
560 In addition, controller may comprise a tamper proof module for detecting tamper attempts which may be exercised by users trying to avoid or override the rules, and transmitting the notifications to an external device such as an administration application or cloud management system, or otherwise notify the administrator, for example by sending a message to a predetermined phone, e-mail account, or the like. An example tamper proof module is detailed in Figure 4.
565
In some embodiments, the controller may also send notifications other than tamper attempts reporting, such as when a user turned the screen off, changed device, or changed channel, or the like.
2019101282 31 Oct 2019
Additionally, two-way communication can be held between controllers, screens and the management system using any required protocol, upon which controller can determine how to continue enforcing the rules. In the two-way communication messages can be exchanged enabling it to pass content to the screen. For example, if controller enforces a rule related to total usage time, controller can send notifications whenever the device is on, thus enabling controller to accumulate the usage time and determine when to apply the rule and send a blocking or sleeping command to the screen. In another example, if controller enforces a rule related to monitoring, the controller can capture an image or a sequence of images displayed on screen and transmit them to an application or the management system. In this configuration, too, controller and screen are on the same network or otherwise communicate in authenticated communication via the internet.
The controller can also function as a gateway that link between other devices close by with the management system of administration application external to network, including cloud server.
It will be appreciated that in this configuration communication between controller and cloud server may be encrypted.
This system configuration allows the administrator to monitor, limit, supervise, review, enforce and control the screen usage time and content being consumed by each of a multiple of users at any given time and from any location, as long as the controller is able to communicate with management system directly or indirectly via other controllers or administration applications.
This system configuration requires an active Internet connection to allow communication between controller and cloud server.
Referring now to Figure 4, this figure shows a schematic block diagram of tamper proof module.
Controller may be a dedicated device, thus it is not expected to be moved, disconnected, sabotaged, or otherwise manipulated. Thus, if it is manipulated, it may be an indication of 600 tampering or a tampering attempt by a user trying to override the limitations imposed by controller.
Tamper proof module may comprise a battery, such that if controller is plugged out from the electricity network it can still provide notifications to the administrator regarding the tamper 605 attempts. The battery may thus serve as a backup battery for the controller and start providing energy if the power supply is stopped for any reason.
The tamper proof module may comprise a motion sensor for example an accelerometer sensing motion in one or more directions or other tamper proof technologies. Since controller is not 610 supposed to be moved on a regular basis, if movement is sensed by accelerometer, a notification may be sensed. The direction or magnitude may or may not be of particular importance, and thus may or may not be notified to the administrator.
2019101282 31 Oct 2019
The tamper proof module may comprise an electricity disconnect detection component, such as but not limited to a disconnect detection component, such as Consumer Electronics Control (CEC) applicable for HDMI, which can be used when controller is connected to the screen via HDMI, for identifying disconnection of the cable or another connection within the HDMI connector between controller and screen.
Thus, the tamper proof module may be adapted to identify common modes of tamper attempts, such as disconnecting or moving the device, and notify the administrator accordingly.
A user interface component may obtain a description of a rule from the administrator. The description can include the screen or screens the rule relates to, date and time, type of limitation, such as shutting the screen, displaying specific content, displaying content from a specific site, limiting the devices connected to the screen can switch to, limiting the amount of time a screen can be used within a timeframe, or the like. The description can further include information such as a message and/or image to be displayed or a reminder time prior to applying a rule, or the like.
The types of rules may be in accordance with the type of controller and controller used, and their capabilities. Thus, in some embodiments only options relevant to the capabilities of the used equipment may be enabled to a user.
It may be determined whether any rule is applicable at the present time. Applicability of a rule may also include whether a reminder time prior to the rule has arrived, whether the screen usage has reached a limit within a time frame in case a rule limiting the usage was defined, or disallowed content is being displayed. When such a situation is identified, a blocking or turning off command may be transmitted.
One or more commands to be transmitted for applying the rules can be determined when a rule is applicable. A rule may be applicable if the rule is associated with a predetermined hour, or for example, if a limitation is imposed on the total or on specific usage time of the screen, once this time ends. The rule can expire on the next day, if the limitation relates to the same day, or 645 similarly for other time frames.
Enforcing such a rule may include the controller monitoring screen usage indicating when the screen is active, and accumulating the time such that it can be compared to the applicable limitation. When such rules are applied, when the allotted time is close to exhaustion. A user 650 may be displayed with one or more messages before this rule takes effect, for example 30 minutes before the time is up, 10 minutes before the time is up, or one minute before the time is up.
In all cases other than for rules applicable to all users (e.g. times during which access is blocked 655 to all users), an initial qualification is that the rule is one that is applicable to the user seeking to access the screen or device.
2019101282 31 Oct 2019
A command can be transmitted to the controller, which can then apply it and enforce the rule.
In some embodiments, once a rule becomes applicable, all commands for continuous enforcing of the rule, which may be transmitted at intervals, for example at predetermined intervals, without further checks. In other embodiments, a check may be performed prior to every transmission throughout the applicability period of the rule.
Commands can repeat for further rules, which can relate to further controllers. If a controller is equipped with capabilities of simultaneous processing, multiple such checks may be performed concurrently.
In some embodiments, a time table may be prepared or updated whenever a rule is added, deleted or changed, indicating for each point in time whether and which rule becomes applicable, and for which controller. In such embodiments, it may not be required to traverse over all rules, but rather to set a timer to the next point in time where a rule becomes applicable.
The commands, if not generated by the controller can be provided to the controller, for example by a management system.
The controller may apply the commands transmitted to the controller on stage, and thus control the screen in accordance with the at least one rule. Applying the commands may include sending notifications to the controller, such that content is being displayed on the screen, or sending content, such as the content being displayed on the screen. The notifications or content can be used by the controller for determining whether a time limit or a content limit rule is to be enforced.
It will be appreciated that the configurations above are exemplary only, and that further configurations may be designed without deviating from the scope of the disclosure. Each of the steps of receiving a rule description from an administrator, generating commands in accordance with the rule, and transmitting the commands to a controller that has control over a screen can be performed by a unit in the network of the controller or an external one. It is noted that the step of receiving a rule description from an administrator requires the setting of a user, such that 690 the commands generated in accordance with the rule(s) are applied to that particular user.
In some embodiments, the controller or the management system may enable the administrator to block or put a device(s) in sleep or standby mode for any one or more of the associated screens immediately, or with a warning of a few minutes or seconds. A popup window may 695 allow the administrator to cancel the shutdown command, or customize the time frame and messaging notifications. Figure 3B shows a schematic screenshot of a user interface of a management device displayed when shutting down one or more screens.
Figure 3C shows the corresponding message that can be displayed when the screen is blocked 700 in accordance with a rule. The displayed image may be rendered by and transmitted from a
2019101282 31 Oct 2019 corresponding controller. The notification’s time and content can be set by the administrator to be in the form of an image, text, video, sound, or any combination thereof. The message is edited by any authorized administrator via the management system.
In one embodiment, the system enables the administrator to dynamically modify, update or add rules, to allocate extra time based on a new rule or reward. Thus, as one example, the administrator may allocate additional time, ad hoc, following the completion of a task set by the administrator. This may involve the system being programmable so that an administrator can set a rule that provides access/additional time for a user conditional on a condition being met (e.g. a task being completed), the administrator (or user) confirming that the condition has been met, and the updating to allocate the access or additional time.
It will be appreciated that a system in accordance with the disclosure can also be a part of an Internet of Things (loT) platform, wherein a dashboard such as user interface of cloud management system controls and manages the other loT devices near the controller or more screens or other devices.
The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a USB disc or USB drive, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory 735 signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective 740 computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface
2019101282 31 Oct 2019 in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Java, , C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), local generated hotspot, or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, fieldprogrammable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to diagrams of methods, apparatus (systems), and computer program interface according to embodiments of the invention. It will be understood that each feature described and illustrations and/or diagrams, and combinations of images and illustrations can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions rules specified in the diagrams and descriptions. These computer readable program instructions may also be stored in a computer readable storage medium that 780 can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
785
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to
2019101282 31 Oct 2019 produce a computer implemented processes, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/rules specified in the diagrams and descriptions.
The diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each images and described feature set, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted may occur out of the order noted in the figures. For example, functions may be executed sequentially or concurrently, or may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each combinations of diagrams and/or descriptions , can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
The following features of the invention, or of preferred embodiments of the invention have been described above. These features, alone or preferably in combination, provide a very powerful system for facilitating the monitoring and control of screen use by multiple users. These features include:
- A login-feature, for multiple users, to track the use/time of each user on the controlled screen(s) and/or device(s)
- The ability to block usage of the screen or its connected devices unless a user is logged in.
- The application of the system to multiple users using the same screen
- The ability to allocate users can have a fixed amount of time per day/week/month based on a predetermined schedule
- The ability to enforce a maximum session duration based on a predetermined rule
- The ability to dynamically allocate users extra time on based on other rules or rewards set by the administrator or the administration system
- The ability to control multiple screens where the usage for each is added together by the administration software and will therefore reduce time available on other screens
820 - The ability to transmit messages and content to the screen
- The ability to control/manage a single screen, and the screening of television to that screen, with or without external devices (e.g. video players, playstations etc)
- The ability to use the screen’s own remote to interact with the invention.
- The ability to switch the screens input device to the specific (separate) controller of the
825 present application (if not logged in) if the user tries to bypass the controller.
- The ability to pause the session is the screen is turned off.
- The ability to switch the screens input source to the one selected on the controller by the user.
- The ability to notify a manager if the device is moved or the power is disconnected.
830
Various modifications may be made to the invention and the preferred embodiments described above, without departing from the spirit and scope of the invention.
2019101282 23 Oct 2019
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosed subject matter will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawings. Unless indicated otherwise, the drawings provide exemplary embodiments or aspects of the disclosure and do not limit the scope of the disclosure. In the drawings:
FIGURE 1 shows a generalized diagram of an exemplary configuration of a system for controlling screen usage, showing external devices (C) physically connected to the controller (B), and the controller physically connected to the screen (A), and with the controller connected to a cloud management system via an internet connection. Also shown are additional optional applications (D) connected via one or more communication methods such as WIFI, Bluetooth, RFID, NFC or another wireless technology;
FIGURES 2A and 2B show exemplary displays of dialogs with which the administrator can define rules, in accordance with some exemplary embodiments of the disclosure;
FIGURES 3A - 3D show exemplary user displays based on rules created by administrators, in accordance with some exemplary embodiments of the disclosure; and
FIGURE 4 shows a generalized diagram of a tamper proof module, in accordance with some exemplary embodiments of the disclosure.

Claims (5)

  1. CLAIMS:
    1. A system for controlling access by multiple users to a screen and to multiple devices, the system comprising:
    - a management system for controlling access by multiple users to the screen and multiple devices, the management system being accessible to an administrator to allow setting of rules for controlling the access of multiple users to the screen and devices; and
    - a controller connected to or associated with the screen and with multiple devices, the controller managing multiple input sources and configured to control the screen output in response to the commands of the management system, wherein the system further controls the screen output to display information to the user relating to a rule that has been set for the user.
  2. 2. The system of claim 1, wherein the management system enables the administrator to set separate time periods for access by each of two or more users to the screen and devices.
  3. 3. The system of claim 2, wherein the management system enables the administrator to set customisable rules for controlling access to the screen and devices by each user.
  4. 4. A method for controlling access by multiple users to a screen and to multiple devices, the method comprising:
    - using a management system to control access by multiple users to the screen and multiple devices, the management system being accessible to an administrator to allow setting of rules for controlling the access of multiple users to the screen and devices; and
    - sending commands from the management system to screen via a controller, the controller managing multiple input sources and controlling the screen output in response to the commands of the management system, to thereby control access by multiple users to the devices, and
    - displaying information relating to a rule that has been set for a user to the screen when that user has access to the screen.
  5. 5. A controller device for controlling a screen, the controller device comprising:
    - An outlet or outlet connector for connecting to the screen; and
    - Multiple inlets or inlet connectors for connecting to devices;
    wherein the controller device is operable in response to the commands of a management system which manages the ability for multiple users to access the devices, and the controller device controls the visual display on the screen to allow or block access to individual devices connected to the controller, based on the identity of the user seeking to access a device, and the rules set by an administrator for that user, and wherein the controller device controls the screen output to display information to the user relating to a rule that has been set for the user.
AU2019101282A 2019-10-23 2019-10-23 The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular. Ceased AU2019101282A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2019101282A AU2019101282A4 (en) 2019-10-23 2019-10-23 The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2019101282A AU2019101282A4 (en) 2019-10-23 2019-10-23 The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular.

Publications (1)

Publication Number Publication Date
AU2019101282A4 true AU2019101282A4 (en) 2019-12-19

Family

ID=68847199

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2019101282A Ceased AU2019101282A4 (en) 2019-10-23 2019-10-23 The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular.

Country Status (1)

Country Link
AU (1) AU2019101282A4 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883925A (en) * 2022-11-17 2023-03-31 深圳创维-Rgb电子有限公司 Display device standby method, electronic device and readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883925A (en) * 2022-11-17 2023-03-31 深圳创维-Rgb电子有限公司 Display device standby method, electronic device and readable storage medium

Similar Documents

Publication Publication Date Title
US10541988B2 (en) Privileged account plug-in framework—usage policies
CN101946267B (en) Matched communicating devices
US9172705B1 (en) System and method for remote, interactive network and browsing supervision, monitoring, and approval
US20150207864A1 (en) Technology adapted to enable devices for delivering data in a lockdown mode, methods for operating such devices, and reporting on activity at table devices that provide remote content
US10771618B1 (en) Device management system
US8751948B2 (en) Methods, apparatus and systems for providing and monitoring secure information via multiple authorized channels and generating alerts relating to same
CN104871237A (en) Authenticated release of data towards a device driver
US20180295390A1 (en) D-cinema to a selected location
USRE48897E1 (en) Learning gamification and safety control application for mobile devices
CN109446031B (en) Control method of terminal equipment, terminal and readable storage medium
CN109283893A (en) Authority control method, device, system and the electronic equipment of smart home device
WO2017211088A1 (en) Multi-screen interaction method and device
US20170302876A1 (en) System and method of controlling and enforcing screen usage
AU2019101282A4 (en) The systems and methods for managing screen usage, and to systems and methods for controlling and enforcing usage rules relating to screen usage and electronic devices (in combination) in particular.
US11005911B2 (en) System and protocol for remote supervisory parental observation, interaction, and management of media content on digital content-delivery devices
CN111756669B (en) Login request processing method, mobile device and intelligent hardware device
US20230049989A1 (en) Electronic system and method for claiming and reserving work areas
CN113111196B (en) Multimedia resource recommendation method and related device
US20190258496A1 (en) A multimedia system and a method for remote administration and management of a terminal in the system
Iftimie et al. Upon a Home Assistant Solution Based on Raspberry Pi Platform.
US20230050116A1 (en) Electronic system and method for claiming and reserving work areas
EP3754936A1 (en) Facilitated video communication system and method, specialized for use by elderly people or people with cognitive or motor disabilities
CA3047372A1 (en) Method for regulating access to data connection by an electronic device
Baumgarten Washburn Shops Lab Management System
US20230396678A1 (en) Methods and systems configured for distribution of vr/mr/ar/xr content to end user devices via logical relationships and related management of end user devices

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry