WO2019220098A1 - Controlling access to profiles in an online social network - Google Patents
Controlling access to profiles in an online social network Download PDFInfo
- Publication number
- WO2019220098A1 WO2019220098A1 PCT/GB2019/051318 GB2019051318W WO2019220098A1 WO 2019220098 A1 WO2019220098 A1 WO 2019220098A1 GB 2019051318 W GB2019051318 W GB 2019051318W WO 2019220098 A1 WO2019220098 A1 WO 2019220098A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- profile
- adult
- child
- user
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/475—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
- H04N21/4751—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for defining user accounts, e.g. accounts for children
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Definitions
- the present invention relates to methods for controlling access to profiles in an online social network (OSN).
- OSN online social network
- PINs Personal Identification Numbers
- Parental controls are conventionally implemented using a "master PIN” known only to an adult (such as a parent or guardian).
- a child can log in to their account, but has restricted access to features, such as viewing age-inappropriate content or changing settings. Entry of the master PIN unlocks those features.
- the SamsungTM Kid's Mode protects a child from accessing potentially harmful content by setting up a PIN to prevent the child from exiting kids Mode.
- a problem with such a global setting is that it does not cope with a family with multiple children who might want to access an app on a mobile device. Either the device is in "kids mode" or not.
- a computer- implemented method for controlling access to profiles in an online social network comprising the steps:
- the step of authenticating a login session of the adult profile is performed in response to user input of the adult profile passcode.
- the method further comprises the step of authenticating a login session of the child profile directly from a login session of the adult profile, in response to user input to a login session of the adult profile, without being dependent on user input of the child profile passcode.
- This has the advantage of quick and easy switching to the child profile for the user of the adult profile.
- the method further comprises the step of setting a profile as a default profile for a mobile device in response to user input to a login session of the adult profile. This may be done for example when creating or editing the child profile.
- the step of setting a profile as a default profile further comprises subsequently logging out of the login session of the adult profile automatically.
- the method further comprises the step, conditional on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile.
- the step of limiting profile selection to the default profile comprises presenting options to a user to allow: login to the default profile; and authentication of a login session of a profile other than the default profile in response to user input of the adult profile passcode.
- the authentication of a login session of a profile other than the default profile comprises allowing switching of profiles in response to user input of the adult profile passcode
- the authentication of a login session of a profile other than the default profile comprises selecting the profile other than the default profile.
- the step of limiting profile selection on the device to the default profile is performed upon logout from a profile on the device.
- the method further comprises the step, conditional on a default profile being set for the mobile device, of limiting push notifications related to the profiles on the device to the default profile.
- the adult profile and child profile are sub-accounts of a respective adult account.
- instructions for controlling access to profiles in an online social network the instructions being adapted to cause one or more processors to perform a method according to the first aspect.
- Figure 1 depicts an account and profile relationship diagram
- FIG. 1 depicts network connections
- Figure 3 depicts a flowchart including controlling access to profiles in accordance with an embodiment of the present invention
- Figure 4 depicts post-logout screens when a default profile is set for a device, in accordance with an embodiment of the present invention
- Figure 5 depicts screens for selecting a profile and logging in, in accordance with an embodiment of the present invention.
- Figure 6 depicts a computer architecture suitable for implementing embodiments of the present invention.
- Embodiments allow adults to create child profiles as a sub-account from their main adult profile and to control access to profiles. Child users typically may not sign on to the network directly. A child profile may be created for any age child by adult.
- a moment is a main entity of an online social network, which represents an event.
- a Moment has a Date, Time, Location and Members.
- An activity is the contribution on Moments done by Moment Owner or Moment Members. There are several types of Activities possible, for example:
- a user may be an adult person or a child person, or their authenticated agent, such as a software agent. Their status as adult or child may be determined by the person's age. The adult person may be a parent of a child or have some other responsibility the child such as being a guardian. An adult person has and will normally keep secret the credentials (such as passcodes) to allow them access to an adult account and adult profile.
- an adult profile is the main profile of an Account. It is associated with the Account owner and is the primary profile of the Account. An Account is for use by an adult person and normally has one adult profile. An Account can provide login to multiple mobile devices. An adult profile may be automatically created once a user signs up and creates an Account. An adult profile would not typically be deleted, without deleting the associated Account. An Account owner can create child profiles.
- An Account can have multiple child profiles.
- a child profile is the secondary profile of an account created for use by children of the Account holder.
- Each profile has its own passcode (in this example a numerical PIN code) which is used to view and unlock that profile.
- An adult profile PIN can be used to unlock a child profile.
- a profile may have the following fields:
- An Account Owner (usually an Adult person) can create multiple Child Profiles, for their Children.
- a Child Profile can only be managed by one Account.
- a Child Profile is automatically joined in the adult's network.
- a Child Profile typically typically may not be transferred from one account to another.
- Adult Profile can create moments on behalf of Child Profiles. Any Moment or Activity created by Child Profile will be owned by Child Profile, however Adult Profile can review / manage those activities.
- the system may generate a notification to the corresponding adult profile user. A notification would have a call to action to convert that child profile into adult profile.
- An adult profile user can convert child profile into adult profile when profile upgrade process is due, An account would be created for that child profile. Child email and phone number would be entered to upgrade a child profile to an adult profile. Email and phone number would be verified via 6-digit verification code. An adult profile would enter the adult PIN code to confirm the profile conversion. Once a child profile is converted into an adult profile, it is removed automatically from the existing adult account. The adult profile then has no control over this newly upgraded adult profile and account.
- Figure 1 depicts an account and profile relationship diagram.
- Account 106 has an email address 102 and a phone number 104. These are used to log in 108 to one or multiple mobile devices 1 14.
- a mobile device 1 14 may have 140 one adult or child default profile 142.
- An account 106 may have only one 1 10 adult profile 126.
- the adult profile has stored in association with it a first name 1 16, a last name 1 18, a date of birth 120 a PIN code 122 and gender information 124.
- Account 106 may have one or many 1 12 child profiles 128.
- a child profile 128 has stored in association with it a first name 130, a last name 132, a date of birth 134, a PIN code 136 and gender information 138.
- Each profile has its own PIN code to access the profile.
- a numeric PIN is used, although other types of passcodes may be used, such as alphanumeric codes or, for example, biometrically generated passcodes.
- the profile PIN code is a 4-digit code.
- a profile PIN code can be changed from app settings.
- the adult profile PIN code is the master PIN code.
- the master PIN code can also be used to unlock child profiles, for example by switching to a child account when logged into the child's adult profile.
- An Account holder can reset the PIN from the app. Upon initiating the reset, an email may be sent containing a 6-digit numeric code to reset the PIN. Once PIN reset verification is complete, the user is able to enter the new PIN Code.
- each profile 126, 128 has its own profile passcode, in this example a PIN code 122, 136, for unlocking the content in their profile.
- a user of an adult profile 126 can unlock the content of any of their child profiles 128 using their own adult profile's PIN code.
- adult profile's PIN code can be considered as a Master PIN Code.
- the account's phone number 104 and email address 102 are used for logging into an account 106 on a mobile device.
- a user of an adult profile can promote any profile as "Default Profile” on a specific device.
- the profile switcher is not visible after logout and only the "Default Profile” can use the app by entering a PIN, as shown in Screen 404 in Figure 4. Only a user who knows the adult profile PIN can override this restriction, by entering the adult profile PIN, as shown in screen 412 in Figure 4.
- a user of the adult profile can convert a child profile into an adult profile. By doing so that newly converted adult profile becomes separated from the current Account and the newly converted adult profile will have its own Account.
- Figure 2 depicts network connections. Three Accounts 202, 204, 206 are shown. Each Account is shown in this example with one adult profile 208, 212, 216 and one child profile 210, 214, 218 respectively (e.g. Account 1 has Profile 1A, Profile 1 C).
- Profile 1A 208 has the following 1 st Level Connections: to Profile 1 C 210; and
- Profile 2C 214 has the following 1 st Level Connection:
- Second Level Connections are as follows:
- Profile 1 A 208 has following Second Level Connections:
- Profile 2C 214 (because Profile 2C is Friend of Profile 2A who is Friend of Profile 1 A);
- Profile 3A 216 (because Profile 3A is Friend of Profile 2A who is Friend of Profile 1 A);
- Profile 3C 218 (because 3C is in the Account of Profile 3A and Profile 3A is a Second Level Connection of Profile 1 A).
- Profile 3C 218 has following Second Level Connections:
- Profile 2A 212 (because Profile 2A is Friend of Profile 3A who is in same Account as of Profile 3C)
- Profile 2C 214 (because Profile 2C is in the Account of Profile 2A who is Friend of Profile 3A and Profile 3A is in same Account as of Profile 3C).
- a child profile is created through an adult profile. Name, Age, Gender, etc. are entered for setting up child profile.
- a child profile can be setup as default profile on any device that has been allocated by the adult for use by the child.
- Figure 3 depicts a flowchart including controlling access to profiles in accordance with an embodiment of the present invention.
- the method further comprises the step of authenticating a login session of the child profile directly from a login session of the adult profile, in response to user input 314 to a login session 306 of the adult profile, without being dependent on user input of the child profile passcode.
- This has the advantage of quick and easy switching to the child profile 314 for the user of the adult profile 302.
- the method further comprises the step of setting 316 a profile as a default profile for a mobile device in response to user input 316 to a login session 306 of the adult profile. This may be done for example when creating or editing 310 the child profile 320.
- the step of setting 316 a profile as a default profile may comprise subsequently logging out 318 of the login session of the adult profile automatically.
- the step 332 of testing whether a default profile is set for the mobile device may be bypassed. This arrangement is depicted in Figure 3 for clarity. However, if that step 332 is not bypassed, since the default is set, the test will be found true in this case.
- the method further comprises the step, conditional 332 on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile.
- the step of limiting profile selection to the default profile may comprise presenting options (such as on a display) 334 to the user to allow: login to the default profile 340, 322; and authenticating 304 a login session 306 of a profile 302 other than the default profile 320 in response to user input 338 of the adult profile passcode.
- the step of authentication of 304 a login session 306 of a profile 302 other than the default profile may comprise selecting 300 the profile other than the default profile.
- the step of limiting profile selection on the device to the default profile may be performed upon logout 328, 312 from a profile on the device.
- a user When logged in to an adult profile, a user can use 308 the Online Social Network, for example by creating and sharing Moments and Activities. Similarly, when logged in to a child profile, a user can use 330 the Online Social Network. A child may edit 326 their own profile, but they do not have the option to set a profile as a default for a device.
- the adult profile 302 and child profile 320 are sub-accounts of a respective adult account 106.
- Figure 4 depicts post-logout screens when a default profile is set for a device.
- Figure 5 depicts screens on the mobile device 402 for selecting a profile and logging in.
- the method may comprise the step, conditional 332 on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile.
- the step of limiting profile selection on the device to the default profile may be performed upon logout 328, 312 from a profile on the device.
- the mobile device 402 has a screen 404 presenting options to the user.
- the default profile icon 406 is presented and PIN input area 408 is presented to allow login to the default profile.
- a "Switch Profile” button 410 is presented, When the user presses that button, a screen 412 is shown on the mobile device 402. A PIN input area 414 is presented to to receive user input of the adult profile passcode, to allow the user to switch to a profile. If the correct adult profile passcode is entered, the "Select Any Profile” screen 504 is displayed, as shown in Figure 5. With reference to Figure 5, the icons 506, 508, 510 of several profiles associated with the Adult Account (106 in Figure 1 ) are presented. The profiles may include the adult profile and one or more child profiles. The profiles include one or more profile other than the default profile.
- Figure 6 depicts a computer architecture suitable for implementing embodiments of the present invention.
- a mobile device 602 is loaded with a mobile app 604, which is executed on one or more processing units PU 606 of the mobile device.
- the mobile app communicates with an app server 608, which has one or more processors PU 610 for executing server-side functions.
- the app server 608 communicates with a database server 612, a media storage server 614, which can deliver media directly to the mobile app 604, and a cache server 616.
- a user of the Adult Profile can monitor the activities of their Child Profiles.
- Adult Profile will receive a notification if Child Profile sends an invitation to another Child profile outside Adult's network, and Adult Profile approval is required to send the invitation.
- Adult Profile will receive a notification if Child Profile receives an invitation from another Child profile outside Adult's network, and Adult Profile approval is required to send the invitation.
- Adult Profile can delete any content (Moment or Activity) from Child Profile.
- Adult Profile can put any of its Child Profile into Readonly mode. Once in Readonly mode, Child Profile typically may not create any activity, moment or perform any action except viewing existing moments and activities.
- Adult Profile can deactivate the Child Profile. Once Deactivated, Child Profile typically may not be opened.
- system redirects user to create profile screen to continue the signup process.
- System validates email and phone number format of user and sends a 6-digit verification code via SMS to their mobile and email address.
- SMS code 5. Then upon verification of SMS code, user will login into the app and access the application in Read only mode.
- This Use Case describes the process by which Accounts owner can create multiple Child Profiles, for their Children.
- Success Criteria Once user filled all the required fields and click on Finish button, then child account would be created successfully. Failure Criteria: User does not able to create child profile either because of read only mode or does not registered on App.
- Child Profile has the following Fields,
- the system displays an "Edit Profile" screen, which contains the following fields in read/write mode:
- Preconditions User is logged in to the app.
- This use case describes the process by which Adult Profile can deactivate the Child Profile from the child account screen.
- Preconditions User is logged in to the app.
- Child Profile typically may not be opened. All their accounts info and moments would be deleted.
- Embodiments may be provided as a computer program product containing one or more sequences of machine-readable instructions for controlling access to profiles in an online social network, the instructions being adapted to cause one or more processors (such as PU 606 and PU 610 in Figure 6) to perform a method as described herein.
- processors such as PU 606 and PU 610 in Figure 6
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Marketing (AREA)
- Tourism & Hospitality (AREA)
- Computing Systems (AREA)
- Human Resources & Organizations (AREA)
- Computer Networks & Wireless Communication (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Child & Adolescent Psychology (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A method for controlling access to profiles in an online social network has the steps: providing an adult profile (302) for a user of the online social network; providing an adult profile passcode (in this example a Master or Adult PIN) for authenticating (304) the login session (306) of the adult profile; authenticating a login session (306) of the adult profile, in response to user input (304) of the adult profile passcode; creating a child profile (320) associated with the adult profile (302), in response to user input to a login session (306) of the adult profile, for a user of the online social network; providing a child profile passcode (in this example a Child PIN) for authenticating (322) the login session (324) of the child profile; and authenticating a login session (324) of the child profile in response to user input (322) of the child profile passcode.
Description
CONTROLLING ACCESS TO PROFILES IN AN ONLINE SOCIAL NETWORK
The present invention relates to methods for controlling access to profiles in an online social network (OSN).
Background Art
In the field of controlling access to accounts and profiles on computers and mobile devices, passcodes such as PINs (Personal Identification Numbers) have been used. Parental controls are conventionally implemented using a "master PIN" known only to an adult (such as a parent or guardian). A child can log in to their account, but has restricted access to features, such as viewing age-inappropriate content or changing settings. Entry of the master PIN unlocks those features. For example, the Samsung™ Kid's Mode protects a child from accessing potentially harmful content by setting up a PIN to prevent the child from exiting Kids Mode. A problem with such a global setting is that it does not cope with a family with multiple children who might want to access an app on a mobile device. Either the device is in "kids mode" or not.
Summary of invention
According to a first aspect of the present invention, there is provided a computer- implemented method for controlling access to profiles in an online social network, the method comprising the steps:
• providing an adult profile for a user of the online social network;
• providing an adult profile passcode;
• authenticating a login session of the adult profile;
• creating a child profile associated with the adult profile, in response to user input to a login session of the adult profile, for a user of the online social network;
• providing a child profile passcode for authenticating the login session of the child profile; and
• authenticating a login session of the child profile in response to user input of the child profile passcode.
Preferably, the step of authenticating a login session of the adult profile is performed in response to user input of the adult profile passcode.
Preferably, the method further comprises the step of authenticating a login session of the child profile directly from a login session of the adult profile, in response to user input to a login session of the adult profile, without being dependent on user input of the child profile passcode. This has the advantage of quick and easy switching to the child profile for the user of the adult profile.
Preferably, the method further comprises the step of setting a profile as a default profile for a mobile device in response to user input to a login session of the adult profile. This may be done for example when creating or editing the child profile.
Preferably, the step of setting a profile as a default profile further comprises subsequently logging out of the login session of the adult profile automatically.
Preferably, the method further comprises the step, conditional on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile.
Preferably, the step of limiting profile selection to the default profile comprises presenting options to a user to allow: login to the default profile; and authentication of a login session of a profile other than the default profile in response to user input of the adult profile passcode.
Preferably, the authentication of a login session of a profile other than the default profile comprises allowing switching of profiles in response to user input of the adult profile passcode
Preferably, the authentication of a login session of a profile other than the default profile comprises selecting the profile other than the default profile.
Preferably, the step of limiting profile selection on the device to the default profile is performed upon logout from a profile on the device.
Preferably, the method further comprises the step, conditional on a default profile being set for the mobile device, of limiting push notifications related to the profiles on the device to the default profile.
Preferably, the adult profile and child profile are sub-accounts of a respective adult account.
According to a second aspect of the present invention, there is provided a computer program product containing one or more sequences of machine-readable
instructions for controlling access to profiles in an online social network, the instructions being adapted to cause one or more processors to perform a method according to the first aspect.
Brief description of drawings
Embodiments of the present invention will now be described, by way of example only, with reference to the drawings, in which:
Figure 1 depicts an account and profile relationship diagram;
Figure 2 depicts network connections;
Figure 3 depicts a flowchart including controlling access to profiles in accordance with an embodiment of the present invention;
Figure 4 depicts post-logout screens when a default profile is set for a device, in accordance with an embodiment of the present invention;
Figure 5 depicts screens for selecting a profile and logging in, in accordance with an embodiment of the present invention; and
Figure 6 depicts a computer architecture suitable for implementing embodiments of the present invention.
Description of embodiments
Embodiments allow adults to create child profiles as a sub-account from their main adult profile and to control access to profiles. Child users typically may not sign on to the network directly. A child profile may be created for any age child by adult.
Moment
In the examples described herein, a moment is a main entity of an online social network, which represents an event. A Moment has a Date, Time, Location and Members.
Activity
An activity is the contribution on Moments done by Moment Owner or Moment Members. There are several types of Activities possible, for example:
1. Image
2. Video
3. Audio
4. Text (Textual + Emoticons)
5. URL / Link
6. Documents (with extension pdf, doc, docx, xls, xlsx, ppt, pptx, txt)
7. Task
In this disclosure, a user may be an adult person or a child person, or their authenticated agent, such as a software agent. Their status as adult or child may be determined by the person's age. The adult person may be a parent of a child or have some other responsibility the child such as being a guardian. An adult person has
and will normally keep secret the credentials (such as passcodes) to allow them access to an adult account and adult profile.
Profiles
In the examples described herein, there are two types of profile: adult profile and child profile. An adult profile is the main profile of an Account. It is associated with the Account owner and is the primary profile of the Account. An Account is for use by an adult person and normally has one adult profile. An Account can provide login to multiple mobile devices. An adult profile may be automatically created once a user signs up and creates an Account. An adult profile would not typically be deleted, without deleting the associated Account. An Account owner can create child profiles.
Child Profiles
An Account can have multiple child profiles. A child profile is the secondary profile of an account created for use by children of the Account holder. Each profile has its own passcode (in this example a numerical PIN code) which is used to view and unlock that profile. An adult profile PIN can be used to unlock a child profile. A profile may have the following fields:
1. Name (Required)
2. Gender (Optional)
3. Date of Birth (Required)
4. Profile Picture (Default Avatar)
5. Maturity Age (Only for Child Profile)
6. PIN Code (Required)
7. Mode
a. Active / InActive
b. Readonly
An Account Owner (usually an Adult person) can create multiple Child Profiles, for their Children. A Child Profile can only be managed by one Account. A Child Profile is automatically joined in the adult's network. A Child Profile typically typically may not be transferred from one account to another. Adult Profile can create moments on behalf of Child Profiles.
Any Moment or Activity created by Child Profile will be owned by Child Profile, however Adult Profile can review / manage those activities.
When creating the child profile maturity age can be set by account owner. Once a child profile reaches the maturity age according to the date of birth in the system, the system may generate a notification to the corresponding adult profile user. A notification would have a call to action to convert that child profile into adult profile.
An adult profile user can convert child profile into adult profile when profile upgrade process is due, An account would be created for that child profile. Child email and phone number would be entered to upgrade a child profile to an adult profile. Email and phone number would be verified via 6-digit verification code. An adult profile would enter the adult PIN code to confirm the profile conversion. Once a child profile is converted into an adult profile, it is removed automatically from the existing adult account. The adult profile then has no control over this newly upgraded adult profile and account.
Figure 1 depicts an account and profile relationship diagram. Account 106 has an email address 102 and a phone number 104. These are used to log in 108 to one or multiple mobile devices 1 14. A mobile device 1 14 may have 140 one adult or child default profile 142.
An account 106 may have only one 1 10 adult profile 126. The adult profile has stored in association with it a first name 1 16, a last name 1 18, a date of birth 120 a PIN code 122 and gender information 124. Account 106 may have one or many 1 12 child profiles 128. A child profile 128 has stored in association with it a first name 130, a last name 132, a date of birth 134, a PIN code 136 and gender information 138.
Each profile has its own PIN code to access the profile. In the examples described herein, a numeric PIN is used, although other types of passcodes may be used, such as alphanumeric codes or, for example, biometrically generated passcodes. In the examples described herein, the profile PIN code is a 4-digit code. A profile PIN code can be changed from app settings. The adult profile PIN code is the master PIN code. The master PIN code can also be used to unlock child profiles, for example by
switching to a child account when logged into the child's adult profile. An Account holder can reset the PIN from the app. Upon initiating the reset, an email may be sent containing a 6-digit numeric code to reset the PIN. Once PIN reset verification is complete, the user is able to enter the new PIN Code.
Thus, with reference to Figure 1 , each profile 126, 128 has its own profile passcode, in this example a PIN code 122, 136, for unlocking the content in their profile. A user of an adult profile 126 can unlock the content of any of their child profiles 128 using their own adult profile's PIN code. Hence adult profile's PIN code can be considered as a Master PIN Code. For logging into an account 106 on a mobile device, 1 14 the account's phone number 104 and email address 102 are used.
As described below, with reference to Figures 3 to 5, a user of an adult profile can promote any profile as "Default Profile" on a specific device. When a default profile is set for a device, the profile switcher is not visible after logout and only the "Default Profile" can use the app by entering a PIN, as shown in Screen 404 in Figure 4. Only a user who knows the adult profile PIN can override this restriction, by entering the adult profile PIN, as shown in screen 412 in Figure 4.
When a default profile is set for a device, only "Default Profile" will receive push notifications, otherwise all profiles in that account will receive notifications and will be grouped by "Profile Name" in notification / system tray.
A user of the adult profile can convert a child profile into an adult profile. By doing so that newly converted adult profile becomes separated from the current Account and the newly converted adult profile will have its own Account.
Figure 2 depicts network connections. Three Accounts 202, 204, 206 are shown. Each Account is shown in this example with one adult profile 208, 212, 216 and one child profile 210, 214, 218 respectively (e.g. Account 1 has Profile 1A, Profile 1 C).
First Level Connections ("Friend" relationships) are as follows:
All Profiles in My Network or in My Account.
Profile 1A 208 has the following 1 st Level Connections:
to Profile 1 C 210; and
to Profile 2A 212.
Profile 2C 214 has the following 1 st Level Connection:
to Profile 2A 212.
Second Level Connections are as follows:
All those Profiles who are Friends of Friends in My Network.
All those Profiles who are in the Account of Friends in My Network.
All those Profiles who are in the Account of Friends of Friends in My Network. Profile 1 A 208 has following Second Level Connections:
Profile 2C 214 (because Profile 2C is Friend of Profile 2A who is Friend of Profile 1 A);
Profile 3A 216 (because Profile 3A is Friend of Profile 2A who is Friend of Profile 1 A); and
Profile 3C 218 (because 3C is in the Account of Profile 3A and Profile 3A is a Second Level Connection of Profile 1 A).
Profile 3C 218 has following Second Level Connections:
Profile 2A 212 (because Profile 2A is Friend of Profile 3A who is in same Account as of Profile 3C)
Profile 2C 214 (because Profile 2C is in the Account of Profile 2A who is Friend of Profile 3A and Profile 3A is in same Account as of Profile 3C).
A child profile is created through an adult profile. Name, Age, Gender, etc. are entered for setting up child profile. A child profile can be setup as default profile on any device that has been allocated by the adult for use by the child.
Figure 3 depicts a flowchart including controlling access to profiles in accordance with an embodiment of the present invention.
With reference to Figure 3, there is provided a computer-implemented method for controlling access to profiles in an online social network, the method comprising the steps:
• providing an adult profile 302 for a user of the online social network;
• providing an adult profile passcode (in this example a Master or Adult PIN) for authenticating 304 the login session 306 of the adult profile;
• authenticating a login session 306 of the adult profile, in response to user input 304 of the adult profile passcode;
• creating a child profile 320 associated with the adult profile 302, in response to user input to a login session 306 of the adult profile, for a user of the online social network;
• providing a child profile passcode (in this example a Child PIN) for
authenticating 322 the login session 324 of the child profile; and
• authenticating a login session 324 of the child profile in response to user input 322 of the child profile passcode.
The method further comprises the step of authenticating a login session of the child profile directly from a login session of the adult profile, in response to user input 314 to a login session 306 of the adult profile, without being dependent on user input of the child profile passcode. This has the advantage of quick and easy switching to the child profile 314 for the user of the adult profile 302.
The method further comprises the step of setting 316 a profile as a default profile for a mobile device in response to user input 316 to a login session 306 of the adult profile. This may be done for example when creating or editing 310 the child profile 320.
The step of setting 316 a profile as a default profile may comprise subsequently logging out 318 of the login session of the adult profile automatically. In this case, because the default device has been set, the step 332 of testing whether a default profile is set for the mobile device may be bypassed. This arrangement is depicted in Figure 3 for clarity. However, if that step 332 is not bypassed, since the default is set, the test will be found true in this case.
The method further comprises the step, conditional 332 on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile. The step of limiting profile selection to the default profile may comprise presenting
options (such as on a display) 334 to the user to allow: login to the default profile 340, 322; and authenticating 304 a login session 306 of a profile 302 other than the default profile 320 in response to user input 338 of the adult profile passcode. The step of authentication of 304 a login session 306 of a profile 302 other than the default profile may comprise selecting 300 the profile other than the default profile. The step of limiting profile selection on the device to the default profile may be performed upon logout 328, 312 from a profile on the device.
When logged in to an adult profile, a user can use 308 the Online Social Network, for example by creating and sharing Moments and Activities. Similarly, when logged in to a child profile, a user can use 330 the Online Social Network. A child may edit 326 their own profile, but they do not have the option to set a profile as a default for a device.
The adult profile 302 and child profile 320 are sub-accounts of a respective adult account 106.
Figure 4 depicts post-logout screens when a default profile is set for a device. Figure 5, depicts screens on the mobile device 402 for selecting a profile and logging in.
As described above with reference to Figure 3, the method may comprise the step, conditional 332 on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile. The step of limiting profile selection on the device to the default profile may be performed upon logout 328, 312 from a profile on the device. With reference to Figure 4, the mobile device 402 has a screen 404 presenting options to the user. The default profile icon 406 is presented and PIN input area 408 is presented to allow login to the default profile.
A "Switch Profile" button 410 is presented, When the user presses that button, a screen 412 is shown on the mobile device 402. A PIN input area 414 is presented to to receive user input of the adult profile passcode, to allow the user to switch to a profile. If the correct adult profile passcode is entered, the "Select Any Profile" screen 504 is displayed, as shown in Figure 5. With reference to Figure 5, the icons 506, 508, 510 of several profiles associated with the Adult Account (106 in Figure 1 )
are presented. The profiles may include the adult profile and one or more child profiles. The profiles include one or more profile other than the default profile. When the user selects a profile 510 by pressing on it, they are invited by a screen 512 showing the selected profile icon 510 to enter the profile passcode of the selected profile in a PIN input area 514. In this way, authenticating a login session of a profile other than the default profile is achieved.
Figure 6 depicts a computer architecture suitable for implementing embodiments of the present invention. With reference to Figure 6, a mobile device 602 is loaded with a mobile app 604, which is executed on one or more processing units PU 606 of the mobile device. The mobile app communicates with an app server 608, which has one or more processors PU 610 for executing server-side functions. The app server 608 communicates with a database server 612, a media storage server 614, which can deliver media directly to the mobile app 604, and a cache server 616.
Monitoring
In examples, a user of the Adult Profile can monitor the activities of their Child Profiles. Adult Profile will receive a notification if Child Profile sends an invitation to another Child profile outside Adult's network, and Adult Profile approval is required to send the invitation. Adult Profile will receive a notification if Child Profile receives an invitation from another Child profile outside Adult's network, and Adult Profile approval is required to send the invitation. Adult Profile can delete any content (Moment or Activity) from Child Profile. Adult Profile can put any of its Child Profile into Readonly mode. Once in Readonly mode, Child Profile typically may not create any activity, moment or perform any action except viewing existing moments and activities. Adult Profile can deactivate the Child Profile. Once Deactivated, Child Profile typically may not be opened.
The following are detailed examples of the steps involved in providing adult accounts and profiles and creation of child profiles, and approval of network connections.
Signup
Actor: User
Description: An Actor can sign up through application.
Preconditions: User has an Email Address, Phone number and user has received an invitation to sign up.
Success Criteria: User will fill all the required fields in the form and at the end of the process user will be able to login to the Application and continue making his profile.
Failure Criteria: User does not have email account and unable to activate account for not having email address.
Basic Flow: Steps and Actions:
1. User enters phone number and email address.
2. User clicks on Next Button.
3. System should display the confirmation window with options 'Edit' and
'OK'
• Is this your Phone number?
• <number> Is this OK, or would you like to edit the number? You'll receive an SMS shortly.
• Edit OK
• If user clicks on Edit button, system will redirect user to Login screen.
• If user clicks on OK button, It will redirect user to verification Code screen.
4. System validates user and send 6-digit verification code into their mobile and email address.
5. User enters Verification code.
6. System will prompt success message of "Verified" if the entered verification code is correct.
7. Then upon verification of SMS code, system redirects user to create profile screen to continue the signup process.
8. User Enters
a. First Name (Required)
b. Last Name (Required)
c. Gender (Optional)
d. Date of Birth (Required)
e. Pin Code (Required)
f. Profile Image (Optional)
9. User clicks on 'Create' button.
10 System would redirect user to 'Add Contact' screen where user can add members into their network.
1 1. System redirect user to App Tour and then Flome screen. All their contact information is synced in automatically and is displayed in My network list.
12. After logged into the app, user will enter an email code.
• User opens side menu.
• Select 'Email Verification' from menu.
• System will display the Email verification Overlay with an input field to enter verification code and options 'Verify' or 'Cancel'.
• User enters an email code.
• If user clicks on 'Verify' button, system will prompt success
message of "Verified" if the entered verification code is correct.
If user clicks on 'Cancel' button
• System redirect user to 'Flome Screen'.
Login
Actor: User
Description: Use case for Login where individual user can login to Account through Email & Phone number.
Preconditions: User has an Email Address, Phone number and is registered on
OSN.
Success Criteria: User logs on to system and is able to access home screen and navigation menu.
Failure Criteria: User is not able to login to the app either because of wrong email & Phone number or is not registered on app.
Basic Flow: Steps and Actions:
1. User enters phone number and email address.
2. User clicks on "Next" button.
3. System should display the confirmation window with options 'Edit' and 'OK'
Is this your Phone number?
• <number> Is this OK, or would you like to edit the number? You'll receive an SMS shortly.
■ Edit OK
• If user clicks on Edit button system will redirect user to Login screen.
• If user clicks on OK button, system will redirect user to verification
Code screen.
4. System validates email and phone number format of user and sends a 6-digit verification code via SMS to their mobile and email address.
5. Then upon verification of SMS code, user will login into the app and access the application in Read only mode.
6. User's account information and profiles would be automatically synced to this new phone.
7. After logged into the app, user will enter an email code.
• User opens side menu.
• Select 'Email Verification' from menu.
• System will display the Email verification Overlay with an input field to enter verification code and options 'Verify' or 'Cancel'.
• User enters an email code.
• If user clicks on 'Verify' button
• System will prompt success message of "Verified" if the entered
verification code is correct.
■ Verified
• If user clicks on 'Cancel' button
• System redirect user to 'Home Screen'.
Create Child Profile
Actor: User (Account Owner)
Description: This Use Case describes the process by which Accounts owner can create multiple Child Profiles, for their Children.
Preconditions: User Already Logged in and is registered on the OSN.
Success Criteria: Once user filled all the required fields and click on Finish button, then child account would be created successfully.
Failure Criteria: User does not able to create child profile either because of read only mode or does not registered on App.
Basic Flow: Steps and Actions:
1. User select 'Child Accounts' menu from sidebar
2. System Redirects user to 'Child Accounts' screen.
3. User taps the 'Add Child Profile' button in 'Child Accounts' screen
4. System redirect user to 'Setup Profile' screen.
5. Child Profile has the following Fields,
• First Name (Required)
• Last Name (Required)
• Date of Birth (Required)
• PIN Code (Required)
• Gender (Optional)
• Profile Picture (Optional)
• Maturity Age (Required)
• Set as Default Profile (Y/N)?
6. User fills in all the required fields (First name, Last Name, Date of Birth, Pin Code, Maturity age).
7. User clicks 'Create' button to create child profile.
8. System will display success message.
• Child Account has been Created
9. The system redirect user to 'Child Accounts' screen and created child profile would appear in listing.
Edit Child Profile
Actor: User (Account Owner)
Description: This Use Case describes the process by which Accounts owner can edit Child Profiles.
Preconditions: User Already Logged in and is registered on the OSN.
Success Criteria: Once user edited the child account, then child account details would be updated and appeared on Profile listing with updated values.
Failure Criteria: User does not able to Edit Child profile either because of read only mode or does not registered on App.
Basic Flow: Steps and Actions:
1 . User select 'Child Accounts' menu from sidebar
2. System Redirects user to 'Child Accounts' screen.
3. User click on three dots (...) and then edit profile option.
4. System Redirects user to 'Edit Profiles' screen where user can edit child profile.
5. The system displays an "Edit Profile " screen, which contains the following fields in read/write mode:
• First Name (Required)
• Last Name (Required)
• Date of Birth (Required)
• PIN Code (Required)
• Gender (Optional)
• Profile Picture (Default Avatar)
• Maturity Age (Required)
• Set as Default Profile (Y/N)?
6. User can Edit all the required and optional fields.
7. User Clicks on Finish button.
8. System will display success message.
• Child Account has been Updated
9. The system saves the changes.
Upgrade Child Profile
Actor: Adult Profile
Description: This use case describes the process by which Adult Profile can upgrade their child profile.
Preconditions: User is logged in to the app.
Success Criteria: Once adult user upgrades their child account, child profile would disappear from listing and new child account will be created
Basic Flow: Steps and Actions:
1 User first go to Child Accounts.
2 System displays the Child Accounts Screen.
3 User clicks on three dots (...) and then edit profile option.
4 It will redirect user to edit child profile screen.
5 Click on Make It adult button to upgrade their child profile.
6 System will display the Make Adult Overlay with an input field to child email and phone number with options 'Save' or 'Cancel'.
7 User Enters child email address, phone number and then click on Save button.
8 System sends a 6-digit verification code via SMS to their mobile
9 System will display the 'Verification Required' Overlay with an input field phone code and options 'Verify' and 'Cancel'
10 User enter phone code, click on Verify button.
1 1 System would redirect user to child profile listing, child profile would be disappeared from listing and new child account will be created.
Deactivate Child Profile
Actor: Adult User
Description: This use case describes the process by which Adult Profile can deactivate the Child Profile from the child account screen.
Preconditions: User is logged in to the app.
Success Criteria: Once adult user Deactivated child account, Child Profile typically may not be opened. All their accounts info and moments would be deleted.
Failure Criteria: Adult User is not able to deactivate child account either because of read only mode or is not logged in to the app.
Basic Flow: Steps and Actions:
1. User first go to Child Accounts.
2. System displays the Child Accounts.
User tap the Profile or three dots (...) and then click on Edit profile option.
3. System redirect user to 'Edit Profile' screen.
4. User clicks on 'Delete Profile' in Edit Profile Screen
5. The system prompts with a message:
• You are about to delete the child account, are you sure? Yes No
6. User clicks on 'Yes'
7. The system deletes the child account from the database and displays the success message to user.
• Child Account has been Deleted
8. If user clicks on 'No', system will redirect user to 'Edit Profile' screen.
Embodiments may be provided as a computer program product containing one or more sequences of machine-readable instructions for controlling access to profiles in an online social network, the instructions being adapted to cause one or more processors (such as PU 606 and PU 610 in Figure 6) to perform a method as described herein.
Claims
1. A computer-implemented method for controlling access to profiles in an online social network, the method comprising the steps:
- providing an adult profile for a user of the online social network;
- providing an adult profile passcode;
- authenticating a login session of the adult profile;
- creating a child profile associated with the adult profile, in response to user input to a login session of the adult profile, for a user of the online social network;
- providing a child profile passcode for authenticating the login session of the child profile; and
- authenticating a login session of the child profile in response to user input of the child profile passcode.
2. The method of claim 1 , wherein the step of authenticating a login session of the adult profile is performed in response to user input of the adult profile passcode.
3. The method of claim 1 or claim 2, further comprising the step of authenticating a login session of the child profile directly from a login session of the adult profile, in response to user input to a login session of the adult profile, without being dependent on user input of the child profile passcode.
4. The method of any preceding claim, further comprising the step of setting a profile as a default profile for a mobile device in response to user input to a login session of the adult profile.
5. The method of claim 4, wherein the step of setting a profile as a default profile further comprises subsequently logging out of the login session of the adult profile automatically.
6. The method of claim 4 or claim 5, further comprising the step, conditional on a default profile being set for the mobile device, of limiting profile selection on the device to the default profile.
7. The method of claim 6, wherein the step of limiting profile selection to the default profile comprises presenting options to a user to allow: login to the default profile; and authentication of a login session of a profile other than the default profile in response to user input of the adult profile passcode.
8. The method of claim 7, wherein the authentication of a login session of a profile other than the default profile comprises allowing switching of profiles in response to user input of the adult profile passcode
9. The method of claim 7, wherein authentication of a login session of a profile other than the default profile comprises selecting the profile other than the default profile.
10. The method of any of claims 6 to 9, wherein the step of limiting profile selection on the device to the default profile is performed upon logout from a profile on the device.
1 1. The method of any of claims 4 to 10, further comprising the step, conditional on a default profile being set for the mobile device, of limiting push notifications related to the profiles on the device to the default profile.
12. The method of any preceding claim, wherein the adult profile and child profile are sub-accounts of a respective adult account.
13. A computer program product containing one or more sequences of machine- readable instructions for controlling access to profiles in an online social network, the instructions being adapted to cause one or more processors to perform a method according to any preceding claim.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1808069.7 | 2018-05-17 | ||
| GBGB1808069.7A GB201808069D0 (en) | 2018-05-17 | 2018-05-17 | Controlling access to profiles in an online social network |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019220098A1 true WO2019220098A1 (en) | 2019-11-21 |
Family
ID=62723232
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/GB2019/051318 Ceased WO2019220098A1 (en) | 2018-05-17 | 2019-05-14 | Controlling access to profiles in an online social network |
Country Status (2)
| Country | Link |
|---|---|
| GB (1) | GB201808069D0 (en) |
| WO (1) | WO2019220098A1 (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020049806A1 (en) * | 2000-05-16 | 2002-04-25 | Scott Gatz | Parental control system for use in connection with account-based internet access server |
| US20110126266A1 (en) * | 2009-11-20 | 2011-05-26 | Disney Enterprises, Inc. | Method and system for authenticating subaccount users |
| US20130219517A1 (en) * | 2012-02-16 | 2013-08-22 | Gface Gmbh | Parent-child guidance support for social networks |
| US20140095999A1 (en) * | 2012-09-28 | 2014-04-03 | Target Brands, Inc. | Search and parental control features for digital entertainment services |
| US20160036940A1 (en) * | 2014-07-31 | 2016-02-04 | Kobo Inc. | Computing device operable in separate modes in connection with utilizing a network service |
-
2018
- 2018-05-17 GB GBGB1808069.7A patent/GB201808069D0/en not_active Ceased
-
2019
- 2019-05-14 WO PCT/GB2019/051318 patent/WO2019220098A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020049806A1 (en) * | 2000-05-16 | 2002-04-25 | Scott Gatz | Parental control system for use in connection with account-based internet access server |
| US20110126266A1 (en) * | 2009-11-20 | 2011-05-26 | Disney Enterprises, Inc. | Method and system for authenticating subaccount users |
| US20130219517A1 (en) * | 2012-02-16 | 2013-08-22 | Gface Gmbh | Parent-child guidance support for social networks |
| US20140095999A1 (en) * | 2012-09-28 | 2014-04-03 | Target Brands, Inc. | Search and parental control features for digital entertainment services |
| US20160036940A1 (en) * | 2014-07-31 | 2016-02-04 | Kobo Inc. | Computing device operable in separate modes in connection with utilizing a network service |
Also Published As
| Publication number | Publication date |
|---|---|
| GB201808069D0 (en) | 2018-07-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2021203034B2 (en) | Online collaboration systems and methods | |
| US11496460B2 (en) | Dynamic, customizable, controlled-access child outcome planning and administration resource | |
| US8648894B2 (en) | Virtual inmate visitation | |
| AU2019364194B2 (en) | Group-based mobile device management | |
| US9818161B2 (en) | Creating a social network message from an interface of a mobile device operating system | |
| US20170093777A1 (en) | App for Selective Monitoring of Social Media Activity | |
| JP6820807B2 (en) | Business activity processing equipment and methods based on business objects | |
| US9910682B2 (en) | Simultaneous website and mobile app creation method and system | |
| US10798460B2 (en) | Device and method for crowd-sourcing movie screenings | |
| CN109586930B (en) | Conference user adding method, first terminal, second terminal and processing server | |
| CN102143493A (en) | Mobile communication terminal with user management function and user management method thereof | |
| KR20160145804A (en) | Audio chat management device and method | |
| JP5325919B2 (en) | Authentication apparatus and method | |
| US20130054692A1 (en) | Organizing and Tracking Belongings Using Social Graph Information | |
| JP2020101859A (en) | Messaging system, messaging server, information terminal, program, and messaging method | |
| WO2019220098A1 (en) | Controlling access to profiles in an online social network | |
| EP2893701A1 (en) | System and electronic device | |
| US20130251125A1 (en) | Managing multiple passcodes related to a single call-in number used by a phone device | |
| WO2019220097A1 (en) | Connecting profiles in an online social network | |
| US20210117488A1 (en) | Systems of apps using ai bots for one family member to share memories and life experiences with other family members | |
| US10560402B2 (en) | Communications system with common electronic interface | |
| KR102832629B1 (en) | Method and apparatus for reservation messaing service | |
| JP7173179B2 (en) | Information processing system, information processing device, user terminal, and program | |
| US20240177248A1 (en) | Spot Date App | |
| US20240161215A1 (en) | Systems and methods for virtual attorney consultations and referrals |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19726471 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 19726471 Country of ref document: EP Kind code of ref document: A1 |