Here's one I wrote that wraps the algorithm with passwords https://github.com/ryancdotorg/threshcrypt and you can set the same password multiple times to accomplish the second 'advanced scenario'.
hmm.. the article says: "If we encoded our secret with a cubic function and distributed coordinate sub-passwords it would require any combination of four points to determine the intercept and the secret."
Maybe I'm missing something here, but, taking any of the cubic function diagrams as example, what if all four coordinates have their "x" between -10 and 0? Those four coordinates will not be enough to generate the whole curve, no?
Docs at http://point-at-infinity.org/ssss/, demo at http://point-at-infinity.org/ssss/demo.html and it can be installed on ubuntu through the 'ssss' package, listed as ssss - Shamir's secret sharing scheme implementation.