WO2002054200A2 - Method and system for parental internet control - Google Patents
Method and system for parental internet control Download PDFInfo
- Publication number
- WO2002054200A2 WO2002054200A2 PCT/IL2001/001212 IL0101212W WO02054200A2 WO 2002054200 A2 WO2002054200 A2 WO 2002054200A2 IL 0101212 W IL0101212 W IL 0101212W WO 02054200 A2 WO02054200 A2 WO 02054200A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mouse
- uidm
- computer
- setups
- parental control
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the invention relates to a method and system for providing parental
- the invention relates to control over use of the Internet. More particularly, the invention relates
- the Internet has, on the one hand, increased the freedom of expression
- Parental control refers to the ability to control the Internet
- Some browsers such as the Internet Explorer 5, provide a parental
- control software It helps the user to control the types of content that his
- the computer can access on the Internet.
- the user can adjust the types of
- Cyber Patrol (www.cyberpatrol.com) is another Parental Control
- Two or more levels are determined - the "parent" level
- the parent can set up and alter the Internet
- Parental Control requires entering a password in order to operate in the
- chatting by means of the Internet may cause
- the suitable access level is selected automatically according to the one
- Control level is active.
- the present invention relates to a method for carrying out Parental
- each setup including
- each mouse component Providing at least two mouse components, each mouse component
- the ID of the mouse component is a unique ID stored in a
- the mouse component is a mouse, wherein the parent's mouse
- the ability to define the restrictions in the setups is
- the associating of setups to a mouse ID is restricted, such as
- mice of the parent should be kept in a safe place inaccessible to the
- the invention further relates to a system for carrying out parental
- control which comprises a parental control application, and at least two
- the parental control application comprises several setups,
- the mouse component is a mouse component
- the parental control application comprises an ID and the parental control application comprises software
- mouse component is a mouse.
- each mouse comprises a first plug to which a second plug in
- the first plug is located
- the first plug may be located
- the method of the invention further comprises the steps of:
- system of the invention further comprises: (a) Means in
- warning message is a predefined message being an integral part of the parental control application.
- the warning message is a message which is
- UIDMs are at least one UIDMs connectable to the mouse system of the
- the method of the invention further comprises: (a) each UIDM
- the UIDM thereby activating its Internet access restrictions.
- a UIDM is given to a parent, and said UIDM being
- the mouse system According to one embodiment of the invention, the mouse system
- a light indicator that lights when a UIDM is
- the associating of setups to a UIDM ID is restricted, such
- the UIDM is connected by inserting it into a slot within the UIDM
- the mouse system According to one embodiment of the invention, the
- mouse system comprises a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer.
- the mouse system According to another embodiment of the invention, the mouse system
- the UIDM is connectable to a slot within the UIDM
- the UIDM is connected by inserting it into a slot within a
- system of the invention comprises a parental control
- the UIDM comprises an ID and the parental control
- the application comprises software means for retrieving said ID.
- the invention further relates to a method for carrying out Security
- each UIDM one or more of the setups; (e) When operating the
- UIDM is connected to the mouse system only when the user is
- the invention further relates to a system for carrying out security
- control which comprises a security control application, and at least
- one UIDM connectable to the mouse system of the computer.
- the security control application comprises several setups, each setup including predefined restrictions for accessing data from
- the UIDM comprises an ID and the security control
- application comprises software means for retrieving the ID.
- the age of the user is recorded within the mouse
- Fig. 1 illustrates in block diagram form the structure of a Parental
- Fig. 2 illustrates in block diagram form the components of a
- Fig. 3 illustrates a mouse controlling system, according to one
- Fig. 4 illustrates a mouse designed for children, according to one embodiment of the invention
- Fig. 5 is a flow diagram illustrating a process for defining a setup in
- Fig. 6 schematically illustrates a high level flowchart of a process for
- Fig. 7 illustrates a GUI form for defining the Parental control
- Figs. 8a and 8b illustrate a mouse that comprises a socket according
- Fig. 9 is a flow diagram describing a process for warning a chat
- Fig. 10 illustrates a mouse comprising one electronic card, on which
- the ID is stored within its circuitry, according to one embodiment of the
- Fig. 11 illustrates a circuit for indicating the presence of the parental
- Fig. 12 schematically illustrates an "identification" box, according to one embodiment of the invention.
- Fig. 13 schematically illustrates in a flowchart form an age
- Fig. 14 schematically illustrates a mouse pad with UIDM reading
- USB Universal Serial Bus
- a UART is the microchip with programming that controls a
- GUI Graphic User Interface
- GUI programs use icons, toolbars, taskbars and other friendly, point-
- SIM Subscriber Identity Module
- said card is connected to the mouse of the computer.
- Some of the filtering methods used in the art are: Checking the content of a Web page: Prior to the presentation of a
- Web page The words can be searched in the Web address, as well.
- addresses may be restricted. For example, if the parent wishes to
- the browser displays a
- Fig. 1 schematically illustrates in block diagram form the structure of a
- a list of categories 30 may define a control level, such as "Sex”, “Nudity”, etc.
- Each category is comprised of a list of keywords
- predetermined rating in the list is compared with the rating as given to
- Any other restricting rules 90 may exist.
- the user can establish a
- predetermined setup as provided by the browser, and can add and alter
- the access to the Parental Control setup can be restricted
- Fig. 2 schematically illustrates a block diagram of the components in the
- Parental Control system according to one embodiment of the invention.
- the system includes
- the mouse 50 of the computer that comprises an ID retrievable by the
- the system comprises also a list of IDs 60, and a specific
- the interface 100 may be a part of a Parental Control software, or a
- parents should have a different ID and preferably different shape and
- the ID of the mouse is used for identifying the user. Hence, the profile
- the active Parental configuration can be ascertained by a glance
- the- PC mouse controlling system has the
- Sensors are the movement detectors that sense the
- buttons which sense the button states.
- the mouse controller within the mouse reads the state of those sensors
- the mouse driver receives that data packet and decodes the information
- the mouse driver states, and provides it to the application.
- the mouse driver
- the ID of the mouse is a mouse
- Fig. 3 schematically illustrates a mouse controlling system, according to
- Mouse 50 is connected to the computer
- serial interface 112 such as RS-232C.
- the communication is
- the transmitting chip 51 can
- the ID may be any suitable ID. According to another embodiment of the invention, the ID may be any suitable ID.
- the ID may be conveyed upon
- the ID is conveyed periodically.
- the ID is conveyed to the computer any time that the mouse is
- the parental control can be implemented as a software module/utility or
- Fig. 4 illustrates a mouse designed for a child, according to one
- Fig. 5 is a flow diagram illustrating a process for defining the setup for a
- step 201 the process starts, by executing the setup program/
- step 205 continues with step 205, otherwise, step 203.
- the software retrieves the ID of the parent's mouse and saves
- the user is asked to attach the child's mouse to the computer.
- the ID of the child's mouse is retrieved by the program/
- the user is asked to define the setup to be associated with the
- step 205 If however the answer is "No", the process continues with step 205. If however the answer is "No", the process continues with step 205.
- a password may be used as a
- Fig. 6 is a flow diagram illustrating a process of Parental Control
- the ID of the mouse is retrieved.
- the retrieved ID is compared with the list of IDs as saved in
- step 105 in which the setup associated with that ID is activated.
- step 106 where the Parental Control application activates all the
- Fig. 7 schematically illustrates an exemplary GUI form for defining the
- Entry to the GUI form is restricted by a password (not shown) or
- Two levels of operation may be defined: The Parent level and the Child
- radio button 302. This way, more than one mouse can be set to operate
- box 308 included in box 308, and may also be edited by the user. Whenever the user wishes to define the setup of a mouse, he attaches
- the altered setup is stored.
- GUI for defining and altering the setup. For example, in order to help
- Control may comprise some predefined setups, such as those existing in
- the parent may select one of the predefined setups,
- Fig. 9 shows a block diagram
- the invention provides
- control application (and therefore in block 106 all restrictions are
- Such a message may be: "THIS IS A MESSAGE FROM THE
- a first chat type is a stand
- a second chat type includes those chat
- chat program is a stand alone local application, which is activated from
- characteristic to such chat session is whether Java Applets are active.
- chat sessions have other typical characteristics, such as
- chat sessions for determining whether or when a chat session is active.
- the mouse is likely to be plugged in and out more often than
- the rear side of the computer is inconvenient, preferably according to the
- the mouse is designed to include a socket for its cable, in
- Figs. 8a and 8b illustrate a mouse that comprises a socket 60 according
- the cable 70 is a part of mouse 50.
- the mouse is used as an identification
- a small portable device preferable to store it in a safe place, such as a locked drawer.
- a safe place such as a locked drawer.
- the parent or child operates the computer.
- Fig. 10 schematically illustrates a mouse 50 of the invention, comprising
- the electronic card 61 is installed
- a dedicated card 61 is
- the mouse's circuitry Upon checking the current ID of the mouse, the mouse's circuitry reads
- the electronic card 61 is small, and therefore suitable for stowing in a wallet, pocket, and so
- the mouse further comprises an indicator 63, which lights or
- parent's ID is not installed, and so forth.
- Subscriber Identity Module such as the SIM used in mobile
- UIDM User ID Module
- Fig. 11 illustrates a circuit for indicating the presence of the parental ID
- the circuit 65 is closing.
- the power 66 which its source is from the
- the card will indicate to the setup who is using the computer, and what
- UIDM card insertable to the mouse of the computer
- accessing various applications or data may it be local (i.e., within the
- PC of the user or remote (e.g., over the local network or over the
- a computer may comprise important material to the
- Fig. 12 schematically illustrates an "identification" box, according to one
- the "identification" box 80 is inserted
- the computer is carried out by the connector 88 of the identification box
- the connectors are of the
- the Identification box deals with the common protocols of connecting a
- VCC and GND which are used for the power source to the ouse
- the identification box enables to the connected mouse to operate
- the identification 80 box comprises a socket for inserting the ID card 61.
- the identification box is able to read or write the content of
- the identification box 80 intercepts data
- Fig. 2 can communicate with the microcontroller 82.
- the microcontroller periodically checks the presence of the ID
- the software element 100 forces the most severe restrictions, according to the Parental Control setup.
- mice is:
- the user (parent or child) is not limited to the mouse with the socket,
- the age of the user is a predefined value
- the recorded age is used to approve/disapprove
- FIG. 13 schematically illustrates in a
- flowchart starts at block 131, wherein the user age is recorded into the
- the activity is approved. If the age is below the threshold, then the
- activity is disproved (block 134). For example, adults sites may be forced
- the activity is found below a threshold age (e.g., below 21), the activity is found below a threshold age (e.g., below 21), the activity is
- the age may be registered only by
- the UIDM 61 is inserted
- Fig. 14 illustrates a mouse pad 141 with UIDM reading
- UIDM 61 is inserted into UIDM slot 142.
- the mouse pad is
- Cable 143 can use any suitable connection protocol, such as USB, PS/2 etc.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/451,855 US20040051733A1 (en) | 2000-12-28 | 2001-12-17 | Method and system for parental internet control |
EP01272791A EP1374008A2 (en) | 2000-12-28 | 2001-12-27 | Method and system for parental internet control |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL14062400A IL140624A (en) | 2000-12-28 | 2000-12-28 | Method and system for parental internet control |
IL140624 | 2000-12-28 | ||
IL143777 | 2001-06-14 | ||
IL14377701A IL143777A (en) | 2000-12-28 | 2001-06-14 | Method and system for parental internet control |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002054200A2 true WO2002054200A2 (en) | 2002-07-11 |
WO2002054200A3 WO2002054200A3 (en) | 2003-10-23 |
Family
ID=26323998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2001/001212 WO2002054200A2 (en) | 2000-12-28 | 2001-12-27 | Method and system for parental internet control |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1374008A2 (en) |
WO (1) | WO2002054200A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005122557A1 (en) * | 2004-06-04 | 2005-12-22 | Thomson Licensing | Method and apparatus for controlling an apparatus having a parental control function |
EP1678596A2 (en) * | 2003-10-31 | 2006-07-12 | Siemens Aktiengesellschaft | Intuitive and secure control of operational inputs in software components |
GB2470564A (en) * | 2009-05-26 | 2010-12-01 | Integrite Internat Ltd | Parental control for internet using memory device |
US7869790B2 (en) | 2004-09-24 | 2011-01-11 | Scenera Technologies, Llc | Policy-based controls for wireless cameras |
US8145241B2 (en) | 2005-06-30 | 2012-03-27 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000025196A1 (en) * | 1998-10-27 | 2000-05-04 | Glaser Lawerence F | Computer pointing device having theme identification means |
US6070796A (en) * | 1995-08-21 | 2000-06-06 | Sirbu; Cornel | Conditional access method and device |
WO2000051035A1 (en) * | 1999-02-24 | 2000-08-31 | Doodlebug Online, Inc. | System and method for authorizing access to data on content servers in a distributed network |
-
2001
- 2001-12-27 WO PCT/IL2001/001212 patent/WO2002054200A2/en not_active Application Discontinuation
- 2001-12-27 EP EP01272791A patent/EP1374008A2/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6070796A (en) * | 1995-08-21 | 2000-06-06 | Sirbu; Cornel | Conditional access method and device |
WO2000025196A1 (en) * | 1998-10-27 | 2000-05-04 | Glaser Lawerence F | Computer pointing device having theme identification means |
WO2000051035A1 (en) * | 1999-02-24 | 2000-08-31 | Doodlebug Online, Inc. | System and method for authorizing access to data on content servers in a distributed network |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1678596A2 (en) * | 2003-10-31 | 2006-07-12 | Siemens Aktiengesellschaft | Intuitive and secure control of operational inputs in software components |
US7437337B2 (en) | 2003-10-31 | 2008-10-14 | Siemens Aktiengesellschaft | Intuitive and reliable control of operator inputs in software components |
WO2005122557A1 (en) * | 2004-06-04 | 2005-12-22 | Thomson Licensing | Method and apparatus for controlling an apparatus having a parental control function |
US8225345B2 (en) | 2004-06-04 | 2012-07-17 | Thomson Licensing | Method and apparatus for controlling an apparatus having a parental control function |
US7869790B2 (en) | 2004-09-24 | 2011-01-11 | Scenera Technologies, Llc | Policy-based controls for wireless cameras |
US8238879B2 (en) | 2004-09-24 | 2012-08-07 | Armstrong, Quinton Co. LLC | Policy-based controls for wireless cameras |
US8660534B2 (en) | 2004-09-24 | 2014-02-25 | Armstrong, Quinton Co. LLC | Policy based controls for wireless cameras |
US8145241B2 (en) | 2005-06-30 | 2012-03-27 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
US8738029B2 (en) | 2005-06-30 | 2014-05-27 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
GB2470564A (en) * | 2009-05-26 | 2010-12-01 | Integrite Internat Ltd | Parental control for internet using memory device |
Also Published As
Publication number | Publication date |
---|---|
WO2002054200A3 (en) | 2003-10-23 |
EP1374008A2 (en) | 2004-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040051733A1 (en) | Method and system for parental internet control | |
US6208995B1 (en) | Web browser download of bookmark set | |
JP3313077B2 (en) | Method and system for accessing the Internet using a bookmark set | |
US6041360A (en) | Web browser support for dynamic update of bookmarks | |
US20010021950A1 (en) | Method and apparatus for controlling access to a computer network using tangible media | |
US7711854B2 (en) | Retrieving documents over a network with a wireless communication device | |
MXPA03005801A (en) | Content filtering for web browsing. | |
GB2381902A (en) | Bookmark managing system and bookmark managing method | |
US20110252085A1 (en) | Communication system, server device, display device, information processing method, and program | |
US20030080996A1 (en) | Software for a navigation control unit for use with a wireless computer resource access device and associated system | |
AU2003247421A1 (en) | System and method for providing a digital rights scheme for browser downloads | |
JP4617384B2 (en) | Content access control from information transmission media playback device | |
CN106162805A (en) | The connection control method of WIFI hot spot service and device | |
WO2012070348A1 (en) | Server system, method for executing server system, and external memory | |
WO2002054200A2 (en) | Method and system for parental internet control | |
JP4592369B2 (en) | Service providing server | |
US20040054754A1 (en) | System and method for automatic internet access | |
US20020004909A1 (en) | ID information management system and method | |
KR20010094875A (en) | System for controlling a personal information | |
GB2333617A (en) | Bookmark set facilitates navigation in an electronic commerce related Web site | |
KR100292066B1 (en) | Method for controlling searching information in the internet circumstance | |
KR20050052949A (en) | System and method for providing log service with memory card | |
JP2002259178A (en) | Information sharing system | |
KR100514451B1 (en) | Management system for accessing WEB pages | |
JP5913275B2 (en) | Information protection terminal, information protection method, information protection terminal program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10451855 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001272791 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 2001272791 Country of ref document: EP |
|
NENP | Non-entry into the national phase in: |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2001272791 Country of ref document: EP |