WO2002054200A2 - Method and system for parental internet control - Google Patents

Method and system for parental internet control Download PDF

Info

Publication number
WO2002054200A2
WO2002054200A2 PCT/IL2001/001212 IL0101212W WO02054200A2 WO 2002054200 A2 WO2002054200 A2 WO 2002054200A2 IL 0101212 W IL0101212 W IL 0101212W WO 02054200 A2 WO02054200 A2 WO 02054200A2
Authority
WO
WIPO (PCT)
Prior art keywords
mouse
uidm
computer
setups
parental control
Prior art date
Application number
PCT/IL2001/001212
Other languages
French (fr)
Other versions
WO2002054200A3 (en
Inventor
David Katzir
Original Assignee
David Katzir
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from IL14062400A external-priority patent/IL140624A/en
Priority to US10/451,855 priority Critical patent/US20040051733A1/en
Application filed by David Katzir filed Critical David Katzir
Priority to EP01272791A priority patent/EP1374008A2/en
Publication of WO2002054200A2 publication Critical patent/WO2002054200A2/en
Publication of WO2002054200A3 publication Critical patent/WO2002054200A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the invention relates to a method and system for providing parental
  • the invention relates to control over use of the Internet. More particularly, the invention relates
  • the Internet has, on the one hand, increased the freedom of expression
  • Parental control refers to the ability to control the Internet
  • Some browsers such as the Internet Explorer 5, provide a parental
  • control software It helps the user to control the types of content that his
  • the computer can access on the Internet.
  • the user can adjust the types of
  • Cyber Patrol (www.cyberpatrol.com) is another Parental Control
  • Two or more levels are determined - the "parent" level
  • the parent can set up and alter the Internet
  • Parental Control requires entering a password in order to operate in the
  • chatting by means of the Internet may cause
  • the suitable access level is selected automatically according to the one
  • Control level is active.
  • the present invention relates to a method for carrying out Parental
  • each setup including
  • each mouse component Providing at least two mouse components, each mouse component
  • the ID of the mouse component is a unique ID stored in a
  • the mouse component is a mouse, wherein the parent's mouse
  • the ability to define the restrictions in the setups is
  • the associating of setups to a mouse ID is restricted, such as
  • mice of the parent should be kept in a safe place inaccessible to the
  • the invention further relates to a system for carrying out parental
  • control which comprises a parental control application, and at least two
  • the parental control application comprises several setups,
  • the mouse component is a mouse component
  • the parental control application comprises an ID and the parental control application comprises software
  • mouse component is a mouse.
  • each mouse comprises a first plug to which a second plug in
  • the first plug is located
  • the first plug may be located
  • the method of the invention further comprises the steps of:
  • system of the invention further comprises: (a) Means in
  • warning message is a predefined message being an integral part of the parental control application.
  • the warning message is a message which is
  • UIDMs are at least one UIDMs connectable to the mouse system of the
  • the method of the invention further comprises: (a) each UIDM
  • the UIDM thereby activating its Internet access restrictions.
  • a UIDM is given to a parent, and said UIDM being
  • the mouse system According to one embodiment of the invention, the mouse system
  • a light indicator that lights when a UIDM is
  • the associating of setups to a UIDM ID is restricted, such
  • the UIDM is connected by inserting it into a slot within the UIDM
  • the mouse system According to one embodiment of the invention, the
  • mouse system comprises a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer.
  • the mouse system According to another embodiment of the invention, the mouse system
  • the UIDM is connectable to a slot within the UIDM
  • the UIDM is connected by inserting it into a slot within a
  • system of the invention comprises a parental control
  • the UIDM comprises an ID and the parental control
  • the application comprises software means for retrieving said ID.
  • the invention further relates to a method for carrying out Security
  • each UIDM one or more of the setups; (e) When operating the
  • UIDM is connected to the mouse system only when the user is
  • the invention further relates to a system for carrying out security
  • control which comprises a security control application, and at least
  • one UIDM connectable to the mouse system of the computer.
  • the security control application comprises several setups, each setup including predefined restrictions for accessing data from
  • the UIDM comprises an ID and the security control
  • application comprises software means for retrieving the ID.
  • the age of the user is recorded within the mouse
  • Fig. 1 illustrates in block diagram form the structure of a Parental
  • Fig. 2 illustrates in block diagram form the components of a
  • Fig. 3 illustrates a mouse controlling system, according to one
  • Fig. 4 illustrates a mouse designed for children, according to one embodiment of the invention
  • Fig. 5 is a flow diagram illustrating a process for defining a setup in
  • Fig. 6 schematically illustrates a high level flowchart of a process for
  • Fig. 7 illustrates a GUI form for defining the Parental control
  • Figs. 8a and 8b illustrate a mouse that comprises a socket according
  • Fig. 9 is a flow diagram describing a process for warning a chat
  • Fig. 10 illustrates a mouse comprising one electronic card, on which
  • the ID is stored within its circuitry, according to one embodiment of the
  • Fig. 11 illustrates a circuit for indicating the presence of the parental
  • Fig. 12 schematically illustrates an "identification" box, according to one embodiment of the invention.
  • Fig. 13 schematically illustrates in a flowchart form an age
  • Fig. 14 schematically illustrates a mouse pad with UIDM reading
  • USB Universal Serial Bus
  • a UART is the microchip with programming that controls a
  • GUI Graphic User Interface
  • GUI programs use icons, toolbars, taskbars and other friendly, point-
  • SIM Subscriber Identity Module
  • said card is connected to the mouse of the computer.
  • Some of the filtering methods used in the art are: Checking the content of a Web page: Prior to the presentation of a
  • Web page The words can be searched in the Web address, as well.
  • addresses may be restricted. For example, if the parent wishes to
  • the browser displays a
  • Fig. 1 schematically illustrates in block diagram form the structure of a
  • a list of categories 30 may define a control level, such as "Sex”, “Nudity”, etc.
  • Each category is comprised of a list of keywords
  • predetermined rating in the list is compared with the rating as given to
  • Any other restricting rules 90 may exist.
  • the user can establish a
  • predetermined setup as provided by the browser, and can add and alter
  • the access to the Parental Control setup can be restricted
  • Fig. 2 schematically illustrates a block diagram of the components in the
  • Parental Control system according to one embodiment of the invention.
  • the system includes
  • the mouse 50 of the computer that comprises an ID retrievable by the
  • the system comprises also a list of IDs 60, and a specific
  • the interface 100 may be a part of a Parental Control software, or a
  • parents should have a different ID and preferably different shape and
  • the ID of the mouse is used for identifying the user. Hence, the profile
  • the active Parental configuration can be ascertained by a glance
  • the- PC mouse controlling system has the
  • Sensors are the movement detectors that sense the
  • buttons which sense the button states.
  • the mouse controller within the mouse reads the state of those sensors
  • the mouse driver receives that data packet and decodes the information
  • the mouse driver states, and provides it to the application.
  • the mouse driver
  • the ID of the mouse is a mouse
  • Fig. 3 schematically illustrates a mouse controlling system, according to
  • Mouse 50 is connected to the computer
  • serial interface 112 such as RS-232C.
  • the communication is
  • the transmitting chip 51 can
  • the ID may be any suitable ID. According to another embodiment of the invention, the ID may be any suitable ID.
  • the ID may be conveyed upon
  • the ID is conveyed periodically.
  • the ID is conveyed to the computer any time that the mouse is
  • the parental control can be implemented as a software module/utility or
  • Fig. 4 illustrates a mouse designed for a child, according to one
  • Fig. 5 is a flow diagram illustrating a process for defining the setup for a
  • step 201 the process starts, by executing the setup program/
  • step 205 continues with step 205, otherwise, step 203.
  • the software retrieves the ID of the parent's mouse and saves
  • the user is asked to attach the child's mouse to the computer.
  • the ID of the child's mouse is retrieved by the program/
  • the user is asked to define the setup to be associated with the
  • step 205 If however the answer is "No", the process continues with step 205. If however the answer is "No", the process continues with step 205.
  • a password may be used as a
  • Fig. 6 is a flow diagram illustrating a process of Parental Control
  • the ID of the mouse is retrieved.
  • the retrieved ID is compared with the list of IDs as saved in
  • step 105 in which the setup associated with that ID is activated.
  • step 106 where the Parental Control application activates all the
  • Fig. 7 schematically illustrates an exemplary GUI form for defining the
  • Entry to the GUI form is restricted by a password (not shown) or
  • Two levels of operation may be defined: The Parent level and the Child
  • radio button 302. This way, more than one mouse can be set to operate
  • box 308 included in box 308, and may also be edited by the user. Whenever the user wishes to define the setup of a mouse, he attaches
  • the altered setup is stored.
  • GUI for defining and altering the setup. For example, in order to help
  • Control may comprise some predefined setups, such as those existing in
  • the parent may select one of the predefined setups,
  • Fig. 9 shows a block diagram
  • the invention provides
  • control application (and therefore in block 106 all restrictions are
  • Such a message may be: "THIS IS A MESSAGE FROM THE
  • a first chat type is a stand
  • a second chat type includes those chat
  • chat program is a stand alone local application, which is activated from
  • characteristic to such chat session is whether Java Applets are active.
  • chat sessions have other typical characteristics, such as
  • chat sessions for determining whether or when a chat session is active.
  • the mouse is likely to be plugged in and out more often than
  • the rear side of the computer is inconvenient, preferably according to the
  • the mouse is designed to include a socket for its cable, in
  • Figs. 8a and 8b illustrate a mouse that comprises a socket 60 according
  • the cable 70 is a part of mouse 50.
  • the mouse is used as an identification
  • a small portable device preferable to store it in a safe place, such as a locked drawer.
  • a safe place such as a locked drawer.
  • the parent or child operates the computer.
  • Fig. 10 schematically illustrates a mouse 50 of the invention, comprising
  • the electronic card 61 is installed
  • a dedicated card 61 is
  • the mouse's circuitry Upon checking the current ID of the mouse, the mouse's circuitry reads
  • the electronic card 61 is small, and therefore suitable for stowing in a wallet, pocket, and so
  • the mouse further comprises an indicator 63, which lights or
  • parent's ID is not installed, and so forth.
  • Subscriber Identity Module such as the SIM used in mobile
  • UIDM User ID Module
  • Fig. 11 illustrates a circuit for indicating the presence of the parental ID
  • the circuit 65 is closing.
  • the power 66 which its source is from the
  • the card will indicate to the setup who is using the computer, and what
  • UIDM card insertable to the mouse of the computer
  • accessing various applications or data may it be local (i.e., within the
  • PC of the user or remote (e.g., over the local network or over the
  • a computer may comprise important material to the
  • Fig. 12 schematically illustrates an "identification" box, according to one
  • the "identification" box 80 is inserted
  • the computer is carried out by the connector 88 of the identification box
  • the connectors are of the
  • the Identification box deals with the common protocols of connecting a
  • VCC and GND which are used for the power source to the ouse
  • the identification box enables to the connected mouse to operate
  • the identification 80 box comprises a socket for inserting the ID card 61.
  • the identification box is able to read or write the content of
  • the identification box 80 intercepts data
  • Fig. 2 can communicate with the microcontroller 82.
  • the microcontroller periodically checks the presence of the ID
  • the software element 100 forces the most severe restrictions, according to the Parental Control setup.
  • mice is:
  • the user (parent or child) is not limited to the mouse with the socket,
  • the age of the user is a predefined value
  • the recorded age is used to approve/disapprove
  • FIG. 13 schematically illustrates in a
  • flowchart starts at block 131, wherein the user age is recorded into the
  • the activity is approved. If the age is below the threshold, then the
  • activity is disproved (block 134). For example, adults sites may be forced
  • the activity is found below a threshold age (e.g., below 21), the activity is found below a threshold age (e.g., below 21), the activity is
  • the age may be registered only by
  • the UIDM 61 is inserted
  • Fig. 14 illustrates a mouse pad 141 with UIDM reading
  • UIDM 61 is inserted into UIDM slot 142.
  • the mouse pad is
  • Cable 143 can use any suitable connection protocol, such as USB, PS/2 etc.

Abstract

The present invention relates to a method and system for carrying out Parental Control when browsing the Internet by means of a computer, which comprises: (a) Providing a Parental Control application; (b) Providing in said parental control application several setups, each setup including predefined restrictions for accessing Internet sites or Web pages; (c) Providing at least two mouse components, each mouse component having its unique ID; (d) Associating with each mouse component one or more of said setups; (e) When operating the computer for browsing the Internet, activating said Parental Control application; (f) Retrieving by said application the ID of the mouse component connected; and (g) Activating by said application the setup associated with the ID of said mouse component, thereby activating its corresponding Internet access restrictions. In one embodiment of the invention, the mouse component is the computer mouse. In another embodiment of the invention, the mouse component is a User ID Module.

Description

METHOD AND SYSTEM FOR PARENTAL INTERNET CONTROL
Field of the Invention
The invention relates to a method and system for providing parental
control over use of the Internet. More particularly, the invention relates
to a method and system for parental control in which the mouse of the
computer assumes an important role in restricting access to selected
sites.
Background of the Invention
The rapid expansion of the Internet has created a problem for parents
who wish to restrict access of their computer to certain types of Internet
sites.
The Internet has, on the one hand, increased the freedom of expression
by enabling Internet sites to offer material that essentially cannot be
controlled or censored, but on the other hand, it has created a problem in
that it is essentially impossible to control or limit access to specific types
of materials that are offered by Internet sites, particularly sites catering
to adults only. The term "Parental control" refers to the ability to control the Internet
content accessible via a specific computer. For example, there exist
programs for preventing sites that meet specific criteria from being
accessed by a specific computer. These programs are useful for those
who cannot supervise their computer all the time. Such programs could
be used for censorship, but also as tools to be used at the user's
discretion.
Some browsers, such as the Internet Explorer 5, provide a parental
control software. It helps the user to control the types of content that his
computer can access on the Internet. The user can adjust the types of
content other people can view, with or without his permission. He also
can override content settings on a case-by-case basis. Moreover, the user
can set up a list of Web sites that other people can never view,
regardless of how the sites' contents are rated, and set up a list of Web
sites always accessible, again regardless of content rating.
Cyber Patrol (www.cyberpatrol.com) is another Parental Control
program. Cyber Patrol controls access from any computer to the
Internet. Using this program, the access to the Internet can be restricted
at the client level. It is an Internet access management utility that also
manages application usage from a PC. It allows parents or teachers to manage computer use in their own household or classroom. Cyber Patrol
loads during start-up and runs in the background to control access to
applications or Internet sites.
In the above-mentioned examples, the Parental Control is subject to the
user's profile. Two or more levels are determined - the "parent" level,
and the "child" level (s). The parent can set up and alter the Internet
access to restricted sites. Although the default setup may be the "child"
level, the parent still has to be careful not to leave the computer
unattended in the "parent" level, and hence, operating according to this
Parent Control scheme is both inconvenient and inefficient. Some
Parental Control requires entering a password in order to operate in the
"parental mode", and this has its drawbacks, such as the need to
remember it, which is inconvenient. Furthermore, the password is
entered only once, and the checking as to the user's identity is not ,
continuous.
Another drawback is that sometimes the parent does not remember at
what level he left the computer unattended, and when passing nearby,
when his child uses the computer or even when the computer is off,
there is no clear indication for him at what level the computer is, or in
what level it will operate when next turned on. In another aspect, chatting by means of the Internet may cause
significant problems for children and their parents. A well known
problem is the abuse of children by adults via chatting. When these
adults are caught, they frequently claim that they did not know that
they were chatting with a child. Therefore, when the user of the
computer is a child, it is another object of the invention to send to
hischatting party a clear warning message that he is chatting with a
child. Then, if the adult abuses the child and is caught, he can no longer
claim that he didn't know the age of his chatting party.
It is therefore an object of the present invention to provide a method and
system for Parental Control, in which the user need not type the user-
name nor the password.
It is another object of the present invention to provide a method and
system for Parental Control, wherein access levels are predefined and
the suitable access level is selected automatically according to the one
currently using the computer.
It is a further object of the present invention to provide a method and
system for Parental Control, upon which the current user identity is easily distinguished.
It is still another object of the invention to provide a method and system
for Parental Control, upon which the control level is checked periodically
during the computer operation according to the user's identity.
It is a still further object of the present invention to provide a method
and system for parental Internet access control, upon which the parent
is provided with a clear indication external to the computer by which he
can determine in which Parental Control level the computer is active, or
moreover, even if the computer is off, he can determine which Parental
Control level is active.
It is a still further object of the present invention to provide a method
and system for parental Internet access control, suitable for operation by
children.
It is a still further object of the invention to provide a warning to an
adult chat partner that he is chatting with a child.
It is a still further object of the present invention to provide a noticeable
indication which restriction setup is used. It is a still further object of the invention to provide to a remote user,
communicating with the current user of the system, the exact age of the
current user.
Other objects and advantages of the invention will become apparent as
the description proceeds.
Summary of the Invention
The present invention relates to a method for carrying out Parental
Control when browsing the Internet by means of a computer, which
comprises: (a) Providing a Parental Control application; (b) Providing in
the parental control application several setups, each setup including
predefined restrictions for accessing Internet sites or Web pages; (c)
Providing at least two mouse components, each mouse component
having its unique ID; (d) Associating with each mouse component one or
more of the setups; (e) When operating the computer for browsing the
Internet, activating the Parental Control application; (f) Retrieving by
the application the ID of the mouse component connected; and (g)
Activating by the application the setup, associated with the ID of the
mouse component, thereby activating its corresponding Internet access
restrictions. According to one embodiment of the invention the Parental Control
application is a module of the Internet browser. According to another
embodiment of invention the Parental Control application is a module
separate from the Internet browser.
Preferably, the ID of the mouse component is a unique ID stored in a
memory storage within the mouse.
According to one embodiment of the invention the first of said at least
two mouse component is given to a parent, and a second is given to a
child. In that case, the setup associated with the ID of the parent mouse
component includes less restrictions than those in the setup of the child's
mouse, or null restrictions.
Preferably the mouse component is a mouse, wherein the parent's mouse
differs in shape and/or color from the child's mouse.
Preferably the differences in shape and/or color between the parent's
mouse and the child mouse are so significant as to be easily noticed even
from a considerable distance. Preferably, the ability to define the restrictions in the setups is
restricted, such as by the requirement to provide a password.
Preferably, the associating of setups to a mouse ID is restricted, such as
by the requirement to provide a password.
In order to increase the efficiency of the method of the invention, the
mouse of the parent should be kept in a safe place inaccessible to the
child when not in use.
The invention further relates to a system for carrying out parental
control which comprises a parental control application, and at least two
mouse components.
Preferably, the parental control application comprises several setups,
each setup including predefined restrictions for accessing Internet sites
or Web pages.
According to one embodiment of the invention, the mouse component
comprises an ID and the parental control application comprises software
means for retrieving said ID. In one embodiment of the invention the
mouse component is a mouse. Preferably, each mouse comprises a first plug to which a second plug in
the cable leading to the computer is connected, the first plug is located
within the case of the mouse. Alternatively, the first plug may be located
external to the mouse casing, several centimeters therefrom, a data
cable connecting between said first plug and the mouse.
Preferably, the method of the invention further comprises the steps of:
(a) Defining a "child" user according to the ID of the mouse component
he uses; (b) Determining when a chat session is activated by said
"child" user; and (c) Sending a message to the chat partner of said
"child" user to warn him that he is chatting with a child.
Preferably the system of the invention further comprises: (a) Means in
the parental application for defining a "child" user; (b) A warning
message for warning a chat partner that he is chatting with a child; (c)
A module within the parental application for determining when a chat
session is activated by the "child" user, and for sending the warning to
the chat partner when such session is found active.
According to one embodiment of the invention, the warning message
is a predefined message being an integral part of the parental control application. Preferably the warning message is a message which is
predefined by an adult user of the computer.
In another embodiment of the invention, when the mouse components
are at least one UIDMs connectable to the mouse system of the
computer, the method of the invention further comprises: (a) each UIDM
having its unique ID; (b) Associating with each UIDM one or more of the
setups; (c) When operating the computer for browsing the Internet,
activating the Parental Control application; (d) Retrieving by the
application the ID of the UIDM connected to the mouse of the computer;
and (e) Activating by the application the setup associated with the ID of
the UIDM, thereby activating its Internet access restrictions.
Preferably a UIDM is given to a parent, and said UIDM being
connected to the mouse only when the parent is working on the
computer, and removed at other times. Preferably, the most restricted
setup is activated when no UIDM is connected to the mouse.
According to one embodiment of the invention, the mouse system
further comprises a light indicator that lights when a UIDM is
connected to the mouse system or alternatively lights when a UIDM is
not connected to the mouse system. Preferably, the associating of setups to a UIDM ID is restricted, such
as by the requirement to provide a password.
Preferably the UIDM is connected by inserting it into a slot within the
mouse system. According to one embodiment of the invention, the
mouse system comprises a mouse connectable to the computer and a
slot, wherein the UIDM is connectable to said slot within the mouse.
According to another embodiment of the invention, the mouse system
comprises a mouse and an identification box connectable to the mouse
and computer, and the UIDM is connectable to a slot within the
identification box. According to a further embodiment of the
invention, the UIDM is connected by inserting it into a slot within a
mouse pad.
Preferably the system of the invention comprises a parental control
application, and at least one UIDM connectable to the mouse system
of the computer.
Preferably the UIDM comprises an ID and the parental control
application comprises software means for retrieving said ID. The invention further relates to a method for carrying out Security
Control when browsing the Internet by means of a computer, which
comprises: (a) Providing a Security Control application; (b) Providing
in the Security control application several setups, each setup
including predefined restrictions for accessing data from a computer;
(c) Providing at least one UIDM connectable to the mouse system of
the computer, each UIDM having its unique ID; (d) Associating with
each UIDM one or more of the setups; (e) When operating the
computer, activating said Security Control application; (f) Retrieving
by the application the ID of the UIDM connected to the mouse system
of the computer; and (g) Activating by the Security Application the
setup associated with the ID of the UIDM, thereby activating the
security restrictions associated with the UIDM.
Preferably different UIDMs are given to different users, and the
UIDM is connected to the mouse system only when the user is
working on the computer, and removed at other times.
The invention further relates to a system for carrying out security
control which comprises a security control application, and at least
one UIDM connectable to the mouse system of the computer.
Preferably the security control application comprises several setups, each setup including predefined restrictions for accessing data from
the computer.
Preferably the UIDM comprises an ID and the security control
application comprises software means for retrieving the ID.
Preferably the age of the user is recorded within the mouse
component, which can be retrieved from the mouse component by a
remote application with which the user is remotely connected.
Brief Description of the Drawings
Fig. 1 illustrates in block diagram form the structure of a Parental
Control system, according to the prior art;
Fig. 2 illustrates in block diagram form the components of a
Parental Control system, according to one embodiment of the invention;
Fig. 3 illustrates a mouse controlling system, according to one
embodiment of the invention;
Fig. 4 illustrates a mouse designed for children, according to one embodiment of the invention;
Fig. 5 is a flow diagram illustrating a process for defining a setup in
a Parental Control application, according to one embodiment of the
invention;
Fig. 6 schematically illustrates a high level flowchart of a process for
initiating a Parental Control scheme, according to one embodiment of
the invention;
Fig. 7 illustrates a GUI form for defining the Parental control
scheme, according to one embodiment of the invention;
Figs. 8a and 8b illustrate a mouse that comprises a socket according
to one embodiment of the invention;
Fig. 9 is a flow diagram describing a process for warning a chat
partner that he is chatting with a child;
Fig. 10 illustrates a mouse comprising one electronic card, on which
the ID is stored within its circuitry, according to one embodiment of the
present invention;
Fig. 11 illustrates a circuit for indicating the presence of the parental
UIDM in a mouse, according to one embodiment of the invention;
Fig. 12 schematically illustrates an "identification" box, according to one embodiment of the invention;
Fig. 13 schematically illustrates in a flowchart form an age
verification sequence, according to one embodiment of the invention; and
Fig. 14 schematically illustrates a mouse pad with UIDM reading
capability, according to another embodiment of the invention.
Detailed Description of Preferred Embodiments
In order to facilitate the reading of the description to follows, a number
of terms employed in the art are defined below:
USB (Universal Serial Bus) is a "plug and play" interface between
computer and add-on devices (such as audio players, joysticks,
keyboards, telephones, scanners, and printers). With USB, a new device
can be added to a host computer without having to add an adapter card
or even having to turn the computer off. The USB peripheral bus
standard was developed by Compaq, IBM, DEC, Intel, Microsoft, NEC,
and Northern Telecom and the technology is available without charge
for all computer and device vendors.
A UART is the microchip with programming that controls a
computer's interface to its attached serial devices. Specifically, it
provides the computer with the RS-232C Data Terminal Equipment (Data Terminal Equipment) interface so that it can "talk" to and
exchange data with modems and other serial devices.
RS-232C is a long-established standard ("C" is the current version)
that describes the physical interface and protocol for relatively low-speed
serial data communication between computers and related devices.
A GUI (Graphical User Interface) is used to refer to software
applications that are easier to use than their text-based predecessors.
GUI programs use icons, toolbars, taskbars and other friendly, point-
and-click functions.
A SIM (Subscriber Identity Module) is a card inserted into GSM
phones that contains the telephone account information of a user. It
lets a user to use a borrowed or rented GSM phone as if it were your
own. According to the invention, a card similar to the SIM is used,
said card is connected to the mouse of the computer.
In order to prevent forbidden Web pages from being accessed by the
user, prior art Parental Control programs implement "filtering"
methods. Some of the filtering methods used in the art are: Checking the content of a Web page: Prior to the presentation of a
Web page by the Web browser, the browser searches for forbidden
predefined words and their synonyms in the Web page. Whenever such
words are detected, in which Web page the browser does not display the
Web page. The words can be searched in the Web address, as well.
Web search: Whenever a user carries out a Web search, the browser
may add some conditions, such that the Web search will not find the
Web sites containing forbidden words. For example, when searching for
Web sites according to the keyword "MONIE", the browser may alter the
searching string "MONIE" to "(MONIE) AND NOT (SEX) AND NOT
(XXX)", wherein XXX indicates any one or more forbidden words.
Restriction of Web addresses: The access to predefined Web
addresses may be restricted. For example, if the parent wishes to
restrict the access to the Web address (www.hardcore.com), then
whenever the browser tries to access this Web address or its derivatives
(such as www.hardcore.com/couples.htm), the browser displays a
message indicating that the access to this URL (Uniform Resource
Location, i.e. a Web address) is forbidden.
Fig. 1 schematically illustrates in block diagram form the structure of a
Parental Control system, according to the prior art. The components are:
A list of categories 30. The categories may define a control level, such as "Sex", "Nudity", etc. Each category is comprised of a list of keywords
10, comprising words the presence of which in a Web page or address
indicates that the Web page should not be displayed; a list of Web sites
20, comprising forbidden Web sites; and a list of ratings 80. The
predetermined rating in the list is compared with the rating as given to
the site and accordingly access and display of pages may be allowed or
not. Any other restricting rules 90 may exist. The user can establish a
predetermined setup as provided by the browser, and can add and alter
any setup according to his wish.
Optionally, the access to the Parental Control setup can be restricted
or not by a password 40.
Fig. 2 schematically illustrates a block diagram of the components in the
Parental Control system, according to one embodiment of the invention.
In addition to the components described in Fig. 1, the system includes
the mouse 50 of the computer that comprises an ID retrievable by the
computer to which it is attached. The retrieval of the ID is carried out by
means of interface 100. Preferably, in addition to the ID, specific mouse
types are given specific color and shapes, according to the age of the
user. The system comprises also a list of IDs 60, and a specific
combination of parameters from the lists 10, 20 and 30, that is associated with each of the IDs. Each combination can be defined
generally by the parent using the computer and is called herein a
"setup".
The interface 100 may be a part of a Parental Control software, or a
separate module. One of its operations is to retrieve an ID from the
mouse. It is recommended that the retrieval be carried out periodically,
in order to set or change the parental control level upon the replacement
of the mouse attached to the computer system.
The parents should keep their mouse in a safe place away from the
children. According to the invention, different mouse types are given to
different users. For example, in one family there may exist two mouses,
one for the parents, and another for the children. The mouse of the
parents should have a different ID and preferably different shape and
color than the mouse of the children.
The ID of the mouse is used for identifying the user. Hence, the profile
(setup) of the current user is associated with the ID of the mouse.
Whenever the attached mouse does not comprise an ID, or the ID is not
familiar to the Parental Control system of the invention, the most
restricted categories (or setup) are activated. Using a mouse as identification means results in some benefits as
compared to the prior art:
No password with the attendant inconveniences is required;
Forgetting a password is more probable than losing a mouse;
Parental Control restrictions are activated even upon leaving the
computer unattended, according to the type of mouse connected to the
computer;
The active Parental configuration can be ascertained by a glance,
since it is associated with a certain mouse, usually one distinctly
different in shape and/or color from others. For example, as the mouse
of the child is made in a specific shape and color, the parent can easily
determine what Parental Control level is activated.
According to the prior art, the- PC mouse controlling system has the
following parts: Sensors, mouse controller, communication link,
interface, and driver. Sensors are the movement detectors that sense the
mouse movement and button switches, which sense the button states.
The mouse controller within the mouse reads the state of those sensors
and takes account of current mouse position. When this information
changes the mouse controller sends a packet of data to the computer
interface via the mouse driver. The mouse driver receives that data packet and decodes the information
from it and acts according to the information. Typically, the mouse
driver conveys information regarding the mouse position and button
states, and provides it to the application. Typically, the mouse driver
calls mouse cursor moving routines when the mouse is moved and sends
messages to the software when buttons are pressed.
According to an embodiment of the invention, the ID of the mouse is
periodically retrieved by interface 100.
Fig. 3 schematically illustrates a mouse controlling system, according to
one embodiment of the invention. Mouse 50 is connected to the computer
110 by the serial interface 112 (such as RS-232C). The communication is
carried out by two transmitting chips (such as UARTs) 111 (on the
computer side) and 51 (on the mouse side). The transmitting chip 51 can
receive input from the sensors 53 or from the ID storage means 52.
According to another embodiment of the invention, the ID may be
conveyed to the application by means of USB, when such option exists in
the computer.
There are several options for conveying the ID from the mouse to the computer. According to a first option, the ID may be conveyed upon
retrieving the call from the Parental Control application. According to a
second option, the ID is conveyed periodically. According to a third
option, the ID is conveyed to the computer any time that the mouse is
moved, in addition to the displacement information.
The parental control can be implemented as a software module/utility or
as a part of the Web browser. The programming environment of the
browser "Internet Explorer 5" provides functions for controlling and
monitoring the browser's operation. Using such software means enables
development of a separate software application that can "hook" Web
pages before their presentation. A more sophisticated application can
filter not only Web pages, but also any other Web service, such as FTP
(File Transfer Protocol) and e-mail.
Fig. 4 illustrates a mouse designed for a child, according to one
embodiment of the invention. Due to its special design and/or color, a
parent can note at a glance if the active Parental Control setup is the
"parent" setup or a "child" setup. As said, it is preferable that the mouse
of the child be different in shape and/or color from the mouse of the
parent's mouse. Fig. 5 is a flow diagram illustrating a process for defining the setup for a
parent/child scheme in a Parental Control application, according to one
embodiment of the invention.
At step 201, the process starts, by executing the setup program/
utility.
At 202, if the "parent" has already been defined, the process
continues with step 205, otherwise, step 203.
At 203, the user is told (by the program/utility) to attach the parent's
mouse. The user attaches the parent's mouse to the computer.
At 204, the software retrieves the ID of the parent's mouse and saves
it in a memory location.
At 205, the user is asked to attach the child's mouse to the computer.
At 206, the ID of the child's mouse is retrieved by the program/
utility and saved.
At 207, the user is asked to define the setup to be associated with the
ID of child's mouse as saved in step 206.
At 208, the user is asked if he wishes to define the setup associated
with an additional mouse. If the answer is 'Υes", the process returns to
step 205. If however the answer is "No", the process continues with step
209, where the process for defining mouse setups ends. A specific setup is thus associated with each specific mouse, and
therefore the Parental Control application "knows" which setup to
activate, according to the connected mouse.
Since a mouse can be lost or even broken, a password may be used as a
substitute for the ID of the mouse of the parent. Of course, the password
can be used as an additional security means.
Fig. 6 is a flow diagram illustrating a process of Parental Control,
according to one embodiment of the invention. It should be noted that
upon turning on the computer, the Parental Control application is
activated automatically, and it works in the background as long as the
computer is on, or at least as long as the browser is on. Those skilled in
the art will appreciate that there are a variety of ways to invoke the
Parental Control application.
At 101, the process starts.
At 102, the ID of the mouse is retrieved.
At 103, the retrieved ID is compared with the list of IDs as saved in
the Parental Control application.
At 104, if the ID is determined to be on said list, the process continues
to step 105, in which the setup associated with that ID is activated.
Otherwise, if the ID is not found in said list, the process continues with step 106, where the Parental Control application activates all the
restrictions defined in all the various setups.
At 107, the process ends.
It should be noted that the process illustrated in Fig. 6 is performed
periodically, for example, every 1 to 3 minutes.
Fig. 7 schematically illustrates an exemplary GUI form for defining the
Parental Control scheme, according to an embodiment of the invention.
Entry to the GUI form is restricted by a password (not shown) or
presence of the parent's mouse, enabling access only to the parent.
Two levels of operation may be defined: The Parent level and the Child
level. Selecting the Parent level is carried out by clicking the radio
button 301, and selecting the Child level is carried out by clicking the
radio button 302. This way, more than one mouse can be set to operate
in the Parent level.
The keywords upon which a Web page is deemed forbidden are included
in box 308, and may be edited by the user. The forbidden Web sites are
included in box 308, and may also be edited by the user. Whenever the user wishes to define the setup of a mouse, he attaches
the mouse to the computer, and clicks on button 304. As a result, the ID
of the mouse appears on text box 303. If the mouse ID was already
defined, then its associated keywords and Web sites are loaded and
shown in text boxes 308 and 307, so he may alter the content.
Upon clicking the OK button 305, the altered setup is stored. Upon
clicking the Cancel button 306, the system returns the old definitions
associated with the attached ID of the mouse.
Those skilled in the art will appreciate that there are many variations to
a GUI for defining and altering the setup. For example, in order to help
a parent set up the Parental Control parameters, software for Parental
Control may comprise some predefined setups, such as those existing in
Internet Explorer 5. The parent may select one of the predefined setups,
and alter the parameters according to his preferences.
In another aspect, the act of chatting by means of the Internet has
created a significant problem to parents. There are many reported cases
of child abuse by adults using Internet chat lines. Afterwards, when
such an abuser is caught, in many cases he claims that while chatting
he was unaware that hispartner was underage. The present invention provides a solution to this problem. Fig. 9 shows a block diagram
illustrating this solution. Blocks in this scheme, which are identical to
blocks in Fig. 6 and have a same numeric indication, perform essentially
the same function. As previously discussed, the invention provides
means for the parental control application to know anytime whether an
adult or a child is working on the computer (according to the ID of the
mouse that is connected to the computer), Furthermore, means for
determining when a chat session is active over the computer are within
the scope of those who are skilled in the art of Internet programming.
In the flow diagram of Fig. 9, if the ID of the mouse is found to be of a
child (block 137), or if the ID is found to be unknown to the parental
control application (and therefore in block 106 all restrictions are
activated), a check is made to verify when a chat session is activated. In
said two cases the application assumes that a child operates the
computer, and it automatically sends a message to the other chat
partner to warn him that he is chatting with a child. An example for
such a message may be: "THIS IS A MESSAGE FROM THE
PARENTAL CONTROL APPLICATION OF YOUR CHATTING
PARTNER: YOU ARE WARNED THAT YOUR CHATTING PARTNER
IS A CHILD, AND ARE THERFORE ADVISED TO BEHAVE
ACCORDINGLY.". Therefore, if the chatting partner does not respect this warning, and he abuses the child chatting with him, if and when he
is caught he will be unable to claim that he was not aware that he was
chatting with a child.
Two types of chat types are currently known. A first chat type is a stand
alone program, such as MIRC. A second chat type includes those chat
sessions which are activated directly from Internet sites. It is of course
necessary for the application to determine if and when a chat session is
active, and accordingly send a message (if the user of the computer is a
child). As said, it is within the skill of those who are familiar with
Internet programming to know whether a chat session is active. If the
chat program is a stand alone local application, which is activated from
the local computer of the user, the task is easier, as this chat application
may be predefined or introduced to the parental control application to
follow up when it is activated. For chat sessions, which are activated
from HTML pages of Internet sites, the task is slightly more
complicated, but still possible. A first sign that should be checked and is
characteristic to such chat session is whether Java Applets are active.
Furthermore, chat sessions have other typical characteristics, such as
the rate of the transfer of characters between the session partners etc.
Those who are skilled in the art may find and apply other characteristics
of chat sessions, for determining whether or when a chat session is active.
Currently, attaching a mouse to a personal computer is carried out via a
socket at the rear of the computer. When implementing the present
invention, the mouse is likely to be plugged in and out more often than
is usually the case in standard computer operations. Since approaching
the rear side of the computer is inconvenient, preferably according to the
invention, the mouse is designed to include a socket for its cable, in
addition or in substitute to the socket on rear entry.
Figs. 8a and 8b illustrate a mouse that comprises a socket 60 according
to a preferred embodiment of the invention. The data cable 70, upon
which the information is passed from mouse 50 to the computer, can be
plugged in and pulled out from the socket 60 of the mouse 50. In this
way, switching from one mouse to another becomes an easy procedure.
In the regular form, the cable 70 is a part of mouse 50.
In the above embodiments, the mouse is used as an identification
means. Hence, the parent should keep his mouse in a safe place in order
to prevent the child from accessing predefined types of Internet sites.
Due to the size of the mouse, it is not practical to carry it in a pocket but
preferable to store it in a safe place, such as a locked drawer. According to still another embodiment of the invention, a small portable
and replaceable device is provided on which the ID of the mouse is
stored. Using such a replaceable device may eliminate the need to hold
the mouse in a safe place and the need to install a new mouse whenever
the parent or child operates the computer.
Fig. 10 schematically illustrates a mouse 50 of the invention, comprising
a card 61, on which the ID is stored within its circuitry, according to an
embodiment of the present invention. The electronic card 61 is installed
into mouse 50 by plugging it in socket 62.
According to this embodiment of the invention, a dedicated card 61 is
provided at least to the parent with a specific ID on it, different than the
ID of the child.
Upon checking the current ID of the mouse, the mouse's circuitry reads
the ID from the electronic card 61, and conveys it to the host computer
(via the means that connect the mouse with the host computer), as
described above.
While the mouse 50 is too big to be stored in a wallet, the electronic card 61 is small, and therefore suitable for stowing in a wallet, pocket, and so
forth, and its presence does not bother the parent.
Preferably, the mouse further comprises an indicator 63, which lights or
blinks whenever the card 61 of the parent is installed into the mouse
alerting the parent that the parent less restricted setup is active. Of
course other operation schemes can be implemented, such as a red color
whenever the parent's ID is indicated, and a green color whenever the
parent's ID is not installed, and so forth.
Those skilled in the art will appreciate that there is a variety of ways of
embedding an ID in an electronic card. One familiar way is a SIM
(Subscriber Identity Module), such as the SIM used in mobile
telephones. Hereinafter when the term UIDM (User ID Module) is used,
it should be noted that it refers to any type of a card containing memory
storing an ID, similar to a SIM card.
Fig. 11 illustrates a circuit for indicating the presence of the parental ID
in a mouse, according to one embodiment of the invention. Upon
inserting the electronic card 61 into the mouse, switch 64 is pressed, and
the circuit 65 is closing. The power 66, which its source is from the
computer, turns on the led 63, upon which the parent is able to notice that the setup of the parent is active.
It should be noted that there may exist two types of cases:
1. If the mouse includes an integrated ID in it, the insertion of the card
(UIDM) causes overlap of the mouse ID so that the ID of the card will be
read by the computer, however only the ID of the card will be read by
the computer.
2. In another alternative both the ID of the mouse and the ID of the
card when inserted will be read by the computer, however only the ID if
the card will indicate to the setup who is using the computer, and what
restrictions to apply.
According to still another embodiment of the present invention the
system including a UIDM card insertable to the mouse of the computer,
together with its associated setup can be used to restrict a user from
accessing various applications or data, may it be local (i.e., within the
PC of the user, or remote (e.g., over the local network or over the
Internet). More particularly, the system with a minor modification can
also be used as a security means, when UIDMs with personal IDs are
distributed to different users. For example, since a computer may comprise important material to the
parent, some operations such as deletion or accessing files may be
restricted to the case when the parent's ID is inserted in the mouse
system.
Fig. 12 schematically illustrates an "identification" box, according to one
embodiment of the invention. The "identification" box 80 is inserted
between the mouse 50 and computer 110. The identification box 80
comprises a connector 88, which connects the identification box 80 to the
computer 110.
The connection between the mouse and the identification box is carried
out by the connector 58 of the mouse and the connector 89 of the
identification box. The connection between the identification box 80 and
the computer is carried out by the connector 88 of the identification box
and the connector 119 of the computer 110. The connectors are of the
types PS/2 or USB.
The Identification box deals with the common protocols of connecting a
mouse to a computer system, PS/2 and USB. These protocols use 4 wires
to connect the mouse to the computer:
The VCC and GND, which are used for the power source to the ouse;
The +D and -D or SDATA and SCLCK, which are used for conveying
data between the mouse and the computer, including acknowledgments
and control.
The identification box enables to the connected mouse to operate
"transparently", i.e. the mouse and the hosting computer are operating
like no identification box was connected to the system.
The identification 80 box comprises a socket for inserting the ID card 61.
In addition, the identification box is able to read or write the content of
the ID card 61. Those skilled in the art will appreciate that currently the
use UIDM- writers is very common.
By the microcontroller 82, the identification box 80 intercepts data
transferred between the mouse and the hosting computer, and interferes
whenever it is needed. Moreover, the software element 100 (as seen in
Fig. 2) can communicate with the microcontroller 82.
Typically, the microcontroller periodically checks the presence of the ID
card 61, and if the card is not present or the ID is not the parent's ID,
the software element 100 forces the most severe restrictions, according to the Parental Control setup.
The benefits of using the identification box over the socket inside the
mouse is:
The user (parent or child) is not limited to the mouse with the socket,
but can use any type of mouse;
Since the identification box can alter the content of the ID card, a
plurality of ID cards can be issued (usually by the parent), each of which
with a different Parental Control scheme.
According to another embodiment of the invention, the age of the user is
recorded in the UIDM. The recorded age is used to approve/disapprove
activities with remote users, such as while shopping in the Internet,
entering into adults chat etc. Fig. 13 schematically illustrates in a
flowchart form an age based approval/disapproval sequence. The
flowchart starts at block 131, wherein the user age is recorded into the
user's UIDM 61 and then the UIDM 61 is stored in the user's mouse. At
the next step, block 132, whenever a user is trying to perform an activity
with a remote user, a checking is made by the application of said remote
user or by the local application the age stored in the UIDM 61. At the
next step, block 133, the age of the user is checked or compared with a
required threshold age for performing the activity or not, as is defined. If however, the age is above the threshold, then at the next step, block 135,
the activity is approved. If the age is below the threshold, then the
activity is disproved (block 134). For example, adults sites may be forced
to check the age of the user, as recorded on its UIDM 61, and if the age
is found below a threshold age (e.g., below 21), the activity is
terminated.
It should be noted that registration of the age on the UIDM 61 should be
restricted only to authorized people that register the age only after
restriction. For example, only the dealer who sells the UIDM may be
allowed to register the age. Moreover, the age may be registered only by
using a suitable encrypted system.
In similar manner, the age of the mouse user is recorded within the
"identification" box 80 (shown in Fig. 12) or within the personal mouse of
the user.
In still another embodiment of the invention, the UIDM 61 is inserted
into a slot within the mouse pad having UIDM reading capability. For
example, Fig. 14 illustrates a mouse pad 141 with UIDM reading
capability. UIDM 61 is inserted into UIDM slot 142. The mouse pad is
connected by cable 143 to the computer. Cable 143 can use any suitable connection protocol, such as USB, PS/2 etc.
While some embodiments of the invention have been described by way of
illustration, it will be apparent that the invention can be carried into
practice with many modifications, variations and adaptations, and with
the use of numerous equivalents or alternative solutions that are within
the scope of persons skilled in the art, without departing from the spirit
of the invention or exceeding the scope of the claims.

Claims

1. A method for carrying out Parental Control when browsing the
Internet by means of a computer, comprising:
a) Providing a Parental Control application;
b) Providing in said parental control application several setups,
each setup including predefined restrictions for accessing
Internet sites or Web pages;
c) Providing at least two mouse components, each mouse
component having its unique ID;
d) Associating with each mouse component one or more of said
setups;
e) When operating the computer for browsing the Internet,
activating said Parental Control application;
f) Retrieving by said application the ID of the mouse component
connected; and
g) Activating by said application the setup associated with the ID
of said mouse component, thereby activating its corresponding
Internet access restrictions.
2. A method according to claim 1, wherein the Parental Control
application is a module of the Internet browser.
3. A method according to claim 1, wherein the Parental Control
application is a module separate from the Internet browser.
4. A method according to claim 1, wherein the ID of the mouse
component is a unique ID stored in a memory storage within the mouse.
5. A method according to claim 1, wherein a first of said at least two
mouse component is given to a parent, and a second is given to a child.
6. A method according to claim 5, wherein the setup associated with the
ID of the parent mouse component includes less restrictions than those
in the setup of the child's mouse, or null restrictions.
7. A method according to claim 1, wherein the mouse component is a
mouse.
8. A method according to claim 7, wherein the parent's mouse differs in
shape and/or color from the child's mouse.
9. A method according to claim -8, wherein the differences in shape
and/or color between the parent's mouse and the child mouse are so
significant as to be easily noticed even from a considerable distance.
10. A method according to claim 1, wherein the ability to define the
restrictions in the setups is restricted.
11. A method according to claim 1, wherein defining the restrictions in
the setups is restricted by a password.
12. A method according to claim 1, wherein associating of setups to a
mouse ID is restricted.
13. A method according to claim 1, wherein associating setups to a
mouse ID is restricted by a password.
14. A method according to claim 1, wherein the mouse component of the
parent is kept in a safe place inaccessible to the child, when not in use.
15. A system for carrying out parental control which comprises a
parental control application, and at least two mouse components.
16. A system according to claim 15, wherein the parental control
application comprises several setups, each setup including predefined
restrictions for accessing Internet sites or Web pages.
17. A system according to claim 16, wherein the mouse component
comprises an ID and the parental control application comprises software
means for retrieving said ID.
18. A system according to claim 15, wherein the mouse component is a
' mouse.
19. A system according to claim 16, wherein each mouse comprises a first
plug to which a second plug in the cable leading to the computer is
connected.
20. A system according to claim 17, wherein said first plug is located
within the case of the mouse.
21. A system according to claim 18, wherein said first plug is located
external to the mouse casing, several centimeters therefrom, a data
cable connecting between said first plug and the mouse.
22. A method according to claim 1, further comprising the steps of:
a) Defining a "child" user according to the ID of the mouse
component he uses; b) Determining when a chat session is activated by said "child"
user; and
c) Sending a message to the chat partner of said "child" user to
warn him that he is chatting with a child.
23. A system according to claim 17, further comprising:
a) Means in said parental application for defining a "child" user;
b) A warning message for warning a chat partner that he is
chatting with a child.
c) A module within said parental application for determining
when a chat session is activated by said "child" user, and for
sending said warning to said chat partner when such session is
found active.
24. A system according to claim 23, wherein the warning message is a
predefined message being an integral part of the parental control
application.
25. A system according to claim 23, wherein the warning message is a
message which is predefined by an adult user of the computer.
26. A method according to claim 1, wherein: a) the mouse components are at least one UIDMs connectable to
the mouse system of the computer, each UIDM having its
unique ID;
b) Associating with each UIDM one or more of the setups;
c) When operating the computer for browsing the Internet,
activating said Parental Control application;
d) Retrieving by said application the ID of the UIDM connected
to the mouse of the computer; and
e) Activating by said application the setup associated with the ID
of said UIDM, thereby activating its ' Internet access
restrictions.
27. A method according to claim 26, wherein the Parental Control
application is a module of the Internet browser.
28. A method according to claim 26, wherein the Parental Control
application is a module separate from the Internet browser.
29. A method according to claim 26, wherein the ID of the UIDM is a
unique ID stored in a memory storage within the UIDM.
30. A method according to claim 26, wherein a UIDM is given to a
parent, and the UIDM is connected to the mouse only when the parent is
working on the computer, and removed at other times.
31. A method according to claim 30, wherein the setup associated with
the ID of the parent UIDM includes less restrictions than those in the
setup of a child's UIDM, or null restriction.
32. . A method according to claim 30, wherein the most restricted setup is
activated when no UIDM is connected to the mouse.
33. A method according to claim 32, wherein the mouse system further
comprises a light indicator that lights when a UIDM is connected to the
mouse system or alternatively lights when a UIDM is not connected to
the mouse system.
34. A method according to claim 26, wherein the ability to define the
restrictions in the setups is restricted.
35. A method according to claim 26, wherein defining the restrictions in
the setups is restricted by a password.
36. A method according to claim 26, wherein the associating of setups to
a UIDM ID is restricted.
37. A method according to claim 26, wherein associating setups to a
UIDM ID is restricted by a password.
38. A method according to claim 31 wherein the UIDM of the parent is
kept in a safe place inaccessible to the child, when not in use.
39. A method according to claim 26, wherein the UIDM is connected by
inserting it into a slot within the mouse system.
40. A method according to claim 26, wherein the mouse system
comprises a mouse connectable to the computer and a slot, wherein the
UIDM is connectable to a slot within the mouse.
41. A method according to claim 26, wherein the mouse system
comprises a mouse and an identification box connectable to said mouse
and computer, and wherein the UIDM is connectable to a slot within
said identification box.
42. A method according to claim 26, wherein the UIDM is connected by re¬
inserting it into a slot within a mouse pad.
43. A system for carrying out parental control which comprises a
parental control application, and at least one UIDM connectable to the
mouse system of the computer.
44. A system according to claim 43, wherein the parental control
application comprises several setups, each setup including predefined
restrictions for accessing Internet sites or Web pages.
45. A system according to claim 43, wherein the UIDM comprises an ID
and the parental control application comprises software means for
retrieving said ID.
46. A method for carrying out Security Control when browsing the
Internet by means of a computer, comprising:
a) Providing a Security Control application;
b) Providing in said Security control application several setups,
each setup including predefined restrictions for accessing data
from a computer;
c) Providing at least one UIDM connectable to the mouse system
of the computer, each UIDM having its unique ID; d) Associating with each UIDM one or more of said setups;
e) When operating the computer, activating said Security Control
application;
f) Retrieving by said application the ID of the UIDM connected
to the mouse system of the computer; and
g) Activating by said Security Application the setup associated
with the ID of said UIDM, thereby activating the security
restrictions associated with said UIDM.
47. A method according to claim 46, wherein the ID of the UIDM is a
unique ID stored in memory storage within the UIDM.
48. A method according to claim 46, wherein different UIDMs are given
to different users, and the UIDM is connected to the mouse system only
when the user is working on the computer, and removed at other times.
49. A method according to claim 46, wherein the mouse system further
comprises a light indicator that lights when a UIDM is connected to the
mouse system or alternatively lights when a UIDM is not connected to
the mouse system.
50. A method according to claim 47, wherein the ability to define the restrictions in the setups is restricted.
51. A method according to claim 46, wherein defining the restrictions in
the setups is restricted by a password.
52. A method according to claim 46, wherein associating of setups to a
UIDM ID is restricted.
53. A method according to claim 46, wherein associating setups to a
UIDM ID is restricted by a password.
54. A method according to claim 46 wherein the UIDM of the computer
user is kept in a safe place inaccessible to other, when not in use.
55. A method according to claim 46, wherein the UIDM is connected by
inserting it into the slot within the mouse system.
56. A system for carrying out security control which comprises a security
control application, and at least one UIDM connectable to the mouse
system of the computer.
57. A system according to claim 56, wherein the security control application comprises several setups, each setup including predefined
restrictions for accessing data from said computer.
58. A system according to claim 56, wherein the UIDM comprises an ID
and the security control application comprises software means for
retrieving said ID.
59. A system according to claim 56, wherein the mouse system comprises
a mouse connectable to the computer and a slot wherein the UIDM is
connectable to a slot within the mouse.
60. A system according to claim 56, wherein the mouse system comprises
a mouse connectable to the computer and a slot wherein the UIDM is
connectable to a slot within the mouse pad.
61. A system according to claim 56, wherein the mouse system comprises
a mouse and an identification box connectable to said mouse and
computer, and wherein the UIDM is connectable to a slot within the
mouse.
62. A method according to claim 1, wherein the age of the user is
recorded within the mouse component, which can be retrieved from the ouse component by a remote application with which the user is
remotely connected.
PCT/IL2001/001212 2000-12-28 2001-12-27 Method and system for parental internet control WO2002054200A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/451,855 US20040051733A1 (en) 2000-12-28 2001-12-17 Method and system for parental internet control
EP01272791A EP1374008A2 (en) 2000-12-28 2001-12-27 Method and system for parental internet control

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IL14062400A IL140624A (en) 2000-12-28 2000-12-28 Method and system for parental internet control
IL140624 2000-12-28
IL143777 2001-06-14
IL14377701A IL143777A (en) 2000-12-28 2001-06-14 Method and system for parental internet control

Publications (2)

Publication Number Publication Date
WO2002054200A2 true WO2002054200A2 (en) 2002-07-11
WO2002054200A3 WO2002054200A3 (en) 2003-10-23

Family

ID=26323998

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2001/001212 WO2002054200A2 (en) 2000-12-28 2001-12-27 Method and system for parental internet control

Country Status (2)

Country Link
EP (1) EP1374008A2 (en)
WO (1) WO2002054200A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005122557A1 (en) * 2004-06-04 2005-12-22 Thomson Licensing Method and apparatus for controlling an apparatus having a parental control function
EP1678596A2 (en) * 2003-10-31 2006-07-12 Siemens Aktiengesellschaft Intuitive and secure control of operational inputs in software components
GB2470564A (en) * 2009-05-26 2010-12-01 Integrite Internat Ltd Parental control for internet using memory device
US7869790B2 (en) 2004-09-24 2011-01-11 Scenera Technologies, Llc Policy-based controls for wireless cameras
US8145241B2 (en) 2005-06-30 2012-03-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000025196A1 (en) * 1998-10-27 2000-05-04 Glaser Lawerence F Computer pointing device having theme identification means
US6070796A (en) * 1995-08-21 2000-06-06 Sirbu; Cornel Conditional access method and device
WO2000051035A1 (en) * 1999-02-24 2000-08-31 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070796A (en) * 1995-08-21 2000-06-06 Sirbu; Cornel Conditional access method and device
WO2000025196A1 (en) * 1998-10-27 2000-05-04 Glaser Lawerence F Computer pointing device having theme identification means
WO2000051035A1 (en) * 1999-02-24 2000-08-31 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1678596A2 (en) * 2003-10-31 2006-07-12 Siemens Aktiengesellschaft Intuitive and secure control of operational inputs in software components
US7437337B2 (en) 2003-10-31 2008-10-14 Siemens Aktiengesellschaft Intuitive and reliable control of operator inputs in software components
WO2005122557A1 (en) * 2004-06-04 2005-12-22 Thomson Licensing Method and apparatus for controlling an apparatus having a parental control function
US8225345B2 (en) 2004-06-04 2012-07-17 Thomson Licensing Method and apparatus for controlling an apparatus having a parental control function
US7869790B2 (en) 2004-09-24 2011-01-11 Scenera Technologies, Llc Policy-based controls for wireless cameras
US8238879B2 (en) 2004-09-24 2012-08-07 Armstrong, Quinton Co. LLC Policy-based controls for wireless cameras
US8660534B2 (en) 2004-09-24 2014-02-25 Armstrong, Quinton Co. LLC Policy based controls for wireless cameras
US8145241B2 (en) 2005-06-30 2012-03-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
US8738029B2 (en) 2005-06-30 2014-05-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
GB2470564A (en) * 2009-05-26 2010-12-01 Integrite Internat Ltd Parental control for internet using memory device

Also Published As

Publication number Publication date
WO2002054200A3 (en) 2003-10-23
EP1374008A2 (en) 2004-01-02

Similar Documents

Publication Publication Date Title
US20040051733A1 (en) Method and system for parental internet control
US6208995B1 (en) Web browser download of bookmark set
JP3313077B2 (en) Method and system for accessing the Internet using a bookmark set
US6041360A (en) Web browser support for dynamic update of bookmarks
US20010021950A1 (en) Method and apparatus for controlling access to a computer network using tangible media
US7711854B2 (en) Retrieving documents over a network with a wireless communication device
MXPA03005801A (en) Content filtering for web browsing.
GB2381902A (en) Bookmark managing system and bookmark managing method
US20110252085A1 (en) Communication system, server device, display device, information processing method, and program
US20030080996A1 (en) Software for a navigation control unit for use with a wireless computer resource access device and associated system
AU2003247421A1 (en) System and method for providing a digital rights scheme for browser downloads
JP4617384B2 (en) Content access control from information transmission media playback device
CN106162805A (en) The connection control method of WIFI hot spot service and device
WO2012070348A1 (en) Server system, method for executing server system, and external memory
WO2002054200A2 (en) Method and system for parental internet control
JP4592369B2 (en) Service providing server
US20040054754A1 (en) System and method for automatic internet access
US20020004909A1 (en) ID information management system and method
KR20010094875A (en) System for controlling a personal information
GB2333617A (en) Bookmark set facilitates navigation in an electronic commerce related Web site
KR100292066B1 (en) Method for controlling searching information in the internet circumstance
KR20050052949A (en) System and method for providing log service with memory card
JP2002259178A (en) Information sharing system
KR100514451B1 (en) Management system for accessing WEB pages
JP5913275B2 (en) Information protection terminal, information protection method, information protection terminal program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 10451855

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2001272791

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2001272791

Country of ref document: EP

NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP

WWW Wipo information: withdrawn in national office

Ref document number: 2001272791

Country of ref document: EP