EP1374008A2 - Verfahren und system zur internet-kindersicherung - Google Patents

Verfahren und system zur internet-kindersicherung

Info

Publication number
EP1374008A2
EP1374008A2 EP01272791A EP01272791A EP1374008A2 EP 1374008 A2 EP1374008 A2 EP 1374008A2 EP 01272791 A EP01272791 A EP 01272791A EP 01272791 A EP01272791 A EP 01272791A EP 1374008 A2 EP1374008 A2 EP 1374008A2
Authority
EP
European Patent Office
Prior art keywords
mouse
uidm
computer
setups
parental control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01272791A
Other languages
English (en)
French (fr)
Inventor
David Katzir
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from IL14062400A external-priority patent/IL140624A/xx
Application filed by Individual filed Critical Individual
Publication of EP1374008A2 publication Critical patent/EP1374008A2/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the invention relates to a method and system for providing parental
  • the invention relates to control over use of the Internet. More particularly, the invention relates
  • the Internet has, on the one hand, increased the freedom of expression
  • Parental control refers to the ability to control the Internet
  • Some browsers such as the Internet Explorer 5, provide a parental
  • control software It helps the user to control the types of content that his
  • the computer can access on the Internet.
  • the user can adjust the types of
  • Cyber Patrol (www.cyberpatrol.com) is another Parental Control
  • Two or more levels are determined - the "parent" level
  • the parent can set up and alter the Internet
  • Parental Control requires entering a password in order to operate in the
  • chatting by means of the Internet may cause
  • the suitable access level is selected automatically according to the one
  • Control level is active.
  • the present invention relates to a method for carrying out Parental
  • each setup including
  • each mouse component Providing at least two mouse components, each mouse component
  • the ID of the mouse component is a unique ID stored in a
  • the mouse component is a mouse, wherein the parent's mouse
  • the ability to define the restrictions in the setups is
  • the associating of setups to a mouse ID is restricted, such as
  • mice of the parent should be kept in a safe place inaccessible to the
  • the invention further relates to a system for carrying out parental
  • control which comprises a parental control application, and at least two
  • the parental control application comprises several setups,
  • the mouse component is a mouse component
  • the parental control application comprises an ID and the parental control application comprises software
  • mouse component is a mouse.
  • each mouse comprises a first plug to which a second plug in
  • the first plug is located
  • the first plug may be located
  • the method of the invention further comprises the steps of:
  • system of the invention further comprises: (a) Means in
  • warning message is a predefined message being an integral part of the parental control application.
  • the warning message is a message which is
  • UIDMs are at least one UIDMs connectable to the mouse system of the
  • the method of the invention further comprises: (a) each UIDM
  • the UIDM thereby activating its Internet access restrictions.
  • a UIDM is given to a parent, and said UIDM being
  • the mouse system According to one embodiment of the invention, the mouse system
  • a light indicator that lights when a UIDM is
  • the associating of setups to a UIDM ID is restricted, such
  • the UIDM is connected by inserting it into a slot within the UIDM
  • the mouse system According to one embodiment of the invention, the
  • mouse system comprises a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer.
  • the mouse system According to another embodiment of the invention, the mouse system
  • the UIDM is connectable to a slot within the UIDM
  • the UIDM is connected by inserting it into a slot within a
  • system of the invention comprises a parental control
  • the UIDM comprises an ID and the parental control
  • the application comprises software means for retrieving said ID.
  • the invention further relates to a method for carrying out Security
  • each UIDM one or more of the setups; (e) When operating the
  • UIDM is connected to the mouse system only when the user is
  • the invention further relates to a system for carrying out security
  • control which comprises a security control application, and at least
  • one UIDM connectable to the mouse system of the computer.
  • the security control application comprises several setups, each setup including predefined restrictions for accessing data from
  • the UIDM comprises an ID and the security control
  • application comprises software means for retrieving the ID.
  • the age of the user is recorded within the mouse
  • Fig. 1 illustrates in block diagram form the structure of a Parental
  • Fig. 2 illustrates in block diagram form the components of a
  • Fig. 3 illustrates a mouse controlling system, according to one
  • Fig. 4 illustrates a mouse designed for children, according to one embodiment of the invention
  • Fig. 5 is a flow diagram illustrating a process for defining a setup in
  • Fig. 6 schematically illustrates a high level flowchart of a process for
  • Fig. 7 illustrates a GUI form for defining the Parental control
  • Figs. 8a and 8b illustrate a mouse that comprises a socket according
  • Fig. 9 is a flow diagram describing a process for warning a chat
  • Fig. 10 illustrates a mouse comprising one electronic card, on which
  • the ID is stored within its circuitry, according to one embodiment of the
  • Fig. 11 illustrates a circuit for indicating the presence of the parental
  • Fig. 12 schematically illustrates an "identification" box, according to one embodiment of the invention.
  • Fig. 13 schematically illustrates in a flowchart form an age
  • Fig. 14 schematically illustrates a mouse pad with UIDM reading
  • USB Universal Serial Bus
  • a UART is the microchip with programming that controls a
  • GUI Graphic User Interface
  • GUI programs use icons, toolbars, taskbars and other friendly, point-
  • SIM Subscriber Identity Module
  • said card is connected to the mouse of the computer.
  • Some of the filtering methods used in the art are: Checking the content of a Web page: Prior to the presentation of a
  • Web page The words can be searched in the Web address, as well.
  • addresses may be restricted. For example, if the parent wishes to
  • the browser displays a
  • Fig. 1 schematically illustrates in block diagram form the structure of a
  • a list of categories 30 may define a control level, such as "Sex”, “Nudity”, etc.
  • Each category is comprised of a list of keywords
  • predetermined rating in the list is compared with the rating as given to
  • Any other restricting rules 90 may exist.
  • the user can establish a
  • predetermined setup as provided by the browser, and can add and alter
  • the access to the Parental Control setup can be restricted
  • Fig. 2 schematically illustrates a block diagram of the components in the
  • Parental Control system according to one embodiment of the invention.
  • the system includes
  • the mouse 50 of the computer that comprises an ID retrievable by the
  • the system comprises also a list of IDs 60, and a specific
  • the interface 100 may be a part of a Parental Control software, or a
  • parents should have a different ID and preferably different shape and
  • the ID of the mouse is used for identifying the user. Hence, the profile
  • the active Parental configuration can be ascertained by a glance
  • the- PC mouse controlling system has the
  • Sensors are the movement detectors that sense the
  • buttons which sense the button states.
  • the mouse controller within the mouse reads the state of those sensors
  • the mouse driver receives that data packet and decodes the information
  • the mouse driver states, and provides it to the application.
  • the mouse driver
  • the ID of the mouse is a mouse
  • Fig. 3 schematically illustrates a mouse controlling system, according to
  • Mouse 50 is connected to the computer
  • serial interface 112 such as RS-232C.
  • the communication is
  • the transmitting chip 51 can
  • the ID may be any suitable ID. According to another embodiment of the invention, the ID may be any suitable ID.
  • the ID may be conveyed upon
  • the ID is conveyed periodically.
  • the ID is conveyed to the computer any time that the mouse is
  • the parental control can be implemented as a software module/utility or
  • Fig. 4 illustrates a mouse designed for a child, according to one
  • Fig. 5 is a flow diagram illustrating a process for defining the setup for a
  • step 201 the process starts, by executing the setup program/
  • step 205 continues with step 205, otherwise, step 203.
  • the software retrieves the ID of the parent's mouse and saves
  • the user is asked to attach the child's mouse to the computer.
  • the ID of the child's mouse is retrieved by the program/
  • the user is asked to define the setup to be associated with the
  • step 205 If however the answer is "No", the process continues with step 205. If however the answer is "No", the process continues with step 205.
  • a password may be used as a
  • Fig. 6 is a flow diagram illustrating a process of Parental Control
  • the ID of the mouse is retrieved.
  • the retrieved ID is compared with the list of IDs as saved in
  • step 105 in which the setup associated with that ID is activated.
  • step 106 where the Parental Control application activates all the
  • Fig. 7 schematically illustrates an exemplary GUI form for defining the
  • Entry to the GUI form is restricted by a password (not shown) or
  • Two levels of operation may be defined: The Parent level and the Child
  • radio button 302. This way, more than one mouse can be set to operate
  • box 308 included in box 308, and may also be edited by the user. Whenever the user wishes to define the setup of a mouse, he attaches
  • the altered setup is stored.
  • GUI for defining and altering the setup. For example, in order to help
  • Control may comprise some predefined setups, such as those existing in
  • the parent may select one of the predefined setups,
  • Fig. 9 shows a block diagram
  • the invention provides
  • control application (and therefore in block 106 all restrictions are
  • Such a message may be: "THIS IS A MESSAGE FROM THE
  • a first chat type is a stand
  • a second chat type includes those chat
  • chat program is a stand alone local application, which is activated from
  • characteristic to such chat session is whether Java Applets are active.
  • chat sessions have other typical characteristics, such as
  • chat sessions for determining whether or when a chat session is active.
  • the mouse is likely to be plugged in and out more often than
  • the rear side of the computer is inconvenient, preferably according to the
  • the mouse is designed to include a socket for its cable, in
  • Figs. 8a and 8b illustrate a mouse that comprises a socket 60 according
  • the cable 70 is a part of mouse 50.
  • the mouse is used as an identification
  • a small portable device preferable to store it in a safe place, such as a locked drawer.
  • a safe place such as a locked drawer.
  • the parent or child operates the computer.
  • Fig. 10 schematically illustrates a mouse 50 of the invention, comprising
  • the electronic card 61 is installed
  • a dedicated card 61 is
  • the mouse's circuitry Upon checking the current ID of the mouse, the mouse's circuitry reads
  • the electronic card 61 is small, and therefore suitable for stowing in a wallet, pocket, and so
  • the mouse further comprises an indicator 63, which lights or
  • parent's ID is not installed, and so forth.
  • Subscriber Identity Module such as the SIM used in mobile
  • UIDM User ID Module
  • Fig. 11 illustrates a circuit for indicating the presence of the parental ID
  • the circuit 65 is closing.
  • the power 66 which its source is from the
  • the card will indicate to the setup who is using the computer, and what
  • UIDM card insertable to the mouse of the computer
  • accessing various applications or data may it be local (i.e., within the
  • PC of the user or remote (e.g., over the local network or over the
  • a computer may comprise important material to the
  • Fig. 12 schematically illustrates an "identification" box, according to one
  • the "identification" box 80 is inserted
  • the computer is carried out by the connector 88 of the identification box
  • the connectors are of the
  • the Identification box deals with the common protocols of connecting a
  • VCC and GND which are used for the power source to the ouse
  • the identification box enables to the connected mouse to operate
  • the identification 80 box comprises a socket for inserting the ID card 61.
  • the identification box is able to read or write the content of
  • the identification box 80 intercepts data
  • Fig. 2 can communicate with the microcontroller 82.
  • the microcontroller periodically checks the presence of the ID
  • the software element 100 forces the most severe restrictions, according to the Parental Control setup.
  • mice is:
  • the user (parent or child) is not limited to the mouse with the socket,
  • the age of the user is a predefined value
  • the recorded age is used to approve/disapprove
  • FIG. 13 schematically illustrates in a
  • flowchart starts at block 131, wherein the user age is recorded into the
  • the activity is approved. If the age is below the threshold, then the
  • activity is disproved (block 134). For example, adults sites may be forced
  • the activity is found below a threshold age (e.g., below 21), the activity is found below a threshold age (e.g., below 21), the activity is
  • the age may be registered only by
  • the UIDM 61 is inserted
  • Fig. 14 illustrates a mouse pad 141 with UIDM reading
  • UIDM 61 is inserted into UIDM slot 142.
  • the mouse pad is
  • Cable 143 can use any suitable connection protocol, such as USB, PS/2 etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Transfer Between Computers (AREA)
EP01272791A 2000-12-28 2001-12-27 Verfahren und system zur internet-kindersicherung Withdrawn EP1374008A2 (de)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
IL14062400 2000-12-28
IL14062400A IL140624A (en) 2000-12-28 2000-12-28 Method and system for parental internet control
IL14377701A IL143777A (en) 2000-12-28 2001-06-14 Method and system for parental internet control
IL14377701 2001-06-14
PCT/IL2001/001212 WO2002054200A2 (en) 2000-12-28 2001-12-27 Method and system for parental internet control

Publications (1)

Publication Number Publication Date
EP1374008A2 true EP1374008A2 (de) 2004-01-02

Family

ID=26323998

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01272791A Withdrawn EP1374008A2 (de) 2000-12-28 2001-12-27 Verfahren und system zur internet-kindersicherung

Country Status (2)

Country Link
EP (1) EP1374008A2 (de)
WO (1) WO2002054200A2 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10350903A1 (de) * 2003-10-31 2005-06-09 Siemens Ag Intuitive und sichere Steuerung von Bedieneingaben in Softwarekomponenten
WO2005122557A1 (en) * 2004-06-04 2005-12-22 Thomson Licensing Method and apparatus for controlling an apparatus having a parental control function
US7869790B2 (en) 2004-09-24 2011-01-11 Scenera Technologies, Llc Policy-based controls for wireless cameras
US8145241B2 (en) 2005-06-30 2012-03-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
GB2470564A (en) * 2009-05-26 2010-12-01 Integrite Internat Ltd Parental control for internet using memory device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SK285147B6 (sk) * 1995-08-21 2006-07-07 Cornel Sirbu Zariadenie podmieneného prístupu, spôsob zabezpečenia prístupu do hostiteľského zariadenia, spôsob zabezpečenia dátových transakcií a spôsob riadeniaa uskutočňovania bezpečnostných aplikácií
US6392671B1 (en) * 1998-10-27 2002-05-21 Lawrence F. Glaser Computer pointing device having theme identification means
US6286001B1 (en) * 1999-02-24 2001-09-04 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO02054200A3 *

Also Published As

Publication number Publication date
WO2002054200A2 (en) 2002-07-11
WO2002054200A3 (en) 2003-10-23

Similar Documents

Publication Publication Date Title
US20040051733A1 (en) Method and system for parental internet control
USRE42102E1 (en) Method and apparatus for wirelessly establishing user preference settings on a computer
US6208995B1 (en) Web browser download of bookmark set
JP3313077B2 (ja) ブックマーク・セットを使用してインターネットにアクセスする方法およびシステム
US6041360A (en) Web browser support for dynamic update of bookmarks
US20010021950A1 (en) Method and apparatus for controlling access to a computer network using tangible media
US7711854B2 (en) Retrieving documents over a network with a wireless communication device
US20040006621A1 (en) Content filtering for web browsing
GB2381902A (en) Bookmark managing system and bookmark managing method
US20110252085A1 (en) Communication system, server device, display device, information processing method, and program
JP4617384B2 (ja) 情報伝達媒体再生装置からのコンテンツアクセス制御
AU2003247421A1 (en) System and method for providing a digital rights scheme for browser downloads
WO2012070348A1 (ja) サーバシステム、サーバシステムの実行方法及び外部メモリ
WO2002054200A2 (en) Method and system for parental internet control
US20040054754A1 (en) System and method for automatic internet access
JPH11306139A (ja) インターネット端末におけるホームページの閲覧方法および装置
US20020004909A1 (en) ID information management system and method
JP2006079446A (ja) サービス提供サーバ
US20040139182A1 (en) Management device and method for controlling an internet website browsing
GB2333617A (en) Bookmark set facilitates navigation in an electronic commerce related Web site
KR20050052949A (ko) 메모리 카드를 이용한 로그 서비스 제공 시스템 및 방법
KR100292066B1 (ko) 인터넷정보검색제어방법
KR100514451B1 (ko) 웹페이지 접속을 위한 개인정보관리 시스템
JP5913275B2 (ja) 情報保護端末、情報保護方法、情報保護端末用プログラム
JPH10289183A (ja) カード式インターネット簡易接続システム

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: AL LT LV MK RO SI

17P Request for examination filed

Effective date: 20040422

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20060701