EP1374008A2 - Verfahren und system zur internet-kindersicherung - Google Patents
Verfahren und system zur internet-kindersicherungInfo
- Publication number
- EP1374008A2 EP1374008A2 EP01272791A EP01272791A EP1374008A2 EP 1374008 A2 EP1374008 A2 EP 1374008A2 EP 01272791 A EP01272791 A EP 01272791A EP 01272791 A EP01272791 A EP 01272791A EP 1374008 A2 EP1374008 A2 EP 1374008A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- mouse
- uidm
- computer
- setups
- parental control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the invention relates to a method and system for providing parental
- the invention relates to control over use of the Internet. More particularly, the invention relates
- the Internet has, on the one hand, increased the freedom of expression
- Parental control refers to the ability to control the Internet
- Some browsers such as the Internet Explorer 5, provide a parental
- control software It helps the user to control the types of content that his
- the computer can access on the Internet.
- the user can adjust the types of
- Cyber Patrol (www.cyberpatrol.com) is another Parental Control
- Two or more levels are determined - the "parent" level
- the parent can set up and alter the Internet
- Parental Control requires entering a password in order to operate in the
- chatting by means of the Internet may cause
- the suitable access level is selected automatically according to the one
- Control level is active.
- the present invention relates to a method for carrying out Parental
- each setup including
- each mouse component Providing at least two mouse components, each mouse component
- the ID of the mouse component is a unique ID stored in a
- the mouse component is a mouse, wherein the parent's mouse
- the ability to define the restrictions in the setups is
- the associating of setups to a mouse ID is restricted, such as
- mice of the parent should be kept in a safe place inaccessible to the
- the invention further relates to a system for carrying out parental
- control which comprises a parental control application, and at least two
- the parental control application comprises several setups,
- the mouse component is a mouse component
- the parental control application comprises an ID and the parental control application comprises software
- mouse component is a mouse.
- each mouse comprises a first plug to which a second plug in
- the first plug is located
- the first plug may be located
- the method of the invention further comprises the steps of:
- system of the invention further comprises: (a) Means in
- warning message is a predefined message being an integral part of the parental control application.
- the warning message is a message which is
- UIDMs are at least one UIDMs connectable to the mouse system of the
- the method of the invention further comprises: (a) each UIDM
- the UIDM thereby activating its Internet access restrictions.
- a UIDM is given to a parent, and said UIDM being
- the mouse system According to one embodiment of the invention, the mouse system
- a light indicator that lights when a UIDM is
- the associating of setups to a UIDM ID is restricted, such
- the UIDM is connected by inserting it into a slot within the UIDM
- the mouse system According to one embodiment of the invention, the
- mouse system comprises a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer and a mouse connectable to the computer.
- the mouse system According to another embodiment of the invention, the mouse system
- the UIDM is connectable to a slot within the UIDM
- the UIDM is connected by inserting it into a slot within a
- system of the invention comprises a parental control
- the UIDM comprises an ID and the parental control
- the application comprises software means for retrieving said ID.
- the invention further relates to a method for carrying out Security
- each UIDM one or more of the setups; (e) When operating the
- UIDM is connected to the mouse system only when the user is
- the invention further relates to a system for carrying out security
- control which comprises a security control application, and at least
- one UIDM connectable to the mouse system of the computer.
- the security control application comprises several setups, each setup including predefined restrictions for accessing data from
- the UIDM comprises an ID and the security control
- application comprises software means for retrieving the ID.
- the age of the user is recorded within the mouse
- Fig. 1 illustrates in block diagram form the structure of a Parental
- Fig. 2 illustrates in block diagram form the components of a
- Fig. 3 illustrates a mouse controlling system, according to one
- Fig. 4 illustrates a mouse designed for children, according to one embodiment of the invention
- Fig. 5 is a flow diagram illustrating a process for defining a setup in
- Fig. 6 schematically illustrates a high level flowchart of a process for
- Fig. 7 illustrates a GUI form for defining the Parental control
- Figs. 8a and 8b illustrate a mouse that comprises a socket according
- Fig. 9 is a flow diagram describing a process for warning a chat
- Fig. 10 illustrates a mouse comprising one electronic card, on which
- the ID is stored within its circuitry, according to one embodiment of the
- Fig. 11 illustrates a circuit for indicating the presence of the parental
- Fig. 12 schematically illustrates an "identification" box, according to one embodiment of the invention.
- Fig. 13 schematically illustrates in a flowchart form an age
- Fig. 14 schematically illustrates a mouse pad with UIDM reading
- USB Universal Serial Bus
- a UART is the microchip with programming that controls a
- GUI Graphic User Interface
- GUI programs use icons, toolbars, taskbars and other friendly, point-
- SIM Subscriber Identity Module
- said card is connected to the mouse of the computer.
- Some of the filtering methods used in the art are: Checking the content of a Web page: Prior to the presentation of a
- Web page The words can be searched in the Web address, as well.
- addresses may be restricted. For example, if the parent wishes to
- the browser displays a
- Fig. 1 schematically illustrates in block diagram form the structure of a
- a list of categories 30 may define a control level, such as "Sex”, “Nudity”, etc.
- Each category is comprised of a list of keywords
- predetermined rating in the list is compared with the rating as given to
- Any other restricting rules 90 may exist.
- the user can establish a
- predetermined setup as provided by the browser, and can add and alter
- the access to the Parental Control setup can be restricted
- Fig. 2 schematically illustrates a block diagram of the components in the
- Parental Control system according to one embodiment of the invention.
- the system includes
- the mouse 50 of the computer that comprises an ID retrievable by the
- the system comprises also a list of IDs 60, and a specific
- the interface 100 may be a part of a Parental Control software, or a
- parents should have a different ID and preferably different shape and
- the ID of the mouse is used for identifying the user. Hence, the profile
- the active Parental configuration can be ascertained by a glance
- the- PC mouse controlling system has the
- Sensors are the movement detectors that sense the
- buttons which sense the button states.
- the mouse controller within the mouse reads the state of those sensors
- the mouse driver receives that data packet and decodes the information
- the mouse driver states, and provides it to the application.
- the mouse driver
- the ID of the mouse is a mouse
- Fig. 3 schematically illustrates a mouse controlling system, according to
- Mouse 50 is connected to the computer
- serial interface 112 such as RS-232C.
- the communication is
- the transmitting chip 51 can
- the ID may be any suitable ID. According to another embodiment of the invention, the ID may be any suitable ID.
- the ID may be conveyed upon
- the ID is conveyed periodically.
- the ID is conveyed to the computer any time that the mouse is
- the parental control can be implemented as a software module/utility or
- Fig. 4 illustrates a mouse designed for a child, according to one
- Fig. 5 is a flow diagram illustrating a process for defining the setup for a
- step 201 the process starts, by executing the setup program/
- step 205 continues with step 205, otherwise, step 203.
- the software retrieves the ID of the parent's mouse and saves
- the user is asked to attach the child's mouse to the computer.
- the ID of the child's mouse is retrieved by the program/
- the user is asked to define the setup to be associated with the
- step 205 If however the answer is "No", the process continues with step 205. If however the answer is "No", the process continues with step 205.
- a password may be used as a
- Fig. 6 is a flow diagram illustrating a process of Parental Control
- the ID of the mouse is retrieved.
- the retrieved ID is compared with the list of IDs as saved in
- step 105 in which the setup associated with that ID is activated.
- step 106 where the Parental Control application activates all the
- Fig. 7 schematically illustrates an exemplary GUI form for defining the
- Entry to the GUI form is restricted by a password (not shown) or
- Two levels of operation may be defined: The Parent level and the Child
- radio button 302. This way, more than one mouse can be set to operate
- box 308 included in box 308, and may also be edited by the user. Whenever the user wishes to define the setup of a mouse, he attaches
- the altered setup is stored.
- GUI for defining and altering the setup. For example, in order to help
- Control may comprise some predefined setups, such as those existing in
- the parent may select one of the predefined setups,
- Fig. 9 shows a block diagram
- the invention provides
- control application (and therefore in block 106 all restrictions are
- Such a message may be: "THIS IS A MESSAGE FROM THE
- a first chat type is a stand
- a second chat type includes those chat
- chat program is a stand alone local application, which is activated from
- characteristic to such chat session is whether Java Applets are active.
- chat sessions have other typical characteristics, such as
- chat sessions for determining whether or when a chat session is active.
- the mouse is likely to be plugged in and out more often than
- the rear side of the computer is inconvenient, preferably according to the
- the mouse is designed to include a socket for its cable, in
- Figs. 8a and 8b illustrate a mouse that comprises a socket 60 according
- the cable 70 is a part of mouse 50.
- the mouse is used as an identification
- a small portable device preferable to store it in a safe place, such as a locked drawer.
- a safe place such as a locked drawer.
- the parent or child operates the computer.
- Fig. 10 schematically illustrates a mouse 50 of the invention, comprising
- the electronic card 61 is installed
- a dedicated card 61 is
- the mouse's circuitry Upon checking the current ID of the mouse, the mouse's circuitry reads
- the electronic card 61 is small, and therefore suitable for stowing in a wallet, pocket, and so
- the mouse further comprises an indicator 63, which lights or
- parent's ID is not installed, and so forth.
- Subscriber Identity Module such as the SIM used in mobile
- UIDM User ID Module
- Fig. 11 illustrates a circuit for indicating the presence of the parental ID
- the circuit 65 is closing.
- the power 66 which its source is from the
- the card will indicate to the setup who is using the computer, and what
- UIDM card insertable to the mouse of the computer
- accessing various applications or data may it be local (i.e., within the
- PC of the user or remote (e.g., over the local network or over the
- a computer may comprise important material to the
- Fig. 12 schematically illustrates an "identification" box, according to one
- the "identification" box 80 is inserted
- the computer is carried out by the connector 88 of the identification box
- the connectors are of the
- the Identification box deals with the common protocols of connecting a
- VCC and GND which are used for the power source to the ouse
- the identification box enables to the connected mouse to operate
- the identification 80 box comprises a socket for inserting the ID card 61.
- the identification box is able to read or write the content of
- the identification box 80 intercepts data
- Fig. 2 can communicate with the microcontroller 82.
- the microcontroller periodically checks the presence of the ID
- the software element 100 forces the most severe restrictions, according to the Parental Control setup.
- mice is:
- the user (parent or child) is not limited to the mouse with the socket,
- the age of the user is a predefined value
- the recorded age is used to approve/disapprove
- FIG. 13 schematically illustrates in a
- flowchart starts at block 131, wherein the user age is recorded into the
- the activity is approved. If the age is below the threshold, then the
- activity is disproved (block 134). For example, adults sites may be forced
- the activity is found below a threshold age (e.g., below 21), the activity is found below a threshold age (e.g., below 21), the activity is
- the age may be registered only by
- the UIDM 61 is inserted
- Fig. 14 illustrates a mouse pad 141 with UIDM reading
- UIDM 61 is inserted into UIDM slot 142.
- the mouse pad is
- Cable 143 can use any suitable connection protocol, such as USB, PS/2 etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IL14062400 | 2000-12-28 | ||
| IL14062400A IL140624A (en) | 2000-12-28 | 2000-12-28 | Method and system for parental internet control |
| IL14377701A IL143777A (en) | 2000-12-28 | 2001-06-14 | Method and system for parental internet control |
| IL14377701 | 2001-06-14 | ||
| PCT/IL2001/001212 WO2002054200A2 (en) | 2000-12-28 | 2001-12-27 | Method and system for parental internet control |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP1374008A2 true EP1374008A2 (de) | 2004-01-02 |
Family
ID=26323998
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP01272791A Withdrawn EP1374008A2 (de) | 2000-12-28 | 2001-12-27 | Verfahren und system zur internet-kindersicherung |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP1374008A2 (de) |
| WO (1) | WO2002054200A2 (de) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10350903A1 (de) * | 2003-10-31 | 2005-06-09 | Siemens Ag | Intuitive und sichere Steuerung von Bedieneingaben in Softwarekomponenten |
| WO2005122557A1 (en) * | 2004-06-04 | 2005-12-22 | Thomson Licensing | Method and apparatus for controlling an apparatus having a parental control function |
| US7869790B2 (en) | 2004-09-24 | 2011-01-11 | Scenera Technologies, Llc | Policy-based controls for wireless cameras |
| US8145241B2 (en) | 2005-06-30 | 2012-03-27 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
| GB2470564A (en) * | 2009-05-26 | 2010-12-01 | Integrite Internat Ltd | Parental control for internet using memory device |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SK285147B6 (sk) * | 1995-08-21 | 2006-07-07 | Cornel Sirbu | Zariadenie podmieneného prístupu, spôsob zabezpečenia prístupu do hostiteľského zariadenia, spôsob zabezpečenia dátových transakcií a spôsob riadeniaa uskutočňovania bezpečnostných aplikácií |
| US6392671B1 (en) * | 1998-10-27 | 2002-05-21 | Lawrence F. Glaser | Computer pointing device having theme identification means |
| US6286001B1 (en) * | 1999-02-24 | 2001-09-04 | Doodlebug Online, Inc. | System and method for authorizing access to data on content servers in a distributed network |
-
2001
- 2001-12-27 EP EP01272791A patent/EP1374008A2/de not_active Withdrawn
- 2001-12-27 WO PCT/IL2001/001212 patent/WO2002054200A2/en not_active Ceased
Non-Patent Citations (1)
| Title |
|---|
| See references of WO02054200A3 * |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2002054200A2 (en) | 2002-07-11 |
| WO2002054200A3 (en) | 2003-10-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20040051733A1 (en) | Method and system for parental internet control | |
| USRE42102E1 (en) | Method and apparatus for wirelessly establishing user preference settings on a computer | |
| US6208995B1 (en) | Web browser download of bookmark set | |
| JP3313077B2 (ja) | ブックマーク・セットを使用してインターネットにアクセスする方法およびシステム | |
| US6041360A (en) | Web browser support for dynamic update of bookmarks | |
| US20010021950A1 (en) | Method and apparatus for controlling access to a computer network using tangible media | |
| US7711854B2 (en) | Retrieving documents over a network with a wireless communication device | |
| US20040006621A1 (en) | Content filtering for web browsing | |
| GB2381902A (en) | Bookmark managing system and bookmark managing method | |
| US20110252085A1 (en) | Communication system, server device, display device, information processing method, and program | |
| JP4617384B2 (ja) | 情報伝達媒体再生装置からのコンテンツアクセス制御 | |
| AU2003247421A1 (en) | System and method for providing a digital rights scheme for browser downloads | |
| WO2012070348A1 (ja) | サーバシステム、サーバシステムの実行方法及び外部メモリ | |
| WO2002054200A2 (en) | Method and system for parental internet control | |
| US20040054754A1 (en) | System and method for automatic internet access | |
| JPH11306139A (ja) | インターネット端末におけるホームページの閲覧方法および装置 | |
| US20020004909A1 (en) | ID information management system and method | |
| JP2006079446A (ja) | サービス提供サーバ | |
| US20040139182A1 (en) | Management device and method for controlling an internet website browsing | |
| GB2333617A (en) | Bookmark set facilitates navigation in an electronic commerce related Web site | |
| KR20050052949A (ko) | 메모리 카드를 이용한 로그 서비스 제공 시스템 및 방법 | |
| KR100292066B1 (ko) | 인터넷정보검색제어방법 | |
| KR100514451B1 (ko) | 웹페이지 접속을 위한 개인정보관리 시스템 | |
| JP5913275B2 (ja) | 情報保護端末、情報保護方法、情報保護端末用プログラム | |
| JPH10289183A (ja) | カード式インターネット簡易接続システム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
| 17P | Request for examination filed |
Effective date: 20040422 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20060701 |