WO2002003167A2 - System and method for providing multiple levels of access to computer network content - Google Patents

System and method for providing multiple levels of access to computer network content Download PDF

Info

Publication number
WO2002003167A2
WO2002003167A2 PCT/US2001/020785 US0120785W WO0203167A2 WO 2002003167 A2 WO2002003167 A2 WO 2002003167A2 US 0120785 W US0120785 W US 0120785W WO 0203167 A2 WO0203167 A2 WO 0203167A2
Authority
WO
WIPO (PCT)
Prior art keywords
access
web
web site
browser
addresses
Prior art date
Application number
PCT/US2001/020785
Other languages
French (fr)
Other versions
WO2002003167A3 (en
Inventor
David Michael Correnti
Original Assignee
David Michael Correnti
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by David Michael Correnti filed Critical David Michael Correnti
Priority to AU2001271651A priority Critical patent/AU2001271651A1/en
Publication of WO2002003167A2 publication Critical patent/WO2002003167A2/en
Publication of WO2002003167A3 publication Critical patent/WO2002003167A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to a system and method for providing multiple levels of access to content provided on computer networks and multiple levels of access to computer network communication protocols such as electronic mail (Email) and chat rooms.
  • computer network communication protocols such as electronic mail (Email) and chat rooms.
  • Computer networks such as the Internet or World Wide Web (“Web,” collectively) provide access to immeasurable amounts of content. However, due to age, maturity, religious beliefs, cultural beliefs, personal tastes, and other reasons, all of the available content is not suitable for all of the potential viewers. In addition, computer networks provide the ability to communicate, in a relatively anonymous fashion, using Email or chat rooms. Too often, users receive unsolicited and unwanted communications containing, likewise, objectionable material.
  • Schemes exist that attempt to restrict the types of content or communications received over a given network. However, due to their manner of operation, existing schemes are not foolproof and still allow objectionable material to reach the user. For example, some schemes filter computer network content at the user's computer by blocking access to sites containing keywords or phrases predetermined as objectionable.
  • Filtering schemes are often unsatisfactory because they are both under inclusive and over exclusive. For example, some sites may present objectionable material without the use of a forbidden keyword, thus, including material that should be excluded. In addition, sites may contain a word or words that may have both objectionable and unobjectionable meanings. For example, a site providing content related to carpentry may contain the words “joint” and “butt” in descriptions of various joinery techniques. However, “joint” and “butt” may be on the excluded list due to their frequent use on potentially objectionable sites relating to drug use and pornography respectively. Thus, the filter is over exclusive to the user interested in carpentry joinery techniques. Other drawbacks exist. Other proposed access schemes involve restricting access based upon user identification information.
  • Some operating systems and Web browsers allow the creation of user profiles.
  • the profile contains an indication that the user is of a particular age (e.g., child, teen, adult, etc.).
  • the user profile is transmitted to the server hosting the site.
  • One proposed scheme is for the server to block access to the site if the user profile indicates that the user is not of proper age to view the content as determined by the party hosting or providing the site.
  • One drawback is that the success of this type of restricted access relies on Web site host server compliance and many Web sites may not have an incentive to restrict access to their content (e.g., commercial sites desiring as large an audience as possible). Other drawbacks exist.
  • Another proposed filtering scheme involves limiting access to a certain list of pre-approved sites.
  • a software module is downloaded into the operating system of a user's machine. This module verifies that each uniform resource locator (URL) entered in the Web browser is one that is on the list of pre-approved sites.
  • URL uniform resource locator
  • One problem with this approach is the pre-approved list is at the discretion of the software module provider. Thus, sites that some users do not find objectionable are blocked anyway because the software module provider has restricted access. Also, using a pre-approved site list offers little flexibility to add or delete sites at a later time.
  • Filtering by pre-approval of sites is not always able to prohibit a child from following links off of an approved site out to inappropriate sites. Other drawbacks exist.
  • one object of the invention is to overcome the above and other drawbacks in existing devices.
  • Another object of the invention is to provide a browser that filters Web sites according to a top level domain name. Another object of the invention is to provide a browser that filters content according to computer network address. Another object of the invention is to provide filters to screen email or chat room messages from all but the persons on a predetermined configurable list.
  • Another object of the invention is that a user's site access is not limited by restricted keywords.
  • systems that filter site content using keywords may restrict such important information as is provided in encyclopedias, medical references, or the like.
  • the present invention does not limit site access based on a predetermined list of keywords.
  • the invention provides a computer network browser, capable of accessing Web sites.
  • the particular Web sites that can be access are controlled by the browser.
  • the browser may be configured to only access Web sites containing a certain top level domain name.
  • the browser may be configured to only access Web sites that have a certain type of address.
  • the invention provides a system and method to control the Web sites that a user may access.
  • the system provides filters that restrict the email or chat room messages that a user may receive.
  • the browser (or other email or chat message interface) may be provided with a customizable list of addresses from which a user is willing to accept messages. Any message from an address not on the list will be blocked from reaching the user.
  • Figure 1 is a schematic of the overall system according to one embodiment of the invention.
  • Figure 2 is one embodiment of a child appropriate browser interface.
  • Figure 3 is a home page according to one embodiment of the invention.
  • Figure 4 is one embodiment of one safeguard provided by the invention.
  • Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions.
  • Figure 6 is a schematic representation of the filtering according to one embodiment of the invention.
  • Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention.
  • a parent activates the invention using a processor based device capable of viewing Web sites.
  • the processor based device may comprise, a personal computer, a laptop computer, a personal digital assistant (PDA), a Web enabled wireless phone, a suitably equipped television (e.g., Web TV), or other processor device capable of accessing and displaying Web content.
  • PDA personal digital assistant
  • the invention provides at least one browser capable of serving as a Web navigation interface. This browser is designed to only allow viewing of certain types of content.
  • the browser may comprise a child appropriate browser that is designed to display content appropriate for children.
  • the invention provides a child appropriate browser that is designed to be attractive and usable by children.
  • the navigation buttons i.e., back, forward, home, etc.
  • the navigation buttons are preferably designed so as to appeal to children (e.g., cartoons, bright colors, large fonts, etc.), screen displays and layouts are likewise designed to be attractive to children.
  • the invention may provide access to certain child appropriate information as part of the browser interface.
  • money management information such as The Dollar Digest from the Stein Roe Young Investor Fund
  • could be presented on the browser interface e.g., as a scrolling "ticker tape" display.
  • news items from child appropriate news sources e.g., kidspost.com, from the Washington Post, sikids.com, from Sports Illustrated for kids, etc.
  • Trivia, games, and celebrity news may also be provided on the browser interface (e.g. , as part of a startup page or the like).
  • the browser filters content by restricting the types of addresses that the browser will access.
  • the browser may limit access to addresses containing a particular top level domain extension.
  • the top level domain name extension of ".kid” could be used to designate the types of Web sites that the child appropriate browser would access.
  • it may be the responsibility of the entity charged with assigning the .kid extension to police the content of any site having a .kid extension.
  • Third parties (such as agencies) may also have part or all of this responsibility.
  • the browser may restrict access to Web sites that contain a certain identifier in their address.
  • the identifier may comprise .kid as part of the address (e.g., www.toys.kid.com).
  • the invention provides for finer levels of parental supervision by restricting the Internet content displayed by the invention.
  • some embodiments of the invention may provide a number of Internet browsing zones based on a rating system.
  • Approved sites may implement (hyper text markup language (html) and/or flashprogramming to recognize the different zones based on user ID and ratings setup information which would be set up at initial installation by the parents (e.g., during set up procedures).
  • html hyper text markup language
  • flashprogramming to recognize the different zones based on user ID and ratings setup information which would be set up at initial installation by the parents (e.g., during set up procedures).
  • National GeographicTM and The Smithsonian Institution may provide approved sites, but contain content that may be objectionable to some parents. By implementing the different.
  • embodiments of the invention display content for only certain pre- approved portions of those sites.
  • embodiments of the invention provide for parental control over the
  • Email and chat messages that their child receives.
  • the invention provides for the creation of a list of addresses from which receipt of a message is acceptable. For example, a child, or other user lacking a parental password, will not be able to Web chat or Email with someone that has not entered as an approved address.
  • Approved addresses may be added under a parental control portion of the invention. Access to the parental control portion may be restricted, for example, by a parental password.
  • the parental password may be configurable at installation, for example, to enable the parent to select a password. In addition, the password may be changeable at a later time so that the password may be varied.
  • the approved address list may be described with reference to the following example.
  • a child, Jane comes home from school and has a new friend, Joan, she met at school. Jane tells her parent(s) that she would like to Email her new- friend Joan. It is the parent's responsibility to make sure that Joan is an appropriate person for Jane to associate with. If the parent(s) feel that Web contact with Joan is appropriate, Joan's address may be added to the approved address list by the parent, using the appropriate parental password. In this manner, parents can supervise the addresses (and hence, persons associated with those addresses) from which the child receives messages. If the parent does not agree to add Joan's address to the approved address list, Jane will not receive any messages bearing Jane's E-mail address in the "from" line.
  • Embodiments of the invention include additional browsers for enabling other levels of access to Web content.
  • a "teenage” browser may be included to enable access to sited appropriate for teenage viewers.
  • access may be limited by the use of a top level domain extension (e.g., ".teen") or by an identifier in the address (e.g., www.videogames.teen.com).
  • a "regular" or unrestricted browser may be included to allow unrestricted access to all sites including those appropriate only for adults.
  • access to the browser may be restricted by the use of appropriate protections.
  • the unrestricted browser may be password protected to prevent unauthorized users from accessing the browser.
  • a family installs the browser interface portion of the invention on their home computer.
  • the Doe family has young children and teen age children and the parents themselves like to browse the web.
  • the invention provides three separate interfaces for Web browsing. For example, the youngest Doe children access the Web using the child appropriate interface. For example, the children may enter a password or "click on" an appropriate icon. Activation of the child appropriate interface loads an interface which has information, colors, figures, and navigation aids to which young children relate (e.g., Teletubbies,TM Barney,TM etc.).
  • FIG. 1 shows a schematic of the overall system 10 according to one embodiment of the invention.
  • a hosting center 12 may be provided.
  • Hosting center 12 may comprise a network of content providing servers 14A and 14B.
  • the servers may comprise dedicated servers (e.g., 14A) or shared servers (e.g., 14B). Communication between the servers 14A, 14B, may be accomplished in any suitable fashion.
  • the servers may comprise a distributed network of servers.
  • Servers 14A, 14B provide suitable content for child or teenage Web browsers.
  • the URL to identify content files on servers 14A, 14B may be designated by a specific top level domain name (e.g., ".kid").
  • servers 14A, 14B are associated with a URL that has a viewer appropriate designation in the name.
  • the URL may comprise identifier such as ".kid” as part of the locator in addition to the top level domain designator (e.g., www.toysite.kid.com).
  • Embodiments of the invention filter Internet addresses to restrict browsing to those addresses containing a specified top level domain name or sub level domain name.
  • filtering may be performed at the browser level. For example, the browser will not transmit (e.g., via transmission control protocol/Internet protocol (TCP/IP)) addresses without the proper top level or sub level domain name.
  • TCP/IP transmission control protocol/Internet protocol
  • filtering may occur after the address has been resolved into a numerical Internet address by a resolver.
  • a resolver is the software in TCP IP that sends requests to a domain name server to convert hostnames (such as www.site.com) to Internet addresses (such as 117.123.4.2).
  • a firewall 16 may be provided to ensure security of servers 14A, 14B.
  • Firewall 16 may comprise any suitable security measures which prevent unauthorized access to servers 14A, 14B (e.g., preventing access by hackers 18).
  • User processor device 20 is enabled to access the hosting center 12. Access may be accomplished in any suitable manner. For example, access may be accomplished through dial-up telephone connection, through wireless network connection, through LAN, WAN, or other network connection.
  • processor device 20 may comprise any suitable Web browsing device.
  • processor 20 may comprise a personal computer (PC), a Web enabled cellular phone, a Web enabled television, a personal digital assistant (PDA), a mainframe terminal, or any other suitable device.
  • PC personal computer
  • PDA personal digital assistant
  • mainframe terminal or any other suitable device.
  • Processor device 20 may comprise the appropriate software modules to enable Web browsing according to the present invention.
  • processor device 20 may comprise browser interface software for child appropriate Web browsing, browser interface software for teenage appropriate Web browsing, browser interface software for unrestricted (i.e., adult) Web browsing, and any other browser categories that are convenient.
  • Some embodiments of the invention include packaging more than one browser to form a suite of browsers. For example, a family having members of various ages may install an adult (or unrestricted browser), a teen browser and a kid browser on a single processor device.
  • processor device 20 may comprise the appropriate software modules to restrict access to the various browser interfaces.
  • processor device 20 may comprise software modules to enable the approved Email address lists, the parental password features, and other restricted access features as described herein.
  • processor device 20 also provides access to the Web 22. Access to the Web 22 is enabled through the use of passwords or other appropriate parental controls as described herein.
  • Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention.
  • the process initiates at step 70 by obtaining the software to enable the restricted browser.
  • the software may be obtained in any suitable manner.
  • the user may download the software from the Web at step 72 or obtain a CD or floppy disk containing the software at step 74.
  • the software to enable the restricted browser may comprise a plug-in that modifies an existing browser (e.g., Netscape Navigator,TM Microsoft Internet Explorer,TM or the like) or it may comprise a complete browser package.
  • an existing browser e.g., Netscape Navigator,TM Microsoft Internet Explorer,TM or the like
  • it may comprise a complete browser package.
  • the software is installed on an appropriate processor device (e.g., processor 20).
  • processor device e.g., processor 20
  • portions of the software will process an algorithm at the Internet Protocol (IP) level.
  • IP Internet Protocol
  • set up procedures may be implemented.
  • Set up procedures may include selecting a password, a user identification number, various viewing rating levels, the types of content to be displayed, the acceptable E-mail address list, and other features of parental control described herein.
  • Set up procedures 78 may be implemented through check boxes, menus, buttons, set up "wizards," or other acceptable user input technique.
  • set up procedures 78 may include a password and user ID which will only authorize the IP standard protocol to work using that user ID and passcode.
  • TCP/IP or point-to-point protocol (PPP) to send and receive data over any communications tool (e.g., NetScape, ICQ, AIM, AOL, filesharing, etc.)
  • a daemon i.e., a program that runs continuously in the background, until it is activated by a particular event
  • a daemon will embed itself on the hard drive so if new software applications are installed or the drive is erased or TCP/IP or PPP is replaced it will counteract as a guard telling the system files that the restricted browser software once resided within the TCP/IP or PPP extension.
  • the daemon which is written on the root level directory at that point, would recommend the new software that is being downloaded to reinstall the restricted browser software or enter username and password to proceed. In this manner, the restricted browser software may not be easily removed without use of the parental password or user ID. Additionally, these procedures make it difficult for a non-restricted browser to be installed on the processor 20 without parental acquiescence.
  • Figure 2 shows one embodiment of a child appropriate browser interface 24.
  • the interface 24 may include appropriate Web navigational tools 26.
  • the navigational tools 26 may comprise various icons, buttons, pull- down menus, or other appropriate devices.
  • back button 27, forward button 28, stop button 29, reload button 30, search button 31 home button 32, print button 33, and tools button 34 may be provided to accomplish their known functions.
  • the appearance of interface 26 may be designed with icons, pictures, colors, symbols, links, and other devices, that are attractive and appropriate for a child user.
  • icon 36 may be provided as a link to an appropriate child content site (e.g., a children's television network site), link 37 may be provided to a child appropriate computer game, or other child appropriate content may be provided.
  • an appropriate child content site e.g., a children's television network site
  • link 37 may be provided to a child appropriate computer game, or other child appropriate content may be provided.
  • FIG. 3 shows a home page 40 according to one embodiment of the invention.
  • Home page 40 may be provided as a preliminary access point to a hosting center 12 network.
  • home page 40 may comprise the usual home page features and attributes known in the art.
  • a log-in link 42 may be provided to allow enhanced access to registered customers
  • links 44 may be provided to enable access to various other Web site pages
  • link 46 may be provided to enable users to download software updates and other files
  • other home page features may be provided.
  • Figure 4 shows one embodiment of one safeguard provided by the invention.
  • a Web page 50 is presently displayed by the interface (e.g., a child appropriate browser). If a user attempts to access a Web page that does not contain the proper URL (e.g., a .kid extension or top level domain name) a warning message 52 may appear in the interface view.
  • the warning 52 may comprise a pop-up window or other message known in the art.
  • the warning 52 may instruct the user that access to the selected Web page is not authorized.
  • the user may be prompted to input a password or other appropriate security device in order to access the page.
  • Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions.
  • an access denial 54 is presented to the user upon the failure to satisfy a pre-determined security measure.
  • the user may have entered an incorrect URL or password and has, subsequently been denied access to the page.
  • the browser interface may automatically load an approved Web page (e.g., home page 40) upon the denial of access.
  • FIG. 6 shows a filtering routine 100 according to one embodiment of the invention.
  • filtering routine 100 may commence upon activation of a browser at step 102.
  • activation 102 may comprise selecting an icon from a desktop display, entering a run command, double clicking on the icon, or other method of initiating the browser software.
  • activation 102 may also include entering a password or performing other security measures to verify the identity of the user.
  • the user selects a Web destination at step 104. Selection of a Web destination may be accomplished in any suitable manner.
  • the user may select a destination from a list of stored "bookmarks" or "favorites," the user may type a destination into an address field, the user may follow links provided on a home page, or the user may use features of the browser interface (e.g., the navigation buttons) to choose a destination.
  • the browser interface e.g., the navigation buttons
  • verification step 106 may comprise checking that the address includes the proper extension (e.g., .kid, or the like).
  • the browser interface may be configured to not accept any URL that does not contain the proper extension.
  • step 106 may comprise checking that the address includes the proper identifier (e.g., .kid.com, or the like).
  • Alternate procedures 108 may comprise any suitable method of restricting access to the inappropriate destination.
  • the invention may cause the browser to display an error message (e.g., page restricted - access denied), return to a home page, proceed to a known appropriate destination, prompt the user for an appropriate destination, or other suitable response.
  • the browser may display an "unable to locate the server" message or display a simple written notification along with sound notification.
  • the invention enables the browser to access the destination at step 110.

Abstract

A computer network browser, capable of accessing Web sites. The particular Web sites that can be access are controlled by the Browser. For example, the browser may be configured to only access Web sites containing a certain top level comain name. Alternatively, the browser may be configured to only access Web sites that have a certain type of address. In this manner, the invention provides a system and method to control the Web sites that a user may access.

Description

SYSTEM AND METHOD FOR PROVIDING MULTIPLE LEVELS OF ACCESS TO COMPUTER NETWORK CONTENT
Field of the Invention
The present invention relates to a system and method for providing multiple levels of access to content provided on computer networks and multiple levels of access to computer network communication protocols such as electronic mail (Email) and chat rooms.
Background of the Invention
Computer networks, such as the Internet or World Wide Web ("Web," collectively) provide access to immeasurable amounts of content. However, due to age, maturity, religious beliefs, cultural beliefs, personal tastes, and other reasons, all of the available content is not suitable for all of the potential viewers. In addition, computer networks provide the ability to communicate, in a relatively anonymous fashion, using Email or chat rooms. Too often, users receive unsolicited and unwanted communications containing, likewise, objectionable material.
Schemes exist that attempt to restrict the types of content or communications received over a given network. However, due to their manner of operation, existing schemes are not foolproof and still allow objectionable material to reach the user. For example, some schemes filter computer network content at the user's computer by blocking access to sites containing keywords or phrases predetermined as objectionable.
Filtering schemes are often unsatisfactory because they are both under inclusive and over exclusive. For example, some sites may present objectionable material without the use of a forbidden keyword, thus, including material that should be excluded. In addition, sites may contain a word or words that may have both objectionable and unobjectionable meanings. For example, a site providing content related to carpentry may contain the words "joint" and "butt" in descriptions of various joinery techniques. However, "joint" and "butt" may be on the excluded list due to their frequent use on potentially objectionable sites relating to drug use and pornography respectively. Thus, the filter is over exclusive to the user interested in carpentry joinery techniques. Other drawbacks exist. Other proposed access schemes involve restricting access based upon user identification information. For example, some operating systems and Web browsers allow the creation of user profiles. The profile contains an indication that the user is of a particular age (e.g., child, teen, adult, etc.). When the user accesses a particular site the user profile is transmitted to the server hosting the site. One proposed scheme is for the server to block access to the site if the user profile indicates that the user is not of proper age to view the content as determined by the party hosting or providing the site. One drawback is that the success of this type of restricted access relies on Web site host server compliance and many Web sites may not have an incentive to restrict access to their content (e.g., commercial sites desiring as large an audience as possible). Other drawbacks exist.
Another proposed filtering scheme involves limiting access to a certain list of pre-approved sites. Under this scheme, a software module is downloaded into the operating system of a user's machine. This module verifies that each uniform resource locator (URL) entered in the Web browser is one that is on the list of pre-approved sites. One problem with this approach is the pre-approved list is at the discretion of the software module provider. Thus, sites that some users do not find objectionable are blocked anyway because the software module provider has restricted access. Also, using a pre-approved site list offers little flexibility to add or delete sites at a later time. In addition, once a site that has been programmed into a pre-approved list there is no guarantee that anyone will monitor that site to make sure the site stays approval compliant or appropriate. Filtering by pre-approval of sites is not always able to prohibit a child from following links off of an approved site out to inappropriate sites. Other drawbacks exist.
Summary of the Invention
Accordingly, one object of the invention is to overcome the above and other drawbacks in existing devices.
Another object of the invention is to provide a browser that filters Web sites according to a top level domain name. Another object of the invention is to provide a browser that filters content according to computer network address. Another object of the invention is to provide filters to screen email or chat room messages from all but the persons on a predetermined configurable list.
Another object of the invention is that a user's site access is not limited by restricted keywords. For example, systems that filter site content using keywords may restrict such important information as is provided in encyclopedias, medical references, or the like. The present invention does not limit site access based on a predetermined list of keywords.
In order to provide these, and other objects, the invention provides a computer network browser, capable of accessing Web sites. The particular Web sites that can be access are controlled by the browser. For example, the browser may be configured to only access Web sites containing a certain top level domain name. Alternatively, the browser may be configured to only access Web sites that have a certain type of address. In this manner, the invention provides a system and method to control the Web sites that a user may access. To enable other features of the invention, the system provides filters that restrict the email or chat room messages that a user may receive. For example, the browser (or other email or chat message interface) may be provided with a customizable list of addresses from which a user is willing to accept messages. Any message from an address not on the list will be blocked from reaching the user.
Brief Description of the Drawing
Figure 1 is a schematic of the overall system according to one embodiment of the invention.
Figure 2 is one embodiment of a child appropriate browser interface. Figure 3 is a home page according to one embodiment of the invention. Figure 4 is one embodiment of one safeguard provided by the invention.
Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions.
Figure 6 is a schematic representation of the filtering according to one embodiment of the invention. Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention. Detailed Description of the Preferred Embodiments
One embodiment of the invention is best described with reference to the following example demonstrating how the invention enables a parent to protect their child from viewing inappropriate Web content. In this embodiment, a parent activates the invention using a processor based device capable of viewing Web sites. For example, the processor based device may comprise, a personal computer, a laptop computer, a personal digital assistant (PDA), a Web enabled wireless phone, a suitably equipped television (e.g., Web TV), or other processor device capable of accessing and displaying Web content. The invention provides at least one browser capable of serving as a Web navigation interface. This browser is designed to only allow viewing of certain types of content. For example, the browser may comprise a child appropriate browser that is designed to display content appropriate for children.
Preferably, the invention provides a child appropriate browser that is designed to be attractive and usable by children. For example, the navigation buttons (i.e., back, forward, home, etc.) are preferably designed so as to appeal to children (e.g., cartoons, bright colors, large fonts, etc.), screen displays and layouts are likewise designed to be attractive to children.
In addition, the invention may provide access to certain child appropriate information as part of the browser interface. For example, money management information, such as The Dollar Digest from the Stein Roe Young Investor Fund, could be presented on the browser interface (e.g., as a scrolling "ticker tape" display). Similarly, news items from child appropriate news sources (e.g., Kidspost.com, from the Washington Post, sikids.com, from Sports Illustrated for Kids, etc.) may be presented as "current events" links on the browser interface. Trivia, games, and celebrity news may also be provided on the browser interface (e.g. , as part of a startup page or the like).
Preferably, the browser filters content by restricting the types of addresses that the browser will access. For example, the browser may limit access to addresses containing a particular top level domain extension. In particular, the top level domain name extension of ".kid" could be used to designate the types of Web sites that the child appropriate browser would access. In this manner, it may be the responsibility of the entity charged with assigning the .kid extension to police the content of any site having a .kid extension. Third parties (such as agencies) may also have part or all of this responsibility. Alternatively, the browser may restrict access to Web sites that contain a certain identifier in their address. For example, the identifier may comprise .kid as part of the address (e.g., www.toys.kid.com).
In addition, the invention provides for finer levels of parental supervision by restricting the Internet content displayed by the invention. For example, some embodiments of the invention may provide a number of Internet browsing zones based on a rating system. Approved sites may implement (hyper text markup language (html) and/or flashprogramming to recognize the different zones based on user ID and ratings setup information which would be set up at initial installation by the parents (e.g., during set up procedures). For example, National Geographic™ and The Smithsonian Institution may provide approved sites, but contain content that may be objectionable to some parents. By implementing the different. rating zones (e.g., "young child appoved" - - no pictures of violence or nudity, "12-15 year old approved" — fine art depictions of nudity only, etc.) embodiments of the invention display content for only certain pre- approved portions of those sites. In addition, embodiments of the invention provide for parental control over the
Email and chat messages that their child receives. The invention provides for the creation of a list of addresses from which receipt of a message is acceptable. For example, a child, or other user lacking a parental password, will not be able to Web chat or Email with someone that has not entered as an approved address. Approved addresses may be added under a parental control portion of the invention. Access to the parental control portion may be restricted, for example, by a parental password. The parental password may be configurable at installation, for example, to enable the parent to select a password. In addition, the password may be changeable at a later time so that the password may be varied. The approved address list may be described with reference to the following example. In this example, a child, Jane, comes home from school and has a new friend, Joan, she met at school. Jane tells her parent(s) that she would like to Email her new- friend Joan. It is the parent's responsibility to make sure that Joan is an appropriate person for Jane to associate with. If the parent(s) feel that Web contact with Joan is appropriate, Joan's address may be added to the approved address list by the parent, using the appropriate parental password. In this manner, parents can supervise the addresses (and hence, persons associated with those addresses) from which the child receives messages. If the parent does not agree to add Joan's address to the approved address list, Jane will not receive any messages bearing Jane's E-mail address in the "from" line.
Embodiments of the invention include additional browsers for enabling other levels of access to Web content. For example, a "teenage" browser may be included to enable access to sited appropriate for teenage viewers. As described above, access may be limited by the use of a top level domain extension (e.g., ".teen") or by an identifier in the address (e.g., www.videogames.teen.com). A "regular" or unrestricted browser may be included to allow unrestricted access to all sites including those appropriate only for adults. For embodiments of the invention providing more than one browser type, access to the browser may be restricted by the use of appropriate protections. For example, the unrestricted browser may be password protected to prevent unauthorized users from accessing the browser.
These embodiments of the invention may be described with reference to the following example. In this example embodiment, a family (e.g., the Doe family) installs the browser interface portion of the invention on their home computer. The Doe family has young children and teen age children and the parents themselves like to browse the web. The invention provides three separate interfaces for Web browsing. For example, the youngest Doe children access the Web using the child appropriate interface. For example, the children may enter a password or "click on" an appropriate icon. Activation of the child appropriate interface loads an interface which has information, colors, figures, and navigation aids to which young children relate (e.g., Teletubbies,™ Barney,™ etc.). When the teenage Doe accesses the Web, he activates his version of the interface (e.g., he selects his icon or enters his password, etc.). Once activated, the browser pulls up information that the teenager can relate to such as, trends in music, sports and clothing. Should the teen or child try to activate the adult browser interface (e.g., by choosing the adult icon) which holds the "set up" information, as well as, full access to the Web, they will not be allowed access without entering the chosen password of their parents. The above examples, describe a few embodiments of the invention. Other features and objects will be apparent from the following description of the Figures.
Figure 1 shows a schematic of the overall system 10 according to one embodiment of the invention. As shown, a hosting center 12 may be provided. Hosting center 12 may comprise a network of content providing servers 14A and 14B. The servers may comprise dedicated servers (e.g., 14A) or shared servers (e.g., 14B). Communication between the servers 14A, 14B, may be accomplished in any suitable fashion. For example the servers may comprise a distributed network of servers. Servers 14A, 14B provide suitable content for child or teenage Web browsers.
As described herein, the URL to identify content files on servers 14A, 14B may be designated by a specific top level domain name (e.g., ".kid").
In one embodiment of the invention, servers 14A, 14B, are associated with a URL that has a viewer appropriate designation in the name. For example, the URL may comprise identifier such as ".kid" as part of the locator in addition to the top level domain designator (e.g., www.toysite.kid.com).
Embodiments of the invention filter Internet addresses to restrict browsing to those addresses containing a specified top level domain name or sub level domain name. In some embodiments, filtering may be performed at the browser level. For example, the browser will not transmit (e.g., via transmission control protocol/Internet protocol (TCP/IP)) addresses without the proper top level or sub level domain name. In some embodiments, filtering may occur after the address has been resolved into a numerical Internet address by a resolver. Wherein a resolver is the software in TCP IP that sends requests to a domain name server to convert hostnames (such as www.site.com) to Internet addresses (such as 117.123.4.2).
In some embodiments, a firewall 16 may be provided to ensure security of servers 14A, 14B. Firewall 16 may comprise any suitable security measures which prevent unauthorized access to servers 14A, 14B (e.g., preventing access by hackers 18). User processor device 20 is enabled to access the hosting center 12. Access may be accomplished in any suitable manner. For example, access may be accomplished through dial-up telephone connection, through wireless network connection, through LAN, WAN, or other network connection.
As described herein, processor device 20 may comprise any suitable Web browsing device. For example, processor 20 may comprise a personal computer (PC), a Web enabled cellular phone, a Web enabled television, a personal digital assistant (PDA), a mainframe terminal, or any other suitable device.
Processor device 20 may comprise the appropriate software modules to enable Web browsing according to the present invention. For example, processor device 20 may comprise browser interface software for child appropriate Web browsing, browser interface software for teenage appropriate Web browsing, browser interface software for unrestricted (i.e., adult) Web browsing, and any other browser categories that are convenient. Some embodiments of the invention include packaging more than one browser to form a suite of browsers. For example, a family having members of various ages may install an adult (or unrestricted browser), a teen browser and a kid browser on a single processor device.
In addition, processor device 20 may comprise the appropriate software modules to restrict access to the various browser interfaces. For example, processor device 20 may comprise software modules to enable the approved Email address lists, the parental password features, and other restricted access features as described herein.
As shown, processor device 20 also provides access to the Web 22. Access to the Web 22 is enabled through the use of passwords or other appropriate parental controls as described herein.
Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention. As shown, the process initiates at step 70 by obtaining the software to enable the restricted browser. As shown the software may be obtained in any suitable manner. For example, the user may download the software from the Web at step 72 or obtain a CD or floppy disk containing the software at step 74.
The software to enable the restricted browser may comprise a plug-in that modifies an existing browser (e.g., Netscape Navigator,™ Microsoft Internet Explorer,™ or the like) or it may comprise a complete browser package.
At step 76 the software is installed on an appropriate processor device (e.g., processor 20). In some embodiments, portions of the software will process an algorithm at the Internet Protocol (IP) level.
At step 78 set up procedures may be implemented. Set up procedures may include selecting a password, a user identification number, various viewing rating levels, the types of content to be displayed, the acceptable E-mail address list, and other features of parental control described herein. Set up procedures 78 may be implemented through check boxes, menus, buttons, set up "wizards," or other acceptable user input technique.
At step 80, certain over writing procedures may be implemented to insure that the restricted browser software remains operative on the processor device 20. For example, as mentioned above set up procedures 78 may include a password and user ID which will only authorize the IP standard protocol to work using that user ID and passcode. Launching another software application that requires TCP/IP or point-to-point protocol (PPP) to send and receive data over any communications tool (e.g., NetScape, ICQ, AIM, AOL, filesharing, etc.) the restricted browser software will require the user ID and password to complete the launch of these applications.
In addition, within the restricted browser software a daemon (i.e., a program that runs continuously in the background, until it is activated by a particular event) will embed itself on the hard drive so if new software applications are installed or the drive is erased or TCP/IP or PPP is replaced it will counteract as a guard telling the system files that the restricted browser software once resided within the TCP/IP or PPP extension. For example, if a child erases TCP/IP or PPP and installs a newer version of TCP/IP or PPP the daemon, which is written on the root level directory at that point, would recommend the new software that is being downloaded to reinstall the restricted browser software or enter username and password to proceed. In this manner, the restricted browser software may not be easily removed without use of the parental password or user ID. Additionally, these procedures make it difficult for a non-restricted browser to be installed on the processor 20 without parental acquiescence.
The above description is but one embodiment of the invention. It is understood that the above described processes may occur quasi-simultaneously, in a different order, or at spaced intervals of time.
Figure 2 shows one embodiment of a child appropriate browser interface 24. As shown, the interface 24 may include appropriate Web navigational tools 26. As is known in the art, the navigational tools 26 may comprise various icons, buttons, pull- down menus, or other appropriate devices. For example, back button 27, forward button 28, stop button 29, reload button 30, search button 31 home button 32, print button 33, and tools button 34 may be provided to accomplish their known functions. As shown, the appearance of interface 26 may be designed with icons, pictures, colors, symbols, links, and other devices, that are attractive and appropriate for a child user. For example, icon 36 may be provided as a link to an appropriate child content site (e.g., a children's television network site), link 37 may be provided to a child appropriate computer game, or other child appropriate content may be provided. Figure 3 shows a home page 40 according to one embodiment of the invention. Home page 40 may be provided as a preliminary access point to a hosting center 12 network. As shown, home page 40 may comprise the usual home page features and attributes known in the art. For example, a log-in link 42 may be provided to allow enhanced access to registered customers, links 44 may be provided to enable access to various other Web site pages, link 46 may be provided to enable users to download software updates and other files, and other home page features may be provided.
Figure 4 shows one embodiment of one safeguard provided by the invention. As shown, a Web page 50 is presently displayed by the interface (e.g., a child appropriate browser). If a user attempts to access a Web page that does not contain the proper URL (e.g., a .kid extension or top level domain name) a warning message 52 may appear in the interface view. The warning 52 may comprise a pop-up window or other message known in the art. The warning 52 may instruct the user that access to the selected Web page is not authorized. In some embodiments, the user may be prompted to input a password or other appropriate security device in order to access the page.
Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions. As shown, an access denial 54 is presented to the user upon the failure to satisfy a pre-determined security measure. For example, the user may have entered an incorrect URL or password and has, subsequently been denied access to the page. As described herein, other security measures are possible. For example, the browser interface may automatically load an approved Web page (e.g., home page 40) upon the denial of access.
Figure 6 shows a filtering routine 100 according to one embodiment of the invention. As shown, filtering routine 100 may commence upon activation of a browser at step 102. In some embodiments activation 102 may comprise selecting an icon from a desktop display, entering a run command, double clicking on the icon, or other method of initiating the browser software. In some embodiments, activation 102 may also include entering a password or performing other security measures to verify the identity of the user. After activation 102, the user selects a Web destination at step 104. Selection of a Web destination may be accomplished in any suitable manner. For example, the user may select a destination from a list of stored "bookmarks" or "favorites," the user may type a destination into an address field, the user may follow links provided on a home page, or the user may use features of the browser interface (e.g., the navigation buttons) to choose a destination.
The invention will, at step 106, perform a verification routine to ensure that the selected destination is appropriate. For embodiments of the invention that restrict access according to a top level domain extension, verification step 106 may comprise checking that the address includes the proper extension (e.g., .kid, or the like). For example, the browser interface may be configured to not accept any URL that does not contain the proper extension. For embodiments of the invention that restrict access according to an identifier, step 106 may comprise checking that the address includes the proper identifier (e.g., .kid.com, or the like).
If the destination is determined to be inappropriate at step 106, the invention implements alternate procedures at step 108. Alternate procedures 108 may comprise any suitable method of restricting access to the inappropriate destination. For example, the invention may cause the browser to display an error message (e.g., page restricted - access denied), return to a home page, proceed to a known appropriate destination, prompt the user for an appropriate destination, or other suitable response. For example, the browser may display an "unable to locate the server" message or display a simple written notification along with sound notification.
If the destination is determined to be appropriate at step 106, the invention enables the browser to access the destination at step 110.
The above description is meant to be one example of the operation of the system according to one embodiment of the invention. Different ordering of the steps above may be implemented in other embodiments of the invention. Other variations are possible . and are within the scope of the invention. The specification and examples should be considered exemplary only. The scope of the invention is only limited by the claims appended hereto.

Claims

Claims I claim:
1. A method for providing Web browsing with restricted access to Web pages according to the Web site address which is indicative of the content provided on the Web page, the method comprising: activating a Web browser, wherein the Web browser is enabled to access a predetermined category of Web site addresses; selecting a Web site address for the Web browser to access; verifying whether the Web site address selected satisfies predetermined criteria wherein the predetermined criteria relate to the content provided at the
Web site address selected; initiating predetermined actions if the Web site address selected does not satisfy the predetermined criteria; and enabling access to the Web site address selected if the predetermined criteria are satisfied.
2. The method of claim 1, wherein the predetermined category of Web site addresses is determined according to top level domain name.
3. The method of claim 2, wherein the top level domain name comprises the identifier kid.
4. The method of claim 1, wherein the predetermined criteria relate to content that is appropriate for users that are children.
5. The method of claim 1, wherein the predetermined criteria relate to content that is appropriate for users that are teenagers.
6. A system for providing restricted Web browsing, the system comprising: at least one Web browser interface enabled to recognize Web site addresses belonging to a predetermined category of Web site addresses; a Web site address identification module that enables the identification of selected Web addresses according to predetermined criteria related to the predetermined category of Web site addresses; and a security module that enables the use of security measures to control access to the at least one browser interface.
7. The system of claim 6, wherein the predetermined category of Web site addresses comprises addresses containing content related identifier in the top level domain name.
8. The system of claim 7, wherein the content related identifier comprises a ".kid" extension as part of the domain name.
9. A system for providing differing levels of access to Web site content, the system comprising: a first browser interface, wherein the first browser interface is enabled to access Web site addresses belonging to a first category; a second browser interface, wherein the second browser interface is enabled to access Web site addresses belonging to a second category; and a security module to restrict access to the second browser interface according to predetermined security procedures.
10. The system of claim 9, wherein the first category comprises Web site addresses that comprise an identifier indicative of content appropriate for child age viewers.
11. The system of claim 10, wherein the identifier comprises a uniform resource locator (URL) that comprises the term ".kid" as part of the URL.
12. The system of claim 9, wherein the predetermined security procedures comprise restricting access through a use of a password.
13. A method for restricting the receipt of E-mail, the method comprising: providing an approved sender list comprising E-mail addresses from which receipt of an E-mail message is authorized; providing an access control means to restrict access to the approved sender list; transmitting only E-mail messages that originate from an E-mail address listed on the approved sender list.
14. The method of claim 13, wherein the access control means comprises a parental password.
PCT/US2001/020785 2000-06-29 2001-06-29 System and method for providing multiple levels of access to computer network content WO2002003167A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001271651A AU2001271651A1 (en) 2000-06-29 2001-06-29 System and method for providing multiple levels of access to computer network content

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60587600A 2000-06-29 2000-06-29
US09/605,876 2000-06-29

Publications (2)

Publication Number Publication Date
WO2002003167A2 true WO2002003167A2 (en) 2002-01-10
WO2002003167A3 WO2002003167A3 (en) 2012-02-02

Family

ID=24425561

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/020785 WO2002003167A2 (en) 2000-06-29 2001-06-29 System and method for providing multiple levels of access to computer network content

Country Status (2)

Country Link
AU (1) AU2001271651A1 (en)
WO (1) WO2002003167A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004059941A1 (en) * 2002-12-30 2004-07-15 Koninklijke Philips Electronics N.V. User access control to a server content from an information carrier player
GB2481356A (en) * 2011-02-07 2011-12-21 F Secure Corp Controlling Internet access using DNS root server reputation
JP2014102568A (en) * 2012-11-16 2014-06-05 Nintendo Co Ltd Information processing system, information processing device, information processing program, and information processing method
US20150178516A1 (en) * 2013-12-23 2015-06-25 Dropbox, Inc. Restricting access to content

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US6393464B1 (en) * 1999-05-10 2002-05-21 Unbound Communications, Inc. Method for controlling the delivery of electronic mail messages

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US6393464B1 (en) * 1999-05-10 2002-05-21 Unbound Communications, Inc. Method for controlling the delivery of electronic mail messages

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004059941A1 (en) * 2002-12-30 2004-07-15 Koninklijke Philips Electronics N.V. User access control to a server content from an information carrier player
GB2481356A (en) * 2011-02-07 2011-12-21 F Secure Corp Controlling Internet access using DNS root server reputation
GB2481356B (en) * 2011-02-07 2012-06-13 F Secure Corp Controlling internet access using dns root server reputation
GB2487789A (en) * 2011-02-07 2012-08-08 F Secure Corp Controlling Internet access using DNS root reputation
US8499077B2 (en) 2011-02-07 2013-07-30 F-Secure Corporation Controlling internet access using DNS root server reputation
JP2014102568A (en) * 2012-11-16 2014-06-05 Nintendo Co Ltd Information processing system, information processing device, information processing program, and information processing method
US20150178516A1 (en) * 2013-12-23 2015-06-25 Dropbox, Inc. Restricting access to content
US9817987B2 (en) * 2013-12-23 2017-11-14 Dropbox, Inc. Restricting access to content
US11372990B2 (en) 2013-12-23 2022-06-28 Dropbox, Inc. Restricting access to content

Also Published As

Publication number Publication date
AU2001271651A8 (en) 2012-02-23
WO2002003167A3 (en) 2012-02-02
AU2001271651A1 (en) 2002-01-14

Similar Documents

Publication Publication Date Title
EP1376981B1 (en) Parental controls customization and notification
US7353234B2 (en) Customized user interface based on user record information
US7555721B2 (en) Customized user interface
US20180225474A1 (en) Messaging systems and methods
US6571256B1 (en) Method and apparatus for providing pre-screened content
US8280979B2 (en) Persistent public machine setting
US20110047606A1 (en) Method And System For Storing And Using A Plurality Of Passwords
US20030004897A1 (en) Method and system for communicating user specific information
JP2002082912A (en) Carrier free terminal authentication system using mail back system
WO2009138977A1 (en) Encrypted banner overlays
US20010033297A1 (en) Internet conduit providing a safe and secure environment
WO2002003167A2 (en) System and method for providing multiple levels of access to computer network content
KR20050088477A (en) Content access control from an information carrier player
WO2008014336A2 (en) Network security software employing multi-factor authentication and related process
Whitworth Politeness as a social software requirement
KR100449863B1 (en) Method for protecting an adult web site
Sullivan Online Predators: A Parent's Guide for the Virtual Playground
WO2002044861A2 (en) Method of establishing a connection between a remote computer device and server through off-line authentication

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)