SYSTEM AND METHOD FOR PROVIDING MULTIPLE LEVELS OF ACCESS TO COMPUTER NETWORK CONTENT
Field of the Invention
The present invention relates to a system and method for providing multiple levels of access to content provided on computer networks and multiple levels of access to computer network communication protocols such as electronic mail (Email) and chat rooms.
Background of the Invention
Computer networks, such as the Internet or World Wide Web ("Web," collectively) provide access to immeasurable amounts of content. However, due to age, maturity, religious beliefs, cultural beliefs, personal tastes, and other reasons, all of the available content is not suitable for all of the potential viewers. In addition, computer networks provide the ability to communicate, in a relatively anonymous fashion, using Email or chat rooms. Too often, users receive unsolicited and unwanted communications containing, likewise, objectionable material.
Schemes exist that attempt to restrict the types of content or communications received over a given network. However, due to their manner of operation, existing schemes are not foolproof and still allow objectionable material to reach the user. For example, some schemes filter computer network content at the user's computer by blocking access to sites containing keywords or phrases predetermined as objectionable.
Filtering schemes are often unsatisfactory because they are both under inclusive and over exclusive. For example, some sites may present objectionable material without the use of a forbidden keyword, thus, including material that should be excluded. In addition, sites may contain a word or words that may have both objectionable and unobjectionable meanings. For example, a site providing content related to carpentry may contain the words "joint" and "butt" in descriptions of various joinery techniques. However, "joint" and "butt" may be on the excluded list due to their frequent use on potentially objectionable sites relating to drug use and pornography respectively. Thus, the filter is over exclusive to the user interested in carpentry joinery techniques. Other drawbacks exist.
Other proposed access schemes involve restricting access based upon user identification information. For example, some operating systems and Web browsers allow the creation of user profiles. The profile contains an indication that the user is of a particular age (e.g., child, teen, adult, etc.). When the user accesses a particular site the user profile is transmitted to the server hosting the site. One proposed scheme is for the server to block access to the site if the user profile indicates that the user is not of proper age to view the content as determined by the party hosting or providing the site. One drawback is that the success of this type of restricted access relies on Web site host server compliance and many Web sites may not have an incentive to restrict access to their content (e.g., commercial sites desiring as large an audience as possible). Other drawbacks exist.
Another proposed filtering scheme involves limiting access to a certain list of pre-approved sites. Under this scheme, a software module is downloaded into the operating system of a user's machine. This module verifies that each uniform resource locator (URL) entered in the Web browser is one that is on the list of pre-approved sites. One problem with this approach is the pre-approved list is at the discretion of the software module provider. Thus, sites that some users do not find objectionable are blocked anyway because the software module provider has restricted access. Also, using a pre-approved site list offers little flexibility to add or delete sites at a later time. In addition, once a site that has been programmed into a pre-approved list there is no guarantee that anyone will monitor that site to make sure the site stays approval compliant or appropriate. Filtering by pre-approval of sites is not always able to prohibit a child from following links off of an approved site out to inappropriate sites. Other drawbacks exist.
Summary of the Invention
Accordingly, one object of the invention is to overcome the above and other drawbacks in existing devices.
Another object of the invention is to provide a browser that filters Web sites according to a top level domain name. Another object of the invention is to provide a browser that filters content according to computer network address.
Another object of the invention is to provide filters to screen email or chat room messages from all but the persons on a predetermined configurable list.
Another object of the invention is that a user's site access is not limited by restricted keywords. For example, systems that filter site content using keywords may restrict such important information as is provided in encyclopedias, medical references, or the like. The present invention does not limit site access based on a predetermined list of keywords.
In order to provide these, and other objects, the invention provides a computer network browser, capable of accessing Web sites. The particular Web sites that can be access are controlled by the browser. For example, the browser may be configured to only access Web sites containing a certain top level domain name. Alternatively, the browser may be configured to only access Web sites that have a certain type of address. In this manner, the invention provides a system and method to control the Web sites that a user may access. To enable other features of the invention, the system provides filters that restrict the email or chat room messages that a user may receive. For example, the browser (or other email or chat message interface) may be provided with a customizable list of addresses from which a user is willing to accept messages. Any message from an address not on the list will be blocked from reaching the user.
Brief Description of the Drawing
Figure 1 is a schematic of the overall system according to one embodiment of the invention.
Figure 2 is one embodiment of a child appropriate browser interface. Figure 3 is a home page according to one embodiment of the invention. Figure 4 is one embodiment of one safeguard provided by the invention.
Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions.
Figure 6 is a schematic representation of the filtering according to one embodiment of the invention. Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention.
Detailed Description of the Preferred Embodiments
One embodiment of the invention is best described with reference to the following example demonstrating how the invention enables a parent to protect their child from viewing inappropriate Web content. In this embodiment, a parent activates the invention using a processor based device capable of viewing Web sites. For example, the processor based device may comprise, a personal computer, a laptop computer, a personal digital assistant (PDA), a Web enabled wireless phone, a suitably equipped television (e.g., Web TV), or other processor device capable of accessing and displaying Web content. The invention provides at least one browser capable of serving as a Web navigation interface. This browser is designed to only allow viewing of certain types of content. For example, the browser may comprise a child appropriate browser that is designed to display content appropriate for children.
Preferably, the invention provides a child appropriate browser that is designed to be attractive and usable by children. For example, the navigation buttons (i.e., back, forward, home, etc.) are preferably designed so as to appeal to children (e.g., cartoons, bright colors, large fonts, etc.), screen displays and layouts are likewise designed to be attractive to children.
In addition, the invention may provide access to certain child appropriate information as part of the browser interface. For example, money management information, such as The Dollar Digest from the Stein Roe Young Investor Fund, could be presented on the browser interface (e.g., as a scrolling "ticker tape" display). Similarly, news items from child appropriate news sources (e.g., Kidspost.com, from the Washington Post, sikids.com, from Sports Illustrated for Kids, etc.) may be presented as "current events" links on the browser interface. Trivia, games, and celebrity news may also be provided on the browser interface (e.g. , as part of a startup page or the like).
Preferably, the browser filters content by restricting the types of addresses that the browser will access. For example, the browser may limit access to addresses containing a particular top level domain extension. In particular, the top level domain name extension of ".kid" could be used to designate the types of Web sites that the child appropriate browser would access. In this manner, it may be the responsibility of the entity charged with assigning the .kid extension to police the content of any site having a .kid extension. Third parties (such as agencies) may also have part or all of this responsibility. Alternatively, the browser may restrict access to Web sites that contain a
certain identifier in their address. For example, the identifier may comprise .kid as part of the address (e.g., www.toys.kid.com).
In addition, the invention provides for finer levels of parental supervision by restricting the Internet content displayed by the invention. For example, some embodiments of the invention may provide a number of Internet browsing zones based on a rating system. Approved sites may implement (hyper text markup language (html) and/or flashprogramming to recognize the different zones based on user ID and ratings setup information which would be set up at initial installation by the parents (e.g., during set up procedures). For example, National Geographic™ and The Smithsonian Institution may provide approved sites, but contain content that may be objectionable to some parents. By implementing the different. rating zones (e.g., "young child appoved" - - no pictures of violence or nudity, "12-15 year old approved" — fine art depictions of nudity only, etc.) embodiments of the invention display content for only certain pre- approved portions of those sites. In addition, embodiments of the invention provide for parental control over the
Email and chat messages that their child receives. The invention provides for the creation of a list of addresses from which receipt of a message is acceptable. For example, a child, or other user lacking a parental password, will not be able to Web chat or Email with someone that has not entered as an approved address. Approved addresses may be added under a parental control portion of the invention. Access to the parental control portion may be restricted, for example, by a parental password. The parental password may be configurable at installation, for example, to enable the parent to select a password. In addition, the password may be changeable at a later time so that the password may be varied. The approved address list may be described with reference to the following example. In this example, a child, Jane, comes home from school and has a new friend, Joan, she met at school. Jane tells her parent(s) that she would like to Email her new- friend Joan. It is the parent's responsibility to make sure that Joan is an appropriate person for Jane to associate with. If the parent(s) feel that Web contact with Joan is appropriate, Joan's address may be added to the approved address list by the parent, using the appropriate parental password. In this manner, parents can supervise the addresses (and hence, persons associated with those addresses) from which the child receives messages. If the parent does not agree to add Joan's address to the approved
address list, Jane will not receive any messages bearing Jane's E-mail address in the "from" line.
Embodiments of the invention include additional browsers for enabling other levels of access to Web content. For example, a "teenage" browser may be included to enable access to sited appropriate for teenage viewers. As described above, access may be limited by the use of a top level domain extension (e.g., ".teen") or by an identifier in the address (e.g., www.videogames.teen.com). A "regular" or unrestricted browser may be included to allow unrestricted access to all sites including those appropriate only for adults. For embodiments of the invention providing more than one browser type, access to the browser may be restricted by the use of appropriate protections. For example, the unrestricted browser may be password protected to prevent unauthorized users from accessing the browser.
These embodiments of the invention may be described with reference to the following example. In this example embodiment, a family (e.g., the Doe family) installs the browser interface portion of the invention on their home computer. The Doe family has young children and teen age children and the parents themselves like to browse the web. The invention provides three separate interfaces for Web browsing. For example, the youngest Doe children access the Web using the child appropriate interface. For example, the children may enter a password or "click on" an appropriate icon. Activation of the child appropriate interface loads an interface which has information, colors, figures, and navigation aids to which young children relate (e.g., Teletubbies,™ Barney,™ etc.). When the teenage Doe accesses the Web, he activates his version of the interface (e.g., he selects his icon or enters his password, etc.). Once activated, the browser pulls up information that the teenager can relate to such as, trends in music, sports and clothing. Should the teen or child try to activate the adult browser interface (e.g., by choosing the adult icon) which holds the "set up" information, as well as, full access to the Web, they will not be allowed access without entering the chosen password of their parents. The above examples, describe a few embodiments of the invention. Other features and objects will be apparent from the following description of the Figures.
Figure 1 shows a schematic of the overall system 10 according to one embodiment of the invention. As shown, a hosting center 12 may be provided. Hosting
center 12 may comprise a network of content providing servers 14A and 14B. The servers may comprise dedicated servers (e.g., 14A) or shared servers (e.g., 14B). Communication between the servers 14A, 14B, may be accomplished in any suitable fashion. For example the servers may comprise a distributed network of servers. Servers 14A, 14B provide suitable content for child or teenage Web browsers.
As described herein, the URL to identify content files on servers 14A, 14B may be designated by a specific top level domain name (e.g., ".kid").
In one embodiment of the invention, servers 14A, 14B, are associated with a URL that has a viewer appropriate designation in the name. For example, the URL may comprise identifier such as ".kid" as part of the locator in addition to the top level domain designator (e.g., www.toysite.kid.com).
Embodiments of the invention filter Internet addresses to restrict browsing to those addresses containing a specified top level domain name or sub level domain name. In some embodiments, filtering may be performed at the browser level. For example, the browser will not transmit (e.g., via transmission control protocol/Internet protocol (TCP/IP)) addresses without the proper top level or sub level domain name. In some embodiments, filtering may occur after the address has been resolved into a numerical Internet address by a resolver. Wherein a resolver is the software in TCP IP that sends requests to a domain name server to convert hostnames (such as www.site.com) to Internet addresses (such as 117.123.4.2).
In some embodiments, a firewall 16 may be provided to ensure security of servers 14A, 14B. Firewall 16 may comprise any suitable security measures which prevent unauthorized access to servers 14A, 14B (e.g., preventing access by hackers 18). User processor device 20 is enabled to access the hosting center 12. Access may be accomplished in any suitable manner. For example, access may be accomplished through dial-up telephone connection, through wireless network connection, through LAN, WAN, or other network connection.
As described herein, processor device 20 may comprise any suitable Web browsing device. For example, processor 20 may comprise a personal computer (PC), a Web enabled cellular phone, a Web enabled television, a personal digital assistant (PDA), a mainframe terminal, or any other suitable device.
Processor device 20 may comprise the appropriate software modules to enable Web browsing according to the present invention. For example, processor device 20
may comprise browser interface software for child appropriate Web browsing, browser interface software for teenage appropriate Web browsing, browser interface software for unrestricted (i.e., adult) Web browsing, and any other browser categories that are convenient. Some embodiments of the invention include packaging more than one browser to form a suite of browsers. For example, a family having members of various ages may install an adult (or unrestricted browser), a teen browser and a kid browser on a single processor device.
In addition, processor device 20 may comprise the appropriate software modules to restrict access to the various browser interfaces. For example, processor device 20 may comprise software modules to enable the approved Email address lists, the parental password features, and other restricted access features as described herein.
As shown, processor device 20 also provides access to the Web 22. Access to the Web 22 is enabled through the use of passwords or other appropriate parental controls as described herein.
Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention. As shown, the process initiates at step 70 by obtaining the software to enable the restricted browser. As shown the software may be obtained in any suitable manner. For example, the user may download the software from the Web at step 72 or obtain a CD or floppy disk containing the software at step 74.
The software to enable the restricted browser may comprise a plug-in that modifies an existing browser (e.g., Netscape Navigator,™ Microsoft Internet Explorer,™ or the like) or it may comprise a complete browser package.
At step 76 the software is installed on an appropriate processor device (e.g., processor 20). In some embodiments, portions of the software will process an algorithm at the Internet Protocol (IP) level.
At step 78 set up procedures may be implemented. Set up procedures may include selecting a password, a user identification number, various viewing rating levels, the types of content to be displayed, the acceptable E-mail address list, and other features of parental control described herein. Set up procedures 78 may be implemented through check boxes, menus, buttons, set up "wizards," or other acceptable user input technique.
At step 80, certain over writing procedures may be implemented to insure that the restricted browser software remains operative on the processor device 20. For example,
as mentioned above set up procedures 78 may include a password and user ID which will only authorize the IP standard protocol to work using that user ID and passcode. Launching another software application that requires TCP/IP or point-to-point protocol (PPP) to send and receive data over any communications tool (e.g., NetScape, ICQ, AIM, AOL, filesharing, etc.) the restricted browser software will require the user ID and password to complete the launch of these applications.
In addition, within the restricted browser software a daemon (i.e., a program that runs continuously in the background, until it is activated by a particular event) will embed itself on the hard drive so if new software applications are installed or the drive is erased or TCP/IP or PPP is replaced it will counteract as a guard telling the system files that the restricted browser software once resided within the TCP/IP or PPP extension. For example, if a child erases TCP/IP or PPP and installs a newer version of TCP/IP or PPP the daemon, which is written on the root level directory at that point, would recommend the new software that is being downloaded to reinstall the restricted browser software or enter username and password to proceed. In this manner, the restricted browser software may not be easily removed without use of the parental password or user ID. Additionally, these procedures make it difficult for a non-restricted browser to be installed on the processor 20 without parental acquiescence.
The above description is but one embodiment of the invention. It is understood that the above described processes may occur quasi-simultaneously, in a different order, or at spaced intervals of time.
Figure 2 shows one embodiment of a child appropriate browser interface 24. As shown, the interface 24 may include appropriate Web navigational tools 26. As is known in the art, the navigational tools 26 may comprise various icons, buttons, pull- down menus, or other appropriate devices. For example, back button 27, forward button 28, stop button 29, reload button 30, search button 31 home button 32, print button 33, and tools button 34 may be provided to accomplish their known functions. As shown, the appearance of interface 26 may be designed with icons, pictures, colors, symbols, links, and other devices, that are attractive and appropriate for a child user. For example, icon 36 may be provided as a link to an appropriate child content site (e.g., a children's television network site), link 37 may be provided to a child appropriate computer game, or other child appropriate content may be provided.
Figure 3 shows a home page 40 according to one embodiment of the invention. Home page 40 may be provided as a preliminary access point to a hosting center 12 network. As shown, home page 40 may comprise the usual home page features and attributes known in the art. For example, a log-in link 42 may be provided to allow enhanced access to registered customers, links 44 may be provided to enable access to various other Web site pages, link 46 may be provided to enable users to download software updates and other files, and other home page features may be provided.
Figure 4 shows one embodiment of one safeguard provided by the invention. As shown, a Web page 50 is presently displayed by the interface (e.g., a child appropriate browser). If a user attempts to access a Web page that does not contain the proper URL (e.g., a .kid extension or top level domain name) a warning message 52 may appear in the interface view. The warning 52 may comprise a pop-up window or other message known in the art. The warning 52 may instruct the user that access to the selected Web page is not authorized. In some embodiments, the user may be prompted to input a password or other appropriate security device in order to access the page.
Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions. As shown, an access denial 54 is presented to the user upon the failure to satisfy a pre-determined security measure. For example, the user may have entered an incorrect URL or password and has, subsequently been denied access to the page. As described herein, other security measures are possible. For example, the browser interface may automatically load an approved Web page (e.g., home page 40) upon the denial of access.
Figure 6 shows a filtering routine 100 according to one embodiment of the invention. As shown, filtering routine 100 may commence upon activation of a browser at step 102. In some embodiments activation 102 may comprise selecting an icon from a desktop display, entering a run command, double clicking on the icon, or other method of initiating the browser software. In some embodiments, activation 102 may also include entering a password or performing other security measures to verify the identity of the user. After activation 102, the user selects a Web destination at step 104. Selection of a Web destination may be accomplished in any suitable manner. For example, the user may select a destination from a list of stored "bookmarks" or "favorites," the user may type a destination into an address field, the user may follow links provided on a home
page, or the user may use features of the browser interface (e.g., the navigation buttons) to choose a destination.
The invention will, at step 106, perform a verification routine to ensure that the selected destination is appropriate. For embodiments of the invention that restrict access according to a top level domain extension, verification step 106 may comprise checking that the address includes the proper extension (e.g., .kid, or the like). For example, the browser interface may be configured to not accept any URL that does not contain the proper extension. For embodiments of the invention that restrict access according to an identifier, step 106 may comprise checking that the address includes the proper identifier (e.g., .kid.com, or the like).
If the destination is determined to be inappropriate at step 106, the invention implements alternate procedures at step 108. Alternate procedures 108 may comprise any suitable method of restricting access to the inappropriate destination. For example, the invention may cause the browser to display an error message (e.g., page restricted - access denied), return to a home page, proceed to a known appropriate destination, prompt the user for an appropriate destination, or other suitable response. For example, the browser may display an "unable to locate the server" message or display a simple written notification along with sound notification.
If the destination is determined to be appropriate at step 106, the invention enables the browser to access the destination at step 110.
The above description is meant to be one example of the operation of the system according to one embodiment of the invention. Different ordering of the steps above may be implemented in other embodiments of the invention. Other variations are possible . and are within the scope of the invention. The specification and examples should be considered exemplary only. The scope of the invention is only limited by the claims appended hereto.