WO2001033371A1 - System and method of filtering adult content on the internet - Google Patents

System and method of filtering adult content on the internet Download PDF

Info

Publication number
WO2001033371A1
WO2001033371A1 PCT/US2000/041274 US0041274W WO0133371A1 WO 2001033371 A1 WO2001033371 A1 WO 2001033371A1 US 0041274 W US0041274 W US 0041274W WO 0133371 A1 WO0133371 A1 WO 0133371A1
Authority
WO
WIPO (PCT)
Prior art keywords
requested information
web browser
viewing
list
filtering
Prior art date
Application number
PCT/US2000/041274
Other languages
French (fr)
Inventor
Fabrice Chupin
David Smith
Scott Jarol
David Redkey
Original Assignee
Surfmonkey.Com, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Surfmonkey.Com, Inc. filed Critical Surfmonkey.Com, Inc.
Priority to AU19700/01A priority Critical patent/AU1970001A/en
Publication of WO2001033371A1 publication Critical patent/WO2001033371A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching

Definitions

  • the present invention relates generally to a web browser and methods thereof and more specifically to a web browser having embedded content filtering and methods thereof.
  • Internet Directory Services and Search Engines such as Yahoo®, HotBot® and others can provide order to the subject matter of the vast amount of information available.
  • Directory Servers are generally limited to categorizing Web Sites based on Keywords supplied by the site's content provider. Actual content is generally not verified.
  • Internet Search Engines typically provide results by matching the same Keywords to a specific user query to generate a list of matches for each specific query. Again, actual content of the matches is generally not checked. For some users, for example children, such unregulated access is undesirable. In addition, some young users have difficulty in navigating through the vast Internet resource and would benefit if assistance in accessing appropriate information could be made available.
  • a filter for interactive use with an Internet web browser for filtering adult content utilizes a filter database to screen information requested for viewing within a web browser.
  • the information is screened locally by a domain white list, an URL black list, and an URL white list.
  • the information is also screened remotely from a domain white list, an URL gray list, and an URL black list.
  • words within the requested web page are screened with a local word gray list and a local word black list to add further filtering features prior to displaying the web page to the user.
  • the amount of filtering is readily modified through local content access settings by a local supervisor and by the selection of the remote site(s) contacted for additional content access control information.
  • FIG. 1 is a schematic diagram illustrating a browser client requesting a web page over the internet from a requested server, wherein the browser client also accesses remote servers to help filter adult content from the requested web page, in accordance with the present invention
  • FIG. 2 is a block diagram of the browser client's computer shown in FIG. 1, in accordance with the present invention
  • FIG. 3 is a block diagram of one embodiment of the non-volatile memory module located within the browser client's computer of FIG. 2;
  • FIG. 4 is a schematic block diagram illustrating the browser and local filter database shown in the non- volatile memory module of FIG. 3 and how the web browser connects with a remote filter database;
  • FIG. 5 is a flowchart of a method for a supervisor to add or remove user limitations for web browsing, according to the invention
  • FIG. 6 is a flowchart depicting the manner in which screening and/or filtering aspects are applied within an embodiment in accordance with the present invention
  • FIG. 7 is a flowchart depicting the method of filtering continued from Process A in FIG. 6;
  • FIG. 8 is a flowchart depicting the method of filtering continued from Process B in FIG. 6, in accordance with the present invention.
  • FIG. 9 is a flowchart depicting the method of filtering continued from Step A in FIG. 8;
  • FIG. 10 is a flowchart depicting the method of filtering continued from Step B in FIG. 8;
  • FIG. 11 is a flowchart depicting the method of filtering continued from Consolidated Concurrent Processes A and B in FIG. 7 and FIG. 8, according to the present invention.
  • FIGs. 1-11 illustrate an embodiment in accordance with the present invention that is directed to filtering adult content on the internet within a web browser, other embodiments can be directed to adult users.
  • FIG. 1 a schematic diagram illustrating a browser client 102 requesting a web page over the internet 104 from a requested server 106, wherein the browser client 102 also accesses remote filter databases 108, 110, 112 at remote servers 114. 116 to help filter adult content from the requested web page.
  • FIG. 2 is a block diagram of the browser client's computer 102 shown in FIG. 1.
  • the browser client 102 includes a CPU 202, a ROM 204, a RAM 206, an Internet interface 208, a non-volatile memory 210, an input device 212, and a display 214.
  • the browser client 102 provides for a computer set-up that can run specific software to browse the Internet.
  • the non-volatile memory 206 includes an installer module 302, a web browser 304, an email module 306, a chat module 308, an animation module 310, and a local filter database 312.
  • the installer module 302 is used to install specific web browsing software that allows the web browser to filter material from requested web pages.
  • the web browser 304 is an Internet web browser programmed to filter content from requested web pages.
  • the email module 306, chat module 308, and animation module 310 are additional features that can be incorporated with the web browser 304 in order to provide enhanced functionality for a user using the web browser 304. It is possible to incorporate some of the new filtering techniques described herein to email and chat features incorporated with the web browser 304.
  • the local filter database 312 contains information that helps filter content from web pages and is discussed in conjunction with FIG. 4.
  • FIG. 4 is a schematic block diagram illustrating the web browser 304 and local filter database 312 shown in the non-volatile memory module 210 of FIG. 3, and how the web browser 304 connects with a remote filter database 400.
  • the web browser 304 includes an Internet browsing engine 402 connected to a filtering engine 404.
  • the Internet browsing engine 402 passes requests to read a web page through the filtering engine 404.
  • the filtering engine 404 analyzes the contents of the web page by accessing and utilizing information contained in the local filter database 312 and the remote filter database 400. In this instance, the web browser 304 is programmed to work interactively with the filtering engine 404.
  • An example of a web browser programmed to work interactively with a filtering engine is a SurfMonkeyTM browser made available by SurfMonkey.com, Inc. of Campbell, California.
  • the filtering engine 404 can also be programmed as an add-on to work interactively with other existing web browsers such as Netscape Navigator® and Microsoft Internet Explorer®.
  • the remote filter database 400 includes remotely accessed databases (as shown in FIG. 1), namely a domain white list 108, an URL gray list 110, and an URL black list 112.
  • the remote filter database 400 can include filters from various independent sources such as Surf Watch®. This provides flexibility in incorporating established filter databases and to help provide quality filters for use with the filtering engine 404.
  • the domain white list 108 includes a database of acceptable domain names for viewing by the web browser 304.
  • the URL gray list 110 includes a database of web pages that contain a small number of questionable material that may need to be filtered by the filtering engine 404 before being displayed in the web browser 304.
  • the URL black list 112 includes a database of web pages that would be fully blocked by the web browser 304.
  • the local domain white list 406 includes a database of acceptable domain names.
  • the local domain white list 406 is a list of acceptable domain names for viewing as defined by the remote domain white list 108.
  • the local URL black list 408 includes a database of unacceptable web pages that were defined by a supervisory user to be unacceptable or were previously found to be unacceptable by the filtering engine 404.
  • the local URL white list 410 includes a database of acceptable web pages that were added by a supervisory user to be acceptable pages for viewing, or were previously found to be acceptable by the filtering engine 404 during the current web browsing session.
  • the web pages in the local URL white list 410 that were found to be acceptable by the filtering engine 404 during the web browsing session are deleted after the web browsing session is over.
  • the acceptable web pages in the URL white list 410 defined by a supervisory user remain in the database for use with future web browsing sessions.
  • the local word gray list 412 is a database of questionable words that may need to be filtered from the web page. Examples of gray list words would include words that may or may not be offensive depending on how they are used and in what context.
  • the local word black list 414 is a database of words that are unacceptable and would need to filtered or blocked accordingly.
  • a supervisor begins to log into the web browser security controls.
  • Step 502 determines if the person logging into the security controls feature is an authorized user, such as a parent. If the person logging in does not supply the correct password, then at step 504 access is denied to the supervisory security controls. If the correct password is supplied, then at step 506 the supervisor can add or remove specific URLs or web pages from the local domain white list 406, the local URL black list 408, and the local URL white list 410. The supervisor can also add or remove words from the local word gray list 412 and the local word black list 414. If at step 508, the supervisor has finished editing the local database lists, then at step 510 the supervisory controlling ends, otherwise, at step 506, the supervisor can continue to edit the local database lists.
  • a flowchart depicting the manner in which a web page is filtered is shown.
  • a user begins using the web browser with the filtering engine.
  • the user requests to view a specific web page. If at step 604 it is determined that the security setting for filtering web pages is off, then at step 606 the web page is displayed to the user and at step 608 the filtering process ends. If at step 604 the security setting for filtering web pages is on, then the filtering process continues at step 610 wherein a remote domain white list 108 is accessed over the Internet and is copied over to the local domain white list 406 that is resident on the user's computer. Next at step 612, separate processes 614, 616 begin and are shown in FIGS 7 and 8.
  • FIG. 7 is a flowchart depicting the method of filtering continued from process A 614 in FIG. 6.
  • the web page requested by the user is initiated to the server and at step 702 the web page is downloaded into a hidden browser window that prohibits the user from seeing the web page at this time.
  • process A is consolidated with process B and continue on FIG. 1 1.
  • FIG. 8 is a flowchart depicting the method of filtering continued from process B 616 in FIG. 6.
  • step 800 it is determined if the requested web page is in the local domain white list 406. If at step 802 it is determined that the web page is on the local domain white list 406 then at step 704 process B is consolidated with process A and continues at FIG. 11. However, if the web page is not on the local domain white list 406 then at step 804 it is determined whether the requested web page is in the local URL black list 408. If at step 806 the web page is found in the local URL black list 408, then at step 808 the web page is stopped from being downloaded and continues at step A in FIG. 9.
  • the web page URL is not in the local URL black list 408, then at step 810 it is determined if the web page is in the local URL white list 410. If at step 812 the web page URL is found in the local URL white list, then at step 704 process B is consolidated with process A and continues at FIG. 11. If at step 812 the web page is not found in the local URL white list, then at step 814 it is determined if the web page URL is in a remote URL gray list 110. If at step 816 the web page is found in the remote URL gray list 110 then at step 704 process B is consolidated with process A and continues at FIG. 11. If the web page is found in the remote URL gray list 110, then a search for the web page is the remote URL black list 112 is bypassed.
  • the remote URL gray list 110 can include potentially acceptable web pages that may have been placed on the remote URL black list 112. The web pages listed on the remote URL gray list 110 may only require filtering of some words, as is described in further detail in conjunction with FIG. 11.
  • step 820 it is determined if the web page URL is in the remote URL black list 112. If at step 822 the web page is not found in the remote URL black list 112 then at step 704 process B is consolidated with process A and continues at FIG. 11. However, if at step 822 the web page is found in the remote URL black list, then at step 824 the web page is stopped from being downloaded and continues at step B in FIG. 10.
  • the web page filtering continues.
  • the web page is stopped from being downloaded, then at step 902 a page is shown to the user indicating that the selected web page is blocked from viewing since it was found in the local URL black list 408.
  • step 904 it is determined if the web page URL is in the remote URL black list 1 12. If the web page is not in the remote URL black list 1 12, then at step 908 the web page URL is removed from the local URL black list 408 since this web page is no longer black listed by the remote URL black list 112. Alternatively, if the page URL was specifically entered by a supervisor into the remote URL black list, then the web page URL would not be removed from the local URL black list. If at step 906 the web page is found in the remote URL black list, then at step 910 the filtering process ends.
  • FIG. 10 a flowchart depicting the method of filtering continued from Step B in FIG. 8 is shown, wherein the requested web page URL was also found in the remote URL black list 112.
  • the web page is stopped from being downloaded, then at step 1002 a page is shown to the user indicating that the selected web page is blocked from viewing since it was found in the remote URL black list 112.
  • the web page URL is added to the local URL black list 410 residing on the user's computer.
  • step 1010 the web page URL is removed from the local URL white list 410 since this page is no longer a valid page for viewing. If at step 1008 the web page is not found in the local URL white list, then at step 1012 the filtering process ends. Referring now to FIG. 11 , a flowchart depicting the method of filtering continued from consolidated concurrent processes A and B 704 in FIG. 7 and FIG. 8 is shown.
  • the requested web page is added to the local URL white list 410 since the web page was either: a) found in the local domain white list 406; b) found in the local URL white list 410; c) found in the remote URL gray list 110; or d) not found in the remote URL black list.
  • all the words in the web page that are found in the local word black list 414 are replaced by blocking characters, such as the number sign (#).
  • the number of black list words is counted. If at step 1106 it is determined that the number of black list words exceeds a certain threshold limit, then at step 1108 the web page is added to the local URL black list 408. Excellent results can be obtained when the threshold limit is set to 10 words.
  • a page is shown to the user indicating that the selected web page is blocked from viewing since too many words in the black list were found on the requested web page, and at step 1012 the filtering process ends.
  • step 1114 it is determined if at least one black list word was found. If no black list words were found, then at step 11 16 the filtered web page is displayed and at step 1 1 18 the filtering process ends. If at step 1 114 at least one black list word was found, then at step 1 120 all the words in the web page found in the local word gray list 412 are replaced by blocking characters, such as the number sign (#). Then at step 1122 the filtered web page is displayed to the user and at step 1124 the filtering process ends.
  • the filtering of a web page can be separated into multiple filtering processes. As a web page is downloaded from the Internet, then information is send from the server to the client computer in packets. The filtering process can be performed separately on each packet as the web page is being downloaded from the Internet. Additional modifications include adjusting the threshold word limit discussed earlier.

Abstract

A filter for use interactively with an Interne web browser for filtering adult content (102). The filter utilizes a filter database to screen information requested for viewing within a web browser. The information is screened locally by a domain white list (108), an URAL black list (112), and an URAL white list. The information is also screened remotely from a domain white list (108), an URAL gray list (110), and an URAL black list (112). Furthermore, words within the requested web page are screened with a local word gray list and a local word black list (112) to add further filtering features prior to displaying the web page to the user. The amount of filtering is readily modified through local content access settings by a local supervisor and by the selection of the remote site(s) (114 and 116) contacted for additional content access control information.

Description

SYSTEM AND METHOD OF FILTERING ADULT CONTENT
ON THE INTERNET
By Fabricc Chupin, David Smith, Scott Jarol, and David Redkey
BACKGROUND OF THE INVENTION
1. Field of the invention
The present invention relates generally to a web browser and methods thereof and more specifically to a web browser having embedded content filtering and methods thereof.
2. Description of the Prior Art
Information made available through the Internet in the form of Web Sites, Chat Rooms and Electronic Mail, is generally unregulated. Internet Directory Services and Search Engines such as Yahoo®, HotBot® and others can provide order to the subject matter of the vast amount of information available. However Directory Servers are generally limited to categorizing Web Sites based on Keywords supplied by the site's content provider. Actual content is generally not verified. Internet Search Engines typically provide results by matching the same Keywords to a specific user query to generate a list of matches for each specific query. Again, actual content of the matches is generally not checked. For some users, for example children, such unregulated access is undesirable. In addition, some young users have difficulty in navigating through the vast Internet resource and would benefit if assistance in accessing appropriate information could be made available.
Popular Internet Browsers such as the Netscape Navigator® and the Microsoft Internet Explorer® provide some of content screening. However, this screening is generally limited only to Web Sites and typically involves several levels of setup interaction on the part of a parent or guardian to become active. Typically, once active, the content screening is not user specific, thus where a parent might want to limit a child's access to some Internet content, the parent may not want all users limited in the same manner. Other solutions to content screening, for example stand alone solutions such as Surf Watch® or Net Nanny®, while also effective at limiting access to undesirable Web Sites, generally have the same limitations with regard to other sources of Internet content as the browsers. Another limitation of the content screening provided by currently available solutions is that it is typically focused only on sex, violence and the like, and thus is directed primarily to protecting children. The need for content screening, however, can extend beyond this current focus. For example, in some corporate environments where Internet access is desirable, often it would be more desirable if that access could be readily managed beyond the level that current Browser controls make available. In addition, it would be desirable if this content screening could be effected with little or no monitoring by corporate censors.
There is a need for Internet content regulation and/or screening that is not limited to only preventing access to undesirable Web Sites. This need for regulation extends to other sources of information available through the Internet such as Electronic Mail, Chat Rooms, News Groups and the like. In addition, it would be advantageous for this Internet content regulation to be available though an integrated solution, thus simplifying control of the criteria used for the screening process. It would also be desirable if this integrated solution could be tailored to meet a variety of needs, from those of young children to those of teens, young adults and others. Thus, it would be desirable if such an integrated solution could provide interactive assistance to help direct activities where appropriate within a friendly, engaging, graphical interface.
SUMMARY OF THE INVENTION
A filter for interactive use with an Internet web browser for filtering adult content is provided. The filter utilizes a filter database to screen information requested for viewing within a web browser. The information is screened locally by a domain white list, an URL black list, and an URL white list. The information is also screened remotely from a domain white list, an URL gray list, and an URL black list. Furthermore, words within the requested web page are screened with a local word gray list and a local word black list to add further filtering features prior to displaying the web page to the user. The amount of filtering is readily modified through local content access settings by a local supervisor and by the selection of the remote site(s) contacted for additional content access control information.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying illustrations. For simplicity and ease of understanding, common numbering of elements is employed where an element is the same in different illustrations.
FIG. 1 is a schematic diagram illustrating a browser client requesting a web page over the internet from a requested server, wherein the browser client also accesses remote servers to help filter adult content from the requested web page, in accordance with the present invention; FIG. 2 is a block diagram of the browser client's computer shown in FIG. 1, in accordance with the present invention;
FIG. 3 is a block diagram of one embodiment of the non-volatile memory module located within the browser client's computer of FIG. 2; FIG. 4 is a schematic block diagram illustrating the browser and local filter database shown in the non- volatile memory module of FIG. 3 and how the web browser connects with a remote filter database;
FIG. 5 is a flowchart of a method for a supervisor to add or remove user limitations for web browsing, according to the invention; FIG. 6 is a flowchart depicting the manner in which screening and/or filtering aspects are applied within an embodiment in accordance with the present invention;
FIG. 7 is a flowchart depicting the method of filtering continued from Process A in FIG. 6;
FIG. 8 is a flowchart depicting the method of filtering continued from Process B in FIG. 6, in accordance with the present invention;
FIG. 9 is a flowchart depicting the method of filtering continued from Step A in FIG. 8; FIG. 10 is a flowchart depicting the method of filtering continued from Step B in FIG. 8; and
FIG. 11 is a flowchart depicting the method of filtering continued from Consolidated Concurrent Processes A and B in FIG. 7 and FIG. 8, according to the present invention. DETAILED DESCRIPTION OF THE INVENTION
The following is a detailed description of illustrative embodiments of the present invention. As these embodiments of the present invention are described with reference to the aforementioned illustrations, various modifications or adaptations of the methods and or specific structures described may become apparent to those skilled in the art. All such modifications, adaptations, or variations that rely upon the teachings of the present invention, and through which these teachings have advanced the art, are considered to be within the spirit and scope of the present invention. Hence, these descriptions and drawings should not be considered in a limiting sense, as it is understood that the present invention is in no way limited to only the embodiments illustrated. For example, while FIGs. 1-11 illustrate an embodiment in accordance with the present invention that is directed to filtering adult content on the internet within a web browser, other embodiments can be directed to adult users. For example, in some embodiments of the present invention, content screening and or regulation is directed in a topical manner, such as all content related to a specific interest and related topics. Referring now to FIG. 1, a schematic diagram illustrating a browser client 102 requesting a web page over the internet 104 from a requested server 106, wherein the browser client 102 also accesses remote filter databases 108, 110, 112 at remote servers 114. 116 to help filter adult content from the requested web page. FIG. 2 is a block diagram of the browser client's computer 102 shown in FIG. 1. The browser client 102 includes a CPU 202, a ROM 204, a RAM 206, an Internet interface 208, a non-volatile memory 210, an input device 212, and a display 214. The browser client 102 provides for a computer set-up that can run specific software to browse the Internet.
Referring now to FIG. 3, a block diagram of one embodiment of the non-volatile memory module 210 located within the browser client computer 102 of FIG. 2 is shown. The non-volatile memory 206 includes an installer module 302, a web browser 304, an email module 306, a chat module 308, an animation module 310, and a local filter database 312. The installer module 302 is used to install specific web browsing software that allows the web browser to filter material from requested web pages. The web browser 304 is an Internet web browser programmed to filter content from requested web pages. The email module 306, chat module 308, and animation module 310 are additional features that can be incorporated with the web browser 304 in order to provide enhanced functionality for a user using the web browser 304. It is possible to incorporate some of the new filtering techniques described herein to email and chat features incorporated with the web browser 304. The local filter database 312 contains information that helps filter content from web pages and is discussed in conjunction with FIG. 4.
FIG. 4 is a schematic block diagram illustrating the web browser 304 and local filter database 312 shown in the non-volatile memory module 210 of FIG. 3, and how the web browser 304 connects with a remote filter database 400. The web browser 304 includes an Internet browsing engine 402 connected to a filtering engine 404. The Internet browsing engine 402 passes requests to read a web page through the filtering engine 404. The filtering engine 404 analyzes the contents of the web page by accessing and utilizing information contained in the local filter database 312 and the remote filter database 400. In this instance, the web browser 304 is programmed to work interactively with the filtering engine 404. An example of a web browser programmed to work interactively with a filtering engine is a SurfMonkey™ browser made available by SurfMonkey.com, Inc. of Campbell, California. The filtering engine 404 can also be programmed as an add-on to work interactively with other existing web browsers such as Netscape Navigator® and Microsoft Internet Explorer®.
The remote filter database 400 includes remotely accessed databases (as shown in FIG. 1), namely a domain white list 108, an URL gray list 110, and an URL black list 112. The remote filter database 400 can include filters from various independent sources such as Surf Watch®. This provides flexibility in incorporating established filter databases and to help provide quality filters for use with the filtering engine 404.
The domain white list 108 includes a database of acceptable domain names for viewing by the web browser 304. The URL gray list 110 includes a database of web pages that contain a small number of questionable material that may need to be filtered by the filtering engine 404 before being displayed in the web browser 304. The URL black list 112 includes a database of web pages that would be fully blocked by the web browser 304.
Within the local filter database 312 located on the browser client's computer 102, the local domain white list 406 includes a database of acceptable domain names. The local domain white list 406 is a list of acceptable domain names for viewing as defined by the remote domain white list 108. The local URL black list 408 includes a database of unacceptable web pages that were defined by a supervisory user to be unacceptable or were previously found to be unacceptable by the filtering engine 404. The local URL white list 410 includes a database of acceptable web pages that were added by a supervisory user to be acceptable pages for viewing, or were previously found to be acceptable by the filtering engine 404 during the current web browsing session. The web pages in the local URL white list 410 that were found to be acceptable by the filtering engine 404 during the web browsing session are deleted after the web browsing session is over. The acceptable web pages in the URL white list 410 defined by a supervisory user remain in the database for use with future web browsing sessions.
The local word gray list 412 is a database of questionable words that may need to be filtered from the web page. Examples of gray list words would include words that may or may not be offensive depending on how they are used and in what context. The local word black list 414 is a database of words that are unacceptable and would need to filtered or blocked accordingly.
Referring now to FIG. 5, a flowchart of a method for a supervisor to add or remove user limitations for web browsing is shown. At step 500 a supervisor begins to log into the web browser security controls. Step 502 determines if the person logging into the security controls feature is an authorized user, such as a parent. If the person logging in does not supply the correct password, then at step 504 access is denied to the supervisory security controls. If the correct password is supplied, then at step 506 the supervisor can add or remove specific URLs or web pages from the local domain white list 406, the local URL black list 408, and the local URL white list 410. The supervisor can also add or remove words from the local word gray list 412 and the local word black list 414. If at step 508, the supervisor has finished editing the local database lists, then at step 510 the supervisory controlling ends, otherwise, at step 506, the supervisor can continue to edit the local database lists.
Referring now to FIG. 6, a flowchart depicting the manner in which a web page is filtered is shown. At step 600 a user begins using the web browser with the filtering engine. At step 602, the user requests to view a specific web page. If at step 604 it is determined that the security setting for filtering web pages is off, then at step 606 the web page is displayed to the user and at step 608 the filtering process ends. If at step 604 the security setting for filtering web pages is on, then the filtering process continues at step 610 wherein a remote domain white list 108 is accessed over the Internet and is copied over to the local domain white list 406 that is resident on the user's computer. Next at step 612, separate processes 614, 616 begin and are shown in FIGS 7 and 8. FIG. 7 is a flowchart depicting the method of filtering continued from process A 614 in FIG. 6. At step 700 the web page requested by the user is initiated to the server and at step 702 the web page is downloaded into a hidden browser window that prohibits the user from seeing the web page at this time. Then at step 704 process A is consolidated with process B and continue on FIG. 1 1.
FIG. 8 is a flowchart depicting the method of filtering continued from process B 616 in FIG. 6. At step 800, it is determined if the requested web page is in the local domain white list 406. If at step 802 it is determined that the web page is on the local domain white list 406 then at step 704 process B is consolidated with process A and continues at FIG. 11. However, if the web page is not on the local domain white list 406 then at step 804 it is determined whether the requested web page is in the local URL black list 408. If at step 806 the web page is found in the local URL black list 408, then at step 808 the web page is stopped from being downloaded and continues at step A in FIG. 9.
If the web page URL is not in the local URL black list 408, then at step 810 it is determined if the web page is in the local URL white list 410. If at step 812 the web page URL is found in the local URL white list, then at step 704 process B is consolidated with process A and continues at FIG. 11. If at step 812 the web page is not found in the local URL white list, then at step 814 it is determined if the web page URL is in a remote URL gray list 110. If at step 816 the web page is found in the remote URL gray list 110 then at step 704 process B is consolidated with process A and continues at FIG. 11. If the web page is found in the remote URL gray list 110, then a search for the web page is the remote URL black list 112 is bypassed. The remote URL gray list 110 can include potentially acceptable web pages that may have been placed on the remote URL black list 112. The web pages listed on the remote URL gray list 110 may only require filtering of some words, as is described in further detail in conjunction with FIG. 11.
If the web page is not found in the remote URL gray list 110, then at step 820 it is determined if the web page URL is in the remote URL black list 112. If at step 822 the web page is not found in the remote URL black list 112 then at step 704 process B is consolidated with process A and continues at FIG. 11. However, if at step 822 the web page is found in the remote URL black list, then at step 824 the web page is stopped from being downloaded and continues at step B in FIG. 10.
Referring now to FIG. 9, as referenced from step A 808 in FIG. 8, the web page filtering continues. At step 900 the web page is stopped from being downloaded, then at step 902 a page is shown to the user indicating that the selected web page is blocked from viewing since it was found in the local URL black list 408. Next at step 904, it is determined if the web page URL is in the remote URL black list 1 12. If the web page is not in the remote URL black list 1 12, then at step 908 the web page URL is removed from the local URL black list 408 since this web page is no longer black listed by the remote URL black list 112. Alternatively, if the page URL was specifically entered by a supervisor into the remote URL black list, then the web page URL would not be removed from the local URL black list. If at step 906 the web page is found in the remote URL black list, then at step 910 the filtering process ends.
Referring now to FIG. 10, a flowchart depicting the method of filtering continued from Step B in FIG. 8 is shown, wherein the requested web page URL was also found in the remote URL black list 112. At step 1000 the web page is stopped from being downloaded, then at step 1002 a page is shown to the user indicating that the selected web page is blocked from viewing since it was found in the remote URL black list 112. Next at step 1004 the web page URL is added to the local URL black list 410 residing on the user's computer. Then at step 1006 it is determined if the web page URL is in the local URL white list 410. If the web page is found in the local URL white list 410, then at step 1010 the web page URL is removed from the local URL white list 410 since this page is no longer a valid page for viewing. If at step 1008 the web page is not found in the local URL white list, then at step 1012 the filtering process ends. Referring now to FIG. 11 , a flowchart depicting the method of filtering continued from consolidated concurrent processes A and B 704 in FIG. 7 and FIG. 8 is shown. At step 1100 the requested web page is added to the local URL white list 410 since the web page was either: a) found in the local domain white list 406; b) found in the local URL white list 410; c) found in the remote URL gray list 110; or d) not found in the remote URL black list. Next at step 1102 all the words in the web page that are found in the local word black list 414 are replaced by blocking characters, such as the number sign (#). At step 1104 the number of black list words is counted. If at step 1106 it is determined that the number of black list words exceeds a certain threshold limit, then at step 1108 the web page is added to the local URL black list 408. Excellent results can be obtained when the threshold limit is set to 10 words. Next at step 1110 a page is shown to the user indicating that the selected web page is blocked from viewing since too many words in the black list were found on the requested web page, and at step 1012 the filtering process ends.
If at step 1106 the number of words does not exceed the threshold then at step 1114 it is determined if at least one black list word was found. If no black list words were found, then at step 11 16 the filtered web page is displayed and at step 1 1 18 the filtering process ends. If at step 1 114 at least one black list word was found, then at step 1 120 all the words in the web page found in the local word gray list 412 are replaced by blocking characters, such as the number sign (#). Then at step 1122 the filtered web page is displayed to the user and at step 1124 the filtering process ends.
In order to improve performance and speed of the filtering process discussed herein, various modifications to provide a fast and reliable filtering system can be done. For example, the filtering of a web page can be separated into multiple filtering processes. As a web page is downloaded from the Internet, then information is send from the server to the client computer in packets. The filtering process can be performed separately on each packet as the web page is being downloaded from the Internet. Additional modifications include adjusting the threshold word limit discussed earlier.

Claims

We Claim:
1. A system for filtering requested information through a web browser comprising: a filter database containing information for filtering the requested information; and a filtering engine for filtering the requested information using the filter database and passing filtered requested information to the web browser for viewing.
2. The system of claim 1, wherein the filter database includes a local filter database that is locally accessible and a remote filter database that is remotely accessible.
3. The system of claim 2, wherein the local filter database includes: a local domain white list containing domain names that have acceptable content for viewing through the web browser; a local uniform resource locator black list containing uniform resource locators that have content not acceptable for viewing through the web browser; a local uniform resource locator white list containing uniform resource locators that have content acceptable for viewing through the web browser; a local word gray list containing words that may need to be filtered from viewing through the web browser as defined by the filtering engine; and a local word black list containing words that are not acceptable for viewing through the web browser.
4. The system of claim 3, wherein the remote filter database includes: a remote domain white list containing domain names that are acceptable for viewing through the web browser; a remote uniform resource locator gray list containing uniform resource locators that may need to be filtered from viewing through the web browser as defined by the filtering engine; and a remote uniform resource locator black list containing uniform resource locators that have content not acceptable for viewing through the web browser.
5. A method of filtering requested information for viewing in a web browser, comprising the steps of: downloading the requested information into a hidden window; filtering the requested information using a filtering engine into filtered information; and displaying the filtered information in the web browser for viewing.
6. The method of claim 5, wherein filtering the requested information includes the steps of: checking if the requested information has a domain name matching an acceptable domain name found on a domain name white list; processing the requested information for viewing in the web browser if there is a match with the domain name white list; and further filtering the requested information if there is not a match with the domain name white list.
7. The method of claim 6, wherein further filtering the requested information includes the steps of: checking if the requested information has a uniform resource locator matching an unacceptable uniform resource locator found on a black list; blocking the requested information from viewing in the web browser if there is a match with the black list; and further filtering the requested information if there is not a match with the black list.
8. The method of claim 7, wherein further filtering the requested information includes the step of: checking if the requested information has a uniform resource locator matching an acceptable uniform resource locator found on a white list; processing the requested information for viewing in the web browser if there is a match with the white list; and further filtering the requested information if there is not a match with the white list.
9. The method of claim 8, wherein further filtering the requested information includes the step of: checking if the requested information has a uniform resource locator matching a uniform resource locator found on a gray list; processing the requested information for viewing in the web browser if there is a match with the gray list; and further filtering the requested information if there is not a match with the gray list.
10. The method of claim 9, wherein further filtering the requested information includes the steps of: checking if the requested information has a uniform resource locator matching an unacceptable uniform resource locator found on a remote black list; blocking the requested information from viewing in the web browser if there is a match with the remote black list; and processing the requested information for viewing in the web browser if there is not a match with the remote black list.
11. The method of claim 10, wherein processing the requested information includes the steps of: checking if any words in the requested information match with words in a word black list; blocking all of the requested information from viewing in the web browser if the number of words matching with the word black list is beyond a specified limit; blocking each word matching with the word black list from viewing in the web browser if the number of words matching with the word black list is below a specified limit; checking if any words in the requested information match with words in a word gray list; blocking each word matching with the word gray list from viewing in the web browser if the number of words matching with the word black list is beyond a specified limit; and displaying the filtered requested information for viewing in the web browser.
12. A computer-readable medium comprising program instructions for filtering requested information for viewing in a web browser, comprising the steps of: downloading the requested information into a hidden window; filtering the requested information using a filtering engine into filtered information; and displaying the filtered information in the web browser for viewing.
13. The computer-readable medium of claim 12, wherein filtering the requested information includes the steps of: checking if the requested information has a domain name matching an acceptable domain name found on a domain name white list; processing the requested information for viewing in the web browser if there is a match with the domain name white list; and further filtering the requested information if there is not a match with the domain name white list.
14. The computer-readable medium of claim 13, wherein further filtering the requested information includes the steps of: checking if the requested information has a uniform resource locator matching an unacceptable uniform resource locator found on a black list; blocking the requested information from viewing in the web browser if there is a match with the black list; and further filtering the requested information if there is not a match with the black list.
15. The computer-readable medium of claim 14, wherein further filtering the requested information includes the step of: checking if the requested information has a uniform resource locator matching an acceptable uniform resource locator found on a white list; processing the requested information for viewing in the web browser if there is a match with the white list; and further filtering the requested information if there is not a match with the white list.
16. The computer-readable medium of claim 15, wherein further filtering the requested information includes the step of: checking if the requested information has a uniform resource locator matching a uniform resource locator found on a gray list; processing the requested information for viewing in the web browser if there is a match with the gray list; and further filtering the requested information if there is not a match with the gray list.
17. The computer-readable medium of claim 16, wherein further filtering the requested information includes the steps of: checking if the requested information has a uniform resource locator matching an unacceptable uniform resource locator found on a remote black list; blocking the requested information from viewing in the web browser if there is a match with the remote black list; and processing the requested information for viewing in the web browser if there is not a match with the remote black list.
18. The computer-readable medium of claim 17, wherein processing the requested information includes the steps of: checking if any words in the requested information match with words in a word black list; blocking all of the requested information from viewing in the web browser if the number of words matching with the word black list is beyond a specified limit; blocking each word matching with the word black list from viewing in the web browser if the number of words matching with the word black list is below a specified limit; checking if any words in the requested information match with words in a word gray list; blocking each word matching with the word gray list from viewing in the web browser if the number of words matching with the word black list is beyond a specified limit; and displaying the filtered requested information for viewing in the web browser.
PCT/US2000/041274 1999-11-05 2000-10-18 System and method of filtering adult content on the internet WO2001033371A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU19700/01A AU1970001A (en) 1999-11-05 2000-10-18 System and method of filtering adult content on the internet

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US43514299A 1999-11-05 1999-11-05
US09/435,142 1999-11-05

Publications (1)

Publication Number Publication Date
WO2001033371A1 true WO2001033371A1 (en) 2001-05-10

Family

ID=23727157

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/041274 WO2001033371A1 (en) 1999-11-05 2000-10-18 System and method of filtering adult content on the internet

Country Status (2)

Country Link
AU (1) AU1970001A (en)
WO (1) WO2001033371A1 (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1318468A2 (en) 2001-12-07 2003-06-11 Websense Inc. System and method for an internet filter
EP1498830A2 (en) * 2003-07-18 2005-01-19 JDM GmbH Method for downloading information
EP1546895A1 (en) * 2002-10-17 2005-06-29 America Online, Inc. Detecting and blocking spoofed web login pages
EP1598753A2 (en) * 2004-03-23 2005-11-23 NTT DoCoMo, Inc. Internet access control system and access control method in the terminal and in the server
WO2006128224A1 (en) * 2005-05-31 2006-12-07 Shalless, Greg A method for filtering online chat
US7185015B2 (en) 2003-03-14 2007-02-27 Websense, Inc. System and method of monitoring and controlling application files
AU2002351237B2 (en) * 2001-12-05 2007-06-07 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
WO2008008219A2 (en) 2006-07-10 2008-01-17 Websense, Inc. System and method of analyzing web content
EP1922860A1 (en) 2005-08-12 2008-05-21 Agent Mobile Pty Ltd A content filtering system for a mobile communication device and method of using same
US7529754B2 (en) 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
EP2088520A1 (en) * 2008-02-11 2009-08-12 Avaya Inc. Context based filter method and apparatus
CN100543741C (en) * 2006-02-10 2009-09-23 鸿富锦精密工业(深圳)有限公司 The system and method for automatic download and filtering web page
US8881277B2 (en) 2007-01-09 2014-11-04 Websense Hosted R&D Limited Method and systems for collecting addresses for remotely accessible information sources
US9003524B2 (en) 2006-07-10 2015-04-07 Websense, Inc. System and method for analyzing web content
JP2015079501A (en) * 2013-10-15 2015-04-23 グーグル インコーポレイテッド Accessing location-based content
US9043434B1 (en) 2011-09-12 2015-05-26 Polyvore, Inc. Alternate page determination for a requested target page
CN104850571A (en) * 2014-02-14 2015-08-19 群晖科技股份有限公司 Method and device for managing fixed website access
EP2908256A1 (en) * 2014-02-14 2015-08-19 Synology Incorporated Method, apparatus and computer program product for managing static uniform resource locator access
US9117054B2 (en) 2012-12-21 2015-08-25 Websense, Inc. Method and aparatus for presence based resource management
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
WO2015141665A1 (en) * 2014-03-19 2015-09-24 日本電信電話株式会社 Website information extraction device, system, website information extraction method, and website information extraction program
US9378282B2 (en) 2008-06-30 2016-06-28 Raytheon Company System and method for dynamic and real-time categorization of webpages
US9473439B2 (en) 2007-05-18 2016-10-18 Forcepoint Uk Limited Method and apparatus for electronic mail filtering
US9565235B2 (en) 2000-01-28 2017-02-07 Websense, Llc System and method for controlling access to internet sites
US9654495B2 (en) 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
CN106991150A (en) * 2017-03-28 2017-07-28 维沃移动通信有限公司 The display methods and mobile terminal of a kind of web data
WO2017131985A1 (en) * 2016-01-27 2017-08-03 Microsoft Technology Licensing, Llc Predictive filtering of content of documents
WO2019068055A3 (en) * 2017-09-29 2020-03-26 AVAST Software s.r.o. Instanced web servers for displaying custom content in a secure context
US10795926B1 (en) 2016-04-22 2020-10-06 Google Llc Suppressing personally objectionable content in search results
CN113407886A (en) * 2021-07-10 2021-09-17 广州数智网络科技有限公司 Network crime platform identification method, system, device and computer storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107193956A (en) * 2017-05-23 2017-09-22 深圳天珑无线科技有限公司 Page processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5784564A (en) * 1996-05-03 1998-07-21 High Technology Solutions, Inc. Closed browser for computer and computer network
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5784564A (en) * 1996-05-03 1998-07-21 High Technology Solutions, Inc. Closed browser for computer and computer network
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9565235B2 (en) 2000-01-28 2017-02-07 Websense, Llc System and method for controlling access to internet sites
AU2002351237B2 (en) * 2001-12-05 2007-06-07 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
US7483982B2 (en) 2001-12-05 2009-01-27 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
US9503423B2 (en) 2001-12-07 2016-11-22 Websense, Llc System and method for adapting an internet filter
EP1318468A2 (en) 2001-12-07 2003-06-11 Websense Inc. System and method for an internet filter
EP1318468A3 (en) * 2001-12-07 2006-03-15 Websense Inc. System and method for an internet filter
EP1546895A1 (en) * 2002-10-17 2005-06-29 America Online, Inc. Detecting and blocking spoofed web login pages
EP1546895A4 (en) * 2002-10-17 2006-05-31 America Online Inc Detecting and blocking spoofed web login pages
US9692790B2 (en) 2003-03-14 2017-06-27 Websense, Llc System and method of monitoring and controlling application files
US7185015B2 (en) 2003-03-14 2007-02-27 Websense, Inc. System and method of monitoring and controlling application files
US9342693B2 (en) 2003-03-14 2016-05-17 Websense, Inc. System and method of monitoring and controlling application files
US9253060B2 (en) 2003-03-14 2016-02-02 Websense, Inc. System and method of monitoring and controlling application files
US7529754B2 (en) 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
EP1498830A2 (en) * 2003-07-18 2005-01-19 JDM GmbH Method for downloading information
EP1498830A3 (en) * 2003-07-18 2006-03-01 JDM GmbH Method for downloading information
EP1598753A3 (en) * 2004-03-23 2005-11-30 NTT DoCoMo, Inc. Internet access control system and access control method in the terminal and in the server
EP1598753A2 (en) * 2004-03-23 2005-11-23 NTT DoCoMo, Inc. Internet access control system and access control method in the terminal and in the server
US7725458B2 (en) 2004-03-23 2010-05-25 Ntt Docomo, Inc. Access control system and access control method
US8161068B2 (en) 2004-03-23 2012-04-17 Ntt Docomo, Inc. Access control system
CN1330130C (en) * 2004-03-23 2007-08-01 株式会社Ntt都科摩 Access control system and access control method
WO2006128224A1 (en) * 2005-05-31 2006-12-07 Shalless, Greg A method for filtering online chat
EP1922860A1 (en) 2005-08-12 2008-05-21 Agent Mobile Pty Ltd A content filtering system for a mobile communication device and method of using same
EP1922860A4 (en) * 2005-08-12 2011-06-08 Agent Mobile Pty Ltd A content filtering system for a mobile communication device and method of using same
CN100543741C (en) * 2006-02-10 2009-09-23 鸿富锦精密工业(深圳)有限公司 The system and method for automatic download and filtering web page
US9680866B2 (en) 2006-07-10 2017-06-13 Websense, Llc System and method for analyzing web content
US9723018B2 (en) 2006-07-10 2017-08-01 Websense, Llc System and method of analyzing web content
WO2008008219A2 (en) 2006-07-10 2008-01-17 Websense, Inc. System and method of analyzing web content
WO2008008219A3 (en) * 2006-07-10 2008-02-28 Websense Inc System and method of analyzing web content
US9003524B2 (en) 2006-07-10 2015-04-07 Websense, Inc. System and method for analyzing web content
US8978140B2 (en) 2006-07-10 2015-03-10 Websense, Inc. System and method of analyzing web content
US9654495B2 (en) 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
US8881277B2 (en) 2007-01-09 2014-11-04 Websense Hosted R&D Limited Method and systems for collecting addresses for remotely accessible information sources
US9473439B2 (en) 2007-05-18 2016-10-18 Forcepoint Uk Limited Method and apparatus for electronic mail filtering
EP2088520A1 (en) * 2008-02-11 2009-08-12 Avaya Inc. Context based filter method and apparatus
US9378282B2 (en) 2008-06-30 2016-06-28 Raytheon Company System and method for dynamic and real-time categorization of webpages
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US9792382B2 (en) 2011-09-12 2017-10-17 Yahoo Holdings, Inc. Alternate page determination for a requested target page
US9043434B1 (en) 2011-09-12 2015-05-26 Polyvore, Inc. Alternate page determination for a requested target page
US10044715B2 (en) 2012-12-21 2018-08-07 Forcepoint Llc Method and apparatus for presence based resource management
US9117054B2 (en) 2012-12-21 2015-08-25 Websense, Inc. Method and aparatus for presence based resource management
JP2015079501A (en) * 2013-10-15 2015-04-23 グーグル インコーポレイテッド Accessing location-based content
EP2908256A1 (en) * 2014-02-14 2015-08-19 Synology Incorporated Method, apparatus and computer program product for managing static uniform resource locator access
CN104850571A (en) * 2014-02-14 2015-08-19 群晖科技股份有限公司 Method and device for managing fixed website access
US10003630B2 (en) 2014-02-14 2018-06-19 Synology Incorporated Method, apparatus and computer program product for managing static uniform resource locator access
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system
US10511618B2 (en) 2014-03-19 2019-12-17 Nippon Telegraph And Telephone Corporation Website information extraction device, system website information extraction method, and website information extraction program
JP6030272B2 (en) * 2014-03-19 2016-11-24 日本電信電話株式会社 Website information extraction apparatus, system, website information extraction method, and website information extraction program
WO2015141665A1 (en) * 2014-03-19 2015-09-24 日本電信電話株式会社 Website information extraction device, system, website information extraction method, and website information extraction program
WO2017131985A1 (en) * 2016-01-27 2017-08-03 Microsoft Technology Licensing, Llc Predictive filtering of content of documents
US10795926B1 (en) 2016-04-22 2020-10-06 Google Llc Suppressing personally objectionable content in search results
US11741150B1 (en) 2016-04-22 2023-08-29 Google Llc Suppressing personally objectionable content in search results
CN106991150A (en) * 2017-03-28 2017-07-28 维沃移动通信有限公司 The display methods and mobile terminal of a kind of web data
CN106991150B (en) * 2017-03-28 2020-03-10 维沃移动通信有限公司 Webpage data display method and mobile terminal
WO2019068055A3 (en) * 2017-09-29 2020-03-26 AVAST Software s.r.o. Instanced web servers for displaying custom content in a secure context
US11882171B2 (en) 2017-09-29 2024-01-23 AVAST Software s.r.o. Instanced web servers for displaying custom content in a secure context
CN113407886A (en) * 2021-07-10 2021-09-17 广州数智网络科技有限公司 Network crime platform identification method, system, device and computer storage medium

Also Published As

Publication number Publication date
AU1970001A (en) 2001-05-14

Similar Documents

Publication Publication Date Title
WO2001033371A1 (en) System and method of filtering adult content on the internet
US7689666B2 (en) System and method for restricting internet access of a computer
US7222309B2 (en) System and method of a web browser with integrated features and controls
EP2013787B1 (en) Generating specialized search results in response to patterned queries
US7506055B2 (en) System and method for filtering of web-based content stored on a proxy cache server
US6571256B1 (en) Method and apparatus for providing pre-screened content
EP1376981B1 (en) Parental controls customization and notification
RU2336561C2 (en) Content filtering in process of web-viewing
US7613685B2 (en) System and method for personalized presentation of web pages
US6907423B2 (en) Search engine interface and method of controlling client searches
US20030014659A1 (en) Personalized filter for Web browsing
US20070157098A1 (en) System and Method of a Web Browser with Integrated Features and Controls
WO2002023343A1 (en) Web browser for limiting access to content on the internet
WO2006112856A1 (en) Method, system and software for centralized generation and storage of individualized requests and results
US20010033297A1 (en) Internet conduit providing a safe and secure environment
US20090199267A1 (en) Internet filtering utility using consumer-governed internet web site ratings, governor voting system and vote validation process
JP2004013258A (en) Information filtering system
EP1316008B1 (en) Data network access control
KR20050088477A (en) Content access control from an information carrier player
Baker et al. Local control over filtered www access
WO2002003167A2 (en) System and method for providing multiple levels of access to computer network content
CN1697380A (en) Method for guiding users to access Internet, and system of implementing the method
CA2505837A1 (en) A customized life portal on the internet
Uygar Oztekin et al. Usage Aware PageRank
Stubbs MySpace: building a dynamic digital persona using directory services

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP