WO2002003167A2 - Systeme et procede assurant plusieurs niveaux d'acces a un contenu de reseau informatique - Google Patents
Systeme et procede assurant plusieurs niveaux d'acces a un contenu de reseau informatique Download PDFInfo
- Publication number
- WO2002003167A2 WO2002003167A2 PCT/US2001/020785 US0120785W WO0203167A2 WO 2002003167 A2 WO2002003167 A2 WO 2002003167A2 US 0120785 W US0120785 W US 0120785W WO 0203167 A2 WO0203167 A2 WO 0203167A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- web
- web site
- browser
- addresses
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to a system and method for providing multiple levels of access to content provided on computer networks and multiple levels of access to computer network communication protocols such as electronic mail (Email) and chat rooms.
- computer network communication protocols such as electronic mail (Email) and chat rooms.
- Computer networks such as the Internet or World Wide Web (“Web,” collectively) provide access to immeasurable amounts of content. However, due to age, maturity, religious beliefs, cultural beliefs, personal tastes, and other reasons, all of the available content is not suitable for all of the potential viewers. In addition, computer networks provide the ability to communicate, in a relatively anonymous fashion, using Email or chat rooms. Too often, users receive unsolicited and unwanted communications containing, likewise, objectionable material.
- Schemes exist that attempt to restrict the types of content or communications received over a given network. However, due to their manner of operation, existing schemes are not foolproof and still allow objectionable material to reach the user. For example, some schemes filter computer network content at the user's computer by blocking access to sites containing keywords or phrases predetermined as objectionable.
- Filtering schemes are often unsatisfactory because they are both under inclusive and over exclusive. For example, some sites may present objectionable material without the use of a forbidden keyword, thus, including material that should be excluded. In addition, sites may contain a word or words that may have both objectionable and unobjectionable meanings. For example, a site providing content related to carpentry may contain the words “joint” and “butt” in descriptions of various joinery techniques. However, “joint” and “butt” may be on the excluded list due to their frequent use on potentially objectionable sites relating to drug use and pornography respectively. Thus, the filter is over exclusive to the user interested in carpentry joinery techniques. Other drawbacks exist. Other proposed access schemes involve restricting access based upon user identification information.
- Some operating systems and Web browsers allow the creation of user profiles.
- the profile contains an indication that the user is of a particular age (e.g., child, teen, adult, etc.).
- the user profile is transmitted to the server hosting the site.
- One proposed scheme is for the server to block access to the site if the user profile indicates that the user is not of proper age to view the content as determined by the party hosting or providing the site.
- One drawback is that the success of this type of restricted access relies on Web site host server compliance and many Web sites may not have an incentive to restrict access to their content (e.g., commercial sites desiring as large an audience as possible). Other drawbacks exist.
- Another proposed filtering scheme involves limiting access to a certain list of pre-approved sites.
- a software module is downloaded into the operating system of a user's machine. This module verifies that each uniform resource locator (URL) entered in the Web browser is one that is on the list of pre-approved sites.
- URL uniform resource locator
- One problem with this approach is the pre-approved list is at the discretion of the software module provider. Thus, sites that some users do not find objectionable are blocked anyway because the software module provider has restricted access. Also, using a pre-approved site list offers little flexibility to add or delete sites at a later time.
- Filtering by pre-approval of sites is not always able to prohibit a child from following links off of an approved site out to inappropriate sites. Other drawbacks exist.
- one object of the invention is to overcome the above and other drawbacks in existing devices.
- Another object of the invention is to provide a browser that filters Web sites according to a top level domain name. Another object of the invention is to provide a browser that filters content according to computer network address. Another object of the invention is to provide filters to screen email or chat room messages from all but the persons on a predetermined configurable list.
- Another object of the invention is that a user's site access is not limited by restricted keywords.
- systems that filter site content using keywords may restrict such important information as is provided in encyclopedias, medical references, or the like.
- the present invention does not limit site access based on a predetermined list of keywords.
- the invention provides a computer network browser, capable of accessing Web sites.
- the particular Web sites that can be access are controlled by the browser.
- the browser may be configured to only access Web sites containing a certain top level domain name.
- the browser may be configured to only access Web sites that have a certain type of address.
- the invention provides a system and method to control the Web sites that a user may access.
- the system provides filters that restrict the email or chat room messages that a user may receive.
- the browser (or other email or chat message interface) may be provided with a customizable list of addresses from which a user is willing to accept messages. Any message from an address not on the list will be blocked from reaching the user.
- Figure 1 is a schematic of the overall system according to one embodiment of the invention.
- Figure 2 is one embodiment of a child appropriate browser interface.
- Figure 3 is a home page according to one embodiment of the invention.
- Figure 4 is one embodiment of one safeguard provided by the invention.
- Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions.
- Figure 6 is a schematic representation of the filtering according to one embodiment of the invention.
- Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention.
- a parent activates the invention using a processor based device capable of viewing Web sites.
- the processor based device may comprise, a personal computer, a laptop computer, a personal digital assistant (PDA), a Web enabled wireless phone, a suitably equipped television (e.g., Web TV), or other processor device capable of accessing and displaying Web content.
- PDA personal digital assistant
- the invention provides at least one browser capable of serving as a Web navigation interface. This browser is designed to only allow viewing of certain types of content.
- the browser may comprise a child appropriate browser that is designed to display content appropriate for children.
- the invention provides a child appropriate browser that is designed to be attractive and usable by children.
- the navigation buttons i.e., back, forward, home, etc.
- the navigation buttons are preferably designed so as to appeal to children (e.g., cartoons, bright colors, large fonts, etc.), screen displays and layouts are likewise designed to be attractive to children.
- the invention may provide access to certain child appropriate information as part of the browser interface.
- money management information such as The Dollar Digest from the Stein Roe Young Investor Fund
- could be presented on the browser interface e.g., as a scrolling "ticker tape" display.
- news items from child appropriate news sources e.g., kidspost.com, from the Washington Post, sikids.com, from Sports Illustrated for kids, etc.
- Trivia, games, and celebrity news may also be provided on the browser interface (e.g. , as part of a startup page or the like).
- the browser filters content by restricting the types of addresses that the browser will access.
- the browser may limit access to addresses containing a particular top level domain extension.
- the top level domain name extension of ".kid” could be used to designate the types of Web sites that the child appropriate browser would access.
- it may be the responsibility of the entity charged with assigning the .kid extension to police the content of any site having a .kid extension.
- Third parties (such as agencies) may also have part or all of this responsibility.
- the browser may restrict access to Web sites that contain a certain identifier in their address.
- the identifier may comprise .kid as part of the address (e.g., www.toys.kid.com).
- the invention provides for finer levels of parental supervision by restricting the Internet content displayed by the invention.
- some embodiments of the invention may provide a number of Internet browsing zones based on a rating system.
- Approved sites may implement (hyper text markup language (html) and/or flashprogramming to recognize the different zones based on user ID and ratings setup information which would be set up at initial installation by the parents (e.g., during set up procedures).
- html hyper text markup language
- flashprogramming to recognize the different zones based on user ID and ratings setup information which would be set up at initial installation by the parents (e.g., during set up procedures).
- National GeographicTM and The Smithsonian Institution may provide approved sites, but contain content that may be objectionable to some parents. By implementing the different.
- embodiments of the invention display content for only certain pre- approved portions of those sites.
- embodiments of the invention provide for parental control over the
- Email and chat messages that their child receives.
- the invention provides for the creation of a list of addresses from which receipt of a message is acceptable. For example, a child, or other user lacking a parental password, will not be able to Web chat or Email with someone that has not entered as an approved address.
- Approved addresses may be added under a parental control portion of the invention. Access to the parental control portion may be restricted, for example, by a parental password.
- the parental password may be configurable at installation, for example, to enable the parent to select a password. In addition, the password may be changeable at a later time so that the password may be varied.
- the approved address list may be described with reference to the following example.
- a child, Jane comes home from school and has a new friend, Joan, she met at school. Jane tells her parent(s) that she would like to Email her new- friend Joan. It is the parent's responsibility to make sure that Joan is an appropriate person for Jane to associate with. If the parent(s) feel that Web contact with Joan is appropriate, Joan's address may be added to the approved address list by the parent, using the appropriate parental password. In this manner, parents can supervise the addresses (and hence, persons associated with those addresses) from which the child receives messages. If the parent does not agree to add Joan's address to the approved address list, Jane will not receive any messages bearing Jane's E-mail address in the "from" line.
- Embodiments of the invention include additional browsers for enabling other levels of access to Web content.
- a "teenage” browser may be included to enable access to sited appropriate for teenage viewers.
- access may be limited by the use of a top level domain extension (e.g., ".teen") or by an identifier in the address (e.g., www.videogames.teen.com).
- a "regular" or unrestricted browser may be included to allow unrestricted access to all sites including those appropriate only for adults.
- access to the browser may be restricted by the use of appropriate protections.
- the unrestricted browser may be password protected to prevent unauthorized users from accessing the browser.
- a family installs the browser interface portion of the invention on their home computer.
- the Doe family has young children and teen age children and the parents themselves like to browse the web.
- the invention provides three separate interfaces for Web browsing. For example, the youngest Doe children access the Web using the child appropriate interface. For example, the children may enter a password or "click on" an appropriate icon. Activation of the child appropriate interface loads an interface which has information, colors, figures, and navigation aids to which young children relate (e.g., Teletubbies,TM Barney,TM etc.).
- FIG. 1 shows a schematic of the overall system 10 according to one embodiment of the invention.
- a hosting center 12 may be provided.
- Hosting center 12 may comprise a network of content providing servers 14A and 14B.
- the servers may comprise dedicated servers (e.g., 14A) or shared servers (e.g., 14B). Communication between the servers 14A, 14B, may be accomplished in any suitable fashion.
- the servers may comprise a distributed network of servers.
- Servers 14A, 14B provide suitable content for child or teenage Web browsers.
- the URL to identify content files on servers 14A, 14B may be designated by a specific top level domain name (e.g., ".kid").
- servers 14A, 14B are associated with a URL that has a viewer appropriate designation in the name.
- the URL may comprise identifier such as ".kid” as part of the locator in addition to the top level domain designator (e.g., www.toysite.kid.com).
- Embodiments of the invention filter Internet addresses to restrict browsing to those addresses containing a specified top level domain name or sub level domain name.
- filtering may be performed at the browser level. For example, the browser will not transmit (e.g., via transmission control protocol/Internet protocol (TCP/IP)) addresses without the proper top level or sub level domain name.
- TCP/IP transmission control protocol/Internet protocol
- filtering may occur after the address has been resolved into a numerical Internet address by a resolver.
- a resolver is the software in TCP IP that sends requests to a domain name server to convert hostnames (such as www.site.com) to Internet addresses (such as 117.123.4.2).
- a firewall 16 may be provided to ensure security of servers 14A, 14B.
- Firewall 16 may comprise any suitable security measures which prevent unauthorized access to servers 14A, 14B (e.g., preventing access by hackers 18).
- User processor device 20 is enabled to access the hosting center 12. Access may be accomplished in any suitable manner. For example, access may be accomplished through dial-up telephone connection, through wireless network connection, through LAN, WAN, or other network connection.
- processor device 20 may comprise any suitable Web browsing device.
- processor 20 may comprise a personal computer (PC), a Web enabled cellular phone, a Web enabled television, a personal digital assistant (PDA), a mainframe terminal, or any other suitable device.
- PC personal computer
- PDA personal digital assistant
- mainframe terminal or any other suitable device.
- Processor device 20 may comprise the appropriate software modules to enable Web browsing according to the present invention.
- processor device 20 may comprise browser interface software for child appropriate Web browsing, browser interface software for teenage appropriate Web browsing, browser interface software for unrestricted (i.e., adult) Web browsing, and any other browser categories that are convenient.
- Some embodiments of the invention include packaging more than one browser to form a suite of browsers. For example, a family having members of various ages may install an adult (or unrestricted browser), a teen browser and a kid browser on a single processor device.
- processor device 20 may comprise the appropriate software modules to restrict access to the various browser interfaces.
- processor device 20 may comprise software modules to enable the approved Email address lists, the parental password features, and other restricted access features as described herein.
- processor device 20 also provides access to the Web 22. Access to the Web 22 is enabled through the use of passwords or other appropriate parental controls as described herein.
- Figure 7 shows the installation and set up of the restricted browser according to one embodiment of the invention.
- the process initiates at step 70 by obtaining the software to enable the restricted browser.
- the software may be obtained in any suitable manner.
- the user may download the software from the Web at step 72 or obtain a CD or floppy disk containing the software at step 74.
- the software to enable the restricted browser may comprise a plug-in that modifies an existing browser (e.g., Netscape Navigator,TM Microsoft Internet Explorer,TM or the like) or it may comprise a complete browser package.
- an existing browser e.g., Netscape Navigator,TM Microsoft Internet Explorer,TM or the like
- it may comprise a complete browser package.
- the software is installed on an appropriate processor device (e.g., processor 20).
- processor device e.g., processor 20
- portions of the software will process an algorithm at the Internet Protocol (IP) level.
- IP Internet Protocol
- set up procedures may be implemented.
- Set up procedures may include selecting a password, a user identification number, various viewing rating levels, the types of content to be displayed, the acceptable E-mail address list, and other features of parental control described herein.
- Set up procedures 78 may be implemented through check boxes, menus, buttons, set up "wizards," or other acceptable user input technique.
- set up procedures 78 may include a password and user ID which will only authorize the IP standard protocol to work using that user ID and passcode.
- TCP/IP or point-to-point protocol (PPP) to send and receive data over any communications tool (e.g., NetScape, ICQ, AIM, AOL, filesharing, etc.)
- a daemon i.e., a program that runs continuously in the background, until it is activated by a particular event
- a daemon will embed itself on the hard drive so if new software applications are installed or the drive is erased or TCP/IP or PPP is replaced it will counteract as a guard telling the system files that the restricted browser software once resided within the TCP/IP or PPP extension.
- the daemon which is written on the root level directory at that point, would recommend the new software that is being downloaded to reinstall the restricted browser software or enter username and password to proceed. In this manner, the restricted browser software may not be easily removed without use of the parental password or user ID. Additionally, these procedures make it difficult for a non-restricted browser to be installed on the processor 20 without parental acquiescence.
- Figure 2 shows one embodiment of a child appropriate browser interface 24.
- the interface 24 may include appropriate Web navigational tools 26.
- the navigational tools 26 may comprise various icons, buttons, pull- down menus, or other appropriate devices.
- back button 27, forward button 28, stop button 29, reload button 30, search button 31 home button 32, print button 33, and tools button 34 may be provided to accomplish their known functions.
- the appearance of interface 26 may be designed with icons, pictures, colors, symbols, links, and other devices, that are attractive and appropriate for a child user.
- icon 36 may be provided as a link to an appropriate child content site (e.g., a children's television network site), link 37 may be provided to a child appropriate computer game, or other child appropriate content may be provided.
- an appropriate child content site e.g., a children's television network site
- link 37 may be provided to a child appropriate computer game, or other child appropriate content may be provided.
- FIG. 3 shows a home page 40 according to one embodiment of the invention.
- Home page 40 may be provided as a preliminary access point to a hosting center 12 network.
- home page 40 may comprise the usual home page features and attributes known in the art.
- a log-in link 42 may be provided to allow enhanced access to registered customers
- links 44 may be provided to enable access to various other Web site pages
- link 46 may be provided to enable users to download software updates and other files
- other home page features may be provided.
- Figure 4 shows one embodiment of one safeguard provided by the invention.
- a Web page 50 is presently displayed by the interface (e.g., a child appropriate browser). If a user attempts to access a Web page that does not contain the proper URL (e.g., a .kid extension or top level domain name) a warning message 52 may appear in the interface view.
- the warning 52 may comprise a pop-up window or other message known in the art.
- the warning 52 may instruct the user that access to the selected Web page is not authorized.
- the user may be prompted to input a password or other appropriate security device in order to access the page.
- Figure 5 depicts one embodiment of another aspect of the restricted browser security provisions.
- an access denial 54 is presented to the user upon the failure to satisfy a pre-determined security measure.
- the user may have entered an incorrect URL or password and has, subsequently been denied access to the page.
- the browser interface may automatically load an approved Web page (e.g., home page 40) upon the denial of access.
- FIG. 6 shows a filtering routine 100 according to one embodiment of the invention.
- filtering routine 100 may commence upon activation of a browser at step 102.
- activation 102 may comprise selecting an icon from a desktop display, entering a run command, double clicking on the icon, or other method of initiating the browser software.
- activation 102 may also include entering a password or performing other security measures to verify the identity of the user.
- the user selects a Web destination at step 104. Selection of a Web destination may be accomplished in any suitable manner.
- the user may select a destination from a list of stored "bookmarks" or "favorites," the user may type a destination into an address field, the user may follow links provided on a home page, or the user may use features of the browser interface (e.g., the navigation buttons) to choose a destination.
- the browser interface e.g., the navigation buttons
- verification step 106 may comprise checking that the address includes the proper extension (e.g., .kid, or the like).
- the browser interface may be configured to not accept any URL that does not contain the proper extension.
- step 106 may comprise checking that the address includes the proper identifier (e.g., .kid.com, or the like).
- Alternate procedures 108 may comprise any suitable method of restricting access to the inappropriate destination.
- the invention may cause the browser to display an error message (e.g., page restricted - access denied), return to a home page, proceed to a known appropriate destination, prompt the user for an appropriate destination, or other suitable response.
- the browser may display an "unable to locate the server" message or display a simple written notification along with sound notification.
- the invention enables the browser to access the destination at step 110.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001271651A AU2001271651A1 (en) | 2000-06-29 | 2001-06-29 | System and method for providing multiple levels of access to computer network content |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US60587600A | 2000-06-29 | 2000-06-29 | |
US09/605,876 | 2000-06-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002003167A2 true WO2002003167A2 (fr) | 2002-01-10 |
WO2002003167A3 WO2002003167A3 (fr) | 2012-02-02 |
Family
ID=24425561
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/020785 WO2002003167A2 (fr) | 2000-06-29 | 2001-06-29 | Systeme et procede assurant plusieurs niveaux d'acces a un contenu de reseau informatique |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001271651A1 (fr) |
WO (1) | WO2002003167A2 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004059941A1 (fr) * | 2002-12-30 | 2004-07-15 | Koninklijke Philips Electronics N.V. | Restriction de l'acces d'utilisateurs a un contenu de serveur a partir d'un lecteur de support d'informations |
GB2481356A (en) * | 2011-02-07 | 2011-12-21 | F Secure Corp | Controlling Internet access using DNS root server reputation |
JP2014102568A (ja) * | 2012-11-16 | 2014-06-05 | Nintendo Co Ltd | 情報処理システム、情報処理装置、情報処理プログラムおよび情報処理方法 |
US20150178516A1 (en) * | 2013-12-23 | 2015-06-25 | Dropbox, Inc. | Restricting access to content |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884033A (en) * | 1996-05-15 | 1999-03-16 | Spyglass, Inc. | Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions |
US6393464B1 (en) * | 1999-05-10 | 2002-05-21 | Unbound Communications, Inc. | Method for controlling the delivery of electronic mail messages |
-
2001
- 2001-06-29 AU AU2001271651A patent/AU2001271651A1/en not_active Abandoned
- 2001-06-29 WO PCT/US2001/020785 patent/WO2002003167A2/fr active Search and Examination
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004059941A1 (fr) * | 2002-12-30 | 2004-07-15 | Koninklijke Philips Electronics N.V. | Restriction de l'acces d'utilisateurs a un contenu de serveur a partir d'un lecteur de support d'informations |
GB2481356A (en) * | 2011-02-07 | 2011-12-21 | F Secure Corp | Controlling Internet access using DNS root server reputation |
GB2481356B (en) * | 2011-02-07 | 2012-06-13 | F Secure Corp | Controlling internet access using dns root server reputation |
GB2487789A (en) * | 2011-02-07 | 2012-08-08 | F Secure Corp | Controlling Internet access using DNS root reputation |
US8499077B2 (en) | 2011-02-07 | 2013-07-30 | F-Secure Corporation | Controlling internet access using DNS root server reputation |
JP2014102568A (ja) * | 2012-11-16 | 2014-06-05 | Nintendo Co Ltd | 情報処理システム、情報処理装置、情報処理プログラムおよび情報処理方法 |
US20150178516A1 (en) * | 2013-12-23 | 2015-06-25 | Dropbox, Inc. | Restricting access to content |
US9817987B2 (en) * | 2013-12-23 | 2017-11-14 | Dropbox, Inc. | Restricting access to content |
US11372990B2 (en) | 2013-12-23 | 2022-06-28 | Dropbox, Inc. | Restricting access to content |
Also Published As
Publication number | Publication date |
---|---|
AU2001271651A1 (en) | 2002-01-14 |
WO2002003167A3 (fr) | 2012-02-02 |
AU2001271651A8 (en) | 2012-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7353234B2 (en) | Customized user interface based on user record information | |
US10534926B2 (en) | Messaging systems and methods | |
AU2003204444B8 (en) | Administrator controls used to filter online actions | |
US7555721B2 (en) | Customized user interface | |
US6571256B1 (en) | Method and apparatus for providing pre-screened content | |
US8667608B2 (en) | Persistent public machine setting | |
US7624351B2 (en) | Methods and apparatus for controlling a plurality of applications | |
US20110047606A1 (en) | Method And System For Storing And Using A Plurality Of Passwords | |
US20030222902A1 (en) | System and method of a web browser with integrated features and controls | |
US20030004897A1 (en) | Method and system for communicating user specific information | |
US20070157098A1 (en) | System and Method of a Web Browser with Integrated Features and Controls | |
JP2002082912A (ja) | メールバック方式によるキャリアフリー端末認証システム | |
EP2281261A1 (fr) | Bannière cryptée en surimpression | |
US20010033297A1 (en) | Internet conduit providing a safe and secure environment | |
WO2002003167A2 (fr) | Systeme et procede assurant plusieurs niveaux d'acces a un contenu de reseau informatique | |
KR20050088477A (ko) | 정보매체 플레이어로부터의 콘텐츠 액세스 제어 | |
KR20000058929A (ko) | 이용자 연령에 적합한 인터넷 접속 제어 시스템 및 방법 | |
WO2008014336A2 (fr) | Logiciel de sécurité de réseau employant une authentification à facteurs multiples et procédé apparenté | |
Whitworth | Politeness as a social software requirement | |
KR100449863B1 (ko) | 유해 웹사이트 접속 방지 방법 | |
WO2002044861A9 (fr) | Procede permettant d'etablir une connexion entre un ordinateur distant et un serveur |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) |