KR20100089368A - On-line escort system and method thereof - Google Patents
On-line escort system and method thereof Download PDFInfo
- Publication number
- KR20100089368A KR20100089368A KR1020090008580A KR20090008580A KR20100089368A KR 20100089368 A KR20100089368 A KR 20100089368A KR 1020090008580 A KR1020090008580 A KR 1020090008580A KR 20090008580 A KR20090008580 A KR 20090008580A KR 20100089368 A KR20100089368 A KR 20100089368A
- Authority
- KR
- South Korea
- Prior art keywords
- word
- terminal
- server
- data
- portal server
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
Abstract
The present invention relates to an online security system and a security method. The present invention provides a terminal for performing data communication; A portal server performing data communication with the terminal; And a data communication session with the portal server subscribing to the service. 1) If the portal server does not delete the data from the terminal when the data received from the terminal corresponds to a slander to a specific person, legal measures are taken. 2) determine whether the word corresponds to the slander of a specific person by matching a pre-stored word with a word included in data transmitted from the terminal to the portal server. A non-banning service server that converts the word into a substitute word and transmits the converted word to the terminal and the portal server; It includes. This prohibits the slander of a specific person online, and provides the effect of replacing the unspeakable alternative words. In addition, the guard who uses the monitoring terminal connected with the non-prohibited service server notifies the person to take legal measures when the defamation data is not deleted, thereby providing protection for the specific person online. to provide.
Description
The present invention relates to a monitoring service for slander against a specific person online, specifically, a watchman using a monitoring terminal connected with a non-banning service server as well as preventing slander against a specific person online and replacing it with a substitute word. By virtue of a legal action if not to delete the defamation data transmission to a specific person by means of the non-banning service server and the online security system using a proxy server and a security method to protect the specific person.
Recently, with the development of wireless and wired communication, the use of the Internet and wireless communication devices has been generalized and diversified. Wired and wireless communication has been used as a comprehensive service by expanding into various forms in addition to simple call functions.
On the other hand, according to the development of such communication technology, there are useful points such as communication and information exchange with each other regardless of time and place, and in wired / wireless communication, malicious comments and data communication such as abusive language, pornography, and violence against specific people Increasingly, cases of mental pain are increasing.
Conventionally, in order to prevent such a phenomenon, Korean Patent Laid-Open Publication No. 1998-6971 discloses a method for processing and storing abusive and educationally inappropriate voice signals in a broadcasting medium that receives and outputs a signal transmitted from a broadcasting station. And a step of receiving a voice signal transmitted from a broadcasting station, comparing the received voice signal with a stored voice signal to determine whether they match, and a matching voice signal having a matching voice signal in the determination step. There has been a technology having a step of removing and outputting to a speaker, but this is limited to the voice signal, it is not prepared for wired and wireless communication.
Accordingly, there is a problem in that there is no countermeasure in case of including profanity such as abusive language by outputting a message such as malicious texts received from each information communication device on the screen as it is in wired or wireless communication.
In particular, in the case of entertainers and specific people, an unwanted message such as a disliked word, a low level language, abusive text, or a junk message may be received.
The technical problem of the present invention devised to improve the above-described problem is to provide an online security system and a security method for preventing slanders to celebrities and specific people online and notifying slanders.
However, the objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.
Online security system according to an embodiment of the present invention, the terminal for performing data communication; A portal server performing data communication with the terminal; And connecting a data communication session with the portal server subscribing to the service, and if the portal server does not delete the data from the terminal when the data received from the terminal corresponds to slander to a specific person, the legal server will take legal measures. Unblocking service server for transmitting a message of the content; It includes.
Online security system according to another embodiment of the present invention, the terminal for performing data communication; A portal server performing data communication with the terminal; And connecting a data communication session with the portal server subscribed to the service, matching the previously stored word with a word included in the data transmitted from the terminal to the portal server, and determining whether the word corresponds to a slander for a specific person. A non-ban prohibition service server for converting a word corresponding to a defamation into a substitute word and transmitting the word to the terminal and the portal server; It includes.
The online security system corresponds to the threshold value by matching a pre-stored word corresponding to a slander for a specific person transmitted from the terminal to the portal server and a word included in data transmitted from the terminal to the portal server. A proxy server that determines whether the word is a word, converts a word corresponding to the threshold value or more into a substitute word, and transmits the word to the terminal and the portal server; It may further include.
The proxy server substitutes a word corresponding to a slander for a specific person transmitted from the terminal to the portal server by a threshold, and a word for converting a word corresponding to the slander transmitted above the threshold received from the non-banning service server. May be stored to match.
Online security method according to an embodiment of the present invention, the portal server accesses the non-banning service server (Access) to join the non-banning service to connect the non-banning service server and the data session; The terminal is connected to the portal server, the first transmission step for transmitting data; And the non-ban service server to which the data session is connected, a message indicating that the portal server will take legal measures if the data received from the terminal does not delete the data to the terminal when the data is slandered against a specific person. A second transmission step of transmitting; It may include.
Online security method according to another embodiment of the present invention, the portal server accesses the non-banning service server (Access) to join the non-banning service to connect the non-banning service server and the data session; The terminal is connected to the portal server, the first transmission step for transmitting data; The first non-banning service server to which the data session is connected converts the data into a substitute word for the insult stored in the portal server when the word included in the data received from the terminal corresponds to the slander of the specific person. ; And the second non-banning service server transmits and registers the data including the converted substitute word to the portal server, and transmits the converted word to the terminal to transmit the registered word. It may include.
The online security method is a word stored in the pre-stored word corresponding to the slander of a specific person transmitted after the connection step from the terminal to the portal server from the terminal, and the data transmitted to the portal server. A second conversion step of matching and converting the word to the substitute word when the word corresponds to the threshold value or more; And a third transmission step of transmitting, by the proxy server, data including the converted substitute word to the portal server, registering the data, and transmitting the converted word to the terminal to transmit the converted word. It may further include.
As described above, according to the present invention, the prohibition of slander to a specific person online, and provides an effect of replacing with a non-explanatory substitute word.
In addition, according to the present invention, it is effectively prohibited through the proxy server for the frequently defamated words, and provides an effect to replace the replacement words.
Hereinafter, a detailed description of a preferred embodiment of the present invention will be described with reference to the accompanying drawings. In the following description of the present invention, detailed descriptions of well-known functions or configurations will be omitted when it is deemed that they may unnecessarily obscure the subject matter of the present invention.
In the present specification, when one component 'transmits' data or a signal to another component, any one component may directly transmit data or a signal to another component, and at least one other component. This means that data or a signal can be transmitted to other components through the APC.
1 is a view showing an online security system according to an embodiment of the present invention. Referring to FIG. 1, the online security system may include a
The
The
The
In addition, the
In addition, the watchman may transmit a message to the
On the other hand, the watchman may monitor not only the bulletin board and the like on the
The
The
The
The
In summary, the
In one embodiment of the present invention, the
2 is a view showing an online security system according to another embodiment of the present invention. Referring to FIG. 2, the online security system may include a
The
The
The
The
In addition, the
In addition, the guards can send a message to the
On the other hand, the watchdog may monitor not only the bulletin board and the like on the
In addition, the
The
The
The
In summary, the
In one embodiment of the present invention, the
3 is a view showing an online security system according to another embodiment of the present invention. 1 to 3, the online security system,
In the above embodiment, the online security system of the
On the other hand, it can be seen that the proxy server a (900a) for the
4 is a block diagram showing the configuration of a
The
The
As a result of the judgment, the word corresponding to the slander against the entertainer or the specific person is converted into a substitute word. To this end, the
The
The
Specific person A
Person B
Person C
Specific person D
Specific person E
Specific person F
Meanwhile, forbidden words and substitute words stored in the
According to another embodiment, the
In addition, the
On the other hand, the monitoring of the slander for a specific person is performed through the
In addition, the watchdog may monitor not only the bulletin board on the
5 is a block diagram showing the structure of a
1 to 5, the
The
The
The determination module notifies the fact to the conversion module when it is determined that the data transmission corresponds to the slander of the specific person.
The conversion module converts the data corresponding to the defamation into substitute words according to the notification of the fact.
To this end, the
Examples of forbidden words stored in the
Referring to Table 2, the
In addition, the
On the other hand, the
When the
6 is a flowchart illustrating an online security method for a wired terminal according to an embodiment of the present invention. 1 to 6, the
The
Thereafter, the
The
At this time, the
The
When the determination result is included, the
On the other hand, if not included in the determination result, the
The non-ban
The non-ban
If the determination result is not included, the
On the other hand, in the case of including the determination result, the data is converted into a substitute word for the pre-stored insult (S21).
After step S21, the
7 is a flowchart illustrating an online security method for a wireless terminal according to an embodiment of the present invention. 1 to 7, the
Thereafter, the
The
At this time, the
The
In addition, forbidden words and substitute words stored in the
When the determination result is included, the
On the other hand, if not included in the determination result, the
The non-ban
The non-ban
In addition, the
If the determination result is not included, the
On the other hand, if the determination result, the
After step S41, the
In this case, the
8 is a flowchart illustrating an online security method for a wired terminal according to another embodiment of the present invention. 1 to 8, the
The
The
As a result of the determination, the service is terminated if it is not specific slander data.
On the other hand, in the case of defamatory data of a specific person, the
Although not shown, the
9 is a flowchart illustrating an online security method for a wireless terminal according to another embodiment of the present invention. 1 to 9, the
The
The
As a result of the determination, the service is terminated if it is not specific slander data.
On the other hand, in the case of defamatory data of a specific person, the
Although not shown, the
The invention can also be embodied as computer readable code on a computer readable recording medium. Computer-readable recording media include all kinds of recording devices that store data that can be read by a computer system. Examples of computer-readable recording media include ROM, RAM, CD-ROM, magnetic tape, floppy disks, optical data storage devices, and the like, which are also implemented in the form of carrier waves (eg, transmission over the Internet). It also includes.
The computer readable recording medium can also be injected onto a networked computer system so that the computer readable code is stored and executed in a distributed fashion. And functional programs, codes and code segments for implementing the present invention can be easily inferred by programmers in the art to which the present invention belongs.
Although the contents of the present invention have been described with reference to one embodiment shown in the drawings, this is merely exemplary, and those skilled in the art may realize various modifications and other equivalent embodiments therefrom. I will understand. Therefore, the true technical protection scope of the present invention will be defined by the technical spirit of the appended claims.
According to the online security system and the security method of the present invention, it is possible to prohibit slander against a celebrity or a specific person online, and provide an industrially useful effect of performing an online protection for a specific person through a deletion request to the corresponding terminal. have.
1 is a view showing an online security system according to an embodiment of the present invention.
2 is a view showing an online security system according to another embodiment of the present invention.
3 is a view showing an online security system according to another embodiment of the present invention.
4 is a block diagram showing the configuration of a non-ban service server according to an embodiment of the present invention.
5 is a block diagram showing the structure of a proxy server according to an embodiment of the present invention.
6 is a flowchart illustrating an online security method for a wired terminal according to an embodiment of the present invention.
7 is a flowchart illustrating an online security method for a wireless terminal according to an embodiment of the present invention.
8 is a flowchart illustrating an online security method for a wired terminal according to another embodiment of the present invention.
9 is a flowchart illustrating an online security method for a wireless terminal according to another embodiment of the present invention.
<Description of the symbols for the main parts of the drawings>
100: wired terminal 200: wireless terminal
300: network 500: non-prohibited service server
510: first transceiver 530: first controller
550: first database 700: portal server
900: proxy server 910: the second transceiver
930: second control unit 950: second database
Claims (7)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090008580A KR20100089368A (en) | 2009-02-03 | 2009-02-03 | On-line escort system and method thereof |
PCT/KR2009/004530 WO2010090382A1 (en) | 2009-02-03 | 2009-08-13 | Online protection system and protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090008580A KR20100089368A (en) | 2009-02-03 | 2009-02-03 | On-line escort system and method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20100089368A true KR20100089368A (en) | 2010-08-12 |
Family
ID=42542255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020090008580A KR20100089368A (en) | 2009-02-03 | 2009-02-03 | On-line escort system and method thereof |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20100089368A (en) |
WO (1) | WO2010090382A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2951307B1 (en) * | 1998-03-10 | 1999-09-20 | 株式会社ガーラ | Electronic bulletin board system |
KR20010093365A (en) * | 2000-03-28 | 2001-10-29 | 유수애 | Method and apparatus for intercepting of input information |
KR20030024309A (en) * | 2001-09-17 | 2003-03-26 | 정상호 | Slang Remover Program On Web board |
JP3910894B2 (en) * | 2002-09-03 | 2007-04-25 | 株式会社コナミデジタルエンタテインメント | Server apparatus and program |
-
2009
- 2009-02-03 KR KR1020090008580A patent/KR20100089368A/en active Search and Examination
- 2009-08-13 WO PCT/KR2009/004530 patent/WO2010090382A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2010090382A1 (en) | 2010-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10110698B2 (en) | Method and apparatus for providing control of social networking sites | |
US8055241B2 (en) | System, apparatus and method for content screening | |
US20080134282A1 (en) | System and method for filtering offensive information content in communication systems | |
US20120191783A1 (en) | Method, device and system for content sharing and propagation | |
US7706263B2 (en) | Tracking and blocking of spam directed to clipping services | |
WO2008009224A1 (en) | A content filtering system, device and method | |
US20110213853A1 (en) | Bypassing uploading of data from a wireless device using outbound attachment caching | |
US20060264204A1 (en) | Method for sending a message waiting indication | |
WO2002096056A2 (en) | Mobile community communication | |
JP2007140578A (en) | System and method for managing community provided in information processing system | |
Zulkifli | TikTok in 2022: revisiting data and privacy | |
JP5555584B2 (en) | Access history management server, program and method for Web site | |
WO2017093412A1 (en) | System and method for detecting and predicting level of importance of electronic mail messages | |
KR20020040953A (en) | Image Processing Apparatus And Method In Mobile Internet | |
CN102316146A (en) | Method for achieving document transmission | |
KR20100089368A (en) | On-line escort system and method thereof | |
KR100463836B1 (en) | Contents conversion and cashing system and method through feature classification of wireless terminals | |
CN102045657A (en) | Multimedia service bearing method, terminal and system | |
KR20070114686A (en) | System for managing mobile webhard | |
JP2005267015A (en) | Server device | |
JP4290589B2 (en) | Server device | |
KR101090566B1 (en) | System and method for deliverying internet character message by selective user re-authentication | |
CN115190091A (en) | Method and device for pushing service message | |
Guizani | Wireless Communications Applications | |
JP2010140187A (en) | Content management device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
J201 | Request for trial against refusal decision | ||
AMND | Amendment | ||
B601 | Maintenance of original decision after re-examination before a trial | ||
J301 | Trial decision |
Free format text: TRIAL DECISION FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20110630 Effective date: 20111123 |