KR20100022281A - Wireless internet service system for blocking access to harmful site and method thereof - Google Patents
Wireless internet service system for blocking access to harmful site and method thereof Download PDFInfo
- Publication number
- KR20100022281A KR20100022281A KR1020080080885A KR20080080885A KR20100022281A KR 20100022281 A KR20100022281 A KR 20100022281A KR 1020080080885 A KR1020080080885 A KR 1020080080885A KR 20080080885 A KR20080080885 A KR 20080080885A KR 20100022281 A KR20100022281 A KR 20100022281A
- Authority
- KR
- South Korea
- Prior art keywords
- site
- harmful
- access
- harmful site
- information
- Prior art date
Links
Images
Abstract
A method of blocking access to a harmful site for a wireless Internet service is provided. The harmful site access blocking method includes storing and managing harmful site information related to a harmful site in a database, receiving an access request for at least one site from a mobile terminal, and receiving the harmful site information in response to the access request. And determining whether the at least one site is the at least one harmful site. When the access request is denied, the mobile terminal may store information related to the at least one site so that the mobile terminal independently rejects the reconnection request for the at least one site.
Description
The present invention relates to a technology for providing a wireless Internet service using a mobile communication system, and more particularly, to a wireless internet service method and system for blocking access to a harmful site.
Recently, various wireless communication technologies have been developed. Therefore, users are provided with various contents through the wireless Internet service without limitation of time and place. In particular, users want to be provided with a wireless internet service quickly by using full browser terminals.
In general, when a user wants to access a specific site through a mobile terminal, the mobile terminal transmits a Uniform Resource Locator (URL) of the specific site to a wireless Internet server for a wireless Internet service through a base station. Then, the wireless Internet server downloads the page information of the URL of the specific site from the Internet, and then transfers the downloaded page information of the specific site to the mobile terminal through the base station.
However, many users or service providers are only interested in speeding up the provision of wireless Internet services and have not paid much attention to protecting youth or children from harmful information. Therefore, many adolescents or children have a problem that can easily obtain harmful information through a wireless Internet service.
Therefore, there is a need for a technology that effectively blocks access to harmful sites so that these adolescents or children are not exposed to harmful information.
In the harmful site access blocking method according to an embodiment of the present invention, before the wireless Internet server processes the access request of the mobile terminal, the access request is intercepted to determine whether the site that the mobile terminal wants to access is a harmful site. By doing so, unnecessary operations performed on the wireless Internet server can be reduced.
In addition, the mobile terminal according to an embodiment of the present invention by storing the information associated with the site so that the mobile terminal can independently reject the reconnection request to the site, if any one site is identified as a harmful site Therefore, it is possible to efficiently provide access to harmful sites.
In addition, the harmful site access blocking server according to an embodiment of the present invention can effectively protect users who should not be exposed to harmful information on the wireless Internet by providing a harmful site access blocking service on the wireless Internet.
In accordance with an embodiment of the present invention, a method of preventing access to a harmful site for a wireless Internet service includes storing and managing harmful site information related to at least one harmful site in a database, and requesting access to at least one site from a mobile terminal. Determining whether the at least one site is the at least one harmful site based on the harmful site information in response to the access request, and wherein the at least one site is the at least one harmful site. If it is determined to be, the step of rejecting the access request.
In this case, in response to the connection request being rejected, the mobile terminal may store information related to the at least one site so that the mobile terminal independently rejects the reconnection request for the at least one site.
In addition, a method of operating a mobile terminal for receiving a wireless Internet service according to an embodiment of the present invention includes transmitting a user's access request to at least one site to a harmful site access blocking server through a wireless communication network; The site access blocking server determines whether the at least one site is the at least one harmful site on the basis of previously stored harmful site information on at least one harmful site. If it is determined to be a harmful site, receiving a connection rejection message via the wireless communication network and providing the screen information corresponding to the access rejection message to the user.
In addition, the harmful site access blocking server for a wireless Internet service according to an embodiment of the present invention is a database for storing harmful site information associated with at least one harmful site, access request for at least one site transmitted from the mobile terminal An access request receiver for receiving a connection, a harmful site determining unit determining whether the at least one site is the at least one harmful site based on the harmful site information in response to the access request, and the access based on the determination result It includes a connection request processing unit for processing the request.
In the harmful site access blocking method according to an embodiment of the present invention, before the wireless Internet server processes the access request of the mobile terminal, the access request is intercepted to determine whether the site that the mobile terminal wants to access is a harmful site. Thereby reducing unnecessary operations performed on the wireless Internet server.
In addition, the mobile terminal according to an embodiment of the present invention by storing the information associated with the site so that the mobile terminal can independently reject the reconnection request to the site, if any one site is identified as a harmful site Provide efficient blocking of harmful site access.
In addition, the harmful site access blocking server according to an embodiment of the present invention effectively protects users who should not be exposed to harmful information on the wireless Internet by providing a harmful site access blocking service on the wireless Internet.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
1 is a diagram illustrating a network for a wireless Internet service using a mobile communication system according to an embodiment of the present invention.
1, a network for a wireless Internet service using a mobile communication system includes a mobile terminal 110 (MS), a base station 120 (BTS), a public switched data network (PSDN) 130, and a
The
Service providers should take measures to prevent teens or children from accessing harmful sites. At this time, it is inefficient for the
However, harmful site
The harmful site
The harmful site
If the site requested to be accessed by the mobile terminal is not a harmful site, the harmful site
In contrast, when the site requested to be accessed by the mobile terminal is a harmful site, the harmful site
In particular, the mobile terminal can store information related to a site identified as a harmful site. In addition, when there is a reconnection request for the site using the information, the mobile terminal may independently reject the reconnection request without transmitting a reconnection request to the harmful site
2 is a flowchart illustrating a harmful site access blocking method for a wireless Internet service according to an embodiment of the present invention.
Referring to FIG. 2, the harmful site access blocking method stores and manages harmful site information related to at least one harmful site in a database (S210).
Here, the harmful site information may include URL (Uniform Resource Locator, URL) information or IP (Internet Protocol) address information of the at least one malicious site. At this time, the harmful site information stored and managed in the database may be updated based on an external input or a determination result of the harmful site.
In addition, the harmful site access blocking method receives an access request for at least one site from the mobile terminal (S220). The access request for the at least one site may include URL (Uniform Resource Locator, URL) information or IP (Internet Protocol) address information of the at least one site.
In particular, the harmful site access blocking method intercepts the mobile terminal's access request and determines whether the requested site is a harmful site before the wireless Internet server downloads the page information from the Internet according to the access request of the mobile terminal. Can be.
In addition, the harmful site access blocking method determines whether the at least one site is the at least one harmful site on the basis of the harmful site information in response to the access request (S230). At this time, before the wireless Internet server for providing the wireless Internet service requests the page information for the at least one site from the Internet, by determining whether the at least one site is the at least one harmful site, Unnecessary operations of the wireless Internet server can be reduced.
If the access request site is not a harmful site, the harmful site access blocking method processes the page information of the at least one site to be transmitted to the mobile terminal (S240). That is, by being informed to the wireless internet server that the site requested to be connected is not a harmful site, the wireless internet server can download the page information from the internet and transmit the page information to the mobile terminal via the wireless communication network.
On the contrary, when it is determined that the at least one site is the at least one harmful site, the harmful site access blocking method denies the access request.
That is, the harmful site access blocking method processes the access denial message notifying that the at least one site is the at least one harmful site to the mobile terminal (S250). The access denial message may be sent directly by the harmful site access blocking server, or may be sent by the wireless Internet server at the request of the harmful site access blocking server.
In addition, when it is determined that the at least one site is the at least one harmful site, the harmful site access blocking method processes the page information of the at least one site and another site to be downloaded to the mobile terminal (S260). For example, page information that is harmless to adolescents or children may be transmitted to the mobile terminal.
The harmful site access blocking method according to the present invention can be efficiently applied to a network for a wireless Internet service using a mobile communication system.
3 is a flowchart illustrating an operation method of a mobile terminal for a wireless Internet service according to an embodiment of the present invention.
Referring to FIG. 3, the method for operating a mobile terminal according to an embodiment of the present invention transmits a user's access request to at least one site to a harmful site access blocking server through a wireless communication network (S310).
At this time, the wireless Internet server does not download the page information of the requested site until it is determined whether the site requested by the harmful site access server is a harmful site. The harmful site access blocking server determines whether the at least one site is the at least one harmful site on the basis of previously stored harmful site information on at least one harmful site.
In addition, when it is determined that the at least one site is the at least one harmful site, the method for operating a mobile terminal receives an access rejection message through the wireless communication network (S320).
In addition, the operation method of the mobile terminal displays the screen information corresponding to the received access denial message (S350). For example, the screen of the mobile terminal may display information indicating that the access request is denied in the form of a pop-up window.
In addition, although not explicitly illustrated in FIG. 3, the method of operating the mobile terminal may further include receiving page information of the at least one site and another site through the wireless communication network.
In addition, the operation method of the mobile terminal stores information related to the at least one site determined as the at least one harmful site in the memory in response to the access denial message (S330).
In addition, the operation method of the mobile terminal independently rejects the reconnection request to the at least one site by using the information related to the at least one site (S340).
Therefore, the mobile terminal according to an embodiment of the present invention may independently reject the reconnection request, thereby more effectively blocking access to the harmful site.
The harmful site access blocking method and the mobile terminal operating method for the wireless Internet service according to the present invention may be implemented in the form of program instructions that can be executed by various computer means and recorded in a computer readable medium. The computer readable medium may include program instructions, data files, data structures, etc. alone or in combination. Program instructions recorded on the media may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well-known and available to those having skill in the computer software arts. Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks. Magneto-optical media, and hardware devices specifically configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like. Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like. The hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
Figure 4 is a block diagram showing a malicious site access blocking server according to an embodiment of the present invention.
Referring to FIG. 4, the harmful site
The
In addition, the
In addition, the harmful
At this time, the harmful
In addition, the connection
In addition, when it is determined that the at least one site is the at least one harmful site, the access
As described above, the present invention has been described by way of limited embodiments and drawings, but the present invention is not limited to the above embodiments, and those skilled in the art to which the present invention pertains various modifications and variations from such descriptions. This is possible.
Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined not only by the claims below but also by the equivalents of the claims.
1 is a diagram illustrating a network for a wireless Internet service using a mobile communication system according to an embodiment of the present invention.
2 is a flowchart illustrating a harmful site access blocking method for a wireless Internet service according to an embodiment of the present invention.
3 is a flowchart illustrating an operation method of a mobile terminal for a wireless Internet service according to an embodiment of the present invention.
Figure 4 is a block diagram showing a malicious site access blocking server according to an embodiment of the present invention.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080080885A KR20100022281A (en) | 2008-08-19 | 2008-08-19 | Wireless internet service system for blocking access to harmful site and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080080885A KR20100022281A (en) | 2008-08-19 | 2008-08-19 | Wireless internet service system for blocking access to harmful site and method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20100022281A true KR20100022281A (en) | 2010-03-02 |
Family
ID=42174870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020080080885A KR20100022281A (en) | 2008-08-19 | 2008-08-19 | Wireless internet service system for blocking access to harmful site and method thereof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20100022281A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013147421A1 (en) * | 2012-03-28 | 2013-10-03 | 주식회사 케이티 | Server and method for managing access of terminal to connection blocked resource and terminal |
KR101306844B1 (en) * | 2010-12-21 | 2013-11-21 | 주식회사 케이티 | Method and Apparatus for Searching and Intercepting Web Browsing Action of Smartphone |
GB2505529A (en) * | 2012-11-08 | 2014-03-05 | F Secure Corp | Protecting a user from compromised web resources |
KR102617515B1 (en) * | 2023-07-31 | 2023-12-27 | (주)에잇스니핏 | Method and device for blocking illegal and harmful information sites using favicon |
-
2008
- 2008-08-19 KR KR1020080080885A patent/KR20100022281A/en not_active Application Discontinuation
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101306844B1 (en) * | 2010-12-21 | 2013-11-21 | 주식회사 케이티 | Method and Apparatus for Searching and Intercepting Web Browsing Action of Smartphone |
WO2013147421A1 (en) * | 2012-03-28 | 2013-10-03 | 주식회사 케이티 | Server and method for managing access of terminal to connection blocked resource and terminal |
GB2505529A (en) * | 2012-11-08 | 2014-03-05 | F Secure Corp | Protecting a user from compromised web resources |
GB2505529B (en) * | 2012-11-08 | 2014-07-30 | F Secure Corp | Protecting a user from a compromised web resource |
US9231971B2 (en) | 2012-11-08 | 2016-01-05 | F-Secure Corporation | Protecting a user from a compromised web resource |
KR102617515B1 (en) * | 2023-07-31 | 2023-12-27 | (주)에잇스니핏 | Method and device for blocking illegal and harmful information sites using favicon |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8490183B2 (en) | Security ensuring by program analysis on information device and transmission path | |
US8526405B2 (en) | Routing network requests based on requesting device characteristics | |
JP2005536787A (en) | Method and system for managing cookies according to privacy policy | |
EP3175365B1 (en) | Web redirection for content filtering | |
US10555147B2 (en) | Systems and methods for facilitating service provision between applications | |
US9876896B1 (en) | System and method of interdicting malware infiltration as spoofed advertisement | |
US10158548B2 (en) | Methods and systems for signing resource identifiers | |
CN104333567A (en) | Web caching with security as a service | |
US9271146B2 (en) | Mobile privacy information proxy | |
US9015791B2 (en) | Method of managing web application policy using smart card, and web server and mobile terminal for implementing the same | |
US9462566B1 (en) | System and method for providing limited communication services to unprovisioned mobile communication devices | |
KR20100022281A (en) | Wireless internet service system for blocking access to harmful site and method thereof | |
JP4512083B2 (en) | Ensuring security on the transmission path for programs provided to communication terminals via the network | |
KR100642998B1 (en) | Policy message transmission method for upgrade policy of mobile | |
JP6898680B2 (en) | Information processing equipment and programs | |
KR100606238B1 (en) | A method and a system for filtering spam short messages | |
JP2009277227A (en) | Filtering method for advertisement blocking function and system | |
US10440022B2 (en) | Identity management | |
CN109284616B (en) | Data access and data issuing method, device, equipment and storage medium | |
KR100601848B1 (en) | Method for Processing Download Descriptor in Mobile Communication Terminal | |
CN101854370A (en) | Method, system and device for terminal to access server | |
KR102148189B1 (en) | Apparatus and method for protecting malicious site | |
CN114301778B (en) | Access control method and device | |
KR101868984B1 (en) | Push service management method and apparatus thereof | |
US11086990B2 (en) | Security module for mobile devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |