KR20110129224A - Computer terminal having integrated control module to block harmful object and blocking system thereof - Google Patents

Computer terminal having integrated control module to block harmful object and blocking system thereof Download PDF

Info

Publication number
KR20110129224A
KR20110129224A KR1020100048741A KR20100048741A KR20110129224A KR 20110129224 A KR20110129224 A KR 20110129224A KR 1020100048741 A KR1020100048741 A KR 1020100048741A KR 20100048741 A KR20100048741 A KR 20100048741A KR 20110129224 A KR20110129224 A KR 20110129224A
Authority
KR
South Korea
Prior art keywords
unit
blocking
computer terminal
harmful
image
Prior art date
Application number
KR1020100048741A
Other languages
Korean (ko)
Inventor
김주엽
방경석
Original Assignee
(주)뮤레카
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)뮤레카 filed Critical (주)뮤레카
Priority to KR1020100048741A priority Critical patent/KR20110129224A/en
Priority to PCT/KR2010/003479 priority patent/WO2011149137A1/en
Publication of KR20110129224A publication Critical patent/KR20110129224A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

PURPOSE: A computer terminal including an integrated control module for blocking a hazardous article and hazardous article blocking system using the same are provided to prevent the access of a hazardous article by enabling a user to manage the operation of the integrated control module. CONSTITUTION: When a connection command about a hazardous article is received from a terminal, a website blocking unit(10) blocks a connection and creates a blocking list. When the execution command of harmful video data is received from the terminal, a video blocking unit(20) blocks the execution of a video and creates the blocking list. A video searching unit(30) creates an extraction list by searching the harmful video data stored in the terminal. A establishment management unit(40) determines a blocking website, establishes the usage time of the terminal, and controls the operation of the website blocking unit, the video blocking unit, and the video searching unit.

Description

Computer Terminal Having Integrated Control Module to Block Harmful Object and Blocking System Thereof}

The present invention provides a computer terminal having an integrated control module for preventing harmful substances for inducing sound computer use and emotional cultivation by blocking harmful video access including harmful websites and access to harmful websites through children's computer terminals, and blocking harmful substances using the same. More specifically, it relates to a system, and more particularly, to install harmful control websites that block harmful website access, video transmission and execution, and to configure the control settings of the integrated control module so that parents can manage harmful websites. You can prevent your children's computer addiction by preventing access to videos and videos in advance and limiting computer usage time. Inductively It is not a simple blocking of harmful sites or blocking of image data by using hash information, but by extracting feature point data of image data to determine whether it is harmful. It relates to a computer terminal and a pest blocking system using the same.

As a result of conducting a comprehensive youth survey on young people in 2009, 50.5% of the respondents said they had seen pornography, and 39.4% of male students felt the urge to follow it after watching pornography. It was much higher than%.

37.9% of teenagers who have been exposed to pornography reported that they had been exposed to pornography first through spam, text, or Internet sites. 35.4% said that they had found pornography through others, and 20.9% had found it themselves.

Most of the media that sees pornography are the Internet, and 40.7% of them are mostly exposed to pornography, and 37.3% of the homes are mostly watching pornography, and 6.8% of friends' houses and 1.4% of schools. , 1.0% of PC rooms and 0.3% of video rooms.

In other words, most illegal videos are distributed through a PC with internet installed, and more than half of them are downloaded from illegal video distribution websites or P2P sites.

Therefore, it is no exaggeration to say that illegal videos are viewed through harmful websites or through peer-to-peer websites at home, which are mostly home.

However, in most homes, there is no system that blocks harmful websites and illegal videos, and parents are neglected by their parents on their PCs due to the late return time of their parents at work. It does not know what harmful video files are stored on the PC.

As a result, most children are out of control of their parents because they secretly use the Internet at night or watch illegal videos using their PCs. Therefore, supplementary measures for blocking illegal videos are urgently needed.

In addition, children's age on the Internet is gradually decreasing, so they may intentionally access harmful websites or watch harmful videos. The emotional adverse effects that will occur are very serious, requiring the provision of a system that blocks both unintended and unintended connections.

The present invention has been made to solve the above problems, by installing an integrated control module that can block harmful website access and video transmission and execution in the computer terminal, and by configuring the operation settings of the integrated control module so that the guardian can manage By preventing access to harmful websites and videos from children, and limiting computer usage time, children can be prevented from computer addiction. In order to induce children's genealogy, and forgery in the distribution process of image data is made by extracting feature point data of image data to determine whether it is harmful, rather than simple harmful site blocking or image data blocking method using hash information. Completely harmful The object of the present invention is to provide a computer terminal and a pest blocking system using the same.

The present invention has the following features to achieve the above object.

The present invention provides a computer terminal connected to an internet network and connected to an external server for data communication. If the computer terminal is a previously set blocking website or a site determined to be harmful, the computer terminal blocks access. In case that there is an execution command of image data that is considered to be harmful image data, it detects it and blocks execution, retrieves harmful image data in the computer terminal, provides the extraction list to the user, and configures to limit the computer usage time. The control module is installed and executed.

In this case, the integrated control module blocks a connection and generates a blocking history when there is an access command on a website that is determined to be a harmful website or a blocking website set by a user through the computer terminal. A blocking part; An image blocking unit for blocking execution of the image data and generating a breakdown history when there is an execution command of the image data determined to be harmful image data through the computer terminal; An image search unit for searching for harmful image data stored in the computer terminal and generating an extraction list; A setting management unit for designating a website to be blocked by the computer terminal, setting a usage time of the computer terminal, and setting whether to operate the website blocking unit, the image blocking unit, and the image searching unit; The computer terminal setting history and the website blocking unit, the image blocking unit, and the image retrieval unit setting settings are read to control the usage time of the computer terminal, and the website blocking unit, the image blocking unit, and the image searching unit are operated. And a control unit for providing a user's request for a block list generated by the website blocking unit and the image blocking unit and an extraction list of the image searching unit.

In addition, the integrated control module further includes a program blocker for blocking a program designated by the setting manager through the computer terminal when there is an execution command and generating a breakdown history, wherein the controller controls whether the program blocker operates. The website blocking unit and the image blocking unit call the hash information of the harmful website and harmful image data from an external management server to determine that the harmful website and the harmful image data are determined.

In addition, the integrated control module further includes a local information unit for receiving in real time the hash information of the harmful website and harmful image data from an external management server to provide the hash information stored in the local information to the website blocking unit and the image blocking unit It is configured to determine the harmful website and harmful image data of the website blocking portion and the image blocking portion, and if you want to determine the harmfulness of the image data is received harmful point data of the harmful image data from the external management server further harmful image The determination of the data is made.

The setting manager may include a website setting unit for designating a website to be blocked by the computer terminal, a program setting unit for designating a program to be blocked, a usage time setting unit for setting a usage time of the computer terminal, A mode setting unit for setting a protection mode in which the website blocking unit, an image blocking unit, and an image searching unit is performed, and a release mode in which the operation is stopped, and a user authentication unit for allowing user authentication to be performed when necessary when changing the setting. When the image data in the computer terminal is transmitted to the external server through the computer terminal, the integrated control module determines whether the image data to be transmitted through the harmful image hash information and the feature point data is harmful and is determined to be harmful image data. Video transmission to block its transmission A blocking part is included.

In addition, when the integrated control module has a stop or delete command of the integrated control module operated by the user, the integrated control module determines whether the user has permission to stop or delete based on the user identification information stored in the user authentication unit. An administrator authentication unit for blocking the execution of the command is included, and the integrated control module is connected to a specific website through the computer terminal to determine whether the data that communicates with the specific website is a streaming video and is determined to be a streaming video Hash information of harmful streaming video data stored in the local information unit through the local information unit to judge the hash information or feature point data of the streaming video by receiving the hash information or feature point data of the harmful streaming video data from an external management server. It is determined whether harmful streaming video by comparing the characteristic data and includes additional streaming off to block the run thereof when it is determined by ten thousand and one harmful streaming video.

In addition, the pest blocking system according to the present invention is connected to the Internet network and connected to the external server to communicate data, and when the external website is connected to the pre-set blocking website or a site that is determined to be harmful sites, blocking the access, Integrated control module that detects the execution command of the image data that is judged to be the image data and blocks the execution, detects harmful image data in the computer terminal, provides the extraction list to the user, and limits the computer usage time. A computer terminal which is installed and performed; A management server for transmitting hash information or feature point data of harmful sites and harmful image data to the computer terminal in real time according to a request or setting of the computer terminal; And a guardian terminal connected to the computer terminal for data communication, and receiving a connection extraction history and execution blocking history and a search extraction list of harmful image data in real time according to a request or setting through the integrated control module.

Herein, the integrated control module blocks a connection and generates a blocking history when there is an access command on a website corresponding to a website or a website set by a user determined to be a harmful website through the computer terminal. A site blocking unit, an image blocking unit for blocking execution and generating a blocking history when there is an execution command of image data determined to be harmful image data through the computer terminal, and searching for harmful image data stored in the computer terminal An image search unit for generating an extraction list, a setting manager for designating a website to be blocked by the computer terminal, setting a usage time of the computer terminal, and setting whether to operate the website blocker, an image blocker, and an image search unit; Reminding the designated program through the setting management unit Program blocker for blocking execution if there is an execution command through the computer terminal and generating a blocking history, and video to be transmitted through harmful image hash information or feature point data when transmitting image data in the computer terminal to the external server through the computer terminal. If it is determined that the data is harmful and harmful image data is determined to block the transmission of the video transmission block and generate a breakdown history, the computer terminal setting details and website block, video block, video block Controls the usage time of the computer terminal by reading the operation settings of the searcher, the image transmission blocker and the program blocker, and controls the operation of the website blocker, the image blocker, the image searcher, the image transmission blocker and the program blocker. Website blocker, image blocker, image blocker, and The control unit that provides the block list generated by the RAM blocker and the extraction list of the image search unit when the user requests it, and the user identification information stored in the user authentication unit when a command to stop or delete the integrated control module operated by the user is provided. Determining whether the user is authorized to suspend or delete through the administrator if the authority does not include the administrator authentication unit to block the execution of the suspend or delete command.

In addition, the guardian terminal receives from the control unit of the integrated control module the block list generated by the website blocker, the image blocker, the image transmission blocker and the program blocker and the extraction list of the image searcher according to the request or setting, It is configured to control the use time of the computer terminal and control the operation of the website blocker, the image blocker, the image search unit, the image transmission blocker and the program blocker through the integrated control module through the computer terminal In case of accessing the website, it is determined whether the data communicating with the specific website is a streaming video. If it is determined that the streaming video is determined, the hash information or the feature point of the harmful streaming video data is extracted from the management server by extracting the hash information or the feature point data of the streaming video. Call data to receive and judge B. The local information unit compares the hash information or the feature data of the harmful streaming video data stored in the local information unit to determine whether it is a harmful streaming video, and if it is determined that the harmful streaming video includes a streaming blocker that blocks the execution thereof.

According to the present invention can prevent children's use of the computer to prevent computer addiction, protect their children from harmful websites, videos, and illegal downloads and illegal transmission of harmful videos can be blocked to prevent the distribution of illegal content There is.

In addition, it can be used as a material of the children's education by receiving the child's computer usage history, there is an effect that can manage the child's computer use remotely through the blocking system of the present invention.

In addition, through the streaming block to block the harmful video of the real-time streaming method such as YouTube to block the omnidirectional pests.

1 is a view showing a computer terminal according to the present invention.
2 is a block diagram schematically illustrating a configuration of an integrated control module installed in a computer terminal according to the present invention.
3 is a block diagram showing the configuration of a setting management unit according to the present invention.
4 is a block diagram illustrating an internal configuration of a streaming blocker according to the present invention.
5 is a configuration diagram schematically showing a blocking system according to the present invention.

Hereinafter, a computer terminal having an integrated control module according to the present invention will be described in detail with the accompanying drawings.

1 is a view showing a computer terminal according to the present invention, Figure 2 is a block diagram schematically showing the configuration of an integrated control module installed in the computer terminal according to the present invention, Figure 3 is a configuration of the setting management unit according to the present invention 4 is a block diagram illustrating an internal configuration of a streaming blocker according to the present invention.

Referring to the drawings, the computer terminal 100 according to the present invention blocks an access in the case of a previously set blocking website or a site determined to be a harmful site when accessing an external website, and blocks the access of the image data determined to be harmful image data. If there is an execution command, it blocks the execution and detects harmful image data in the computer terminal 100, provides an extraction list to the user, and installs an integrated control module 100a configured to limit the computer usage time. .

The integrated control module 100a is downloaded and installed by a user connected to an external management server 200 to be described later through the computer terminal 100, and is installed by the user according to the setting management unit 40 of the present invention. Authentication and various detailed settings are made.

The computer terminal 100 according to the present invention corresponds to all terminals capable of data communication with an external website or a server, and can be applied to the computer terminal 100 of the present invention even a personal computer, a PMP, a P2P, a PDA, and a portable terminal. Do.

The integrated control module 100a is largely divided into a website blocking unit 10, an image blocking unit 20, a streaming blocking unit 21, an image searching unit 30, a setting managing unit 40, and a program blocking unit 50. , An image transmission blocking unit 60, a local information unit 70, an administrator authentication unit 80, and a control unit 90.

Here, the website blocking unit 10 connects to the website determined to be a harmful website through the computer terminal 100 or a website corresponding to the list of blocked websites set by the user. Blocking and generating a blocking history, in this case, the website blocking unit 10 receives the hash information or feature point data of the harmful website and the harmful image data from the external management server 200 in order to determine that the harmful website and the harmful image data. Received by calling or judged, or when the website blocking unit 10 is required through the local information unit 70 receives the hash information or feature point data of the harmful website and harmful image data from the external management server 200 in real time. The hash information and the feature point data may be called to determine whether the website is harmful.

That is, when the website blocking unit 10 operates, it transmits the website information to be currently connected to the external management server 200 to determine whether the management server 200 is a harmful website, and receives the result thereof and receives the result. According to the determination of whether to block or according to the local information unit 70 in the integrated control module (100a) when the integrated control module (100a) is activated in the computer terminal 100, the local information unit 70 is the external management server 200 In this case, the local information unit 70 is configured to provide the hash information of the harmful website by downloading and storing the hash information of the harmful website.

In addition, in the case of the designated blocking website, the user stores and sets the website to be blocked in the website setting unit 41 in the setting management unit 40, and then blocks if there is a designated website access command.

Here, the user of the computer terminal 100 according to the present invention is a manager of the computer terminal 100, which is expected to be a parent or guardian, a child who is a target of management of the administrator and who is restricted from using the integrated control module 100a. They may be classified as children, such as adolescents.

Accordingly, the administrator manages the detailed settings of the setting management unit 40 according to the present invention and manages the operation of the integrated control module 100a. However, the child manages the computer usage time, website access, and execution of image data. As a result, it can only be used within the limits allowed by the administrator.

On the other hand, the image blocking unit 20 is provided through the computer terminal 100 to block the execution of the execution of the image data that is determined to be harmful image data and to generate a breakdown history, the image blocking unit 20 Determination of harmful image data of the image data that is to be executed by receiving the determination result through the management server 200 or the hash information or feature point data of the local information unit 70 as described above website blocking unit 10 It may be configured to search whether the hash information or the feature point data is in the hash information or the feature point data of the local information unit 70 to be blocked to determine whether to execute it.

The hash information of the local information unit 70 is a unique value existing for each image data, and typical hash functions are MD4, MD5, SHA, and the like.

These are unique codes for each image data, just like human fingerprints, and filtering through hash information can control downloading and uploading in comparison with hash information at each stage of distribution and distribution of hash information of harmful image data. .

The hash information is also used to prevent the distribution of copyrighted pirated content, and the hash function can be quickly calculated to quickly construct a database or determine harmful image data.

However, since the hash information may change even if the schedule data of the image data file changes, the hash information of the management server 200 must be continuously updated to prevent the use of a kind of variant image data.

In addition, the feature point data is extracted from the audio DNA gene or video DNA gene of the video data, the image data is copyrighted through comparison and judgment with the audio DNA gene or video DNA gene database previously stored in the external management server 200 It is possible to determine whether or not or whether it is harmful video data as in the present invention.

In order to generate such feature data, the computer terminal 100 according to the present invention has a separate feature data generation module, which extracts feature data of image data having a current execution command and, accordingly, feature points extracted from the image blocker 20. By comparing the data and the data of the feature point data DB called through the external management server 200, it is determined whether or not the harmful image data.

The advantage of the image data comparison method by the feature point data extraction as described above in the case of the comparison method based on the hash information is determined to be different image data when there is a modification such as compressing the image data or a certain portion, extracting the feature point data In this case, the comparison method can be judged as the same image data, so the filtering accuracy is very good.

However, such a feature point data extraction comparison method requires a considerable process in the process of processing, thereby increasing the amount of data communication with the server and reducing the processing speed in the computer terminal 100. Through the comparison method and feature point data extraction comparison method, the optimal blocking system was configured.

Meanwhile, when the streaming blocker 21 accesses a specific website through the computer terminal 100, the streaming blocking unit 21 determines whether the data communicating with the specific website is a streaming video, and if the streaming blocking unit 21 determines the streaming video, the hash information of the streaming video. Alternatively, the feature point data may be extracted and received by calling the hash information or the feature point data of the harmful streaming video data from an external management server 200, or the hash information of the harmful streaming video data stored in the local information unit through the local information unit 70 or The feature point data is compared to determine whether the video is harmful streaming, and if it is determined that the video is harmful streaming is configured to block the execution.

To block the streaming video, the streaming blocking unit 21 is classified into a network monitoring unit 21a, a streaming header detector 21b, a streaming video storage unit 21c, and a comparison blocking unit 21d.

The network monitoring unit 21a is set to a promiscuous mode in order to eavesdrop on all traffic passing through the local network in the Ethernet interface, and thus the network monitoring method using WIN PCAP, the network monitoring method using RAW SOCKET, and other promiscuous modes can be supported. Selective monitoring by file type is done by LIBRARY method.

Accordingly, the streaming header detector 21b detects the header of the image data according to the video codec and the file type. In this case, the streaming header detector 21b detects the header according to the FLV protocol and the header according to the MP4 and FFMPEG protocols. to be.

Therefore, the detected header is stored by using the MICROSOFT LIBRARY in consideration of system load and resource usage by the streaming video storage unit 21c, and is stored using a time division work unit and a QUE.

The comparison blocking unit 21d compares the DB of the external management server 200 with hash information or feature point data stored by the streaming video storage unit 21c to determine whether to block or not. Compared to first, if it is determined to be harmful to block the transmission path of the harmful substances and activate the blocking message through the display means of the computer terminal 100.

In addition, a comparison process is performed through the feature data as a subsequent process, and accordingly, secondary blocking is performed according to the determination result. Such a blocking method has an advantage of optimizing process throughput and speed.

Meanwhile, the image search unit 30 searches for harmful image data stored in the computer terminal 100 and generates an extract list. Likewise, the website blocker 10 and the image blocker 20 may be used to search for harmful image data. The stored hash information or feature point data of the management server 200 or the local information unit 70 is used.

Of course, the execution of the image search unit 30 and the provision of the extraction list is executed by the administrator and the user authentication unit 45 of the separate administrator authentication unit 80 or the setting management unit 40 for the execution of the image search unit 30. It is of course possible to execute after being authenticated as an authorized administrator.

In addition, the setting manager 40 designates a website to be blocked in the computer terminal 100, sets a usage time of the computer terminal 100, the website blocking unit 10, an image blocking unit 20, and a streaming blocking unit. 21 and the image search unit 30, the program blocking unit 50, and the image transmission blocking unit 60 is set to operate, such setting management unit 40 designates a website to be blocked in the computer terminal A website setting unit 41 for designating, a program setting unit 42 for designating a program to be blocked, a usage time setting unit 43 for setting a usage time of the computer terminal 100, and the website Protection mode and operation in which the operation of the blocking unit 10, the image blocking unit 20, the streaming blocking unit 21 and the image searching unit 30, the program blocking unit 50, the image transmission blocking unit 60 is performed The mode setting section 44 in which the setting of the stopped mode is stopped, and the setting Consists of a user authentication section 45 that the user authentication is to occur in accordance with the passage of time is required.

In the protection mode and the release mode of the mode setting unit 44, the administrator interrupts the use of the computer terminal 100 and subsequently designates the protection mode at a time when the child uses the website blocking unit 10 and the image blocking unit. 20, the streaming blocking unit 21 and the image searching unit 30, the program blocking unit 50, the image transmission blocking unit 60, and the administrator authentication unit 80 may be performed, and then the administrator. When the computer terminal 100 is used, the administrator can freely use the computer terminal 100 by setting the release mode.

The user authentication unit 45 is an administrator who has authority when there is a setting command in performing the designated website setting, the designated program setting, and the mode setting of the website blocking unit 10 and the program blocking unit 50. Is provided to be authenticated, in one embodiment may be configured to determine that the administrator in a password method.

In addition, a separate voice recognition module and a body recognition module may be provided to recognize the unique characteristics of the administrator, and thus, may be configured to determine that the administrator.

On the other hand, the program blocking unit 50 is provided to block the program specified through the setting management unit 40 through the computer terminal 100 when there is an execution command and to generate a breakdown history, such as a messenger program, a game The program may correspond.

In addition, the image transmission blocking unit 60 calls the hash information or the feature point data of the local information unit 70 or the management server 200 when the image data in the computer terminal 100 is transmitted to the external server through the computer terminal 100. If it is determined that the image data to be transmitted is harmful and is determined to be harmful image data is provided to block the transmission and to generate a breakdown history.

Accordingly, in the case of harmful video data, it is possible to prevent external transmission through the image transmission blocking unit 60 together with the execution restriction through the image blocking unit 20 and the execution restriction on the website through the streaming blocking unit 21. Alternatively, the distribution of harmful image data of adolescents can be fundamentally prevented.

In addition, even if the image transmission blocking unit 60 is downloaded to the computer terminal 100 from an external server, it is temporarily stored in the computer terminal 100 and judges whether it is harmful image data, and if it is determined to be harmful image data, it is forced. By deleting, it can be configured to prevent external transmission as well as transmission to the outside.

On the other hand, the administrator authentication unit 80 is a user who has permission to stop or delete through the user identification information stored in the user authentication unit 45 when there is a stop or delete command of the integrated control module 100a operated by the user. It is provided to block execution of a stop or delete command when it is determined that there is no authority.

Through such administrator authentication unit 80, the stop or forced deletion of the integrated control module 100a is prevented at the source, thereby smoothly managing the computer terminal 100.

In addition, if authentication fails after such a stop and force delete command, the log information may be generated and stored, and then provided to the administrator to provide a more thorough management.

On the other hand, the control unit 90 is the computer terminal 100 setting details and the website blocking unit 10, the image blocking unit 20, the streaming blocking unit 21, the image searching unit 30 set in the setting management unit 40 The operation setting of the image transmission blocking unit 60 and the program blocking unit 50 is read to control the usage time of the computer terminal 100, and the website blocking unit 10, the image blocking unit 20, and image searching Control the operation of the unit 30, the image transmission blocking unit 60 and the program blocking unit 50, the website blocking unit 10 and the image blocking unit 20, streaming blocking unit 21, image transmission Blocking unit 60 and the block list generated by the program blocker 50 and the extraction list of the image search unit 30 is provided to provide it to the user on request.

In addition, when the integrated control module 100a is executed, it is connected to an external management server 200 and controlled to update the harmful website of the local information unit 70, the hash information of the harmful image data, and the feature point data, and access the harmful website. When the harmful image data is executed, a separate pop-up window is loaded to inform the user of the restricted website and the image data.

In addition, when the computer usage time limit is approached by the usage time setting unit 43 of the setting management unit 40, a popup window is loaded to notify that the use is limited to 1 hour, 30 minutes, 10 minutes, 1 minute, etc. soon depending on the setting. You may.

Hereinafter, a pest blocking system using a computer terminal having an integrated control module for blocking pests according to the present invention will be described in detail with the accompanying drawings.

5 is a configuration diagram schematically showing a blocking system according to the present invention.

Referring to the drawings, the blocking system according to the present invention is largely connected to the Internet network and connected to an external server for data communication. When the external website is connected, the blocking system is set in advance or a site determined to be a harmful site. Blocks, detects and executes the execution command of the image data determined to be harmful image data, blocks execution, searches for harmful image data in the computer terminal 100, provides the user with an extraction list, and limits the computer usage time. The computer terminal 100 is installed and performed with the integrated control module 100a configured to perform the request, and the computer terminal 100 requests hash information or feature point data of harmful sites and harmful image data. Management server 200 and the computer stage to transmit in real time according to the setting Guardian terminal 300 that is connected to the data 100 and the data transmission, the real-time transmission of the connection blocking history and execution blocking history and the search extraction list of harmful image data through the integrated control module (100a) according to the request or setting in real time It is composed of

The blocking system according to the present invention is characterized in that the configuration of the computer terminal 100 in the above-described embodiment is almost the same, but the guardian terminal 300 that can be connected to the computer terminal 100 in real time.

Therefore, for the same configuration, a separate description will be omitted and will be described for another configuration.

This embodiment is different from the above-described embodiment when the computer terminal 100 is set to the protection mode, when the transmission of the breakdown, etc. according to the setting to the external guardian terminal 300 or the request of the guardian terminal 300 The setting of the setting management unit 40, the request for the transmission of the details through the control unit 90, etc. can be performed, so that the guardian can manage the usage of the computer terminal 100 in real time, and the setting change can be made immediately according to the situation. There is a management of the computer terminal 100 according to the change situation.

In addition, when the guardian is going to travel or travel for a long time, it is possible to change the computer settings according to the situation easily and conveniently, which enables more active and flexible management.

In the case of the external connection of the guardian terminal 300, as described in the above embodiment, the user authentication unit 45 or the administrator authentication unit 80 is authenticated that the authorized guardian is configured to be made, of course, the guardian In the terminal 300, the integrated control module 100a is installed for easy connection and management of the computer terminal 100, and a separate remote management unit is provided in the integrated control module 100a to manage the setting of the computer terminal 100. 40, the management such as setting with the controller 90 and data request can be configured to be more easily performed.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to those precise embodiments, and many alternatives, modifications, and variations will be apparent to those skilled in the art. I will understand.

Therefore, the true technical protection scope of the present invention will be defined by the technical spirit of the appended claims.

10: website blocking unit 20: video blocking unit
21: streaming block 21a: network monitoring unit
21b: streaming header detector 21c: streaming video storage
21d: comparison blocking unit 21d 30: image search unit
40: setting management unit 41: website setting unit
42: program setting unit 43: use time setting unit
44: mode setting section 45: user authentication section
50: program blocker 60: video transmission blocker
70: Local Information Department 80: Administrator Authentication Department
90 control unit 100 computer terminal
100a: integrated control module 200: management server
300: Parental terminal

Claims (14)

A computer terminal connected to an internet network and connected to an external server for data communication,
The computer terminal
When accessing an external website, if the previously set blocking website or a site that is determined to be harmful is blocked, the access is blocked, and if there is an execution command of image data that is determined to be harmful, it is detected and blocked. A computer terminal having an integrated control module for preventing harmful substances, characterized in that an integrated control module is installed and configured to search for harmful image data in the terminal and provide an extraction list to a user and to limit the computer usage time.
The method of claim 1,
Integrated control module
A website blocking unit for blocking access and generating a blocking history when a website command determined to be a harmful website or a website corresponding to a list of blocked websites set by a user through the computer terminal;
An image blocking unit for blocking execution of the image data and generating a breakdown history when there is an execution command of the image data determined to be harmful image data through the computer terminal;
An image search unit for searching for harmful image data stored in the computer terminal and generating an extraction list;
A setting management unit for designating a website to be blocked by the computer terminal, setting a usage time of the computer terminal, and setting whether to operate the website blocking unit, the image blocking unit, and the image searching unit;
The computer terminal setting history and the website blocking unit, the image blocking unit, and the image retrieval unit setting settings are read to control the usage time of the computer terminal, and the website blocking unit, the image blocking unit, and the image searching unit are operated. The control unit for controlling the harmful substances, characterized in that it comprises a; and a control unit for providing the user's request for the blocking history and the image list extracted list generated by the website blocker and the image blocker; Having a computer terminal.
The method of claim 2,
The integrated control module
Blocking the program specified by the setting management unit through the computer terminal if there is an execution command further comprises a program blocker for generating a blockage block, characterized in that the control unit controls the operation of the program blocker Computer terminal with integrated control module.
The method of claim 2,
The website blocking unit and the image blocking unit call the hash information of the harmful website and harmful image data from an external management server in order to determine that the harmful website and harmful image data to block harmful substances, characterized in that Computer terminal having an integrated control module.
The method of claim 2,
The integrated control module
It further includes a local information unit for receiving in real time the hash information of the harmful website and harmful image data from an external management server to provide the hash information stored in the local information to the website blocking unit and the image blocking unit and the website blocking unit and Computer terminal having an integrated control module for blocking harmful substances, characterized in that the harmful web site and the harmful image data determination is made to the image blocking unit.
The method according to claim 4 or 5,
In order to determine the harmfulness of the image data computer terminal having an integrated control module for blocking harmful substances, characterized in that the harmful image data is further received by receiving the characteristic point data of the harmful image data from an external management server .
The method of claim 6,
The setting management unit
A website setting unit for designating a website to be blocked by the computer terminal, a program setting unit for designating a program to be blocked, a usage time setting unit for setting a usage time of the computer terminal, and a website blocking unit; And a user authentication unit configured to set a protection mode in which the operation of the image blocking unit and the image retrieval unit and the release mode in which the operation is stopped, and a user authentication is performed when necessary. Computer terminal having an integrated control module to block harmful substances.
The method of claim 7, wherein
The integrated control module
When the image data in the computer terminal is transmitted to the external server through the computer terminal, it is determined whether the image data to be transmitted is harmful through harmful image hash information and feature point data, and if it is determined to be harmful image data, the image transmission blocking unit blocks the transmission thereof. Computer terminal having an integrated control module for blocking harmful substances, characterized in that it further comprises.
The method of claim 7, wherein
The integrated control module
If there is a stop or delete command of the integrated control module operated by the user, the user identification information stored in the user authentication unit determines whether the user has the right to stop or delete, and if there is no permission to block execution of the stop or delete command. Computer terminal having an integrated control module for blocking harmful substances, characterized in that it further comprises an administrator authentication unit.
The method of claim 6,
The integrated control module
In case of accessing a specific website through the computer terminal, it is determined whether the data communicating with the specific website is a streaming video, and when it is determined that the streaming video is extracted, hash information or feature point data of the streaming video is extracted from an external management server. It is judged to be received by calling the hash information or feature point data of streaming video data or by comparing the hash information or feature point data of harmful streaming video data stored in the local information unit through the local information unit to determine whether it is a harmful streaming video. If the computer terminal having an integrated control module for blocking harmful substances, characterized in that it further comprises a streaming blocker to block the execution thereof.
Connected to the internet network to connect to an external server for data communication, and when the external website is accessed, the blocked website or the site determined to be a harmful site is blocked and the access is blocked. A computer terminal that detects and executes an execution command, blocks execution, searches for harmful image data in the computer terminal, provides an extraction list to a user, and installs and performs an integrated control module configured to limit computer use time;
A management server for transmitting hash information or feature point data of harmful sites and harmful image data to the computer terminal in real time according to a request or setting of the computer terminal;
And a guardian terminal connected to the computer terminal for data communication and receiving a connection extraction history and execution blocking history and a search extraction list of harmful image data in real time according to a request or setting through the integrated control module. A pest control system using a computer terminal having an integrated control module to block the pest.
12. The method of claim 11,
The integrated control module
A website blocking unit for blocking access and generating a blocking history when there is an access command on a website determined to be a harmful website or a website corresponding to a list of blocked websites set by a user through the computer terminal;
An image blocking unit for blocking execution and generating a blocking history when there is an execution command of the image data determined to be harmful image data through the computer terminal;
An image search unit for searching for harmful image data stored in the computer terminal and generating an extraction list;
A setting manager for designating a website to be blocked by the computer terminal, setting a use time of the computer terminal, and setting whether to operate the website blocking unit, the image blocking unit, and the image searching unit;
A program blocker for blocking a program designated by the setting manager through an execution command through the computer terminal and generating a breakdown history;
In case of transmitting the image data in the computer terminal to the external server through the computer terminal, it is determined whether the image data to be transmitted through the harmful image hash information or the feature point data is harmful. An image transmission blocking unit to generate,
The computer terminal setting history and the website blocking unit, the image blocking unit, the image searching unit, the image transmission blocking unit, and the program blocking unit operating setting details are read out to control the use time of the computer terminal, the website blocking unit, Controls the operation of the image blocker, the image searcher, the image transmission blocker and the program blocker, and the blocking history generated by the website blocker and the image blocker, the image transmission blocker and the program blocker and the extraction list of the image searcher. And a control unit for providing it when the user requests it,
If there is a stop or delete command of the integrated control module operated by the user, the user identification information stored in the user authentication unit determines whether the user has the right to stop or delete, and if there is no permission to block execution of the stop or delete command. A pest blocking system using a computer terminal having an integrated control module for blocking pests, characterized in that it comprises an administrator authentication unit.
The method of claim 12,
The guardian terminal receives from the control unit of the integrated control module a block list generated by the website blocker, the image blocker, the image transmission blocker and the program blocker and the extraction list of the image searcher according to the request or setting. It has an integrated control module for controlling harmful substances, characterized in that it is configured to control the use time of the computer terminal and control the operation of the website blocker, image blocker, image searcher, image transmission blocker and program blocker Hazardous material blocking system using computer terminal.
The method of claim 12,
The integrated control module
In case of accessing a specific website through the computer terminal, it is determined whether the data communicating with the specific website is a streaming video, and if it is determined that the streaming video is extracted, hash information or feature point data of the streaming video is extracted from the management server. Determines whether the data is received by calling the hash information or the feature point data of the data or by comparing the hash information or the feature point data of the harmful streaming video data stored in the local information unit through the local information unit. A pest blocking system using a computer terminal having an integrated control module for blocking pests, characterized in that it further comprises a streaming blocker to block the execution.
KR1020100048741A 2010-05-25 2010-05-25 Computer terminal having integrated control module to block harmful object and blocking system thereof KR20110129224A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020100048741A KR20110129224A (en) 2010-05-25 2010-05-25 Computer terminal having integrated control module to block harmful object and blocking system thereof
PCT/KR2010/003479 WO2011149137A1 (en) 2010-05-25 2010-05-31 Computer terminal having integrating control module for blocking hazardous article and system for blocking hazardous article using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020100048741A KR20110129224A (en) 2010-05-25 2010-05-25 Computer terminal having integrated control module to block harmful object and blocking system thereof

Publications (1)

Publication Number Publication Date
KR20110129224A true KR20110129224A (en) 2011-12-01

Family

ID=45004116

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020100048741A KR20110129224A (en) 2010-05-25 2010-05-25 Computer terminal having integrated control module to block harmful object and blocking system thereof

Country Status (2)

Country Link
KR (1) KR20110129224A (en)
WO (1) WO2011149137A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015102186A1 (en) * 2014-01-03 2015-07-09 플러스기술 주식회사 Method for restricting use of terminal and system therefor
WO2015160038A1 (en) * 2014-04-18 2015-10-22 플러스기술 주식회사 Method for providing ward relief service, danger-message monitoring device for providing ward relief service, guardian terminal, and computer-readable recording medium
KR20190014885A (en) * 2017-08-04 2019-02-13 주식회사 케이티 Method for coverting mode service of mobile termimal and apparatus therefor
KR20190066218A (en) * 2017-12-05 2019-06-13 이원 Method, computing device and program for executing harmful object control
WO2022164235A1 (en) * 2021-01-28 2022-08-04 김민석 Device and method for inspecting harmfulness of video content in real time
KR20220167855A (en) * 2021-06-15 2022-12-22 주식회사 테크노블러드코리아 System for blocking access of video site

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010044579A (en) * 2001-03-08 2001-06-05 김현길 Internet management system of a children computer
KR100517645B1 (en) * 2004-11-05 2005-09-28 (주)지란지교소프트 Pornograph intercept method
KR100670815B1 (en) * 2005-12-08 2007-01-19 한국전자통신연구원 Apparatus for filtering malicious multimedia data using sequential processing and method thereof
KR100797600B1 (en) * 2007-05-17 2008-01-23 주식회사 플랜티넷 Method for restricting use of harmful multimedia file
KR20100046524A (en) * 2008-10-27 2010-05-07 (주)소만사 Apparatus and method to shut harmful sites

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015102186A1 (en) * 2014-01-03 2015-07-09 플러스기술 주식회사 Method for restricting use of terminal and system therefor
WO2015160038A1 (en) * 2014-04-18 2015-10-22 플러스기술 주식회사 Method for providing ward relief service, danger-message monitoring device for providing ward relief service, guardian terminal, and computer-readable recording medium
KR20190014885A (en) * 2017-08-04 2019-02-13 주식회사 케이티 Method for coverting mode service of mobile termimal and apparatus therefor
KR20190066218A (en) * 2017-12-05 2019-06-13 이원 Method, computing device and program for executing harmful object control
WO2022164235A1 (en) * 2021-01-28 2022-08-04 김민석 Device and method for inspecting harmfulness of video content in real time
KR20220108915A (en) * 2021-01-28 2022-08-04 김민석 Real-time harmfulness inspection apparatus and method for video content
KR20220167855A (en) * 2021-06-15 2022-12-22 주식회사 테크노블러드코리아 System for blocking access of video site

Also Published As

Publication number Publication date
WO2011149137A1 (en) 2011-12-01

Similar Documents

Publication Publication Date Title
US11816980B2 (en) Method of pairing a remote control
US11395039B2 (en) Systems and methods for notifying a user when activity exceeds an authorization level
US11539729B2 (en) Protecting network devices from suspicious communications
US8799365B2 (en) Broker-based management of mobile devices
US20220286847A1 (en) Method for pairing a mobile device with a wireless network
US11816968B2 (en) Automatic presence simulator for security systems
KR20110129224A (en) Computer terminal having integrated control module to block harmful object and blocking system thereof
KR102252258B1 (en) Method and apparatus for controlling a group of home devices in a home network system
Mare et al. Consumer smart homes: Where we are and where we need to go
AU2016283117A1 (en) Management and control of mobile computing device using local and remote software agents
US9474011B2 (en) Method and apparatus for providing access controls for a resource
CN112380511B (en) Account control method, device, equipment and computer readable storage medium
CN101911591A (en) Preventing secure data from leaving a network perimeter
US20190034624A1 (en) Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time
CN103619019A (en) Network access authentication method for wireless network
WO2006080685A1 (en) Pornograph intercept method
WO2015102186A1 (en) Method for restricting use of terminal and system therefor
KR20130097303A (en) System and method of controlling for digital device using wireless lan detection
KR20170014532A (en) METHOD AND HOME IoT SERVICE SYSTEM FOR SETTING USER AUTHORITY
KR101368912B1 (en) Method for controlling home network devices using Rich Site Summary service and apparatus therefor
KR101445817B1 (en) Method and apparatus for controlling use of service
CN107147702B (en) File downloading method and device
AMIRTHAVARSINI et al. CONTROL OF HOME APPLIANCES USING WIFI AND ARDUINO
US20130218891A1 (en) Control method for harmful contents in youth and teenagers
Fraser User Controlled Privacy Boundaries for Smart Homes

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application