KR20110129224A - Computer terminal having integrated control module to block harmful object and blocking system thereof - Google Patents
Computer terminal having integrated control module to block harmful object and blocking system thereof Download PDFInfo
- Publication number
- KR20110129224A KR20110129224A KR1020100048741A KR20100048741A KR20110129224A KR 20110129224 A KR20110129224 A KR 20110129224A KR 1020100048741 A KR1020100048741 A KR 1020100048741A KR 20100048741 A KR20100048741 A KR 20100048741A KR 20110129224 A KR20110129224 A KR 20110129224A
- Authority
- KR
- South Korea
- Prior art keywords
- unit
- blocking
- computer terminal
- harmful
- image
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Abstract
Description
The present invention provides a computer terminal having an integrated control module for preventing harmful substances for inducing sound computer use and emotional cultivation by blocking harmful video access including harmful websites and access to harmful websites through children's computer terminals, and blocking harmful substances using the same. More specifically, it relates to a system, and more particularly, to install harmful control websites that block harmful website access, video transmission and execution, and to configure the control settings of the integrated control module so that parents can manage harmful websites. You can prevent your children's computer addiction by preventing access to videos and videos in advance and limiting computer usage time. Inductively It is not a simple blocking of harmful sites or blocking of image data by using hash information, but by extracting feature point data of image data to determine whether it is harmful. It relates to a computer terminal and a pest blocking system using the same.
As a result of conducting a comprehensive youth survey on young people in 2009, 50.5% of the respondents said they had seen pornography, and 39.4% of male students felt the urge to follow it after watching pornography. It was much higher than%.
37.9% of teenagers who have been exposed to pornography reported that they had been exposed to pornography first through spam, text, or Internet sites. 35.4% said that they had found pornography through others, and 20.9% had found it themselves.
Most of the media that sees pornography are the Internet, and 40.7% of them are mostly exposed to pornography, and 37.3% of the homes are mostly watching pornography, and 6.8% of friends' houses and 1.4% of schools. , 1.0% of PC rooms and 0.3% of video rooms.
In other words, most illegal videos are distributed through a PC with internet installed, and more than half of them are downloaded from illegal video distribution websites or P2P sites.
Therefore, it is no exaggeration to say that illegal videos are viewed through harmful websites or through peer-to-peer websites at home, which are mostly home.
However, in most homes, there is no system that blocks harmful websites and illegal videos, and parents are neglected by their parents on their PCs due to the late return time of their parents at work. It does not know what harmful video files are stored on the PC.
As a result, most children are out of control of their parents because they secretly use the Internet at night or watch illegal videos using their PCs. Therefore, supplementary measures for blocking illegal videos are urgently needed.
In addition, children's age on the Internet is gradually decreasing, so they may intentionally access harmful websites or watch harmful videos. The emotional adverse effects that will occur are very serious, requiring the provision of a system that blocks both unintended and unintended connections.
The present invention has been made to solve the above problems, by installing an integrated control module that can block harmful website access and video transmission and execution in the computer terminal, and by configuring the operation settings of the integrated control module so that the guardian can manage By preventing access to harmful websites and videos from children, and limiting computer usage time, children can be prevented from computer addiction. In order to induce children's genealogy, and forgery in the distribution process of image data is made by extracting feature point data of image data to determine whether it is harmful, rather than simple harmful site blocking or image data blocking method using hash information. Completely harmful The object of the present invention is to provide a computer terminal and a pest blocking system using the same.
The present invention has the following features to achieve the above object.
The present invention provides a computer terminal connected to an internet network and connected to an external server for data communication. If the computer terminal is a previously set blocking website or a site determined to be harmful, the computer terminal blocks access. In case that there is an execution command of image data that is considered to be harmful image data, it detects it and blocks execution, retrieves harmful image data in the computer terminal, provides the extraction list to the user, and configures to limit the computer usage time. The control module is installed and executed.
In this case, the integrated control module blocks a connection and generates a blocking history when there is an access command on a website that is determined to be a harmful website or a blocking website set by a user through the computer terminal. A blocking part; An image blocking unit for blocking execution of the image data and generating a breakdown history when there is an execution command of the image data determined to be harmful image data through the computer terminal; An image search unit for searching for harmful image data stored in the computer terminal and generating an extraction list; A setting management unit for designating a website to be blocked by the computer terminal, setting a usage time of the computer terminal, and setting whether to operate the website blocking unit, the image blocking unit, and the image searching unit; The computer terminal setting history and the website blocking unit, the image blocking unit, and the image retrieval unit setting settings are read to control the usage time of the computer terminal, and the website blocking unit, the image blocking unit, and the image searching unit are operated. And a control unit for providing a user's request for a block list generated by the website blocking unit and the image blocking unit and an extraction list of the image searching unit.
In addition, the integrated control module further includes a program blocker for blocking a program designated by the setting manager through the computer terminal when there is an execution command and generating a breakdown history, wherein the controller controls whether the program blocker operates. The website blocking unit and the image blocking unit call the hash information of the harmful website and harmful image data from an external management server to determine that the harmful website and the harmful image data are determined.
In addition, the integrated control module further includes a local information unit for receiving in real time the hash information of the harmful website and harmful image data from an external management server to provide the hash information stored in the local information to the website blocking unit and the image blocking unit It is configured to determine the harmful website and harmful image data of the website blocking portion and the image blocking portion, and if you want to determine the harmfulness of the image data is received harmful point data of the harmful image data from the external management server further harmful image The determination of the data is made.
The setting manager may include a website setting unit for designating a website to be blocked by the computer terminal, a program setting unit for designating a program to be blocked, a usage time setting unit for setting a usage time of the computer terminal, A mode setting unit for setting a protection mode in which the website blocking unit, an image blocking unit, and an image searching unit is performed, and a release mode in which the operation is stopped, and a user authentication unit for allowing user authentication to be performed when necessary when changing the setting. When the image data in the computer terminal is transmitted to the external server through the computer terminal, the integrated control module determines whether the image data to be transmitted through the harmful image hash information and the feature point data is harmful and is determined to be harmful image data. Video transmission to block its transmission A blocking part is included.
In addition, when the integrated control module has a stop or delete command of the integrated control module operated by the user, the integrated control module determines whether the user has permission to stop or delete based on the user identification information stored in the user authentication unit. An administrator authentication unit for blocking the execution of the command is included, and the integrated control module is connected to a specific website through the computer terminal to determine whether the data that communicates with the specific website is a streaming video and is determined to be a streaming video Hash information of harmful streaming video data stored in the local information unit through the local information unit to judge the hash information or feature point data of the streaming video by receiving the hash information or feature point data of the harmful streaming video data from an external management server. It is determined whether harmful streaming video by comparing the characteristic data and includes additional streaming off to block the run thereof when it is determined by ten thousand and one harmful streaming video.
In addition, the pest blocking system according to the present invention is connected to the Internet network and connected to the external server to communicate data, and when the external website is connected to the pre-set blocking website or a site that is determined to be harmful sites, blocking the access, Integrated control module that detects the execution command of the image data that is judged to be the image data and blocks the execution, detects harmful image data in the computer terminal, provides the extraction list to the user, and limits the computer usage time. A computer terminal which is installed and performed; A management server for transmitting hash information or feature point data of harmful sites and harmful image data to the computer terminal in real time according to a request or setting of the computer terminal; And a guardian terminal connected to the computer terminal for data communication, and receiving a connection extraction history and execution blocking history and a search extraction list of harmful image data in real time according to a request or setting through the integrated control module.
Herein, the integrated control module blocks a connection and generates a blocking history when there is an access command on a website corresponding to a website or a website set by a user determined to be a harmful website through the computer terminal. A site blocking unit, an image blocking unit for blocking execution and generating a blocking history when there is an execution command of image data determined to be harmful image data through the computer terminal, and searching for harmful image data stored in the computer terminal An image search unit for generating an extraction list, a setting manager for designating a website to be blocked by the computer terminal, setting a usage time of the computer terminal, and setting whether to operate the website blocker, an image blocker, and an image search unit; Reminding the designated program through the setting management unit Program blocker for blocking execution if there is an execution command through the computer terminal and generating a blocking history, and video to be transmitted through harmful image hash information or feature point data when transmitting image data in the computer terminal to the external server through the computer terminal. If it is determined that the data is harmful and harmful image data is determined to block the transmission of the video transmission block and generate a breakdown history, the computer terminal setting details and website block, video block, video block Controls the usage time of the computer terminal by reading the operation settings of the searcher, the image transmission blocker and the program blocker, and controls the operation of the website blocker, the image blocker, the image searcher, the image transmission blocker and the program blocker. Website blocker, image blocker, image blocker, and The control unit that provides the block list generated by the RAM blocker and the extraction list of the image search unit when the user requests it, and the user identification information stored in the user authentication unit when a command to stop or delete the integrated control module operated by the user is provided. Determining whether the user is authorized to suspend or delete through the administrator if the authority does not include the administrator authentication unit to block the execution of the suspend or delete command.
In addition, the guardian terminal receives from the control unit of the integrated control module the block list generated by the website blocker, the image blocker, the image transmission blocker and the program blocker and the extraction list of the image searcher according to the request or setting, It is configured to control the use time of the computer terminal and control the operation of the website blocker, the image blocker, the image search unit, the image transmission blocker and the program blocker through the integrated control module through the computer terminal In case of accessing the website, it is determined whether the data communicating with the specific website is a streaming video. If it is determined that the streaming video is determined, the hash information or the feature point of the harmful streaming video data is extracted from the management server by extracting the hash information or the feature point data of the streaming video. Call data to receive and judge B. The local information unit compares the hash information or the feature data of the harmful streaming video data stored in the local information unit to determine whether it is a harmful streaming video, and if it is determined that the harmful streaming video includes a streaming blocker that blocks the execution thereof.
According to the present invention can prevent children's use of the computer to prevent computer addiction, protect their children from harmful websites, videos, and illegal downloads and illegal transmission of harmful videos can be blocked to prevent the distribution of illegal content There is.
In addition, it can be used as a material of the children's education by receiving the child's computer usage history, there is an effect that can manage the child's computer use remotely through the blocking system of the present invention.
In addition, through the streaming block to block the harmful video of the real-time streaming method such as YouTube to block the omnidirectional pests.
1 is a view showing a computer terminal according to the present invention.
2 is a block diagram schematically illustrating a configuration of an integrated control module installed in a computer terminal according to the present invention.
3 is a block diagram showing the configuration of a setting management unit according to the present invention.
4 is a block diagram illustrating an internal configuration of a streaming blocker according to the present invention.
5 is a configuration diagram schematically showing a blocking system according to the present invention.
Hereinafter, a computer terminal having an integrated control module according to the present invention will be described in detail with the accompanying drawings.
1 is a view showing a computer terminal according to the present invention, Figure 2 is a block diagram schematically showing the configuration of an integrated control module installed in the computer terminal according to the present invention, Figure 3 is a configuration of the setting management unit according to the present invention 4 is a block diagram illustrating an internal configuration of a streaming blocker according to the present invention.
Referring to the drawings, the
The integrated
The
The
Here, the website blocking unit 10 connects to the website determined to be a harmful website through the
That is, when the website blocking unit 10 operates, it transmits the website information to be currently connected to the
In addition, in the case of the designated blocking website, the user stores and sets the website to be blocked in the
Here, the user of the
Accordingly, the administrator manages the detailed settings of the
On the other hand, the
The hash information of the
These are unique codes for each image data, just like human fingerprints, and filtering through hash information can control downloading and uploading in comparison with hash information at each stage of distribution and distribution of hash information of harmful image data. .
The hash information is also used to prevent the distribution of copyrighted pirated content, and the hash function can be quickly calculated to quickly construct a database or determine harmful image data.
However, since the hash information may change even if the schedule data of the image data file changes, the hash information of the
In addition, the feature point data is extracted from the audio DNA gene or video DNA gene of the video data, the image data is copyrighted through comparison and judgment with the audio DNA gene or video DNA gene database previously stored in the
In order to generate such feature data, the
The advantage of the image data comparison method by the feature point data extraction as described above in the case of the comparison method based on the hash information is determined to be different image data when there is a modification such as compressing the image data or a certain portion, extracting the feature point data In this case, the comparison method can be judged as the same image data, so the filtering accuracy is very good.
However, such a feature point data extraction comparison method requires a considerable process in the process of processing, thereby increasing the amount of data communication with the server and reducing the processing speed in the
Meanwhile, when the
To block the streaming video, the
The network monitoring unit 21a is set to a promiscuous mode in order to eavesdrop on all traffic passing through the local network in the Ethernet interface, and thus the network monitoring method using WIN PCAP, the network monitoring method using RAW SOCKET, and other promiscuous modes can be supported. Selective monitoring by file type is done by LIBRARY method.
Accordingly, the streaming header detector 21b detects the header of the image data according to the video codec and the file type. In this case, the streaming header detector 21b detects the header according to the FLV protocol and the header according to the MP4 and FFMPEG protocols. to be.
Therefore, the detected header is stored by using the MICROSOFT LIBRARY in consideration of system load and resource usage by the streaming
The
In addition, a comparison process is performed through the feature data as a subsequent process, and accordingly, secondary blocking is performed according to the determination result. Such a blocking method has an advantage of optimizing process throughput and speed.
Meanwhile, the
Of course, the execution of the
In addition, the
In the protection mode and the release mode of the
The user authentication unit 45 is an administrator who has authority when there is a setting command in performing the designated website setting, the designated program setting, and the mode setting of the website blocking unit 10 and the
In addition, a separate voice recognition module and a body recognition module may be provided to recognize the unique characteristics of the administrator, and thus, may be configured to determine that the administrator.
On the other hand, the
In addition, the image transmission blocking unit 60 calls the hash information or the feature point data of the
Accordingly, in the case of harmful video data, it is possible to prevent external transmission through the image transmission blocking unit 60 together with the execution restriction through the
In addition, even if the image transmission blocking unit 60 is downloaded to the
On the other hand, the
Through such
In addition, if authentication fails after such a stop and force delete command, the log information may be generated and stored, and then provided to the administrator to provide a more thorough management.
On the other hand, the
In addition, when the
In addition, when the computer usage time limit is approached by the usage
Hereinafter, a pest blocking system using a computer terminal having an integrated control module for blocking pests according to the present invention will be described in detail with the accompanying drawings.
5 is a configuration diagram schematically showing a blocking system according to the present invention.
Referring to the drawings, the blocking system according to the present invention is largely connected to the Internet network and connected to an external server for data communication. When the external website is connected, the blocking system is set in advance or a site determined to be a harmful site. Blocks, detects and executes the execution command of the image data determined to be harmful image data, blocks execution, searches for harmful image data in the
The blocking system according to the present invention is characterized in that the configuration of the
Therefore, for the same configuration, a separate description will be omitted and will be described for another configuration.
This embodiment is different from the above-described embodiment when the
In addition, when the guardian is going to travel or travel for a long time, it is possible to change the computer settings according to the situation easily and conveniently, which enables more active and flexible management.
In the case of the external connection of the
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to those precise embodiments, and many alternatives, modifications, and variations will be apparent to those skilled in the art. I will understand.
Therefore, the true technical protection scope of the present invention will be defined by the technical spirit of the appended claims.
10: website blocking unit 20: video blocking unit
21: streaming block 21a: network monitoring unit
21b: streaming
21d:
40: setting management unit 41: website setting unit
42: program setting unit 43: use time setting unit
44: mode setting section 45: user authentication section
50: program blocker 60: video transmission blocker
70: Local Information Department 80: Administrator Authentication Department
90
100a: integrated control module 200: management server
300: Parental terminal
Claims (14)
The computer terminal
When accessing an external website, if the previously set blocking website or a site that is determined to be harmful is blocked, the access is blocked, and if there is an execution command of image data that is determined to be harmful, it is detected and blocked. A computer terminal having an integrated control module for preventing harmful substances, characterized in that an integrated control module is installed and configured to search for harmful image data in the terminal and provide an extraction list to a user and to limit the computer usage time.
Integrated control module
A website blocking unit for blocking access and generating a blocking history when a website command determined to be a harmful website or a website corresponding to a list of blocked websites set by a user through the computer terminal;
An image blocking unit for blocking execution of the image data and generating a breakdown history when there is an execution command of the image data determined to be harmful image data through the computer terminal;
An image search unit for searching for harmful image data stored in the computer terminal and generating an extraction list;
A setting management unit for designating a website to be blocked by the computer terminal, setting a usage time of the computer terminal, and setting whether to operate the website blocking unit, the image blocking unit, and the image searching unit;
The computer terminal setting history and the website blocking unit, the image blocking unit, and the image retrieval unit setting settings are read to control the usage time of the computer terminal, and the website blocking unit, the image blocking unit, and the image searching unit are operated. The control unit for controlling the harmful substances, characterized in that it comprises a; and a control unit for providing the user's request for the blocking history and the image list extracted list generated by the website blocker and the image blocker; Having a computer terminal.
The integrated control module
Blocking the program specified by the setting management unit through the computer terminal if there is an execution command further comprises a program blocker for generating a blockage block, characterized in that the control unit controls the operation of the program blocker Computer terminal with integrated control module.
The website blocking unit and the image blocking unit call the hash information of the harmful website and harmful image data from an external management server in order to determine that the harmful website and harmful image data to block harmful substances, characterized in that Computer terminal having an integrated control module.
The integrated control module
It further includes a local information unit for receiving in real time the hash information of the harmful website and harmful image data from an external management server to provide the hash information stored in the local information to the website blocking unit and the image blocking unit and the website blocking unit and Computer terminal having an integrated control module for blocking harmful substances, characterized in that the harmful web site and the harmful image data determination is made to the image blocking unit.
In order to determine the harmfulness of the image data computer terminal having an integrated control module for blocking harmful substances, characterized in that the harmful image data is further received by receiving the characteristic point data of the harmful image data from an external management server .
The setting management unit
A website setting unit for designating a website to be blocked by the computer terminal, a program setting unit for designating a program to be blocked, a usage time setting unit for setting a usage time of the computer terminal, and a website blocking unit; And a user authentication unit configured to set a protection mode in which the operation of the image blocking unit and the image retrieval unit and the release mode in which the operation is stopped, and a user authentication is performed when necessary. Computer terminal having an integrated control module to block harmful substances.
The integrated control module
When the image data in the computer terminal is transmitted to the external server through the computer terminal, it is determined whether the image data to be transmitted is harmful through harmful image hash information and feature point data, and if it is determined to be harmful image data, the image transmission blocking unit blocks the transmission thereof. Computer terminal having an integrated control module for blocking harmful substances, characterized in that it further comprises.
The integrated control module
If there is a stop or delete command of the integrated control module operated by the user, the user identification information stored in the user authentication unit determines whether the user has the right to stop or delete, and if there is no permission to block execution of the stop or delete command. Computer terminal having an integrated control module for blocking harmful substances, characterized in that it further comprises an administrator authentication unit.
The integrated control module
In case of accessing a specific website through the computer terminal, it is determined whether the data communicating with the specific website is a streaming video, and when it is determined that the streaming video is extracted, hash information or feature point data of the streaming video is extracted from an external management server. It is judged to be received by calling the hash information or feature point data of streaming video data or by comparing the hash information or feature point data of harmful streaming video data stored in the local information unit through the local information unit to determine whether it is a harmful streaming video. If the computer terminal having an integrated control module for blocking harmful substances, characterized in that it further comprises a streaming blocker to block the execution thereof.
A management server for transmitting hash information or feature point data of harmful sites and harmful image data to the computer terminal in real time according to a request or setting of the computer terminal;
And a guardian terminal connected to the computer terminal for data communication and receiving a connection extraction history and execution blocking history and a search extraction list of harmful image data in real time according to a request or setting through the integrated control module. A pest control system using a computer terminal having an integrated control module to block the pest.
The integrated control module
A website blocking unit for blocking access and generating a blocking history when there is an access command on a website determined to be a harmful website or a website corresponding to a list of blocked websites set by a user through the computer terminal;
An image blocking unit for blocking execution and generating a blocking history when there is an execution command of the image data determined to be harmful image data through the computer terminal;
An image search unit for searching for harmful image data stored in the computer terminal and generating an extraction list;
A setting manager for designating a website to be blocked by the computer terminal, setting a use time of the computer terminal, and setting whether to operate the website blocking unit, the image blocking unit, and the image searching unit;
A program blocker for blocking a program designated by the setting manager through an execution command through the computer terminal and generating a breakdown history;
In case of transmitting the image data in the computer terminal to the external server through the computer terminal, it is determined whether the image data to be transmitted through the harmful image hash information or the feature point data is harmful. An image transmission blocking unit to generate,
The computer terminal setting history and the website blocking unit, the image blocking unit, the image searching unit, the image transmission blocking unit, and the program blocking unit operating setting details are read out to control the use time of the computer terminal, the website blocking unit, Controls the operation of the image blocker, the image searcher, the image transmission blocker and the program blocker, and the blocking history generated by the website blocker and the image blocker, the image transmission blocker and the program blocker and the extraction list of the image searcher. And a control unit for providing it when the user requests it,
If there is a stop or delete command of the integrated control module operated by the user, the user identification information stored in the user authentication unit determines whether the user has the right to stop or delete, and if there is no permission to block execution of the stop or delete command. A pest blocking system using a computer terminal having an integrated control module for blocking pests, characterized in that it comprises an administrator authentication unit.
The guardian terminal receives from the control unit of the integrated control module a block list generated by the website blocker, the image blocker, the image transmission blocker and the program blocker and the extraction list of the image searcher according to the request or setting. It has an integrated control module for controlling harmful substances, characterized in that it is configured to control the use time of the computer terminal and control the operation of the website blocker, image blocker, image searcher, image transmission blocker and program blocker Hazardous material blocking system using computer terminal.
The integrated control module
In case of accessing a specific website through the computer terminal, it is determined whether the data communicating with the specific website is a streaming video, and if it is determined that the streaming video is extracted, hash information or feature point data of the streaming video is extracted from the management server. Determines whether the data is received by calling the hash information or the feature point data of the data or by comparing the hash information or the feature point data of the harmful streaming video data stored in the local information unit through the local information unit. A pest blocking system using a computer terminal having an integrated control module for blocking pests, characterized in that it further comprises a streaming blocker to block the execution.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100048741A KR20110129224A (en) | 2010-05-25 | 2010-05-25 | Computer terminal having integrated control module to block harmful object and blocking system thereof |
PCT/KR2010/003479 WO2011149137A1 (en) | 2010-05-25 | 2010-05-31 | Computer terminal having integrating control module for blocking hazardous article and system for blocking hazardous article using the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100048741A KR20110129224A (en) | 2010-05-25 | 2010-05-25 | Computer terminal having integrated control module to block harmful object and blocking system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20110129224A true KR20110129224A (en) | 2011-12-01 |
Family
ID=45004116
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020100048741A KR20110129224A (en) | 2010-05-25 | 2010-05-25 | Computer terminal having integrated control module to block harmful object and blocking system thereof |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20110129224A (en) |
WO (1) | WO2011149137A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015102186A1 (en) * | 2014-01-03 | 2015-07-09 | 플러스기술 주식회사 | Method for restricting use of terminal and system therefor |
WO2015160038A1 (en) * | 2014-04-18 | 2015-10-22 | 플러스기술 주식회사 | Method for providing ward relief service, danger-message monitoring device for providing ward relief service, guardian terminal, and computer-readable recording medium |
KR20190014885A (en) * | 2017-08-04 | 2019-02-13 | 주식회사 케이티 | Method for coverting mode service of mobile termimal and apparatus therefor |
KR20190066218A (en) * | 2017-12-05 | 2019-06-13 | 이원 | Method, computing device and program for executing harmful object control |
WO2022164235A1 (en) * | 2021-01-28 | 2022-08-04 | 김민석 | Device and method for inspecting harmfulness of video content in real time |
KR20220167855A (en) * | 2021-06-15 | 2022-12-22 | 주식회사 테크노블러드코리아 | System for blocking access of video site |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010044579A (en) * | 2001-03-08 | 2001-06-05 | 김현길 | Internet management system of a children computer |
KR100517645B1 (en) * | 2004-11-05 | 2005-09-28 | (주)지란지교소프트 | Pornograph intercept method |
KR100670815B1 (en) * | 2005-12-08 | 2007-01-19 | 한국전자통신연구원 | Apparatus for filtering malicious multimedia data using sequential processing and method thereof |
KR100797600B1 (en) * | 2007-05-17 | 2008-01-23 | 주식회사 플랜티넷 | Method for restricting use of harmful multimedia file |
KR20100046524A (en) * | 2008-10-27 | 2010-05-07 | (주)소만사 | Apparatus and method to shut harmful sites |
-
2010
- 2010-05-25 KR KR1020100048741A patent/KR20110129224A/en not_active Application Discontinuation
- 2010-05-31 WO PCT/KR2010/003479 patent/WO2011149137A1/en active Application Filing
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015102186A1 (en) * | 2014-01-03 | 2015-07-09 | 플러스기술 주식회사 | Method for restricting use of terminal and system therefor |
WO2015160038A1 (en) * | 2014-04-18 | 2015-10-22 | 플러스기술 주식회사 | Method for providing ward relief service, danger-message monitoring device for providing ward relief service, guardian terminal, and computer-readable recording medium |
KR20190014885A (en) * | 2017-08-04 | 2019-02-13 | 주식회사 케이티 | Method for coverting mode service of mobile termimal and apparatus therefor |
KR20190066218A (en) * | 2017-12-05 | 2019-06-13 | 이원 | Method, computing device and program for executing harmful object control |
WO2022164235A1 (en) * | 2021-01-28 | 2022-08-04 | 김민석 | Device and method for inspecting harmfulness of video content in real time |
KR20220108915A (en) * | 2021-01-28 | 2022-08-04 | 김민석 | Real-time harmfulness inspection apparatus and method for video content |
KR20220167855A (en) * | 2021-06-15 | 2022-12-22 | 주식회사 테크노블러드코리아 | System for blocking access of video site |
Also Published As
Publication number | Publication date |
---|---|
WO2011149137A1 (en) | 2011-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11816980B2 (en) | Method of pairing a remote control | |
US11395039B2 (en) | Systems and methods for notifying a user when activity exceeds an authorization level | |
US11539729B2 (en) | Protecting network devices from suspicious communications | |
US8799365B2 (en) | Broker-based management of mobile devices | |
US20220286847A1 (en) | Method for pairing a mobile device with a wireless network | |
US11816968B2 (en) | Automatic presence simulator for security systems | |
KR20110129224A (en) | Computer terminal having integrated control module to block harmful object and blocking system thereof | |
KR102252258B1 (en) | Method and apparatus for controlling a group of home devices in a home network system | |
Mare et al. | Consumer smart homes: Where we are and where we need to go | |
AU2016283117A1 (en) | Management and control of mobile computing device using local and remote software agents | |
US9474011B2 (en) | Method and apparatus for providing access controls for a resource | |
CN112380511B (en) | Account control method, device, equipment and computer readable storage medium | |
CN101911591A (en) | Preventing secure data from leaving a network perimeter | |
US20190034624A1 (en) | Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time | |
CN103619019A (en) | Network access authentication method for wireless network | |
WO2006080685A1 (en) | Pornograph intercept method | |
WO2015102186A1 (en) | Method for restricting use of terminal and system therefor | |
KR20130097303A (en) | System and method of controlling for digital device using wireless lan detection | |
KR20170014532A (en) | METHOD AND HOME IoT SERVICE SYSTEM FOR SETTING USER AUTHORITY | |
KR101368912B1 (en) | Method for controlling home network devices using Rich Site Summary service and apparatus therefor | |
KR101445817B1 (en) | Method and apparatus for controlling use of service | |
CN107147702B (en) | File downloading method and device | |
AMIRTHAVARSINI et al. | CONTROL OF HOME APPLIANCES USING WIFI AND ARDUINO | |
US20130218891A1 (en) | Control method for harmful contents in youth and teenagers | |
Fraser | User Controlled Privacy Boundaries for Smart Homes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |