SG11202105055YA - Anti-cyberbullying systems and methods - Google Patents

Anti-cyberbullying systems and methods

Info

Publication number
SG11202105055YA
SG11202105055YA SG11202105055YA SG11202105055YA SG11202105055YA SG 11202105055Y A SG11202105055Y A SG 11202105055YA SG 11202105055Y A SG11202105055Y A SG 11202105055YA SG 11202105055Y A SG11202105055Y A SG 11202105055YA SG 11202105055Y A SG11202105055Y A SG 11202105055YA
Authority
SG
Singapore
Prior art keywords
cyberbullying
systems
methods
cyberbullying systems
Prior art date
Application number
SG11202105055YA
Inventor
Adrian Miron
Viorel Zavoiu
Andrei M Afloarei
Elena M Patru
Loredana Botezatu
Bogdan Bugoiu
Liviu A Holban
Original Assignee
Bitdefender Ipr Man Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US201962794856P priority Critical
Priority to US16/746,648 priority patent/US11188677B2/en
Application filed by Bitdefender Ipr Man Ltd filed Critical Bitdefender Ipr Man Ltd
Priority to PCT/EP2020/051290 priority patent/WO2020152106A1/en
Publication of SG11202105055YA publication Critical patent/SG11202105055YA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • G06F40/216Parsing using statistical methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/253Grammatical analysis; Style critique
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Computing arrangements based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0445Feedback networks, e.g. hopfield nets, associative networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Computing arrangements based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0454Architectures, e.g. interconnection topology using a combination of multiple neural nets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Computing arrangements based on biological models using neural network models
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
    • H04L51/212
    • H04L51/214
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/21Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
SG11202105055YA 2019-01-21 2020-01-20 Anti-cyberbullying systems and methods SG11202105055YA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US201962794856P true 2019-01-21 2019-01-21
US16/746,648 US11188677B2 (en) 2019-01-21 2020-01-17 Anti-cyberbullying systems and methods
PCT/EP2020/051290 WO2020152106A1 (en) 2019-01-21 2020-01-20 Anti-cyberbullying systems and methods

Publications (1)

Publication Number Publication Date
SG11202105055YA true SG11202105055YA (en) 2021-06-29

Family

ID=71609505

Family Applications (2)

Application Number Title Priority Date Filing Date
SG11202105057VA SG11202105057VA (en) 2019-01-21 2020-01-20 Parental control systems and methods for detecting an exposure of confidential information
SG11202105055YA SG11202105055YA (en) 2019-01-21 2020-01-20 Anti-cyberbullying systems and methods

Family Applications Before (1)

Application Number Title Priority Date Filing Date
SG11202105057VA SG11202105057VA (en) 2019-01-21 2020-01-20 Parental control systems and methods for detecting an exposure of confidential information

Country Status (10)

Country Link
US (3) US11188677B2 (en)
EP (2) EP3918504A1 (en)
JP (2) JP2022518039A (en)
KR (2) KR20210118405A (en)
CN (2) CN113557514A (en)
AU (2) AU2020210715A1 (en)
CA (2) CA3120334A1 (en)
IL (2) IL284748D0 (en)
SG (2) SG11202105057VA (en)
WO (2) WO2020152106A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10587643B2 (en) * 2017-11-28 2020-03-10 International Business Machines Corporation Detecting a root cause for a vulnerability using subjective logic in social media
US11349868B2 (en) 2018-01-18 2022-05-31 Forcepoint, LLC Detection of spoofed internally-addressed email using trusted third party's SPF records
US11099753B2 (en) * 2018-07-27 2021-08-24 EMC IP Holding Company LLC Method and apparatus for dynamic flow control in distributed storage systems
US11245723B2 (en) 2018-11-02 2022-02-08 Forcepoint, LLC Detection of potentially deceptive URI (uniform resource identifier) of a homograph attack
US11295026B2 (en) * 2018-11-20 2022-04-05 Forcepoint, LLC Scan, detect, and alert when a user takes a photo of a computer monitor with a mobile phone
US11297099B2 (en) 2018-11-29 2022-04-05 Forcepoint, LLC Redisplay computing with integrated data filtering
US11050767B2 (en) 2018-12-17 2021-06-29 Forcepoint, LLC System for identifying and handling electronic communications from a potentially untrustworthy sending entity
GB201915621D0 (en) * 2019-10-28 2019-12-11 Rolfe Ashley James Guardian watch
US11178088B1 (en) * 2020-10-06 2021-11-16 Slack Technologies, Inc. Snippet(s) of content associated with a communication platform

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060036701A1 (en) 2001-11-20 2006-02-16 Bulfer Andrew F Messaging system having message filtering and access control
US20080134282A1 (en) 2006-08-24 2008-06-05 Neustar, Inc. System and method for filtering offensive information content in communication systems
US8437460B2 (en) 2006-08-30 2013-05-07 At&T Intellectual Property I, L.P. User supervision and notification
US7970388B2 (en) 2007-04-01 2011-06-28 Time Warner Cable Inc. Methods and apparatus for providing multiple communications services with unified parental notification and/or control features
US20080282338A1 (en) 2007-05-09 2008-11-13 Beer Kevin J System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network
GB0710845D0 (en) * 2007-06-06 2007-07-18 Crisp Thinking Ltd Communication system
US7814163B2 (en) 2008-01-03 2010-10-12 Apple Inc. Text-based communication control for personal communication device
US8331618B1 (en) 2008-12-16 2012-12-11 Symantec Corporation Method and apparatus for monitoring instant messaging with visual identification
US9330274B2 (en) 2009-03-13 2016-05-03 Symantec Corporation Methods and systems for applying parental-control policies to media files
US8490176B2 (en) 2009-04-07 2013-07-16 Juniper Networks, Inc. System and method for controlling a mobile device
US8843567B2 (en) 2009-11-30 2014-09-23 International Business Machines Corporation Managing electronic messages
US8798610B2 (en) 2010-03-26 2014-08-05 Intel Corporation Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone
US8788657B2 (en) 2010-12-09 2014-07-22 Wavemarket, Inc. Communication monitoring system and method enabling designating a peer
US8699998B2 (en) 2011-08-10 2014-04-15 Qualcomm Incorporated Controlling text messages on a mobile device
US9887887B2 (en) 2012-07-09 2018-02-06 Eturi Corp. Information throttle based on compliance with electronic communication rules
CA2970613A1 (en) 2013-12-19 2015-06-25 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying
CN105303189B (en) 2014-07-29 2019-08-20 阿里巴巴集团控股有限公司 It is a kind of for detecting the method and device of specific identifier image in presumptive area
US10198667B2 (en) 2015-09-02 2019-02-05 Pocketguardian, Llc System and method of detecting offensive content sent or received on a portable electronic device
FR3055721B1 (en) 2016-09-05 2019-10-18 Ingenico Group METHOD FOR RECOGNIZING RELATED CHARACTERS, COMPUTER PROGRAM PRODUCT, AND CORRESPONDING DEVICE
WO2018084854A1 (en) 2016-11-04 2018-05-11 Rovi Guides, Inc. Methods and systems for recommending content restrictions
US20180152402A1 (en) * 2016-11-30 2018-05-31 Fujitsu Limited Cyberbullying prevention

Also Published As

Publication number Publication date
CA3120334A1 (en) 2020-07-30
WO2020152106A1 (en) 2020-07-30
KR20210118845A (en) 2021-10-01
AU2020210715A1 (en) 2021-06-03
US20200234243A1 (en) 2020-07-23
EP3918504A1 (en) 2021-12-08
KR20210118405A (en) 2021-09-30
CN113557514A (en) 2021-10-26
US11188677B2 (en) 2021-11-30
JP2022518040A (en) 2022-03-11
SG11202105057VA (en) 2021-06-29
IL284751D0 (en) 2021-08-31
CA3120424A1 (en) 2020-07-30
IL284748D0 (en) 2021-08-31
US20210390206A1 (en) 2021-12-16
WO2020152108A1 (en) 2020-07-30
US20200233974A1 (en) 2020-07-23
EP3918503A1 (en) 2021-12-08
AU2020211286A1 (en) 2021-06-03
JP2022518039A (en) 2022-03-11
CN113544681A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
SG11202105055YA (en) Anti-cyberbullying systems and methods
GB2570138B (en) System and methods
SG11202005931XA (en) Local interaction systems and methods
SG11202005933YA (en) Interactive systems and methods
EP3826734A4 (en) Systems and methods for climbing
EP3791570A4 (en) Systems and methods for cross-redaction
EP3692008A4 (en) Biocementation methods and systems
GB2581943B (en) Interactive systems and methods
GB201809582D0 (en) System and method
SG10201911576TA (en) Methods and Systems
GB2585826B (en) Systems and methods for activating functionality
GB2596770B (en) Carrier-resolved photo-hall system and method
GB2579050B (en) Control methods and systems
IL257210D0 (en) System and
GB201915713D0 (en) Systems and methods for activating functionality
GB202203972D0 (en) Design system and design method
GB201919414D0 (en) Design system and method
ZA201907240B (en) Panelisation system and method
GB201914888D0 (en) Control methods and systems
GB201901654D0 (en) System and method
GB202000339D0 (en) Acoustic methods and systems
GB202016092D0 (en) Systems and methods for features engineering
GB201816668D0 (en) System and method
GB201916230D0 (en) System and method
GB201815125D0 (en) Method and System