US20150207801A1 - Systems and methods for identity-based communication gate for social networks - Google Patents

Systems and methods for identity-based communication gate for social networks Download PDF

Info

Publication number
US20150207801A1
US20150207801A1 US14/578,176 US201414578176A US2015207801A1 US 20150207801 A1 US20150207801 A1 US 20150207801A1 US 201414578176 A US201414578176 A US 201414578176A US 2015207801 A1 US2015207801 A1 US 2015207801A1
Authority
US
United States
Prior art keywords
subscriber
module
interactive application
child
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/578,176
Inventor
Thomas M. DEAN
Kenneth J. Cardita
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/330,573 external-priority patent/US20040128148A1/en
Priority claimed from US10/395,324 external-priority patent/US7246067B2/en
Application filed by Individual filed Critical Individual
Priority to US14/578,176 priority Critical patent/US20150207801A1/en
Publication of US20150207801A1 publication Critical patent/US20150207801A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/30Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
    • A63F13/35Details of game servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2109Game systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Definitions

  • This disclosure relates to the field of online communications. More specifically, this disclosure relates to computer-implemented methods and systems for blocking communications between users of a computer network.
  • online providers offer communication services to their subscribers. Using such a service, a subscriber can request to contact other subscribers and/or engage in other activities, including video gaming, with other subscribers.
  • a significant problem with offering communications services is that online providers are plagued by the problem of subscribers either misrepresenting themselves or concealing important information, including age and gender. Further, parents of children engaging in activities using these online providers are often unable to control who their child can communicate while using the services of online providers. These issues are especially problematic when parents are unable to monitor potentially problematic communications between their child and other subscribers.
  • Systems and methods are disclosed that provide for certified parental control of online communication services, including social networks and video games.
  • parents of children engaging in activities using online communication services can control who their child can engage in communications with, while using online communication services.
  • parents can monitor communications between their child and other subscribers of an online communication service.
  • subscribers of online communication services can be prevented from misrepresenting themselves or concealing important information, including age and gender.
  • a system for providing certified parental control of online social networks and video games can include a database including at least one entry associated with a set of control limits for a child, the set of control limits corresponding to categories of persons the child may communicate with.
  • the system can further include a certification server configured to communicate with an online communication server over a network to provide access to the database, the certification server including a server application that (a) registers and certifies a parent, (b) registers and certifies a child, and (c) receives and stores control limits in the database.
  • the certification server can be configured to respond to a parental control request from the online communication server that matches an entry in the database associated with a child by checking whether a subscriber is within the categories of persons the child may communicate with.
  • the online communication server can be configured to filter, enable, prevent, or disable a subscriber communication from the subscriber to the child depending on the response from the certification server.
  • a system for providing certified parental control of an interactive application can include a database including at least one entry associated with a set of control limits for a child, the set of control limits corresponding to categories of persons the child may communicate with.
  • the system can further include a certification server configured to communicate with a client over a network to provide access to the database, the certification server including a server application that (a) registers and certifies a parent, (b) registers and certifies a child, and (c) receives and stores control limits in the database.
  • the certification server can be configured to respond to a parental control request from the client that matches an entry in the database associated with a child by checking whether a subscriber is within the categories of persons the child may communicate with.
  • the client can be configured to filter, enable, prevent, or disable a subscriber communication from the subscriber to the child depending on the response from the certification server.
  • a system for providing certified parental control of an online communication service can include a database including at least one entry associated with a set of control limits for a second person, the set of control limits corresponding to categories of persons the second person may communicate with.
  • the system can further include a first server configured to communicate with a second server over a network to provide access to the database, the first server including a server application that (a) registers and certifies a first person, (b) registers and certifies a second person, and (c) receives and stores control limits in the database.
  • the first server can be configured to respond to a parental control request from the second server that matches an entry in the database associated with a second person by checking whether a third person is within the categories of persons the second person may communicate with.
  • the second server can be configured to enable, disable, prevent, or filter a third party communication from the third person to the second person depending on the response from the first server.
  • a system for providing certified parental control of online communication services is provided.
  • a client can be configured to communicate with a certification server.
  • the client can also be configured to filter, enable or disable a subscriber communication from a subscriber to a child depending on the response from the certification server.
  • a computer-implemented method of providing certified parental control for online social networks and video games can include registering and certifying a first person, registering and certifying a second person, and registering and certifying a third person.
  • the method can further include receiving and storing in a database a set of control limits from the first person, the set of control limits associated with categories of persons the second person may communicate with.
  • the method can further include receiving a third party communication over a network from a third person directed to the second person.
  • the method can further include checking whether the third person is within the associated categories of persons the second person may communicate with.
  • the method can further include, in response to the checking, filtering, enabling, or blocking the third party communication from the third person.
  • a computer-implemented method of providing certified parental control of an interactive application can include receiving and storing in a database a set of control limits from a first person, the set of control limits associated with categories of persons a second person may communicate with.
  • the method can further include receiving a communication to the second person from a third person.
  • the method can further include in response to receiving the communication, automatically checking in the database whether the third person is not within the categories of persons the second person may communicate with. The checking can inhibit unauthorized communications to the second person from the third person.
  • a computer-implemented method of providing certified parental control for online communication services can include receiving and storing in a database a set of control limits from a first person, the set of control limits associated with categories of persons a second person may communicate with.
  • the method can further include receiving a communication to the second person from a third person.
  • the method can further include, in response to receiving the communication, automatically checking in the database whether the third person is within the categories of persons the second person may communicate with. The checking can allow authorized communications to the second person from the third person.
  • a computer-implemented method of providing certified parental control for online communication services can include receiving a third party communication over a network from a third person directed at a child.
  • the method can further include checking whether the third person is within associated categories of persons the child may communicate with.
  • the method can further include, in response to the checking, filtering, enabling, or blocking the third party communication from the third person.
  • FIG. 1 illustrates a system configured to implement certified parental control for online communications, in accordance with some embodiments of the inventions.
  • FIG. 2 illustrates a system configured to implement certified parental control for online communications, and illustrates exemplary user components for accessing the system.
  • FIG. 3 illustrates a system configured to implement certified parental control for online communications, and illustrates exemplary interactive application server components.
  • FIG. 4 illustrates a system configured to implement certified parental control for online communications, and illustrates exemplary certification server components.
  • FIG. 5 is a flow chart illustrating embodiments of exemplary methods for providing certified parental control of online communication services, whereby a parent and child are registered and/or certified with a certification center.
  • FIG. 6 illustrates an example form page configured to allow a parent to configure communication control limits for a child, and/or enable or disable the logging of online communications.
  • FIG. 7 is a flow chart illustrating embodiments of exemplary methods for providing certified parental control of online communication services, whereby a subscriber is registered and/or certified with a certification center.
  • FIG. 8 illustrates a sequence of steps that can be performed when a child and another subscriber of an online communication service attempt to communicate with each other.
  • FIG. 9 illustrates an example form page for allowing a parent to monitor online communications of a child.
  • parents of children engaging in activities using online communication services can control who their child can engage in communications with, while using online communication services.
  • parents can monitor communications between their child and other subscribers of an online communication service.
  • subscribers of online communication services can be prevented from misrepresenting themselves or concealing important information, including age and gender.
  • FIG. 1 illustrates a system that can be configured to implement certified parental control for online communications, in accordance with some embodiments.
  • the term “communication” is meant to define a broad term including its ordinary meaning as well as a broad range of communications including text, voice, video, images, documents, and/or other communications.
  • a plurality of computing systems 100 are in communication with a network 160 , and the interactive application server 162 and/or the certification server 166 are also in communication with the network 160 .
  • the computing system 100 , interactive application server 162 , various modules, and/or various components can, in some embodiments, be configured as a client of the certification server 166 . Communication over the network can take place using sockets, ports, and/or other mechanisms recognized in the art. As depicted in this drawing, one or more subscribers use a computing system 100 with access to the network 160 to access the interactive application server 162 , and/or the certification server 166 .
  • the interactive application server 162 can comprise a server system (typically comprising multiple physical computers/machines) and associated content that are accessible via the network.
  • the interactive application server 162 can be implemented using physical computer servers that are geographically remote from one another and/or can include content that spans multiple internet domains.
  • the interactive application server 162 can be accessible by computing systems 100 via a network 160 .
  • the interactive application server 162 is in communication with a network 160 , the computing system 100 , and/or the certification server 166 .
  • the certification server 166 can comprise a server system (typically comprising multiple physical computers/machines) and associated content that are accessible via the network.
  • the interactive application server 162 can be implemented using physical computer servers that are geographically remote from one another and/or can include content that spans multiple internet domains.
  • the certification server 166 can be accessible by computing systems 100 via a network 160 .
  • the certification server 166 is in communication with a network 160 , the computing system 100 , and/or interactive application server 162 .
  • the interactive application server 162 and the certification server 166 described herein refer can be integrated with one another and/or sub-divided, despite their physical organization or storage.
  • the computing system 100 can be used to implement certain systems and methods described herein.
  • the computing system 100 can be configured to receive a third party communication over a network from a third person directed at a child, check whether the third party is within associated categories of persons the child can communicate with, and respond by enabling or blocking the third party communication.
  • the functionality provided for in the components and modules of the computing system 100 can be combined into fewer components and modules or further separated into additional components and modules.
  • the computing system 100 can include, for example, a personal computer that is IBM, Macintosh, or Linux/Unix compatible.
  • the computing device can comprise a server, a laptop computer, a cell phone, a personal digital assistant, a kiosk, or an audio player, for example.
  • the exemplary computing system can include a central processing unit (“CPU”), which can include a conventional microprocessor.
  • the computing system 100 can further include a memory, such as random access memory (“RAM”) for temporary storage of information and a read only memory (“ROM”) for permanent storage of information, and a mass storage device, such as a hard drive, diskette, or optical media storage device.
  • the modules of the computing system 100 are connected to the computer using a standards based bus system.
  • the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example.
  • PCI Peripheral Component Interconnect
  • ISA Industrial Standard Architecture
  • the computing system 100 can generally be controlled and coordinated by operating system software, such as Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Vista, Linux, SunOS, Solaris, or other compatible operating systems.
  • operating system software such as Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Vista, Linux, SunOS, Solaris, or other compatible operating systems.
  • the operating system can be any available operating system, such as MAC OS X.
  • the computing system 100 can be controlled by a proprietary operating system.
  • Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, and I/O services, and provide a user interface, such as a graphical user interface (“GUI”), among other things.
  • GUI graphical user interface
  • the exemplary computing system 100 includes one or more commonly available input/output (I/O) devices and interfaces, such as a keyboard, mouse, touchpad, and printer.
  • the I/O devices and interfaces include one or more display device, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example.
  • the computing system 100 can also include one or more multimedia devices, such as speakers, video cards, graphics accelerators, and microphones, for example.
  • the I/O devices and interfaces provide a communication interface to various external devices.
  • the computing system 100 is coupled to a network 160 , such as a LAN, WAN, or the Internet, for example, via a wired, wireless, or combination of wired and wireless, communication links.
  • the network 160 communicates with various computing devices and/or other electronic devices via wired or wireless communication links.
  • the network 160 is coupled to an interactive application server 162 , such as a social network server, video gaming sever, and/or other online communication service server.
  • the interactive application server 162 can be coupled to an interactive communication log database 350 .
  • the network 160 is also connected to a certification server 166 .
  • the certification server 166 can be connected to a personal information database 460 , which can include a private or government public information database, and a control limits database 480 .
  • the interactive application server 162 can be configured to allow subscribers to engage in various communications with one another, contact one another, and/or engage in other interactive activities.
  • the information supplied by the certification server 166 can include the personal information of subscribers of the interactive application server 162 .
  • This personal information can include a subscriber's name, social security number, passport number, driver's license number, various government issued identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, and/or other information.
  • the certification server 166 can be configured to communicate with the interactive application server 162 over the network 160 to enable or disable subscriber communications between subscribers using computing systems 100 based on personal information.
  • the network 160 can communicate with other data sources, databases, and/or other computing devices.
  • the data sources can include one or more internal and/or external data sources.
  • one or more of the data sources and/or databases can be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.
  • FIG. 2 illustrates a system that implements certified parental control for online communications, and illustrates typical user components for accessing the system, in accordance with some embodiments.
  • the computing system 100 includes an interactive application module 200 that can be executed by the CPU.
  • the interactive application module 200 can be a video game, such as an online multi-player gaming application, including Club Penguin®, World of Warcraft®, Second Life®, or other games.
  • the interactive application module 200 can be a commercially available email application, such as Mozilla Thunderbird and/or Microsoft Outlook.
  • the interactive application module 200 can be a web browser application, such as Mozilla Firefox, Apple Safari, and/or Microsoft Internet Explorer, which implement the basic World Wide Web standards such as HTTP and HTML.
  • the interactive application module 200 can deliver various media to the subscriber such as email services including Gmail, Yahoo Mail, and Hotmail. In various embodiments the interactive application module 200 can deliver various media to the subscriber including video, such as YouTube, and/or images, such as Snapfish and/or Flickr. In some embodiments, the interactive application module 200 can be a social networking web site, such as Friendster, Facebook, Match.com, JDate.com, and/or MySpace.
  • the interactive application module 200 can be a collaborative real-time editor, such as ACE, CoWord, and/or EditGrid that allows several people to edit a computer file, such as a spreadsheet and/or text document, using different computers at the same time.
  • the interactive application module 200 can be a chat client such as AOL Instant Messenger and/or Google Talk.
  • the interactive application module 200 can include, by way of example, components, such as software components, object-oriented software components, class components and/or task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and/or variables.
  • module refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C or C++.
  • a software module can be compiled and linked into an executable program, installed in a dynamic link library, or can be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules can be callable from other modules or from themselves, and/or can be invoked in response to detected events or interrupts.
  • Software instructions can be embedded in firmware, such as an EPROM.
  • hardware modules can be comprised of connected logic units, such as gates and flip-flops, and/or can be comprised of programmable units, such as programmable gate arrays or processors.
  • the modules described herein are preferably implemented as software modules, but can be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that can be combined with other modules or divided into sub-modules despite their physical organization or storage.
  • the computing system 100 is configured to execute the interactive application communication module 210 , among others, in order to enable communication between the interactive application module 200 and the interactive application server 162 .
  • the interactive application module 200 can be a video game.
  • the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to receive such information.
  • the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to send such information.
  • the computing system 100 can be configured to execute the certification application module 220 , among others, in order to register and/or certify a subscriber of the interactive application server 162 .
  • the certification application module 220 can be configured to allow a subscriber of the interactive application server 162 to provide personal information to register with the certification server 166 .
  • the subscriber can be a parent and/or a child.
  • the subscriber can be certified when the personal information, such as age and/or gender can be verified to ensure its accuracy by the certification server 166 .
  • the personal information can include a subscriber's name, social security number, driver's license number, passport number, various government identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, other photographs, videos, and/or other identity verification information.
  • the personal information provided to the interactive application server 162 by the certification application module 220 can be an identifier, such as a pin number and/or confirmation number associated with the subscriber. The identifier can be unique to a subscriber and/or associated with multiple subscribers.
  • the identifier can be associated with an age group, gender, and/or other groups. In some embodiments, the identifier can be obtained when the subscriber confirms his identity with a notary, a certification center, and/or a certification server 166 by presenting a document such as a passport, birth certificate, social security card, driver's license, and/or other documents. In an exemplary embodiment, a parent and/or a child can confirm his identity with the certification server 166 using personal information.
  • the certification application module 220 can be configured to verify that subscribers are certified.
  • the interactive application module 200 is configured to access the subscriber communication module 230 when a subscriber attempts to communicate with another subscriber, such as a child, of the interactive application server 162 .
  • the subscriber communication module 230 can then access the interactive application server 162 , which in turn can access the certification server 166 to check whether the subscriber is within a set of associated categories of persons the child can communicate with.
  • the certification server 166 responds to the interactive application server 162 , communications between the child and the subscriber can be enabled, filtered, and/or disabled by the interactive application server 162 .
  • filtering can include reducing, altering, and/or changing the content of communications between the subscriber and child.
  • a response can be sent back to the computing system 100 of the child and/or subscriber over the network 160 from the interactive application server 162 , such that the computing system 100 enables or disables communications between the child and subscriber.
  • the computing system can also include a parental control module 240 .
  • the parental control module 240 can be configured to allow a parent to set up and/or control who their child can communicate with while using the interactive application module 200 .
  • the parental control module 240 can store control limits on the computing system 100 and/or can use the network 160 to access the interactive application server 162 and/or the certification server 166 to store control limits.
  • a parent can enter in various control limits on subscribers of the interactive application server 162 that their child can participate and/or engage in communications with. These control limits can include a minimum age, maximum age, gender, names, and/or other restrictions on subscribers that their child can communicate with. Additionally, in some embodiments, a parent can enter a limit that their child can only communicate with specific other people identified by a unique PIN, certification, password, or the like.
  • control limits can include limits on the level of subscriber memberships that their child can contact. It can be desirable to have three levels of subscribers—bronze, silver, and gold—with bronze being a subscriber who has confirmed the least amount of certification information such as identity, date of birth, gender, height and/or weight, a current photograph(s), and/or marital status.
  • a silver subscriber can additionally require home ownership confirmation, income verification, and/or a credit report.
  • a gold membership can additionally require the silver and gold information and, in addition, driving and criminal records, substance abuse testing, professional license association information, and/or other information. It should be noted that the level of subscribers are provided as an exemplary embodiment, and there can be as few as two or more than three.
  • parental control limits can include dates and/or times when a child can engage in communications while using the interactive application module 200 .
  • communications using the interactive application module 200 are not permitted.
  • the control limits are satisfied, communications using the interactive application module 200 are permitted.
  • the parental control module 240 can be configured to allow a parent to log communications made by their child while using the interactive application module 200 .
  • the logged communications can be stored on the computing system 100 , the interactive application server 162 , and/or the certification server 166 .
  • the parental control module 240 can notify the parent of potential problems in the logged communications.
  • the parental control monitor 240 can search the logged communications, such as text, voice, video, images, documents, and/or other communications for profanity, sexual, and/or other content. This searching can be advantageous in determining whether a communication is suspicious and/or problematic.
  • the parental control module 240 can also track the time and/or date of communications made while using the interactive application module 200 , the length of communications, the identity of the subscriber that was communicated with, and can be configured to allow the printing, saving, emailing, viewing, and deletion of the communications.
  • the computing system 100 can also comprise a subscriber communication module 230 .
  • the computing system 100 is configured to execute the subscriber communication module 230 when a subscriber wishes to communicate with another subscriber while using the interactive application module 200 .
  • the interactive application module 200 can be an online social network.
  • the subscriber communication module 230 can be executed by the interactive application module 200 .
  • the subscriber communication module 230 can then communicate over the network 160 with the interactive application server 162 and/or the certification server 166 .
  • the certification server 166 is contacted and responds as to whether the subscriber satisfies the control limits configured by the parent.
  • the subscriber communication module 230 can then inhibit, block, and/or enable communication between the subscriber and the child when they are using the interactive application module 200 .
  • the subscriber communication module 230 can be configured to allow a level of communication between the child and subscriber that is in between completely enabling or disabling all communication. In an embodiment, the subscriber communication module 230 can selectively permit certain communications between the child and subscriber.
  • FIG. 3 illustrates a system that implements certified parental control for online communications, and illustrates typical interactive application server components, in accordance with some embodiments of the inventions.
  • the interactive application server 162 includes an interactive application service module 300 .
  • the interactive application service module 300 can be configured to communicate with the interactive application module 200 on a computing system 100 .
  • the interactive application module 200 can be a video game.
  • the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to receive such information.
  • the interactive application service module 300 can be executed. The interactive application service module 300 can then send back to the interactive application communication module 210 the next level of the video game. The interactive application communication module 210 can then update the interactive application module 200 with the next level of the video game.
  • the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to send such information.
  • the interactive application service module 300 can then be executed and receive the updated information from the interactive application communication module 210 .
  • the interactive application server 162 can include an interactive application network module 305 .
  • the interactive application network module 305 can be configured to enable communication between various subscribers of the interactive application sever 162 while using the interactive application module 200 .
  • the interactive application server 162 is contacted, and the interactive application network module 305 is executed.
  • the interactive application network module 305 can execute the subscriber authentication module 320 , among others, to ensure that the parental control limits are satisfied.
  • the subscriber authentication module 320 can execute the interactive application network module 305 .
  • the interactive application network module 305 can use various mechanisms to enable communication between subscribers.
  • the interactive application network module 305 among others, can use sockets, ports, and/or other mechanisms recognized in the art to enable communication among subscribers.
  • the interactive application network module 305 can directly forward communications between subscribers to one another and/or perform processing on the communications using the various modules described herein.
  • the interactive application server 162 can also include a subscriber certification module 310 .
  • the interactive application server 162 is configured to execute the subscriber certification module 310 , among others, in response to a request over the network 160 from the certification application module 220 of a computing system 100 to register and/or certify a subscriber of the interactive application server 162 .
  • the subscriber certification module 310 can serve as an interface between a subscriber's computing system 100 and the certification server 166 .
  • the interactive application server 162 can also include a subscriber authentication module 320 .
  • the interactive application server 162 is configured to execute the subscriber authentication module 320 , among others, in response to a request, such as a parental control request, over the network 160 from the subscriber communication module 230 of a computing system 100 to authenticate, validate, and/or verify that a subscriber of the interactive application server 162 is within a set of associated categories that another subscriber, such as a child, can communicate with.
  • the subscriber authentication module 320 is configured to access the certification server 166 . When the certification server 166 responds to the subscriber authentication module 320 , communications between the child and subscriber can be enabled, blocked, and/or inhibited.
  • the subscriber certification module 310 can serve as an interface between a subscriber's computing system 100 and the certification server 166 .
  • the subscriber authentication module 320 can validate and/or verify that a subscriber is within a set of associated categories that another subscriber, such as a child can communicate with, without using the certification server 166 .
  • the subscriber certification module 310 can use a cache, such as a database, to store the personal information of subscribers. This can be advantageous in avoiding communication with the certification server 166 to check whether a subscriber is certified.
  • the cache can store personal information for subscribers that were recently certified by the certification server 166 .
  • the interactive application server 162 also includes a parent configuration module 330 .
  • the parent configuration module 330 can be configured to communicate with the parental control module 240 on a computing system 100 and/or forward communications from the parental control module 240 to the certification server 166 .
  • the forwarded communications can be control limits set by a parent for their child to limit the subscribers of the interactive application server 162 that their children can communicate with while using the interactive application module 200 .
  • the parent configuration module 300 can be configured similar to the parental control module 160 of the computing system 100 .
  • the interactive application server 162 includes a communication logging module 340 .
  • the communication logging module 340 can be configured to log communications between subscribers of the interactive application server 162 for later review by accessing an interactive application communication log database 350 .
  • the communication logging module 340 can record some or all communications between subscribers by accessing the interactive application network module 305 , which can permit subscribers of the interactive application server 162 to communicate with one another.
  • a parent of a child can use the parental control module 240 to enable or disable the logging of communications made by their child, while using the interactive application module 200 .
  • the interactive application server 162 can access the interactive application communication log database 350 , which can be used to store the logged communications.
  • the interactive application communication log database 350 can track the time and/or date, subscribers involved in the communications, the length of the communications, and whether the communications are problematic. Communications can be determined to be problematic or suspicious by using filtering software known in the art.
  • the logged communications can be stored on the computing system 100 and/or the certification server 166 .
  • the interactive application server 162 can advantageously include a parental monitor module 360 .
  • the parental monitor module 360 can be configured to access the interactive application communication log database 350 .
  • a parent of a child can use the parental control module 240 to communicate with the parental monitor module 360 .
  • the parental monitor module 360 can access the interactive communication log database 350 of the interactive application server 162 and send back the logged communications of a child to the parental control module 240 of the computing system 100 .
  • the parental monitor module 360 can search the logged communications and alert the parent by reporting suspicious and/or potentially problematic communications to the parental control module 240 .
  • FIG. 4 illustrates a system that implements certified parental control for online communications, and illustrates typical certification server components, in accordance with some embodiments of the inventions.
  • the certification server 166 can include a service module 400 and/or a subscriber module 425 .
  • the service module 400 can comprise a service registration module 410 .
  • the service registration module 410 can be configured to handle the registration process of an interactive application server 162 with the certification server 166 and/or allow access for the interactive application server 162 to the certification server 166 .
  • an interactive application server 162 if an interactive application server 162 is not registered with certification server 166 , the interactive application server 162 can not access the certification server 166 .
  • an interactive application server 162 can be registered if its IP address and/or domain name is known to the certification server 166 .
  • the service registration module 410 can include a list of registered interactive application servers and can grant access to interactive application servers based on their appearance on such a list.
  • the list can include IP addresses and/or domain names of authorized interactive application servers. Based on such a list, the service registration module 410 can exclude unauthorized interactive application servers, such that access to the certification server 166 can be denied to unregistered interactive application servers.
  • the service module 400 can include a service configuration module 420 .
  • the service configuration module 420 can allow an interactive application server 162 to be configured such that it can access the certification server 166 .
  • the service configuration module 420 can be used to provide an application programming interface to the interactive application server 162 such that the certification server 166 can be accessed.
  • the subscriber module 425 can include a certification module 430 .
  • the certification server 166 can be configured to execute the certification module 430 , among others, in response to a request from the subscriber certification module 310 of the interactive application server 162 to register and/or certify a subscriber of the interactive application server 162 .
  • the certification module 430 can communicate directly with the certification application module 220 to register and/or certify a subscriber.
  • the certification module 430 can access a personal information database 460 .
  • the personal information database 460 can be updated.
  • the personal information database 460 can include a subscriber identification 461 , subscriber date of birth 462 , and/or subscriber gender 463 .
  • the subscriber identification 460 can be an alphanumeric identifier uniquely associated with a subscriber.
  • the personal information database 460 can contain a record uniquely associated with a subscriber identification 461 .
  • Each record can contain information including the subscriber's date of birth 462 , gender 463 , name, social security number, passport number, driver's license number, various government issued identification, address, telephone number, photograph, mother's maiden name, and/or other information. This information can be entered into personal information database 460 when a subscriber is registered and/or certified with the certification server 166 and/or at other times.
  • the subscriber module 425 can include a control limits module 450 .
  • the control limits module 450 can be configured to communicate with the parental control module 240 of the computing system 100 through the parent configuration module 330 of the interactive application server 162 and/or directly over the network 160 .
  • the parent can enter, update, and delete various control limits on subscribers of the application server 162 that their child can participate and/or engage in communications with using the parental control module 240 .
  • the parental control module 240 can then be configured to communicate with the parent configuration module 330 of interactive application server 162 .
  • the control limits module 450 can be configured to respond to a request from the parent configuration module 330 , to enter control limits.
  • control limits module 450 accesses a control limits database 480 to track communication control limits placed on subscribers of an interactive application server 162 .
  • the certification server 166 can be configured to execute the control limits module 450 and the control limits database 480 can be adjusted accordingly.
  • the control limits database 480 can include a subscriber identification 481 corresponding to a subscriber, such as a child.
  • the subscriber identification 460 can be an alphanumeric identifier uniquely associated with a subscriber.
  • control limits database 480 can contain a record uniquely associated with a subscriber identification 481 .
  • each record in the control limits database can include limitations such as a minimum age 482 , maximum age 483 , and/or gender 484 on subscribers that a child can communicate with.
  • each record in the control limits database 480 can include other information placing limitations on who a subscriber can engage in communications with.
  • These control limits can include days 485 and/or times 486 limiting when a child can engage in communications while using the interactive application module 200 .
  • the subscriber module 425 of the certification server 166 can also include an authentication module 440 .
  • the certification server 166 is configured to execute the authentication module 440 , among others, in response to a request, such as a parental control request, over the network 160 from the subscriber authentication module 320 of the interactive application server 166 to authenticate, validate, and/or verify that a subscriber of the interactive application server 162 is within a set of associated categories that another subscriber, such as a child, can communicate with.
  • the subscriber communication module 230 and/or the subscriber authentication module 320 can send the subscriber identification of two subscribers to the authentication module 440 to verify that they can communicate with one another.
  • a first subscriber of the interactive application server 162 can attempt to communicate with a second subscriber, such as a child.
  • the authentication module 440 can be configured to have access to the personal information database 460 and/or the control limits database 480 .
  • the authentication module can use a language such as SQL to retrieve the record associated with the subscriber identification 461 of the first subscriber in the personal information database 460 .
  • the authentication module 440 can likewise retrieve the record associated with the subscriber identification 481 of the child in the control limits database 481 .
  • the authentication module 440 can then be configured to check whether the first subscriber is within the set of associated categories that the parent of the child has allowed the child to communicate with.
  • the authentication module 440 of the certification server 166 responds, communications between the child and subscriber can be enabled, blocked, and/or inhibited.
  • the computing system 100 can communicate with the authentication module 440 of the certification server directly 166 .
  • FIG. 5 is a flow chart illustrating embodiments of methods for providing certified parental control of online communication services consistent with the present inventions whereby a parent and child are registered and/or certified with a certification center.
  • the online communication service can include the interactive application module 200 , the interactive application service module 300 , and/or the interactive application network module 305 .
  • the online communication service can include the interactive application server 162 .
  • the computing system 100 , network 160 , interactive application server 162 , certification server 166 , various databases, various components, various modules, and other systems described herein can be configured to execute this process.
  • the certification application module 220 , the subscriber certification module 310 , and/or the certification module 430 can be configured to execute this process. In exemplary embodiments, this process can be executed when any subscriber, including a child and/or a parent, registers and/or certifies themselves with a certification center.
  • a parent and child provide personal information to a certification center.
  • the parent and/or child provide personal information.
  • personal information can be provided to the certification center using a computing system 100 .
  • the certification server 166 can be configured as a certification center.
  • the personal information can be sent over a network 160 to the certification center 166 and/or to an interactive application server 162 .
  • the personal information can include a subscriber's name, social security number, driver's license number, passport number, various government identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, and/or other identity verification information.
  • the personal information can be an identifier, such as a pin number and/or confirmation number associated with the subscriber.
  • the certification center checks the accuracy of the personal information provided by the parent and child.
  • the certification center can run personal information, including identification numbers and/or other information, such as bar codes, associated with government issued documents through a computer system, private and/or public database, and/or perform a visual inspection on the personal information provided to ensure it is valid, authentic, and/or to confirm the identification of the parent and child.
  • the government issued documents can be, in some embodiments, a passport, birth certificate, social security card, driver's license, and/or other documents.
  • the certification server can notarize a form issued by an online communication service, such as the interactive application server 162 , which confirms the identity of the subscriber, including the parent and child, upon viewing valid identification.
  • the certification center certifies the parent and child.
  • the subscriber can be certified when personal information, such as identity, age, and/or gender can be verified to ensure its accuracy by the certification server 166 .
  • the certification center can assign an identifier that can be unique to a subscriber and/or associated with multiple subscribers to the parent and/or child when they are certified.
  • the identifier can be associated with an age group, gender, and/or other groups.
  • the certification center can notarize various documents to be presented to an online communication service provider.
  • control limits on subscribers of online communication services that their child can engage in communications with can include a minimum age, maximum age, gender, names, and other restrictions on subscribers that their child can communicate with.
  • the control limits can include limits on the level of subscriber memberships that their child can communicate with. It can be desirable to have three levels of subscribers—bronze, silver, and gold—with bronze being a subscriber who has confirmed the least amount of certification information such as identity, date of birth, gender, height and/or weight, a current photograph(s), and/or marital status. A silver subscriber can additionally require home ownership confirmation, income verification, and/or a credit report.
  • a gold membership can additionally require the silver and gold information and, in addition, driving and criminal records, substance abuse testing, professional license association information, and/or other information. It should be noted that the level of subscribers are provided as an exemplary embodiment, and there can be as few as two or more than three.
  • control limits can include day and/or time limits when a child can engage in communications while using an online communication service.
  • day, and/or the time does not satisfy the parental control limits in place, communications using the online communication service are not permitted.
  • the parental control module 240 , parental monitor module 360 , authentication module 440 , control limits module 450 , personal information database 460 , and/or control limits database 480 can be configured to execute these steps.
  • FIG. 6 illustrates an example form page for allowing a parent to configure communication control limits for a child, and/or enable or disable the logging of online communications, in accordance with some embodiments of the inventions.
  • the computing system 100 , network 160 , interactive application server 162 , certification server 166 , various databases, various components, various modules, and other systems described herein can be configured to execute a process to generate the form page in a programming language such as HTML and/or JavaScript, and/or respond to the form page when saved 680 by using a programming language such as PHP.
  • a programming language such as HTML and/or JavaScript
  • this page can be generated using a programming language such as HTML when a subscriber and/or the parent of a subscriber, such as a child, sets up control limits, and/or wishes to monitor and/or log communications between their child and other subscribers of the online communication service.
  • a programming language such as HTML
  • the form page can allow the parent of a child subscribing to the online communication service to enter a minimum age 610 and/or maximum age 620 of other subscribers of the online communication service that their child can engage in communications with.
  • the parent can also limit the gender 630 of other subscribers that their child can communicate with while using the online communication service.
  • the form page can also allow a parent to place control limits on the level of subscriber memberships 640 of the online communication service that their child can contact. It can be desirable to have three levels of subscribers—bronze, silver, and gold—with bronze being a subscriber who has confirmed the least amount of certification information such as identity, date of birth, gender, height and/or weight, a current photograph(s), and/or marital status.
  • a silver subscriber can additionally require home ownership confirmation, income verification, and/or a credit report.
  • a gold membership can additionally require the silver and gold information and, in addition, driving and criminal records, substance abuse testing, professional license association information, and/or other information. It should be noted that the level of subscribers are provided as an exemplary embodiment, and there can be as few as two or more than three.
  • the form page can also include times 650 and/or days 660 when their child can be blocked from engaging in communications while using the online communication service provider.
  • the form page can allow a parent to log communications 670 made by their child while using the online communication service.
  • the parental control module 240 can be configured to handle online communication logging.
  • the logged communications can be stored on the computing system 100 , the interactive application server 162 , various databases including the interactive application communication log database 350 , and/or the certification server 166 .
  • the parent can also configure the number of days to store the communication logs 670 .
  • the parental control module 240 , communication logging module 340 , parental monitor module 360 , and interactive application communication log database 350 can be configured to implement a process that generates the form page and/or responds to the form page by using a programming language, such as PHP, when the form is saved and/or cancelled 680 .
  • a programming language such as PHP
  • FIG. 7 is a flow chart illustrating embodiments of methods for providing certified parental control of online communication services consistent with the present inventions, whereby a subscriber is registered and/or certified with a certification center.
  • the online communication service can include the interactive application module 200 , the interactive application service module 300 , and/or the interactive application network module 305 .
  • the online communication service can include the interactive application server 162 .
  • the computing system 100 , network 160 , interactive application server 162 , certification server 166 , various databases, various components, various modules, and other systems described herein can be configured to execute this process.
  • the certification application module 220 , the subscriber certification module 310 , the certification module 430 , and/or the personal information database 460 can be configured to execute this process.
  • the subscriber provides personal information to a certification center.
  • the subscriber can provide personal information to a certification center by using a computing system 100 .
  • the certification server 166 can be configured as a certification center.
  • the personal information can be sent over a network 160 to the certification center 166 and/or to an interactive application server 162 .
  • the personal information can include a subscriber's name, social security number, driver's license number, passport number, various government identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, and/or other identity verification information.
  • the personal information can be an identifier, such as a pin number and/or confirmation number associated with the subscriber.
  • the certification center checks the accuracy of the personal information provided by the subscriber.
  • the certification center can run identification numbers and/or other information, such as bar codes, associated with government issued documents through a computer system, private and/or public database, and/or perform a visual inspection on the personal information provided to ensure that the personal information is valid, authentic, and/or to confirm the identification of the parent and child.
  • the government issued documents can be, in some embodiments, a passport, birth certificate, social security card, driver's license, and/or other documents.
  • the certification server 166 can notarize a form issued by an online communication service, such as the interactive application server 162 , which confirms the identity of the subscriber.
  • the certification center certifies the subscriber.
  • the subscriber can be certified when personal information, such as identity, age, and/or gender can be verified to ensure its accuracy by the certification server 166 .
  • the certification center can assign an identifier that can be unique to a subscriber and/or associated with multiple subscribers when they are certified.
  • the identifier can be associated with an age group, gender, and/or other groups.
  • the certification center can notarize various documents to be presented to an online communication service provider.
  • FIG. 8 illustrates a sequence of steps that can be performed when a child and another subscriber of an online communication service attempt to communicate with each other, in accordance with some embodiments of the inventions.
  • the online communication service can include the interactive application module 200 , the interactive application service module 300 , and/or the interactive application network module 305 .
  • the online communication service can include the interactive application server 162 .
  • the computing system 100 , network 160 , interactive application server 162 , certification server 166 , various databases, various components, various modules, and other systems described herein can be configured to execute this process. In exemplary embodiments, this process can be executed when any subscriber, including a child and/or a parent, attempts to communicate with another subscriber.
  • step 810 a child and/or subscriber attempt to communicate with each other while using the online communication service.
  • this communication can be sent from a subscriber's computing system 100 , over the network 160 , and to the child's computing system 100 while using the interactive application module 200 .
  • the online communication service communicates with the certification center.
  • the interactive application server 162 can be configured as an online communication service and the certification server 166 can be configured as a certification center.
  • the online communication service and the certification center can communicate over a network 160 using sockets and/or various networking protocols.
  • the certification center finds the parental control limits for the child.
  • the authentication module 440 and/or the personal information database 460 can be configured to perform this process.
  • a check is performed to determine whether the subscriber satisfies the parental control limits for the child.
  • the certification center, online communication service, and/or the computing system 100 of the subscriber and/or child can be configured to perform this check.
  • the authentication module 440 can also be configured to access the control limits database 480 to perform this step.
  • step 850 online communication is enabled between the subscriber and the child, when the subscriber satisfies the parental control limits.
  • the interactive application server 162 , the computing system 100 of the subscriber and/or the child, and various modules can be configured to perform this step.
  • step 860 online communication is disabled between the subscriber and the child, when the subscriber does not satisfy the parental control limits.
  • the interactive application server 162 , the computing system 100 of the subscriber and/or the child, and various modules can be configured to perform this step.
  • FIG. 9 illustrates an example form page for allowing a parent to monitor online communications of a child, in accordance with some embodiments of the inventions.
  • the parent can monitor the communications of their child while using the interactive application module 200 .
  • the logged communications can be stored on the computing system 100 , the interactive application server 162 , and/or the certification server 166 .
  • the computing system 100 , network 160 , interactive application server 162 , certification server 166 , various databases, various components, parental control module 240 and/or other modules, and other systems described herein can be configured to execute a process to generate the form page in a programming language such as HTML and/or JavaScript, and/or respond to the form page when submitted using the OK button 960 , by using a programming language such as PHP.
  • this page can be generated using a programming language such as HTML when a subscriber and/or the parent of a subscriber, such as a child, sets up control limits and/or wishes to monitor communications between their child and other subscribers of the online communication service.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

Systems and methods are disclosed that provide for control of online communication services, including social networks and video games. In some embodiments, parents of children engaging in activities using online communication services can control who their child can engage in communications with, while using online communication services. In some embodiments, parents can monitor potentially problematic communications between their child and other subscribers of an online communication service. Thus, subscribers of online communication services can be prevented from misrepresenting themselves or concealing important information, including age and gender.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a Continuation application of U.S. application Ser. No. 12/013,375, filed Jan. 11, 2008, which incorporates by reference U.S. application Ser. No. 10/395,324, filed Mar. 20, 2003 and U.S. application Ser. No. 10/330,573 filed Dec. 26, 2002, the entire contents of both of which are incorporated herein by reference and should be considered a part of this specification.
  • BACKGROUND OF THE INVENTIONS
  • 1. Technical Field
  • This disclosure relates to the field of online communications. More specifically, this disclosure relates to computer-implemented methods and systems for blocking communications between users of a computer network.
  • 2. Description of the Related Art
  • Some online social networking and gaming providers (“online providers”) offer communication services to their subscribers. Using such a service, a subscriber can request to contact other subscribers and/or engage in other activities, including video gaming, with other subscribers.
  • A significant problem with offering communications services is that online providers are plagued by the problem of subscribers either misrepresenting themselves or concealing important information, including age and gender. Further, parents of children engaging in activities using these online providers are often unable to control who their child can communicate while using the services of online providers. These issues are especially problematic when parents are unable to monitor potentially problematic communications between their child and other subscribers.
  • SUMMARY OF THE DISCLOSURE
  • Systems and methods are disclosed that provide for certified parental control of online communication services, including social networks and video games. In some embodiments, parents of children engaging in activities using online communication services can control who their child can engage in communications with, while using online communication services. In some embodiments, parents can monitor communications between their child and other subscribers of an online communication service. Thus, subscribers of online communication services can be prevented from misrepresenting themselves or concealing important information, including age and gender.
  • In some embodiments, a system for providing certified parental control of online social networks and video games is provided. The system can include a database including at least one entry associated with a set of control limits for a child, the set of control limits corresponding to categories of persons the child may communicate with. The system can further include a certification server configured to communicate with an online communication server over a network to provide access to the database, the certification server including a server application that (a) registers and certifies a parent, (b) registers and certifies a child, and (c) receives and stores control limits in the database. The certification server can be configured to respond to a parental control request from the online communication server that matches an entry in the database associated with a child by checking whether a subscriber is within the categories of persons the child may communicate with. The online communication server can be configured to filter, enable, prevent, or disable a subscriber communication from the subscriber to the child depending on the response from the certification server.
  • In some embodiments, a system for providing certified parental control of an interactive application is provided. The system can include a database including at least one entry associated with a set of control limits for a child, the set of control limits corresponding to categories of persons the child may communicate with. The system can further include a certification server configured to communicate with a client over a network to provide access to the database, the certification server including a server application that (a) registers and certifies a parent, (b) registers and certifies a child, and (c) receives and stores control limits in the database. The certification server can be configured to respond to a parental control request from the client that matches an entry in the database associated with a child by checking whether a subscriber is within the categories of persons the child may communicate with. The client can be configured to filter, enable, prevent, or disable a subscriber communication from the subscriber to the child depending on the response from the certification server.
  • In some embodiments, a system for providing certified parental control of an online communication service is provided. The system can include a database including at least one entry associated with a set of control limits for a second person, the set of control limits corresponding to categories of persons the second person may communicate with. The system can further include a first server configured to communicate with a second server over a network to provide access to the database, the first server including a server application that (a) registers and certifies a first person, (b) registers and certifies a second person, and (c) receives and stores control limits in the database. The first server can be configured to respond to a parental control request from the second server that matches an entry in the database associated with a second person by checking whether a third person is within the categories of persons the second person may communicate with. The second server can be configured to enable, disable, prevent, or filter a third party communication from the third person to the second person depending on the response from the first server.
  • In some embodiments, a system for providing certified parental control of online communication services is provided. A client can be configured to communicate with a certification server. The client can also be configured to filter, enable or disable a subscriber communication from a subscriber to a child depending on the response from the certification server.
  • In some embodiments, a computer-implemented method of providing certified parental control for online social networks and video games is provided. The method can include registering and certifying a first person, registering and certifying a second person, and registering and certifying a third person. The method can further include receiving and storing in a database a set of control limits from the first person, the set of control limits associated with categories of persons the second person may communicate with. The method can further include receiving a third party communication over a network from a third person directed to the second person. The method can further include checking whether the third person is within the associated categories of persons the second person may communicate with. The method can further include, in response to the checking, filtering, enabling, or blocking the third party communication from the third person.
  • In some embodiments, a computer-implemented method of providing certified parental control of an interactive application is provided. The method can include receiving and storing in a database a set of control limits from a first person, the set of control limits associated with categories of persons a second person may communicate with. The method can further include receiving a communication to the second person from a third person. The method can further include in response to receiving the communication, automatically checking in the database whether the third person is not within the categories of persons the second person may communicate with. The checking can inhibit unauthorized communications to the second person from the third person.
  • In some embodiments, a computer-implemented method of providing certified parental control for online communication services is provided. The method can include receiving and storing in a database a set of control limits from a first person, the set of control limits associated with categories of persons a second person may communicate with. The method can further include receiving a communication to the second person from a third person. The method can further include, in response to receiving the communication, automatically checking in the database whether the third person is within the categories of persons the second person may communicate with. The checking can allow authorized communications to the second person from the third person.
  • In some embodiments, a computer-implemented method of providing certified parental control for online communication services is provided. The method can include receiving a third party communication over a network from a third person directed at a child. The method can further include checking whether the third person is within associated categories of persons the child may communicate with. The method can further include, in response to the checking, filtering, enabling, or blocking the third party communication from the third person.
  • Neither this summary nor the following detailed description purports to define or limit the inventions.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features will now be described with reference to the drawings summarized below. These drawings and the associated description are provided to illustrate a preferred embodiment of the invention, and not to limit the scope of the invention.
  • FIG. 1 illustrates a system configured to implement certified parental control for online communications, in accordance with some embodiments of the inventions.
  • FIG. 2 illustrates a system configured to implement certified parental control for online communications, and illustrates exemplary user components for accessing the system.
  • FIG. 3 illustrates a system configured to implement certified parental control for online communications, and illustrates exemplary interactive application server components.
  • FIG. 4 illustrates a system configured to implement certified parental control for online communications, and illustrates exemplary certification server components.
  • FIG. 5 is a flow chart illustrating embodiments of exemplary methods for providing certified parental control of online communication services, whereby a parent and child are registered and/or certified with a certification center.
  • FIG. 6 illustrates an example form page configured to allow a parent to configure communication control limits for a child, and/or enable or disable the logging of online communications.
  • FIG. 7 is a flow chart illustrating embodiments of exemplary methods for providing certified parental control of online communication services, whereby a subscriber is registered and/or certified with a certification center.
  • FIG. 8 illustrates a sequence of steps that can be performed when a child and another subscriber of an online communication service attempt to communicate with each other.
  • FIG. 9 illustrates an example form page for allowing a parent to monitor online communications of a child.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • Numerous technical details are set forth in this description. These details are provided to illustrate a embodiments of the inventions, and are not intended to limit the inventions. Thus, nothing in this detailed description is intended to imply that any particular feature, characteristic, or component of the disclosed system is essential to the inventions.
  • For purposes of illustration, some embodiments are described below in the context of parental controls of childrens' communications over the internet. The inventors contemplate that the systems and methods described herein can be used in other environments, such as, for example, communications between any parties whether over the internet, the World Wide Web, private networks (e.g., for hospitals), a broadcast network (e.g., government agency), an internal network (e.g., corporate enterprise), an intranet, a local area network, a wide area network, and so forth. Additionally, the applications described below through which the parties (whether they are children or adults) communicate can include multi-player games, Massively Multiplayer Games (MMOGs), on-line dating services, social networking sites, etc.
  • The figures and descriptions set forth below, however, relate to environments where children with each other communicate over the internet. It is also recognized that in other embodiments, the systems and methods can be implemented as a single module and/or implemented in conjunction with a variety of other modules and the like. Moreover, the specific implementations described herein are set forth in order to illustrate, and not to limit, the invention. The scope of the invention is defined by the appended claims.
  • I. Overview
  • Systems and methods are described below that can provide for certified parental control of online communication services, including social networks and video games. In some embodiments, parents of children engaging in activities using online communication services can control who their child can engage in communications with, while using online communication services. In some embodiments, parents can monitor communications between their child and other subscribers of an online communication service. Thus, subscribers of online communication services can be prevented from misrepresenting themselves or concealing important information, including age and gender.
  • In the following description, reference is made to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific embodiments or processes in which the invention can be practiced. Where possible, the same reference numbers are used throughout the drawings to refer to the same or like components. In some instances, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. The present disclosure, however, can be practiced without the specific details or with certain alternative equivalent components and methods to those described herein. In other instances, well-known components and methods have not been described in detail so as not to unnecessarily obscure aspects of the present disclosure.
  • II. Architecture
  • FIG. 1 illustrates a system that can be configured to implement certified parental control for online communications, in accordance with some embodiments. The term “communication” is meant to define a broad term including its ordinary meaning as well as a broad range of communications including text, voice, video, images, documents, and/or other communications.
  • In the illustrated embodiment, a plurality of computing systems 100 are in communication with a network 160, and the interactive application server 162 and/or the certification server 166 are also in communication with the network 160. The computing system 100, interactive application server 162, various modules, and/or various components can, in some embodiments, be configured as a client of the certification server 166. Communication over the network can take place using sockets, ports, and/or other mechanisms recognized in the art. As depicted in this drawing, one or more subscribers use a computing system 100 with access to the network 160 to access the interactive application server 162, and/or the certification server 166.
  • In some embodiments, the interactive application server 162 can comprise a server system (typically comprising multiple physical computers/machines) and associated content that are accessible via the network. The interactive application server 162 can be implemented using physical computer servers that are geographically remote from one another and/or can include content that spans multiple internet domains. As shown in the illustrated embodiment, the interactive application server 162 can be accessible by computing systems 100 via a network 160. In the illustrated embodiment, the interactive application server 162 is in communication with a network 160, the computing system 100, and/or the certification server 166.
  • In some embodiments, the certification server 166 can comprise a server system (typically comprising multiple physical computers/machines) and associated content that are accessible via the network. The interactive application server 162 can be implemented using physical computer servers that are geographically remote from one another and/or can include content that spans multiple internet domains. As shown in the illustrated embodiment, the certification server 166 can be accessible by computing systems 100 via a network 160. In the illustrated embodiment, the certification server 166 is in communication with a network 160, the computing system 100, and/or interactive application server 162. Generally, the interactive application server 162 and the certification server 166 described herein refer can be integrated with one another and/or sub-divided, despite their physical organization or storage.
  • The computing system 100 can be used to implement certain systems and methods described herein. For example, in some embodiments, the computing system 100 can be configured to receive a third party communication over a network from a third person directed at a child, check whether the third party is within associated categories of persons the child can communicate with, and respond by enabling or blocking the third party communication. The functionality provided for in the components and modules of the computing system 100 can be combined into fewer components and modules or further separated into additional components and modules.
  • The computing system 100 can include, for example, a personal computer that is IBM, Macintosh, or Linux/Unix compatible. In some embodiments, the computing device can comprise a server, a laptop computer, a cell phone, a personal digital assistant, a kiosk, or an audio player, for example. Additionally, the exemplary computing system can include a central processing unit (“CPU”), which can include a conventional microprocessor. The computing system 100 can further include a memory, such as random access memory (“RAM”) for temporary storage of information and a read only memory (“ROM”) for permanent storage of information, and a mass storage device, such as a hard drive, diskette, or optical media storage device. Typically, the modules of the computing system 100 are connected to the computer using a standards based bus system. In different embodiments, the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example.
  • The computing system 100 can generally be controlled and coordinated by operating system software, such as Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Vista, Linux, SunOS, Solaris, or other compatible operating systems. In Macintosh systems, the operating system can be any available operating system, such as MAC OS X. In other embodiments, the computing system 100 can be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, and I/O services, and provide a user interface, such as a graphical user interface (“GUI”), among other things.
  • The exemplary computing system 100 includes one or more commonly available input/output (I/O) devices and interfaces, such as a keyboard, mouse, touchpad, and printer. In some embodiments, the I/O devices and interfaces include one or more display device, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The computing system 100 can also include one or more multimedia devices, such as speakers, video cards, graphics accelerators, and microphones, for example.
  • In the embodiment of FIG. 1, the I/O devices and interfaces provide a communication interface to various external devices. In the embodiment of FIG. 1, the computing system 100 is coupled to a network 160, such as a LAN, WAN, or the Internet, for example, via a wired, wireless, or combination of wired and wireless, communication links. The network 160 communicates with various computing devices and/or other electronic devices via wired or wireless communication links.
  • In the exemplary embodiment of FIG. 1, the network 160 is coupled to an interactive application server 162, such as a social network server, video gaming sever, and/or other online communication service server. The interactive application server 162 can be coupled to an interactive communication log database 350. The network 160 is also connected to a certification server 166. The certification server 166 can be connected to a personal information database 460, which can include a private or government public information database, and a control limits database 480.
  • The interactive application server 162 can be configured to allow subscribers to engage in various communications with one another, contact one another, and/or engage in other interactive activities. The information supplied by the certification server 166 can include the personal information of subscribers of the interactive application server 162. This personal information can include a subscriber's name, social security number, passport number, driver's license number, various government issued identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, and/or other information. In some embodiments, the certification server 166 can be configured to communicate with the interactive application server 162 over the network 160 to enable or disable subscriber communications between subscribers using computing systems 100 based on personal information.
  • In addition to the devices that are illustrated in FIG. 1, the network 160 can communicate with other data sources, databases, and/or other computing devices. In addition, the data sources can include one or more internal and/or external data sources. In some embodiments, one or more of the data sources and/or databases can be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.
  • FIG. 2 illustrates a system that implements certified parental control for online communications, and illustrates typical user components for accessing the system, in accordance with some embodiments. In the embodiment of FIG. 2, the computing system 100 includes an interactive application module 200 that can be executed by the CPU.
  • In some embodiments, the interactive application module 200 can be a video game, such as an online multi-player gaming application, including Club Penguin®, World of Warcraft®, Second Life®, or other games. In some embodiments, the interactive application module 200 can be a commercially available email application, such as Mozilla Thunderbird and/or Microsoft Outlook. In some embodiments, the interactive application module 200 can be a web browser application, such as Mozilla Firefox, Apple Safari, and/or Microsoft Internet Explorer, which implement the basic World Wide Web standards such as HTTP and HTML.
  • In various embodiments the interactive application module 200 can deliver various media to the subscriber such as email services including Gmail, Yahoo Mail, and Hotmail. In various embodiments the interactive application module 200 can deliver various media to the subscriber including video, such as YouTube, and/or images, such as Snapfish and/or Flickr. In some embodiments, the interactive application module 200 can be a social networking web site, such as Friendster, Facebook, Match.com, JDate.com, and/or MySpace.
  • In some embodiments, the interactive application module 200 can be a collaborative real-time editor, such as ACE, CoWord, and/or EditGrid that allows several people to edit a computer file, such as a spreadsheet and/or text document, using different computers at the same time. In some embodiments, the interactive application module 200 can be a chat client such as AOL Instant Messenger and/or Google Talk. The interactive application module 200 can include, by way of example, components, such as software components, object-oriented software components, class components and/or task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and/or variables.
  • In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C or C++. A software module can be compiled and linked into an executable program, installed in a dynamic link library, or can be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules can be callable from other modules or from themselves, and/or can be invoked in response to detected events or interrupts. Software instructions can be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules can be comprised of connected logic units, such as gates and flip-flops, and/or can be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but can be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that can be combined with other modules or divided into sub-modules despite their physical organization or storage.
  • In the embodiments described herein, the computing system 100 is configured to execute the interactive application communication module 210, among others, in order to enable communication between the interactive application module 200 and the interactive application server 162. For example, in some embodiments, the interactive application module 200 can be a video game. When the interactive application module 200 needs to receive information, such as the next level of a video game from the interactive application server 162, the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to receive such information. Alternatively, when the interactive application module 200 needs to send information, such as player progress on the current level of a video game to the interactive application server 162, the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to send such information.
  • In some embodiments, the computing system 100 can be configured to execute the certification application module 220, among others, in order to register and/or certify a subscriber of the interactive application server 162. The certification application module 220 can be configured to allow a subscriber of the interactive application server 162 to provide personal information to register with the certification server 166. In an exemplary embodiment, the subscriber can be a parent and/or a child. In some embodiments, the subscriber can be certified when the personal information, such as age and/or gender can be verified to ensure its accuracy by the certification server 166.
  • As described above, the personal information can include a subscriber's name, social security number, driver's license number, passport number, various government identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, other photographs, videos, and/or other identity verification information. In some embodiments, the personal information provided to the interactive application server 162 by the certification application module 220 can be an identifier, such as a pin number and/or confirmation number associated with the subscriber. The identifier can be unique to a subscriber and/or associated with multiple subscribers.
  • In some embodiments, the identifier can be associated with an age group, gender, and/or other groups. In some embodiments, the identifier can be obtained when the subscriber confirms his identity with a notary, a certification center, and/or a certification server 166 by presenting a document such as a passport, birth certificate, social security card, driver's license, and/or other documents. In an exemplary embodiment, a parent and/or a child can confirm his identity with the certification server 166 using personal information.
  • In some embodiments, using the techniques described above, the certification application module 220 can be configured to verify that subscribers are certified. In an exemplary embodiment, the interactive application module 200 is configured to access the subscriber communication module 230 when a subscriber attempts to communicate with another subscriber, such as a child, of the interactive application server 162. The subscriber communication module 230 can then access the interactive application server 162, which in turn can access the certification server 166 to check whether the subscriber is within a set of associated categories of persons the child can communicate with. When the certification server 166 responds to the interactive application server 162, communications between the child and the subscriber can be enabled, filtered, and/or disabled by the interactive application server 162.
  • In some embodiments, filtering can include reducing, altering, and/or changing the content of communications between the subscriber and child. In other embodiments, a response can be sent back to the computing system 100 of the child and/or subscriber over the network 160 from the interactive application server 162, such that the computing system 100 enables or disables communications between the child and subscriber.
  • As illustrated in FIG. 2, the computing system can also include a parental control module 240. The parental control module 240 can be configured to allow a parent to set up and/or control who their child can communicate with while using the interactive application module 200. In various embodiments, the parental control module 240 can store control limits on the computing system 100 and/or can use the network 160 to access the interactive application server 162 and/or the certification server 166 to store control limits. In some embodiments, a parent can enter in various control limits on subscribers of the interactive application server 162 that their child can participate and/or engage in communications with. These control limits can include a minimum age, maximum age, gender, names, and/or other restrictions on subscribers that their child can communicate with. Additionally, in some embodiments, a parent can enter a limit that their child can only communicate with specific other people identified by a unique PIN, certification, password, or the like.
  • In some embodiments, the control limits can include limits on the level of subscriber memberships that their child can contact. It can be desirable to have three levels of subscribers—bronze, silver, and gold—with bronze being a subscriber who has confirmed the least amount of certification information such as identity, date of birth, gender, height and/or weight, a current photograph(s), and/or marital status. A silver subscriber can additionally require home ownership confirmation, income verification, and/or a credit report. A gold membership can additionally require the silver and gold information and, in addition, driving and criminal records, substance abuse testing, professional license association information, and/or other information. It should be noted that the level of subscribers are provided as an exemplary embodiment, and there can be as few as two or more than three.
  • Additionally, parental control limits can include dates and/or times when a child can engage in communications while using the interactive application module 200. In exemplary embodiments, when the subscriber, date, and/or time does not satisfy the parental control limits in place, communications using the interactive application module 200 are not permitted. Alternatively, if the control limits are satisfied, communications using the interactive application module 200 are permitted.
  • In some embodiments, the parental control module 240 can be configured to allow a parent to log communications made by their child while using the interactive application module 200. In some embodiments, the logged communications can be stored on the computing system 100, the interactive application server 162, and/or the certification server 166. Advantageously, the parental control module 240 can notify the parent of potential problems in the logged communications. In some embodiments, the parental control monitor 240 can search the logged communications, such as text, voice, video, images, documents, and/or other communications for profanity, sexual, and/or other content. This searching can be advantageous in determining whether a communication is suspicious and/or problematic. The parental control module 240 can also track the time and/or date of communications made while using the interactive application module 200, the length of communications, the identity of the subscriber that was communicated with, and can be configured to allow the printing, saving, emailing, viewing, and deletion of the communications.
  • The computing system 100 can also comprise a subscriber communication module 230. In some embodiments, the computing system 100 is configured to execute the subscriber communication module 230 when a subscriber wishes to communicate with another subscriber while using the interactive application module 200. For example, in some embodiments, the interactive application module 200 can be an online social network. When a subscriber, such as child, is contacted by another subscriber, and/or a child contacts another subscriber, the subscriber communication module 230 can be executed by the interactive application module 200.
  • The subscriber communication module 230 can then communicate over the network 160 with the interactive application server 162 and/or the certification server 166. In an exemplary embodiment, the certification server 166 is contacted and responds as to whether the subscriber satisfies the control limits configured by the parent. The subscriber communication module 230 can then inhibit, block, and/or enable communication between the subscriber and the child when they are using the interactive application module 200. In some embodiments, the subscriber communication module 230 can be configured to allow a level of communication between the child and subscriber that is in between completely enabling or disabling all communication. In an embodiment, the subscriber communication module 230 can selectively permit certain communications between the child and subscriber.
  • FIG. 3 illustrates a system that implements certified parental control for online communications, and illustrates typical interactive application server components, in accordance with some embodiments of the inventions. In the embodiments of FIG. 3, the interactive application server 162 includes an interactive application service module 300. In some embodiments, the interactive application service module 300, among others, can be configured to communicate with the interactive application module 200 on a computing system 100.
  • For example, in some embodiments, the interactive application module 200 can be a video game. When the interactive application module 200 needs to receive information, such as the next level of a video game from the interactive application server 162, the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to receive such information. When the interactive application server 162 is contacted, the interactive application service module 300 can be executed. The interactive application service module 300 can then send back to the interactive application communication module 210 the next level of the video game. The interactive application communication module 210 can then update the interactive application module 200 with the next level of the video game.
  • Alternatively, when the interactive application module 200 may need to send information, such as player progress on the current level of a video game to the interactive application server 162, the interactive application communication module 210 can use the network 160 to access the interactive application server 162 to send such information. When the interactive application server 162 is contacted, the interactive application service module 300 can then be executed and receive the updated information from the interactive application communication module 210.
  • As further illustrated in FIG. 3, the interactive application server 162 can include an interactive application network module 305. The interactive application network module 305 can be configured to enable communication between various subscribers of the interactive application sever 162 while using the interactive application module 200. In an exemplary embodiment, when a child uses the interactive application module 200 to communicate with another subscriber using the interactive application module 200, the interactive application server 162 is contacted, and the interactive application network module 305 is executed. The interactive application network module 305 can execute the subscriber authentication module 320, among others, to ensure that the parental control limits are satisfied. In some embodiments, the subscriber authentication module 320 can execute the interactive application network module 305.
  • The interactive application network module 305 can use various mechanisms to enable communication between subscribers. In some embodiments, the interactive application network module 305, among others, can use sockets, ports, and/or other mechanisms recognized in the art to enable communication among subscribers. The interactive application network module 305 can directly forward communications between subscribers to one another and/or perform processing on the communications using the various modules described herein.
  • The interactive application server 162 can also include a subscriber certification module 310. In some embodiments, the interactive application server 162 is configured to execute the subscriber certification module 310, among others, in response to a request over the network 160 from the certification application module 220 of a computing system 100 to register and/or certify a subscriber of the interactive application server 162. The subscriber certification module 310 can serve as an interface between a subscriber's computing system 100 and the certification server 166.
  • The interactive application server 162 can also include a subscriber authentication module 320. In some embodiments, the interactive application server 162 is configured to execute the subscriber authentication module 320, among others, in response to a request, such as a parental control request, over the network 160 from the subscriber communication module 230 of a computing system 100 to authenticate, validate, and/or verify that a subscriber of the interactive application server 162 is within a set of associated categories that another subscriber, such as a child, can communicate with. In an exemplary embodiment, the subscriber authentication module 320 is configured to access the certification server 166. When the certification server 166 responds to the subscriber authentication module 320, communications between the child and subscriber can be enabled, blocked, and/or inhibited. The subscriber certification module 310 can serve as an interface between a subscriber's computing system 100 and the certification server 166.
  • In some embodiments, the subscriber authentication module 320 can validate and/or verify that a subscriber is within a set of associated categories that another subscriber, such as a child can communicate with, without using the certification server 166. In some embodiments, the subscriber certification module 310 can use a cache, such as a database, to store the personal information of subscribers. This can be advantageous in avoiding communication with the certification server 166 to check whether a subscriber is certified. The cache can store personal information for subscribers that were recently certified by the certification server 166.
  • In the illustrated embodiments, the interactive application server 162 also includes a parent configuration module 330. In some embodiments, the parent configuration module 330 can be configured to communicate with the parental control module 240 on a computing system 100 and/or forward communications from the parental control module 240 to the certification server 166. In some embodiments, the forwarded communications can be control limits set by a parent for their child to limit the subscribers of the interactive application server 162 that their children can communicate with while using the interactive application module 200. Alternatively, the parent configuration module 300 can be configured similar to the parental control module 160 of the computing system 100.
  • As further depicted in FIG. 3, the interactive application server 162 includes a communication logging module 340. The communication logging module 340 can be configured to log communications between subscribers of the interactive application server 162 for later review by accessing an interactive application communication log database 350. In some embodiments, the communication logging module 340 can record some or all communications between subscribers by accessing the interactive application network module 305, which can permit subscribers of the interactive application server 162 to communicate with one another. In an exemplary embodiment, a parent of a child can use the parental control module 240 to enable or disable the logging of communications made by their child, while using the interactive application module 200.
  • As illustrated in FIG. 3, the interactive application server 162 can access the interactive application communication log database 350, which can be used to store the logged communications. In some embodiments, the interactive application communication log database 350 can track the time and/or date, subscribers involved in the communications, the length of the communications, and whether the communications are problematic. Communications can be determined to be problematic or suspicious by using filtering software known in the art. Alternatively, the logged communications can be stored on the computing system 100 and/or the certification server 166.
  • The interactive application server 162 can advantageously include a parental monitor module 360. In some embodiments, the parental monitor module 360 can be configured to access the interactive application communication log database 350. In an exemplary embodiment, a parent of a child can use the parental control module 240 to communicate with the parental monitor module 360. The parental monitor module 360 can access the interactive communication log database 350 of the interactive application server 162 and send back the logged communications of a child to the parental control module 240 of the computing system 100. In some embodiments, the parental monitor module 360 can search the logged communications and alert the parent by reporting suspicious and/or potentially problematic communications to the parental control module 240.
  • FIG. 4 illustrates a system that implements certified parental control for online communications, and illustrates typical certification server components, in accordance with some embodiments of the inventions. In some embodiments, the certification server 166 can include a service module 400 and/or a subscriber module 425.
  • In an exemplary embodiment, the service module 400 can comprise a service registration module 410. The service registration module 410 can be configured to handle the registration process of an interactive application server 162 with the certification server 166 and/or allow access for the interactive application server 162 to the certification server 166. In some embodiments, if an interactive application server 162 is not registered with certification server 166, the interactive application server 162 can not access the certification server 166. In some embodiments, an interactive application server 162 can be registered if its IP address and/or domain name is known to the certification server 166.
  • The service registration module 410, in some embodiments, can include a list of registered interactive application servers and can grant access to interactive application servers based on their appearance on such a list. In some embodiments, the list can include IP addresses and/or domain names of authorized interactive application servers. Based on such a list, the service registration module 410 can exclude unauthorized interactive application servers, such that access to the certification server 166 can be denied to unregistered interactive application servers.
  • As further depicted in FIG. 4, the service module 400 can include a service configuration module 420. In some embodiments, the service configuration module 420 can allow an interactive application server 162 to be configured such that it can access the certification server 166. In some embodiments, once the interactive application server 162 has been registered by the service registration module 410, the service configuration module 420 can be used to provide an application programming interface to the interactive application server 162 such that the certification server 166 can be accessed.
  • As illustrated in FIG. 4, the subscriber module 425 can include a certification module 430. In some embodiments, the certification server 166 can be configured to execute the certification module 430, among others, in response to a request from the subscriber certification module 310 of the interactive application server 162 to register and/or certify a subscriber of the interactive application server 162. In some embodiments, the certification module 430 can communicate directly with the certification application module 220 to register and/or certify a subscriber.
  • In some embodiments, upon receiving a request from the subscriber certification module 310 and/or the certification application module 220, the certification module 430 can access a personal information database 460. In some embodiments, when a subscriber registers and/or certifies with the certification server 166, the personal information database 460 can be updated. The personal information database 460 can include a subscriber identification 461, subscriber date of birth 462, and/or subscriber gender 463. In some embodiments, the subscriber identification 460, can be an alphanumeric identifier uniquely associated with a subscriber.
  • In some embodiments, the personal information database 460 can contain a record uniquely associated with a subscriber identification 461. Each record can contain information including the subscriber's date of birth 462, gender 463, name, social security number, passport number, driver's license number, various government issued identification, address, telephone number, photograph, mother's maiden name, and/or other information. This information can be entered into personal information database 460 when a subscriber is registered and/or certified with the certification server 166 and/or at other times.
  • As further depicted in FIG. 4, the subscriber module 425 can include a control limits module 450. The control limits module 450 can be configured to communicate with the parental control module 240 of the computing system 100 through the parent configuration module 330 of the interactive application server 162 and/or directly over the network 160. In an exemplary embodiment, the parent can enter, update, and delete various control limits on subscribers of the application server 162 that their child can participate and/or engage in communications with using the parental control module 240. The parental control module 240 can then be configured to communicate with the parent configuration module 330 of interactive application server 162. The control limits module 450 can be configured to respond to a request from the parent configuration module 330, to enter control limits.
  • In some embodiments, the control limits module 450 accesses a control limits database 480 to track communication control limits placed on subscribers of an interactive application server 162. In some embodiments, when a parent enters, updates, or deletes control limits placed on who their child can engage in communications with, the certification server 166 can be configured to execute the control limits module 450 and the control limits database 480 can be adjusted accordingly. The control limits database 480 can include a subscriber identification 481 corresponding to a subscriber, such as a child. In some embodiments, the subscriber identification 460, can be an alphanumeric identifier uniquely associated with a subscriber.
  • In an exemplary embodiment, the control limits database 480 can contain a record uniquely associated with a subscriber identification 481. As illustrated in FIG. 4, each record in the control limits database can include limitations such as a minimum age 482, maximum age 483, and/or gender 484 on subscribers that a child can communicate with. Additionally, in some embodiments, each record in the control limits database 480 can include other information placing limitations on who a subscriber can engage in communications with. These control limits can include days 485 and/or times 486 limiting when a child can engage in communications while using the interactive application module 200.
  • In some embodiments, the subscriber module 425 of the certification server 166 can also include an authentication module 440. In some embodiments, the certification server 166 is configured to execute the authentication module 440, among others, in response to a request, such as a parental control request, over the network 160 from the subscriber authentication module 320 of the interactive application server 166 to authenticate, validate, and/or verify that a subscriber of the interactive application server 162 is within a set of associated categories that another subscriber, such as a child, can communicate with.
  • In some embodiments, the subscriber communication module 230 and/or the subscriber authentication module 320 can send the subscriber identification of two subscribers to the authentication module 440 to verify that they can communicate with one another. In an exemplary embodiment, a first subscriber of the interactive application server 162 can attempt to communicate with a second subscriber, such as a child. To verify that the first subscriber is within the set of associated categories that the child can communicate with, the authentication module 440 can be configured to have access to the personal information database 460 and/or the control limits database 480.
  • In some embodiments, the authentication module can use a language such as SQL to retrieve the record associated with the subscriber identification 461 of the first subscriber in the personal information database 460. The authentication module 440 can likewise retrieve the record associated with the subscriber identification 481 of the child in the control limits database 481. The authentication module 440 can then be configured to check whether the first subscriber is within the set of associated categories that the parent of the child has allowed the child to communicate with. When the authentication module 440 of the certification server 166 responds, communications between the child and subscriber can be enabled, blocked, and/or inhibited. In other embodiments, the computing system 100 can communicate with the authentication module 440 of the certification server directly 166.
  • III. Operation
  • FIG. 5 is a flow chart illustrating embodiments of methods for providing certified parental control of online communication services consistent with the present inventions whereby a parent and child are registered and/or certified with a certification center. In some embodiments, the online communication service can include the interactive application module 200, the interactive application service module 300, and/or the interactive application network module 305. In some embodiments, the online communication service can include the interactive application server 162. In some embodiments, the computing system 100, network 160, interactive application server 162, certification server 166, various databases, various components, various modules, and other systems described herein can be configured to execute this process. In some embodiments, the certification application module 220, the subscriber certification module 310, and/or the certification module 430 can be configured to execute this process. In exemplary embodiments, this process can be executed when any subscriber, including a child and/or a parent, registers and/or certifies themselves with a certification center.
  • In step 510, a parent and child provide personal information to a certification center. In some embodiments, the parent and/or child provide personal information. In some embodiments, personal information can be provided to the certification center using a computing system 100. In some embodiments, the certification server 166 can be configured as a certification center. In some embodiments, the personal information can be sent over a network 160 to the certification center 166 and/or to an interactive application server 162.
  • As described herein, the personal information can include a subscriber's name, social security number, driver's license number, passport number, various government identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, and/or other identity verification information. In some embodiments, the personal information can be an identifier, such as a pin number and/or confirmation number associated with the subscriber.
  • In step 520, the certification center checks the accuracy of the personal information provided by the parent and child. In some embodiments, the certification center can run personal information, including identification numbers and/or other information, such as bar codes, associated with government issued documents through a computer system, private and/or public database, and/or perform a visual inspection on the personal information provided to ensure it is valid, authentic, and/or to confirm the identification of the parent and child. The government issued documents can be, in some embodiments, a passport, birth certificate, social security card, driver's license, and/or other documents. In some embodiments, the certification server can notarize a form issued by an online communication service, such as the interactive application server 162, which confirms the identity of the subscriber, including the parent and child, upon viewing valid identification.
  • In step 530, the certification center certifies the parent and child. In some embodiments, the subscriber can be certified when personal information, such as identity, age, and/or gender can be verified to ensure its accuracy by the certification server 166. In some embodiments, the certification center can assign an identifier that can be unique to a subscriber and/or associated with multiple subscribers to the parent and/or child when they are certified. In some embodiments, the identifier can be associated with an age group, gender, and/or other groups. In other embodiments, the certification center can notarize various documents to be presented to an online communication service provider.
  • In step 540, the parent enters various control limits on subscribers of online communication services that their child can engage in communications with. These control limits can include a minimum age, maximum age, gender, names, and other restrictions on subscribers that their child can communicate with. In some embodiments, the control limits can include limits on the level of subscriber memberships that their child can communicate with. It can be desirable to have three levels of subscribers—bronze, silver, and gold—with bronze being a subscriber who has confirmed the least amount of certification information such as identity, date of birth, gender, height and/or weight, a current photograph(s), and/or marital status. A silver subscriber can additionally require home ownership confirmation, income verification, and/or a credit report. A gold membership can additionally require the silver and gold information and, in addition, driving and criminal records, substance abuse testing, professional license association information, and/or other information. It should be noted that the level of subscribers are provided as an exemplary embodiment, and there can be as few as two or more than three.
  • Additionally, these control limits can include day and/or time limits when a child can engage in communications while using an online communication service. In exemplary embodiments, when a subscriber's personal information, the day, and/or the time does not satisfy the parental control limits in place, communications using the online communication service are not permitted. Alternatively, if the control limits are satisfied, communications using the online communication service are permitted. In some embodiments, the parental control module 240, parental monitor module 360, authentication module 440, control limits module 450, personal information database 460, and/or control limits database 480 can be configured to execute these steps.
  • FIG. 6 illustrates an example form page for allowing a parent to configure communication control limits for a child, and/or enable or disable the logging of online communications, in accordance with some embodiments of the inventions. In some embodiments, the computing system 100, network 160, interactive application server 162, certification server 166, various databases, various components, various modules, and other systems described herein can be configured to execute a process to generate the form page in a programming language such as HTML and/or JavaScript, and/or respond to the form page when saved 680 by using a programming language such as PHP. In exemplary embodiments, this page can be generated using a programming language such as HTML when a subscriber and/or the parent of a subscriber, such as a child, sets up control limits, and/or wishes to monitor and/or log communications between their child and other subscribers of the online communication service.
  • Advantageously, the form page can allow the parent of a child subscribing to the online communication service to enter a minimum age 610 and/or maximum age 620 of other subscribers of the online communication service that their child can engage in communications with. In some embodiments, the parent can also limit the gender 630 of other subscribers that their child can communicate with while using the online communication service. The form page can also allow a parent to place control limits on the level of subscriber memberships 640 of the online communication service that their child can contact. It can be desirable to have three levels of subscribers—bronze, silver, and gold—with bronze being a subscriber who has confirmed the least amount of certification information such as identity, date of birth, gender, height and/or weight, a current photograph(s), and/or marital status. A silver subscriber can additionally require home ownership confirmation, income verification, and/or a credit report. A gold membership can additionally require the silver and gold information and, in addition, driving and criminal records, substance abuse testing, professional license association information, and/or other information. It should be noted that the level of subscribers are provided as an exemplary embodiment, and there can be as few as two or more than three.
  • The form page can also include times 650 and/or days 660 when their child can be blocked from engaging in communications while using the online communication service provider.
  • In some embodiments, the form page can allow a parent to log communications 670 made by their child while using the online communication service. The parental control module 240 can be configured to handle online communication logging. In some embodiments, the logged communications can be stored on the computing system 100, the interactive application server 162, various databases including the interactive application communication log database 350, and/or the certification server 166. Advantageously, the parent can also configure the number of days to store the communication logs 670. In some embodiments, the parental control module 240, communication logging module 340, parental monitor module 360, and interactive application communication log database 350 can be configured to implement a process that generates the form page and/or responds to the form page by using a programming language, such as PHP, when the form is saved and/or cancelled 680.
  • FIG. 7 is a flow chart illustrating embodiments of methods for providing certified parental control of online communication services consistent with the present inventions, whereby a subscriber is registered and/or certified with a certification center. In some embodiments, the online communication service can include the interactive application module 200, the interactive application service module 300, and/or the interactive application network module 305. In some embodiments, the online communication service can include the interactive application server 162. In some embodiments, the computing system 100, network 160, interactive application server 162, certification server 166, various databases, various components, various modules, and other systems described herein can be configured to execute this process. In some embodiments, the certification application module 220, the subscriber certification module 310, the certification module 430, and/or the personal information database 460 can be configured to execute this process.
  • In step 710, the subscriber provides personal information to a certification center. In some embodiments, the subscriber can provide personal information to a certification center by using a computing system 100. In some embodiments, the certification server 166 can be configured as a certification center. In some embodiments, the personal information can be sent over a network 160 to the certification center 166 and/or to an interactive application server 162.
  • The personal information can include a subscriber's name, social security number, driver's license number, passport number, various government identification, address, date of birth, gender, telephone number, photograph, mother's maiden name, and/or other identity verification information. In some embodiments, the personal information can be an identifier, such as a pin number and/or confirmation number associated with the subscriber.
  • In step 720, the certification center checks the accuracy of the personal information provided by the subscriber. In some embodiments, the certification center can run identification numbers and/or other information, such as bar codes, associated with government issued documents through a computer system, private and/or public database, and/or perform a visual inspection on the personal information provided to ensure that the personal information is valid, authentic, and/or to confirm the identification of the parent and child. The government issued documents can be, in some embodiments, a passport, birth certificate, social security card, driver's license, and/or other documents. In some embodiments, the certification server 166 can notarize a form issued by an online communication service, such as the interactive application server 162, which confirms the identity of the subscriber.
  • In step 730, the certification center certifies the subscriber. In some embodiments, the subscriber can be certified when personal information, such as identity, age, and/or gender can be verified to ensure its accuracy by the certification server 166. In some embodiments, the certification center can assign an identifier that can be unique to a subscriber and/or associated with multiple subscribers when they are certified. In some embodiments, the identifier can be associated with an age group, gender, and/or other groups. In other embodiments, the certification center can notarize various documents to be presented to an online communication service provider.
  • FIG. 8 illustrates a sequence of steps that can be performed when a child and another subscriber of an online communication service attempt to communicate with each other, in accordance with some embodiments of the inventions. In some embodiments, the online communication service can include the interactive application module 200, the interactive application service module 300, and/or the interactive application network module 305. In some embodiments, the online communication service can include the interactive application server 162. In some embodiments, the computing system 100, network 160, interactive application server 162, certification server 166, various databases, various components, various modules, and other systems described herein can be configured to execute this process. In exemplary embodiments, this process can be executed when any subscriber, including a child and/or a parent, attempts to communicate with another subscriber.
  • In step 810, a child and/or subscriber attempt to communicate with each other while using the online communication service. In some embodiments, this communication can be sent from a subscriber's computing system 100, over the network 160, and to the child's computing system 100 while using the interactive application module 200.
  • In step 820, the online communication service communicates with the certification center. In some embodiments, the interactive application server 162 can be configured as an online communication service and the certification server 166 can be configured as a certification center. The online communication service and the certification center can communicate over a network 160 using sockets and/or various networking protocols.
  • In step 830, the certification center finds the parental control limits for the child. The authentication module 440 and/or the personal information database 460 can be configured to perform this process. In step 840, a check is performed to determine whether the subscriber satisfies the parental control limits for the child. In some embodiments, the certification center, online communication service, and/or the computing system 100 of the subscriber and/or child can be configured to perform this check. In an exemplary embodiment, the authentication module 440 can also be configured to access the control limits database 480 to perform this step.
  • In step 850, online communication is enabled between the subscriber and the child, when the subscriber satisfies the parental control limits. The interactive application server 162, the computing system 100 of the subscriber and/or the child, and various modules can be configured to perform this step. In step 860, online communication is disabled between the subscriber and the child, when the subscriber does not satisfy the parental control limits. The interactive application server 162, the computing system 100 of the subscriber and/or the child, and various modules can be configured to perform this step.
  • FIG. 9 illustrates an example form page for allowing a parent to monitor online communications of a child, in accordance with some embodiments of the inventions. In some embodiments, the parent can monitor the communications of their child while using the interactive application module 200. In some embodiments, the logged communications can be stored on the computing system 100, the interactive application server 162, and/or the certification server 166. In some embodiments, the computing system 100, network 160, interactive application server 162, certification server 166, various databases, various components, parental control module 240 and/or other modules, and other systems described herein can be configured to execute a process to generate the form page in a programming language such as HTML and/or JavaScript, and/or respond to the form page when submitted using the OK button 960, by using a programming language such as PHP. In exemplary embodiments, this page can be generated using a programming language such as HTML when a subscriber and/or the parent of a subscriber, such as a child, sets up control limits and/or wishes to monitor communications between their child and other subscribers of the online communication service.
  • Advantageously, the form page can allow the parent of a child subscribing to the online communication service to track the time and/or date 910 of communications made by their child while using the online communication service. In some embodiments, the parent can also determine the length 920 of communications their child had with another subscriber. In some embodiments, the parent can determine who 930 their child has communicated with while using the online communication service, which can be the name of the subscriber, subscriber identification, and/or other identification. The form page can also allow a parent to determine the status 940 of logged communications, so they can be notified of potential problems in the logged communications. In some embodiments, the logged communications, including text, voice, video, images, documents, and/or other communications can be searched for profanity, sexual content, and using other criteria to determine whether they are suspicious. The form page can also allow the parent to save, print, save, e-mail, view, and delete 950 the various logged communications of their child.
  • IV. Conclusion
  • All of the methods and processes described above can be embodied in, and fully automated via, software code modules executed by one or more general purpose computers. The code modules can be stored in any type of computer-readable medium or other computer storage device. Some or all of the methods can alternatively be embodied in specialized computer hardware.
  • Although this invention has been described in terms of certain embodiments and applications, other embodiments and applications that are apparent to those of ordinary skill in the art, including embodiments which do not provide all of the features and advantages set forth herein, are also within the scope of this invention. Accordingly, the scope of the present invention is intended to be defined only by reference to the following claims.

Claims (5)

1-26. (canceled)
27. A computer-implemented method of providing certified parental control for online communication services, the method comprising:
receiving and storing in a database a set of control limits from a first person, said set of control limits associated with categories of persons a second person may communicate with;
receiving a communication to said second person from a third person; and
in response to receiving said communication, automatically checking in said database whether said third person is within the categories of persons said second person may communicate with; and
wherein the checking allows authorized communications to the second person from the third person.
28. The method of claim 27, wherein said first person comprises a parent.
29. The method of claim 27, wherein said second person comprises a child.
30. A computer-implemented method of providing certified parental control for online communication services, the method comprising:
receiving a third party communication over a network from a third person directed at a child;
checking whether said third person is within associated categories of persons said child may communicate with; and
in response to said checking, filtering, enabling, or blocking said third party communication from said third person.
US14/578,176 2002-12-26 2014-12-19 Systems and methods for identity-based communication gate for social networks Abandoned US20150207801A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/578,176 US20150207801A1 (en) 2002-12-26 2014-12-19 Systems and methods for identity-based communication gate for social networks

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US10/330,573 US20040128148A1 (en) 2002-12-26 2002-12-26 Secure online dating support system and method
US10/395,324 US7246067B2 (en) 2002-12-26 2003-03-20 Secure online dating support system and method
US12/013,375 US8918840B2 (en) 2002-12-26 2008-01-11 Systems and methods for identity-based communication gate for social networks
US14/578,176 US20150207801A1 (en) 2002-12-26 2014-12-19 Systems and methods for identity-based communication gate for social networks

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/013,375 Continuation US8918840B2 (en) 2002-12-26 2008-01-11 Systems and methods for identity-based communication gate for social networks

Publications (1)

Publication Number Publication Date
US20150207801A1 true US20150207801A1 (en) 2015-07-23

Family

ID=40851865

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/013,375 Expired - Fee Related US8918840B2 (en) 2002-12-26 2008-01-11 Systems and methods for identity-based communication gate for social networks
US14/578,176 Abandoned US20150207801A1 (en) 2002-12-26 2014-12-19 Systems and methods for identity-based communication gate for social networks

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/013,375 Expired - Fee Related US8918840B2 (en) 2002-12-26 2008-01-11 Systems and methods for identity-based communication gate for social networks

Country Status (1)

Country Link
US (2) US8918840B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020130545A (en) * 2019-02-19 2020-08-31 株式会社カプコン Game program and game apparatus
JP7561393B2 (en) 2017-07-31 2024-10-04 グリー株式会社 Application usage management system, application usage management method, application usage management program, program and information processing method

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8380176B2 (en) 2008-08-08 2013-02-19 Websafery, Inc. Method of inhibiting functions of a mobile communications device
US20110209192A1 (en) * 2010-02-25 2011-08-25 Leclerc Greer Katelyn M Biometric social networking
US8966590B2 (en) * 2010-08-17 2015-02-24 Facebook, Inc. Managing social network accessibility based on age
US9215264B1 (en) * 2010-08-20 2015-12-15 Symantec Corporation Techniques for monitoring secure cloud based content
US20120123778A1 (en) * 2010-11-11 2012-05-17 At&T Intellectual Property I, L.P. Security Control for SMS and MMS Support Using Unified Messaging System
US9220977B1 (en) 2011-06-30 2015-12-29 Zynga Inc. Friend recommendation system
CN103294965B (en) 2012-02-16 2016-06-15 克利特股份有限公司 Parent-child guidance support for social networks
US9547862B2 (en) * 2012-08-01 2017-01-17 Paypal, Inc. Electronic payment restriction
US9485206B2 (en) 2013-12-19 2016-11-01 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying
CN104063655B (en) * 2014-05-30 2019-08-06 小米科技有限责任公司 A kind of method and apparatus handling child mode
CN104035999B (en) * 2014-06-13 2018-01-05 南京理工大学 Recommend the secure web browsing system of management and control based on Charateristicsization
WO2016210327A1 (en) 2015-06-25 2016-12-29 Websafety, Inc. Management and control of mobile computing device using local and remote software agents
US9901818B1 (en) 2016-02-19 2018-02-27 Aftershock Services, Inc. Systems and methods for regulating access to game content of an online game
US10134227B1 (en) * 2016-02-19 2018-11-20 Electronic Arts Inc. Systems and methods for making game content from a single online game accessible to users via multiple platforms
US10035068B1 (en) 2016-02-19 2018-07-31 Electronic Arts Inc. Systems and methods for making progress of a user character obtained in an online game via a non-virtual reality interface available in a virtual reality interface
US10576379B1 (en) 2016-02-19 2020-03-03 Electronic Arts Inc. Systems and methods for adjusting online game content and access for multiple platforms
US9919218B1 (en) 2016-02-19 2018-03-20 Aftershock Services, Inc. Systems and methods for providing virtual reality content in an online game
US10061916B1 (en) * 2016-11-09 2018-08-28 Symantec Corporation Systems and methods for measuring peer influence on a child
CN109495464B (en) * 2018-11-05 2021-05-28 创新先进技术有限公司 Method, device, equipment and system for tracking application access

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020049806A1 (en) * 2000-05-16 2002-04-25 Scott Gatz Parental control system for use in connection with account-based internet access server
US20020147782A1 (en) * 2001-03-30 2002-10-10 Koninklijke Philips Electronics N.V. System for parental control in video programs based on multimedia content information
US20030103627A1 (en) * 2001-12-03 2003-06-05 Nierzwick Mark Alan Method and apparatus for providing parental control
US20030115592A1 (en) * 2001-12-19 2003-06-19 Johnson Carolynn Rae Method and apparatus for selecting rating limits in a parental control system
US20030172377A1 (en) * 2002-03-05 2003-09-11 Johnson Carolynn Rae Method and apparatus for selectively accessing programs in a parental control system
US20040051733A1 (en) * 2000-12-28 2004-03-18 David Katzir Method and system for parental internet control
US6745367B1 (en) * 1999-09-27 2004-06-01 International Business Machines Corporation Method and computer program product for implementing parental supervision for internet browsing
US20050022234A1 (en) * 2002-01-29 2005-01-27 Strothman James Alan Method and apparatus for personalizing rating limits in a parental control system
US20050081043A1 (en) * 2003-10-10 2005-04-14 Evans C. Shane Parental controls for entertainment content
US20050198319A1 (en) * 2004-01-15 2005-09-08 Yahoo! Inc. Techniques for parental control of internet access including a guest mode
US20060130119A1 (en) * 2004-12-15 2006-06-15 Candelore Brant L Advanced parental control for digital content
US20060161668A1 (en) * 2002-06-28 2006-07-20 Microsoft Corporation Parental controls customization and notification
US20060287080A1 (en) * 2005-06-20 2006-12-21 M-Systems Flash Disk Pioneers, Ltd. System for game console parental control
US20060293057A1 (en) * 2005-06-24 2006-12-28 Mazerski Thomas M System and method for secure web-based mobile phone parental controls
US20070150918A1 (en) * 2005-12-22 2007-06-28 Sony Ericsson Mobile Communications Ab Methods, devices, and computer program products for providing parental control over access to media content using a mobile terminal
US20070297604A1 (en) * 2006-06-21 2007-12-27 Sony Ericsson Mobile Communications Ab System and method of parental control over multimedia
US20080148310A1 (en) * 2006-12-14 2008-06-19 Verizon Services Corp. Parental controls in a media network
US20090037382A1 (en) * 2006-12-29 2009-02-05 Prodea Systems, Inc. System and Method to Manage and Distribute Media Using a Predictive Media Cache
US8762229B1 (en) * 2007-12-18 2014-06-24 Symantec Corporation Parental policy based online wish lists

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8046800B2 (en) * 1993-03-29 2011-10-25 Microsoft Corporation Remotely controlling a video recorder
US6658400B2 (en) 1999-12-04 2003-12-02 William S. Perell Data certification and verification system having a multiple-user-controlled data interface
US6665389B1 (en) 1999-12-09 2003-12-16 Haste, Iii Thomas E. Anonymous interactive internet-based dating service
US20010026609A1 (en) 1999-12-30 2001-10-04 Lee Weinstein Method and apparatus facilitating the placing, receiving, and billing of telephone calls
US20020116458A1 (en) 2000-12-14 2002-08-22 Jonathan Bricklin Web-based dating service
US20020162031A1 (en) * 2001-03-08 2002-10-31 Shmuel Levin Method and apparatus for automatic control of access
US20060036701A1 (en) * 2001-11-20 2006-02-16 Bulfer Andrew F Messaging system having message filtering and access control
US7035628B2 (en) * 2001-12-31 2006-04-25 Xm Satellite Radio, Inc. Method and apparatus for content blocking
US20030171927A1 (en) 2002-03-05 2003-09-11 Bernard John V. Method and system for verifying or certifying traits of candidates seeking employment
US20040097287A1 (en) 2002-11-14 2004-05-20 Richard Postrel Method and system for gaming over a computer network
US7246067B2 (en) 2002-12-26 2007-07-17 Better Dating Bureau, Inc. Secure online dating support system and method
US7406715B2 (en) * 2003-03-19 2008-07-29 Intel Corp. Controlling and remotely monitoring accessed network data
US20050266925A1 (en) * 2004-05-25 2005-12-01 Ongame E-Solutions Ab System and method for an online duel game
WO2008046043A2 (en) * 2006-10-12 2008-04-17 Umagination Labs, L.P. Systems and methods for communicating personal information
US20090055193A1 (en) * 2007-02-22 2009-02-26 Pudding Holdings Israel Ltd. Method, apparatus and computer code for selectively providing access to a service in accordance with spoken content received from a user

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6745367B1 (en) * 1999-09-27 2004-06-01 International Business Machines Corporation Method and computer program product for implementing parental supervision for internet browsing
US20020049806A1 (en) * 2000-05-16 2002-04-25 Scott Gatz Parental control system for use in connection with account-based internet access server
US20040051733A1 (en) * 2000-12-28 2004-03-18 David Katzir Method and system for parental internet control
US20020147782A1 (en) * 2001-03-30 2002-10-10 Koninklijke Philips Electronics N.V. System for parental control in video programs based on multimedia content information
US20030103627A1 (en) * 2001-12-03 2003-06-05 Nierzwick Mark Alan Method and apparatus for providing parental control
US20030115592A1 (en) * 2001-12-19 2003-06-19 Johnson Carolynn Rae Method and apparatus for selecting rating limits in a parental control system
US20050022234A1 (en) * 2002-01-29 2005-01-27 Strothman James Alan Method and apparatus for personalizing rating limits in a parental control system
US20030172377A1 (en) * 2002-03-05 2003-09-11 Johnson Carolynn Rae Method and apparatus for selectively accessing programs in a parental control system
US20060161668A1 (en) * 2002-06-28 2006-07-20 Microsoft Corporation Parental controls customization and notification
US20050081043A1 (en) * 2003-10-10 2005-04-14 Evans C. Shane Parental controls for entertainment content
US20050198319A1 (en) * 2004-01-15 2005-09-08 Yahoo! Inc. Techniques for parental control of internet access including a guest mode
US20060130119A1 (en) * 2004-12-15 2006-06-15 Candelore Brant L Advanced parental control for digital content
US20060287080A1 (en) * 2005-06-20 2006-12-21 M-Systems Flash Disk Pioneers, Ltd. System for game console parental control
US20060293057A1 (en) * 2005-06-24 2006-12-28 Mazerski Thomas M System and method for secure web-based mobile phone parental controls
US20070150918A1 (en) * 2005-12-22 2007-06-28 Sony Ericsson Mobile Communications Ab Methods, devices, and computer program products for providing parental control over access to media content using a mobile terminal
US20070297604A1 (en) * 2006-06-21 2007-12-27 Sony Ericsson Mobile Communications Ab System and method of parental control over multimedia
US20080148310A1 (en) * 2006-12-14 2008-06-19 Verizon Services Corp. Parental controls in a media network
US20090037382A1 (en) * 2006-12-29 2009-02-05 Prodea Systems, Inc. System and Method to Manage and Distribute Media Using a Predictive Media Cache
US8762229B1 (en) * 2007-12-18 2014-06-24 Symantec Corporation Parental policy based online wish lists

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7561393B2 (en) 2017-07-31 2024-10-04 グリー株式会社 Application usage management system, application usage management method, application usage management program, program and information processing method
JP2020130545A (en) * 2019-02-19 2020-08-31 株式会社カプコン Game program and game apparatus

Also Published As

Publication number Publication date
US20090183226A1 (en) 2009-07-16
US8918840B2 (en) 2014-12-23

Similar Documents

Publication Publication Date Title
US8918840B2 (en) Systems and methods for identity-based communication gate for social networks
US11165782B1 (en) Systems, methods, and software applications for providing an identity and age-appropriate verification registry
US11637802B2 (en) Private data sharing system
US11750617B2 (en) Identity authentication and information exchange system and method
TWI717728B (en) Identity verification and login method, device and computer equipment
US8312097B1 (en) Segmenting access to electronic message boards
US6957229B1 (en) System and method for managing personal information
US8250097B2 (en) Online identity management and identity verification
US20060173793A1 (en) System and method for verifying the age and identity of individuals and limiting their access to appropriate material and situations
US6845448B1 (en) Online repository for personal information
US8266443B2 (en) Systems and methods for secure and authentic electronic collaboration
US20080033740A1 (en) On-line anonymous age verification for controlling access to selected websites
US20080033941A1 (en) Verfied network identity with authenticated biographical information
US20090320101A1 (en) System and method for authenticating users in a social network
US20020184496A1 (en) Methods and arrangements for selectively maintaining parental access consent in a network environment
US20070143475A1 (en) Identification services
JP2012190484A (en) System and method for processing tokenless biometric electronic transmission using electronic rule module clearinghouse
Coffin Two-factor authentication
Crespo Invitation-based authorisation in federated systems

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION