US20200195691A1 - Web filtering system and method - Google Patents

Web filtering system and method Download PDF

Info

Publication number
US20200195691A1
US20200195691A1 US16/799,726 US202016799726A US2020195691A1 US 20200195691 A1 US20200195691 A1 US 20200195691A1 US 202016799726 A US202016799726 A US 202016799726A US 2020195691 A1 US2020195691 A1 US 2020195691A1
Authority
US
United States
Prior art keywords
web
computing device
minor user
parental
access policies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/799,726
Inventor
Vinay Mahadik
Due Nguyen
Paul Katcher
Nikita Chikate
Amar Patekar
Bharath Madhusudan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Securly Inc
Original Assignee
Securly Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Securly Inc filed Critical Securly Inc
Priority to US16/799,726 priority Critical patent/US20200195691A1/en
Publication of US20200195691A1 publication Critical patent/US20200195691A1/en
Assigned to Securly, Inc. reassignment Securly, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHIKATE, NIKITA, KATCHER, PAUL, MADHUSUDAN, BHARATH, MAHADIK, Vinay, NGUYEN, DUE, PATEKAR, AMAR
Assigned to MONROE CAPITAL MANAGEMENT ADVISORS, LLC reassignment MONROE CAPITAL MANAGEMENT ADVISORS, LLC PATENT SECURITY AGREEMENT Assignors: Securly, Inc.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/69Types of network addresses using geographic information, e.g. room number
    • H04L61/609

Definitions

  • Institutions e.g., schools, can issue computing devices to minor users, e.g., children attending the school.
  • An institution can employ web filtering to limit the web accesses that can be undertaken using the issued computing devices.
  • a school can use web filtering to block social networking sites from being accessed using the computing devices issued to the children attending the school.
  • a child attending a school can take a computing device issued by their school home or to a friend's house and still be subject to the social networking ban by the school.
  • the invention relates to a web filtering mechanism.
  • the web filtering mechanism can include: an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; and a web filter for filtering a web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies.
  • the invention in general, in another aspect, relates to a method for web filtering.
  • the method can include: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; and filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies.
  • the invention in general, in yet another aspect, relates to a web filtering mechanism.
  • the web filtering mechanism can include: a web filter for filtering a web content accessed by a minor user via a computing device issued to the minor user by an institution; and a reporting mechanism for reporting to a parent of the minor user a set of web accesses undertaken by the minor user via the computing device.
  • the invention in general, in still another aspect, relates to a method for web filtering.
  • the method can include: filtering a web content accessed by a minor user via a computing device issued to the minor user by an institution; and reporting to a parent of the minor user a set of web accesses undertaken by the minor user via the computing device.
  • FIG. 1 shows a web filtering mechanism with integrated parental management in one or more embodiments.
  • FIG. 2 illustrates a parental policy dashboard in one or more embodiments.
  • FIG. 3 shows a web filtering mechanism establishing a trust relationship with a parent before allowing the parent to control the web content for a minor user.
  • FIG. 4 shows one or more embodiments of a web filtering mechanism that includes a location module.
  • FIG. 5 shows how a web filtering mechanism determines which set of web access policies, the institutional policies or the parental policies, are to be applied to a computing device in one or more embodiments.
  • FIG. 6 shows one or more embodiments of a web filtering mechanism with integrated parental reporting.
  • FIG. 7 illustrates an activity log in one or more embodiments.
  • FIG. 8 shows an activity analyzer in a reporting mechanism in one or more embodiments.
  • FIG. 9 shows an urgency module in a reporting mechanism in one or more embodiments.
  • FIG. 10 illustrates a method for web filtering integrated with parental management in one or more embodiments.
  • FIG. 11 illustrates a method for web filtering integrated with parental reporting in one or more embodiments.
  • FIG. 12 illustrates a computing system upon which portions of a web filtering mechanism or clients thereof can be implemented.
  • FIG. 1 shows a web filtering mechanism 100 in one or more embodiments.
  • the web filtering mechanism 100 filters web communication for a computing device 120 issued to a minor user 110 by an institution.
  • the institution that issues the computing device 120 to the minor user 110 to can be a school and the minor user 110 can be a child attending the school.
  • the web filtering mechanism 100 can perform any kind of web filtering, e.g., DNS filtering, search filtering, keyword filtering, etc.
  • the web filtering mechanism 100 includes an institutional policy dashboard 152 that enables the institution that issued the computing device 120 to the minor user 110 to select a set of institutional web access policies 162 .
  • the institutional web access policies 162 are web access policies sanctioned by the institution that issued the computing device 120 to the minor user 110 .
  • the web filtering mechanism 100 includes a parental policy dashboard 150 that enables a parent 112 of the minor user 110 to select to a set of parental web access policies 160 .
  • the parental web access policies 160 are web access policies sanctioned by the parent 112 .
  • the web filtering mechanism 100 includes a web filter 170 for filtering a web content accessed by the minor user 110 via the computing device 120 by enforcing the parental web access policies 160 and the institutional web access policies 162 .
  • the web filter 170 enforces the parental web access policies 160 over the institutional web access policies 162 if the parental web access policies 160 and the institutional web access policies 162 conflict.
  • the institutional policy dashboard 152 can be accessed by an institution admin 114 of the institution that issued the computing device 120 to the minor user 110 .
  • the institutional web access policies 162 can apply to groups that can encompass the minor user 110 , e.g. a student grade level that encompasses the minor user 110 .
  • the parental web access policies 160 apply only to the minor user 110 .
  • the institution admin 114 can access the institutional policy dashboard 152 via a network 140 using a client 132 , e.g., a computer or mobile device running a web browser that accesses the web filtering mechanism 100 using web protocols.
  • the parent 112 can access the parental policy dashboard 150 via the network 140 using a client 130 , e.g., a computer or mobile device running a web browser.
  • the web filtering mechanism 100 holds the parental policy dashboard 150 in the same cloud site as the institutional policy dashboard 152 .
  • the parent 112 can use the client 130 to access the parental policy dashboard 150 and modify the policies sanctioned by the institutional that issued the computing device 120 to the minor user 110 without having to install any specialized software on the client 130 of the parent 112 .
  • FIG. 2 illustrates the parental policy dashboard 150 in one or more embodiments.
  • the parental policy dashboard 150 includes a set of content categories 210 .
  • the content categories 210 include social networking, gaming, and adult.
  • the parental policy dashboard 150 lists the institutional web access policies 162 selected by the institution admin 114 via the institutional policy dashboard 152 .
  • the institutional web access policies 162 in this example are to deny the social networking, gaming, and adult categories.
  • the parental policy dashboard 150 enables the parent 112 of the minor user 110 of the computing device 120 to override one or more of the institutional web access policies 162 .
  • the parent 112 has selected via the parental policy dashboard 150 to allow social networking and gaming but to deny the adult category.
  • FIG. 3 shows the web filtering mechanism 100 establishing a trust relationship with the parent 112 before allowing the parent 112 to access the parental policy dashboard 150 .
  • the web filtering mechanism 100 establishes a trust relationship with the parent 112 in one or more embodiments by generating a login page accessible by the client 130 of the parent 112 such that the login page requires the parent 112 to login with a set of credentials that were issued to the minor user 110 by the institution that issued the computing device 120 to the minor user 110 .
  • the institution admin 114 can register the login credential issued to the minor user 110 with the web filtering mechanism 100 . Thereafter, those credentials can be used by the web filtering mechanism 100 to establish a trust relationship with the parent 112 .
  • the web filtering mechanism 100 sends a respective confirmation email to the minor user 110 and the parent 112 and the institution that issued the computing device 120 to the minor user 110 when the credentials of the minor user 110 are used to login to the web filtering mechanism 100 and access the parental policy dashboard 150 .
  • the confirmation emails enable the minor user 110 and the parent 112 and the institution that issued the computing device 120 to detect fraudulent attempts to access the parental policy dashboard 150 by anyone posing as a parent.
  • the web filtering mechanism 100 can establish a trust relationship with the parent 112 by providing a function in the institutional policy dashboard 152 that enables the institution admin 114 to send a link, e.g., a URL, for the parental control dashboard 150 in an email message to the parent 112 .
  • the link can enable the parent 112 , and nobody else, to access the parental policy dashboard 150 .
  • FIG. 4 shows an embodiment of the web filtering mechanism 100 that includes a location module 480 .
  • the location module 480 detects a current geographic location of the computing device 120 and provides the current geographic location to the web filter 170 .
  • the location module 480 enables the web filter 170 to adapt web access policies to the current geographic location of the computing device 120 .
  • the web filter 170 enforces the institutional web access policies 162 when the geographic location of the computing device 120 is inside the institution that issued the computing device 120 to the minor user 110 and enforces the parental web access policies 160 when the geographic location of the computing device 120 is outside the institution that issued the computing device 120 to the minor user 110 .
  • the location module 480 determines a current geographic location for the computing device 120 by examining its IP address.
  • the location module 480 can include a list of IP addresses associated with the institution that issued the computing device 120 to the minor user 110 .
  • the location module 480 can detect an IP address currently used by the computing device 120 to communicate on the network 140 and if it is an IP address not associated with the institution that issued the computing device 120 then it can be concluded that the computing device 120 is located outside of the institution that issued the computing device 120 .
  • the location module 480 determines a current geographic location for the computing device 120 by employing a web-based geo-location service that analyzes messages from the computing device 120 to determine its geographic location.
  • the location module 480 can compare the current geographic location of the computing device 120 to the geographic location of the institution that issued the computing device 120 to the minor user 110 to determine whether or not the computing device 120 is currently located inside or outside of the institution.
  • the location module 480 determines a current geographic location for the computing device 120 by employing a GPS mechanism in the computing device 120 .
  • the location module 480 can compare the current geographic location reported by the GPS mechanism inside the computing device 120 to the geographic location of the institution that issued the computing device 120 to the minor user 110 to determine whether or not the computing device 120 is currently located inside or outside of the institution.
  • the location detection by the location module 480 can be selected to be natively supported by the computing device 120 and one or more web browsers that can be run on the computing device 120 . This can minimize barriers to location-based parental controls that might otherwise be imposed on the parent 112 or the minor user 110 . For example, no software installation is imposed on the parent 112 to track the location-usage of the computing device 120 by their minor user 110 when a geo-location service or device GPS or IP tracking is used by the location module 480 .
  • FIG. 5 shows how the web filtering mechanism 100 determines which set of policies, the parental web access policies 160 or the institutional web access policies 162 , are to be applied to the computing device 120 in one or more embodiments.
  • the web filtering mechanism 100 determines a current geographic location of the computing device 120 .
  • Step 510 can include determining a precise geographic location, e.g., using a web-based geo-location service or a GPS mechanism in the computing device 120 , or determining a current IP address being used by the computing device 120 .
  • the web filtering mechanism 100 determines whether or not the current geographic location of the computing device 120 is outside of the institution that issued the computing device 120 to the minor user 110 .
  • the determination at step 520 can be based on any geographic location measure, e.g., latitude/longitude, street address, etc., or on a comparison between the current IP address of the computing device 120 and the IP addresses associated with the institution that issued the computing device 120 to the minor user 110 .
  • the web filtering mechanism 100 filters web communication for the computing device 120 by applying the institutional web access policies 162 . Otherwise, at step 540 the web filtering mechanism 100 filters web communication for the computing device 120 by applying the parental web access policies 160 .
  • FIG. 6 shows one or more embodiments of the web filtering mechanism 100 integrated with a reporting mechanism 660 including an activity log 610 .
  • the activity log 610 records a set of web accesses undertaken with the computing device 120 .
  • the activity log 610 can also record the current geographic locations of the computing device 120 when the recorded web accesses were undertaken.
  • the activity log 610 can be used to provide reports to the parent 112 about what web sites the minor user 110 has accessed from what location.
  • the web filtering mechanism 100 can employ a geo-location service 620 to determine the current geographic location of the computing device 120 .
  • the geo-location service 620 can obtain consent for location tracking from the minor user 110 before tracking the location of the computing device 120 .
  • the location module 480 can then at any time obtain the current geographic location of the computing device 120 from the geo-location service 620 , e.g., using IP/web communication via the network 140 .
  • FIG. 7 illustrates the activity log 610 in one or more embodiments.
  • the activity log 610 includes a set of records 0 -n.
  • Each record 0 -n can describe a web access undertaken by the minor user 110 via the computing device 120 .
  • Each record 0 -n in one or more embodiments can include a content category C 0 -Cn, a street address A 0 -An, a starting time TO-Tn, and a duration D 0 -Dn.
  • the content categories C 0 -Cn describe the content being accessed, e.g., social network, gaming, adult, etc.
  • the street addresses AO-An are the geographic locations of the computing device 120 during the corresponding web accesses.
  • the starting times TO-Tn and the durations DO-Dn are the starting time and durations for the corresponding web accesses.
  • FIG. 8 shows an activity analyzer 840 in the reporting mechanism 660 in one or more embodiments.
  • the activity analyzer 840 generates an activity report 850 from the information in the activity log 610 .
  • the activity analyzer 840 can generate any type of report, table, chart, graph, etc. that depicts the information in the activity log 610 .
  • the activity analyzer 840 can generate a pie chart that depicts the percentage of time that the minor user 110 spends on each of the content categories recorded in the activity log 610 .
  • the activity analyzer 840 can generate the activity report 850 in one or more embodiments by correlating the information in the activity log 610 with information contained in a performance data store 820 .
  • the performance data store 820 can hold performance data pertaining to the minor user 110 , e.g. test grades.
  • the activity analyzer 840 can generate activity reports that link test grades to web access activity logged in the activity log 610 . For example, large amounts of time logged on social networking before a test period can be correlated to resulting test performance.
  • the reporting mechanism 660 includes a push notification server 880 that can send the parent 112 the activity report 850 in an email message.
  • the push notification server 880 can regularly send activity reports, e.g., weekly reports, so that the parent 112 can track how much time the minor user 110 is spending on the categories that the parent 112 currently allows.
  • the regular reports can enable the parent 112 to adjust their choices on content categories accordingly.
  • activity reports can be sent to a mobile device of the parent 112 , e.g. the client 130 or another device that runs a mobile app for receiving activity reports from the push notification server 880 .
  • FIG. 9 shows an urgency module 990 in the reporting mechanism 660 in one or more embodiments.
  • the urgency module 990 detects a potential for harm to the minor user 110 by examining the web content accessed using the computing device 120 and sends an urgent message to the parent 112 if the potential for harm is detected.
  • the urgency module 990 obtains an information stream from the web filter 170 that includes text associated with web content accessed by the minor user 110 via the computing device 120 .
  • the text from the web filter 170 can include search terms typed into search engines, content of instant messages, text extracted from web sites visited by the minor user, etc.
  • the urgency module 990 examines the information stream for key words, phrases, etc., that can indicate interactions by the minor user 110 with potential predators, bullies, etc., as well as conditions that may cause the minor user 110 to engage in self-harm. When the urgency module 990 detects a potential for harm to the minor user 110 it sends an urgent message via the push notification server 880 to the parent 112 informing the parent 112 of the potential danger.
  • the urgent message can be a text or other instant message to a mobile device of the parent 112 .
  • FIG. 10 illustrates a method for web filtering integrated with parental management in one or more embodiments. While the various steps in this flowchart are presented and described sequentially, one of ordinary skill will appreciate that some or all of the steps can be executed in different orders and some or all of the steps can be executed in parallel. Further, in one or more embodiments, one or more of the steps described below can be omitted, repeated, and/or performed in a different order. Accordingly, the specific arrangement of steps shown in FIGS. 10-11 , and FIG. 5 , should not be construed as limiting the scope of the invention.
  • an institutional policy dashboard is generated.
  • the institutional policy dashboard enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution.
  • a parental policy dashboard is generated.
  • the parental policy dashboard enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent.
  • step 1030 web content accessed by the minor user via the computing device issued by the institution is filtered by enforcing the parental and the institutional web access policies.
  • the parental web access policies can be enforced over the institutional web access policies if the parental web access policies and the institutional web access policies conflict at step 1030 .
  • FIG. 11 illustrates a method for web filtering integrated with parental reporting in one or more embodiments.
  • a web content accessed by a minor user via a computing device issued to the minor user by an institution is filtered.
  • a set of web accesses undertaken by the minor user via the computing device is reported to the parent of the minor user.
  • Embodiments of the invention may be implemented on a specialized computer system.
  • a computing system can include one or more mobile devices (e.g., laptop computer, smart phone, personal digital assistant, tablet computer, or other mobile device, game console), desktop computers, servers, blades in a server chassis, or any other type of computing device(s) that include at least the minimum processing power, memory, and input and output device(s) to perform one or more embodiments of the invention.
  • mobile devices e.g., laptop computer, smart phone, personal digital assistant, tablet computer, or other mobile device, game console
  • desktop computers servers, blades in a server chassis, or any other type of computing device(s) that include at least the minimum processing power, memory, and input and output device(s) to perform one or more embodiments of the invention.
  • FIG. 12 illustrates a computing system 1200 upon which portions of the web filtering mechanism 100 or the clients 130 - 132 or the computing device 120 can be implemented.
  • the computing system 1200 includes one or more computer processor(s) 1202 , associated memory 1204 (e.g., random access memory (RAM), cache memory, flash memory, etc.), one or more storage device(s) 1206 (e.g., a hard disk, an optical drive such as a compact disk (CD) drive or digital versatile disk (DVD) drive, a flash memory stick, etc.), a bus 1216 , and numerous other elements and functionalities.
  • the computer processor(s) 1202 may be an integrated circuit for processing instructions.
  • the computer processor(s) may be one or more cores or micro-cores of a processor.
  • the computing system 1200 may also include one or more input device(s), e.g., a touchscreen, keyboard 1210 , mouse 1212 , microphone, touchpad, electronic pen, or any other type of input device. Further, the computing system 1200 may include one or more monitor device(s) 1208 , such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), external storage, input for an electric instrument, or any other output device.
  • the computing system 1200 may be connected to the network 140 (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) via a network adapter 1218 .
  • LAN local area network
  • WAN wide area network

Abstract

A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.

Description

    RELATED PATENT APPLICATIONS/PRIORITY CLAIMS
  • This patent application is a continuation of and claims priority under 35 USC 120 to U.S. patent application Ser. No. 15/449,559, filed Mar. 3, 2017 that in turn is a continuation of and claims priority under 35 USC 120 to U.S. patent application Ser. No. 14/679,536 filed on Apr. 6, 2015 (now U.S. Pat. No. 9,602,467 issued on Mar. 21, 2017) and entitled “Web Filtering With Integrated Parental Management and Reporting,” which are incorporated herein fully by reference.
  • BACKGROUND OF THE INVENTION
  • Institutions, e.g., schools, can issue computing devices to minor users, e.g., children attending the school. An institution can employ web filtering to limit the web accesses that can be undertaken using the issued computing devices. For example, a school can use web filtering to block social networking sites from being accessed using the computing devices issued to the children attending the school. A child attending a school can take a computing device issued by their school home or to a friend's house and still be subject to the social networking ban by the school.
  • In general, in one aspect, the invention relates to a web filtering mechanism. The web filtering mechanism can include: an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; and a web filter for filtering a web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies.
  • In general, in another aspect, the invention relates to a method for web filtering. The method can include: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; and filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies.
  • In general, in yet another aspect, the invention relates to a web filtering mechanism. The web filtering mechanism can include: a web filter for filtering a web content accessed by a minor user via a computing device issued to the minor user by an institution; and a reporting mechanism for reporting to a parent of the minor user a set of web accesses undertaken by the minor user via the computing device.
  • In general, in still another aspect, the invention relates to a method for web filtering. The method can include: filtering a web content accessed by a minor user via a computing device issued to the minor user by an institution; and reporting to a parent of the minor user a set of web accesses undertaken by the minor user via the computing device.
  • Other aspects of the invention will be apparent from the following description and the appended claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements.
  • FIG. 1 shows a web filtering mechanism with integrated parental management in one or more embodiments.
  • FIG. 2 illustrates a parental policy dashboard in one or more embodiments.
  • FIG. 3 shows a web filtering mechanism establishing a trust relationship with a parent before allowing the parent to control the web content for a minor user.
  • FIG. 4 shows one or more embodiments of a web filtering mechanism that includes a location module.
  • FIG. 5 shows how a web filtering mechanism determines which set of web access policies, the institutional policies or the parental policies, are to be applied to a computing device in one or more embodiments.
  • FIG. 6 shows one or more embodiments of a web filtering mechanism with integrated parental reporting.
  • FIG. 7 illustrates an activity log in one or more embodiments.
  • FIG. 8 shows an activity analyzer in a reporting mechanism in one or more embodiments.
  • FIG. 9 shows an urgency module in a reporting mechanism in one or more embodiments.
  • FIG. 10 illustrates a method for web filtering integrated with parental management in one or more embodiments.
  • FIG. 11 illustrates a method for web filtering integrated with parental reporting in one or more embodiments.
  • FIG. 12 illustrates a computing system upon which portions of a web filtering mechanism or clients thereof can be implemented.
  • DETAILED DESCRIPTION
  • Reference will now be made in detail to the various embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings. Like elements in the various figures are denoted by like reference numerals for consistency. While described in conjunction with these embodiments, it will be understood that they are not intended to limit the disclosure to these embodiments. On the contrary, the disclosure is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the disclosure as defined by the appended claims. Furthermore, in the following detailed description of the present disclosure, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. However, it will be understood that the present disclosure may be practiced without these specific details. In other instances, well-known methods, procedures, components, have not been described in detail so as not to unnecessarily obscure aspects of the present disclosure.
  • FIG. 1 shows a web filtering mechanism 100 in one or more embodiments. The web filtering mechanism 100 filters web communication for a computing device 120 issued to a minor user 110 by an institution. The institution that issues the computing device 120 to the minor user 110 to can be a school and the minor user 110 can be a child attending the school. The web filtering mechanism 100 can perform any kind of web filtering, e.g., DNS filtering, search filtering, keyword filtering, etc.
  • The web filtering mechanism 100 includes an institutional policy dashboard 152 that enables the institution that issued the computing device 120 to the minor user 110 to select a set of institutional web access policies 162. The institutional web access policies 162 are web access policies sanctioned by the institution that issued the computing device 120 to the minor user 110.
  • The web filtering mechanism 100 includes a parental policy dashboard 150 that enables a parent 112 of the minor user 110 to select to a set of parental web access policies 160. The parental web access policies 160 are web access policies sanctioned by the parent 112.
  • The web filtering mechanism 100 includes a web filter 170 for filtering a web content accessed by the minor user 110 via the computing device 120 by enforcing the parental web access policies 160 and the institutional web access policies 162. In one or more embodiments, the web filter 170 enforces the parental web access policies 160 over the institutional web access policies 162 if the parental web access policies 160 and the institutional web access policies 162 conflict.
  • In one or more embodiments, the institutional policy dashboard 152 can be accessed by an institution admin 114 of the institution that issued the computing device 120 to the minor user 110. The institutional web access policies 162 can apply to groups that can encompass the minor user 110, e.g. a student grade level that encompasses the minor user 110. The parental web access policies 160 apply only to the minor user 110.
  • The institution admin 114 can access the institutional policy dashboard 152 via a network 140 using a client 132, e.g., a computer or mobile device running a web browser that accesses the web filtering mechanism 100 using web protocols. The parent 112 can access the parental policy dashboard 150 via the network 140 using a client 130, e.g., a computer or mobile device running a web browser.
  • The web filtering mechanism 100 holds the parental policy dashboard 150 in the same cloud site as the institutional policy dashboard 152. As a consequence, the parent 112 can use the client 130 to access the parental policy dashboard 150 and modify the policies sanctioned by the institutional that issued the computing device 120 to the minor user 110 without having to install any specialized software on the client 130 of the parent 112.
  • FIG. 2 illustrates the parental policy dashboard 150 in one or more embodiments. The parental policy dashboard 150 includes a set of content categories 210. In this example, the content categories 210 include social networking, gaming, and adult. There can be any number of content categories controllable via the parental policy dashboard 150 and the institutional policy dashboard 152.
  • The parental policy dashboard 150 lists the institutional web access policies 162 selected by the institution admin 114 via the institutional policy dashboard 152. The institutional web access policies 162 in this example are to deny the social networking, gaming, and adult categories.
  • The parental policy dashboard 150 enables the parent 112 of the minor user 110 of the computing device 120 to override one or more of the institutional web access policies 162. In this example, the parent 112 has selected via the parental policy dashboard 150 to allow social networking and gaming but to deny the adult category.
  • FIG. 3 shows the web filtering mechanism 100 establishing a trust relationship with the parent 112 before allowing the parent 112 to access the parental policy dashboard 150. The web filtering mechanism 100 establishes a trust relationship with the parent 112 in one or more embodiments by generating a login page accessible by the client 130 of the parent 112 such that the login page requires the parent 112 to login with a set of credentials that were issued to the minor user 110 by the institution that issued the computing device 120 to the minor user 110. For example, the institution admin 114 can register the login credential issued to the minor user 110 with the web filtering mechanism 100. Thereafter, those credentials can be used by the web filtering mechanism 100 to establish a trust relationship with the parent 112.
  • The web filtering mechanism 100 sends a respective confirmation email to the minor user 110 and the parent 112 and the institution that issued the computing device 120 to the minor user 110 when the credentials of the minor user 110 are used to login to the web filtering mechanism 100 and access the parental policy dashboard 150. The confirmation emails enable the minor user 110 and the parent 112 and the institution that issued the computing device 120 to detect fraudulent attempts to access the parental policy dashboard 150 by anyone posing as a parent.
  • In one or more embodiments, the web filtering mechanism 100 can establish a trust relationship with the parent 112 by providing a function in the institutional policy dashboard 152 that enables the institution admin 114 to send a link, e.g., a URL, for the parental control dashboard 150 in an email message to the parent 112. The link can enable the parent 112, and nobody else, to access the parental policy dashboard 150.
  • FIG. 4 shows an embodiment of the web filtering mechanism 100 that includes a location module 480. The location module 480 detects a current geographic location of the computing device 120 and provides the current geographic location to the web filter 170. The location module 480 enables the web filter 170 to adapt web access policies to the current geographic location of the computing device 120. In one or more embodiments, the web filter 170 enforces the institutional web access policies 162 when the geographic location of the computing device 120 is inside the institution that issued the computing device 120 to the minor user 110 and enforces the parental web access policies 160 when the geographic location of the computing device 120 is outside the institution that issued the computing device 120 to the minor user 110.
  • In one or more embodiments, the location module 480 determines a current geographic location for the computing device 120 by examining its IP address. For example, the location module 480 can include a list of IP addresses associated with the institution that issued the computing device 120 to the minor user 110. The location module 480 can detect an IP address currently used by the computing device 120 to communicate on the network 140 and if it is an IP address not associated with the institution that issued the computing device 120 then it can be concluded that the computing device 120 is located outside of the institution that issued the computing device 120.
  • In one or more embodiments, the location module 480 determines a current geographic location for the computing device 120 by employing a web-based geo-location service that analyzes messages from the computing device 120 to determine its geographic location. The location module 480 can compare the current geographic location of the computing device 120 to the geographic location of the institution that issued the computing device 120 to the minor user 110 to determine whether or not the computing device 120 is currently located inside or outside of the institution.
  • In one or more embodiments, the location module 480 determines a current geographic location for the computing device 120 by employing a GPS mechanism in the computing device 120. The location module 480 can compare the current geographic location reported by the GPS mechanism inside the computing device 120 to the geographic location of the institution that issued the computing device 120 to the minor user 110 to determine whether or not the computing device 120 is currently located inside or outside of the institution.
  • The location detection by the location module 480 can be selected to be natively supported by the computing device 120 and one or more web browsers that can be run on the computing device 120. This can minimize barriers to location-based parental controls that might otherwise be imposed on the parent 112 or the minor user 110. For example, no software installation is imposed on the parent 112 to track the location-usage of the computing device 120 by their minor user 110 when a geo-location service or device GPS or IP tracking is used by the location module 480.
  • FIG. 5 shows how the web filtering mechanism 100 determines which set of policies, the parental web access policies 160 or the institutional web access policies 162, are to be applied to the computing device 120 in one or more embodiments. At step 510, the web filtering mechanism 100 determines a current geographic location of the computing device 120. Step 510 can include determining a precise geographic location, e.g., using a web-based geo-location service or a GPS mechanism in the computing device 120, or determining a current IP address being used by the computing device 120.
  • At step 520, the web filtering mechanism 100 determines whether or not the current geographic location of the computing device 120 is outside of the institution that issued the computing device 120 to the minor user 110. The determination at step 520 can be based on any geographic location measure, e.g., latitude/longitude, street address, etc., or on a comparison between the current IP address of the computing device 120 and the IP addresses associated with the institution that issued the computing device 120 to the minor user 110.
  • If the current geographic location of the computing device 120 is not outside of the institution that issued the computing device 120 to the minor user 110 at step 520, then at step 530 the web filtering mechanism 100 filters web communication for the computing device 120 by applying the institutional web access policies 162. Otherwise, at step 540 the web filtering mechanism 100 filters web communication for the computing device 120 by applying the parental web access policies 160.
  • FIG. 6 shows one or more embodiments of the web filtering mechanism 100 integrated with a reporting mechanism 660 including an activity log 610. The activity log 610 records a set of web accesses undertaken with the computing device 120. The activity log 610 can also record the current geographic locations of the computing device 120 when the recorded web accesses were undertaken. The activity log 610 can be used to provide reports to the parent 112 about what web sites the minor user 110 has accessed from what location.
  • The web filtering mechanism 100 can employ a geo-location service 620 to determine the current geographic location of the computing device 120. The geo-location service 620 can obtain consent for location tracking from the minor user 110 before tracking the location of the computing device 120. The location module 480 can then at any time obtain the current geographic location of the computing device 120 from the geo-location service 620, e.g., using IP/web communication via the network 140.
  • FIG. 7 illustrates the activity log 610 in one or more embodiments. The activity log 610 includes a set of records 0-n. Each record 0-n can describe a web access undertaken by the minor user 110 via the computing device 120. Each record 0-n in one or more embodiments can include a content category C0-Cn, a street address A0-An, a starting time TO-Tn, and a duration D0-Dn. The content categories C0-Cn describe the content being accessed, e.g., social network, gaming, adult, etc. The street addresses AO-An are the geographic locations of the computing device 120 during the corresponding web accesses. The starting times TO-Tn and the durations DO-Dn are the starting time and durations for the corresponding web accesses.
  • FIG. 8 shows an activity analyzer 840 in the reporting mechanism 660 in one or more embodiments. The activity analyzer 840 generates an activity report 850 from the information in the activity log 610. The activity analyzer 840 can generate any type of report, table, chart, graph, etc. that depicts the information in the activity log 610. For example, the activity analyzer 840 can generate a pie chart that depicts the percentage of time that the minor user 110 spends on each of the content categories recorded in the activity log 610.
  • The activity analyzer 840 can generate the activity report 850 in one or more embodiments by correlating the information in the activity log 610 with information contained in a performance data store 820. The performance data store 820 can hold performance data pertaining to the minor user 110, e.g. test grades. The activity analyzer 840 can generate activity reports that link test grades to web access activity logged in the activity log 610. For example, large amounts of time logged on social networking before a test period can be correlated to resulting test performance.
  • In one or more embodiments, the reporting mechanism 660 includes a push notification server 880 that can send the parent 112 the activity report 850 in an email message. The push notification server 880 can regularly send activity reports, e.g., weekly reports, so that the parent 112 can track how much time the minor user 110 is spending on the categories that the parent 112 currently allows. The regular reports can enable the parent 112 to adjust their choices on content categories accordingly. In one or more embodiments, activity reports can be sent to a mobile device of the parent 112, e.g. the client 130 or another device that runs a mobile app for receiving activity reports from the push notification server 880.
  • FIG. 9 shows an urgency module 990 in the reporting mechanism 660 in one or more embodiments. The urgency module 990 detects a potential for harm to the minor user 110 by examining the web content accessed using the computing device 120 and sends an urgent message to the parent 112 if the potential for harm is detected. The urgency module 990 obtains an information stream from the web filter 170 that includes text associated with web content accessed by the minor user 110 via the computing device 120. The text from the web filter 170 can include search terms typed into search engines, content of instant messages, text extracted from web sites visited by the minor user, etc. The urgency module 990 examines the information stream for key words, phrases, etc., that can indicate interactions by the minor user 110 with potential predators, bullies, etc., as well as conditions that may cause the minor user 110 to engage in self-harm. When the urgency module 990 detects a potential for harm to the minor user 110 it sends an urgent message via the push notification server 880 to the parent 112 informing the parent 112 of the potential danger. The urgent message can be a text or other instant message to a mobile device of the parent 112.
  • FIG. 10 illustrates a method for web filtering integrated with parental management in one or more embodiments. While the various steps in this flowchart are presented and described sequentially, one of ordinary skill will appreciate that some or all of the steps can be executed in different orders and some or all of the steps can be executed in parallel. Further, in one or more embodiments, one or more of the steps described below can be omitted, repeated, and/or performed in a different order. Accordingly, the specific arrangement of steps shown in FIGS. 10-11, and FIG. 5, should not be construed as limiting the scope of the invention.
  • At step 1010, an institutional policy dashboard is generated. The institutional policy dashboard enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution.
  • At step 1020, a parental policy dashboard is generated. The parental policy dashboard enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent.
  • At step 1030, web content accessed by the minor user via the computing device issued by the institution is filtered by enforcing the parental and the institutional web access policies. The parental web access policies can be enforced over the institutional web access policies if the parental web access policies and the institutional web access policies conflict at step 1030.
  • FIG. 11 illustrates a method for web filtering integrated with parental reporting in one or more embodiments. At step 1110, a web content accessed by a minor user via a computing device issued to the minor user by an institution is filtered. At step 1120, a set of web accesses undertaken by the minor user via the computing device is reported to the parent of the minor user.
  • Embodiments of the invention may be implemented on a specialized computer system. Examples of such a computing system can include one or more mobile devices (e.g., laptop computer, smart phone, personal digital assistant, tablet computer, or other mobile device, game console), desktop computers, servers, blades in a server chassis, or any other type of computing device(s) that include at least the minimum processing power, memory, and input and output device(s) to perform one or more embodiments of the invention.
  • FIG. 12 illustrates a computing system 1200 upon which portions of the web filtering mechanism 100 or the clients 130-132 or the computing device 120 can be implemented. The computing system 1200 includes one or more computer processor(s) 1202, associated memory 1204 (e.g., random access memory (RAM), cache memory, flash memory, etc.), one or more storage device(s) 1206 (e.g., a hard disk, an optical drive such as a compact disk (CD) drive or digital versatile disk (DVD) drive, a flash memory stick, etc.), a bus 1216, and numerous other elements and functionalities. The computer processor(s) 1202 may be an integrated circuit for processing instructions. For example, the computer processor(s) may be one or more cores or micro-cores of a processor. The computing system 1200 may also include one or more input device(s), e.g., a touchscreen, keyboard 1210, mouse 1212, microphone, touchpad, electronic pen, or any other type of input device. Further, the computing system 1200 may include one or more monitor device(s) 1208, such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), external storage, input for an electric instrument, or any other output device. The computing system 1200 may be connected to the network 140 (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) via a network adapter 1218.
  • While the foregoing disclosure sets forth various embodiments using specific diagrams, flowcharts, and examples, each diagram component, flowchart step, operation, and/or component described and/or illustrated herein may be implemented, individually and/or collectively, using a range of processes and components.
  • The process parameters and sequence of steps described and/or illustrated herein are given by way of example only. For example, while the steps illustrated and/or described herein may be shown or discussed in a particular order, these steps do not necessarily need to be performed in the order illustrated or discussed. The various example methods described and/or illustrated herein may also omit one or more of the steps described or illustrated herein or include additional steps in addition to those disclosed.
  • While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments may be devised which do not depart from the scope of the invention as disclosed herein.

Claims (20)

What is claimed is:
1. A web filtering mechanism, comprising:
a computer having a processor, memory and a plurality of instructions configured to:
select, using an institutional policy dashboard, a set of institutional web access policies sanctioned by the institution for a computing device of a minor user;
select, using a parental policy dashboard, a set of parental web access policies sanctioned by a parent of the minor user;
filter, using a web filter, a piece of web content accessed by the minor user via the computing device by enforcing the set of parental and institutional web access policies for the computing device; and
detect, by an urgency module, a potential for harm to the minor user by examining a set of text of the piece of web content.
2. The web filtering mechanism of claim 1, wherein the computer is further configured to provide a current geographic location of the computing device to the web filter such that the web filter adapts the parental web access policies and the institutional web access policies to the current geographic location.
3. The web filtering mechanism of claim 2, wherein the computer is further configured to determine the current geographic location using one of an IP address of the computing device, a web-based geo-location service and a GPS device in the computing device.
4. The web filtering mechanism of claim 2, wherein the computer is further configured to record a geographic location for each web access undertaken by the minor user using the computing device when outside of the institution.
5. The web filtering mechanism of claim 4, wherein the computer is further configured to generate an activity report for the parent in response to each web access and the geographic location recorded in the activity log.
6. A method for web filtering, comprising:
providing a set of institutional web access policies sanctioned by the institution for a computing device of a minor user and a set of parental web access policies sanctioned by a parent of the minor user;
receiving an access to a piece of web content by the minor user using the computing device;
filtering, using a web filter, the piece of web by enforcing the set of parental and institutional web access policies for the computing device; and
detect, by an urgency module, a potential for harm to the minor user by examining a set of text of the piece of web content.
7. The method of claim 6 further comprising providing a current geographic location of the computing device to the web filter and adapting the parental web access policies and the institutional web access policies to the current geographic location.
8. The method of claim 7 further comprising determining the current geographic location using one of an IP address of the computing device, a web-based geo-location service and a GPS device in the computing device.
9. The method of claim 7 further comprising recording a geographic location for each web access undertaken by the minor user using the computing device when outside of the institution.
10. The method of claim 9 further comprising generating an activity report for the parent in response to each web access and the geographic location recorded in the activity log.
11. A web filtering mechanism, comprising:
a computer having a processor, memory and a plurality of instructions configured to:
provide a set of institutional web access policies sanctioned by the institution for a computing device of a minor user and a set of parental web access policies sanctioned by a parent of the minor user;
filter, using a web filter, a piece of web content accessed by the minor user via the computing device by enforcing the set of parental and institutional web access policies for the computing device;
receive a current geographic location of the computing device; and
adapt the set of parental and institutional web access policies for the computing device to the current geographic location.
12. The web filtering mechanism of claim 11, wherein the computer is further configured to determine the current geographic location using one of an IP address of the computing device, a web-based geo-location service and a GPS device in the computing device.
13. The web filtering mechanism of claim 11, wherein the computer is further configured to select a set of institutional web access policies sanctioned by the institution for the computing device of the minor user and select, using a parental policy dashboard, a set of parental web access policies sanctioned by a parent of the minor user and detect, by an urgency module, a potential for harm to the minor user by examining a set of text of the piece of web content.
14. The web filtering mechanism of claim 11, wherein the computer is further configured to record a geographic location for each web access undertaken by the minor user using the computing device when outside of the institution.
15. The web filtering mechanism of claim 14, wherein the computer is further configured to generate an activity report for the parent in response to each web access and the geographic location recorded in the activity log.
16. A web filtering method, comprising:
providing a set of institutional web access policies sanctioned by the institution for a computing device of a minor user and a set of parental web access policies sanctioned by a parent of the minor user;
filtering, using a web filter, a piece of web content accessed by the minor user via the computing device by enforcing the set of parental and institutional web access policies for the computing device;
receiving a current geographic location of the computing device; and
adapting the set of parental and institutional web access policies for the computing device to the current geographic location.
17. The method of claim 16 further comprising determining the current geographic location using one of an IP address of the computing device, a web-based geo-location service and a GPS device in the computing device.
18. The method of claim 16 further comprising selecting a set of institutional web access policies sanctioned by the institution for the computing device of the minor user and selecting, using a parental policy dashboard, a set of parental web access policies sanctioned by a parent of the minor user and detecting, by an urgency module, a potential for harm to the minor user by examining a set of text of the piece of web content.
19. The method of claim 16 further comprising enabling the parent to establish a trust relationship by logging in using a set of credentials issued to the minor user by the institution and sending a respective email to the minor user and the parent and the institution in response to a login by the parent.
20. The method of claim 16 further comprising recording a geographic location for each web access undertaken by the minor user using the computing device when outside of the institution.
US16/799,726 2015-04-06 2020-02-24 Web filtering system and method Abandoned US20200195691A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/799,726 US20200195691A1 (en) 2015-04-06 2020-02-24 Web filtering system and method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/679,536 US9602467B2 (en) 2015-04-06 2015-04-06 Web filtering with integrated parental management and reporting
US15/449,559 US10609078B2 (en) 2015-04-06 2017-03-03 Web filtering system and method
US16/799,726 US20200195691A1 (en) 2015-04-06 2020-02-24 Web filtering system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/449,559 Continuation US10609078B2 (en) 2015-04-06 2017-03-03 Web filtering system and method

Publications (1)

Publication Number Publication Date
US20200195691A1 true US20200195691A1 (en) 2020-06-18

Family

ID=57017849

Family Applications (3)

Application Number Title Priority Date Filing Date
US14/679,536 Active 2035-05-01 US9602467B2 (en) 2015-04-06 2015-04-06 Web filtering with integrated parental management and reporting
US15/449,559 Active US10609078B2 (en) 2015-04-06 2017-03-03 Web filtering system and method
US16/799,726 Abandoned US20200195691A1 (en) 2015-04-06 2020-02-24 Web filtering system and method

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US14/679,536 Active 2035-05-01 US9602467B2 (en) 2015-04-06 2015-04-06 Web filtering with integrated parental management and reporting
US15/449,559 Active US10609078B2 (en) 2015-04-06 2017-03-03 Web filtering system and method

Country Status (1)

Country Link
US (3) US9602467B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10826871B1 (en) 2018-05-17 2020-11-03 Securly, Inc. Managed network content monitoring and filtering system and method

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170104737A1 (en) * 2015-10-12 2017-04-13 Microsoft Technology Licensing, Llc User account management flow in service environment
US10523711B2 (en) * 2016-06-15 2019-12-31 Tracfone Wireless, Inc. Network filtering service system and process
WO2018111933A1 (en) * 2016-12-12 2018-06-21 K&M Bristol Holdings, LLC Electronic device and computer application monitoring, alert, and intervention system and method
PL3555793T3 (en) * 2016-12-19 2023-01-23 Saints Group S.R.L. Method for regulating access to data connection by an electronic device
US10621685B2 (en) * 2017-04-03 2020-04-14 International Business Machines Corporation Cognitive education advisor
EP3804289A4 (en) * 2018-06-08 2022-01-05 Telefonaktiebolaget LM Ericsson (publ) Method and system for implementing user defined policies in an intelligent network
US11710137B2 (en) 2019-08-23 2023-07-25 Yandex Europe Ag Method and system for identifying electronic devices of genuine customers of organizations
RU2752241C2 (en) * 2019-12-25 2021-07-23 Общество С Ограниченной Ответственностью «Яндекс» Method and system for identifying malicious activity of predetermined type in local network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113471A1 (en) * 2008-07-10 2011-05-12 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for context-based content management
US20150180746A1 (en) * 2013-12-19 2015-06-25 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7526800B2 (en) * 2003-02-28 2009-04-28 Novell, Inc. Administration of protection of data accessible by a mobile device
US7848765B2 (en) * 2005-05-27 2010-12-07 Where, Inc. Location-based services
US8929857B2 (en) * 2007-06-28 2015-01-06 Kajeet, Inc. Policy management of electronic devices
US9357384B2 (en) * 2009-02-09 2016-05-31 International Business Machines Corporation System and method to support identity theft protection as part of a distributed service oriented ecosystem
CN102439583A (en) * 2009-03-05 2012-05-02 e帕尔斯公司 System and method for managing and monitoring electronic communications
US8490176B2 (en) * 2009-04-07 2013-07-16 Juniper Networks, Inc. System and method for controlling a mobile device
US8111154B1 (en) * 2009-09-14 2012-02-07 Symantec Corporation Systems and methods for monitoring a mobile-computing device using geo-location information
US8788657B2 (en) * 2010-12-09 2014-07-22 Wavemarket, Inc. Communication monitoring system and method enabling designating a peer
US8973088B1 (en) * 2011-05-24 2015-03-03 Palo Alto Networks, Inc. Policy enforcement using host information profile
WO2013006553A1 (en) * 2011-07-01 2013-01-10 Fiberlink Communications Corporation Rules based actions for mobile device management
US9137389B2 (en) * 2011-11-08 2015-09-15 Kajeet, Inc. Master limits and filters for electronic devices
US20130124192A1 (en) * 2011-11-14 2013-05-16 Cyber360, Inc. Alert notifications in an online monitoring system
US8412154B1 (en) * 2012-04-10 2013-04-02 Tangoe, Inc. System and method for managing a mobile device
US9367688B2 (en) * 2012-06-22 2016-06-14 Intel Corporation Providing geographic protection to a system
US20150007307A1 (en) * 2013-03-10 2015-01-01 eBravium, Inc. Method and System for Integration of Instruction and Task Completion Based Access to Mobile Device Operating Systems
US8763078B1 (en) * 2013-03-14 2014-06-24 Palantir Technologies, Inc. System and method for monitoring authentication attempts
US9876804B2 (en) * 2013-10-20 2018-01-23 Cyber-Ark Software Ltd. Method and system for detecting unauthorized access to and use of network resources
WO2015103338A1 (en) * 2013-12-31 2015-07-09 Lookout, Inc. Cloud-based network security
US20150381658A1 (en) * 2014-06-30 2015-12-31 Mcafee, Inc. Premises-aware security and policy orchestration

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113471A1 (en) * 2008-07-10 2011-05-12 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for context-based content management
US20150180746A1 (en) * 2013-12-19 2015-06-25 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10826871B1 (en) 2018-05-17 2020-11-03 Securly, Inc. Managed network content monitoring and filtering system and method
US10911410B1 (en) 2018-05-17 2021-02-02 Securly, Inc. Managed network content monitoring and filtering system and method
US11108785B2 (en) 2018-05-17 2021-08-31 Securly, Inc. Managed network content monitoring and filtering system and method
US11265332B1 (en) 2018-05-17 2022-03-01 Securly, Inc. Managed network content monitoring and filtering system and method
US11329993B2 (en) 2018-05-17 2022-05-10 Securly, Inc. Managed network content monitoring and filtering system and method

Also Published As

Publication number Publication date
US10609078B2 (en) 2020-03-31
US9602467B2 (en) 2017-03-21
US20160294775A1 (en) 2016-10-06
US20170180426A1 (en) 2017-06-22

Similar Documents

Publication Publication Date Title
US20200195691A1 (en) Web filtering system and method
US11368481B2 (en) Techniques for discovering and managing security of applications
EP3044987B1 (en) Method and system for verifying an account operation
US8996669B2 (en) Internet improvement platform with learning module
US9225704B1 (en) Unified management of third-party accounts
US8601114B1 (en) Method, system and computer program product for interception, quarantine and moderation of internal communications of uncontrolled systems
US20150229664A1 (en) Assessing security risks of users in a computing network
US9692776B2 (en) Systems and methods for evaluating content provided to users via user interfaces
US20110184982A1 (en) System and method for capturing and reporting online sessions
US20170251008A1 (en) Method of and system for processing an unauthorized user access to a resource
AU2014374041A1 (en) Notification of application permissions
US20170244718A1 (en) Method of and system for processing an unauthorized user access to a resource
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
US9602540B1 (en) Enforcing restrictions on third-party accounts
US20190281064A1 (en) System and method for restricting access to web resources
US11610021B2 (en) System and method for masking user identity in digital interactions
US10158673B2 (en) Monitoring and controlling electronic activity using third party rule submission and validation
US8645535B1 (en) Detecting profile changes based on device behavior
US9071650B1 (en) Method, system and computer program product for enforcing access controls to features and subfeatures on uncontrolled web application
US9386019B1 (en) System and method for controlled access to network devices
US10484422B2 (en) Prevention of rendezvous generation algorithm (RGA) and domain generation algorithm (DGA) malware over existing internet services
KR20160042399A (en) Creating a contact list and pre-populated user accounts
US11418500B2 (en) User authentication based on cognitive profiling
US9832196B2 (en) Network monitoring device
US20220012346A1 (en) Risk assessment for managed client devices

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: SECURLY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MAHADIK, VINAY;NGUYEN, DUE;KATCHER, PAUL;AND OTHERS;REEL/FRAME:052983/0670

Effective date: 20161102

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

AS Assignment

Owner name: MONROE CAPITAL MANAGEMENT ADVISORS, LLC, ILLINOIS

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:SECURLY, INC.;REEL/FRAME:056003/0657

Effective date: 20210422

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION COUNTED, NOT YET MAILED

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION