WO2000068764A1 - Commande d'acces au contenu - Google Patents

Commande d'acces au contenu Download PDF

Info

Publication number
WO2000068764A1
WO2000068764A1 PCT/US2000/012916 US0012916W WO0068764A1 WO 2000068764 A1 WO2000068764 A1 WO 2000068764A1 US 0012916 W US0012916 W US 0012916W WO 0068764 A1 WO0068764 A1 WO 0068764A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
regulation
accessing
information
requested
Prior art date
Application number
PCT/US2000/012916
Other languages
English (en)
Inventor
C. Hudson Hendren, Iii
Original Assignee
America Online, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by America Online, Inc. filed Critical America Online, Inc.
Priority to CA002373483A priority Critical patent/CA2373483A1/fr
Priority to EP00930603A priority patent/EP1177493A1/fr
Priority to JP2000616483A priority patent/JP2002544582A/ja
Priority to AU48396/00A priority patent/AU4839600A/en
Publication of WO2000068764A1 publication Critical patent/WO2000068764A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/165Centralised control of user terminal ; Registering at central
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25841Management of client data involving the geographical location of the client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4113PC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/61Network physical structure; Signal processing
    • H04N21/6106Network physical structure; Signal processing specially adapted to the downstream path of the transmission network
    • H04N21/6125Network physical structure; Signal processing specially adapted to the downstream path of the transmission network involving transmission via Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/84Generation or processing of descriptive data, e.g. content descriptors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Definitions

  • This invention relates to controlling access to content.
  • the Internet and other computer networks can provide users with a wealth of information on almost any topic. Some of this information, however, includes material that may be offensive and/or unsuitable for children.
  • Organizations such as the Recreational Software Advisory Council (RSAC) have proposed rating schemes that provide users with information about the nature of content offered by different network sites.
  • the RSAC rating scheme defines categories for describing the violence, nudity, sex, and offensive language included in content.
  • Different vendors such as MICROSOFT have integrated the RSAC scheme into their software to enable users to control the content displayed. For example, a parent may configure a browser to deny access to any content having a RSAC nudity rating above "revealing attire.” These parental controls enable parents to prevent their children from viewing mature subject matter.
  • controlling access to requested content includes accessing information describing requested content, accessing information describing at least one regulation that is related to the requested content and to geographical information, and determining whether the content information satisfies the regulation(s).
  • Embodiments may include one or more of the following features. For example, access to the requested content may be denied if the content information is determined not to satisfy the applicable regulation(s), and may be permitted if the content information is determined to satisfy the applicable regulation(s).
  • the information describing the content may be content ratings.
  • the content ratings may include data corresponding to one or more of violence, nudity, sex, and language.
  • the content ratings may be substantially in accordance with the Recreational Software Advisory Council (RSAC) ratings scheme.
  • Accessing information describing the content may include accessing a database that includes information for different content. Accessing information may also include accessing content information in a response to the content request.
  • One or more regulations related to the requested content may be determined. This may include inferring the citizenship of a user that requested the content, for example, by accessing the user's billing address and/or determining an access number used by the user.
  • the regulation may be a national regulation, an international regulation, and/or a local regulation such as a law, an ordinance, a rule, a treaty, a proclamation, or an edict.
  • the regulation may be a regulation that applies to citizens within a jurisdiction, to citizens outside a jurisdiction, and/or to non-citizens within a jurisdiction.
  • the content can include text, graphics, animations, sound, video, and instructions.
  • an indication that access has been denied may be provided if the content does not satisfy the applicable regulation(s).
  • access to requested content available on the Internet is controlled by receiving a request for content, accessing content ratings describing the requested content, accessing information describing at least one applicable regulation that is related to geographical information concerning the requestor, determining whether the content information satisfies the regulation(s), denying access to the requested content if the content information is determined not to satisfy the regulation(s), and permitting access to the requested content if the content information is determined to satisfy the regulation(s).
  • the invention may be implemented as a computer program, disposed on a computer-readable medium, for controlling access to requested content.
  • Advantages may include one or more of the following.
  • a system can protect both an end-user and a common carrier from liability for viewing or transmitting prohibited content.
  • use of the system to self- regulate the content offered by the carrier can make the carrier more appealing to governments, for example, when seeking permission to operate in a jurisdiction.
  • the system can be incorporated easily into software that already provides parental controls to thereby take advantage of the ratings already determined for a large body of content.
  • the proxy can prevent users from disabling the controls, further protecting both the users and the common carrier.
  • FIG. 1 is a screenshot of a list of URLs (Universal Resource Locators) provided by a search engine.
  • FIG. 2 is a screenshot of a display indicating that access to requested content has been denied based on applicable regulations.
  • URLs Universal Resource Locators
  • FIG. 3 is a flowchart of a process for controlling access to requested content based on one or more regulations.
  • FIG. 4 is a table of categories and category levels for describing content.
  • FIG. 5 is a diagram of data describing content.
  • FIG. 6 is a flowchart of a process for determining regulations that apply to a content request.
  • FIG. 7 is a table of regulations.
  • FIG. 8 is a diagram of a proxy that processes client requests for content.
  • FIG. 9 is a diagram of a client that denies access to requested content based on one or more regulations.
  • FIGS. 1 and 2 illustrate a system that denies a user access to content that does not comply with applicable regulations.
  • Such content can include text, graphics, animations, video, sound, and instructions.
  • the content can be embodied in a wide variety of formats such as HTML (HyperText Markup Language), XML (Extensible Markup Language), or MPEG (Moving Pictures Experts Group).
  • HTML HyperText Markup Language
  • XML Extensible Markup Language
  • MPEG Motion Pictures Experts Group
  • URL 100 corresponds to a resource that provides content related to nude beaches.
  • FIG. 2 when a Saudi Arabian citizen attempts to retrieve the nude beach URL 100 content from the network site, the system denies access based on Saudi Arabian regulations that prohibit Saudi Arabian citizens from viewing content that includes nudity. The system provides a display explaining that regulations (e.g., laws, treaties, rules, ordinances, proclamations, or edicts) caused the system to deny access.
  • regulations e.g., laws, treaties, rules, ordinances, proclamations, or edicts
  • the system protects from liability both the citizen attempting to access the content and the carrier transmitting the content. Additionally, even in countries where carriers do not have a duty to monitor content, the use of the system by a carrier to self- regulate the content that the carrier provides can increase the carrier's appeal to a government, for example, when the carrier seeks permission to provide services within a country.
  • FIG. 3 illustrates a process 102 for controlling access to content based on regulations.
  • Process 102 includes determining the nature (e.g., the degree of violence or nudity) of the requested content (step 104), determining regulations (e.g., state, county, national, or international regulations) that apply to the request (step 106), comparing the nature of the requested content with the restrictions imposed by the applicable regulations (step 108), providing access to the content if the content meets the applicable regulations (step 110), and denying access to the content 112, in whole or in part, if the content fails to meet these regulations (step 112).
  • the process 102 may determine the nature of the requested content as described with respect to FIGS. 4 and 5, may impute or obtain the nationality of the requesting user, and may use the nationality to access encoded representations of that nation's regulations, as described with respect to FIGS. 6 and 7.
  • step 104 may include inferring the nature of the requested content from search terms, from metatags associated with search results, from lists or services maintained to categorize requests, or otherwise.
  • the Recreational Software Advisory Council (RSAC) rating scheme 120 includes categories 122- 128 (e.g., violence, nudity, sex, and language) and category levels 130-138 (e.g., zero to four). The scheme can be used to describe content by assigning the content a level 130-138 for each category 122-128.
  • RRC Remote Software Advisory Council
  • the network site shown as "www.sex.com" is rated in accordance with the RSAC scheme including level data for each RSAC category.
  • the rating shown indicates that the network site 142 does not portray any violence 144 (i.e., level “0” 138 of the violence category 122), but does include “provocative displays” 146 (i.e., level "4" 130 of the nudity category 124), “explicit sexual acts” 148 (e.g., level "4" 130 of the sex category 126), and
  • vulgar language 150 e.g., level “4" 130 of the language category 128,.
  • One or more additional categories may be available for other forms of rating.
  • the content need not be described in accordance with the RSAC ratings scheme or any other existing ratings scheme.
  • the ratings scheme used may depend on the common carrier's preference. The use of an established scheme, however, enables the system to use a large existing body of content ratings.
  • Using the RSAC scheme also permits easy modification of software that implements parental controls to also implement regulation- based controls. Preferably, software that enables a user to disable parental controls does not permit the user to disable regulation-based controls.
  • Content rating can be performed in many different ways. For example, an organization may have a human operator retrieve information from different network resources and rate the retrieved information. Alternatively, a program may examine content and automatically determine ratings based on the inclusion of information (e.g., words) associated with different categories.
  • Content ratings can be collected and stored in databases. Such databases can be centralized or distributed across different computers. Alternatively, content ratings can be stored at network sites providing the rated content. These sites can transmit the ratings along with the requested content and let the client or an intervening agent process the ratings.
  • determining applicable regulations can include determining the citizenship of a user, for example, by examining a user's billing address or by accessing data such as a user's self-reported citizenship (step 1 14).
  • Determining applicable regulations 106 can also or alternatively include determining the current location of a user, for example, by determining the access number dialed by a user to connect to a service provider (step 116). Based on this information, the system can determine the applicable regulation(s) by, for example, consulting a look-up table (step 118). Referring to FIG. 7, an exemplary look-up table 129 that is used, e.g., in step
  • the table 118 of FIG. 6, stores encoded representations of regulations of different national, international, and local entities.
  • the table includes regulations encoded in accordance with the RSAC ratings scheme.
  • the table expresses a regulation as the maximum level, or threshold, of permissible content in each of the RSAC categories 160- 168. If a content's category rating exceeds a regulation's category threshold, the content does not meet the regulation. For example, a regulation specifying that content having more than "moderate expletives" (level 2 of the RSAC language category) effectively prohibits access to content including "strong language or hate speech" (level 3 of the RSAC language category). The regulation would also prohibit access to "crude or vulgar language" (level 4 of the RSAC language category).
  • the table 129 can include multiple rows for each jurisdiction to encode different types of regulations (e.g., 170-178).
  • the table 129 can store regulations that independently govern citizens requesting content within a jurisdiction (e.g., 170) and citizens requesting the content outside the jurisdiction (e.g., 172).
  • other regulations can independently regulate access by non-citizens requesting content within the jurisdiction (e.g., 174) and non-citizens requesting content outside the jurisdiction (not shown).
  • the system can determine whether to deny or grant access to the content. For example, if a U.S. citizen requested content from "www.sex.com" (FIG. 5) from a computer in the U.S., the system would deny access because the level of sex in the requested content (i.e., level "4" in FIG. 5) exceeds the maximum level of sex 138 (i.e., level "3" in FIG. 7) permitted in the United States. In this example, if the U.S. citizen made the same request while in another country, the U.S. regulations 146 for citizens abroad would not result in denied access because the level of sex permitted in the other country is "4", the same as the level of sex in the requested content.
  • Regulations of more than one jurisdiction or entity may apply to a request for content.
  • the system can process the different regulations to ensure the content satisfies all applicable regulations. For example, two regulations 176, 178 may apply to a German citizen traveling to Japan. The system ensures that requested content satisfies both regulations 176, 178. If the traveler requested the content of FIG. 6, the system would deny access either on the basis that such access would violate Japan's regulations because the content includes nudity more excessive than "partial nudity" (e.g., level "2" of the nudity category 162) or on the basis that such access would violate Germany's regulations because the content may include hate speech (e.g., content more excessive than level "2" of the language category 166).
  • the techniques described above can be incorporated into a proxy 184 or other intermediate agent that processes content requests.
  • the techniques can be offered by an Internet Service Provider.
  • a proxy 184 processes content requests received from a client 180 via a modem 182 or other communication device by forwarding content requests to content sources 186 (e.g., Internet Web-servers) and returning the responses of the content source 186.
  • content sources 186 e.g., Internet Web-servers
  • the different elements can reside in different jurisdictions 188, 190.
  • the proxy 184 can ensure that information that is returned in response to a content request complies with applicable regulations.
  • the user may be denied the ability to disable the controls, further protecting both the user and the common carrier.
  • the regulation instructions 192 can access regulation data 194 (e.g., the table of FIG. 7), user data such as billing information 196, and content ratings 198 data or instructions.
  • the content ratings 198 may include a table that collects ratings of content available from different content sources 186, e.g., a table including several records such as that shown by FIG. 5.
  • the proxy 184 can determine regulations applicable to the requesting user based, for example, on the user's citizenship or access location and the ratings corresponding to the requested content in the content ratings data 198. If the content does not comply with applicable regulations, the proxy 184 can return information (e.g., HTML instructions and data) indicating that the proxy 184 is not transmitting the requested content due to content regulations.
  • regulations applicable to the requesting user based, for example, on the user's citizenship or access location and the ratings corresponding to the requested content in the content ratings data 198. If the content does not comply with applicable regulations, the proxy 184 can return information (e.g., HTML instructions and data) indicating that the proxy 184 is not transmitting the requested content due to content regulations.
  • FIG. 8 is merely illustrative and other embodiments could implement the system differently or could add or omit elements.
  • the proxy 184 could receive content ratings in data supplied by a content source 186 responding to a request.
  • the system could dynamically determine the nature of requested content using software that examines the content. Further, the system need not store user data 196, but could instead infer citizenship information based on the access location of the modem 182 or other communication device used by the client 180.
  • the techniques described above are not limited to use in a proxy or other intermediate agent, but instead could reside in the client 180.
  • the regulation instructions 192 access regulation data 194 and user data 196.
  • the regulation data 194 may or may not be much more limited in scope or volume than the comprehensive list of regulations shown in FIG. 7.
  • an American client may only include regulations that apply to U.S. citizens.
  • user data 196 need not be stored, but can be dynamically obtained, for example, by querying an operating system registry.
  • the regulation instructions 192 can prevent presentation of information that does not comply with applicable regulations.
  • the methods and techniques described here may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them.
  • Apparatus embodying these techniques may include appropriate input and output devices, a computer processor, and a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor.
  • a process embodying these techniques may be performed by a programmable processor executing a program of instructions to perform desired functions by operating on input data and generating appropriate output.
  • the techniques may advantageously be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device.
  • Each computer program may be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language may be a compiled or interpreted language.
  • Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory.
  • Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM disks. Any of the foregoing may be supplemented by, or incorporated in, specially-designed ASICs (application-specific integrated circuits).

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Graphics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

La commande d'accès au contenu demandé, consiste à accéder à des informations décrivant le contenu demandé, là des informations décrivant au moins une réglementation relative au contenu demandé et aux informations géographiques, et à déterminer si les informations du contenu sont conformes à la/aux réglementations.
PCT/US2000/012916 1999-05-11 2000-05-11 Commande d'acces au contenu WO2000068764A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CA002373483A CA2373483A1 (fr) 1999-05-11 2000-05-11 Commande d'acces au contenu
EP00930603A EP1177493A1 (fr) 1999-05-11 2000-05-11 Commande d'acces au contenu
JP2000616483A JP2002544582A (ja) 1999-05-11 2000-05-11 コンテンツへのアクセス制御
AU48396/00A AU4839600A (en) 1999-05-11 2000-05-11 Controlling access to content

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13341999P 1999-05-11 1999-05-11
US60/133,419 1999-05-11

Publications (1)

Publication Number Publication Date
WO2000068764A1 true WO2000068764A1 (fr) 2000-11-16

Family

ID=22458545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/012916 WO2000068764A1 (fr) 1999-05-11 2000-05-11 Commande d'acces au contenu

Country Status (5)

Country Link
EP (1) EP1177493A1 (fr)
JP (1) JP2002544582A (fr)
AU (1) AU4839600A (fr)
CA (1) CA2373483A1 (fr)
WO (1) WO2000068764A1 (fr)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003090049A2 (fr) * 2002-04-17 2003-10-30 General Instrument Corporation Systeme de gestion de droits numeriques destine a des clients ayant un faible niveau de securite
EP1331543A3 (fr) * 2002-01-19 2004-06-09 Hewlett-Packard Company (a Delaware corporation) Contrôle d'accès
GB2406670A (en) * 2003-09-30 2005-04-06 Motorola Inc Allowing access to online information to users of verified citizenship
JP2005535971A (ja) * 2002-08-14 2005-11-24 メッセージラボズ リミテッド 外部オブジェクトへのリンクを含む電子ドキュメントをスキャンするための方法およびシステム
GB2422453A (en) * 2005-01-22 2006-07-26 Hewlett Packard Development Co Dynamically allocating resources according to a privacy policy
US7251328B2 (en) 2003-01-14 2007-07-31 General Instrument Corporation System for secure decryption of streaming media using selective decryption of header information and decryption of reassembled content
JP2008009994A (ja) * 2007-07-05 2008-01-17 Ge Medical Systems Global Technology Co Llc 医用画像提供システム、プロトコル利用システム、利用端末、およびプロトコル管理サーバ装置
US7487540B2 (en) 2003-04-25 2009-02-03 Messagelabs Limited Method of, and system for, replacing external links in electronic documents
AU2007234620B2 (en) * 2000-06-16 2010-04-08 Mih Technology Holdings Bv Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM)
US7697653B2 (en) 2004-03-23 2010-04-13 Ntt Docomo, Inc. Mobile station and output control method
US7706540B2 (en) 2002-12-16 2010-04-27 Entriq, Inc. Content distribution using set of session keys
US7991697B2 (en) 2002-12-16 2011-08-02 Irdeto Usa, Inc. Method and system to digitally sign and deliver content in a geographically controlled manner via a network
US8576730B2 (en) 2004-03-31 2013-11-05 Time Warner, Inc. Method and system for determining locality using network signatures

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997049245A1 (fr) * 1996-06-19 1997-12-24 Canadian V-Chip Design Inc. Procede et appareil de blocage selectif de signaux audio et video
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
EP0828209A2 (fr) * 1996-09-04 1998-03-11 Samsung Electronics Co., Ltd. Système d'ordinateur comprenant une fonction d'interception de programmes impudiques/violents et méthode pour commander l'accès à tels programmes impudiques/violents
EP0893920A2 (fr) * 1997-07-22 1999-01-27 International Business Machines Corporation Système pour la modification dynamique du contenu d'un flux de données multimédia
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
WO1997049245A1 (fr) * 1996-06-19 1997-12-24 Canadian V-Chip Design Inc. Procede et appareil de blocage selectif de signaux audio et video
EP0828209A2 (fr) * 1996-09-04 1998-03-11 Samsung Electronics Co., Ltd. Système d'ordinateur comprenant une fonction d'interception de programmes impudiques/violents et méthode pour commander l'accès à tels programmes impudiques/violents
EP0893920A2 (fr) * 1997-07-22 1999-01-27 International Business Machines Corporation Système pour la modification dynamique du contenu d'un flux de données multimédia

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2007234620B2 (en) * 2000-06-16 2010-04-08 Mih Technology Holdings Bv Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM)
US7302591B2 (en) 2002-01-19 2007-11-27 Hewlett-Packard Development Company, L.P. Access control
EP1331543A3 (fr) * 2002-01-19 2004-06-09 Hewlett-Packard Company (a Delaware corporation) Contrôle d'accès
WO2003090049A3 (fr) * 2002-04-17 2004-03-04 Gen Instrument Corp Systeme de gestion de droits numeriques destine a des clients ayant un faible niveau de securite
WO2003090049A2 (fr) * 2002-04-17 2003-10-30 General Instrument Corporation Systeme de gestion de droits numeriques destine a des clients ayant un faible niveau de securite
JP2005535971A (ja) * 2002-08-14 2005-11-24 メッセージラボズ リミテッド 外部オブジェクトへのリンクを含む電子ドキュメントをスキャンするための方法およびシステム
US7706540B2 (en) 2002-12-16 2010-04-27 Entriq, Inc. Content distribution using set of session keys
US7991697B2 (en) 2002-12-16 2011-08-02 Irdeto Usa, Inc. Method and system to digitally sign and deliver content in a geographically controlled manner via a network
US7251328B2 (en) 2003-01-14 2007-07-31 General Instrument Corporation System for secure decryption of streaming media using selective decryption of header information and decryption of reassembled content
US7487540B2 (en) 2003-04-25 2009-02-03 Messagelabs Limited Method of, and system for, replacing external links in electronic documents
GB2406670A (en) * 2003-09-30 2005-04-06 Motorola Inc Allowing access to online information to users of verified citizenship
US7697653B2 (en) 2004-03-23 2010-04-13 Ntt Docomo, Inc. Mobile station and output control method
US8576730B2 (en) 2004-03-31 2013-11-05 Time Warner, Inc. Method and system for determining locality using network signatures
GB2422453A (en) * 2005-01-22 2006-07-26 Hewlett Packard Development Co Dynamically allocating resources according to a privacy policy
US9137113B2 (en) 2005-01-22 2015-09-15 Hewlett-Packard Development Company, L.P. System and method for dynamically allocating resources
JP2008009994A (ja) * 2007-07-05 2008-01-17 Ge Medical Systems Global Technology Co Llc 医用画像提供システム、プロトコル利用システム、利用端末、およびプロトコル管理サーバ装置
JP4616312B2 (ja) * 2007-07-05 2011-01-19 ジーイー・メディカル・システムズ・グローバル・テクノロジー・カンパニー・エルエルシー プロトコル利用システム

Also Published As

Publication number Publication date
JP2002544582A (ja) 2002-12-24
EP1177493A1 (fr) 2002-02-06
AU4839600A (en) 2000-11-21
CA2373483A1 (fr) 2000-11-16

Similar Documents

Publication Publication Date Title
AU2003204349A1 (en) Content filtering for web browsing
WO2000068764A1 (fr) Commande d'acces au contenu
US6742040B1 (en) Firewall for controlling data transfers between networks based on embedded tags in content description language
US6701415B1 (en) Selecting a cache for a request for information
US7089246B1 (en) Overriding content ratings and restricting access to requested resources
CA2369108C (fr) Traitement d'une demande d'information fournie par un site de reseau
US7636777B1 (en) Restricting access to requested resources
JP4891299B2 (ja) Ipアドレスを用いるユーザ認証システム及びその方法
US8161068B2 (en) Access control system
CA2196867C (fr) Systeme et methode de controle de l'acces a une base de donnees
US5889958A (en) Network access control system and process
US20050022013A1 (en) Method for customized data output on a web site
WO1998041913A2 (fr) Procede et systeme de filtrage du contenu d'informations recuperees sur un reseau informatique internet
WO1998028690A9 (fr) Procede et syteme de commande d'acces au reseau
JPH0926975A (ja) データベース・アクセス管理のためのシステムと方法
JP2001503178A (ja) データベースアクセスシステム
RU2004133859A (ru) Объектная модель для управления услугами межсетевого экрана
US20070192184A1 (en) Web access control
US8141124B2 (en) Managing community provided in information processing system
Greenfield et al. Effectiveness of Internet filtering software products
MXPA01002103A (es) Metodo y sistema para un administrador de acceso que otorga privilegios dentro de una red de comunicaciones.
US20040210758A1 (en) Internet security system utilizing an user ID card reader integrated type keyboard
Palme Choices in the Implementation of Rating
US7043554B2 (en) Networker server, method for controlling transmission of a hypertext and recording medium storing a hypertext
TR2021016603A2 (tr) Konuma göre eri̇şi̇m kisitlamasi sağlayan si̇stem ve yöntem

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2373483

Country of ref document: CA

Ref country code: CA

Ref document number: 2373483

Kind code of ref document: A

Format of ref document f/p: F

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 616483

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 2000930603

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2000930603

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 2000930603

Country of ref document: EP