WO2010117252A1 - Un método y un sistema para controlar el uso de un dispositivo electrónico - Google Patents
Un método y un sistema para controlar el uso de un dispositivo electrónico Download PDFInfo
- Publication number
- WO2010117252A1 WO2010117252A1 PCT/MX2009/000051 MX2009000051W WO2010117252A1 WO 2010117252 A1 WO2010117252 A1 WO 2010117252A1 MX 2009000051 W MX2009000051 W MX 2009000051W WO 2010117252 A1 WO2010117252 A1 WO 2010117252A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- electronic device
- validation
- questions
- entry
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000004044 response Effects 0.000 claims abstract description 55
- 230000009471 action Effects 0.000 claims abstract description 24
- 238000010200 validation analysis Methods 0.000 claims description 111
- 238000012795 verification Methods 0.000 claims description 13
- 230000000903 blocking effect Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 9
- 230000000694 effects Effects 0.000 description 8
- 238000004364 calculation method Methods 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to a method for controlling the use of an electronic device used by a user. Specifically, this invention relates to a method for applying the restrictions corresponding to the use of the electronic device when certain conditions have been satisfied, canceling or preserving said restrictions depending on the expected or unexpected response entered by the user.
- the invention also relates to a system and a computer program that controls the use of an electronic device used by a suitable user to carry out said method.
- the Apple website located at the URL http: //docs. ⁇ fo.apple.com/article.html? Path Mac / 10.4 / en / mh2042.html. with the title “10 Ways to work safer”, refers to the systems operational that include screensavers protected by a password.
- password protected screensavers allow you to protect a computer against misuse when the user leaves your computer unattended.
- the user can configure the computer for self-locking after a certain period of inactivity and can only be activated if the user knows and enters the predefined password.
- the US7106845 patent of the United States of America reveals several security methods based on changing passwords.
- One of these methods employs an algorithm that changes the values, where this algorithm is known to the user.
- the algorithm can be a series of digits based on the following: time of day, day of the week, season of the year, AM or PM, day of the month, and month of the year. If the user knows the order of the above, the user can easily generate the appropriate numerical code that corresponds to the current time, and as time changes continuously, the numerical code also necessarily changes.
- Another method disclosed in this patent consists of randomly sending a part of the previously mentioned information (time of day, day of the week, season of the year, AM or PM, day of the month, and month of the year) to the user, as it could be to your locator (beeper) or phone, adding this fixed information to your PIN number or user number.
- Another method requires a user to interact with a series of predetermined questions that require a numerical answer.
- the order of the questions is random every day or periodically; circumstance that helps to change the user's response to improve their security and to use the questions that only the user would know how to answer (because the answers were previously provided by him).
- Another method uses a matrix of N by M of random numbers, which a user selects from predetermined positions to generate an updated security code.
- identification or validation is shared between the user and the system in the sense that the system administrator or the security administrator, or any other equivalent communicates to the user the criteria (data, algorithms, etc.) that the user must enter for the identification or validation in the system or alternatively the user himself configures the criteria of the identification or validation in the system with the corresponding functionalities for his security.
- the United States patent 2008/0148310 discloses a system for parental control in a communications network. This system offers parents or guardians the possibility of blocking children or users from accessing certain content on the network. There are several ways to identify or validate users (parents and children). For example, the user enters an identification sequence, a username, a password combination, a personal identification number (PIN), etc.
- PIN personal identification number
- this document discloses the means to exchange messages between parents and children.
- the purpose of the message exchange is for parents to be able to dynamically verify compliance with certain resolved conditions such as, for example, did you clean your room? These conditions depend on the behavior of the children and are considered by the parents as requirements to grant the children access to the contents of the media.
- the object of the present invention is to provide a system to control the use of an electronic device by a user, which allows to improve the security related to the use of electronic devices.
- this is achieved through a system that controls the use of an electronic device used by at least one user.
- This system includes sufficient necessary means to verify if at least one condition of the restriction related to the use of the electronic device is satisfied. These means apply to the restriction of the electronic device to force its use.
- these variable means that determine at least one request not requested by the user, are responsible for making it tax for the user to resolve. In addition, these means are responsible for requesting an entry not agreed by the user in response to the unsolicited request made by the electronic device. Finally, these means verify if the input not agreed by the user corresponds to the input provided in the electronic device and thus the means to cancel the restriction on the use of the electronic device disappear and the user can continue using it.
- This system allows to improve the security related to the use of the electronic device by adding a level of security based on requests not requested and obtained by the electronic device in addition to requesting the non-agreed entries, that is, the user is validated in the system to use the electronic device through various variable validation criteria such as data, algorithms, among others, without previously agreeing or sharing these variable validation criteria with the system.
- the provision of the means to verify if at least one condition of the restriction related to the use of the electronic device has been satisfied, allows to detect any incident in the use of the electronic device that requires a certain action by the user to activate The restriction, according to the security policy previously defined in the system of the present invention.
- the condition of the restriction can be, for example: the maximum time of use of the electronic device has been reached, or a specific security command has been executed, for example, a user name has been entered, or it has been selected to execute a specific application, or it has been selected to have access to certain contents, or the system administrator has generated a certain signal, or an alarm indication, or any other similar one has been received.
- the restriction can be for example: locking or blocking the electronic device, locking or blocking another device connected to the electronic device, denying access to certain functions, denying access to certain contents, turning off the electronic device, or any other similar one.
- the disposition of the variable means to determine at least one request not requested by the user finally allows to apply a certain predefined class of action that validates blocking or allowing access to the user depending on the validity of the entry by the user.
- a request no requested by the user refers to the generation of a certain kind of communication that indicates the user's obligation to do something in the system that validates their action, which has not been previously agreed between the user and the system administrator or its equivalent , that is, there is no information previously shared between the user and the system that refers to the valid action already indicated above.
- the objective of determining the unsolicited request in a variable way is not to repeat the content. For example, in the same session of the use of the electronic device, the maximum time of use can be reached (restrictive condition) at two different times, requiring in both cases a certain valid action by the user. Then, the objective is to assign different contents to each of the said requests to be validated.
- the commented variability has a general scope with various contents and not limited to a single content in the same session.
- the provision of the means to receive an entry not agreed by the user in response to the unsolicited request allows obtaining the content of an action that the user validates, for example, the answers to the corresponding questions.
- the concept of the entry not agreed by the user refers to the fact that the content of this entry has not been shared between the user and the system, that is, this content has been predefined by a third party or by the "controlling user", other than the "end user".
- the means to verify if the user input corresponds to the input provided by the controlling user allows checking the validity of the user input predefined by the "controlling user".
- the provision of the means to cancel the restriction action applied to the electronic device allows the electronic device to revert to its original state just before the application of the restriction action. For example, considering that the restrictive action is to block the electronic device, the mentioned means allow it to be unlocked once certain conditions have been satisfied.
- the system comprises the means to establish at least one connection to a communications network (a global communications network such as Io is the Internet).
- a communications network a global communications network such as Io is the Internet.
- Io global communications network
- These means allow to obtain the data that is stored from remote sites, or to configure the system from a remote site or, in general, to operate the system from remote sites, or from any other installation or medium.
- the connection can be very useful for the uses of parental control, in this case the school, the institute, the academy or any other kind of educational organization where, for example, children are studying and this connection can be a good provider of predetermined questions of validation and expected default validation responses.
- the system comprises the means for connecting at least one electronic device, allowing the system to control the use of electronic devices (one or more).
- the system acts as a central controller of the use of all electronic devices that are connected to the system. Therefore, the system could be referred to as a multi-device controller.
- the system comprises a repository for storing data related to at least one user of the electronic device.
- Some examples of the data are the restrictive conditions, restrictive actions, unsolicited requests, non-agreed entries, monitoring of user activity, etc.
- the invention also relates to an electronic device comprising the means for connecting the system and controlling the use of the electronic device by at least one user, as mentioned. previously.
- the invention provides an electronic device comprising the system for controlling the use of the electronic device for at least one user.
- This electronic device can be, for example, a computer, a mobile phone, a video game console, a cable television decoder, a GPS, etc.
- a second aspect of the invention is to provide a method to control the use of an electronic device by at least one user, the method comprises the following steps:
- the restriction condition comprises a time limit for use and this restriction condition is satisfied when the user's time exceeds said time limit.
- a more advanced method comprises a step (h) that is to calculate the user use time to be able to evaluate the restrictive condition based on its time limit of use, which may or may not exceed depending on the user's time limit.
- the unsolicited request comprises a predetermined number of validation questions and the entry not agreed by the user comprises at least one validation response for each of the validation questions.
- validation questions-answers can be defined depending on the environment in which the security related to the use of electronic devices is intended to be improved. For example, in a research environment, where there is a lot of confidential data shared among the members of the research team, the questions can be about confidential data in order to ensure that electronic devices are used only by members of the research team. investigation. In this case, the questions and answers and in general the related parameters can be configured by the project leader ("controlling user").
- Another example could be the environment of a department or a division in a company or any other kind of organization.
- the questions and answers can be defined in terms of technical knowledge, "know how" or industrial secrets, about the internal organization of the company or any other confidential matter.
- the questions and answers and other parameters can be defined according to the educational level of the children, more precisely they can be considered on the content that the children are studying at each moment.
- this education based on questions and answers can give parents ("controlling users") a good and constantly updated indicator of the educational evolution of their children. This is a much more reliable indicator than, for example, any children's response to a dynamic question such as have you done the homework?
- the method comprises a step (i) that provides a repository of questions and answers to store at least one predetermined validation question and at least one expected predetermined validation response related to the predetermined validation question.
- the repository of questions and answers comprises an indicator of the educational level for each predetermined validation question stored in said repository of questions and answers.
- the validation questions are predetermined validation questions randomly obtained from the repository of questions and answers.
- the method comprises a step (j) of obtaining an income from the administrator user or "controlling user” to configure the parameters included in the repository of the questions and answers.
- the method comprises a step (k) of obtaining an entry from the administrator user or "controlling user” to configure the parameters included in the user repository, for example:
- the method comprises a step (I) that keeps track of the user's activity.
- step (I) of keeping track of user activity the results are stored in the corresponding log (unstructured data).
- This tracking data can also be stored in a structured way, for example in the user repository considering at least one of the following data:
- the method comprises a step (m) to initially obtain the user-related parameters in the user repository to control the use of the electronic device by said user.
- the validation questions are predetermined validation questions with an educational level indicator that is related to the user's educational level.
- the method further comprises a step (n) to obtain questions and answers from a remote site through a connection to a communications network and store the questions and answers in the question and answer repository.
- the method further comprises a step (or) to obtain the input of an administrator or "controlling user" of a remote site through a connection to a communications network, to configure the parameters included in the repository of questions and answers and in the user repository.
- step (f) of verification of the non-agreed input received produces one of the following two possible results:
- the restrictive action is the blocking of the electronic device.
- the restriction action is the blocking of the input / output of a device connected to the electronic device.
- the input / output device is a keyboard.
- the validation questions are based on evidence.
- the validation questions include multimedia content.
- the invention provides a computer program comprising programming instructions to cause the computer to execute the method to control access to an electronic device by at least one user.
- the computer program can be represented on storage media such as recording media, computer memory, read-only memory, or it can be carried on a carrier signal, be it an optical or electronic signal.
- FIGURE 1A is a pictorial diagram illustrating a configuration of a computing device
- FIGURE 1 B is a pictorial diagram illustrating a network environment where a computing device of FIGURE 1 can operate;
- FIGURE 1C is a representation of a dialog window requesting the entry of a password to enter the system of the invention.
- FIGURE 2 is a representation of a dialog window for changing the password to enter the system of the invention
- FIGURE 3 is a representation of the screen related to the functionality to configure the condition of the restriction (blocking of the electronic device) and of the unsolicited request (validation questions) for a given user, according to the invention
- FIGURE 4 is a representation of one of the screens related to the tracking functionality, given an overview of the activity of a particular user, according to the invention
- FIGURE 5 is a representation of one of the screens related to the unsolicited request functionality, in particular showing a validation question included in the unsolicited request.
- FIGURE 6 is a schematic representation of the interaction between the main modules in the system of the invention.
- FIGURE 7 is an illustrative flow chart of a method for the control of an electronic device.
- the system to control the use of an electronic device At least one user is a parental control system and the electronic device is a computer.
- said parental control is comprised in computer which comprises an operating system, which can be Windows, or Apple, or Linux, or any other operating system.
- FIGURE 1A is a pictorial diagram illustrating the configuration of a computing device 100.
- the computing device 100 may include a processor 102, a memory module 104, one or more mass storage devices 114, a network interface 116, an input / output interface 120, an interface to a display device 122, and a database storage 126.
- the memory module may include an area for storage of the operating system 106, and other areas for software applications 108 and 110 additional to the shared memory areas 112.
- a data and / or control bus 124 can jointly connect one or more of the components mentioned above.
- the computing device 100 may be a Lap Top PC, a desktop computer, a PDA (Digital Personal Assistant), a Smart Phone, a Cell Phone, a diskless network terminal or other computing device. Additionally, the computing device 100 can be configured for use as a client or server computing device in a client-server computing environment.
- Mass storage devices 114 may be used to store data and / or executable code that if and / or when executed by processor 102 causes processor 102 to perform certain actions such as those described above.
- the mass storage devices 114 can be coupled to the processor 102 via several connections such as those of the input / output interface 120, network interface 116, or other storage interface, such as a SCSI (Small Computer Interface System).
- SCSI Small Computer Interface System
- the storage of the database 126 can be implemented using mass storage devices 114.
- the storage of the database can be implemented separately from the mass storage devices 114, for example, in a remote server connected to a computer network.
- a computing device 100 may include all or some of the components mentioned above. Additionally, a computing device 100 may include other components generally found in computing devices that are not mentioned above. For example, a computing device 100 may include pointing devices, such as the mouse, the touch panel, and the like; a mathematical co-processor, a reading card for reading several memory cards, such as flash disks, and the like.
- the computing device 100 can be configured using various software components suppliers of different functionalities.
- a software module such as a Web Server may be installed on the computing device 100 to enable the computing device 100 to behave like a Web Server and provide Web pages to other client computing devices through a computer network.
- FIGURE 1 B is a pictorial diagram illustrating a network environment where a computing device 100 of Figure 1 can operate.
- network 140 is used for communication between several computing devices 142-148.
- computing devices 142-148 can be client or server computing devices that interact with each other through network protocols, such as HTTP (Hyper Text Transmission Protocol).
- HTTP Hyper Text Transmission Protocol
- An example of a network 140 is the Internet Network.
- Network 140 can also be implemented as a LAN (Local Area Network), a WAN (Wide Area Network), or other network architecture.
- the computing devices 142-148 can communicate and exchange information with each other through wireless signals encoded in a transport signal by modulating said signal.
- CDMA Multiple Access by Division of Code
- TDMA Multiple Time Division Access
- AM Modulated Amplitude
- FM Modulated Frequency
- QAM Quadrature Amplitude Modulation
- the parental control system comprises a database for the storage of data related to the users of the computer and data related to the validation questions and answers, that is, the predetermined validation questions and their related expected expected validation responses.
- This database includes the following data related to each user on the computer:
- Data for monitoring user activity o Number of user accesses (or use sessions), that is, the number of authentications made by the user. o Duration of each user access (the time between entering and leaving the same session of use); o Number of user not agreed entries in each usage session; o Number of validation questions answered for each unwanted user input:
- the database also comprises three levels of data related to the default validation questions and the expected default validation answers:
- Module identifier unique key
- Description of the module e.g. first grade of primary school
- the parental control system for the present preferred representation also comprises several modules.
- Figure 6 is a schematic representation of the interaction between the main modules, according to the present representation.
- Each of the aforementioned modules is related to a module of a computer program or a computer program.
- the user authentication module allows the authentication of the users (of any paper, "controller” or “final” user), receiving the username and password provided by the user, validating them according to the corresponding data stored in the database of data and obtaining the rest of the data related to the user of the system in which it is initially configured.
- the configuration module allows the "controlling user” to predefine the initial conditions of the system and includes functionalities for the configuration of the parameters related to the "end users”: threshold of time of use (or maximum time of use), number of questions of validation included in requests not requested from the user, minimum number of "correct” validation answers to determine the validity of the user's unwanted income, educational modules which are applied to the user (educational level indicator), etc.
- the time calculation module 600 determines when the user exceeds the predefined time threshold of use to block the computer.
- the lock / unlock module 601 blocks the computer when the time calculation module determines that the user has exceeded the time threshold and unlocks the computer when the response verification module 603 determines the certainty of the validation responses provided by the Username.
- the administration module of the questions 602 randomly selects the predetermined validation questions to produce the request not requested from the user making them accessible to the user to obtain the corresponding validation response.
- This random selection of validation questions takes into account the set of the question-answer identifiers which have been applied to the user in the last predetermined period (last week, last month, etc.) to avoid the repetition of the validation questions in different occurrences of requests not requested from the user.
- the response verification module 603 determines the certainty of the validation responses entered by the user, comparing said responses with the expected predetermined validation responses according to the predetermined validation questions stored in the database.
- the tracking module 604 keeps track of the user's activity and updates the corresponding data in the database, more specifically the data of the user's activity tracking, for example, the number of user accesses, the duration of each user access, the number of unwanted user entries in each usage session, etc.
- the internet connection module allows the system to connect to the internet to obtain predetermined validation questions and expected predetermined answers from remote sites validation, to obtain data related to users from remote sites, and for, in general, Operate the system from remote sites.
- the electronic device control method for example, for parental control, according to one of the representations comprises:
- the routine begins in block 705 and proceeds to block 710 where the conditions of use are evaluated.
- the conditions of use may include time of use, amount of use in terms of bytes of data transferred, to the subject matter of the transmission through the electronic device, amount of prior use by the same user in terms of time and / or number of data bytes, and the like.
- the processing in block 710 starts from an initial state where the user has been previously authenticated in the computer according to the user policies defined in the computer, thus in this initial state, the user is currently using the computer.
- the conditions of use for example, time of use can be determined.
- the time calculation module 600 (see FIGURE 6) can detect when if the user exceeds the usage time threshold, according to the usage time threshold parameter corresponding to the user stored in the database. In case the use time threshold is exceeded, the time calculation module 600 produces a signal 610 to the module lock / unlock 601 requesting the lock of the computer. The time calculation module 600 also generates the tracking data related to the flow 614 for the tracking module 604.
- the parental control method comprises a step for user authentication in the control of the electronic device, for example, the parental control system, which is processed before block 710.
- decision block 715 it is determined when the current conditions of use by the user are prohibited or not. If the current conditions are allowed, the routine proceeds to block 710. If the current conditions are prohibited, the routine proceeds to block 720.
- the lock / unlock module 601 blocks the computer when it receives the signal 610 from the time calculation module 600 requesting the lock of the computer, generating the tracking data related to the data flow 615 for the module Track 604 and produce signal 611 for the question management module 602 to execute the next step.
- the question management module 602 randomly obtains a predetermined number of validation questions, according to the predetermined number of validation questions comprising the unsolicited request.
- the module of administration of questions 602 identifies the predetermined validation questions related to the user, first obtaining the reference to the educational modules related to the user, secondly obtaining the educational topics related to said modules and thirdly obtaining the questions randomly Validation defaults related to such educational issues.
- the question management module 602 avoids selecting validation questions that have already been selected in previous occurrences of unwanted requests considering a predetermined period of time (last week, last month, - etc.) for the same user
- the question management module 602 displays the validation questions determined in the previous step through the screen, in order to obtain the corresponding validation response from the user.
- the validation questions and multiple choice answers to the validation questions are displayed. The user must select the correct answer from the multiple choice responses to meet the requirements of use of the electronic device.
- only the validation questions are displayed. In this representation, the user can enter answers openly to validation questions, for example, using a text box. The response can then be evaluated by verification module 603, described broadly below, based on validation algorithms.
- the user's open response to the validation question may not need to be an answer exactly the same as the expected response. That is, while the essence of the response is correct, the form of the response is treated with flexibility. For example, if the validation question is "What is the population of the USA? The answer can be any of" 300,000,000 ",” The population of the USA is 301 M ",” it is approximately 302 million ", and the like Finally, the response management module 602 generates the related tracking data through the data stream 616 for the tracking module 604 and produces a signal 612 for the response verification module 603 for the execution of the next step.
- the response verification module 603 obtains the validation responses included in the user's unwanted entry in response to the unsolicited request. Next, the response verification module 603 compares the user's validation responses with the corresponding "correct" predetermined validation responses stored in the database. Then, if the number of successful validation responses is greater than or equal to the predetermined minimum number of validation responses, the response verification module 603 produces a signal 613 for the lock / unlock module 601 requesting the unlocking of the computer. The verification module of Responses 603 also generates related tracking data through data flow 617 for tracking module 604.
- decision block 740 if the answers given are correct, the routine proceeds to block 745. If the answers are incorrect, the routine proceeds back to block 725.
- the tracking module 604 updates the tracking data related to the user corresponding to the values received through the data streams 614 , 615, 616 and 617 of the time calculation module 600, the lock / unlock module 601, the question management module 602 and the answer verification module 603 respectively.
- Figure 1C is a dialog window 152 illustrating the request for the entry of the password to log in to the invention system.
- This dialog window comprises the following main elements:
- said dialogue window may even comprise the user's username.
- Figure 2 is a representation of the dialog window 202 for changing the user's login password in the invention system.
- This dialogue includes the following main elements:
- FIG. 3 is a representation of the screen related to the functionality for the configuration of the restriction condition (blocking of the electronic device) and the unsolicited request (validation questions) for a given user, according to the invention.
- This screen includes the following main elements:
- a modifiable list 308 that allows the "controlling user” to assign the educational modules to the user comprises the following three columns: or “Active”, to activate or deactivate the corresponding educational module assigned to the user; or “Module”, which allows the "controlling user” to select the educational module to be assigned to the user. or “Description”, which displays a description of the selected educational module.
- FIG. 4 is a representation of one of the screens 402 related to the tracking functionality, said screen giving a specific panorama about the activity of a certain user.
- This screen includes the following main elements:
- FIG. 5 is a representation of one of the screens 502 related to the functionality of the unsolicited request, in particular showing a validation question included in the unsolicited request, according to the invention.
- This screen includes the following main elements: • The label "What are the prime factors of: 4500?", Which represents the validation question;
- the invention also extends to computer programs, particularly computer programs in or on a carrier, adapted to put the invention into practice.
- the program can be in the form of source code, object code, an intermediate code between source and object as in a partially compiled form, or in any other form suitable for use in the implementation of the process according to the invention.
- the bearer can be an entity or device capable of carrying the program.
- the carrier may comprise a storage medium, such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a flexible disk or a hard disk.
- a storage medium such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a flexible disk or a hard disk.
- the carrier can be a transmissible carrier as an electrical or optical signal, which can be transported via an electrical or optical cable or by radio or other means.
- the carrier When the program is represented in a signal that can be carried directly by a cable or other device or means, the carrier may be constituted by said cable or another device or means. Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted to perform, or to use in representing, the relevant processes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Selective Calling Equipment (AREA)
- Control Or Security For Electrophotography (AREA)
- Facsimiles In General (AREA)
- Details Of Television Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012504635A JP2012523609A (ja) | 2009-04-08 | 2009-06-03 | 電子機器の使用を制御する方法及びシステム |
CA2757923A CA2757923A1 (en) | 2009-04-08 | 2009-06-03 | Method and system for controlling the use of an electronic device |
CN2009801597695A CN102460449A (zh) | 2009-04-08 | 2009-06-03 | 用于控制电子装置的使用的方法和系统 |
BRPI0924004A BRPI0924004A2 (pt) | 2009-04-08 | 2009-06-03 | método e sistema para controlar o uso de um dispositivo eletrônico |
IL215577A IL215577A0 (en) | 2009-04-08 | 2011-10-06 | Method and system for controlling the use of an electronic device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EPEP09157658 | 2009-04-08 | ||
EP09157658A EP2239679A1 (en) | 2009-04-08 | 2009-04-08 | A method and a system for controlling the use of an electronic device |
US12/429,091 US20100263055A1 (en) | 2009-04-08 | 2009-04-23 | Method and system for controlling the use of an electronic device |
US12/429091 | 2009-04-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010117252A1 true WO2010117252A1 (es) | 2010-10-14 |
Family
ID=41055241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/MX2009/000051 WO2010117252A1 (es) | 2009-04-08 | 2009-06-03 | Un método y un sistema para controlar el uso de un dispositivo electrónico |
Country Status (9)
Country | Link |
---|---|
US (1) | US20100263055A1 (es) |
EP (1) | EP2239679A1 (es) |
JP (1) | JP2012523609A (es) |
CN (1) | CN102460449A (es) |
BR (1) | BRPI0924004A2 (es) |
CA (1) | CA2757923A1 (es) |
CL (1) | CL2011002478A1 (es) |
IL (1) | IL215577A0 (es) |
WO (1) | WO2010117252A1 (es) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2431904A1 (en) * | 2010-09-21 | 2012-03-21 | Research In Motion Limited | Circumstantial authentication |
CN102456180A (zh) * | 2010-10-28 | 2012-05-16 | 鸿富锦精密工业(深圳)有限公司 | 测量仪器使用信息管控系统及方法 |
US20120158468A1 (en) * | 2010-12-20 | 2012-06-21 | Wheeler Clair F | Method Of Providing Access Management In An Electronic Apparatus |
CN102521539A (zh) * | 2011-12-08 | 2012-06-27 | 广东步步高电子工业有限公司 | 一种可靠的移动装置密码保护方法 |
US9887887B2 (en) | 2012-07-09 | 2018-02-06 | Eturi Corp. | Information throttle based on compliance with electronic communication rules |
US9847948B2 (en) | 2012-07-09 | 2017-12-19 | Eturi Corp. | Schedule and location responsive agreement compliance controlled device throttle |
US10079931B2 (en) | 2012-07-09 | 2018-09-18 | Eturi Corp. | Information throttle that enforces policies for workplace use of electronic devices |
US9854393B2 (en) | 2012-07-09 | 2017-12-26 | Eturi Corp. | Partial information throttle based on compliance with an agreement |
US8966064B2 (en) | 2012-07-09 | 2015-02-24 | Parentsware, Llc | Agreement compliance controlled electronic device throttle |
WO2014085551A1 (en) * | 2012-11-27 | 2014-06-05 | Sampson Raven | Systems and methods of electronic equipment regulation |
CN105488370B (zh) * | 2014-09-15 | 2018-07-27 | 酷派软件技术(深圳)有限公司 | 一种儿童模式的解锁方法及装置 |
CN105808078A (zh) * | 2014-12-29 | 2016-07-27 | 宇龙计算机通信科技(深圳)有限公司 | 一种解锁方法、系统及终端 |
CN104615429A (zh) * | 2015-01-23 | 2015-05-13 | 百度在线网络技术(北京)有限公司 | 终端的解锁方法和装置 |
CN105373716A (zh) * | 2015-12-02 | 2016-03-02 | 广东小天才科技有限公司 | 一种屏幕解锁方法及系统 |
US10332412B2 (en) * | 2015-12-18 | 2019-06-25 | Eugene David SWANK | Method and apparatus for adaptive learning |
CN105635446A (zh) * | 2015-12-21 | 2016-06-01 | 东莞酷派软件技术有限公司 | 应用程序的管理方法、管理装置及终端 |
WO2018017739A1 (en) * | 2016-07-20 | 2018-01-25 | Eturi Corp. | Partial information throttle based on compliance with an agreement |
US10270833B2 (en) * | 2017-01-09 | 2019-04-23 | International Business Machines Corporation | Intelligent insertion of secondary content in live streaming |
US10885165B2 (en) * | 2017-05-17 | 2021-01-05 | Forescout Technologies, Inc. | Account monitoring |
US10440063B1 (en) | 2018-07-10 | 2019-10-08 | Eturi Corp. | Media device content review and management |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227574A (zh) * | 2007-12-24 | 2008-07-23 | 康佳集团股份有限公司 | 一种电视节目锁定方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU3272095A (en) * | 1994-07-28 | 1996-02-22 | Henry C. Yuen | Apparatus and methods for controlling educational and amusement use of a television |
US5774525A (en) * | 1995-01-23 | 1998-06-30 | International Business Machines Corporation | Method and apparatus utilizing dynamic questioning to provide secure access control |
US7106845B1 (en) | 2000-06-26 | 2006-09-12 | Accessline Communications Corporation | Dynamic security system and method, such as for use in a telecommunications system |
US6648153B2 (en) * | 2000-10-23 | 2003-11-18 | Supplypro, Inc. | Supply cabinet |
JP2002169455A (ja) * | 2000-12-04 | 2002-06-14 | Hiroaki Kaneko | 教育方法及びそのシステム |
BR8100120U (pt) | 2001-01-29 | 2002-10-15 | Clovis Golfetto | Sistema de identificação segura em sistemas bancários, financeiros e de informações eletrônicos |
JP2003195736A (ja) * | 2001-12-26 | 2003-07-09 | Toshiba Corp | 問題自動作成・成績評価システム |
US20030126092A1 (en) * | 2002-01-02 | 2003-07-03 | Mitsuo Chihara | Individual authentication method and the system |
US7356836B2 (en) * | 2002-06-28 | 2008-04-08 | Microsoft Corporation | User controls for a computer |
US7454615B2 (en) * | 2003-05-08 | 2008-11-18 | At&T Intellectual Property I, L.P. | Centralized authentication system |
US20050154897A1 (en) * | 2004-01-13 | 2005-07-14 | International Business Machines Corporation | Protected access to a secured entity through a randomly selected password requested through an interactive computer controlled display terminal |
US7874011B2 (en) * | 2006-12-01 | 2011-01-18 | International Business Machines Corporation | Authenticating user identity when resetting passwords |
US8190754B2 (en) | 2006-12-14 | 2012-05-29 | Verizon Patent And Licensing Inc. | Parental controls in a media network |
-
2009
- 2009-04-08 EP EP09157658A patent/EP2239679A1/en not_active Withdrawn
- 2009-04-23 US US12/429,091 patent/US20100263055A1/en not_active Abandoned
- 2009-06-03 JP JP2012504635A patent/JP2012523609A/ja active Pending
- 2009-06-03 CN CN2009801597695A patent/CN102460449A/zh active Pending
- 2009-06-03 WO PCT/MX2009/000051 patent/WO2010117252A1/es active Application Filing
- 2009-06-03 CA CA2757923A patent/CA2757923A1/en not_active Abandoned
- 2009-06-03 BR BRPI0924004A patent/BRPI0924004A2/pt not_active IP Right Cessation
-
2011
- 2011-10-06 IL IL215577A patent/IL215577A0/en unknown
- 2011-10-06 CL CL2011002478A patent/CL2011002478A1/es unknown
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227574A (zh) * | 2007-12-24 | 2008-07-23 | 康佳集团股份有限公司 | 一种电视节目锁定方法 |
Non-Patent Citations (1)
Title |
---|
DATABASE WPI Derwent World Patents Index; AN 2008-K26682, RETRIEVED * |
Also Published As
Publication number | Publication date |
---|---|
JP2012523609A (ja) | 2012-10-04 |
CN102460449A (zh) | 2012-05-16 |
IL215577A0 (en) | 2011-12-29 |
CL2011002478A1 (es) | 2012-02-17 |
US20100263055A1 (en) | 2010-10-14 |
EP2239679A1 (en) | 2010-10-13 |
CA2757923A1 (en) | 2010-10-14 |
BRPI0924004A2 (pt) | 2016-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010117252A1 (es) | Un método y un sistema para controlar el uso de un dispositivo electrónico | |
US20200358777A1 (en) | Token-based access control and grouping | |
US11019048B2 (en) | Password state machine for accessing protected resources | |
Badii et al. | Smart city IoT platform respecting GDPR privacy and security aspects | |
US10432608B2 (en) | Selectively enabling multi-factor authentication for managed devices | |
US10715514B1 (en) | Token-based credential renewal service | |
US10187374B2 (en) | Multi-factor authentication for managed applications using single sign-on technology | |
CA2777079C (en) | Systems and methods for security verification in electronic learning systems and other systems | |
Barik et al. | Risks and remedies in e-learning system | |
Jubur et al. | Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications | |
Costinela–Luminita | Security issues in e-learning platforms | |
Caballero | Information security essentials for information technology managers: Protecting mission-critical systems | |
Markert et al. | " As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication | |
Oesch | An Analysis of Modern Password Manager Security and Usage on Desktop and Mobile Devices | |
Grassi et al. | Draft nist special publication 800-63b digital identity guidelines | |
Torres-Gastelú | Late adoption of preventive measures of online privacy in Mexican and Colombian university students | |
Bcheri et al. | D6. 1 application description for the school deployment | |
Neo et al. | Safe Internet: An Edutainment Tool for Teenagers | |
Haber et al. | Password Hacking | |
Safaie | BYPASS: RECONSIDERING THE USABILITY OF PASSWORD MANAGERS | |
Ionașc | Research on Security Challenges Regarding Online School Education | |
Pietilä | Implementing passwordless identity and access management system for a web application | |
Gandini | The Dark Behind the Web: Dark Web, Deep Web, Fake News, Social Control, AI, Computer Viruses and Hacking | |
Ilyas et al. | Distributed Online Computer-Based Test System for English Exam | |
Carbone | Low Code Approach for Web-Based Access Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980159769.5 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09843114 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2757923 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011002478 Country of ref document: CL Ref document number: 215577 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012504635 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09/02/2012) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09843114 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: PI0924004 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: PI0924004 Country of ref document: BR Kind code of ref document: A2 Effective date: 20111007 |