WO2013186755A2 - Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique - Google Patents
Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique Download PDFInfo
- Publication number
- WO2013186755A2 WO2013186755A2 PCT/IB2013/054890 IB2013054890W WO2013186755A2 WO 2013186755 A2 WO2013186755 A2 WO 2013186755A2 IB 2013054890 W IB2013054890 W IB 2013054890W WO 2013186755 A2 WO2013186755 A2 WO 2013186755A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- party
- computing device
- gender
- age
- content
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 60
- 238000000034 method Methods 0.000 title abstract description 19
- 230000004044 response Effects 0.000 claims abstract description 11
- 238000010200 validation analysis Methods 0.000 claims description 28
- 238000012544 monitoring process Methods 0.000 claims description 9
- 230000005236 sound signal Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 5
- 230000007257 malfunction Effects 0.000 claims description 3
- 244000062645 predators Species 0.000 description 10
- 238000005070 sampling Methods 0.000 description 9
- 230000001568 sexual effect Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000001755 vocal effect Effects 0.000 description 4
- 239000000463 material Substances 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000008921 facial expression Effects 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 230000015654 memory Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000036544 posture Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003595 spectral effect Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000009429 distress Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003370 grooming effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000391 smoking effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Definitions
- the present invention generally relates to the fields of digital communication, computing and security. More specifically, the present invention relates to methods, systems, software applications and computer executable code for checking an implied or declared age and or implied gender of a party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device.
- An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. Online victimization of minors can include child grooming, requests to engage in sexual activities or discussions by an adult, unwanted exposure to sexual material (email with naked pictures, etc.), and online harassment, threats or other aggressive communications that are not sexual in nature but cause distress, fear or embarrassment.
- the present invention includes methods, systems, applications and associated computer executable code or applications for checking a declared or implied age and/or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device and/or platform.
- the present invention includes methods, systems, applications and associated computer executable code for checking a declared age and/or declared gender of a party to a computer based/facilitated communication session, for example: (1 ) an instant text message session, (2) chat room conversation, (3) email exchange, and (4) etc.
- the declaration may be voluntary and/or requested from the party to be checked.
- a system for checking a declared or implied age or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party, through the use of a computing device over communication platform may include a server adapted to convey self- executing code (e.g. challenge generating software application (CGSA)) to the computing device, which self-executing code may be adapted to: (1 ) accesses one or more user input circuits and one or more user output circuits of the computing device; (2) render through one or more of the user output circuits a challenge message; (3) samples a response to the rendered challenge message through one or more of the device input circuits; and (4) convey data related to or derived from the samples to age or gender assessment logic or module.
- self- executing code e.g. challenge generating software application (CGSA)
- CGSA challenge generating software application
- the rendered challenge may be selected from the group consisting of: (1 ) an audio rendered statement to be repeated verbally, (2) an audio rendered question to be answered verbally, (3) an audio rendered music segmented to sing along with, (4) a text based statement to be vocalized, (5) a text based question to be answered verbally, and (6) an image to be verbally described.
- the self-executing code may access a video camera of the computing device, and optionally the challenge to the declaring party may include presenting themselves to the camera, for example presenting themselves in one or more postures or with one or more facial expressions.
- the self-executing code may acquire and sample multiple images of the declaring party, optionally responding to the challenge.
- the code may crop any acquired image, for example centering on a face and optionally removing limbs or torso portions from the image.
- the acquired/sampled image(s) may be computer analyzed to assess age and/or gender of the declaring party. According to further embodiment, the acquired/sampled image may be compared against a database of images, for example: (1 ) child images previously used, (2) images of known sex offenders, and (3) published child/adult images available on the internet. According to further embodiments, the system may prompt the declaring party for approval to acquire and analyze their image.
- the assessment logic may be adapted to analyze the samples and to estimate an age or gender of the declaring party.
- the assessment logic/module may be integral or otherwise functionally associated with a validation module.
- the validation module may be adapted to validate or reject the declared or implied age or gender.
- Some or all of said assessment logic may be operative on the computing device - as part of the self-executing code.
- Some or all of said validation module may be operative on the computing device as part of the self-executing code.
- Some or all of said assessment and/or validation modules may be operative on a remote server.
- the system may include a gatekeeping module adapted to either enable or disable access to the digital resource based on an output of the validation module.
- the gatekeeping module may be integral or otherwise functionally associated with the digital resource being accesses, for example: (1 ) a server of a chat service provider/platform, (2) a third party security providing service used/linked by the chat service provider/platform, and/or a network appliance of an internet service provider hosting the digital resource.
- the gatekeeping module may be integral or otherwise functionally associated with a computing device of other communication session members, for example children accessing on online child's chat room.
- the system may include synthetic voice countermeasure logic or module(s).
- a modulated channel sounding audio signal may be transmitted to and/or rendered through the user output circuits during a challenge response period and the channel sounding audio signal may be sampled through the user input circuits.
- the countermeasure logic may be integral or otherwise functionally associated with signal processing algorithms or modules adapted to detect within the sampled sounding audio signal indicia, such as frequency and/or time shifts between the rendered and sampled signals, of a synthetic voice source.
- the countermeasure logic may be adapted to issue challenge messages including content selected or configured to frustrate or cause malfunction in a synthetic voice source.
- the challenge message may include content which is selected to frustrate an adult impersonating a child.
- the challenge message may include content which is selected to frustrate a child impersonating an adult.
- a system for monitoring and securing a communication session may include a monitoring application running on a computing device associated with a node of the communication session.
- the monitoring application may be adapted to sense a risk parameter or factor of a communication signal received by the node, wherein the risk factor is either a presence or an absence of a signal characteristic.
- the risk factor may be selected from the group consisting of: (1 ) absence of an expected audio watermark, (2) absence of authorized digital certificate or marker indicating a vetted or trusted source, (3) presence of an audio artifact, (4) undetermined communication signal source, (5) unauthorized communication signal source, (6) signal content includes disapproved content, (7) signal content indicates speaker deception, and (8) signal content indicates speaker is unknown or unauthorized.
- the system may further include a notification module adapted to notify a user of the computing device of a detected risk factor.
- the system may further include a reporting module adapted to report the risk to a remote server or device (e.g. associated with a child's parents), optionally with a copy of some or all of the content of the communication stream assessed as risky.
- the notification module may act as a gatekeeping module and may terminate or discontinue the communication session.
- communication between various functional blocks and/or modules of the system may be secured using encryption and/or digital certificates.
- the system may issue a declaring party a unique identifier and/or a unique digital certificate. Some identifiers/certificates may certify that the party has validated their declared age or gender.
- a party being approached for a communication session over a digital communication platform may, manually or automatically, trigger the self-executing code/application to be sent to the approaching party, either as a signed file or as a link to the file.
- results of the declaration validation processed may be transmitted by the system to the party which was approached.
- Fig. 1 is a concept level diagram showing a party attempting to access one or more digital resources, including age specific content and/or communication sessions with other parties, through an online platform associated with an exemplary system according to embodiments;
- FIG. 2 is a functional block diagram of an exemplary system according to embodiments
- Fig. 3. is a flowchart including exemplary steps performed by a system according to embodiments.
- Fig. 4 is a chart including exemplary parameters used as part of age/gender assessment according to some embodiments.
- the present invention includes methods, systems, applications and associated computer executable code for checking a declared or implied age and/or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device
- the present invention includes methods, systems, applications and associated computer executable code for checking a declared age and/or declared gender of a party to a computer based/facilitated communication session, for example: (1 ) an instant text message session, (2) chat room conversation, (3) email exchange, and (4) etc.
- a challenge message may be generated by a computer application and transmitted to a party implying or declaring a specific age and/or gender (e.g.
- queried party may refer to a party or person who has implied or declared an age and/or gender and to whom a challenge message is sent.
- the queried party may be invited, requested or otherwise prompted to speak, sing or otherwise vocalize content within the application generated challenge message.
- a digitized sampling of the vocalized content may be computationally analyzed to assess or determine whether the queried party does in fact belong to their implied or declared age group and/or gender.
- processing may refer to the actions and/or processes of a computer, computer processor or computing system, or similar electronic computing device, that may manipulate and/or transform data represented as physical, such as electronic quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
- processing, computing, calculating, determining, selecting and other data manipulations may be performed by one or more processors that may in some embodiments be linked.
- a challenge generating software application integral or otherwise functionally associated with a communication application usable by two or more parties as part of a communication session (e.g. chat room, Instant Message, etc.) over a distributed data network (e.g. the Internet).
- a CGSA may, in response to a message generation trigger, generate a challenge message including content intended for viewing and vocalization by a party whose implied/declared age and/or gender is to be check, authenticated and/or validated.
- the challenge message may be dynamically generated or dynamically selected from a set of predefined messages, and a time window may be set for responding to the message with a vocalization of the content within the challenge message.
- the challenge message may be transmitted to a computing device being used by to be queried party, optionally the same computing device being used to engage in a current communication session, and if to be queried party responds to the challenge message with a vocalization, a digital sampling of the vocalization may be transmitted from the computing device to an analysis module for age/gender authentication.
- the analysis module may also receive the digital sampling of the queried party's message content vocalization and may perform analysis on the digital sampling in order to assess or determine an age range and/or gender of the queried party.
- the analysis module may also receive an indication, optionally in text format, of actual content within the challenge message sent to the queried party.
- the analysis module may perform speech recognition on the digital sampling of the vocalization received from the queried party in order to validate that the received sampled vocalization corresponds (e.g. same words) to the content of the challenge message sent to the queried party.
- the analysis unit may perform two comparisons: (1 ) comparing the recognized speech content to content from the challenge message, and (2) compare one or more vocal parameters extracted from the digital sample against reference ranges or reference sets of values for the extracted parameters, wherein a reference range of values or a reference set of values may be associated with one or more specific age ranges and/or a gender. Only if the recognized speech matched the content and the extracted vocal parameter values matched the declared age and/or gender would the analysis module indicate a validation of the declared age and/or gender.
- the analysis module may further include Synthetic voice detection functionality, wherein the analysis module looks for factors, parameters or markers in the voice sample indicative a computer generated voice and/or splicing of pre-recorded word vocalizations.
- the CGSA may be associated with an online age restricted content source (e.g. online casino or adult content website) or age restricted online communication venue (e.g. online social network such as Facebook, or online adult dating sites).
- an online age restricted content source e.g. online casino or adult content website
- age restricted online communication venue e.g. online social network such as Facebook, or online adult dating sites.
- challenge messaged may be generated and sent to parties attempting to access the content source or venue in order to validate the party attempting to access the site is of the required age.
- the CGSA and/or analysis module may be implemented as a standalone application installed on a computing device, PDA or smartphone. Alternatively, both the CGSA and/or analysis module may be implemented on a server which provides authentication/validation services to client devices. The CGSA and/or analysis module may be implemented on a server associated with an age restricted content source or online venue. Given the distributed nature or network based communication, any permutation of the above listed options is also possible and falls within the spoke of the present invention.
- a system for checking a declared or implied age or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party, through the use of a computing device over a communication platform may include a server adapted to convey self-executing code (e.g. challenge generating software application (CGSA)) to the computing device, which self-executing code may be adapted to: (1 ) accesses one or more user input circuits and one or more user output circuits of the computing device; (2) render through one or more of the user output circuits a challenge message; (3) samples a response to the rendered challenge message through one or more of the device input circuits; and (4) convey data related to or derived from the samples to age or gender assessment logic or module.
- self-executing code e.g. challenge generating software application (CGSA)
- CGSA challenge generating software application
- the rendered challenge may be selected from the group consisting of: (1 ) an audio rendered statement to be repeated verbally, (2) an audio rendered question to be answered verbally, (3) an audio rendered music segmented to sing along with, (4) a text based statement to be vocalized, (5) a text based question to be answered verbally, and (6) an image to be verbally described.
- the self-executing code may access a video camera of the computing device, and optionally the challenge to the declaring party may include presenting themselves to the camera, for example presenting themselves in one or more postures or with one or more facial expressions.
- the self-executing code may acquire and sample multiple images of the declaring party, optionally responding to the challenge.
- the code may crop any acquired image, for example centering on a face and optionally removing limbs or torso portions from the image.
- the acquired/sampled image(s) may be computer analyzed to assess age and/or gender of the declaring party.
- the acquired/sampled image may be compared against a database of images, for example: (1 ) child images previously used, (2) images of known sex offenders, and (3) published child/adult images available on the internet.
- the system may prompt the declaring party for approval to acquire and analyze their image.
- the assessment logic may be adapted to analyze the samples and to estimate an age or gender of the declaring party.
- the assessment logic/module may be integral or otherwise functionally associated with a validation module.
- the validation module may be adapted to validate or reject the declared or implied age or gender.
- Some or all of said assessment logic may be operative on the computing device - as part of the self-executing code.
- Some or all of said validation module may be operative on the computing device as part of the self-executing code.
- Some or all of said assessment and/or validation modules may be operative on a remote server.
- the system may include a gatekeeping module adapted to either enable or disable access to the digital resource based on an output of the validation module.
- the gatekeeping module may be integral or otherwise functionally associated with the digital resource being accesses, for example: (1 ) a server of a chat service provider/platform, (2) a third party security providing service used/linked by the chat service provider/platform, and/or a network appliance of an internet service provider hosting the digital resource.
- the gatekeeping module may be integral or otherwise functionally associated with a computing device of other communication session members, for example children accessing on online child's chat room.
- the system may include synthetic voice countermeasure logic or module(s).
- a modulated channel sounding audio signal may be transmitted to and/or rendered through the user output circuits during a challenge response period and the channel sounding audio signal may be sampled through the user input circuits.
- the countermeasure logic may be integral or otherwise functionally associated with signal processing algorithms or modules adapted to detect within the sampled sounding audio signal indicia, such as frequency and/or time shifts between the rendered and sampled signals, of a synthetic voice source.
- the countermeasure logic may be adapted to issue challenge messages including content selected or configured to frustrate or cause malfunction in a synthetic voice source.
- the challenge message may include content which is selected to frustrate an adult impersonating a child.
- the challenge message may include content which is selected to frustrate a child impersonating an adult.
- a system for monitoring and securing a communication session may include a monitoring application running on a computing device associated with a node of the communication session.
- the monitoring application may be adapted to sense a risk parameter or factor of a communication signal received by the node, wherein the risk factor is either a presence or an absence of a signal characteristic.
- the risk factor may be selected from the group consisting of: (1 ) absence of an expected audio watermark, (2) absence of authorized digital certificate or marker indicating a vetted or trusted source, (3) presence of an audio artifact, (4) undetermined communication signal source, (5) unauthorized communication signal source, (6) signal content includes disapproved content, (7) signal content indicates speaker deception, and (8) signal content indicates speaker is unknown or unauthorized.
- the system may further include a notification module adapted to notify a user of the computing device of a detected risk factor.
- the system may further include a reporting module adapted to report the risk to a remote server or device (e.g. associated with a child's parents), optionally with a copy of some or all of the content of the communication stream assessed as risky.
- the notification module may act as a gatekeeping module and may terminate or discontinue the communication session.
- communication between various functional blocks and/or modules of the system may be secured using encryption and/or digital certificates. Additionally, the system may issue a declaring party a unique identifier and/or a unique digital certificate. Some identifiers/certificates may certify that the party has validated their declared age or gender. [0047] According to further embodiments, a party being approached for a communication session over a digital communication platform may, manually or automatically, trigger the self-executing code/application to be sent to the approaching party, either as a signed file or as a link to the file. Once executed, results of the declaration validation processed may be transmitted by the system to the party which was approached.
- a generated challenge message including dynamically generated content may be in the form of a web browser viewable code, which code may include a browser executable challenge applications.
- the challenge application may be a Java application, a Flash application or any other browser executable application known today or to be devised in the future.
- the web browser code, including code for the challenge application may be dynamically generated and stored at a web server location.
- a link (e.g. URL) to the code may be transmitted to a communication application (e.g. email client, instant messenger, web browser logged into a chat room, etc.) being used by the queried party.
- the challenge application may be loaded and instanced in the browser.
- the challenge application may present the queried party with its payload content and may interact with a microphone functionally associated with the computer upon which the web browser is running in order to obtain a sampling of the queried party's vocalization of the presented content.
- the challenge application may notify/prompt the queried party to vocalize the content within some limited period of time after the content is presented. If the queried party does not vocalize the presented content within the allotted time period, the application may signal a functionally associated server application that the validation has timed out or failed.
- the challenge application may be adapted to locate and access microphone drivers, and thus a microphone, on the computing device used by the queried party.
- the challenge application may be otherwise delivered to the queried party's computing device or platform.
- delivery mechanisms include email, FTP links and any other digital content/application delivery mechanisms known today or to be devise in the future.
- the challenge message may be presented to the queried party with dynamically selected or generated content in a variety of formats including text, images, audio, etc.
- the dynamically generated or selected content imbedded within a challenge message may at least partially a function of the implied or declared age and/or gender of the to be queried party.
- Text, images and/or audio of the challenge message may be selected such that the content represented thereby is familiar to a person of the declared age group and/or gender.
- the format in which content is imbedded into a challenge message may likewise be a function of the declared age and/or gender.
- a time period for vocalizing of the presented content may be a function of the declared age/gender.
- One example of the content which may be selected and embedded in a challenge message may be lyrics of a song currently popular with the declared age/gender. When presented to the queried party, the queried party may be asked to speak or to sing the lyrics. Other examples may include images of actors or actresses currently popular with the declared age/gender, and the queried party may be asked to vocalize either the name of the actor or the name of a character the actor played in a film or show.
- challenge message content generation or selection may be a function of content of the communication session (e.g. chat).
- An application may monitor text being exchanges during a communication session and may detect that an age or a gender was implied or declared by a party to the chat. The application may generate (e.g. instantly) and send to the implying/declaring party a challenge message in response said detection.
- a challenge generation application may be manually triggered by any party to a digital communication using a computing functionally associated with the challenge generation application.
- Various speech sample analysis techniques may be used to estimate, assess or otherwise determine a queried party's age/gender. Many of the techniques include spectral decomposition of the sample, and some include matching to values associated spectral components present in the sample with reference values.
- a query response analyzer module which may extract one or more vocal parameters and associated values in order to compare the values of the extracted vocal parameters to reference ranges or reference sets of values for the extracted parameters. Each reference ranges of values or reference set of values may be associated with one or more specific age groups and/or genders. If the extracted parameter values don't correspond to or fall within the value range associated with the declared age/gender, a false declaration alert may be generated.
- the analysis module may receive parameters for voice sample analysis from a bank of samples, which bank of samples may be generated and optionally updated using digital solicitations to known members of different age groups, genders and demographics.
- an automated voice sample solicitation system which transmits voice sample request to members of a group, which request may be digital and may include a voice sampling application and/or a link to a voice sampling application.
- a person providing a voice sample may be asked to confirm: (1 ) their age, (2) their gender, (3) their ethnic group, (4) their weight and height, and (5) smoking habits.
- the request may include one or more written words or phrases which the sample provider is asked to vocalize while running the voice sample collection application.
- a homogenous age group e.g. a class of kids
- a homogenous gender group e.g. a girl's school class
- a homogenous gender group e.g. a girl's school class
- Any combination of sampling techniques is applicable to the present invention.
- Authentication or validation of an implied and/or declared age and/or gender by the analysis module may result in an approval of access to a communication session and/or undisrupted continuation of an ongoing communication session in which the queried party was engaged.
- a failure to authentic or validate an implied/declared age/gender may result in disruption of the communication session.
- a second challenge message may be sent to the queried party in order to perform a second validation attempt.
- the result of the analysis of the vocalization sample indicates a strong probability that the queried party falsely implied or declared their gender or age by a significant amount (e.g.
- alerts may be generated and/or issued to parties with whom the queried party was engaged in a communication session and possibly to law enforcement bodies.
- a challenge message may be intermittently generated and transmitted to a party already validated so as to revalidate that party.
- the interval between intermittently challenge requests may fixed, random or dynamically determined based on a variety of factors and possible triggers detected within the to be queried parties online behavior.
- Fig. 1 there is shown a concept level diagram showing a party attempting to access one or more digital resources, including age specific content and/or communication sessions with other parties, through an online platform associated with an exemplary system according to embodiments.
- an age/gender validation server which is at least partially integral with the platform, receives information relating to the attempt and sends validation code/application to the party.
- Fig. 2 there is shown a functional block diagram of an exemplary system according to embodiments, including the various modules of the system which may be executed either on the server or on the computing device of the party.
- I/O circuits of the party's computing device are accessed, a challenged message is rendered, a response to the message is sampled, assessed/analyzed, and a validation determination is made. Positive validation will result in access being granted. Validation failure will result in a rejection of service and possible reporting of the attempt.
- Fig. 4 there are shown tables including exemplary parameters used as part of age/gender assessment according to some embodiments. Frequencies of speech, segmented by age, gender and vowels are listed. These tables are based on empirical data collected from studies and may be used as part of a age/gender assessment/validation process according to embodiments.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- General Physics & Mathematics (AREA)
- Primary Health Care (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Computing Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention porte sur des procédés, des systèmes, des applications et un code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe déclarés ou implicites d'une partie déclarante tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique. Selon des modes de réalisation, un code auto-exécutable peut être envoyé à un dispositif informatique de la partie déclarante et le code peut accéder à des circuits d'entrée/sortie (E/S) d'utilisateur du dispositif informatique. Le code auto-exécutable peut utiliser les circuits E/S auxquels l'accès est effectué pour envoyer un défi et collecter une réponse audible de la partie déclarante. Des techniques d'analyse de signal et des algorithmes peuvent être utilisés pour évaluer une validité de la déclaration.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261659762P | 2012-06-14 | 2012-06-14 | |
US61/659,762 | 2012-06-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2013186755A2 true WO2013186755A2 (fr) | 2013-12-19 |
WO2013186755A3 WO2013186755A3 (fr) | 2014-05-01 |
Family
ID=49758821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2013/054890 WO2013186755A2 (fr) | 2012-06-14 | 2013-06-14 | Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2013186755A2 (fr) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5949874A (en) * | 1994-08-05 | 1999-09-07 | Smart Tone Authentication, Inc. | Method and system for compensating for signal deviations in tone signals over a transmission channel |
US20090259468A1 (en) * | 2008-04-11 | 2009-10-15 | At&T Labs | System and method for detecting synthetic speaker verification |
US20090319274A1 (en) * | 2008-06-23 | 2009-12-24 | John Nicholas Gross | System and Method for Verifying Origin of Input Through Spoken Language Analysis |
US20100115114A1 (en) * | 2008-11-03 | 2010-05-06 | Paul Headley | User Authentication for Social Networks |
-
2013
- 2013-06-14 WO PCT/IB2013/054890 patent/WO2013186755A2/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5949874A (en) * | 1994-08-05 | 1999-09-07 | Smart Tone Authentication, Inc. | Method and system for compensating for signal deviations in tone signals over a transmission channel |
US20090259468A1 (en) * | 2008-04-11 | 2009-10-15 | At&T Labs | System and method for detecting synthetic speaker verification |
US20090319274A1 (en) * | 2008-06-23 | 2009-12-24 | John Nicholas Gross | System and Method for Verifying Origin of Input Through Spoken Language Analysis |
US20100115114A1 (en) * | 2008-11-03 | 2010-05-06 | Paul Headley | User Authentication for Social Networks |
Also Published As
Publication number | Publication date |
---|---|
WO2013186755A3 (fr) | 2014-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
O’Malley et al. | Cyber sextortion: An exploratory analysis of different perpetrators engaging in a similar crime | |
Henry et al. | Image-based sexual abuse: Victims and perpetrators | |
US9137318B2 (en) | Method and apparatus for detecting events indicative of inappropriate activity in an online community | |
KR20210118405A (ko) | 안티-사이버 불링 시스템 및 방법 | |
US20080059198A1 (en) | Apparatus and method for detecting and reporting online predators | |
US20180240028A1 (en) | Conversation and context aware fraud and abuse prevention agent | |
US20120101970A1 (en) | Method and system of monitoring a network based communication among users | |
Markwick et al. | Technology and family violence in the context of post‐separated parenting | |
Innes | Techniques of disinformation: Constructing and communicating “soft facts” after terrorism | |
US20110029618A1 (en) | Methods and systems for managing virtual identities in the internet | |
Chigona et al. | MXit it up in the media: Media discourse analysis on a Mobile instant messaging system | |
WO2007138596A2 (fr) | Identification d'un groupe d'utilisateurs | |
Vitis | Private, hidden and obscured: Image-based sexual abuse in Singapore | |
Mpofu et al. | Citizen journalism and moral panics: A consideration of ethics in the 2015 South African xenophobic attacks | |
US20210234823A1 (en) | Detecting and identifying toxic and offensive social interactions in digital communications | |
Levine | Increasing the efficacy of investigations of online child sexual exploitation | |
Lee et al. | Sharing experiences and seeking informal justice online: a grounded theory analysis of Zoombombing victimization on Reddit | |
Haugen | Manipulation and deception with social bots: Strategies and indicators for minimizing impact | |
O'Malley et al. | Minor‐focused sextortion by adult strangers: A crime script analysis of newspaper and court cases | |
Di Pietro et al. | Information disorder | |
WO2013186755A2 (fr) | Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique | |
Chatzinikolaou et al. | Towards a legal qualification of online sexual acts in which children are involved: Constructing a typology | |
Billups | New and emerging mobile apps among teens-are forensic tools keeping up? | |
Oosterwyk et al. | Mobile bullying in South Africa-Exploring its nature, influencing factors and implications | |
Broadhurst et al. | Online Child Sex Solicitation: Exploring the feasibility of a research ‘sting’ |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13805193 Country of ref document: EP Kind code of ref document: A2 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 13/04/2015) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13805193 Country of ref document: EP Kind code of ref document: A2 |