WO2013186755A2 - Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique - Google Patents

Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique Download PDF

Info

Publication number
WO2013186755A2
WO2013186755A2 PCT/IB2013/054890 IB2013054890W WO2013186755A2 WO 2013186755 A2 WO2013186755 A2 WO 2013186755A2 IB 2013054890 W IB2013054890 W IB 2013054890W WO 2013186755 A2 WO2013186755 A2 WO 2013186755A2
Authority
WO
WIPO (PCT)
Prior art keywords
party
computing device
gender
age
content
Prior art date
Application number
PCT/IB2013/054890
Other languages
English (en)
Other versions
WO2013186755A3 (fr
Inventor
David Cohen
Original Assignee
David Cohen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by David Cohen filed Critical David Cohen
Publication of WO2013186755A2 publication Critical patent/WO2013186755A2/fr
Publication of WO2013186755A3 publication Critical patent/WO2013186755A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Definitions

  • the present invention generally relates to the fields of digital communication, computing and security. More specifically, the present invention relates to methods, systems, software applications and computer executable code for checking an implied or declared age and or implied gender of a party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device.
  • An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. Online victimization of minors can include child grooming, requests to engage in sexual activities or discussions by an adult, unwanted exposure to sexual material (email with naked pictures, etc.), and online harassment, threats or other aggressive communications that are not sexual in nature but cause distress, fear or embarrassment.
  • the present invention includes methods, systems, applications and associated computer executable code or applications for checking a declared or implied age and/or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device and/or platform.
  • the present invention includes methods, systems, applications and associated computer executable code for checking a declared age and/or declared gender of a party to a computer based/facilitated communication session, for example: (1 ) an instant text message session, (2) chat room conversation, (3) email exchange, and (4) etc.
  • the declaration may be voluntary and/or requested from the party to be checked.
  • a system for checking a declared or implied age or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party, through the use of a computing device over communication platform may include a server adapted to convey self- executing code (e.g. challenge generating software application (CGSA)) to the computing device, which self-executing code may be adapted to: (1 ) accesses one or more user input circuits and one or more user output circuits of the computing device; (2) render through one or more of the user output circuits a challenge message; (3) samples a response to the rendered challenge message through one or more of the device input circuits; and (4) convey data related to or derived from the samples to age or gender assessment logic or module.
  • self- executing code e.g. challenge generating software application (CGSA)
  • CGSA challenge generating software application
  • the rendered challenge may be selected from the group consisting of: (1 ) an audio rendered statement to be repeated verbally, (2) an audio rendered question to be answered verbally, (3) an audio rendered music segmented to sing along with, (4) a text based statement to be vocalized, (5) a text based question to be answered verbally, and (6) an image to be verbally described.
  • the self-executing code may access a video camera of the computing device, and optionally the challenge to the declaring party may include presenting themselves to the camera, for example presenting themselves in one or more postures or with one or more facial expressions.
  • the self-executing code may acquire and sample multiple images of the declaring party, optionally responding to the challenge.
  • the code may crop any acquired image, for example centering on a face and optionally removing limbs or torso portions from the image.
  • the acquired/sampled image(s) may be computer analyzed to assess age and/or gender of the declaring party. According to further embodiment, the acquired/sampled image may be compared against a database of images, for example: (1 ) child images previously used, (2) images of known sex offenders, and (3) published child/adult images available on the internet. According to further embodiments, the system may prompt the declaring party for approval to acquire and analyze their image.
  • the assessment logic may be adapted to analyze the samples and to estimate an age or gender of the declaring party.
  • the assessment logic/module may be integral or otherwise functionally associated with a validation module.
  • the validation module may be adapted to validate or reject the declared or implied age or gender.
  • Some or all of said assessment logic may be operative on the computing device - as part of the self-executing code.
  • Some or all of said validation module may be operative on the computing device as part of the self-executing code.
  • Some or all of said assessment and/or validation modules may be operative on a remote server.
  • the system may include a gatekeeping module adapted to either enable or disable access to the digital resource based on an output of the validation module.
  • the gatekeeping module may be integral or otherwise functionally associated with the digital resource being accesses, for example: (1 ) a server of a chat service provider/platform, (2) a third party security providing service used/linked by the chat service provider/platform, and/or a network appliance of an internet service provider hosting the digital resource.
  • the gatekeeping module may be integral or otherwise functionally associated with a computing device of other communication session members, for example children accessing on online child's chat room.
  • the system may include synthetic voice countermeasure logic or module(s).
  • a modulated channel sounding audio signal may be transmitted to and/or rendered through the user output circuits during a challenge response period and the channel sounding audio signal may be sampled through the user input circuits.
  • the countermeasure logic may be integral or otherwise functionally associated with signal processing algorithms or modules adapted to detect within the sampled sounding audio signal indicia, such as frequency and/or time shifts between the rendered and sampled signals, of a synthetic voice source.
  • the countermeasure logic may be adapted to issue challenge messages including content selected or configured to frustrate or cause malfunction in a synthetic voice source.
  • the challenge message may include content which is selected to frustrate an adult impersonating a child.
  • the challenge message may include content which is selected to frustrate a child impersonating an adult.
  • a system for monitoring and securing a communication session may include a monitoring application running on a computing device associated with a node of the communication session.
  • the monitoring application may be adapted to sense a risk parameter or factor of a communication signal received by the node, wherein the risk factor is either a presence or an absence of a signal characteristic.
  • the risk factor may be selected from the group consisting of: (1 ) absence of an expected audio watermark, (2) absence of authorized digital certificate or marker indicating a vetted or trusted source, (3) presence of an audio artifact, (4) undetermined communication signal source, (5) unauthorized communication signal source, (6) signal content includes disapproved content, (7) signal content indicates speaker deception, and (8) signal content indicates speaker is unknown or unauthorized.
  • the system may further include a notification module adapted to notify a user of the computing device of a detected risk factor.
  • the system may further include a reporting module adapted to report the risk to a remote server or device (e.g. associated with a child's parents), optionally with a copy of some or all of the content of the communication stream assessed as risky.
  • the notification module may act as a gatekeeping module and may terminate or discontinue the communication session.
  • communication between various functional blocks and/or modules of the system may be secured using encryption and/or digital certificates.
  • the system may issue a declaring party a unique identifier and/or a unique digital certificate. Some identifiers/certificates may certify that the party has validated their declared age or gender.
  • a party being approached for a communication session over a digital communication platform may, manually or automatically, trigger the self-executing code/application to be sent to the approaching party, either as a signed file or as a link to the file.
  • results of the declaration validation processed may be transmitted by the system to the party which was approached.
  • Fig. 1 is a concept level diagram showing a party attempting to access one or more digital resources, including age specific content and/or communication sessions with other parties, through an online platform associated with an exemplary system according to embodiments;
  • FIG. 2 is a functional block diagram of an exemplary system according to embodiments
  • Fig. 3. is a flowchart including exemplary steps performed by a system according to embodiments.
  • Fig. 4 is a chart including exemplary parameters used as part of age/gender assessment according to some embodiments.
  • the present invention includes methods, systems, applications and associated computer executable code for checking a declared or implied age and/or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party through the use of a computing device
  • the present invention includes methods, systems, applications and associated computer executable code for checking a declared age and/or declared gender of a party to a computer based/facilitated communication session, for example: (1 ) an instant text message session, (2) chat room conversation, (3) email exchange, and (4) etc.
  • a challenge message may be generated by a computer application and transmitted to a party implying or declaring a specific age and/or gender (e.g.
  • queried party may refer to a party or person who has implied or declared an age and/or gender and to whom a challenge message is sent.
  • the queried party may be invited, requested or otherwise prompted to speak, sing or otherwise vocalize content within the application generated challenge message.
  • a digitized sampling of the vocalized content may be computationally analyzed to assess or determine whether the queried party does in fact belong to their implied or declared age group and/or gender.
  • processing may refer to the actions and/or processes of a computer, computer processor or computing system, or similar electronic computing device, that may manipulate and/or transform data represented as physical, such as electronic quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
  • processing, computing, calculating, determining, selecting and other data manipulations may be performed by one or more processors that may in some embodiments be linked.
  • a challenge generating software application integral or otherwise functionally associated with a communication application usable by two or more parties as part of a communication session (e.g. chat room, Instant Message, etc.) over a distributed data network (e.g. the Internet).
  • a CGSA may, in response to a message generation trigger, generate a challenge message including content intended for viewing and vocalization by a party whose implied/declared age and/or gender is to be check, authenticated and/or validated.
  • the challenge message may be dynamically generated or dynamically selected from a set of predefined messages, and a time window may be set for responding to the message with a vocalization of the content within the challenge message.
  • the challenge message may be transmitted to a computing device being used by to be queried party, optionally the same computing device being used to engage in a current communication session, and if to be queried party responds to the challenge message with a vocalization, a digital sampling of the vocalization may be transmitted from the computing device to an analysis module for age/gender authentication.
  • the analysis module may also receive the digital sampling of the queried party's message content vocalization and may perform analysis on the digital sampling in order to assess or determine an age range and/or gender of the queried party.
  • the analysis module may also receive an indication, optionally in text format, of actual content within the challenge message sent to the queried party.
  • the analysis module may perform speech recognition on the digital sampling of the vocalization received from the queried party in order to validate that the received sampled vocalization corresponds (e.g. same words) to the content of the challenge message sent to the queried party.
  • the analysis unit may perform two comparisons: (1 ) comparing the recognized speech content to content from the challenge message, and (2) compare one or more vocal parameters extracted from the digital sample against reference ranges or reference sets of values for the extracted parameters, wherein a reference range of values or a reference set of values may be associated with one or more specific age ranges and/or a gender. Only if the recognized speech matched the content and the extracted vocal parameter values matched the declared age and/or gender would the analysis module indicate a validation of the declared age and/or gender.
  • the analysis module may further include Synthetic voice detection functionality, wherein the analysis module looks for factors, parameters or markers in the voice sample indicative a computer generated voice and/or splicing of pre-recorded word vocalizations.
  • the CGSA may be associated with an online age restricted content source (e.g. online casino or adult content website) or age restricted online communication venue (e.g. online social network such as Facebook, or online adult dating sites).
  • an online age restricted content source e.g. online casino or adult content website
  • age restricted online communication venue e.g. online social network such as Facebook, or online adult dating sites.
  • challenge messaged may be generated and sent to parties attempting to access the content source or venue in order to validate the party attempting to access the site is of the required age.
  • the CGSA and/or analysis module may be implemented as a standalone application installed on a computing device, PDA or smartphone. Alternatively, both the CGSA and/or analysis module may be implemented on a server which provides authentication/validation services to client devices. The CGSA and/or analysis module may be implemented on a server associated with an age restricted content source or online venue. Given the distributed nature or network based communication, any permutation of the above listed options is also possible and falls within the spoke of the present invention.
  • a system for checking a declared or implied age or gender of a declaring party attempting to access a digital resource such as online content or a digital communication session with another party, through the use of a computing device over a communication platform may include a server adapted to convey self-executing code (e.g. challenge generating software application (CGSA)) to the computing device, which self-executing code may be adapted to: (1 ) accesses one or more user input circuits and one or more user output circuits of the computing device; (2) render through one or more of the user output circuits a challenge message; (3) samples a response to the rendered challenge message through one or more of the device input circuits; and (4) convey data related to or derived from the samples to age or gender assessment logic or module.
  • self-executing code e.g. challenge generating software application (CGSA)
  • CGSA challenge generating software application
  • the rendered challenge may be selected from the group consisting of: (1 ) an audio rendered statement to be repeated verbally, (2) an audio rendered question to be answered verbally, (3) an audio rendered music segmented to sing along with, (4) a text based statement to be vocalized, (5) a text based question to be answered verbally, and (6) an image to be verbally described.
  • the self-executing code may access a video camera of the computing device, and optionally the challenge to the declaring party may include presenting themselves to the camera, for example presenting themselves in one or more postures or with one or more facial expressions.
  • the self-executing code may acquire and sample multiple images of the declaring party, optionally responding to the challenge.
  • the code may crop any acquired image, for example centering on a face and optionally removing limbs or torso portions from the image.
  • the acquired/sampled image(s) may be computer analyzed to assess age and/or gender of the declaring party.
  • the acquired/sampled image may be compared against a database of images, for example: (1 ) child images previously used, (2) images of known sex offenders, and (3) published child/adult images available on the internet.
  • the system may prompt the declaring party for approval to acquire and analyze their image.
  • the assessment logic may be adapted to analyze the samples and to estimate an age or gender of the declaring party.
  • the assessment logic/module may be integral or otherwise functionally associated with a validation module.
  • the validation module may be adapted to validate or reject the declared or implied age or gender.
  • Some or all of said assessment logic may be operative on the computing device - as part of the self-executing code.
  • Some or all of said validation module may be operative on the computing device as part of the self-executing code.
  • Some or all of said assessment and/or validation modules may be operative on a remote server.
  • the system may include a gatekeeping module adapted to either enable or disable access to the digital resource based on an output of the validation module.
  • the gatekeeping module may be integral or otherwise functionally associated with the digital resource being accesses, for example: (1 ) a server of a chat service provider/platform, (2) a third party security providing service used/linked by the chat service provider/platform, and/or a network appliance of an internet service provider hosting the digital resource.
  • the gatekeeping module may be integral or otherwise functionally associated with a computing device of other communication session members, for example children accessing on online child's chat room.
  • the system may include synthetic voice countermeasure logic or module(s).
  • a modulated channel sounding audio signal may be transmitted to and/or rendered through the user output circuits during a challenge response period and the channel sounding audio signal may be sampled through the user input circuits.
  • the countermeasure logic may be integral or otherwise functionally associated with signal processing algorithms or modules adapted to detect within the sampled sounding audio signal indicia, such as frequency and/or time shifts between the rendered and sampled signals, of a synthetic voice source.
  • the countermeasure logic may be adapted to issue challenge messages including content selected or configured to frustrate or cause malfunction in a synthetic voice source.
  • the challenge message may include content which is selected to frustrate an adult impersonating a child.
  • the challenge message may include content which is selected to frustrate a child impersonating an adult.
  • a system for monitoring and securing a communication session may include a monitoring application running on a computing device associated with a node of the communication session.
  • the monitoring application may be adapted to sense a risk parameter or factor of a communication signal received by the node, wherein the risk factor is either a presence or an absence of a signal characteristic.
  • the risk factor may be selected from the group consisting of: (1 ) absence of an expected audio watermark, (2) absence of authorized digital certificate or marker indicating a vetted or trusted source, (3) presence of an audio artifact, (4) undetermined communication signal source, (5) unauthorized communication signal source, (6) signal content includes disapproved content, (7) signal content indicates speaker deception, and (8) signal content indicates speaker is unknown or unauthorized.
  • the system may further include a notification module adapted to notify a user of the computing device of a detected risk factor.
  • the system may further include a reporting module adapted to report the risk to a remote server or device (e.g. associated with a child's parents), optionally with a copy of some or all of the content of the communication stream assessed as risky.
  • the notification module may act as a gatekeeping module and may terminate or discontinue the communication session.
  • communication between various functional blocks and/or modules of the system may be secured using encryption and/or digital certificates. Additionally, the system may issue a declaring party a unique identifier and/or a unique digital certificate. Some identifiers/certificates may certify that the party has validated their declared age or gender. [0047] According to further embodiments, a party being approached for a communication session over a digital communication platform may, manually or automatically, trigger the self-executing code/application to be sent to the approaching party, either as a signed file or as a link to the file. Once executed, results of the declaration validation processed may be transmitted by the system to the party which was approached.
  • a generated challenge message including dynamically generated content may be in the form of a web browser viewable code, which code may include a browser executable challenge applications.
  • the challenge application may be a Java application, a Flash application or any other browser executable application known today or to be devised in the future.
  • the web browser code, including code for the challenge application may be dynamically generated and stored at a web server location.
  • a link (e.g. URL) to the code may be transmitted to a communication application (e.g. email client, instant messenger, web browser logged into a chat room, etc.) being used by the queried party.
  • the challenge application may be loaded and instanced in the browser.
  • the challenge application may present the queried party with its payload content and may interact with a microphone functionally associated with the computer upon which the web browser is running in order to obtain a sampling of the queried party's vocalization of the presented content.
  • the challenge application may notify/prompt the queried party to vocalize the content within some limited period of time after the content is presented. If the queried party does not vocalize the presented content within the allotted time period, the application may signal a functionally associated server application that the validation has timed out or failed.
  • the challenge application may be adapted to locate and access microphone drivers, and thus a microphone, on the computing device used by the queried party.
  • the challenge application may be otherwise delivered to the queried party's computing device or platform.
  • delivery mechanisms include email, FTP links and any other digital content/application delivery mechanisms known today or to be devise in the future.
  • the challenge message may be presented to the queried party with dynamically selected or generated content in a variety of formats including text, images, audio, etc.
  • the dynamically generated or selected content imbedded within a challenge message may at least partially a function of the implied or declared age and/or gender of the to be queried party.
  • Text, images and/or audio of the challenge message may be selected such that the content represented thereby is familiar to a person of the declared age group and/or gender.
  • the format in which content is imbedded into a challenge message may likewise be a function of the declared age and/or gender.
  • a time period for vocalizing of the presented content may be a function of the declared age/gender.
  • One example of the content which may be selected and embedded in a challenge message may be lyrics of a song currently popular with the declared age/gender. When presented to the queried party, the queried party may be asked to speak or to sing the lyrics. Other examples may include images of actors or actresses currently popular with the declared age/gender, and the queried party may be asked to vocalize either the name of the actor or the name of a character the actor played in a film or show.
  • challenge message content generation or selection may be a function of content of the communication session (e.g. chat).
  • An application may monitor text being exchanges during a communication session and may detect that an age or a gender was implied or declared by a party to the chat. The application may generate (e.g. instantly) and send to the implying/declaring party a challenge message in response said detection.
  • a challenge generation application may be manually triggered by any party to a digital communication using a computing functionally associated with the challenge generation application.
  • Various speech sample analysis techniques may be used to estimate, assess or otherwise determine a queried party's age/gender. Many of the techniques include spectral decomposition of the sample, and some include matching to values associated spectral components present in the sample with reference values.
  • a query response analyzer module which may extract one or more vocal parameters and associated values in order to compare the values of the extracted vocal parameters to reference ranges or reference sets of values for the extracted parameters. Each reference ranges of values or reference set of values may be associated with one or more specific age groups and/or genders. If the extracted parameter values don't correspond to or fall within the value range associated with the declared age/gender, a false declaration alert may be generated.
  • the analysis module may receive parameters for voice sample analysis from a bank of samples, which bank of samples may be generated and optionally updated using digital solicitations to known members of different age groups, genders and demographics.
  • an automated voice sample solicitation system which transmits voice sample request to members of a group, which request may be digital and may include a voice sampling application and/or a link to a voice sampling application.
  • a person providing a voice sample may be asked to confirm: (1 ) their age, (2) their gender, (3) their ethnic group, (4) their weight and height, and (5) smoking habits.
  • the request may include one or more written words or phrases which the sample provider is asked to vocalize while running the voice sample collection application.
  • a homogenous age group e.g. a class of kids
  • a homogenous gender group e.g. a girl's school class
  • a homogenous gender group e.g. a girl's school class
  • Any combination of sampling techniques is applicable to the present invention.
  • Authentication or validation of an implied and/or declared age and/or gender by the analysis module may result in an approval of access to a communication session and/or undisrupted continuation of an ongoing communication session in which the queried party was engaged.
  • a failure to authentic or validate an implied/declared age/gender may result in disruption of the communication session.
  • a second challenge message may be sent to the queried party in order to perform a second validation attempt.
  • the result of the analysis of the vocalization sample indicates a strong probability that the queried party falsely implied or declared their gender or age by a significant amount (e.g.
  • alerts may be generated and/or issued to parties with whom the queried party was engaged in a communication session and possibly to law enforcement bodies.
  • a challenge message may be intermittently generated and transmitted to a party already validated so as to revalidate that party.
  • the interval between intermittently challenge requests may fixed, random or dynamically determined based on a variety of factors and possible triggers detected within the to be queried parties online behavior.
  • Fig. 1 there is shown a concept level diagram showing a party attempting to access one or more digital resources, including age specific content and/or communication sessions with other parties, through an online platform associated with an exemplary system according to embodiments.
  • an age/gender validation server which is at least partially integral with the platform, receives information relating to the attempt and sends validation code/application to the party.
  • Fig. 2 there is shown a functional block diagram of an exemplary system according to embodiments, including the various modules of the system which may be executed either on the server or on the computing device of the party.
  • I/O circuits of the party's computing device are accessed, a challenged message is rendered, a response to the message is sampled, assessed/analyzed, and a validation determination is made. Positive validation will result in access being granted. Validation failure will result in a rejection of service and possible reporting of the attempt.
  • Fig. 4 there are shown tables including exemplary parameters used as part of age/gender assessment according to some embodiments. Frequencies of speech, segmented by age, gender and vowels are listed. These tables are based on empirical data collected from studies and may be used as part of a age/gender assessment/validation process according to embodiments.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention porte sur des procédés, des systèmes, des applications et un code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe déclarés ou implicites d'une partie déclarante tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique. Selon des modes de réalisation, un code auto-exécutable peut être envoyé à un dispositif informatique de la partie déclarante et le code peut accéder à des circuits d'entrée/sortie (E/S) d'utilisateur du dispositif informatique. Le code auto-exécutable peut utiliser les circuits E/S auxquels l'accès est effectué pour envoyer un défi et collecter une réponse audible de la partie déclarante. Des techniques d'analyse de signal et des algorithmes peuvent être utilisés pour évaluer une validité de la déclaration.
PCT/IB2013/054890 2012-06-14 2013-06-14 Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique WO2013186755A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261659762P 2012-06-14 2012-06-14
US61/659,762 2012-06-14

Publications (2)

Publication Number Publication Date
WO2013186755A2 true WO2013186755A2 (fr) 2013-12-19
WO2013186755A3 WO2013186755A3 (fr) 2014-05-01

Family

ID=49758821

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2013/054890 WO2013186755A2 (fr) 2012-06-14 2013-06-14 Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique

Country Status (1)

Country Link
WO (1) WO2013186755A2 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5949874A (en) * 1994-08-05 1999-09-07 Smart Tone Authentication, Inc. Method and system for compensating for signal deviations in tone signals over a transmission channel
US20090259468A1 (en) * 2008-04-11 2009-10-15 At&T Labs System and method for detecting synthetic speaker verification
US20090319274A1 (en) * 2008-06-23 2009-12-24 John Nicholas Gross System and Method for Verifying Origin of Input Through Spoken Language Analysis
US20100115114A1 (en) * 2008-11-03 2010-05-06 Paul Headley User Authentication for Social Networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5949874A (en) * 1994-08-05 1999-09-07 Smart Tone Authentication, Inc. Method and system for compensating for signal deviations in tone signals over a transmission channel
US20090259468A1 (en) * 2008-04-11 2009-10-15 At&T Labs System and method for detecting synthetic speaker verification
US20090319274A1 (en) * 2008-06-23 2009-12-24 John Nicholas Gross System and Method for Verifying Origin of Input Through Spoken Language Analysis
US20100115114A1 (en) * 2008-11-03 2010-05-06 Paul Headley User Authentication for Social Networks

Also Published As

Publication number Publication date
WO2013186755A3 (fr) 2014-05-01

Similar Documents

Publication Publication Date Title
O’Malley et al. Cyber sextortion: An exploratory analysis of different perpetrators engaging in a similar crime
Henry et al. Image-based sexual abuse: Victims and perpetrators
US9137318B2 (en) Method and apparatus for detecting events indicative of inappropriate activity in an online community
KR20210118405A (ko) 안티-사이버 불링 시스템 및 방법
US20080059198A1 (en) Apparatus and method for detecting and reporting online predators
US20180240028A1 (en) Conversation and context aware fraud and abuse prevention agent
US20120101970A1 (en) Method and system of monitoring a network based communication among users
Markwick et al. Technology and family violence in the context of post‐separated parenting
Innes Techniques of disinformation: Constructing and communicating “soft facts” after terrorism
US20110029618A1 (en) Methods and systems for managing virtual identities in the internet
Chigona et al. MXit it up in the media: Media discourse analysis on a Mobile instant messaging system
WO2007138596A2 (fr) Identification d'un groupe d'utilisateurs
Vitis Private, hidden and obscured: Image-based sexual abuse in Singapore
Mpofu et al. Citizen journalism and moral panics: A consideration of ethics in the 2015 South African xenophobic attacks
US20210234823A1 (en) Detecting and identifying toxic and offensive social interactions in digital communications
Levine Increasing the efficacy of investigations of online child sexual exploitation
Lee et al. Sharing experiences and seeking informal justice online: a grounded theory analysis of Zoombombing victimization on Reddit
Haugen Manipulation and deception with social bots: Strategies and indicators for minimizing impact
O'Malley et al. Minor‐focused sextortion by adult strangers: A crime script analysis of newspaper and court cases
Di Pietro et al. Information disorder
WO2013186755A2 (fr) Procédés, circuits, systèmes, applications logicielles et code exécutable par ordinateur associé pour vérifier un âge et/ou un sexe implicites ou déclarés d'une partie tentant d'accéder à une ressource numérique telle qu'un contenu en ligne ou une session de communication numérique avec une autre partie par utilisation d'un dispositif informatique
Chatzinikolaou et al. Towards a legal qualification of online sexual acts in which children are involved: Constructing a typology
Billups New and emerging mobile apps among teens-are forensic tools keeping up?
Oosterwyk et al. Mobile bullying in South Africa-Exploring its nature, influencing factors and implications
Broadhurst et al. Online Child Sex Solicitation: Exploring the feasibility of a research ‘sting’

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13805193

Country of ref document: EP

Kind code of ref document: A2

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 13/04/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13805193

Country of ref document: EP

Kind code of ref document: A2