WO2015160038A1 - Procédé destiné à fournir un service d'allègement de service de quartier, dispositif de surveillance de message de danger destiné à fournir un service d'allègement de service de quartier, terminal de dispositif de vigile et support d'enregistrement lisible par ordinateur - Google Patents

Procédé destiné à fournir un service d'allègement de service de quartier, dispositif de surveillance de message de danger destiné à fournir un service d'allègement de service de quartier, terminal de dispositif de vigile et support d'enregistrement lisible par ordinateur Download PDF

Info

Publication number
WO2015160038A1
WO2015160038A1 PCT/KR2014/006064 KR2014006064W WO2015160038A1 WO 2015160038 A1 WO2015160038 A1 WO 2015160038A1 KR 2014006064 W KR2014006064 W KR 2014006064W WO 2015160038 A1 WO2015160038 A1 WO 2015160038A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
risk
dangerous
information
terminal
Prior art date
Application number
PCT/KR2014/006064
Other languages
English (en)
Korean (ko)
Inventor
천세은
이용규
이창배
강경태
Original Assignee
플러스기술 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 플러스기술 주식회사 filed Critical 플러스기술 주식회사
Publication of WO2015160038A1 publication Critical patent/WO2015160038A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/02User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0222Message structure or message content, e.g. message protocol
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • the present invention relates to a method for providing assured security services, a risk message monitoring apparatus for providing assured security services, a guardian terminal and a computer-readable recording medium.
  • the present invention relates to a method for providing a guaranteed security service for a guardian to block a situation in advance, a risk message monitoring device for providing a guaranteed security service for a guardian, a guardian terminal, and a computer-readable recording medium.
  • Korean Patent Publication No. 10-2013-0119551 discloses a configuration for preventing school violence by securing the location and image of students in real time, but school violence in a blind spot where video devices such as CCTV is not deployed If this occurs, there is a limit in that it cannot be prevented.
  • the background art described above is technical information that the inventors possess for the derivation of the present invention or acquired in the derivation process of the present invention, and is not necessarily a publicly known technique disclosed to the general public before the application of the present invention. .
  • one embodiment of the present invention monitors a text received by a guardian (for example, a child), and has a dangerous word (for example, a school violence word) in the received text. If it is determined that the guardian is informed of this fact, the objective is to prevent possible dangers to the guardian.
  • a guardian for example, a child
  • a dangerous word for example, a school violence word
  • an embodiment of the present invention is to provide additional information on the assailant of the assailant or information of other assailants associated with the assailant, so that the guardian can easily know the seriousness of school violence against the perpetrator.
  • an embodiment of the present invention has an object to transmit a dangerous message to the ward, the school terminal of the ward, so that the school can recognize the dangerous situation.
  • an embodiment of the present invention is to determine the risk of the abuser, to inform the guardian of such risks to predict the magnitude of the risk situation, or to filter the risk words of joke or friendliness display to notify the guardian only the risk information required For the purpose of
  • the method for providing the assured security services to the subject (a) receiving a message sent to the subject, in the risk message monitoring apparatus; (b) recognizing the received message by referring to a message storage area or an application state information storage area of the dangerous message monitoring device in the dangerous message monitoring device; (c) in the dangerous message monitoring device, comparing the received message with a pre-stored dangerous word list to determine whether the received message includes a dangerous word; (d) If it is determined that the received message is a dangerous message including the dangerous word, the dangerous message monitoring device extracts the name of the sender or the contact number of the sender of the dangerous message through the identification information of the dangerous message.
  • the method to provide the assured security services (g) before the step (a), the assured assured application is installed on the assured terminal included in the dangerous message monitoring device, and the application state information of the assured terminal is stored. And granting access rights of the assured application to the area.
  • the step (b) may include: recognizing an SMS or MMS message with reference to the message storage area, or recognizing a chat message received by a chat application installed in the terminal of the protected person with reference to the application state information storage area. It includes.
  • step (d) if it is determined that the received message is the dangerous message, extracting the contact information of the sender of the dangerous message from the identification identification information of the dangerous message; And extracting the sender's name from the registered name when a name corresponding to the contact information of the sender of the dangerous message is registered in the dangerous message monitoring device.
  • the risk message monitoring apparatus transmits a mask of a part of a caller's name or a part of a contact.
  • the guardian's terminal masks and displays a part of the received caller's name or a part of a contact.
  • step (d) if the dangerous message is recognized through the application state information storage area, the step of extracting the caller's name through the name of the conversation partner represented by the application state information storage area; .
  • step (f) may include providing a part of the name of the other ward or a part of the contact with the part of the caller's name or a part of the contact.
  • the method to provide the assured security services (i) after the step (e), further comprising the step of transmitting the risk message and the name or contact of the sender of the dangerous message to the school terminal of the protected person.
  • a risk word included in the pre-stored risk word list may be assigned a plurality of different risk levels according to at least one of violence, threat, and hazard.
  • the method to provide the assured security services (j) the risk message monitoring device or the guardian terminal, the total number of dangerous messages sent by the sender of the dangerous message, the number of dangerous words included in the dangerous message, dangerous messages According to at least one of the risk level of the risk word contained in, further comprising the step of providing the risk of the sender.
  • the method for providing the assured security service for the guardian, (k) when the risk message is received from the two or more different senders, each of the risk message monitoring device, the risk message monitoring device, the contents of the risk message of each caller may further include providing an association between each caller.
  • the risk message monitoring device (1) after the step (c), if it is determined that the dangerous word is included in the received message, the dangerous word is violent Distinguishing whether it is a threatening word or a joke or a familiarity word; And (l-2) if the dangerous word is a violence or threatening word, determining the received message as the dangerous message.
  • program instructions for implementing the method for providing the assured security service described above may be recorded.
  • the risk message monitoring apparatus for providing the assured security services, the message receiving unit for receiving a message sent to the subject; A message recognition unit recognizing the received message with reference to a message storage area or an application state information storage area; A risk message determination unit which compares the received message with a pre-stored risk word list, and determines whether the received message contains a risk word; A caller information extracting unit extracting a sender's name or a contact's contact number of the dangerous message if the received message is determined to be a dangerous message including the dangerous word; And a risk information transmitter for transmitting the risk message and the name of the caller or the contact information of the caller to a terminal of the guardian corresponding to the guardian.
  • the risk message monitoring device the right to access the application state information storage area of the protected terminal to the protected party secure application installed in the protected terminal included in the dangerous message monitoring device before receiving the message sent to the protected party. It further includes an access permission setting unit for setting.
  • the message recognition unit may recognize the SMS or MMS message with reference to the message storage area, or recognize the chat message received by the chat application installed in the terminal of the protected person with reference to the application state information storage area.
  • the risk information transmitter masking and transmitting a part of the caller's name or a part of the contact.
  • the apparatus further includes a caller abuse information extracting unit that transmits the protected person's information to the guardian terminal together with the sender's name or contact information.
  • the guardian terminal for providing the assured security service, the risk message including the risk word received from the risk message monitoring device to the guardian receives the name or contact information of the sender of the dangerous message Risk information receiving unit; And a risk information provider for displaying a part of the risk message and the caller's name or a part of a contact.
  • a plurality of different risk levels may be assigned according to at least one of violent, threatening, harmful.
  • the guardian terminal according to at least one of the total number of dangerous messages sent by the sender of the dangerous message, the number of dangerous words included in the dangerous message, the risk level of the dangerous words included in the dangerous message, It further includes a risk providing unit for providing a risk.
  • the method of providing the assured security service is performed by the risk message monitoring apparatus, and (l) the URL address of the server to which the terminal of the guardian included in the risk message monitoring apparatus accesses, and is requested to be executed on the terminal of the guardian.
  • Extracting application information or moving picture information requested to be executed on the terminal of the protected person (m) determining whether the extracted URL address, application information, or video information is harmful content by referring to a harmful database; And; (n) if it is determined that the extracted URL address, application information, or video information is harmful content, the terminal of the ward is blocked from accessing the extracted url address, or the requested application is executed on the ward;
  • the method may further include transmitting a message to the terminal of the protected person so that the video is not executed.
  • the method to provide the assured security services (o) the risk message monitoring device, extracts the information about the URL address and the number of times blocked access to the terminal of the protected person, to provide to the terminal of the guardian It further comprises a step.
  • the method to provide the assured security services the method performed by the risk message monitoring device, (o) extracting the video information stored in the terminal of the protected person included in the risk message monitoring device; (p) providing the extracted video information to the terminal of the guardian upon receiving a request for inquiry of the video information stored in the terminal of the guardian from the terminal of the guardian; (q) receiving deletion request information on the deleted video from the provided video information from the terminal of the guardian; And (r) providing the deletion message of the form including the deletion request information and not providing a push notification on the terminal of the protected person.
  • one embodiment of the present invention monitors the risk message received by the guardian, so that the guardian can predict the victim's risk situation (for example, school violence) in advance or Can be detected.
  • the victim's risk situation for example, school violence
  • the guardian by providing the name or telephone number information of the perpetrator, the guardian can predict the perpetrator's information, and also provides the guardian with information of the other protectees who received the perpetrator's acts This can provide additional risk information for the offender.
  • any one of the problem solving means of the present invention it is possible to send the risk message received by the ward to the school terminal of the ward, so that the school side can know the risk situation or the information of the perpetrator in advance.
  • the guardian by alerting the guardian of the danger of the risk message, the guardian can predict the serious situation in advance, or even if the risk message contains the risk words of joke or friendliness display By filtering the cases, the guardian can only recognize the necessary risk messages.
  • FIG. 1 is a block diagram of a system for providing assured security services according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing the internal configuration of the risk message monitoring apparatus according to an embodiment of the present invention.
  • FIG. 3 is a block diagram showing an internal configuration of a guardian terminal according to an embodiment of the present invention.
  • FIG. 4 is a block diagram showing a configuration according to a further embodiment according to an embodiment of the present invention.
  • FIG. 5 is an exemplary screen of a risk information providing interface in a guardian terminal according to an embodiment of the present invention.
  • Figure 6 is a flow chart for explaining a method for providing assured security services according to an embodiment of the present invention.
  • FIG. 7 is a flowchart illustrating a method for providing a guaranteed security service according to another embodiment of the present invention.
  • FIG. 8 is a block diagram showing the internal configuration of a risk message monitoring apparatus according to another embodiment of the present invention.
  • FIG. 9 is a block diagram showing an internal configuration of a risk message monitoring device and a guardian terminal according to another embodiment of the present invention.
  • “Danger” means the nature of a publication that is unsuitable for disclosure to minors or other protected persons, such as harmful, violent, intimidating, obscene, banned, or adult persons. Therefore, “danger word” means a word having this inappropriate character, and “danger message” means a message containing a dangerous word. Therefore, a message containing abusive or violent or intimidating words received by the guardian may be called a dangerous message.
  • the system for providing the assured security service includes a risk message monitoring apparatus 100 and a guardian terminal 200.
  • the dangerous message monitoring apparatus 100 may be configured of the terminal to be protected 110 and the server 120.
  • the protected terminal 110 is a terminal possessed by the protected party, and may be a text message (for example, an SMS or MMS message) or an instant message (for example, a message of a messenger application), an SNS message, or the like from a third party server (not shown). You can receive e-mails. Subsequently, when it is detected that a dangerous word such as “XXX, get money” is included in the received message, the protected terminal 110 transmits a dangerous message including the dangerous word to the server 120.
  • a dangerous word such as “XXX, get money”
  • the server 120 receives the risk message and transmits it to the guardian terminal 200.
  • the server 120 may search for identification information of the guardian terminal 200 registered in the server 120 in correspondence with the guardian terminal 110 by referring to the information of the guardian terminal 110 that has sent the dangerous message. have. Subsequently, the server 120 may transmit a risk message to the retrieved guardian terminal 200.
  • the guardian terminal 200 receives the risk message from the server 120 and displays the risk message, thereby providing the guardian with the risk message received by the guardian. Through this, the guardian who has the guardian terminal 200 can check whether a dangerous state of his / her guardian is exposed. For example, knowing that your child has received a threatening message, such as “XXX, Bring money,” so that your child can be aware of the dangers he or she is facing, even if he or she does not speak to you. Opportunities can be provided to take appropriate measures in advance so as not to flow into more serious situations.
  • guardian terminal 110 and the guardian terminal 200 may be installed by the guardian and the guardian assured application, respectively, the risk message monitoring and notification operation as described above by the operation of the assured assured application.
  • the network (N) for relaying communication between the guardian terminal 110, the server 120, and the guardian terminal 200 may include a local area network (LAN), a wide area network (WAN), and a value-added communication network.
  • LAN local area network
  • WAN wide area network
  • a value-added communication network may include a local area network (LAN), a wide area network (WAN), and a value-added communication network.
  • VAN Local Area Network
  • PAN Personal Area Area Network
  • mobile radio communication network Wireless Broadband Internet (Wibro), Mobile WiMAX, High Speed Downlink Packet Access (HSDPA) or satellite network It can be implemented with all kinds of wired / wireless networks.
  • Wibro Wireless Broadband Internet
  • HSDPA High Speed Downlink Packet Access
  • guardian terminal 110 and the guardian terminal 200 may be implemented as a computer, a portable terminal, or a television that can be connected to the server 120 at a remote location through the network N, or can be connected to other terminals and the server 120.
  • the computer includes, for example, a laptop, desktop, laptop, etc., which is equipped with a web browser
  • the portable terminal is, for example, a wireless communication device that ensures portability and mobility.
  • the television may include an Internet Protocol Television (IPTV), an Internet Television (Internet Television), a terrestrial TV, a cable TV, or the like.
  • IPTV Internet Protocol Television
  • Internet Television Internet Television
  • the dangerous message monitoring device 100 includes a protected terminal 110 and a server 120, and the components described with reference to FIG. 2 may be selectively employed in the protected terminal 110 or the server 120. .
  • the access right setting unit 101 sets an access right for the supervised monitoring application so that the supervised monitoring application installed in the supervised terminal 110 can monitor the message received by the supervised terminal 110.
  • the access right may mean an access right for the application state information storage area of the protected terminal 110.
  • the application state information storage area is an area included in the operating system of the to-be-protected terminal 110 or configured independently of the operating system, and temporarily or permanently stores texts, messages, files, etc. received by various applications arranged under the operating system. Area.
  • the information stored in the application state information storage area may be information that can also be seen by the general user by requesting the general user of the terminal to view the stored information.
  • the information stored in the application status information storage area may be information listed in an application status window that appears according to a user input dragged from the top to the bottom of the smart device. Generally, about an application registered in the application status window. If there is an update status, the push notification may be configured to be sent to the terminal, and the user may check the update status information by reading the application status window. For example, a chat message of A received by the chat application or The SNS message of B received by the SNS application is also stored in the application state information storage area and may be included in the monitored target of the assured user.
  • the access right setting may be automatically performed at the same time as the installation of the guardian monitoring application, or may be manually performed according to the input of the guardian or guardian. For example, when the guardian inputs the access right setting button of the guardian monitoring application, the access right setting unit 101 may grant the guardian monitoring application access to the application state information storage area of the guardian terminal 110. .
  • the message receiving unit 102 receives a message from the outside (ie, an external server or an external terminal).
  • the message received by the message receiver 102 may be any one of a text message (eg, SMS, MMS, etc.), an instant message (eg, a chat message of a chat application), an SNS message, and an email.
  • the message receiver 102 may receive a message of a chat application such as KakaoTalk, Line, TickTalk, Nate-On, etc., and a short message of a message application installed in the protected terminal 110.
  • the message recognition unit 103 recognizes the content of the received message.
  • the text message may be recognized by referring to the message storage area of the dangerous message monitoring device 100.
  • it can be recognized by referring to the application state information storage area.
  • access to the message storage area for storing text messages is set to allow any application installed in the terminal.
  • the dangerous message determination unit 104 determines whether the received message is a dangerous message.
  • the dangerous message determination unit 104 compares the received message with the dangerous word list, and determines the received message as a dangerous message when the dangerous message is included in the received message. For example, when the word “get money” is included in the risk word list and a message including the word is received, the risk message determination unit 104 may determine that the received message is a risk message.
  • the dangerous word storage unit 105 stores the above-mentioned dangerous word list.
  • the risk word list is a set of risk words that are classified into a plurality of categories.
  • the plurality of categories may include, for example, 1 violence / threatening 2 pornography / adults 3 harmful / profanity 4 suicide / deviation 5 other harmful words.
  • the risk word storage unit 105 may update and store the risk word list regularly or irregularly.
  • the dangerous word storage unit 105 may update and store the list of dangerous words input by the service manager, or update and store the words recognized as dangerous words among the dangerous messages received by the protected terminal 110. .
  • the sender information extracting unit 106 extracts the sender information of the dangerous message from the calling identification information of the dangerous message. Specifically, the sender information extracting unit 106 may grasp the contact information (for example, a phone number, an e-mail address, an SNS account address, and a chat application ID) of the dangerous message through the address of the dangerous message. Subsequently, the caller information extracting unit 106 determines whether the caller's contact information is registered in the danger message monitoring apparatus 100, and if registered, the caller information extraction unit 106 stores the caller's name (or nickname) stored in correspondence with the registered caller's contact information. You can find out the name of the sender by searching.
  • the contact information for example, a phone number, an e-mail address, an SNS account address, and a chat application ID
  • the sender information extracting unit 106 refers to the information of the contact partner, thereby calling the sender's name or contact information. Can be identified.
  • the risk information transmitter 107 transmits the risk message and the sender's information to the protected terminal 110.
  • the sender's information to be sent includes the sender's name or contact information.
  • the name or contact information of the sender corresponds to personal information, and when transmitted without filtering, there may be a risk of indiscriminate exposure of personal information. Therefore, the risk information transmitter 107 may mask a part of the caller's name or a part of the caller's contact information and transmit the masking process to the guardian terminal 200. For example, at least one “*” may be inserted into a syllable in the center of the caller's name or in the center area of the caller's contact.
  • the sender adds information extractor 108 may extract and provide information on the other protected.
  • Caller add information extraction unit 108 may be a configuration that is included in the server 120 of the dangerous message monitoring device 100 preferably.
  • the sender abuse information extraction unit 108 transmits the dangerous message sender information (name or contact information) and the dangerous message when the risk message is transmitted from the guardian terminal 110 to the guardian terminal 200. ) Information can be stored correspondingly. Accordingly, the sender abuse information extraction unit 108 may store information of several victims (ie, users of the protected terminal 110) with respect to one perpetrator (that is, dangerous message sender).
  • the caller abuse information extraction unit 108 may extract information of other protected persons associated with the caller through the caller information. For example, it can be seen that there are B, C, and D protectees to whom the sender A sends a danger message.
  • the sender abuse information extraction unit 108 may transmit the extracted information of the other protected persons to the guardian terminal 200.
  • some of the names or contacts of other guardians may be masked and transmitted, or may be displayed without being masked by the guardian terminal 200 after being transmitted to the guardian terminal 200 without editing.
  • the guardian terminal 200 corresponding to the risk message monitoring apparatus 100 may include a risk information receiver 201 and a risk information provider 202.
  • the risk information receiving unit 201 receives the risk information transmitted by the risk message monitoring apparatus 100. That is, the risk information receiving unit 201 may receive the risk message and the sender information of the risk message received from the protected terminal 110.
  • the risk information provider 202 provides the received risk message and the sender information so that the guardian can see it.
  • the risk information providing unit 202 may provide the contents and statistics of risk information for the protectee.
  • the risk information providing unit 202 may include the total number of dangerous messages received by the guardian, the information of the sender (for example, the name of the sender, the contact number, the total number of dangerous messages transmitted by the sender, and the sender of the message).
  • a recent dangerous message was received by the custodian, the information of the dangerous message (e.g., the type of application that received the dangerous message, the time of receipt of the dangerous message, the category of the dangerous word contained in the dangerous message, and the content of the dangerous message). Can be provided.
  • a risk information providing interface displayed on the guardian terminal 200 is illustrated.
  • the total number of dangerous messages received by the guardian terminal 200 is displayed.
  • the total number of dangerous messages and the number of recently received dangerous messages may be displayed together.
  • the sender's information is displayed in the R2 area.
  • the sender's name and contact information are masked and provided in some areas, and the total number of received messages for each sender is displayed together.
  • the risk information providing unit 202 displays the name or contact information of the caller who has been masked from the dangerous message monitoring device 100 or receives the original caller's name or contact information from the danger message device, and then masks it. It can also be displayed.
  • the R3 area provides information indicating that the dangerous message is a text message such as SMS or MMS or an instant message such as KakaoTalk message, and the received date of the dangerous message and the category of the dangerous word included in the dangerous message are also included. It is provided.
  • the system for providing the assured security service further includes a risk providing unit 301, a risk word purpose determining unit 302, and a caller association determining unit 303. It may also include.
  • the risk providing unit 301 and the risk word purpose determining unit 302 may be implemented to be included in either the risk message monitoring apparatus 100 or the guardian terminal 200.
  • the risk provider 301 may determine the risk of the sender of the risk message and provide the guardian.
  • the degree of risk represents the degree of danger to the actions of the sender of the danger message to the custodian, and can be calculated by numerical value or color.
  • the risk rating can be expressed as 0 to 10, the value of any of these figures, or the risk rating as yellow, green, or red, and the color of any of these colors. have.
  • the risk may be determined according to at least one of the total number of risk messages sent by the sender, the number of risk words included in the risk message, and the risk level of the risk words included in the risk message.
  • the risk level is a level indicating the seriousness of the dangerous situation of the word, and the words of the risk word list stored in the risk message monitoring device 100 have different risk levels according to at least one of violent, threatening, and harmful. May be specified. For example, words such as “go off”, “dull”, “torai”, “sad”, etc. can be terms that can often be mentioned without the purpose of harm, so they are set to have a low risk rating, “bring money”, “ Words such as "Bamboo” and "Would Tear” can be set to have a high risk rating.
  • the risk provider 301 When the risk provider 301 is implemented in the server 120, the risk may be determined based on a risk message sent by one sender to several guardians, and the risk provider 301 is implemented in the guardian terminal 200. If so, the risk may be determined based on the risk message sent by one sender to one protector.
  • the guardian can predict in advance how dangerous the sender of the risk message is. For example, if the risk is low, the guardian thinks of joking or using a little excessive language between friends, or if the risk is high, the guardian can immediately recognize that the sender's school violence is serious.
  • the risk word purpose determination unit 302 determines whether the risk word is a word having a characteristic such as violence or intimidation or a joke or a friendliness display, and filters the latter if the latter is a risk message. It may not provide or inform the guardian that the message is of low risk. In general, adolescents use swear words or slang words habitually as a meaningless or as a friendly sign. In this case, if the guardian recognizes the danger message and informs the guardian, the guardian receives an unnecessary message, and the guardian is invaded with the privacy of the unnecessary area. Although the risk providing unit 301 described above provides some functions for improving such a problem, it may not be able to completely filter unnecessary risk messages.
  • the risk word purpose determination unit 302 may determine the purpose of the risk word through pattern analysis between the received message and the message input by the protected person. For example, after the dangerous message is received by the custodian terminal 110, the custodian inputs a message including the dangerous word within a certain time period, or includes a positive word such as “ ⁇ ”, “ ⁇ ”, or “laugh”. In the case of inputting the message, the danger message received by the guardian can be judged as a message of joke or friendliness display. Alternatively, if a message containing a dangerous word having a high risk level is continuously received more than a predetermined number of times, it may be determined that the message is a dangerous message for violence or threatening purposes.
  • a message of a joke or a friendliness display may not be transmitted to the guardian terminal 200.
  • the risk word purpose determination unit 302 is implemented in the guardian terminal 200, the joke or friendliness display message among the messages received in the guardian terminal 200 may not be displayed.
  • the caller association determining unit 303 When the sender association determining unit 303 receives a risk message from two or more different senders at the risk message monitoring apparatus 100, the caller association determining unit 303 provides the presence or absence of an association between each caller by referring to the contents of the risk message of each caller. do. For example, if a dangerous message was received from a sender, A and B, and the messages in A and B contain common nouns (eg, friend's name, school, academy, etc.), then A and B are related to each other. You can judge that there is. In addition, when A's risk message includes B's name or contact information or B's risk message includes A's name or contact information, A and B may be determined to be related to each other.
  • the risk message monitoring apparatus 100 may grant an access right to an application state information storage area to an assured secured application that is already installed (S110).
  • the setting for granting the access right may be automatically performed at the same time as installing the assured secured application, or may be performed according to the input of the assured or the guardian. Since the instant message received by the risk message monitoring apparatus 100 may be stored in the application state information storage area, the instant message received by the risk message monitoring apparatus 100 may be monitored according to the access right setting.
  • the dangerous message monitoring apparatus 100 receives a message (S120).
  • the dangerous message monitoring apparatus 100 may receive a text message or an instant message from another terminal or server.
  • the dangerous message monitoring apparatus 100 may recognize the contents of the received message by referring to the message storage area or the application state information storage area (S130).
  • the dangerous message monitoring device 100 may recognize an SMS or MMS message by referring to a message storage area, and may recognize an instant message of a chat application installed in the dangerous message monitoring device 100 by referring to an application state information storage area. have.
  • the dangerous message monitoring apparatus 100 determines whether the received message is a dangerous message including a dangerous word (S140). If the dangerous message is included in the received message with reference to the dangerous word list, the dangerous message monitoring apparatus 100 determines that the dangerous message is not. If not, the dangerous message monitoring device 100 determines that the dangerous message is not a dangerous message.
  • the dangerous message monitoring apparatus 100 extracts information of the sender of the dangerous message (S150).
  • the dangerous message monitoring apparatus 100 may grasp the name or contact information of the sender through the identification information of the dangerous message (for example, information on the originating address or the conversation partner of the instant message).
  • the dangerous message monitoring device 100 only detects the contact information of the sender from the address of the dangerous message, the name of the sender may be extracted by searching whether there is a name stored in the dangerous message monitoring device 100 in response to the identified contact. have.
  • the risk message monitoring apparatus 100 transmits the risk message and the sender's information to the guardian terminal 200 (S160). If the name is not extracted from the caller information, only the contact may be transmitted. If the name is extracted, at least one of the name and the contact may be transmitted. Specifically, after the guardian terminal 110 of the dangerous message monitoring device 100 transmits the dangerous message and the sender's information to the server 120, the server 120 may transmit the received information to the guardian terminal 200. have.
  • the guardian terminal 200 may provide the received risk message and provide a part of the caller's information to the guardian. Specifically, the statistical information related to the risk message can be displayed through the guardian terminal 200 without filtering, but the name or contact information of the caller information may correspond to personal information, so that some areas may be masked and displayed. For example, the middle part of a name or the middle part of a contact may be provided by displaying at least one “*”.
  • the risk message monitoring apparatus 100 may further provide information on the danger message sender.
  • the server 120 may store the dangerous message received from the protected terminal 110, information of the sender, and information of the protected terminal 110 (S210). ). Therefore, the server 120 may store the correspondence between the sender and the protected party. For example, when a sender A sends a risk message to B, C, and D, the server 120 may store information A and B, C, and D in association with each other.
  • the server 120 searches for information of the other protected terminal 110 associated with the caller based on the caller's information (S220). For example, when B receives a risk message from A, the server 120 may retrieve information of C and D that received a risk message from A in addition to B. In this case, the information about C and D may be the sender's abuse information.
  • the server 120 transmits the information of the other protected terminal 110 associated with the sender to the protected terminal 200 (S230).
  • the guardian terminal 200 may display the information of the other protected terminal 110 received along with the caller information, and in this case, only some of the information of the other protected terminal 110 may be displayed (S240). For example, if the information of the other protected terminal 110 is the name or contact information of C and D that received a dangerous message from A, there may be a risk of indiscriminate exposure of personal information, so that some areas may be masked and displayed. have.
  • the guardian can see that the sender A has acted up to another student named C or D in addition to his child B. It is also possible to infer the information of the caller A from the C and D information.
  • the risk message monitoring apparatus 100 may transmit the risk message and the sender information to the school terminal of the ward.
  • Schools often do not recognize incidents of school violence, so they can be sent to school terminals so that school officials or teachers can recognize school violence in advance.
  • the risk of the sender of the danger message may be provided to the guardian.
  • the degree of risk represents the degree of danger to the actions of the sender of the danger message to the custodian, and can be calculated by numerical value or color.
  • the risk may be determined according to at least one of the total number of risk messages sent by the sender, the number of risk words included in the risk message, and the risk level of the risk words included in the risk message.
  • the risk level is a level that indicates the seriousness of the dangerous situation of the word.
  • step S140 or S170 of FIG. 6 whether the risk word is a word having the characteristics of violence or threat, such as jokes or friendliness display. If the latter is determined, the latter may be filtered to perform a function of not providing the guardian with the corresponding risk message or informing the guardian that the message is of low risk. Specifically, if the purpose of the risk word is determined by analyzing the pattern between the received message and the message input by the ward, or if a message including a risk word having a high risk level is continuously received more than a predetermined number of times, the purpose of violence or intimidation is determined. It can be judged as a dangerous message.
  • a further embodiment of the present invention is a service of one of the assured security services, and may include a configuration that prevents access to harmful content in advance.
  • the configuration for preventing access to harmful content is as shown in FIGS. 8 and 9.
  • the dangerous message monitoring device 100 may further include a harmful site blocking unit 111, a harmful app blocking unit 112, a harmful video blocking unit 113, and a harmful content determining unit 114.
  • a harmful site blocking unit 111, the harmful app blocking unit 112, and the harmful video blocking unit 113 are implemented to be included in the protected terminal 110, or the harmful content determining unit 114 is connected to the server 120. It may be implemented to be included.
  • the harmful site blocking unit 111 serves to block the protected terminal 110 from accessing the harmful site.
  • the harmful site blocking unit 111 may determine a URL address for the to-be-guaranteed terminal 110 to access the corresponding server 120. Extract.
  • the harmful site blocking unit 111 queries the harmful content determining unit 114 whether the extracted URL address is a URL address of the harmful site.
  • the harmful content determination unit 114 compares the harmful URL address stored in the harmful database (not shown; which may be included in the dangerous message monitoring device 100 or may be configured as a separate server) with the URL address that was inquired. Determine whether the URL address is that of a harmful site.
  • the harmful content determination unit 114 transmits a message that the harmful site to the harmful site blocking unit 111, the harmful site blocking unit 111 is a site on the protected terminal (110) You can provide a blocking window indicating that access is blocked.
  • the blocking window may be provided by receiving a separate blocking packet generated by the harmful content determining unit 114 or the harmful site blocking unit 111.
  • the harmful site blocking unit 111 may provide previously stored blocking window information to the display module of the to-be-protected terminal 110.
  • the harmful app blocking unit 112 serves to block execution of harmful apps (that is, applications) installed on the protected terminal 110.
  • the harmful app blocking unit 112 obtains a package name for the app on which the execution request is input on the protected terminal 110.
  • the harmful app blocking unit 112 obtains a package name of the specific app.
  • the harmful app blocking unit 112 may query the name or the package name of the specific app identified through the package name to the harmful content determination unit 114 to query whether the harmful app is harmful.
  • the harmful content determination unit 114 determines whether the package name or the name of the app indicates a harmful app by referring to the harmful database.
  • the harmful content determination unit 114 may provide a message indicating that the app requested to the harmful app blocker 112 is a harmful app, the harmful app blocker 112 may send the message. Upon receipt, the execution of the query requesting app can be blocked. In addition, the harmful app blocking unit 112 may provide the above-described blocking window on the protected terminal (110).
  • the harmful video blocking unit 113 serves to block playback of the harmful video stored in the protected terminal 110.
  • the harmful video blocking unit 113 acquires all video information (eg, a video name, a video download address, a video acquisition path, video thumbnail information, etc.) downloaded to the protected terminal 110.
  • the video information generated by the play request is transmitted to the harmful content determination unit 114 to query whether the video is harmful.
  • the harmful content determination unit 114 may determine whether the received video is a harmful video by referring to the harmful database. For example, if the name of the video includes adult or gambling-related content, or if the video download address is classified as a harmful site, the video thumbnail information may be determined as a harmful video.
  • the harmful video blocking unit 113 receives the determination result message from the harmful content determination unit 114, and when the determination result message indicates that the harmful video is a harmful video, blocks the execution of the requested video.
  • a blocking window may be provided separately after blocking.
  • the harmful site blocking unit 111 and the harmful app blocking unit 112 count the number of times of blocking each time a connection to the harmful site is blocked from the protected terminal 110 and a harmful application execution is blocked. And save. In addition, by providing the stored number of blocked times, blocked URL addresses, and blocked app names to the guardian terminal 200, the guardian can grasp the blocking information of the harmful site / app.
  • the harmful content determining unit 114 determines whether or not harmful information is harmful by responding to a question regarding whether the harmful site, harmful apps, or harmful videos are harmful.
  • the harmful content determination unit 114 may include a harmful database or communicate with a harmful database implemented in a separate server to determine whether harmful content is present.
  • another embodiment of the present invention may provide a configuration in which a guardian directly checks a video stored by the guardian and selects and remotely deletes a video that is suspected to be a problem.
  • the protected terminal 110 may further include a video deleting unit 115
  • the server 120 may further include a protected video managing unit 121, and the protected terminal 200.
  • the guardian video providing unit 203 may further include a guardian video deletion request unit 204.
  • the video deleting unit 115 of the protected terminal 110 transmits the information of the videos downloaded to the protected terminal 110 to the server 120.
  • information of the downloaded videos may be transmitted to the server 120 from time to time.
  • the transmitted video information may be a video name, a video download address, a video acquisition path, video thumbnail information, a download date, and the like.
  • the protected video management unit 121 receives and stores video information of the protected terminal 110. Subsequently, when a video information request of the guardian terminal 110 is generated from the guardian terminal 200, the stored video information may be provided to the guardian terminal 200.
  • the guardian video providing unit 203 of the guardian terminal 200 requests the video information of the guardian terminal 110 to the server 120 according to the guardian's input, and provides the video to the guardian terminal 200 in a list form so that the guardian can check it.
  • the list may include information about a name of the video, a download date, a download address, and the like.
  • the guardian video deletion request unit 204 of the guardian terminal 200 generates deletion request information for the video selected by the guardian from the provided list, and transmits the deletion request information to the server 120.
  • the deletion request information includes identification information about a name of a video requested to be deleted.
  • the protected video management unit 121 After receiving the deletion request information, the protected video management unit 121 includes the deletion request information in the deletion message and transmits the deletion request information to the protected terminal 110.
  • the deletion message may be implemented in the form of a Google Cloud Messaging for Android (GCM) message.
  • GCM Google Cloud Messaging for Android
  • the GCM message is a message type that is transmitted from the terminal that receives the message so that the reception of the message is not push notification on the terminal.
  • the video deleting unit 115 receives the deletion message, identifies the video through the video name included in the deletion message, and deletes the identified video.
  • the danger message monitoring device 100 collects the location information of the person in real time through a location tracking module (for example, GPS) of the person being protected 110, and the recent number It is possible to generate location information for each time zone of the list of places where the guardian has moved within a time period and provide the guardian terminal 200 with real-time location information.
  • the guardian terminal 200 can collect real-time location information of the guardian, and when the emergency or dangerous situation occurs in the guardian, the collected location information can be usefully used.
  • Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media.
  • Computer readable media may include both computer storage media and communication media.
  • Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transmission mechanism, and includes any information delivery media.
  • the method for providing the assured security service may be implemented as a computer program (or computer program product) including instructions executable by a computer.
  • the computer program includes programmable machine instructions processed by the processor and may be implemented in a high-level programming language, an object-oriented programming language, an assembly language, or a machine language.
  • the computer program may also be recorded on tangible computer readable media (eg, memory, hard disks, magnetic / optical media or solid-state drives, etc.).
  • the method for providing the assured security service may be implemented by executing the computer program as described above by the computing device.
  • the computing device may include at least a portion of a processor, a memory, a storage device, a high speed interface connected to the memory and a high speed expansion port, and a low speed interface connected to the low speed bus and the storage device.
  • a processor may include at least a portion of a processor, a memory, a storage device, a high speed interface connected to the memory and a high speed expansion port, and a low speed interface connected to the low speed bus and the storage device.
  • Each of these components are connected to each other using a variety of buses and may be mounted on a common motherboard or otherwise mounted in a suitable manner.
  • One embodiment of the present invention by providing a risk message received to the child terminal immediately to the parent terminal so that parents can know in real time, it is possible to prevent the child from being exposed to school violence or other harmful media in advance. There is industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

Selon un des modes de réalisation de la présente invention, un dispositif de vigile apte à prédire ou à reconnaître, à l'avance, une situation dangereuse (par exemple, des scènes de violence à l'école) d'un quartier en surveillant un message de danger reçu du quartier. En particulier, selon un mode de réalisation de la présente invention, un dispositif de vigile peut reconnaître, à l'avance, des informations sur l'auteur d'une infraction ou des informations d'actes répréhensibles de l'auteur des faits en fournissant le nom ou des informations de contact de l'auteur et/ou les noms ou des informations de contact d'autres quartiers concernant l'auteur à propos duquel un message de danger a été envoyé, une partie seulement des noms ou des informations de contact pouvant être présentée au dispositif de vigile en considérant l'exposition indiscrète d'informations personnelles telles que les noms ou des informations de contact. En outre, selon un mode de réalisation de la présente invention, un message de danger reçu par un quartier peut être transmis à un terminal d'une école du quartier de sorte qu'une partie d'école puisse être informée, à l'avance, d'une situation dangereuse ou d'informations sur un auteur d'actes répréhensibles, et si des paroles de menaces compris dans le message de danger semblent être une plaisanterie, le message de danger peut être filtré et fourni au dispositif de vigile.
PCT/KR2014/006064 2014-04-18 2014-07-07 Procédé destiné à fournir un service d'allègement de service de quartier, dispositif de surveillance de message de danger destiné à fournir un service d'allègement de service de quartier, terminal de dispositif de vigile et support d'enregistrement lisible par ordinateur WO2015160038A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2014-0046480 2014-04-18
KR1020140046480A KR101619347B1 (ko) 2014-04-18 2014-04-18 피보호자 안심 서비스 제공방법, 피보호자 안심 서비스 제공을 위한 위험메시지 감시 장치, 보호자 단말 및 컴퓨터 판독가능 기록매체

Publications (1)

Publication Number Publication Date
WO2015160038A1 true WO2015160038A1 (fr) 2015-10-22

Family

ID=54324223

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2014/006064 WO2015160038A1 (fr) 2014-04-18 2014-07-07 Procédé destiné à fournir un service d'allègement de service de quartier, dispositif de surveillance de message de danger destiné à fournir un service d'allègement de service de quartier, terminal de dispositif de vigile et support d'enregistrement lisible par ordinateur

Country Status (2)

Country Link
KR (1) KR101619347B1 (fr)
WO (1) WO2015160038A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102022343B1 (ko) 2018-07-10 2019-09-18 문명화 스마트폰 기반의 유해성 키워드 검출 및 위치 분석 알림 시스템, 서버 및 방법
KR102613995B1 (ko) 2021-05-11 2023-12-15 송현정 건강 체크 및 이동 동선 확인을 이용한 헬스 케어 시스템
KR102597441B1 (ko) * 2023-02-23 2023-11-03 한수진 피보호자 채팅어플리케이션 케어 시스템 및 이를 이용한 방법

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100032472A (ko) * 2008-09-18 2010-03-26 주식회사 엔씨소프트 불건전 채팅 감시 시스템 및 온라인 게임 서비스에 있어서의 불건전 채팅 감시 방법
KR20110129224A (ko) * 2010-05-25 2011-12-01 (주)뮤레카 유해물 차단을 위해 통합제어모듈을 가지는 컴퓨터 단말기 및 이를 이용한 유해물 차단시스템
KR20130035572A (ko) * 2011-09-30 2013-04-09 고려대학교 산학협력단 메신저 피싱을 탐지하는 장치 및 방법
KR20130115018A (ko) * 2012-04-10 2013-10-21 주식회사 블랙스톤 휴대폰을 이용한 학교폭력 사전감지 시스템 및 방법
KR20140040305A (ko) * 2012-09-24 2014-04-03 재단법인대구경북과학기술원 교육을 위한 단말 감시 장치 및 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100032472A (ko) * 2008-09-18 2010-03-26 주식회사 엔씨소프트 불건전 채팅 감시 시스템 및 온라인 게임 서비스에 있어서의 불건전 채팅 감시 방법
KR20110129224A (ko) * 2010-05-25 2011-12-01 (주)뮤레카 유해물 차단을 위해 통합제어모듈을 가지는 컴퓨터 단말기 및 이를 이용한 유해물 차단시스템
KR20130035572A (ko) * 2011-09-30 2013-04-09 고려대학교 산학협력단 메신저 피싱을 탐지하는 장치 및 방법
KR20130115018A (ko) * 2012-04-10 2013-10-21 주식회사 블랙스톤 휴대폰을 이용한 학교폭력 사전감지 시스템 및 방법
KR20140040305A (ko) * 2012-09-24 2014-04-03 재단법인대구경북과학기술원 교육을 위한 단말 감시 장치 및 방법

Also Published As

Publication number Publication date
KR20150120651A (ko) 2015-10-28
KR101619347B1 (ko) 2016-05-10

Similar Documents

Publication Publication Date Title
US10779151B2 (en) Emergency information delivery
US10755370B2 (en) System and method for monitoring electronic communications
US9460299B2 (en) System and method for monitoring and reporting peer communications
US9571590B2 (en) System and method for improved detection and monitoring of online accounts
US20230385975A1 (en) System and method for monitoring electronic communications
US8472595B1 (en) Method and apparatus for providing a wireless portable communication device with the ability to selectively display picture and video images
WO2012176970A1 (fr) Système de service de sécurité et procédé associé
US20120135705A1 (en) Tools for mobile safety for children
KR101574027B1 (ko) 스마트폰 유해 차단 시스템
US20080162692A1 (en) System and method for identifying and blocking sexual predator activity on the internet
WO2012148094A2 (fr) Procédé de fourniture de service d'échange de messages à destinataire non identifié
CN104639770A (zh) 基于移动终端的电话举报方法、装置和系统
WO2015160038A1 (fr) Procédé destiné à fournir un service d'allègement de service de quartier, dispositif de surveillance de message de danger destiné à fournir un service d'allègement de service de quartier, terminal de dispositif de vigile et support d'enregistrement lisible par ordinateur
WO2022080742A1 (fr) Système de service de messagerie personnalisé, procédé de service de messagerie personnalisé et terminal utilisateur doté d'un service de messagerie personnalisé
WO2010090425A2 (fr) Procédé et appareil de gestion d'un pourriel dans un service de messagerie
KR102022343B1 (ko) 스마트폰 기반의 유해성 키워드 검출 및 위치 분석 알림 시스템, 서버 및 방법
WO2016182400A1 (fr) Dispositif mobile et système muni d'un écran d'informations de communication et de fonctions d'accès et procédé associé
WO2011090227A1 (fr) Procédé de raccordement prioritaire pour un récepteur désigné d'un appel téléphonique d'urgence et système associé
WO2014027855A1 (fr) Procédé d'interface utilisateur qui commande la délivrance d'une tonalité de numérotation entrante d'un dispositif intelligent
WO2016002996A1 (fr) Procédé et dispositif de blocage d'application de pupille, ainsi que terminal de tuteur, terminal de pupille, programme informatique côté tuteur et programme informatique côté pupille de blocage d'application de pupille
WO2013022259A2 (fr) Procédé et appareil permettant d'utiliser les informations et l'emplacement d'un appelé avant l'établissement d'un appel
KR101666614B1 (ko) 이력을 이용한 지능형 지속 위협 탐지 시스템 및 방법
CN111245804A (zh) 终端设备的通信安全测试方法及装置、存储介质
JP4937614B2 (ja) 電子掲示板システム
WO2014204259A1 (fr) Procédé et serveur d'émission d'un message de notification, et procédé de gestion d'un message de conversation en groupe

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14889588

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 14889588

Country of ref document: EP

Kind code of ref document: A1