×

Method of and apparatus for controlling access to the internet in a computer system and computer readable medium storing a computer program

  • US 6,928,455 B2
  • Filed: 09/27/2002
  • Issued: 08/09/2005
  • Est. Priority Date: 03/31/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for controlling access to outside sites through the Internet by using a computer system, including a first database storing a list of Uniform Resource Locators (URLs) of accessible Internet sites, a second database storing a list of URLs of prohibited Internet sites, a third database storing forbidden keywords and a fourth database storing worthwhile keywords, comprising the steps of:

  • when a user tries to have access to Internet sites of which URLs are stored in either the first or second database, allowing access to Internet sites of which URLs are stored in the first database and prohibiting access to Internet sites of which URLs are stored in the second database, when a user tries to have access to an Internet site of which a URL is stored in neither the first database nor the second database, examining information or contents retrieved from the Internet site of which the URL is neither stored in the first nor second database so as to examine if there is a forbidden keyword stored in the third database in the retrieved information or contents, if there is no forbidden keyword stored in the third database in the retrieved information or contents, then allowing displaying of the information or contents retrieved from the Internet site of which the URL is neither stored in the first nor second database to the user, if there is a forbidden keyword stored in the third database in the retrieved information or contents, then examining the retrieved information or contents if there is a worthwhile keyword stored in the fourth database, and allowing displaying of the information or contents retrieved from the Internet site of which the URL is neither stored in the first nor second database to the user only if there is a worthwhile keyword stored in the fourth database in the information or contents with the forbidden keyword stored in the third database.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×