Child-oriented computing system
First Claim
Patent Images
1. A computing device comprising:
- a processor; and
a non-transitory computer readable storage media coupled with the processor, the non-transitory computer readable storage media comprising computer executable code to be executed by the processor to;
present to a first user, by the computing device, pictorial challenges in lieu of requiring the first user to enter a password to gain access to a service or the computing device;
receive, by the computing device, a request from the first user to access a service that includes at least one of a media aspect and a non-media aspect;
determine, by the computing device, if the service is associated with a whitelist of approved services and if the service is associated with a blacklist of services that are not approved;
allow, by the computing device, access to the service if the service is associated with the whitelist of approved services and not associated with the blacklist of services that are not approved;
deny, by the computing device, access to the service if the service is associated with the blacklist of services that are not approved;
log, by the computing device, activities of the first user interacting with the computing device including information associated with the request from the first user to access the service to an activity log file; and
provide, by the computing device, access to a second user to the activity log file.
0 Assignments
0 Petitions
Accused Products
Abstract
A child-oriented browsing system is provided wherein the system is implemented using a piece of client software, executing on the computing device of a child, and a website/server that manages the client software and other functions of the child-oriented browsing system.
86 Citations
20 Claims
-
1. A computing device comprising:
-
a processor; and a non-transitory computer readable storage media coupled with the processor, the non-transitory computer readable storage media comprising computer executable code to be executed by the processor to; present to a first user, by the computing device, pictorial challenges in lieu of requiring the first user to enter a password to gain access to a service or the computing device; receive, by the computing device, a request from the first user to access a service that includes at least one of a media aspect and a non-media aspect; determine, by the computing device, if the service is associated with a whitelist of approved services and if the service is associated with a blacklist of services that are not approved; allow, by the computing device, access to the service if the service is associated with the whitelist of approved services and not associated with the blacklist of services that are not approved; deny, by the computing device, access to the service if the service is associated with the blacklist of services that are not approved; log, by the computing device, activities of the first user interacting with the computing device including information associated with the request from the first user to access the service to an activity log file; and provide, by the computing device, access to a second user to the activity log file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
presenting to a first user, by a computing device, pictorial challenges in lieu of requiring the first user to enter a password to gain access to a service or the computing device; receiving, at the computing device, a request from the first user to access a service that includes at least one of a media aspect and a non-media aspect; determining, by the computing device, if the service is associated with a whitelist of approved services and if the service is associated with a blacklist of services that are not approved; allowing, by the computing device, access to the service if the service is associated with the whitelist of approved services and not associated with the blacklist of services that are not approved; denying, by the computing device, access to the service if the service is associated with the blacklist of services that are not approved; logging, by the computing device, activities of the first user interacting with the computing device including information associated with the request from the first user to access the service to an activity log file; and providing, by the computing device, access to a second user to the activity log file. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification