USER COMMUNICATION RESTRICTIONS
First Claim
1. A computer-implemented method for restricting communications at a computer host, comprising:
- determining whether a first message which is sent to a computer host meets a restriction condition, the first message intended for receipt by a first user via an application at the computer host;
if the first message meets the restriction condition, intercepting the first message before it is made accessible to the first user via the application and storing the first message so that it is inaccessible to the first user; and
responsive to receipt of an authorization, making the stored first message accessible to the first user via the application.
2 Assignments
0 Petitions
Accused Products
Abstract
Communications provided via e-mail, instant messaging, chat, and web-based telephony applications, are monitored and restricted at a computer host. In one approach, messages from unknown or unsafe senders are intercepted and stored in a location inaccessible to all but an authorized person, until they can be reviewed by the authorized person, such as a parent. Via a user interface, the authorized user can review the messages at a later time to determine if the intended recipient, such as a child, should be able to access them. Once access is authorized, the stored messages are retrieved and provided to the recipient. In another aspect, a shared allow/block contact list identifies a user having different user names from one or more service providers. The contact list can integrate users from different services and communication modes. In another aspect, notification of monitoring is provided in the monitored messages or in newly generated messages.
211 Citations
20 Claims
-
1. A computer-implemented method for restricting communications at a computer host, comprising:
-
determining whether a first message which is sent to a computer host meets a restriction condition, the first message intended for receipt by a first user via an application at the computer host; if the first message meets the restriction condition, intercepting the first message before it is made accessible to the first user via the application and storing the first message so that it is inaccessible to the first user; and responsive to receipt of an authorization, making the stored first message accessible to the first user via the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for restricting communications at a computer host, comprising:
-
monitoring messages which are sent to the computer host via a network, including at least a first message which is sent by a first user, and intended for receipt by a second user, the at least a first message including a first identifier of the first user; responsive to the monitoring of the at least a first message, determining a unique identifier with which the first identifier is associated; determining a block or allow status based on the unique identifier; and controlling access to the at least a first message by the second user based on the block or allow status. - View Dependent Claims (11, 12, 13)
-
-
14. Computer readable media having computer readable code embodied thereon for programming at least one processor to perform a method for notifying a user of monitoring at a computer host, the method comprising:
-
monitoring messages which are received by a first user at the computer host via a network, the first user using a first communications application to received the messages, the messages including at least a first message which is sent by at least a second user, the second user using a second communications application to send the at least a first messages; and notifying the second user of the monitoring via the second communications application. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification