Method and device for controlling access to the internet in the computer system and machine-readable storage medium for storing the computer program

 

The invention relates to a method and apparatus for controlling the display of Internet sites. The technical result is to create a method and device that allows you to minimize the time required to verify the information or content of Internet sites before displaying on the display screen. The present invention provides a database for storage of useful keywords. When the useful keyword is part of the content or information from the Internet, the user is allowed to view it(this) the content (information) even if it contains a banned keyword. 3 S. and 11 C.p. f-crystals, 5 Il.

The technical field,

The present invention relates generally to a method and apparatus for controlling access to the Internet in the computer system and read by the computer, the storage medium for storing a computer program implementing this method on a computer. In particular, it relates to improved method and apparatus, which allow the operator to monitor, control or filtering in access client computers to interru wide web (WWW).

Prior art

The Internet has become the cultural environment of the sending and receiving various kinds of visual, audiovisual and other multimedia information. Using a Web browser, you can quickly access through the Internet Internet sites around the world that provide different kind of information, content and services, to view the content and to send data to the Internet sites. In addition, the Internet allows a large number of people around the world to quickly share data, mail and messages. In recent years the Internet became widespread in enterprises, the education system and among individual users.

At the present time via the Internet get many different kinds of information, content and services, such as making purchases, learn the news, use the library, listen to music and do the exchange. Therefore, more and more companies, schools and individuals connected to the Internet, which leads to significant changes in business, education and everyday life.

On the other hand, the Internet does not exist nicecast to the public any information. Cyberspace, i.e. the Internet, in fact, is not subject to any laws or restrictions. Therefore, in the Internet there are websites that provide malicious content, for example, pornographic, contain scenes of violence or inciting to unlawful acts that adversely affects or has too strong emotional impact on children and adolescents. While anyone can access any Internet site using the Web browser, while in school, at work or at home. At the same time, some Internet sites provide content or services that, while not malicious, have nothing to do with the workplace. If workers have the opportunity to have fun while viewing such web-sites during working hours, it adversely affects productivity and leads to an overload of the communication line of the enterprise of unnecessary traffic.

Because the Internet connection in enterprises, schools and homes became widespread, there was a need for a method and device for controlling user access to the Internet, preventing from entering the wrong information in acrescentou information. Thus, the required method and apparatus for filtering and wypracowania information or content downloaded from the Internet, which is harmful or not relevant to the user.

A method and apparatus that meets the prior art, disclosed in Japanese published patent application will not pass the examination, number 10-275157 and publishing "Companies Start Controlling Internet Access, Second Part, Software For Monitoring And Controlling Internet Access", Nikkei Computer, pp.87-91, 1999.05.10. The device or method, the relevant prior art, contain a vehicle or phase of testing for the presence of predefined malicious keywords in the information or content downloaded from the Internet, to display information or content on the display screen of the client computer. If the information or content contains predefined malicious words, displaying information or content is blocked, and uniform resource locator (URL) corresponding Internet site from which the client computer has received(a) information or content that is logged to block further client access. In Japanese patent No. 2951307 disclosed the terms on the Bulletin Board in the Internet site, or another system, computer network, and if the message of such words, the system blocks the display of messages on the Bulletin Board.

However, the prior art has the disadvantage that the search malicious, unlawful or offensive keyword or information content of Internet sites each time before displaying information or content on the computer screen takes time. In addition, the prior art is faced with another problem, which is that as soon as a keyword is found, displaying information or content containing(his) this keyword is blocked. However, malicious, unlawful or offensive keywords in the information or content does not mean that she/it herself/itself malicious(but) not(yet) or has an offensive character. For example, a news Bulletin from the web sites of news agencies that reported crimes, sometimes contain malicious keywords, such as “killer”. However, a summary of news reporting a crime, in and of itself is not malicious, and to lock the display on the screen of the client computer summaries cream is th provision, meet the prior art, sometimes block the display on the screen even useful information or content from the Internet sites simply because of the existence of prohibited keywords.

The invention

The present invention is to minimize the time required to verify the information or content of Internet sites before displaying on the display screen.

Another object of the invention is not to block the display of information or content, which in themselves are not harmful only because of the existence of prohibited keywords.

Another object of the invention is to provide control user access to the Internet based on the type of access.

To solve these and other problems provides a method for controlling access to external information through the Internet, containing phases in which: provide a first database containing a list of available Internet sites, provide a second database containing a list of banned Internet sites that provide a third database containing forbidden keywords, provide a fourth database that contains useful second database, allow access to the Internet sites included in the first database, and prevent access to Internet sites, included in the second database when the user tries to access the Internet site, is not included neither in the first nor in the second database, check the information or content found on the Internet site, is not included neither in the first nor in the second database, for information or content keywords, is included in the third database, and in the absence of keywords, included in the third database, allow the display on the user's computer information or content on the Internet site, is not included neither in the first nor in the second database, if the information or content keywords, is included in the third database, check the information or content on the presence of keywords included in the fourth database, and allow the display on the user's computer information or content on the Internet site, is not included neither in the first nor in the second database, only if information or information napolenic in providing users with quick access to Internet sites, included in the first database, for displaying information or content sites on the display screen. As for the Internet sites included in the second database, the advantage of the invention is that the user attempting to gain access to such sites as quickly as possible enters the message displayed on the display screen that the user is not authorized to access specific Internet sites. As for the Internet sites that are not included neither in the first nor in the second database, the method complying with the invention, provides for the search of information or content on the sites is at the user's request and verification of the information or content of the sites to determine the presence of any of the keywords included in the third database before displaying information or content on the display screen. If the information or content of the site does not contain any of the keywords included in the third database, the information or website content displayed on the display screen that allows the user to view them. However, if there are any keywords that included the or content of the sites to determine the presence, additionally, any key words that are included in the fourth database. If there any key words that are included in the fourth database, information or website content displayed on the display screen that allows the user to view them. Thus, another advantage of the invention is to provide the user access to useful information or content, such as news and scientific information, even if they contain a banned word. According to the prior art, any information or content that contain malicious keyword, for example a forbidden keyword specified in the third database is locked for display on the display screen, even if the information or content in and of themselves are not illegal and are useful.

According to another aspect of the invention, the method further includes a step in which, in accordance with a clock and/or calendar, share the days of the week and/or hours at the restrictive days and/or hours during which any access to the Internet is prohibited, permissive days and/or hours during which no nemakit-only access to Internet sites included in the first database, and regulatory days and/or hours during which control access to the Internet is carried out as described above. Another advantage of the invention is that it provides greater flexibility to control access to the Internet depending on day of week and time of day, for example during some night hours, when it is assumed that children do not use the Internet, users can freely access the Internet, from 9 am to 5 PM on weekdays, all access to the Internet is prohibited or is permitted access only to the Internet sites included in the first database, and on weekends and other hours on working days Internet access is regulated as described above.

According to another aspect of the invention, the method further comprises the steps, which provides a set of client computers, divide the set of client computers into four groups, the first group of client computers allow free access to the Internet, for the second group of client computers allow access only to web sites that are included in the first database, for the third group of client computers to prevent access to the Internet, and DL is m Another advantage of the invention lies in the ability to control access to the Internet depending on the groups of client computers. For example, at school or the office, for teachers or leaders, there's no limit Internet access for students and employees provided some degree of restriction of access to the Internet.

According to another aspect of the invention, the method further comprises the steps on which distributes the available Internet sites listed in the first database, prohibited Internet sites listed in the second database, banned keywords specified in the third database, and useful keywords specified in the fourth database, several groups on the basis of the same or similar attributes, respectively, and activate or inactivate each of the groups in the database from the first to the fourth group selection of Internet sites or keywords. Another advantage of the invention consists in the possibility to activate or deactivate each of the groups in the database from the first to the fourth group selection sites or keywords that have the same or similar attributes.

According to another aspect of the invention, the way the stage is the threat data from the first to the fourth through the Internet. Another advantage of the invention consists in the possibility to update the database from the first to the fourth through the Internet in accordance with the current development of the Internet and to help the operator to update the database.

According to another aspect of the invention, the method further comprises a step, which reads the content databases from the first to the fourth through the Internet from the outside. Another advantage of the invention consists in the possibility of bilateral exchange of content databases from the first to the fourth through the Internet.

According to another aspect of the invention, the method further comprises the steps that identify key words contained in the information or content viewed or found through the Internet, and store the number of times of occurrence of specific keywords in the viewed or found information or content.

According to another aspect of the invention, the method further comprises the steps on which count the number of times of occurrence of keywords in the information or content viewed or found at the client computer via the Internet, and store the number of rassmatrivaemoi(ω) or download(ω) at the client computer. Another advantage of the invention lies in the ability to control and manage Internet access for different for different client computers.

According to another aspect of the invention, the method further comprises the steps, which determine the type of Internet access requested by the user, and allow or forbid access to the Internet depending on the type of access requested by the user. Another advantage of the invention lies in the ability to control access to the Internet depending on the type of access, for example to allow easy viewing of the Internet site, but deny write information to an Internet website in order to avoid any leakage of information.

Brief description of drawings

These and other objectives, features and advantages of the present invention are explained in the following detailed description, given with reference to the accompanying drawings, in which:

Fig.1 is a diagram of a computer network containing the server computer and client computers connected to the Internet through a computer server that operates according to the method, corresponding to a variant of implementation of the present invention; and

Fig.2 - diagram of the server computer in the computer network shown is th invention; and

Fig.4 is a block diagram illustrating stages of a method that meets another variant implementation of the present invention; and

Fig.5 is a block diagram illustrating stages of a method that meets another variant implementation of the present invention.

Preferred embodiments of the invention

In Fig.1 shows a diagram of a computer network containing a server computer and a set of client computers connected to the Internet through a computer server, which works according to the way preferred variant implementation of the present invention. The computer 1 is typically connected to the Internet 2 through the provider 3, which connects a computer 1 to the Internet. As the computer 1 may be a personal computer connected to the provider 3 via a dial-up connection. According Fig.1, the computer 1 is a computer server that is associated with the set of client computer 5 via the LAN 4 and may be implemented as a proxy server. As the local network 4 may be a school or institutional network. The Internet 2 is connected to a variety of Web servers around the world. Each of the Web servers 6 on dostavljajut different kind of information or content, accessed through a browser program. The base page is usually a input page, which provides access to different kinds of information or informational content.

Information or the content of the Web servers 6 is a hypertext written in the language HyperText Markup Language (HTML), which can contain text, graphics, images, sound, video etc., the Example content written in HTML, shown on pages 21-23 encyclopedia of information processing, "Encyclopedia of Information Processing 98/99", Society of Information Processing, 1997. Search information or content on the Web server 6 is usually done using a Web browser (not shown) installed on the client computer 5. The Web browser allows you to not only view the information or the content of the Web server 6, downloading information or content from the Web server 6 and then displaying information or content on the display screen of the client computer 5, but also to send information to the Web server 6 with the client computer 5, for example, writing text on the Bulletin Board Web server 6. In addition, the program of the Web browser posvar>Way that meets the present invention is implemented in the proxy server 1 shown in Fig.1. A computer program to implement the method conforming to the present invention, is stored on a machine-readable storage media such as CD-ROMe (ROM CD-ROM) 7. According Fig.2, when installed on the server computer 1, the computer program builds on the server computer 1 of the first database 8 and the second database 9. The first database 8 contains a list of URLS of Internet sites, users have access to which is permitted by the operator of the local network 4. This list of the so-called white list contains URLS available to Internet sites that the operator of the local network 4 considers suitable for use in the network 4, for example, Internet sites, schools, research institutions, government bodies and other state institutions. The second database 9 contains a list of URLS of Internet sites, users have access to which is blocked by the operator of the local network 4. This list of the so-called black list, the URL contains a banned Internet sites that the operator of the local network 4 considers incompatible with the objectives of the local network 4, for example, Internet sites of a pornographic nature or reaeon for the second database 9. Black and white lists recorded on the CD-ROM 7, are divided into several groups depending on the attributes specified in the Internet sites, for example a group of school sites, the group of governmental sites, a group of pornographic sites and the group's sites. The operator of the local network 4 can select these groups in white and black lists of the first and second databases 8 and 9, activating or deactivation of each of the groups in accordance with the objectives of the local network 4. In addition, the operator of the local network 4 may at any time add any Internet site in every from the activated groups in the white and black lists of the first and second databases 8 and 9, or remove it from each of them. Activated group in white and black lists of the first and second databases 8 and 9 are used in the block diagram depicted in Fig.3, which will be explained below. Deactivated group in white and black lists of the first and second databases 8 and 9 are not used in the block diagram depicted in Fig.3.

According Fig.2, a computer program, recorded on a CD-ROM 7 being installed on the server computer 1, further builds the third database 10 and the fourth database 11 on the server computer 1. The third database 10 contains the list of banned key compatible with the objectives of the local network 4. The list of forbidden words, for example, contains offensive words, words that incite criminal acts, and words that are discriminatory in English and other languages. The fourth database 11 contains a list of useful keywords in the information or content of Internet sites, which indicate that the information or content is useful to view or show despite the fact that she(it) contains a banned word. A list of useful keywords contains, for example, journalistic terms, medical terms and legal terms English and another language. CD-ROM 7 you can pre-record the list of forbidden words and a list of useful words. Forbidden words and useful words in the lists recorded on the CD-ROM 7, are divided into several groups depending on their attribute, for example a group of legal terms, the group journalistic terms, the group of offensive words and group of discriminatory words.

The operator of the local network 4 can select the group in the list of forbidden words of the third database 10, activating or deactivation of each of the groups, which the operator considers to be incompatible with the objectives of the local network 4. In addition, the operator of the local network 4 may videodrive with the objectives of the local network 4, that allows you to display or viewed on the client computer 5 content or information Internet sites, even if the information or content contains a prohibited word from activated group to the third database 10. In addition, the operator of the local network 4 may at any time add or remove a keyword into or out of each(ouch) from the activated groups in the lists of third and fourth databases 10 and 11.

Activated groups in the lists of third and fourth databases 10 and 11 are used in the block diagram depicted in Fig.3, which will be explained below. Deactivated group lists, third and fourth databases 10 and 11 are not used in the block diagram depicted in Fig.3.

According Fig.2, a computer program, recorded on a CD-ROM 7, when installed on the server computer 1, further builds the fifth database 12 on the server computer 1. In the fifth database 12 stores the history of the use of the Internet each computer client LAN 4. In the fifth database 12 stores the URL of the websites to which access is had to each client computer 5, and the number of representative keywords identified in the information or content, the floor of the positive key words are defined as words, representing the feature of the information or content, and this can be prohibited keywords contained in the third database 10, and useful keywords contained in the fourth database 11. Alternatively, the representative words can be independently selected from Smoking and useful keywords contained in the databases 10 and 11. Representative keyword may be a word of English or another language.

A computer program, recorded on a CD-ROM 7, when installed on the server computer 1, further builds the sixth database 13 on the server computer 1. In the sixth database 13 stores the credentials, for example the IP addresses of the client computers 5, allowing to identify each of the client computers 5, connected to the LAN 4. Way that meets the present invention provides for the use of this identity for access control client computers 5 to the Internet.

In Fig.3 shows a block diagram illustrating an implementation of the method of controlling the viewing of Internet sites in accordance with the first embodiment of the present invention. Way realize the population viewing the Internet site server computer 1 receives the access request to the Internet 2 from the client computer 5. At step S2, the computer server 1 analyzes the access request to the Internet 2 from the client computer 5 is stored in the database 13 IP address of the client computer 5. At step S2, the server computer 1 also verifies the fact that the operator of the local network 4 allows client computers 5 only browse Internet sites and prevents client computers 5 to record information on Web servers 6 in the Internet. In relation to this variant implementation, assume that the operator of the local network 4 prohibits all client computers 5 to record information on a Web server 6 via the Internet 2. Alternatively, the operator may allow some or all of the client computers 5 to record information on Web servers 6. At step S3, if the client computers 5 are requesting access to write information to the Web server 6, the server computer 1 goes to step S4 to prevent client computers 5 to write to the Web server 6 and to report to the requesting client computer 5 that the request is denied access to the Internet. If the client computers 5 request access only for downloading information or content from the Web server 6, the server computer 1 goes to step S5.

At step S5, the server computer 1 Prov the traditional filling, on the subject, see whether the URL of the Web server 6 in the first database 8. If the URL of the Web server 6, the access to which the client computer 5 requests for downloading the information or content contained in the first database 8, the server computer 1 goes to step S6. At step S6, the server computer 1 connects to the Web server 6 via the Internet 2 using hypertext transfer Protocol (HTTP) and downloads the information or content from the Web server 6. The server computer 1 goes to step S7, transmitting information or content downloaded(OE) from the Web server 6, the requesting client computer 5 via the local network 4. Then the information or content obtained(OE) from the Web server 6 is displayed on the display screen of the client computer 5.

At step S5, if the URL of the Web server 6, the access to which the client computer 5 requests for downloading information or content that is not contained in the first database 8, the server computer 1 goes to step S8. At step S8, the server computer 1 checks the URL for the Web server 6, the access to which the client computer 5 requests for downloading information or content on the subject, see whether the URL of the Web server 6 in the second database the client computer 5 access to Internet. If the URL is not contained in the second database 9, the server computer 1 goes to step S9. At step S9, the server computer 1 connects to the Web server 6 via the Internet 2 using HTTP and downloads information or content from the Web server 6. Information or content found on the Web server 6, it is checked at step S11.

At step S11 in the absence of information or content found on the Web server 6, prohibited keywords stored in the third database 10, the server computer 1 goes to step S7, in order to transmit the retrieved information or content to the requesting client computer 5 to display information or content on the display screen of the client computer 5. In case of availability of information or content found on the Web server 6, prohibited keywords stored in the third database 10, the server computer 1 goes to step S12 to check the information or content on the presence in addition to banned keywords are still useful keywords. At step S11, the server computer 1 can count the number of forbidden keywords in information or information we are filling up very little, for example one or two, then the server computer 1 may proceed to step S7, and not to step S12. Alternatively, the operator of the local network 4 may be an option, according to which, if detected in step S11 of at least one prohibited keywords, server computer 1 necessarily goes to step S12.

If at step S12, the server computer 1 detects the information or content found on the Web server 6, useful keyword stored in the fourth database, in the presence of banned keywords stored in the third database 10, the server computer 1 goes to step S7, in order to transmit information or content to the requesting client computer 5 to display information or content on the display screen of the requesting client computer 5. In the presence of useful keywords information or content that contains a banned keyword, subject to display. For example, if at the step S11, information or content from the Web server 6 forbidden keyword stored in the third database 10, such as cocaine or amphetamine”, information or content can RA is window Internet-site.

However, if at step S12 in the same information or content, along with Smoking keyword “cocaine”, found useful keyword, for example “news” included in the group journalistic terms selected and activated by the operator of the local network 4 and stored in the fourth database 11, the information or content considered as coming from a Internet site that provides news Bulletin. Thus, as the operator of a permitted client computers 5 to view news Bulletin via the Internet by selecting and activating group journalistic terms in the fourth database 11, at step S7, the information or content is delivered to the requesting client computer 5 to display. If the same information or content, along with Smoking keyword “cocaine”, found another useful keyword, such as “imprisonment” of the group of legal terms, information or content considered as coming from a legitimate web site that explains the punishment for drug trafficking or relevant criminal legislation. So, what legislation, he must select and activate a group of legal terms that are stored in the fourth database 11. If the same information or content, along with Smoking keyword “cocaine”, found another useful keyword, such as “pharmacological action” from a group of medical terms, information or content considered as coming from a legitimate online site associated with medicine. Therefore, if the operator of the local network 4 wants to allow client computers 5 access to Internet sites related to medicine, he must select and activate a group of medical terms stored in the fourth database 11.

If at step S12 in the same information or content, along with Smoking keyword “cocaine”, no keywords from the fourth database 11, then it is highly likely that the information or content received from an illegal Internet site, associated with the offer or sale of drugs. In this case, the server computer 1 goes to step S4, in order to suppress information or content to the requesting komputernyh 10, and useful keywords stored in the fourth database 11. Specialists in this area will not be difficult to choose different kind of banned keywords and useful keywords for the third and fourth databases 10 and 11.

At step S13, the implementation of the method, corresponding to the first variant implementation, ends up saving the URL of the Internet site that was accessed by client computers 5, forbidden keywords, useful keywords and representative of keywords found in the information or content received by the client computers 5, and accounts of their occurrence for each of the client computer 5 in the fifth database 12.

In Fig.4 shows a block diagram of a method of controlling the display of the web sites corresponding to the second variant of implementation of the present invention. In the description of Fig.4 is omitted explanation of the stages, coinciding with the steps indicated in Fig.3, which uses the same position as in Fig.3. The method of controlling the display of the web sites corresponding to the second variant of implementation of the present invention allows different ways to control access to the Internet for different client computers. The method involves the presence of th is s client computers 5, not subject to control access to the Internet, the second group of client computers 5, which denied access to the Internet, the third group of client computers 5, which allows access only to the Internet sites included in the list of the first database 8, and the fourth group of client computers 5, for which control access to the Internet is carried out in accordance with the flowchart shown in Fig.3. Each of the client computers 5 belongs to one of four groups. Information about which group belongs to one or other client computer 5, is stored in the fifth database 12.

According to the method shown in Fig.4, at step S14 determines to which group belongs to the client computer requesting access to the Internet, comparing the IP address of the client computer 5, requesting access to the Internet, with the group information of the client computer 5, stored in the database 12. If the client computer 5, requesting access to the Internet, included in the first group of client computers 5, whereby the operator of the local network 4 allows you to access the Internet without any restrictions, then the server computer 1 goes to step S6 to connect with the Web server 6 download information or informationv clients 5, which the operator of the local network 4 prohibits access to any Internet sites, then the server computer 1 goes to step S4 to deny and revoke access to the Internet. If the client computer 5, requesting access to the Internet, included in the third group of client computers 5, whereby the operator of the local network 4 allows access only to the Internet sites included in the list of the first database 8, or in the fourth group of client computers 5, in respect of which the operator carries out the steps shown in Fig.3, the server computer 1 goes to step S15.

At step S15, if the client computer 5 is in the third group, then the server computer 1 determines whether the URL of the Internet site requested by the client computer 5, in the first database 8. If the URL of the Internet site included in the list of the first database 8, the server computer 1 goes to step S6. If the URL of the Internet site is not included in the list of the first database, the server computer 1 goes to step S4. If the client computer requesting access to the Internet, included in the fourth group to apply the steps shown in Fig.3, the server computer 1 determines whether the URL of the Internet site requested by the client computer 5, speededit to step S6. If the URL of the Internet site is not included in the list of the first database, the server computer 1 goes to step S8. Next are the steps shown in Fig.3.

In Fig.5 shows a block diagram of a method of controlling the display of Internet sites that meet the third variant of implementation of the present invention. In the description of Fig.5 is omitted explanation of the stages, coinciding with the steps indicated in Fig.3, which uses the same position as in Fig.3. Way that meets the third variant of implementation of the present invention, provides management access to the Internet in accordance with a clock and/or calendar. At step S16, the server computer 1 determines an alternative access to the Internet at the current time: allow unrestricted access to the Internet, access to the Internet is completely non-permitted access only to the Internet sites included in the first database 8, access to the Internet is controlled by means of hours and funds of the calendar provided on the server computer 1, depending on day of week and time of day. For example, at night, the Internet access is not restricted, since it is assumed that at this time the children do not access the Internet. From 9 a.m. to 5 who am, included in the first database 8, because this time corresponds to the time at enterprises. At other times, including weekends, to control access to the Internet is carried out in accordance with the method shown in Fig.3, because some management access to the Internet is still necessary.

If the night-time, the server computer 1 goes to step S6 to connect with the Web server 6 via the Internet. If the day of week and time of the working, the server computer 1 goes to step S4, to deny access to the Internet, or, alternatively, goes to step S17 to determine whether the URL of the Internet site requested by the client computer 5, in the list of the first database 8. If the time is after 5 PM and day of week or day off, then the server computer 1 goes to step S17 to determine whether the URL of the Internet site requested by the client computer 5, in the list of the first database 8.

At the step S17 is the same process as in the step S15 shown in Fig.4. When allowed access only to the Internet sites included in the first database 8, the server computer 1 goes to step S6, if the URL of the Internet site requested by the client computer 5, included in the first database d is not included in the list of the first database 8. When controlling access to Internet sites, which are not included in the lists of the first and second databases 8 and 9, is made depending on the availability of banned keywords and useful keywords specified in the third and fourth databases 10 and 11, respectively, the server computer 1 goes to step S6, if the URL of the Internet site requested by the client computer 5, included in the list of the first database 8, and the server computer 1 goes to step S8, if the URL of the Internet site requested by the client computer 5, not included in the list of the first database 8.

The computer is a proxy server 1 shown in Fig.1 and Fig.2, may not be able to monitor and be running one of the client computers 5, which allows the operator of the local network 4 to install, manage, control and update the database from the first to the sixth 8, 9, 10, 11, 12 and 13 from one of the client computers 5. Other client computers 5 may not have access to these databases 8-13. The operator of the local network 4 can control access to the Internet through the LAN 4 differently for different client computers using the fifth database 12 that stores the management information of each of the client computers 5, and the pole is the PR LAN 4 can update the database from the first to the fourth 8-11 on the server computer 1 via the Internet, connecting to the Web server 6, and download the updated URLS available to Internet sites in the first database 8, the updated URL prohibited Internet sites in the second database 9, the updated banned keywords in a third database 10 and updated useful keywords in the fourth database 11. The operator of the local network 4 can send the content databases from the first to the fourth 8-11 on the Web server 6 via the Internet. Database from the first to the fourth, you can update or share via the Internet, allowing you to optimize how management view the Internet sites in accordance with the rapid development of the Internet.

Above have been described in detail some of the options for the implementation and advantages of the present invention, however, it should be understood that it allows changes, substitutions, modifications, variations and alternatives beyond the nature and scope of the invention defined by the attached claims.

Industrial application

The present invention can be used on a computer connected to the Internet to browse web sites. The present invention is particularly useful for controlling access to the Internet at home mustache blunt to external sites across the Internet, containing phases, which provide a first database containing a list of available Internet sites, provide a second database containing a list of banned Internet sites that provide a third database containing forbidden keywords, provide a fourth database that contains useful keywords, in this case, when the user tries to access the Internet sites listed in the first or second database, to allow access to the Internet sites included in the first database, and prevent access to Internet sites, included in the second database, when a user tries to access the Internet site, is not included neither in the first nor in the second database, check the information or content found on the Internet site, is not included neither in the first nor in the second database, to determine the presence in the retrieved information or content is prohibited keywords, is included in the third database in the absence of prohibited keywords, is included in the third database, allow the display on the user's computer information or content found on the Internet site, not clonage keywords included in the third database, checks found the information or content on the presence of useful keywords, included in the fourth database, and allow the display on the user's computer information or content found on the Internet site, is not included neither in the first nor in the second database, only if the information or content, in addition to banned keywords, is included in the third database, the keywords included in the fourth database.

2. The method according to p. 1, characterized in that it further includes a step in which in accordance with a clock and/or calendar, share the days of the week and/or hours at the restrictive days and/or hours during which any access to the Internet is prohibited, permissive days and/or hours during which there are no restrictions on Internet access, days and/or hours of ballot access, which allows access only to the Internet sites included in the first database, and regulatory days and/or hours during which control access to the Internet is way under item 1.

3. The method according to p. 1, characterized in that it further with the patients into four groups, for the first group of client computers allow free access to the Internet, for the second group of client computers allow access only to web sites that are included in the first database, for the third group of client computers to prevent access to the Internet, and for the fourth group of client computers to allow access to Internet sites in accordance with the method under item 1.

4. The method according to p. 1, characterized in that it further comprises the steps on which distributes the available Internet sites listed in the first database, prohibited Internet sites listed in the second database, banned keywords specified in the third database, and useful keywords specified in the fourth database, several groups on the basis of the same or similar attributes, respectively, and activate or inactivate each of the groups in the database from the first to the fourth to select any of the groups.

5. The method according to p. 1, characterized in that it further contains the steps that connect any one of the databases from the first to the fourth to the Internet or to download the machine-readable storage medium that stores the updated available Internet sites, updated Smoking in the buoy from the databases from the first to the fourth through the Internet or by using machine-readable media.

6. The method according to p. 1, characterized in that it further contains the steps that connect any one of the databases from the first to the fourth to the Internet or to download the machine-readable storage medium, and send the content of any of the databases from the first to the fourth through the Internet or write it on a machine-readable storage media.

7. The method according to any of paragraphs.1-6, characterized in that it further comprises the steps on which count the number of keywords in the information or content found through the Internet, and store the number of times of occurrence of specific keywords in the information or content found through the Internet.

8. The method according to p. 7, characterized in that it further comprises the steps, which provides a set of client computers, identify a representative keyword information or content found through the Internet each of the client computers, and store the number of times of appearance of the representative keywords in the information or content found through the Internet each of the client computers.

9. The method according to p. 1, wherein Tierney and the type of access permitted to the Internet, identify the request type of access to the Internet and reject the access request to the Internet, if the requested type of access to the Internet is prohibited.

10. The method according to p. 9, characterized in that the prohibited type relates to recording information to the Web server via the Internet.

11. Machine-readable storage medium for storing a computer program access control to external sites over the Internet in a computer system containing means for providing a first database containing a list of available Internet sites, means for providing a second database containing a list of prohibited Internet sites, means for providing a third database that contains a banned keyword, means for providing a fourth database that contains useful keywords, tool that allows, when a user tries to access the Internet sites listed in the first or second database, to allow access to Internet sites, included in the first database, and to block access to Internet sites, included in the second database, a tool that, when a user tries to access the Internet site, is not included neither in the first nor in the second database, to verify the info is in the data to determine whether the found information or content is prohibited keywords, is included in the third database, a tool that, in the absence of prohibited keywords, is included in the third database, to allow for display on the user's computer information or content found on the Internet site, is not included neither in the first nor in the second database, a tool that, if the information or content is prohibited keywords, is included in the third database, check the information or content on the presence of useful keywords, included in the fourth database, and a tool that allows the display on the user's computer information or content found from the Internet site, is not included neither in the first nor in the second database, only if the information or content, in addition to banned keywords, is included in the third database, the keywords included in the fourth database.

12. Machine-readable storage medium according to p. 11, characterized in that it further comprises crediting in the second database, forbidden keywords specified in the third database, and useful keywords specified in the fourth database, several groups on the basis of the same or similar attributes, respectively, and means for activating or deactivating each of the groups in the database from the first to the fourth to select any of the groups.

13. Device to control access to external websites via the Internet in a computer system containing means for providing a first database containing a list of available Internet sites, means for providing a second database containing a list of prohibited Internet sites, means for providing a third database that contains a banned keyword, means for providing a fourth database that contains useful keywords, tool that allows, when a user tries to access the Internet sites listed in the first or second database, to allow access to the Internet sites included in the first database, and deny access to Internet sites, included in the second database, a tool that, when a user tries to access the Internet site, is not included neither in the first nor in the second database, to check informania, to determine whether the found information or content is prohibited keywords, is included in the third database, a tool that, in the absence of prohibited keywords, is included in the third database, to allow for display on the user's computer information or content found on the Internet site, is not included neither in the first nor in the second database, a tool that, if the information or content is prohibited keywords, is included in the third database, check the information or content on the presence of useful keywords, included in the fourth database, and a tool that allows the display on the user's computer information or content found on the Internet site, is not included neither in the first nor in the second database, only if the information or content, in addition to banned keywords, is included in the third database, the keywords included in the fourth database.

14. The device according to p. 13, characterized in that it further comprises a means of distributing the available Intern is placed keywords, specified in the third database, and useful keywords specified in the fourth database, several groups on the basis of the same or similar attributes, respectively, and means for activating or deactivating each of the groups in the database from the first to the fourth to select any of the groups.

 

Same patents:

The invention relates to automated electronic systems customer service to determine ratings services catering

The invention relates to systems for search, distribution and use of training materials

The invention relates to methods of identifying objects of expert studies and can be used for identification of goods belonging to the objects of export control

The invention relates to an entertainment computer systems

The invention relates to computer science and computer engineering and can be used to solve problems in the ordering of words lyrics

The finisher words // 2223538
The invention relates to computer science and computer engineering and can be used to solve problems in the ordering of words lyrics

The invention relates to information retrieval systems, which have thematic databases and database of legislative documents

The invention relates to a system for creating messages e-mail

The invention relates to means for Informatics and computer technology and can be used to solve problems in the compilation of dictionaries, reference books, and creating databases

The invention relates to computing and information exchange in computer network

The invention relates to computing and information exchange in computer network

The invention relates to providing an interface between software applications and physical devices

The invention relates to computing, and in particular to circuits interface

The invention relates to a circuit for exchanging signals I / o between the devices to operate in one of multiple modes using a single channel and can be used in electronic measuring Coriolis mass flowmeter

The invention relates to computing, and in particular to a device pairing

The invention relates to the field of computer technology, is designed to perform in the mode separation in time of the operation of multi-channel reception and transformation of the self-synchronizing serial binary codes from channels with the same or different lengths codes and bit speed with the issuance of information fragments (syllables) parallel-sequential code, accompanied by a synchronization signal fragment, informational error even when the number of units in the adopted code, the failure bit synchronization when the length of the received code is not a multiple of the length of the fragment, the readiness of the fragment and the result is ready and can be used to build devices for entering information type [1] and controllers, local area network (CCL) with a radial topology [2, S. 64-69] with separate and/or multiplex lines (channels) connection (LAN), for example KLS station local area network (SLS) Protocol on the basis of GOST 18977-79 and RTM 1495-75, which is widely used in control systems for aircraft, marine and other equipment that is located usually on the moving objects [2, S. 57-64]

The invention relates to the automated control system of anti-aircraft missile fire

The invention relates to methods of information exchange in computer networks

The user interface // 2216771
The invention relates to computing, and in particular to systems displaying information on a computer

FIELD: digital data transferring technologies.

SUBSTANCE: digital serial transfer of information through interface between electronic device and accumulator connected to it is a transfer of bytes consisting of row of bits. Each bit is determined by one of levels, high level or low level, and first bit of each byte is a first level of said high and low levels. Method includes stage of transfer of other level from said low and high levels during first time span immediately before said first bit.

EFFECT: higher efficiency.

3 cl, 4 dwg

Up!