Method for controlling access to a data communication network, with user identification

Abstract
A method for controlling access to a data communication network, comprising the steps of:
Description


BACKGROUND OF THE INVENTION

[0001] The present invention relates to a method for controlling access to a data communication network, with user identification. More particularly, the invention relates to a method for controlling access to the Internet.


[0002] As is known, the increasing growth of data networks, such as for example the Internet, has led a very large number of users to go online every day.


[0003] On the other hand, the increasing growth of the data communication network has caused information of various kinds to be placed on the network, with a consequent proliferation of sites containing data and information, as well as images, videos and the like, whose viewing should be reserved exclusively to adult users.


[0004] However, it is evident that the simplicity of access to a data communication network such as the Internet allows anyone, and especially minors, who usually have considerable time available, to access the network without any restriction, being able to navigate it and key in substantially any kind of site without their minor age being protected by banning the viewing of sites whose content is unsuitable for minors.


[0005] Furthermore, the parents of minors cannot be aware of the sites visited by the children and therefore are practically unable to perform any kind of control.



SUMMARY OF THE INVENTION

[0006] The aim of the present invention is to provide a method for controlling access to a data communication network which allows to distinguish between network access requested by a minor user and access requested by an adult user, thus steering navigation on the network according to the user's profile.


[0007] Within this aim, an object of the present invention is to provide a method for controlling access to a data communication network which allows, in the case of a minor user, to perform a controlled navigation, therefore blocking sites which cannot be viewed by minors.


[0008] Another object of the present invention is to provide a method for controlling access to a data communication network which allows to send a user age identifier directly from the user's computer.


[0009] Another object of the present invention is to provide a method for controlling access to a communication network which allows to decode the age identifier sent by the user in order to steer the user's navigation.


[0010] Another object of the present invention is to provide a method for controlling access to a communication network which is highly reliable, relatively simple to provide, and at competitive costs.


[0011] This aim and these and other objects which will become better apparent hereinafter are achieved by a method for controlling access to a data communication network, characterized in that it comprises the steps of:


[0012] upon connection of a user to a data communication network, making available on the network an age identifier which is suitable to define the age of said user who wishes to make the connection;


[0013] entering, on the part of said user, an address of a site of interest which the user intends to visit, said address being automatically associated with said age identifier made available on the network; and


[0014] allowing said user to perform the network connection on the basis of the reading of said age identifier associated with said address keyed in by said user, and steering accordingly the network navigation of said user.







BRIEF DESCRIPTION OF THE DRAWINGS

[0015] Further characteristics and advantages of the invention will become better apparent from the description of a preferred but not exclusive embodiment of the method according to the invention, illustrated only by way of non-limitative example in the accompanying drawings, wherein:


[0016]
FIG. 1 is a block diagram of the method for the connection of a user to a data communication network, according to a first embodiment of the present invention; and


[0017]
FIG. 2 is a block diagram of a second embodiment of the method according to the present invention.







DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0018] With reference to the figures, the method according to the invention, according to a first embodiment, is as follows.


[0019] The user, generically designated by the reference numeral 1, upon requesting connection to a data communication network by dialing; through his computer, the telephone number of a service provider 2 with which he has previously drawn up an appropriate contract for the service, is identified by being asked a password and a user identification word.


[0020] The identification step is generally designated by the reference numeral 3.


[0021] At this point, the identification procedure verifies, by accessing a database 4, the information received from the connected user or the service provider 2 and identifies the user's profile.


[0022] The database 4 then returns to the computer of the user 1 an identifier 6 which allows to unequivocally identify the age of the user. This identifier is then associated, by linking it in any manner, with the address that the user 1 keys in in order to access a given site of the data network.


[0023] Accordingly, the address 7 that the user sends to address reading means 2b of the server 2 contains the age identifier 6 associated therewith.


[0024] In FIG. 1, the reference numeral 2a designates means for receiving the connection request to the network by the user 1.


[0025] The address reading means 2b are suitable to decode the address 7 sent by the user 1, with which the user's age identifier 6 is associated.


[0026] By thus performing an age-based discrimination, the address reading means 2b allow to perform unrestricted navigation 8, if the user is an adult, or a controlled navigation 9, if the user is instead a minor.


[0027] The user is therefore able to send directly from his computer an address 7 with which an age identifier 6 is associated, and said transmission on the part of the user can be performed for example by a conventional browser after receiving from the database 4 the age identifier 6.


[0028] In practice, therefore, if the user 1 is recognized as a minor, navigation is controlled and the list of sites requested by the user who is navigating is sent, for example via e-mail, to the parents of the minor user.


[0029] The controlled navigation procedure entails that all sites that can be identified as accessible by a minor have an identification code and that likewise all the sites that cannot be accessed by a minor are identified by a different identification code.


[0030]
FIG. 2, in which the reference numerals that are identical to the ones used in FIG. 1 designate identical elements, is a block diagram of a second embodiment of the method according to the present invention.


[0031] In this second embodiment, the age identifier that is meant to be associated with an address that the user keys in in order to communicate to the server 2 that he wants to navigate to a given site is automatically associated with the address that the user keys in by the program that the user uses for navigating the network.


[0032] Essentially, the user 1 uses a program 1a, commonly known as “browser”, which allows the user to navigate the data communication network, and the program la automatically associates an age identifier, designated in this case by the reference numeral 1b, with the address designated by 1c that the user keys in in order to communicate to the server 2 that he intends to navigate to a given site.


[0033] The age identifier 1b that is automatically associated by the program 1a must be entered in the program la by a parent or the like who performs his initial registration in order to initialize the program.


[0034] Any subsequent attempt to modify the age identifier 1b on the part of unauthorized people is barred by using a password that must be known only to the person authorized to perform this modification.


[0035] The method according to the second embodiment is then similar to the one described for the first embodiment, since once the address 1c, with the age identifier 1b associated therewith, is sent to the server 2, the latter processes the data like preceding one.


[0036] In practice it has been found that the method according to the invention allows to verify the identity of the user who connects to the data communication network, sending directly online to the user an age identifier which is determined by looking up a database in which the user's profile is recorded, said age identifier being associated with an address that the user keys in in order to visit a site he is interested in.


[0037] The method thus conceived is susceptible of numerous modifications and variations, all of which are within the scope of the same inventive concept; all the details may furthermore be replaced with other technically equivalent elements.


[0038] The disclosures in Italian Patent Application No. MI2000A002390 from is which this application claims priority are incorporated herein by reference.


Claims
  • 1. A method for controlling access to a computer network, comprising the steps of: upon connection of a user to a data communication network, making available on the network an age identifier which is suitable to define the age of said user who wishes to make the connection; entering, on the part of said user, an address of a site of interest which the user intends to visit, said address being automatically associated with said age identifier made available on the network; and allowing said user to perform connection to the network on the basis of the reading of said age identifier associated with said address keyed in by said user, and steering accordingly the network navigation of said user.
  • 2. The method according to claim 1, wherein said step of making said user age identifier available on the network comprises verification of the data of the user who wishes to make the connection and comparison of said data with a database which contains the profiles of users registered with a service provider suitable to provide said connection.
  • 3. The method according to claim 2, wherein said step of making said user age identifier available on the network furthermore comprises the transmission to said user of said age identifier retrieved from the user profile found in said database.
  • 4. The method according to claim 1, wherein the step of making said user identifier available on the network comprises the step of: entering said age identifier directly in the network navigation program used by the user to connect to said data communication network.
  • 5. The method according to claim 1, wherein said connection to the data communication network allowed on the basis of the reading of said age identifier leads to unrestricted network navigation if said age identifier reveals an adult user or to a controlled network navigation if said age 30 identifier reveals a minor user.
  • 6. The method according to claim 1, wherein said age identifier is associated with said address keyed in by said user directly by a network navigation program used by the user on his computer.
Priority Claims (1)
Number Date Country Kind
MI2000A002390 Nov 2000 IT