The present invention is directed to systems and methods for selectively managing Internet access.
Various embodiments of the invention comprise methods and systems for managing Internet access. According to various embodiments, an exemplary method for managing Internet access includes at least three steps. First, a request is received to access the Internet by an end user via a user device coupled to an Internet service. Second, a determination is made whether the request is being made during a restricted time period. The restricted time period may already have been established by an initiating end user's input to a restriction policy application via a user interface between the initiating end user and an Internet service. Third, the end user's Internet access is selectively managed by blocking Internet access if the determination is that the request was made during a restricted time period or granting Internet access if the determination is that the request was made outside the restricted time period.
In further embodiments, a system for managing Internet access is provided. The system may include a user device configured for displaying user interface, an Internet service and a processor. The user interface may be between an end user and an Internet service, and it may be configured to receive a request to access the Internet by an end user. The Internet service may apply different restricted time periods for different end user devices. The Internet service may be for determining whether the request is being made during a restricted time period, the restricted time period having been established by an initiating end user's input to a restriction policy application via a user interface between the initiating end user and the Internet service. The processor is for executing the instructions stored in memory to selectively manage Internet access for the end user via the user device, by blocking Internet access if the determination is that the request was made during a restricted time period or granting Internet access if the determination is that the request was made outside the restricted time period.
In yet further embodiments of the present technology, a non-transitory computer-readable storage medium having embodied thereon a program is given. The program is executable by a processor in a computing device to perform one or more methods for managing Internet access, such as those exemplary methods for managing Internet access as described herein.
Various embodiments of the present invention include methods and systems for managing Internet access. According to various embodiments of the invention, a restriction policy application accepts restriction criteria. Restriction criteria may include but is not limited to establishing a restricted time period for when Internet access is not allowed to end users. Restriction criteria may be any criteria that define when access to the Internet for one or more end users is blocked by an Internet service and/or a DNS server. For instance, if an end user attempts to access the Internet during a restricted time period, then the end user's attempt is blocked and a message may appear on the user device indicating that the end user's request to access the Internet at this time has been denied. As used throughout, end users are those users that may access the Internet utilizing an Internet service and/or a DNS server. An initiating end user is a type of end user who can establish restriction criteria for a restricted policy application. In some embodiments, an initiating user can establish end user device specific restriction criteria.
Generally speaking, an administrator may create and enforce mediation polices for one or more end users that utilize computing devices coupled to an Internet service delivered to a location such as a home, residence place of business or campus. The term “administrator” may include not only individuals, such as parents, but also any individual creating mediation policies regarding the Internet service delivered to end users. It will be understood that an administrator may also be an end user, although end users who are not also administrators may not create or apply mediation policies.
It will be further understood that because of the diversity of computing devices that may connect to the Internet service, the mediation policy may be applied to the Internet service rather than requiring the mediation policy to affect each computing device individually, such as a mediation application resident on each computing device. In various exemplary embodiments a value-based mediation policy may also reside as a stand alone application on one or more of the computing devices.
Referring to
At step 120, a determination is made whether the request is being made during a restricted time period. The restricted time period may have been established by an initiating end user's input to a restriction policy application via a user interface between the initiating end user and the Internet service. The restricted time period may include a morning, afternoon, evening, late night and any combination thereof. The restricted time period may include a start time and an end time. The restricted time period may include one or more days.
In some embodiments, an initiating end user 160 may launch the restriction policy application. The restriction policy application may be a program resident on the user device 550 (
In some embodiments, the restriction criteria include one or more actual times of a given day. The restriction criteria entered by the initiating end user 560 (
According to various embodiments, the restriction policy application may be used by a parent (who may be considered an initiating end user in this example) to grant or allow Internet access to his or her child (who may be considered an end user). Thus, various embodiments of the restriction policy application may be used to restrict Internet access for children at night. For example, a child's bedtime may be 9:00 pm. The restriction criteria may be set for a start time of 9:00 pm and an end time of 7:00 am. Thus, during the period 9:00 pm to 7:00 am, the restriction policy application would deny access to the Internet. This would prevent the child from logging onto the Internet between 9:00 pm to 7:00 am.
According to various embodiments of the present invention, the restricted time period may be provided by a monitoring list generated by the Internet service or third parties. In further embodiments, the restricted time period may be provided by a monitoring list created by the initiating end user or socially produced by groups of users of the Internet service.
Still referring to
Blocking the Internet access may comprise redirecting, blocking, or substituting a request to access Internet content specified in the request to a different Internet content, such as the initial provisioning page providing access to the Internet service. According to various embodiments, blocking the Internet access may comprise displaying a message on the user device notifying the end user that their attempt to access the Internet has been denied. According to various embodiments of the present technology, selectively managing Internet access may further comprise comparing the request to the restriction criteria established by the initiating end user in the restriction policy application and allowing a resolution performed by Internet service provider if the request meets the restriction criteria.
Optional steps for the method 100 may include overriding the restriction policy application by the end user selecting an override button provided on the user interface. Also, the restricted time period may be modified or otherwise altered by the initiating end user selectively editing the restricted time period via the user interface associated with the restriction policy application. Also, the initiating end user may select different time periods for different end users and/or different end user devices. Policies of the restriction policy application may be applied to the Internet service. In various embodiments, applying the policies of the restriction policy application may comprise dynamically logging and reporting attempted Internet access by end users.
It will be appreciated by one of ordinary skill that examples of non-transitory computer readable storage media may include discs, memory cards, servers and/or computer discs. Instructions may be retrieved and executed by a processor. Some examples of instructions include software, program code, and firmware. Instructions are generally operational when executed by the processor to direct the processor to operate in accord with embodiments of the invention. Although various modules may be configured to perform some or all of the various steps described herein, fewer or more modules may be provided and still fall within the scope of various embodiments.
The user interface module 210 provides one or more user interfaces to the end user as a result of the restriction policy application. The user interface module 210 provides, for instance, a user interface between the end user and the Internet service, so that communications between the two are enabled. Exemplary user interfaces provided by the user interface module 210 are shown in
The restriction criteria tracking module 220 may perform a step of receiving and/or tracking information related to restriction criteria established by an initiating end user. As described in conjunction with step 120 of the method 100 and
The Internet access module 230 may perform a step of determining whether an end user has attempted to access the Internet during a restricted time period (such as the step 120 of the method 100 described earlier herein in relation to
The architecture 200 includes a network 260 which may comprise a DNS server. The network 260 may also include any type and number of databases, servers, end users, computing devices, and policy engines. It will be appreciated by one skilled in the art that the system in
One or more of the modules described above may be used to gather and record data relative to Internet content accessed and attempts to access Internet content. Data collected may include addresses accessed and attempted to be accessed, number of times visited, duration of visit, whether other links are accessed from the site, etc. The data may be used to “learn” the search patterns of one or more users of the system. The system may then modify the mediation policy according to the learned history of use.
A listing of the restricted start time fields 430 (which may be labeled as “Lights Out” fields), one or more restricted end time fields 440 (which may be labeled as “Rise and Shine” fields) and one or more activation buttons 450 may be provided in a monitoring list to the end user. A restricted start time field 430 may be associated with a restricted end time field 440 and an activation button 450. For instance, as depicted in
For instance, as shown in
The one or more restricted time start fields 430 are fields by which an initiating end user may enter information as to when the restricted time period begins or is active for a given day or selected days. In other words, the one or more restricted time start fields 430 allow for an initiating end user to input when the restriction policy may restrict or block end users from accessing the Internet. The one or more restricted time end fields 440 are fields by which an initiating end user may enter information as to when the restricted time period ends or ceases for a given day or selected days. In other words, the one or more restricted time end fields 440 allow for an initiating end user to input when the restriction policy may stop restricting or blocking end users from accessing the Internet. In exemplary embodiments of the invention, the initiating end users may input the information for the one or more restricted time start fields 430 and the one or more restricted time end fields 440 by selecting up or down arrows to manipulate the time shown in the fields.
Initiating end users may repeat the process of entering data into the one or more restricted time start fields 420, the one or more restricted time end fields 430 and selecting the one or more activation buttons 450 until all of their selections have been furnished to set the restriction policy application. The selections are shown in the monitoring list provided in the user interface 400. Once all the selections of an initiating end user have been furnished, the initiating end user may click on or otherwise actuate the OK button 460 to have their restriction settings saved and stored for future use. Once the OK button 460 has been selected, the configuration drawer interface 400 appears to close. To activate the functionality of the restriction policy application, an initiating end user may select, click or otherwise actuate the On button of the On/Off button set 410. If an initiating end user inputs their restriction settings but does not enable the restriction policy application by selecting the On button, then an overlay may appear to the initiating end user's device, asking if the initiating end user would like to enable the service prior to closing the configuration drawer. In some embodiments, the default setting for the restriction policy application is “On.” If the initiating end user wishes to disable the functionality of the restriction policy application, the initiating end user may select the Off button of the On/Off button set 410.
In this example, a gentle reminder is provided for the end user (such as a child) that they should be in bed, not using the computer. Other examples may include more stern messages, and the messages may vary for successive attempts to access the Internet during a given restriction period (for example, multiple access attempts during a single night). Various embodiments may allow the initiating end user 560 (
The restriction policy application may restrict the residential computer network (such as 260 in
The restriction policy application may have the capability to log attempts to access the Internet during the restricted time periods defined by the restriction criteria. Relevant information such as name of the end user 560 (
The systems and methods described above may typically be resident in an Internet service or a DNS network. The systems and methods described may also be implemented in plug-in utilities, gateway devices, cable modems, proxy servers, set top boxes, and network interface devices.
The dynamic enforcement engine 520 may generate its policy engine on instructions received from one or more policy modules 530. Each policy module 530 may be constructed to provide various types and levels of services to the DNS network 540. In various embodiments, a policy module 530 may be configured to handle queries directed to subjects including, but not limited to, malicious domain redirection, user access redirection, non-existent domain redirection, and data collection or analysis.
It will be recognized by those skilled in the art that the elements of DNS service 670 may be hosted either locally or remotely. In addition to residing in the DNS service 670, one or more of the DNS network 640, the dynamic enforcement engine 620, and the policy modules 630, and any combination thereof, may be resident on one or more user devices 650.
The system 600 utilizes a user interface 610. The user interface 610 may be implemented in many embodiments. One specific implementation of the user interface 610 is as a web page.
The user interface 610 may be accessed by one or more user devices 550 operated by the users 560. The user interface 610 may be accessed though a gateway user device 550 available to the users 560. Suitable user devices 550 include but are not limited to desktops, PCs, laptops, notebooks, gaming devices, tablets, IPods, Smartphones, automobile computer systems, and Internet enabled TVs. The system 600 may also be accessed and controlled remotely through mobile user devices 550, such as a Smartphone or specialized Internet access devices such as a tablet. A Smartphone may be defined as a phone with computing capability. A Smartphone may provide the user 560 with Internet access.
The user interface 610 provides a mechanism for one or more authorized users 560 to establish content policy for the Internet service. The user interface 610 operates between the user devices 550 present in the system 600 and the DNS network 540. Instructions resident on the user interface 610 therefore operate on the Internet service, by controlling at least a portion of DNS resolutions via a dynamic policy engine 630, before the service reaches the displays of the user devices 550.
The user interface 610 provides the users 560 with access to one or more policy applications 620. The user interface 610 may provide access to a selection list to at least one authorized user 560. The authorized user 560 uses the selection list or some other menu mechanism to select those policy applications 620 that the user 560 chooses to apply to the system 600. The authorized user 560 may select any number of the available policy applications for use on the system 600 at any given time. In implementations utilizing Smartphones as the user device 550, the policy applications 620 are downloaded to the device 550. The device 550 then serves as the user interface 610 to communicate directly with the dynamic policy engine 630.
The policy applications 620 may prohibit access to specific sites. The policy applications 620 may also limit the time of day when users or selected users 560 may access certain sites. The policy applications 620 may also manage and analyze duration of access to various sites. It is important to note that the policy applications 620 do not simply provide blocking mechanisms by masking or enabling network controls, but rather mediate an Internet service received by the end user. As used herein, mediating the service may include any of blocking, constraining, enabling, redirecting, promoting, demoting, substituting, obscuring, limiting, interrupting, and restricting all or a portion of the Internet service.
The policy applications 620 may provide notifications or alerts to one or more users 560 when sites are accessed. The policy applications 620 may also provide notification of frequency and duration of access of designated sites. The policy applications 620 may also be used to observe, substitute, enable, redirect users, to reward behavior desired from the users by a system administrator, etc. The policy applications 620 may redirect users from a non-favored site to another site. The policy applications 620 may also collect and transmit data characteristic of Internet use.
Access policies supplied by the policy applications 620 may apply to all users 560 of the system 600, or the access policies may be specific to individual users or groups of users 560. The policy applications 620 may be discrete, single purpose applications. Furthermore, exemplary user devices for use with the disclosed systems may have a user interface. In various embodiments, such as those deployed on personal mobile devices, the user interface may be, or may execute, an application, such as a mobile application (hereinafter referred to as a (“app”). An app may be downloaded and installed on a user's mobile device. Users may define the access scheme via a user device, such as through the user interface. Some embodiments of the present invention do not require software to be downloaded or installed locally to the user device and, correspondently, do not require the user to execute a de-install application to cease use of the system.
The policy applications 620 provide the users 550 with a mechanism to take various actions relative to their Internet service feed. The policy applications 620 also allow the users 550 to establish a dynamic policy engine 630 that includes a user database. The policy engine 630 is used to enforce rules associated with each policy application associated with individual end users, not simply block various inappropriate sites from the Internet feed. Rather, the dynamic policy engine 630, controlled by the user interface 610 through user device(s) 550, is used to manage all aspects of the Internet experience for the users 560. In sum, the policy applications 620 may be used to configure the dynamic policy engine 630 to provide the users 560 with a mechanism to personalize the Internet experience. The policy applications 620 may be configured in combinations, and may each be separately configured.
The database in the policy engine 630 may be used to record and to notify users 560 of various data relative to Internet access. The data collected from and provided to the users 560 may include records of access of specific sites, time spent on specific sites, time of day of access, data specific to individual users, etc.
It should also be noted that following an initial setup through the user interface 610 of the policy engine 630, a direct access 640 enforcement loop may be established between the policy engine 630 and the user devices 550. Subsequent accessing of the DNS network 540 utilizing the direct access 640 decreases response time in the system 600, thereby further enhancing the Internet experience of the users 560. Configurations of policy applications 620 that are selected by one or more users 560 designated as system administrators may remain in the user database of the policy engine 630 until such time as it may be modified by the system administrators. The system administrators may define multiple policy configurations, with a combination of policy applications 620, applicable to one or more end users 560 of the system 600. Each policy application 620 may be separately configurable as well. Policy configurations may vary based upon designated times, conditional triggers, or specific requests from the users 560 with administrative authority.
As indicated above, two discrete data flow paths may be established for the system 600. A first data path establishes a set of enforcement policies for the system 600. The first data path flows from at least one user device 550 through the user interface 610, to the policy enforcement engine 630. A second data path 640 may be utilized following the establishment of a set of policies for the system 600. The second data path 640 flows directly between the user device(s) 550 and the policy engine 630. Multiple sets of enforcement policies may be established and saved within the system 600 and implemented selectively by the users 560.
The components shown in
Mass storage device 730, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 710. Mass storage device 730 can store the system software for implementing embodiments of the present invention for purposes of loading that software into main memory 710.
Portable storage device 740 operates in conjunction with a portable non-volatile storage medium, such as a floppy disk, compact disk or Digital video disc, to input and output data and code to and from the computer system 700 of
Input devices 760 provide a portion of a user interface. Input devices 760 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 700 as shown in
Display system 770 may include a liquid crystal display (LCD) or other suitable display device. Display system 770 receives textual and graphical information, and processes the information for output to the display device.
Peripherals 780 may include any type of computer support device to add additional functionality to the computer system. Peripheral device(s) 780 may include a modem or a router.
The components contained in the computer system 700 of
Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the invention. Those skilled in the art are familiar with instructions, processor(s), and storage media.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the invention. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
The above description is illustrative and not restrictive. Many variations of the invention will become apparent to those of skill in the art upon review of this disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents. While the present invention has been described in connection with a series of embodiments, these descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. It will be further understood that the methods of the invention are not necessarily limited to the discrete steps or the order of the steps described. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art. For example, this description describes the technology in the context of an Internet service in conjunction with a DNS resolver. It will be appreciated by those skilled in the art that functionalities and method steps that are performed by a DNS resolver may be performed by an Internet service. One skilled in the art will recognize that the Internet service may be configured to provide Internet access to one or more computing devices that are coupled to the Internet service, and that the computing devices may include one or more processors, buses, memory devices, display devices, input/output devices, and the like. Furthermore, those skilled in the art may appreciate that the Internet service may be coupled to one or more databases, repositories, servers, and the like, which may be utilized in order to implement any of the embodiments of the invention as described herein. One skilled in the art will further appreciate that the term “Internet content” any content that may be accessed by an Internet access device user device and may comprise one or more of web sites, domains, web pages, web addresses, hyperlinks, URLs, any text, pictures, and/or media (such as video, audio, and any combination of audio and video) provided or displayed on a web page, and any combination thereof.
While specific embodiments of, and examples for, the system are described above for illustrative purposes, various equivalent modifications are possible within the scope of the system, as those skilled in the relevant art will recognize. For example, while processes or steps are presented in a given order, alternative embodiments may perform routines having steps in a different order, and some processes or steps may be deleted, moved, added, subdivided, combined, and/or modified to provide alternative or subcombinations. Each of these processes or steps may be implemented in a variety of different ways. Also, while processes or steps are at times shown as being performed in series, these processes or steps may instead be performed in parallel, or may be performed at different times.
From the foregoing, it will be appreciated that specific embodiments of the system have been described herein for purposes of illustration, but that various modifications may be made without deviating from the spirit and scope of the system. Accordingly, the disclosure is not limited except as by the appended claims.
This nonprovisional patent application is a continuation-in-part application that claims the priority benefit of U.S. patent application Ser. No. 12/727,001 filed on Mar. 18, 2010, titled “Internet Mediation,” and provisional U.S. Patent Application Ser. No. 61/370,556, filed on Aug. 4, 2010, titled “Internet Mediation Applications,” which are hereby incorporated by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61370556 | Aug 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12727001 | Mar 2010 | US |
Child | 12896821 | US |