The present invention relates generally to monitoring and notification of Internet use. The invention relates more particularly to systems and methods for providing carrying out the monitoring and providing notifications regarding Internet access and use.
Various embodiments of the present invention provide systems and methods for user defined notifications regarding Internet access and use on the home network or from designated access devices. Such systems and methods are powerful tools for certain groups of users. For instance, parents who wish to obtain insight into their children's Internet usage to make more informed parenting choices may benefit from the present technology. They may wish to be notified when their children use or access certain Internet content, including access within a content category or for a specific site or sites selected by the parent. It will be appreciated by those skilled in the art that any type of user (not just parents) may utilize this technology to monitor another user's use of Internet content on the home network or personal devices.
It will be noted that as used herein the term Internet content encompasses any website, web service or other content or service presented to a user on the Internet or through a user device. The term web content is used herein to refer to any Internet content generated or accessed by or through a web browser.
In accordance to some embodiments of the present technology, an exemplary method for providing notifications regarding Internet access and use includes several steps. Information regarding Internet content is selected by the first user as Internet content to be monitored and reported on. Access attempts and usage information regarding such Internet content is received via a user interface between any end user and the Internet service. Further, the exemplary method may include determining whether the Internet content has been selected as content to be monitored and reported upon and whether such content has been accessed or used, thereby generating a notification, and transmitting the generated notification via a user interface to the first user. The determination step may be performed by the Internet service. In some embodiments, the Internet service may be coupled to the Internet service provider. The notification can be made in any form, including email, embedded message within the Internet service, text message, or other forms as designated by the user.
An exemplary system for providing notifications regarding Internet access and use may include the Internet service and a user interface between any end user and the Internet service that allows the first user to select what Internet content is to be monitored by the Internet service. The user interface may operate between an end user and an Internet service provider. For purposes of this disclosure, the definition of Internet service provider will include any service or technology that provides a connection to the Internet. Examples of such technologies include, but are not limited to, traditional Internet service providers (ISPs), telecommunications companies, cable operators, mobile operators, network operators and any other provider of wired or wireless access to Internet services. The system may be set up to utilize a DNS (Domain Name System) server or a cloud based networking system.
The exemplary system for providing notifications may further include a processor for executing the instructions stored in memory to: determine whether the Internet content has been accessed by an end user, the determination performed by the Internet service, generate a notification when the Internet content has been accessed by the second end user, and transmit the generated notification via the user interface to the first end user.
The exemplary system may be a stand-alone application or be provided as part of a system of one or more policy applications (including but not limited to a notification policy application) that allow the first end user to selectively determine the specific portion of the Internet received or accessed by an end user, including any end user within a network, with all end users being monitored by the system. The policy applications may be discrete applications and may be single purpose applications. The applications may be configured to meet the needs, rules and behaviors desired by the first user. The first user may select one or more policy applications from a selection menu to provide an individualized Internet experience for the end user or his household.
The end user selects the policy applications that he wants to apply to his Internet service. The selections are made using at least one of the Internet access devices available to the user and the user interface. The policies contained in the policy applications are applied to the Internet service that is supplied to the end user. Policies may include specific sites that can or cannot be accessed. Policies may also include time and duration of access, and limitations and restrictions specific to a given user or to the home or other network generally. It should be noted that the policy applications may be used to not only prohibit undesired behaviors, but may also be used to encourage desired behaviors. Other users within a home network may be redirected to sites other than those chosen based on a policy application applied by the user.
Information about the notifications and/or notification settings of an end user may be shared by the first user with third parties. An end user may publish to friends or other third parties the notification policy applications they are using, and/or which policies he has in place. Similarly, the end user may access information from third parties, such as which notification policies they are using, which notification policy applications they find useful, etc.
The user interface may be accessed though a gateway available to the end user. Gateways include but are not limited to desktops, PCs, laptops, notebooks, game consoles (e.g., an X-box), music players, tablets, IPods, Smartphones, automobile computer systems, and Internet enabled TVs. A Smartphone may be generally defined as a phone with computing capability. A Smartphone may provide Internet access to an end user.
Various embodiments of the present invention provide a method and system for providing notifications regarding Internet access and use. A first end user may wish to be notified when another user has accessed, attempted to access or used particular Internet content or Internet content within a category that was selected by the first end user. An exemplary system for providing notifications regarding Internet access and use may include an Internet service coupled to an Internet service provider and a user interface between the first end user and an Internet service provider that allows the first end user to select which Internet content is to be monitored. The exemplary system for providing notifications may further include a processor for executing the instructions stored in memory to: determine whether the Internet content has been accessed by a second end user, the determination performed by the DNS server or Internet service, including a combination thereof; generate a notification when the Internet content has been accessed or used; and transmit the generated notification via the user interface to the first end user.
Generally speaking, an administrator may create and enforce mediation polices for one or more end users that utilize computing devices coupled to an Internet service delivered to a location such as a home, residence or place of business or campus. The term “administrator” may include not only individuals, such as parents, but also any individual creating a mediation policies regarding the Internet service delivered to end users. It will be understood that an administrator may also be an end user, although end users who are not also administrators may not create or apply policies.
Exemplary user devices for use with the disclosed systems may have an app. As used herein, an app shall be defined as a module including a user interface to an Internet service. The app may further include one or modules included in the Internet service. An app may be downloaded and installed on a user's computing device, including mobile devices. Users may define mediation policy via a user device, such as through the user interface. Some embodiments of the present invention do not require software to be downloaded or installed locally to the user device and, accordingly, do not require the user to execute a de-install application to cease use of the system.
Internet content may be specific web content, such as a website, or be associated with a category of Internet content selected by the first end user. The information received regarding the Internet content at step 110 may comprise a company name associated with the Internet content, a site name associated with the Internet content, a category name associated with the Internet content, or any combination thereof. The user interface may allow a first end user to select which Internet content is to be monitored by the Internet service. The user interface may operate between any end user and the Internet service. User devices (such as user devices 550 of
At step 120, a determination is made whether the Internet content specified by the first end user has been accessed or used by a second end user. The determination in step 120 may be performed by the Internet service which may, in turn, utilize a DNS server (such as the DNS server 510 of
If the Internet content designated to be monitored by the first end user is accessed by the second end user, at step 130, a record of that access attempt may be stored in the Internet service and a notification may be generated to the first end user. The format of the notification may be determined during this step. In various embodiments of the present technology, the generated notification may include the identification of the Internet content that was accessed, as well as the date and time it was accessed. It may be appreciated that any engine, module, server, database, or any combination thereof may help to generate the notification.
At step 140, the generated notification is transmitted to the first end user. In some embodiments, the notification is transmitted to display on a user device of the first end user via a user interface. In further embodiments, the notification is transmitted through electronic mail or text messages to display for the first end user. At step 140, the generated notification may optionally be transmitted to a third party (such as a social networking Internet content, a community, a third party Internet content, or any computing device or user that is not serviced by the Internet service provider that services the first and second end users).
The method 100 may include one or more optional steps. For instance, the method 100 may include the step of storing the received information regarding the Internet content in memory. Any type of storage memory may be utilized. The method 100 may also include determining and/or otherwise identifying Internet content associated with a given category. If an end user inputs a category instead of information of a specified Internet content, a monitoring list may become pre-populated with one or more Internet content associated with the category. The monitoring list may be displayed on a user interface that is provided to the first end user. The Internet service and/or a database associated with the Internet service may provide Internet content that is associated with categories or category names selected by the first user. The monitoring list may be modified by the first end user. For instance, the method 100 allows for the receipt and implementation of feedback regarding the monitoring list from an end user. For example, if an end user disagrees with the Internet content(s) determined by the Internet service as being related to the category requested by the end user, the end user may reject one or more of the Internet content(s) or may select from another menu of suggested Internet content(s) deemed by the Internet service as being closely related or aligned to the end user's request. Further, the monitoring list may be created leveraging the social production from among several users of the Internet service and imported into the Internet service of the first user. The user generated monitoring list may also be modified and republished by the first end user for collaboration with other users of the Internet service until the first user accepts the monitoring list for his home network or devices designated by the first user.
The monitoring list may also include Internet content collaboratively determined by a group of end users invited by an administrator to collaborate on the establishment of the Internet content records used in the mediation policy. The administrator may, before or after the administrator creates the administrator's own monitoring list, invite the administrator's family members, friends, colleagues or any group of combination of groups and individuals to identify Internet content to be used by the administrator in creating the administrator's own monitoring list. These invitees may or may not be users of the Internet service but will be allowed to contribute to the administrator's monitoring list via the user interface of the Internet service. The administrator may choose to moderate the contributions of individuals or groups invited by the administrator to contribute to the administrator's monitoring list. The administrator may also, before or after the administrator creates the administrator's own monitoring list, join an existing group of users of the Internet service and apply the determinations of appropriate Internet content by a group to the administrator's own monitoring list. Where there is an existing group that the administrator joins for purposes of creating a monitoring list, the administrator may choose to import the contributions of other groups once or subscribe to these groups to reduce the configuration burden of creating a monitoring list. After the administrator creates the administrator's own monitoring list, the administrator may publish the administrator's monitoring list to be used and/or subscribed to by other users of the Internet service. In such case, other users of the Internet service may import the contributions of administrator once or subscribe to the administrator's monitoring list for use in their own mediation policies. It is understood that via this collaboration two or more user-administrators may combine their monitoring lists to create one mediation policy that may be used by these and other administrators of the Internet service.
The method 100 may further include the optional step (not shown) of providing one or more policy applications 620. The policy applications 620 may be discrete, single purpose applications, such as a notification policy application as described herein. Using single purpose policy applications 620 may make the applications more straightforward and easier for the end users 160 to operate.
The method 100 may also include the optional step of pre-populating the monitoring list with Internet content that is associated with the category. The monitoring list may be displayed on a user interface that is provided to the first end user.
For a notification policy application, the method 100 may also include the optional step of applying policies of a notification policy application to the Internet service provider. In this optional step, logging and reporting Internet access of the Internet content may be performed with the help of the Internet service. With the help of the Internet service, the method 100 may include an optional access data collection step (not shown). The method 100 may collect whatever access data is desired. Possible collected data may include but is not limited to use characteristics such as sites visited, number of visits to each site, duration of visits, days and times of visits, etc. Data may also be collected and catalogued by individual end user (such as the end user 160 in
In an optional sharing step (not shown), an end user of the method 100 may transmit, share, or publish information regarding an Internet content with a third party at the discretion of the end user. Typical information regarding an Internet content that is transmitted, shared or published may be specific sites being monitored or tracked, categories of Internet content being monitored or tracked, policy applications 620 being used, and other uses and characteristics of the method 100.
The user interface module 210 provides one or more user interfaces to the end user as a result of the notification policy application. The user interface module 210 provides, for instance, a user interface between the end user and the Internet service, so that communications between the two are enabled. Exemplary user interfaces provided by the user interface module 210 are shown in
The Internet content tracking module 220 may perform a step of receiving information related to Internet content (such as in the step 110 of the method 100 described earlier herein in relation to
The architecture 200 includes a network 260 which may comprise a DNS server. The network 260 may also include any type and number of databases, servers, end users, computing devices, and policy engines. The one or more Internet content being monitored is shown as Internet content 270. It will be appreciated by one skilled in the art that the system in
One or more of the modules described above may be used to gather and record data relative to Internet content accessed and attempts to access Internet content. Data collected may include addresses accessed and attempted to be accessed, number of times visited, duration of visit, whether other links are accessed from the site, etc. The data may be used to “learn” the search patterns of one or more users of the system. The system may then modify the mediation policy according to the learned history of use.
The system may also track various access characteristics to attempt to determine what kind of access was initiated. A beacon or similar tracking tool may be used to determine the amount of time spent by a user on a given site, whether the user clicks on links in the given site, etc. Tracking algorithms may then use the collected data to determine the nature of the site access. For example, the tracking algorithm may indicate whether or not the access of the site was intentional or inadvertent.
A listing of information fields 420, domain link fields 430 and category buttons 440 may be provided in a monitoring list to the end user. An information field 420 may be associated with a domain link field 430 and a category button 440. For instance, as depicted in
The one or more information fields 420 are fields by which an end user may enter information regarding Internet content. As previously described, information regarding the Internet content may include a company name associated with the Internet content, a site name associated with the Internet content, a category name associated with the Internet content, or any combination thereof. An end user may input Internet content, use content created by other users of the Internet service, and/or designate a category they want to be monitored in the one or more information fields 420. The category may be an Internet content category or a category associated to one or more Internet content. Such categorized Internet content may be preloaded or otherwise stored as part of the notification policy application.
After an first end user has entered their selections into the one or more information fields 420, the notification policy application may auto-populate one or more domain link fields 430 with the actual URL address of the Internet content that the end user wants to monitor or with a URL of an Internet content associated with an Internet content category provided by the end user in the information field 420. The Internet service may determine Internet content that is associated or is most closely related to a first end user's request provided in the information field 420. If there is no check or selection of the category button 440 associated with a given domain link, then the domain link field 430 may provide the actual URL of a specified Internet content based on the information of the Internet content provided in the filled-in information field 420. On the other hand, if the Internet service has determined Internet content that is associated with or is most closely related to a first end user's request provided in the information field 420, and a URL of the determined Internet content is provided in the domain link in response to the end user's request, then the category button 440 associated with a domain link will be checked or otherwise selected. If the determination of an Internet content based on a first end user's request in the form of a category name is incorrect, a first end user may click on the domain link field 430 to activate a drop-down menu that provides other suggested Internet content that are related to the category. The first end user may select Internet content from the drop-down menu. A URL to the selected Internet content from the drop-down menu will appear in the domain link field 430.
First end users may repeat the process of populating the domain link fields 430 until all of their selections have been furnished to the information fields 420. Once all the selections of a first end user have been furnished, the initiating end user may click on or otherwise actuate the OK button 460 to have their notification settings saved and stored for future use. Once the OK button 460 has been selected, the configuration drawer interface 400 appears to close. To activate the functionality of the notification policy application, a first end user may select, click or otherwise actuate the On button of the On/Off button set 410. If a first end user inputs their notification settings but does not enable the notification policy application by selecting the On button, then an overlay may appear to the first end user asking if the first end user would like to enable the service prior to closing the configuration drawer. In some embodiments, the default setting for the notification policy application is “On.” If the first end user wishes to disable the functionality of the notification policy application, the first end user may select the Off button of the On/Off button set 410. If a first end user wishes to receive email notifications when an Internet content being monitored is accessed, the first end user may click on the email notification button 450. As described earlier herein, a notification may include the identification of the Internet content that was accessed, as well as the date and time it was accessed.
The systems and methods described above may typically be resident in an Internet service, a DNS server, or a DNS network. The systems and methods described may also be implemented in plug-in utilities, gateway devices, cable modems, proxy servers, set top boxes, and network interface devices.
Internet content records may also include Internet content collaboratively determined by a group of end users invited by the administrator to collaborate on the establishment of the Internet content records used in the mediation policy. The administrator may, before or after the administrator creates the administrator's own mediation policy, invite the administrator's family members, friends, colleagues or any group of combination of groups and individuals to identify appropriate Internet content to be used by the administrator in creating the administrator's own mediation policy. These invitees may or may not be users of the Internet service but will be allowed to contribute to the administrator's mediation policy via the user interface of the Internet service. The administrator may choose to moderate the contributions of individuals or groups invited by the administrator to contribute to the administrator's mediation policy. The administrator may also, before or after the administrator creates the administrator's own mediation policy, join an existing group of users of the Internet service and apply the determinations of appropriate Internet content by a group to the administrator's own mediation policy. Where there is an existing group that the administrator joins for purposes of creating a mediation policy, the administrator may choose to import the contributions of other groups once or subscribe to these groups to reduce the configuration burden of creating a mediation policy. After the administrator creates the administrator's own mediation policy, the administrator may publish the administrator's mediation policy to be used and/or subscribed to by other users of the Internet service. In such case, other users of the Internet service may import the contributions of administrator once or subscribe to the administrator's mediation policy for use in their own mediation policies. It is understood that via this collaboration two or more user-administrators may combine their mediation policies to create one mediation policy that may be used by these and other administrators of the Internet service.
The dynamic enforcement engine 520 may generate its policy engine on instructions received from one or more policy modules 530. Each policy module 530 may be constructed to provide various types and levels of services to the DNS network 540. In various embodiments, a policy module 530 may be configured to handle queries directed to subjects including, but not limited to, malicious domain redirection, user access redirection, non-existent domain redirection, and data collection or analysis.
It will be recognized by those skilled in the art that the elements of DNS service 570 may be hosted either locally or remotely. In addition to residing in the DNS service 570, one or more of the DNS network 540, the dynamic enforcement engine 520, and the policy modules 530, and any combination thereof, may be resident on one or more user devices 550.
The system 600 utilizes a user interface 610. The user interface 610 may be implemented in many embodiments. One specific implementation of the user interface 610 is as a web page.
The user interface 610 may be accessed by one or more user devices 550 operated by the users 560. The user interface 610 may be accessed though a gateway user device 550 available to the users 560. Suitable user devices 550 include but are not limited to desktops, PCs, laptops, notebooks, gaming devices, music players, Smartphones, automobile computer systems, and Internet enabled TVs. The system 600 may also be accessed and controlled remotely through user devices 550, such as a Smartphone. A Smartphone may be defined as a phone with computing capability. A Smartphone may provide the user 560 with Internet access.
The user interface 610 provides a mechanism for one or more authorized users 560 to establish content policy for the Internet service. The user interface 610 operates between the user devices 550 present in the system 600 and the DNS network 540. Instructions resident on the user interface 610 therefore operate on the Internet service, by controlling at least a portion of DNS resolutions via a dynamic policy engine 630, before the service reaches the displays of the user devices 550.
The user interface 610 provides the users 560 with access to one or more policy applications 620. The user interface 610 may provide access to a selection list to at least one authorized user 560. The authorized user 560 uses the selection list or some other menu mechanism to select those policy applications 620 that the user 560 chooses to apply to the system 600. The authorized user 560 may select any number of the available policy applications for use on the system 600 at any given time. In implementations utilizing Smartphones as the user device 550, the policy applications 620 are downloaded to the device 550. The device 550 then serves as the user interface 610 to communicate directly with the dynamic policy engine 630.
The policy applications 620 may prohibit access to specific sites. The policy applications 620 may also limit the time of day when users or selected users 560 may access certain sites. The policy applications 620 may also manage and analyze duration of access to various sites. It is important to note that the policy applications 620 do not simply provide blocking mechanisms by masking or enabling network controls, but rather mediate an Internet service received by the end user. As used herein, mediating the service may include any of blocking, constraining, enabling, redirecting, promoting, demoting, substituting, obscuring, limiting, interrupting, and restricting all or a portion of the Internet service. The policy applications 620 may provide notifications or alerts to one or more users 560 when sites are accessed. The policy applications 620 may also provide notification of frequency and duration of access of designated sites. The policy applications 620 may also be used to observe, substitute, enable, redirect users, to reward behavior desired from the users by a system administrator, etc. The policy applications 620 may redirect users from a non-favored site to another site. The policy applications 620 may also collect and transmit data characteristic of Internet use.
Access policies supplied by the policy applications 620 may apply to all users 560 of the system 600, or the access policies may be specific to individual users or groups of users 560. The policy applications 620 may be discrete, single purpose applications.
The policy applications 620 provide the users 550 with a mechanism to take various actions relative to their Internet service feed. The policy applications 620 also allow the users 550 to establish a dynamic policy engine 630 that includes a user database. The policy engine 630 is used to enforce rules associated with each policy application associated with individual end users, not simply block various inappropriate sites from the Internet feed. Rather, the dynamic policy engine 630, controlled by the user interface 610 through user device(s) 550, is used to manage all aspects of the Internet experience for the users 560. In sum, the policy applications 620 may be used to configure the dynamic policy engine 630 to provide the users 560 with a mechanism to personalize the Internet experience. The policy applications 620 may be configured in combinations, and may each be separately configured.
The database in the policy engine 630 may be used to record and to notify users 560 of various data relative to Internet access. The data collected from and provided to the users 560 may include records of access of specific sites, time spent on specific sites, time of day of access, data specific to individual users, etc.
It should also be noted that following an initial setup through the user interface 610 of the policy engine 630, a direct access 640 enforcement loop may be established between the policy engine 630 and the user devices 550. Subsequent accessing of the DNS network 540 utilizing the direct access 640 decreases response time in the system 600, thereby further enhancing the Internet experience of the users 560. Configurations of policy applications 620 that are selected by one or more users 560 designated as system administrators may remain in the user database of the policy engine 630 until such time as it may be modified by the system administrators. The system administrators may define multiple policy configurations, with a combination of policy applications 620, applicable to one or more end users 560 of the system 600. Each policy application 620 may be separately configurable as well. Policy configurations may vary based upon designated times, conditional triggers, or specific requests from the users 560 with administrative authority.
As indicated above, two discrete data flow paths may be established for the system 600. A first data path establishes a set of enforcement policies for the system 600. The first data path flows from at least one user device 550 through the user interface 610, to the policy enforcement engine 630. A second data path 640 may be utilized following the establishment of a set of policies for the system 600. The second data path 640 flows directly between the user device(s) 550 and the policy engine 630. Multiple sets of enforcement policies may be established and saved within the system 600 and implemented selectively by the users 560.
The components shown in
Mass storage device 730, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 710. Mass storage device 730 can store the system software for implementing embodiments of the present invention for purposes of loading that software into main memory 710.
Portable storage device 740 operates in conjunction with a portable non-volatile storage medium, such as a floppy disk, compact disk or Digital video disc, to input and output data and code to and from the computer system 700 of
Input devices 760 provide a portion of a user interface. Input devices 760 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 700 as shown in
Display system 770 may include a liquid crystal display (LCD) or other suitable display device. Display system 770 receives textual and graphical information, and processes the information for output to the display device.
Peripherals 780 may include any type of computer support device to add additional functionality to the computer system. Peripheral device(s) 780 may include a modem or a router.
The components contained in the computer system 700 of
Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the invention. Those skilled in the art are familiar with instructions, processor(s), and storage media.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the invention. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
The above description is illustrative and not restrictive. Many variations of the invention will become apparent to those of skill in the art upon review of this disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents. While the present invention has been described in connection with a series of embodiments, these descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. It will be further understood that the methods of the invention are not necessarily limited to the discrete steps or the order of the steps described. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art. For example, this description describes the technology in the context of an Internet service in conjunction with a DNS server. It will be appreciated by those skilled in the art that functionalities and method steps that are performed by a DNS server may be performed by an Internet service.
One skilled in the art will recognize that the Internet service may be configured to provide Internet access to one or more computing devices that are coupled to the Internet service, and that the computing devices may include one or more processors, buses, memory devices, display devices, input/output devices, and the like. Furthermore, those skilled in the art may appreciate that the Internet service may be coupled to one or more databases, repositories, servers, and the like, which may be utilized in order to implement any of the embodiments of the invention as described herein.
One skilled in the art will further appreciate that the term “Internet content” encompasses any content that may be accessed by an user device including but not limited to one or more of web sites, domains, web pages, web addresses, hyperlinks, URLs, any text, pictures, and/or media (such as video, audio, and any combination of audio and video) provided or displayed on a web page, and any combination thereof. Mediating the Internet service may include any of blocking, constraining, enabling, redirecting, promoting, demoting, substituting, obscuring, limiting, interrupting.
While specific embodiments of, and examples for, the system are described above for illustrative purposes, various equivalent modifications are possible within the scope of the system, as those skilled in the relevant art will recognize. For example, while processes or steps are presented in a given order, alternative embodiments may perform routines having steps in a different order, and some processes or steps may be deleted, moved, added, subdivided, combined, and/or modified to provide alternative or subcombinations. Each of these processes or steps may be implemented in a variety of different ways. Also, while processes or steps are at times shown as being performed in series, these processes or steps may instead be performed in parallel, or may be performed at different times.
From the foregoing, it will be appreciated that specific embodiments of the system have been described herein for purposes of illustration, but that various modifications may be made without deviating from the spirit and scope of the system. Accordingly, the disclosure is not limited except as by the appended claims.
This nonprovisional patent application is a continuation-in-part application that claims the priority benefit of U.S. patent application Ser. No. 12/727,001 filed on Mar. 18, 2010, titled “Internet Mediation,” and provisional U.S. Patent Application Ser. No. 61/370,556, filed on Aug. 4, 2010, titled “Internet Mediation Applications,” which are hereby incorporated by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61370556 | Aug 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12727001 | Mar 2010 | US |
Child | 12897653 | US |