throbber
(19i United StateS
`(12) Patent Application Publication
`Spusta et al.
`
`(10) Pub. No. : US 2002/0032870 A1
`Mar. 14, 2002
`(43) Pub. Date:
`
`IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`US 20020032870A1
`
`(54) WEB BROWSER FOR LIMITING ACCESS
`TO CONTENT ON THE INTERNET
`
`(76)
`
`Inventors: Martin Spusta, Clinton Township, MI
`(US); James Cummings, Chesterfield
`Township, MI (US); Gerald L. Howe,
`Clinton Township, MI (US)
`
`Correspondence Address:
`ARTZ R ARTZ, P. C.
`28333 TELEGRAPH RD.
`SUITE 250
`SOUTHFIELD, MI 48034 (US)
`
`(21) Appl. No. :
`
`09/851, 770
`
`(22) Filed:
`
`May 9, 2001
`
`Related U. S. Application Data
`
`of provisional
`application No.
`(63) Non-provisional
`60/232, 330, filed on Sep. 13, 2000.
`
`Publication Classification
`
`(51) Int. Cl.
`(52) U. S. Cl.
`
`G06F 15/173
`713/201
`
`ABSTRACT
`
`(57)
`A web browser system has a network
`that connects a user
`computer having a local database with local database entries
`therein with a central database having central database
`entries therein. A web browser has a domain name entry area
`to the website. A
`for entering a domain name corresponding
`to a plurality of
`controller
`compares
`the domain name
`database entries within a local database. When the domain
`is not
`is
`local database,
`the domain name
`in the
`name
`to a plurality of central database entries
`compared
`in a
`the network. When
`central database
`the domain
`through
`name is in the local database or central database, access to
`is
`the website is enabled. In addition
`to the system, parsing
`performed
`the final destination
`to determine
`and domain
`informa-
`name. The website may also include sponsorship
`format.
`tion in an educational
`
`/2
`
`Memory
`
`Controller
`
`Interface
`
`Local
`Database
`
`Data Entry
`Device
`
`Network
`
`Other
`internet Sites
`
`Interface
`
`Control
`Database
`
`30
`
`Central Controller
`
`Approval Screening
`System
`
`Unified Patents Ex. 1005, pg. 1
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 1 0f 10
`
`US 2002/0032870 A1
`
`/ IO
`
`
`
`
`
`
`~
`
`4
`
`
`Other
`‘
`internet Sites
`
`
`Control
`Database
`
`
`
`Approval Screening
`~ ~ ~
`System
`
`FIG.1
`
`Unified Patents Ex. 1005, pg. 2
`
`Unified Patents Ex. 1005, pg. 2
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 2 of 10
`
`US 2002/0032870 A1
`
`Qx
`
`(U
`
`U
`
`o
`E
`
`CD
`
`CO
`
`CD
`
`X
`
`5
`8
`
`Q)
`
`CD
`
`O
`
`E
`O
`O
`CD
`
`Unified Patents Ex. 1005, pg. 3
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 3 of 10
`
`US 2002/0032870 A1
`
`Start
`
`Start Browser
`
`70
`
`Determine
`the security level
`and load appropriate
`theme
`and start up page
`
`Is new
`version available
`?
`
`to the page for
`Navigate
`upgrade and offer download
`(automatic update)
`
`Are any
`previously approved
`sites denied
`?
`
`Y
`
`Download such a sites
`and delete them from
`local database
`
`Is new
`advertisement
`available
`?
`
`Download only new
`advertisement
`and their
`links location
`
`Program
`is loaded and is
`waiting for user's input
`(interaction)
`
`Navigation
`
`Email
`
`Education
`Resources
`
`90
`
`Unified Patents Ex. 1005, pg. 4
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 4 of 10
`
`US 2002/0032870 A1
`
`Begin Navigation
`
`Capture Entire URL
`
`Open hidden browser
`
`9&5'
`
`100
`
`iO&
`
`Check URL for
`hidden redirection
`in hidden browser
`
`Return final URL
`
`Look for ":" symbol
`
`Move pointer to
`space to right
`
`)06
`
`Capture namel URL
`by looking for "f'
`
`JOAN
`
`j(o
`
`Second ". "
`?
`
`Add ". "
`to beginning
`
`l3isregard characters
`to left of first to obtain
`first name
`
`Capture
`name2URL
`
`Unified Patents Ex. 1005, pg. 5
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 5 of 10
`
`US 2002/0032870 A1
`
`B
`
`/32
`
`Search central
`database for name1
`
`!34
`
`Was name1
`found
`?
`
`Submit the name1
`into central database
`for review
`
`/3Z
`
`Search central
`database for name2
`
`Check for
`internet connection
`
`Search local
`database for name1
`
`Store name1
`in
`local database
`
`/22
`
`Local database
`
`/24
`
`Was name1
`found
`
`Check for user's
`security
`level
`
`Search local
`database for name2
`
`Local database
`
`/30
`
`Was name2
`found
`'p
`
`Store name2 in
`local database
`
`/4'2
`
`Was
`name2 found
`?
`
`Central
`Database
`
`/44'
`/
`Submit the name2
`into control
`Database for review
`
`/48
`
`Is user's
`security
`level
`satisfying
`?
`
`to
`Navigate
`denied page
`
`to
`Navigate
`desired page
`
`to domain
`Navigate
`notfound page
`
`FIG. 5
`
`End
`
`Unified Patents Ex. 1005, pg. 6
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 6 of 10
`
`US 2002/0032870 A1
`
`Start
`
`User clicks on the
`e-mail button
`
`/6O
`
`Load previously
`downloaded messages
`(old undeleted messages)
`
`User clicks on the
`"New Message" button
`
`Type or select recipients
`e-mail address from
`the drop down list
`
`~ 168'
`
`Is user
`allowed to send
`e-mail to any
`address
`
`N
`
`/70
`
`Does the
`address match to
`pre-approved
`e-mails
`
`/7Z
`
`Y
`
`Display the e-mail
`address in the
`recipients box
`
`N
`
`Is user
`allowed to send
`attachments
`?
`
`/7Z
`
`Is parents
`password
`required
`for attachments
`?
`
`Enter
`parents/supervisor
`password
`
`/d'4
`
`Y
`
`User can hit the
`attachment button
`to attach files
`
`/7@
`
`User can only Cancel
`message or hit
`"Send" button to
`send the message
`
`Type subject in the
`subject line and message
`in the text box
`
`/Q9
`
`Replace inappropriate words
`with a character
`
`/77
`
`End
`
`/sz
`
`Unified Patents Ex. 1005, pg. 7
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 7 of 10
`
`US 2002/0032870 A1
`
`Subject
`Button 1
`
`&9O
`
`Subject
`Button 2
`
`Subject
`Button 3
`
`Subject
`Button N
`
`Other Information
`or Characters
`
`/9/
`
`Central
`Computer
`
`AD Code
`
`Local
`Computer
`
`AD Code
`
`QOO
`
`FIG. 7
`
`Window
`
`/9g
`
`At.
`
`A3.
`
`192
`
`AD Image Link
`
`Submit
`
`AD Image
`
`Narri
`
`2'
`
`Point Total
`
`FIG. 9
`
`Unified Patents Ex. 1005, pg. 8
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 8 of 10
`
`US 2002/0032870 A1
`
`Add 1 point and mark
`the subject as read
`for that user
`
`Start
`
`9 !O
`
`Obtain new
`images
`advertising
`
`Zl2
`
`Send ad code
`
`Compare a sent ad code
`with a central ad code
`
`Update ad and ad code
`
`2/g
`
`User clicks on the specific
`link (subject button)
`
`A screen with the
`subject
`corresponding
`and ad will display
`
`2ZZ
`
`Browser goes on-line
`to our database
`to
`the question
`download
`for that subject
`
`Waiting for user response.
`3 possible options are
`available.
`
`Z25
`
`230
`
`Was
`"Teach me"
`selected
`
`Do not add points, but
`mark the subject as
`read for that user
`
`c"34
`
`F35
`
`Was the
`question answered
`correctly
`?
`
`Y
`
`D
`
`N
`
`Do not add points, but
`mark the subject as
`read for that user
`
`FIG. 10
`
`Z3Z
`
`to the page with
`Navigate
`the answer and display
`user's status. (Win, Lose,
`Teach). Animated
`character makes the
`announcement as well.
`
`End
`
`Unified Patents Ex. 1005, pg. 9
`
`

`

`I a
`
`I
`
`j r
`RSR
`
`mmm
`
`~
`
`~
`
`0
`
`~
`
`~
`
`~
`
`~ ~ ~ ~
`
`~
`
`~
`
`~ ~ I
`
`I ~ ~
`
`~
`
`~
`
`~
`
`~ ~ ~
`
`~
`
`~
`
`~ ~
`
`~ ~
`
`~
`
`I
`
`mm
`gee ~
`~e. . gii ~
`gii ~
`gsa ~
`IRIEI
`
`~ ~
`
`~
`
`~
`
`Unified Patents Ex. 1005, pg. 10
`
`

`

`Patent Application Publication Mar. 14, 2002 Sheet 10 of 10 US 2002/0032870 A1
`
`Enter Starting URL
`
`ZOO
`
`Time Period
`
`Scan HTML of URL
`
`Z8o
`
`File Words
`
`Check file size
`% change
`
`Subrnitchanges
`for review
`
`Changed
`site
`?
`
`29O
`
`Change central database
`
`Updated
`
`local database
`
`Store outgoing
`URL in queue
`
`Store all e-mail
`addresses
`
`3OC
`
`3&4
`
`Submit for approval
`
`Pending status
`
`Obtain text content
`
`Obtain key words
`for page
`
`Obtain occurrence
`of key words
`
`31&
`
`Enter info into
`key word table
`
`Unified Patents Ex. 1005, pg. 11
`
`

`

`US 2002/0032870 A1
`
`Mar. 14, 2002
`
`WEB BROWSER FOR LIMITING ACCESS TO
`CONTENT ON THE INTERNET
`
`RELATED APPLICATION
`[0001] The present invention claims priority to provisional
`application No. 60/232, 330 filed on Sep. 13, 2001.
`
`TECHNICAL FIELD
`
`[0002] The present invention
`relates generally
`to an appa-
`ratus and method for limiting access to content on a network,
`for
`to an apparatus
`and more particularly,
`and method
`access
`to content on
`or allowing
`Internet
`the
`limiting
`deemed unsuitable or suitable by an administrator.
`
`BACKGROUND OF THE INVENTION
`[0003] As the proliferation of the Internet
`increases,
`the
`variety of types of content also increases. Children
`in their
`studies now require access to the Internet to perform various
`tasks. Some content on the Internet, however, may not be
`suitable for children of various ages.
`
`[0004] To restrict access to websites, various systems are
`known. One system for restricting access uses a key that is
`to a user upon age verification. The drawback
`to
`provided
`such a system is that not all websites that include unsuitable
`content require a key for access. Therefore, access to these
`systems may be undesirably
`allowed.
`[0005] Web browsing systems are also known
`that store a
`list of disapproved websites on the user's computer. If the
`to be accessed is on the disapproved
`website sought
`list,
`access is denied. One drawback
`to such a system
`is that
`the access
`Internet content providers
`continually
`change
`addresses and new sites are constantly being added. There-
`fore, such lists become outdated nearly as fast as they are
`to such a system is that the lists
`created. Another drawback
`to adult oriented websites. Unfortu-
`restricted
`are typically
`nately, well-known websites may have content
`that is not
`age appropriate. Such systems do not distinguish
`the age
`appropriateness of such content and therefore either denies
`access to all content or allows access to such content even
`the content is not appropriate
`for the user.
`though
`[0006] Another practice on the Internet
`includes redirect-
`ing users who enter a first website address and are auto-
`to another website with another address.
`matically
`rerouted
`the redirection of the user
`Known systems cannot prevent
`and therefore a redirected user may end up at a site with
`content.
`inappropriate
`[0007]
`It would
`to provide a web
`therefore be desirable
`access to
`that allows age appropriate
`browsing
`system
`approved sites while preventing access of users to inappro-
`priate websites.
`
`SUMMARY OF THE INVENTION
`
`[000II] The present
`provides
`invention
`improved
`an
`that connects a user
`browser system that includes a network
`computer having a local database with local database entries
`central database
`therein with a central database having
`entries therein. A web browser has a domain name entry area
`to the website. A
`for entering a domain name corresponding
`to a plurality of
`controller
`compares
`the domain name
`database entries within a local database. When the domain
`is
`local database,
`is not
`the domain name
`name
`in the
`
`to a plurality of central database entries
`compared
`in a
`the network. When
`central database
`the domain
`through
`name is in the local database or central database, access to
`is enabled.
`the website
`
`a method for
`
`[0009]
`In a further aspect of the invention
`accessing a web page comprises:
`[0010] entering a domain name corresponding
`site;
`[0011] comparing
`the domain name to a plurality of local
`database entries, local database having a plurality of local
`database entries;
`
`to a web-
`
`[0012] when the domain name is not in the local database,
`to a plurality of central data-
`the domain name
`comparing
`base entries
`in a central database;
`[0013] when
`the domain name is in the local database or
`central database, enabling access to the website.
`[0014] In a further aspect of the invention,
`a website comprising:
`sponsoring
`[0015] generating
`subject buttons;
`[0016] selecting and actuating a first subject button from
`said plurality of subject buttons;
`[0017] displaying a question and a plurality of answers
`to the step of selecting;
`response
`
`a method of
`
`a screen display having a plurality of
`
`in
`
`[001II] displaying
`[0019] selecting
`answers;
`
`a first sponsor code on said display;
`the plurality of
`
`a first answer
`
`from
`
`[0020] displaying
`a narrative display
`step of selecting a first answer.
`
`in response
`
`to the
`
`[0021] In yet another aspect of the invention, a method for
`parsing a domain name entry comprises:
`[0022] entering a full domain name having a plurality of
`character positions;
`
`the full domain name;
`
`[0023] capturing
`[0024] capturing a first domain name by capturing char-
`acters right of a first symbol and left of a second symbol to
`obtain a first name.
`
`[0025] Yet another aspect of the invention
`includes updat-
`information on a website and browser;
`ing advertising
`
`[0026] providing a local computer ad code having a first
`plurality of bits and a central computer ad code and a second
`plurality of bits;
`
`[0027] comparing
`the local computer
`central computer ad code;
`
`ad code with
`
`the
`
`[002II] when the local computer ad code is not equal to the
`an ad to the local
`central computer ad code, downloading
`from the central computer.
`computer
`
`[0029] One advantage of the invention
`is that the system
`to access to various
`is easily adaptable
`allowing children
`for their age group. Also,
`websites
`suitable
`the present
`is adaptable
`to business uses so that various
`invention
`levels may be established
`business
`rather
`than age appro-
`priate level for children's applications.
`
`Unified Patents Ex. 1005, pg. 12
`
`

`

`US 2002/0032870 A1
`
`Mar. 14, 2002
`
`[0030] Yet another
`advantage of the
`is that
`invention
`content sites is pre-
`to inappropriate
`redirection
`unintended
`the parsing process.
`vented using
`[0031] The method
`for sponsoring or advertising on the
`website encourages children
`to learn by allowing points to
`be collected and redeemed
`for prizes.
`[0032] Another advantage of the invention
`is that various
`plug-ins and other media installed on web browsers such as
`Microsoft's
`Internet Explorer will be accessible
`through
`the browser of the present
`invention.
`[0033] Other advantages and features of the present inven-
`in light of the
`tion will become apparent when viewed
`detailed description of the preferred
`embodiment when
`in conjunction with
`the attached
`taken
`and
`drawings
`appended claims.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0034] FIG. 1 is a block diagrammatic view of a system
`according
`invention.
`to the present
`[0035] FIG. 2 is a screen layout of one embodiment of a
`display for the present
`invention.
`[0036] FIG. 3 is a block diagrammatic view of the opera-
`tion of a first portion of a web browser system according to
`invention.
`the present
`[0037] FIG. 4 is a flow chart of a method of operating
`the
`parsing domain name after the website address has been
`entered as a desired network destination.
`[003II] FIG. 5 is a flow chart of the method of access
`approval according
`to the present
`invention.
`[0039] FIG. 6 is a flow chart of the method of operating
`an e-mail system according
`to the present
`invention.
`[0040] FIG. 7 is a block diagram
`illustrating
`display for an educational aspect of the invention.
`[0041] FIG. II is a system
`level view with another screen
`display for an educational aspect of the present
`invention.
`[0042] FIG. 9 is another screen display representative of
`invention.
`the present
`[0043] FIG. 10 is a flow chart of a method for operating
`the education aspect of the invention.
`[0044] FIG. 11 is a first table of the central database of the
`invention.
`present
`[0045] FIG. 12 is a second table of the central database of
`invention.
`the present
`[0046] FIG. 13 is a flow chart of a method for rescreening
`websites according
`to the present
`invention.
`[0047] FIG. 14 is a flow chart of a method for a gathering
`process of the present
`invention.
`
`a screen
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`[004II]
`In the following figures the same reference numer-
`als will be used
`the same components
`to identify
`in the
`various views. Specific examples of displays, systems and
`features of the
`for preferred
`are given below
`methods
`browser according
`those
`to the present invention. However,
`
`in the art will recognize
`that various other features
`skilled
`the scope of the invention.
`may be included without varying
`The terms domain name, website address, and URL are used
`and refer to an intended destination on a
`interchangeably
`network such as the Internet.
`to FIG. 1, a browser system 10
`[0049] Referring now
`is illustrated. Browser
`according
`invention
`to the present
`system 10 has a local computer 12 that is coupled
`to a
`network 14. Network 14 is coupled
`to a remote or central
`controller 16. Network 14 may, for example, be one of a
`number of various types of connections
`to the Internet such
`lines, DSL lines, ISDN lines, T1 lines, satellite
`as phone
`only one local
`connections or cable modems. Although
`computer 12 is illustrated, various numbers of local com-
`puters 12 are contemplated by the present
`invention. The
`number of local computers 12 may vary depending on a
`subscription or other type of access to central controller 16.
`"Central" or "remote" when describing controller or data-
`to the device or database being
`located away
`base refers
`from the local computer by the network
`from or separated
`14.
`[0050] Local computer 12 has a local controller 1II that is
`microprocessor based. Controller 1II controls
`the operation
`of local computer 12 and the operation of a memory 20, a
`interface 24, and a display 26.
`local database 22, a network
`Although memory 20 and local database 22 are illustrated as
`these components may be combined
`separate components,
`into a single memory 20. Memory 20 stores the software
`to
`to data entry device 2II.
`run the web browser
`in response
`[0051] Data entry device 2II may be one of a various
`number of data entry devices such as a keyboard, a mouse,
`a touch screen or other devices used in computer applica-
`tions. The operation of the browser will be further described
`below.
`
`[0052] Local database 22 may include various entries and
`be formatted
`into tables as will be further described below.
`The local database entries may
`include approved website
`and various other data. The local
`data, age appropriateness
`database may also include user approved websites or autho-
`to access websites not approved by
`the central
`rization
`controller as will be further described below.
`[0053] Central controller 16 may be one or a plurality of
`computers or servers used to store a central database 30
`to network 14 through an interface
`which may be coupled
`32. Central database 30 has central database entries that will
`be used in the operation of the browser system as will be
`described below. The entries may also be arranged
`in tables
`as will be described below.
`
`controller 16 may be coupled
`[0054] Central
`to an
`approval screening system 34 that may be used to approve
`into central database 30. Approval
`for insertion
`websites
`screening system 34 may be coupled
`to other Internet sites
`36 and screens
`the other Internet sites 34 for appropriate
`content. Approval screening system 34 provides
`the desired
`and the like to central
`data regarding age appropriateness
`database 30. The approval screening system will be further
`described below.
`[0055] Referring now to FIG. 2, display 26 is illustrated
`in
`further detail. Display 26 displays a browser 3II, which is a
`graphical user interface. Browser 3II includes many naviga-
`tion controls 40 which may
`for example, back
`include,
`
`Unified Patents Ex. 1005, pg. 13
`
`

`

`US 2002/0032870 A1
`
`Mar. 14, 2002
`
`button 40A, forward button 40B, stop button 40C, refresh
`button 40D, home button 40E, search button 40F, favorites
`button 40G, print button 40H, e-mail button 40I, games
`button 40J, and help button 40K. These buttons control the
`the Internet as is common
`operation and navigation
`through
`in the operation of commercially
`Internet brows-
`available
`ers.
`
`[0056] A website URL address display 42 is used
`to
`the current website as well as enter a requested
`display
`to. Various characters 44 may also
`website to be navigated
`be included on display 26 within browser 3II.
`
`or sponsorship 50 may also be
`[0057] An advertising
`positioned on the browser 3II. The sponsorship area 50 may
`in various or multiple areas on browser 3II. As
`be positioned
`area is positioned on the leftmost
`illustrated,
`sponsorship
`side of the display. However, various or multiple areas on the
`display may be used.
`[005II] Referring now to FIG. 3, the browsing process is
`started at start browser step 70. Preferably,
`is
`the browser
`icon located on
`started by double-clicking on the browser
`the desktop display of the local computer or automatically as
`to the rest of the computer. The browser
`a default gateway
`then have a sign in or selection for the user's name
`may
`the security level and load an appro-
`which then determines
`priate theme in start up page for that user in step 72. In step
`72, various
`start up pages may also be associated with
`various age levels. For example, grades 2 and under may
`have a first page, grades 3 through 7 a second page, and
`grades II through 12 a third page. For a business application,
`various levels of employees may also have access to various
`content on the Internet. For example, system administrators
`may have complete access to the Internet while mailroom
`clerks may have access to the company's website through an
`Intranet.
`
`[0059] After step 72, step 74 determines whether a new
`version of the browser software
`is available. This step may
`be performed by accessing central computer
`the
`through
`network. A website may be checked and the current version
`of the program determined.
`In step 76, if a new version is
`available an "upgrade now" button may appear and a free or
`charged-for upgrade may be provided
`the user. The
`to
`in step 76.
`is updated
`version
`
`In step 74, if a new version is not available and in
`[0060]
`step 76 if an upgrade
`is performed, step 7II is executed. Step
`if any previously approved sites in the local
`7II determines
`database have been recently denied access. This step is
`if the content of a website has changed. The
`important
`screening process will be further described below. If previ-
`to "not
`sites have
`status
`a changed
`ously
`approved
`approved", step IIO is executed
`the sites that have
`in which
`If any
`the local database.
`been denied are deleted
`from
`previously approved sites have not been denied or in step IIO
`if the downloading
`and deletion from the local database
`is
`complete, step II2 is executed. In step II2, advertising or
`information may be provided
`to the screen
`sponsorship
`display. In step II2, if new advertising
`is available,
`then step
`is loaded with their
`II4 is executed in which new advertising
`respective
`links onto the browser from the central computer.
`This process is further described below.
`
`[0061] After step II4 and if in step II2 no new advertising
`is loaded and displayed
`is available,
`the browser program
`in
`
`is required
`step II6. After step II6 user interaction
`to enter
`three main portions of the program; either navigation
`IIII,
`resources 92. These three portions
`e-mail 90 or education
`will be further described below. Of course, other tools and
`sections may be provided such as searching, games, news,
`links and entertainment.
`equipment purchasing,
`[0062] Referring now to FIG. 4, the navigation process is
`in step 94. The navigation
`initiated by some user interaction
`in URL
`process is initiated by a user typing
`in (for example
`display 42 of FIG. 2) or selecting a desired URL (Uniform
`Resource Locater). Before navigation can begin, a parsing
`to determine whether or not permission
`process is performed
`has been granted for the site for the particular security level.
`In step 96, the entire entered URL is captured and a hidden
`is opened
`browser
`in step 9II so that redirection
`technique
`may be uncovered. The hidden browser is hidden from view
`and therefore not accessible to an end user. The URL is then
`checked for hidden
`in hidden browser
`redirection
`in step
`100. If in step 100 a redirection has been performed or not
`in step 102. It should be
`performed, a final URL is returned
`noted that the parsing process does not wait for the complete
`page to be downloaded. The parsing process requires
`the
`final destination of the HTML document. After the HTML
`text is loaded the parsing process stops the navigation of the
`hidden web browser object and thus stops the loop.
`
`in step 102. The
`[0063] A final returned URL is returned
`returned URL in step 102 may,
`for example, be
`final
`http: //maps. yoohoo. corn/index. html. If this is the case, one
`or more names may be returned by the parsing process. The
`pointer of the parsing program starts at the left and looks for
`the first colon in step 104. After the colon, the pointer moves
`two places to the right in step 106. Two places were chosen
`to avoid the two slashes. The desired name is then captured.
`the second place and the first slash is
`Everything between
`used as name1 in step 10II.
`
`[0064] After step 10II, step 110 is executed
`in which
`the
`If a
`presence of a second period in the name is determined.
`second period is not present, step 112 is executed in which
`a period is added to the beginning of the name. If a second
`in step 110, step 114 is executed. Step 114
`period is present
`is also executed after step 112. In step 114, the characters
`to
`the left of the first period are disregarded.
`In the present
`example, ". yoohoo. corn" is captured as name2. By allowing
`from a single URL, a portion of
`to be captured
`two names
`the website may be accessible such as the map portion in the
`present example while the entire website may not be acces-
`sible because some content may not be suitable for all users.
`to for-
`this method for parsing can apply
`Advantageously,
`eign languages as well.
`[0065] Referring now to FIG. 5, an approval portion of the
`in FIG. 4 is performed.
`process started
`In this process, an
`for in step 11II. Internet
`is checked
`Internet connection
`in step 11II may be one of several
`types of
`connection
`including a cable, DSL or dial-up modem. This
`connections
`in FIG. 4 prior to
`step may have been previously performed
`or as part of the step of checking for a new version. If so, this
`In step 120, the local database on the
`step may be eliminated.
`for name1. If name1 was not
`is searched
`local computer
`in step 124, step 126 is executed
`found in the local database
`in which name2 is searched for in the local database
`in step
`that "found", "not found", and
`12II. It should be noted
`"within" when referring
`to the database refer to whether or
`
`Unified Patents Ex. 1005, pg. 14
`
`

`

`US 2002/0032870 A1
`
`Mar. 14, 2002
`
`is
`not the site is approved. Thus, when a website name
`"found", it is envisioned
`that it is on the "approved" (acces-
`sible) list of sites. The database may actually contain infor-
`sites as well.
`mation on disapproved
`[0066] If name2
`in the local
`is not found (not approved)
`in step 130, step 132 is executed. In step 132 the
`database
`central or remote database is searched for name1. After step
`132, step 134 is executed in which if name1 was not found,
`step 136 is executed. In step 136, name1 is submitted
`to the
`approval screening system 34 of FIG. 1.
`[0067] After step 136, step 13II is executed
`in which
`the
`to the central database of step 140. Step
`name2 is compared
`142 is executed in which if name2 was not found, step 144
`is executed
`is submitted
`in which name2
`to the approval
`screening system 34 of FIG. 1. The above path represents a
`scenario in which name1 or name2 was not found
`in either
`the local database or the central database. Therefore, step
`144 issues a domain not found page 145 and prevents
`the
`to the desired site. The system process has
`further navigation
`an end step 154 in which
`the process is ended.
`[006II] Referring back to step 142, if name2 was found in
`the central database (and name1 was not found in the local
`then name2 is stored in the local database
`database)
`in step
`143, then step 146 is executed. This may be performed by
`adding a new table entry containing
`the desired data into the
`local database. The entry may be all or part of the tables
`described below which is transferred
`the network.
`through
`[0069] Referring back to step 134, if name1 was found in
`in the local database) step
`the central database (not found
`14II is executed. In step 14II name1
`in the local
`is stored
`in the same manner described above.
`database
`[0070] Referring back to steps 124, 130, if respective
`in step 124 or name2 was found
`name1 was found
`in the
`in step 130, step 146 is executed. Step 146 is
`local database
`also executed if name1 was found in the central database
`in
`step 134 or name2 was found in the central database
`in step
`142. In step 146, the user's security
`level is checked. This
`levels of children described
`may correspond
`to the grade
`above. After step 146, step 14II is executed
`in which
`the
`user's security level is determined whether or not it satisfies
`level of the website. Thus, a comparison
`is
`the particular
`level and the level
`made between a database entry indicating
`of the current user. If the site has a security level beyond that
`of the website, then step 150 is executed in which access to
`is denied. In step 14II if the
`or navigation
`to the website
`user's security level is greater than or corresponds with the
`security level of the website, then the navigation
`is allowed
`to the website.
`
`that the process of FIG. 5 may be
`[0071] It is envisioned
`implemented by returning an XY value back to the browser
`software where X is a first value corresponding
`to 0=not
`found, approved=1, pending=2, or denied=3, and the values
`for Y correspond
`levels. For example, security
`to security
`levels 1-12 may be used. When X=O this indicates
`the page
`in the database and will be submitted
`for
`was not found
`review as described further below. The next time someone
`accesses the database
`the domain name will be found and the
`response of "the requested site is currently being reviewed,
`try again later" will be issued.
`[0072] When X=1 this indicates that the domain name was
`found and is approved. Therefore, the user's security will be
`
`checked as in step 14II. If the user's security level is less than
`the approved domain's
`level, a message will be
`security
`for the
`displayed saying the domain name is not appropriate
`user's security
`level. Even if the security
`level does not
`match the security level, the local database will be updated
`with the security level and domain name in case other users
`with higher security levels are users to the system. This will
`the central database for this
`the need for querying
`prevent
`item.
`
`[0073] When X=2, this indicates
`that the page was found
`in the central database but is being currently
`reviewed as
`system or
`screening
`above by
`mentioned
`the approval
`approval entity such as actual stalf members of the company.
`such as "the requested
`A display
`site is currently being
`try again later" may be entered but the domain
`reviewed,
`name is not provided
`into the local database.
`[0074] When X=3 this indicates that a page was found but
`for a specific reason. This allows
`it has been denied
`the
`to control various content which may become
`company
`accessible in the future. The denied domain names are not
`stored in the local database because the next time the domain
`it will again be compared against
`is requested
`the Internet
`in the case that it does become approvable. The
`database
`process ends in step 154 in which the program returns back
`of FIG. 4 if another
`is
`navigation
`to
`the beginning
`attempted.
`
`[0075]
`In addition
`to the above safeguards,
`a computer
`lock for local websites or content contained on the user's
`In this case, the parents or
`computer may be provided.
`the use of the program's
`administrators may control
`files,
`browsers and system settings
`in a similar manner
`to that
`described above. Certain users may be given rights to access
`certain programs or other browser wherein other users may
`not. This may prevent younger users from unintentionally
`destroying parents'
`financial or other information
`stored on
`the computer.
`[0076] By preventing access to other browsers,
`system cannot be bypassed.
`[0077] Various other features may be employed
`in browser
`the theme such as back-
`26 such as the options
`to change
`ground color, pictures,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket