CA2413057C - System and method for adapting an internet filter - Google Patents

System and method for adapting an internet filter Download PDF

Info

Publication number
CA2413057C
CA2413057C CA2413057A CA2413057A CA2413057C CA 2413057 C CA2413057 C CA 2413057C CA 2413057 A CA2413057 A CA 2413057A CA 2413057 A CA2413057 A CA 2413057A CA 2413057 C CA2413057 C CA 2413057C
Authority
CA
Canada
Prior art keywords
identifier
database
categories
internet
uncategorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA2413057A
Other languages
French (fr)
Other versions
CA2413057A1 (en
Inventor
Harold Kester
Dan Ruskin
Chris Lee
Mark Anderson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Websense LLC
Original Assignee
Websense LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Websense LLC filed Critical Websense LLC
Publication of CA2413057A1 publication Critical patent/CA2413057A1/en
Application granted granted Critical
Publication of CA2413057C publication Critical patent/CA2413057C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99936Pattern matching access

Abstract

A system and method for updating a filtering system (110) which controls access to a website/page between a local area network (LAN) (100) and an Internet (104). The LAN (100) includes an Internet gateway system (105) coupled to a workstation (102) and configured to receive a URL request. The system controls access to the website/page associated with the URL based on one or more categories that are associated with the URL. The Internet gateway system (105) can determine the category that is associated with the URL by referencing a master database (204) or requesting the category from a database factory (112). The database factory (112) can receive URLs from multiple Internet gateway systems (105). The database factory (112) determines whether the identifier was previously categorized by the database factory (112) and provides the category to the Internet gateway system (105). Once the Internet gateway system (105) has the category, it applies rules associated with the category and user to filter access to the requested website/page.

Description

SYSTEM AND METHOD FOR ADAPTING AN INTERNET FILTER
Background of the Invention Field of the Invention A system and method for updating a filtering system which controls access to a website/page between a local area network (LAN) and an Internet.
Description of the Related Art The Internet is a global system of computers that are linked together so that the various computers can communicate seamlessly with one another. Internet users access server computers to download and display informational pages. Once a server has been connected to the Internet, its informational pages can be displayed by virtually anyone having access to the Internet.
The easy access and inexpensive cost of retrieving Internet pages has led to several problems for controlling access to inappropriate information, such as pornography. Several solutions to this problem have been proposed, including rating systems similar to that used for rating movies so that a parent or employer could control access to Internet servers, or pages, that have a particular rating.
Unfortunately, this mechanism requires each person running an Internet server to voluntarily rate their site. Because of the free-wheeling nature of the Internet, this type of voluntary rating scheme is unlikely to be very efficient for preventing access to sites, such as those containing pornography, that most parents or businesses desire to block.
In addition to a rating scheme, others have developed databases that contain the uniform resource locator (URL) address of sites to be blocked. These databases are integrated into network computer systems and Internet firewalls so that a person wishing access to the Internet first has their URL request matched against the database of blocked sites. The user cannot access any URL found in the database. One such system is described in U.S. Patent No. 5,678,041 to Baker et al.
Unfortunately, such systems rely on the completeness of the database of accessed sites to be complete. Because new servers and URLs are being added to the Internet on a daily basis, as well as current servers being updated with new information, these databases do not provide a complete list of sites that should be blocked.

Summary of the Invention The systems and methods have several features, no single one of which is solely responsible for its desirable attributes. Without limiting the scope as expressed by the claims which follow, its more prominent features will now be discussed briefly. After considering this discussion, and particularly after reading the section entitled "Detailed Description" one will understand how the features of the system and methods provide several advantages over traditional filter systems.
In accordance with one aspect of the invention, there is provided a system for collecting identifiers for updating a filtering system which controls access to Internet websites or pages between a local area network and an Internet. The system includes a workstation configured for a user to send an identifier to request an Internet website or page, an Internet gateway system coupled to the workstation and configured to receive the identifier and to allow or deny access to the Internet website or page associated with the identifier, a master database of identifiers along with one or more categories associated with each identifier, a filter system coupled to the Internet gateway system and configured to receive the identifier from the Internet gateway system, determine whether the identifier is in the master database, send the identifier to a database factory if the identifier is not in the master database, and apply one or more rules to one or more categories that are associated with the identifier, wherein the one or more categories are received from the database factory. The database factory is configured to receive the identifier from the filter system if the identifier was not in the master database, determine whether the identifier was previously categorized by the database factory, if the identifier was not previously categorized, determine the one or more categories to associate with the identifier and provide the one or more categories to the filter system, else provide the one or more categories that were previously associated with the identifier.

The identifier may be in the master database and may be associated with the one or more categories.

The filter system may be further configured to pre-filter the identifier or the Internet website or page associated with the identifier for a data characteristic that is indicative of the one or more categories, and may associate one or more indicators with the identifier.
Pre-filtering may be performed on text strings, graphics, and audio that are associated with the identifier or the Internet website or page.
The one or more indicators may include a category flag.
The filter system may use the one or more indicators to screen the identifier prior to sending the identifier to the database factory.
The Internet gateway system may include a firewall module configured to provide an electronic boundary between the workstation and the Internet and a router module configured to find a best path from the firewall module to the Internet website or page associated with the identifier.
The filter system may include a management module configured to provide an interface for a system administrator to select the one or more rules that are applied to the one or more categories associated with the identifier, an uncategorized database configured to store the identifier if the identifier is not in the master database and a manager module configured to send the stored identifier to the database factory and to receive the one or more categories from the database factory.
The uncategorized database may include a request frequency that is associated with the identifier and may indicate the frequency of requests for the identifier in the uncategorized database.
The manager module may be configured to send the request frequency from the uncategorized database to the database factory.
The master database may include a request frequency that is associated with the identifier and may indicate the frequency of requests for the identifier in the master database.
The manager module may be configured to send the request frequency from the master database to the database factory.
The one or more rules may include blocking access to the Internet website or page based on the one or more categories associated with the identifier and the user.
The one or more rules may include allowing access to the Internet website or page based on the one or more categories associated with the identifier and the user.
The database factory may include a module configured to receive the identifier from the filter system and provide the one or more categories to the filter system, an identifier processing module configured to receive the identifier from the module and -2a-determine whether the identifier has been previously categorized by the database factory, a categorization system module configured to categorize the identifier if not previously categorized by the database factory and a database of categorized identifiers configured to store the identifier and the one or more categories.
The module may be configured to receive a request frequency from the filter system to prioritize the identifier.
The request frequency may be associated with the identifier and may indicate the frequency of requests for the identifier in the uncategorized database.
The request frequency may be associated with the identifier and may indicate the frequency of requests for the identifier in the master database.
The identifier may be a uniform resource locator (URL).
The identifier may be an Internet Protocol (I.P.) address.
The identifier may be a domain name.
The system may further include a second filter system and a second Internet gateway system coupled to the second filter system and the database factory.
The identifier processing module may be further configured to merge and sort the identifier and a second identifier received from the second Internet gateway system.
In accordance with another aspect of the invention, there is provided a method for adapting a filter system which controls access to Internet sites. The method involves receiving a request from a user in the form of an identifier to access a website or page, determining whether the identifier is in a master database of categorized identifiers and one or more categories associated with the identifier, if the identifier is not in the master database, determining whether the identifier is in an uncategorized database, else applying one or more rules to the one or more categories associated with the identifier, if the identifier is not in the uncategorized database, posting the identifier to the uncategorized database, else updating an uncategorized database request frequency in the uncategorized database that is associated with the identifier, uploading the uncategorized database to a database factory, determining whether each identifier has been previously categorized by the database factory, for each identifier that was not previously categorized, categorizing each identifier or website or page associated with the identifier to select one or more categories to -2b-associate with each identifier and posting each identifier along with its selected one or more categories into a database of categorized sites and downloading the database of categorized sites to the filter system for incorporation into the master database.
The method may further involve updating a master database request frequency in the master database if the identifier is in the master database and uploading the master database request frequency and the associated identifier to the database factory.
The one or more rules may include blocking access to the website or page based on the one or more categories associated with the identifier and the user.
The one or more rules may include allowing access to the website or page based on the one or more categories associated with the identifier and the user.
The uncategorized database may further include additional data associated with the identifier.
The additional data may include a request frequency.
The additional data may include an indicator.
The additional data may include a trace ID.
The additional data may include a primary language used by the filter system.
The method may further involve merging and sorting the uncategorized database based on each identifier and the additional data associated with each identifier.
The method may further involve pre-filtering the identifier or website or page associated with the identifier for data characteristics that are indicative of the one or more categories and associating one or more indicators with the identifier.
Pre-filtering may be performed on text strings, graphics, and audio that are associated with the identifier and or website or page associated with the identifier.
The one or more indicators may include a category flag.
The method may further involve screening the identifier using the one or more indicators prior to sending the identifier to the database factory.
The identifier may be a uniform resource locator (URL).
The identifier may be an Internet Protocol (I.P.) address.
The identifier may be a domain name.

-2c-In accordance with another aspect of the invention, there is provided a method for collecting collection data for updating a filtering system which controls access to Internet sites. The method involves receiving a request from a user in the form of an identifier to access a website or page, determining whether the identifier is stored in a master database of categorized identifiers, if the identifier is stored, recalling a category that is associated with the identifier and applying a rule to the identifier that is associated with the category, if the identifier is not stored, determining whether the identifier is stored in an uncategorized database and if the identifier is not stored in the uncategorized database, posting the identifier to the uncategorized database, else updating an uncategorized database request frequency associated with the identifier.
The method may further involve updating a master database request frequency in the master database if the identifier is stored in the master database.
The method may further involve pre-filtering the identifier or website or page associated with the identifier for data characteristics that are indicative of one or more categories, determining whether data characteristics were found during the pre-filtering and if data characteristics were found, associating one or more indicators with the identifier in the uncategorized database.
The rule may block access to the website or page based on the category associated with the identifier and the user.
The rule may allow access to the website or page based on the category associated with the identifier and the user.
The identifier may be a uniform resource locator (URL).
The identifier may be an Internet Protocol (I.P.) address.
The identifier may be a domain name.
The uncategorized database may further include additional data associated with the identifier.
The additional data may include a trace ID.
The additional data may include a primary language used by the filter system.
The additional data may include the uncategorized database request frequency.
The master database may further include additional data associated with the identifier.

-2d-The master database may further include the master database request frequency.
In accordance with another aspect of the invention, there is provided a method for processing identifiers for updating a filtering system which controls access to Internet sites. The method involves receiving identifiers at a database factory from a filter system, wherein at least one of the identifiers corresponds to an Internet site requested to be accessed by a user, determining whether each of the identifiers has been previously categorized, for each identifier that was not previously categorized by the database factory, categorizing each of the identifiers, a website or page associated with the identifier, or additional data associated with the identifier, and associating output with each identifier and posting the identifier along with the associated output into a database of categorized sites.
The output may include one or more categories.
The output may include a statistical probability.
The output may include a multidimensional vector.
Categorizing each of the identifiers may be performed by an automated classification engine.
The identifiers may include an uncategorized identifier.
The identifiers may include a categorized identifier.
The method may further involve receiving at the database factory a master database request frequency which indicates the frequency that the categorized identifier was requested at the filter system.

The method may further involve merging and sorting the identifier and a second identifier received from a second filter system.
The method may further involve determining whether processing of the output associated with the uncategorized identifier is performed.
The processing of the output may include automatically posting the uncategorized identifier to the master database.

The processing of the output may include verifying that the output associated with the uncategorized identifier is correct.

The method may further involve processing the identifiers and the additional data.

-2e-Processing may include reassembling the identifiers and the additional data using a markup language.
The method may further involve decrypting the identifiers and the additional data and decompressing the identifiers and the additional data.
Decrypting may be performed using a data encryption standard (DES).
The identifier may be a uniform resource locator (URL).
The identifier may be an Internet Protocol (I.P.) address.
The identifier may be a domain name.
In accordance with another aspect of the invention, there is provided a system for collecting identifiers for updating a filtering system which controls access to a wide area network (WAN) of websites or pages. The system includes a master database including one or more identifiers received from a user to request access to an Internet website or page, and one or more categories associated with each of the one or more identifiers, an access system coupled to the WAN and configured to send an identifier request if the identifier request is not in the master database and a database factory configured to receive the identifier request, select one or more categories to associate with the identifier request if the one or more categories were not previously associated with the identifier, and provide the selected one or more categories to the master database.
The access system may include an Internet gateway system coupled to a filter system.
The identifier may be a uniform resource locator (URL).
The identifier may be an Internet Protocol (I.P.) address.
The identifier may be a domain name.
The master database may include a request frequency that is associated with the identifier and indicative of the frequency of requests for the identifier at the filter system.
The database factory may be configured to receive the request frequency to prioritize the received identifiers.
Brief Description of the Drawings FIGURE 1 is a block diagram of a site collection system for controlling access to Internet sites.

-2f-FIGURE 2 is a block diagram of a filter system.
FIGURE 3 is a flow diagram illustrating a process for collecting collection data.
FIGURE 4 is block diagram of a database factory.

-2g-[0011] FIGURE 5 is a flow diagram illustrating processing and uploading of collection data from the filter system to the database factory.
[0012] FIGURE 6 is a flow diagram illustrating processing of collection data by the database factory.
Detailed Description [0013] The following detailed description is directed to certain specific embodiments of the invention. However, the invention can be embodied in a multitude of different systems and methods. In this description, reference is made to the drawings wherein like parts are designated with like numerals throughout.
[0014] In connection with the following description many of the components of the various systems, some of which are referred to as "module," can be implemented as software, firmware or a hardware component, such as a Field Programmable Gate Array (FPGA) or Application-Specific Integrated Circuit (ASIC), which performs certain tasks.
Such components or modules may advantageously be configured to reside on the addressable storage medium and configured to execute on one or more processors. Thus, a module may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. The functionality provided for in the components and modules may be combined into fewer components and modules or further separated into additional components and modules.
Additionally, the components and modules may advantageously be implemented to execute on one or more computers.
[0015] FIGURE 1 is a block diagram of a local area network (LAN) 100 coupled to an Internet 104 and a database factory 112 also coupled to the Internet 104. For ease of explanation only a single LAN is shown though two or numerous such networks would more typically be included. Similarly, two or more database factories could also be deployed.
[0016] The LAN 100 includes one or more workstations 102 coupled to an access system 101. The access system 101 includes an Internet gateway system 105 and a filter system 110. LANs may also include other devices such as servers (not shown). The LAN
communicates via the Internet gateway system 105 in order to provide the workstation(s) 102 with communication to sites on the Internet 104. The LAN 100 can have an Ethernet I
ObaseT topology, or be based on any networking protocol, including wireless networks, token ring network, and the like.

[0017] The workstation 102 is coupled to the Internet gateway system 105. The workstation 102 can be a personal computer operating, for example, under the Microsoft Windows Operating System. However, other computers, such as those manufactured by Apple, IBM, Compaq, Dell, Sun Microsystems or other system, can be used.
[00181 The Internet gateway system 105 couples the LAN 100 and the Internet 104.
Internet gateway systems are well known in the art and normally communicate through connection devices, such as routers or other data packet switching technology, for translating Internet TCP/IP
protocols into the proper protocols for communicating with the Internet 104.
The Internet gateway system 105 used to implement a given system can vary as well as its location within the LAN 100.
For example, Internet gateway system 105 could be located at the workstation(s) 102 or connected peripherally to the Internet 104. The Internet gateway system 105 illustrated in FIGURE 1 includes a firewall module 106 coupled to a router module 108.
[00191 The firewall module 106 provides an electronic boundary between devices on the LAN 100, such as the workstation(s) 102, and the Internet 104 to prevent unauthorized users from accessing computer resources on the LAN 100. More specifically, the firewall module 106 monitors data packets flowing to and from the Internet 104. Thus, all communications between the Internet 104 and the LAN first pass through the firewall module 106. The firewall module 106 can be one of the many firewall software programs commercially available, such as Firewall-1 (Check Point software, Redwood City, California). However, it should be realized that while the system described in FIGURE 1 has the firewall module 106 controlling access of data packets between the Internet 104 and the workstations 102, other similar access control systems are available and can be used. For example, the Microsoft proxy server (Microsoft Corp., Redmond, WA), Netscape proxy server (Netscape Corp) and the Cisco P1X Firewall (Cisco Corp.) are currently available and can also be used as the firewall module 106. Alternatively, a caching device can be utilized to provide access control. For example, the Inktomi Traffic Server (Inktomi Corp.) and the Network Appliance NetCache (Network Appliance Inc.) can be used.
[00201 The router module 108 is configured to find a best path for a data packet that is sent from the firewall 106 to the Internet 104. The router module 108 stores and forwards electronic messages between the firewall and the requested website/page, first determining all possible paths to the destination address and then picking the most expedient route, based on the traffic load and the number of hops.

[00211 Still referring to FIGURE 1, a filter system 110 is shown coupled to the firewall module 106. The filter system 110 receives user requests for accessing Internet websites/pages from the firewall module 106. Alternatively or additionally, the filter system can receive or monitor user requests for accessing the Internet from other points on the LAN. The filter system 110 determines whether the user will be allowed access to the requested website/page.
Examples of techniques that can be used with the methods and systems disclosed herein are disclosed in U.S. patent application no. 09/494,315, filed 1/28/2000, and entitled SYSTEM AND
METHOD FOR CONTROLLING ACCESS TO INTERNET SITES, which is hereby incorporated by reference in its entirety.
[0022] The internet 104 in FIGURE 1 is a network or combination of networks spanning any geographical area, such as a local area network, wide area network, regional network, national network, and/or global network. Such networks may be hardwire, wireless, or a combination of hardwire and wireless.
[0023] The database factory 112 is shown connected to the filter system 110 via the Internet 104. Alternatively, the filter system 110 can communicate with the database factory 112 in other known ways such as a direct telephone link, a private network connection, or other suitable communication link.
[00241 FIGURE 2 is a block diagram of the filter system 110 from FIGURE 1 which communicates with the Internet gateway system 105. The filter system 110 can include a management module 200, a filter module 202, an upload/download manager module 208, a master database 204, and an uncategorized database 206.
[0025] A system administrator or the like interfaces with the filter system 110 via the management module 200 to select or create rules for users and/or groups of users. These rules can include, for example, allowing access to websites in selected categories and blocking access to websites in other categories. Rules can also include flexible filters. For example, rather than simply blocking or allowing access to the website/page, the system administrator selects or creates a flexible filter which is applied to the request. Example of flexible filters include, postponing the user's access, allowing the user to override denial of access, limiting the user's access based on a quota, and limiting the user's access based on a network load. Each requested website/page or category of website/pages can be associated with one or more rules.
[0026] The filter module 202 filters each request for Internet websites/pages using the master database 204 in conjunction with the rules. The filter module 202 analyzes the Internet website/page request from the workstation and then compares the Internet website/page request with the master database 204 of categorized Internet website/pages. It should be noted that the address could be a single page within an Internet website, or the default address of the website (e.g.: www.company.com). The master database 204 includes a list of websites/pages which can be in the form of URLs along with one or more categories associated with each URL. A URL
(Uniform Resource Locator) is the address of a computer or a document on the Internet that consists of a communications protocol followed by a colon and two slashes (e.g.: http://), the identifier of a computer, and usually a path through a directory to a file.
The identifier of the computer can be in the form of a domain name, for example www.m-w.com, or an Internet Protocol (I.P.) address, for example 123.456.789.1. A unique domain name can correspond to multiple I.P. addresses. Though often addresses, components thereof (for example, I.P. address, domain name, and communication protocol), or other location identifiers can be used to identify computers or documents on the Internet, for ease of description the term URL
is used hereafter.
The master database 204 can also include additional data associated with the URL. For example, a request frequency for the categorized website/page can be included in the master database 204. If the URL of the categorized website/page is found in the master database 204, the request frequency in the master database 204 can be updated for the requested website/page. A
reporter log (not shown) can be used to track requested websites/pages that are found in the master database 204.
[00271 The filter module 202 checks to see if the requested website/page address matches any addresses stored in the master database 204. If an address match between the requested address and the master database 204 is found, the filter system 110 applies the rule(s) associated with the one or more categories that match the requested address and the user. For example, if application of the rule by the filter module 202 indicates that the requested website/page is to be blocked, a pre-defined block page is sent to the user's browser explaining that the request is not allowed and why. Alternatively, the filter system 110 simply closes the connection that was requested by the Internet browser to the requested website/page.
[00281 If the filter module 202 does not find the URL in the master database 204 (i.e.
the URL is uncategorized), the filter module 202 then determines how to proceed with the uncategorized Internet website/page. For example, user access to the requested website/page can be allowed when the filter module 202 determines that the website/page is uncategorized.
Alternatively, the filter module 202 can block access to uncategorized sites.
[00291 Even when the requested website/page is not found in the master database 204, the filter module 202 can pre-filter, or scan, the requested website/page for specific characteristics.
These specific characteristics can relate to one or more of the categories found in the master database 204. For example, the scan can identify whether the uncategorized website/page includes characteristics that are indicative of pornography. This scan can be accomplished by, for example, searching the requested website/page and URL for text strings, graphics, audio and the like which have a high correlation with pornography websites. The filter module 202 can then associate an indicator with the uncategorized website/page based on the results of the scan. The indicator can be, for example, a specific category flag that relates to characteristics found during the scan of the uncategorized website/page. Continuing with the example above, if a text string was found that was indicative of pornography, a pornography flag would be attached to the uncategorized website/page. Alternatively, the filter module 202 performs the categorization of the URL and adds the URL and associated categories to the master database 204.
[0030] For uncategorized websites/pages, the filter module 202 determines whether they are represented in the uncategorized database 206 of URLs. If they are not, the filter module 202 stores the URLs associated with the requested uncategorized websites/pages in the uncategorized database 206. The uncategorized database can include additional data associated with the URL. For example, the request frequency for the uncategorized website/page and/or one or more indicators identified during the filter module's scan of the uncategorized website/page can be included in the uncategorized database 206. If the URL of the uncategorized website/page is found in the uncategorized database 206, the request frequency can be updated for the requested website/page.
[0031] Still referring to FIGURE 2, the upload/download manager module 208 can transmit data from the uncategorized database 206 and the master database 204 to the database factory 112 (see FIGURE 1). The upload could be immediate or periodic depending on the level of service required. For example, a daily upload after normal business hours could be used. The upload/download module 208 can refer to the request frequency and/or one or more indicators to prioritize the URLs in the uncategorized database 206 for their transmission to the database factory 112. If data from the master database 204 is to be uploaded to the database factory 112, the upload/download module 208 can refer to a request frequency for websites/pages found in the master database 204. The request frequency can be used to prioritize the URLs in the master database 204 for their transmission to the database factory 112.
[0032] FIGURE 3 is a flow diagram illustrating a process performed by the filter system 110 to collect uncategorized websites/pages. The collection process begins at a state 502 where the filter module 202 receives a user request in the form of a URL to access a website/page.
As was noted above, the requested URL and the identification of the user can be received from the Internet gateway system 105 or from a direct monitoring of traffic on the LAN
by the filter system 110. Next, the process moves to a decision block 504 where the filter module 202 determines whether the URL is in the master database 204. If the URL is in the master database 204, the process proceeds to a state 506 where the request for the website is posted in a reporter log. The reporter log is available to the system administrator for tracking requests for websites/pages.
Alternatively, the request for a website that is found in the master database 204 is posted to the request frequency in the master database 204. The process moves to a state 508 where the filter module 202 recalls the one or more categories that are associated with the requested website/page.
The filter module 202 can then apply one or more rules associated with the requesting user and the one or more categories.
[0033] Returning to the decision block 504, if the URL is not in the master database 204, the process continues to a decision state 510 where the filter module 202 determining whether to pre-filter the uncategorized URL. The system administrator can select whether pre-filtering is to be performed by the filter module 202. If the filter module 202 does not perform pre-filtering, the process proceeds to a state 512 where the filter module 202 posts the URL to the uncategorized database 206 as uncategorized. Next, at a state 514, if the URL was already posted in the uncategorized database 206, the filter module 202 updates the request frequency associated with the URL. The process then returns to state 502 where the filter module waits to receive the next request for a website/page. Additionally, the filter module can allow or deny access to the user based upon a rule for uncategorized URLs.
[0034] Returning to decision state 510, if the filter module 202 is to perform pre-filtering, the process moves to a state 516 where the filter module 202 scans or analyzes the URL
and/or website/page associated with the requested URL for specific characteristics that are indicative of one or more categories. The process continues to a decision state 518 where the filter module 202 determines whether any data characteristics were found during the scan. If data characteristics were found, the process moves to a state 520 where an indicator, for example, a flag, is associated with the requested URL. The process then continues to state 512 as described above where the URL is stored in the uncategorized database with the indicator.
[0035] FIGURE 4 is block diagram of the database factory 112 connected to the Internet 104. The database factory 112 provides the master databases to filter system(s) and processes websites/pages that are associated with uncategorized URLs and other information, for example, frequency usage in the master database. For example, the database factory 112 receives uncategorized URLs and any additional data associated with the URL from the filter system 110 and downloads categorized URLs to the filter system. The database factory 112 can also upload the request frequency for website/pages found in the master database 204.
Additional techniques available to the database factory 112 for collecting URLs include, for example, using a domain name system (DNS), using an Internet search engine, mining high trafficked website/page directories, and receiving suggested sites from the public.
[0036] The database factory 112 can include an upload/download module 701, a URL
processing module 700, a categorization system module 702, and a database 704 of categorized URLs.

[0037] One function of the upload/download module 701 is to receive URLs and any additional data associated with the URLs from the filter system 110. In one embodiment, the URLs include URLs from the uncategorized database 206 and URLs from the master database 204.
The additional data can include a request frequency for a website\page found in the master database 204, a request frequency for a website/page found in the uncategorized database 206, an indicator associated with a URL, a trace ID, and a primary language used by a filter system. For ease of explanation, the term collection data will be used to include URLs and any additional data associated with the URL. Additionally, the upload/download module 701 downloads the master database to the filter system(s), as will be described more fully below.
[0038] The URL processing module 700 receives the collection data from the upload/download module 701. The URL processing module 700 processes the collection data.
Processing can include merging, sorting, and determining a language for the collection data from multiple filter systems. The URL processing module 700 determines whether each URL in the collection data requires categorization. If the URL has not been previously categorized, the categorization system module 702 receives the URL and any additional data associated with the URL from the URL processing module 700.
[0039] The categorization system module 702 categorizes URLs which are then added to the database 704 of categorized sites. The categorization system module 702 can analyze each URL, the website/page associated with the URL, and any additional data associated with the URL
to determine its appropriate category or categories.
[0040] The categorization system module 702 can include an automated categorization or classification engine to determine the appropriate category or categories of the URL. The automated categorization engine can determine statistical probabilities and multidimensional vectors during the categorization process. Categorization can be based upon word analysis, adaptive learning systems, and image analysis. The categorization system module 702 can interface with a human checker to determine the appropriate category or categories of the URL. The categorization system module 702 can include the automated categorization engine and the human checker to determine the appropriate category or categories of the URL. For example, the automated categorization engine can initially determine the appropriate category. The human checker can verify that the URL is correctly categorized. The categorization system 702 determines whether the human checker is required to review the categorization results for each URL. If a human checker is involved, his results can also be utilized to refine the automated categorization engine. Once categorized, the categorization system module 702 posts the URL
along with its associated one or more categories into the database 704 of categorized sites.
[0041] The categorization system module 702 can include a language analyzer.
The language analyzer determines the language of the website for each URL.
Determining the language can facilitate the categorization process by allowing each human checker to be language dependent.

[0042] The database 704 of categorized sites can include URLs and their associated categories. The database 704 can be stored in a relational database management system, such as Oracle, Sybase, Informix, Microsoft Server, and Access.
[00431 Once the categorization system module 702 has posted the URL and its associated category or categories into the database 704, the upload/download module 701 thereafter routinely copies the database 704 to the filter system(s) 110. As can be imagined, the system can include thousands of filter systems, each of which is updated regularly by the upload/download module 701 to provide an updated database of categorized URLs.
Moreover, the upload/download module 701 can transfer portions of the database 704, such as updates, to the filter system 110 so that the entire database does not need to be transmitted.
[00441 FIGURE 5 is a flow diagram illustrating processing and uploading of collection data from the filter system 110 to the database factory 112. The process begins at a start state 600. Next, at a state 602, the upload/download manager module 208 (see FIGURE 2) requests a download of URLs and their associated categories from the database factory 112. This request can be periodic, random, or at a set time. For example, the request can be made when the number of URLs or the number of stored bits in the uncategorized database reaches a selected level. The request can be made when a selected maximum request frequency for any of the URLs in the uncategorized database 206 is reached. The request can be made as a result of an uncategorized URL being associated with an indicator. For example, when a URL
is associated with a pornography flag, the upload/download manager module 208 instigates an upload to the database factory 112. Additionally, the request can be in response to polling by the database factory 112. Alternatively, the upload/download module 701 can initiate the download. For example, the upload/download module 701 can initiate the process based on the current processing capacity of the categorization system module 702. If the categorization system module 702 is currently being underutilized, the upload/download module 701 can seek a filter system(s) and initiate an upload of the filter system's uncategorized database 206.
[00451 The process continues to a decision state 604 where the upload/download manager module 208 determines whether pre-filtering of the uncategorized URLs was performed by the filter module 202. This pre-filtering, or scanning, is performed to determine whether the requested website/page includes specific characteristics. These specific characteristics can relate to one or more of the categories found in the master database 204. For example, the scan can identify whether the uncategorized website/page includes characteristics that are indicative of pornography. The filter module 202 can then associate an indicator with the uncategorized website/page based on the results of the scan. The indicator can be, for example, a specific category flag that relates to characteristics found during the scan of the uncategorized website/page. The upload/download module 208 can refer to the one or more indicators to prioritize the URLs in the uncategorized database 206 for uploading to the database factory 112.
[00461 If pre-filtering was not performed, the process moves to a decision state 606 where the upload/download manager module 208 determines whether all of the uncategorized URLs are to be uploaded to the database factory 112. This provides the option to not upload the uncategorized database 206 but still receive a download of categorized sites from the database factory 112. The system administrator can select whether all of the uncategorized URLs are to be uploaded. If all of the uncategorized URLs are not to be uploaded, the process proceeds to a decision state 607 where the upload/download manager module 208 determines whether all of the URLs are to be uploaded. If all of the URLs are not to be uploaded, the process moves to a state 608 where the upload/download manager module 208 receives categorized URLs from the database factory 112. The upload/download module 701 can copy the database 704 to the filter system(s) 110. Thus each filter system 110 can be updated regularly by the upload/download module 701 to provide an updated database of categorized URLs. Moreover, the upload/download module 701 can transfer portions of the database 704, such as updates, to the filter system 110 so that the entire database does not need to be transmitted. The upload/download manager module 208 posts the categorized URLs into the master database 204.
[00471 Returning to decision state 606, if all of the uncategorized URLs are to be categorized by the database factory 112, the process moves to a state 610 where the upload/download manager 208 retrieves all URLs from the uncategorized database 206. The process moves to a state 612 where the uncategorized URLs and any additional data associated with the URLs, i.e. collection data, can be formatted. The additional data can include request frequencies and/or indicators associated with the URLs. For ease of explanation, the term collection data is being used to include URLs and any additional data associated with the URL.
The collection data is not required to be formatted and thus may be directly uploaded to the database factory 112. Moreover, the selection of a format for the collection data can depend on the type of data connection that the database factory 112 has with the filter system 110. For a data connection via the Internet 104, the upload/download module 208 can use a markup language, for example, Extensible Markup Language (XML), Standard Generalized Markup Language (SGML), and HyperText Markup Language (HTML), to format the collection data.
[00481 The collection data can be further processed prior to its upload to the database factory 112. For example, limit block 614, compression block 616, and encryption block 618 can be performed to process the collection data for upload to the database factory 112. While these blocks may facilitate the upload of the collection data, they are not required to be performed. The collection data can be uploaded without applying blocks 614, 616, 618. Thus, the collection data can be directly uploaded to the database factory 112 without applying blocks 612 through blocks 618.
-11..

[00491 If further processing is desired, the process moves to a state 614 where the upload/download manager 208 checks the limits of the collection data. The upload/download manager 208 can limit the collection data to a maximum size for uploading to the database factory 112. For example, the collection data from a single filter system could be limited to a maximum of 20 Mbytes. The process continues to a state 616 where the collection data is compressed so that the collection data takes up less space. Next, at a state 618 the collection data is encrypted so that it is unreadable except by authorized users, for example, the database factory 112.
[00501 Flow continues to a state 620 where the collection data is uploaded to the database factory 112. As explained above, the collection data can include any additional data associated with the URL, for example, request frequencies and/or indicators.
The process then moves to state 608 as described above to receive categorized URLs from the database factory 112.
[00511 Returning to decision state 604, if pre-filtering was performed by the filter module 202, the process moves to a state 622 where the upload/download manager 208 retrieves URLs that were associated with an indicator. The indicator can be, for example, a specific category flag that relates to characteristics found during the scan of the uncategorized website/page. Multiple indicators can be associated with a single URL. The upload/download module 208 can refer to the one or more indicators, and/or the request frequency to prioritize the URLs in the uncategorized database 206 for uploading to the database factory 112. The process then continues to state 612 where formatting can be performed on the URL and on any associated data as described above.
[00521 Returning to decision state 607, if all URLs are to be uploaded to the database factory 112, the process moves to a state 611 where the upload/download manager 208 retrieves all URLs that have been requested by users of the filter system 110. For example, the URLs from the uncategorized database 206 along with the URLs from the master database 204 are retrieved along with additional data, for example, request frequency. Alternatively, the URLs from the uncategorized database 206 along with data from the reporter log (not shown) is retrieved. The process then continues to state 612 where formatting can be performed on the URLs retrieved in state 611 and on any associated data as described above.
100531 FIGURE 6 is a flow diagram illustrating the processing of collection data by the database factory 112. The process begins at a state 800 where the upload/download module 701 receives collection data from the filter system 110 (see FIGURE 1). The time for receiving the collection data can be periodic, random, at a set time, or in response to polling. The upload/download module 701 and/or the upload/download manager module 208 can initiate the upload to the database factory 112. As explained above, the collection data can include any additional data associated with the URL, for example, request frequencies associated with URLs from the master database 204 and/or request frequencies associate with URLs from the uncategorized database 206, and/or indicators.
[0054] Next, at a state 802, the URL processing module 700 receives the collection data from the upload/download module 701. The collection data can be formatted or unformatted.
Additionally, the collection data can be encrypted and/or compressed or not.
[0055] The process continues to a state 804 where the URL processing module decrypts and uncompresses the collection data if decryption and/or uncompression is required. The process moves to a state 806 where the collection data is reassembled into a list of URLs and any additional data associated with the URL.
[0056] The process moves to a state 808 where the URL processing module 700 merges and sorts the collection data. The system can include thousands of filter systems, each of which is regularly uploading collection data from its filter system 110. As explained above, the collection data can include any additional data associated with the URL, for example, request frequencies and/or indicators. The URL processing module 700 can merge and sort the uploaded data for a filter system(s) based on the URL or any additional data associated with the URL. For example, the URL processing module 700 can refer to one or more indicators, and/or request frequencies to sort and merge the URLs from one or more filter systems.
[0057] The URL processing module 700 determines whether each URL in the collection data requires categorization. If the URL has not been previously categorized, the categorization system module 702 receives the URL and any additional data associated with the URL from the URL processing module 700.
[0058] Next, at a state 810 the categorization system module 702 categorizes URLs which are then added to the database 704 of categorized sites. As explained above, the categorization system module 702 can analyze each URL, the website/page associated with the URL, and any additional data associated with the URL to determine its appropriate category or categories. The categorization system module 702 can include an automated categorization/classification engine to determine the appropriate category or categories of the URL. Categorization can be based upon word analysis, adaptive learning systems, and image analysis. The categorization system module 702 can interface with a human checker to determine the appropriate category or categories of the URL. The categorization system module 702 can include the automated categorization engine and the human checker to determine the appropriate category or categories of the URL. The categorization system 702 determines whether the human checker is required to review the categorization results for each URL. If a human checker is involved, his results can also be utilized to refine the automated categorization engine.
[00591 The process continues to a state 812 where the categorization system module 702 posts the URL along with its associated one or more categories into the database 704 of categorized sites. The database 704 of categorized sites can include URLs and their associated categories.
[00601 While the above detailed description has shown, described, and pointed out novel features of the invention as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the spirit of the invention. The scope of the invention is indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims (61)

1. A system for collecting identifiers for updating a filtering system which controls access to Internet websites or pages between a local area network and an Internet comprising:

a workstation configured for a user to send an identifier to request an Internet website or page;

an Internet gateway system coupled to the workstation and configured to receive the identifier and to allow or deny access to the Internet website or page associated with the identifier;

a master database of identifiers along with one or more categories associated with each identifier;

a filter system coupled to the Internet gateway system and configured to receive the identifier from the Internet gateway system, determine whether the identifier is in the master database, send the identifier to a database factory if the identifier is not in the master database, and apply one or more rules to one or more categories that are associated with the identifier, wherein the one or more categories are received from the database factory; and the database factory configured to receive the identifier from the filter system if the identifier was not in the master database, determine whether the identifier was previously categorized by the database factory, if the identifier was not previously categorized, determine the one or more categories to associate with the identifier and provide the one or more categories to the filter system, else provide the one or more categories that were previously associated with the identifier.
2. The system of Claim 1, wherein the identifier is in the master database and is associated with the one or more categories.
3. The system of Claim 1, wherein the filter system is further configured to pre-filter the identifier or the Internet website or page associated with the identifier for a data characteristic that is indicative of the one or more categories, and associating one or more indicators with the identifier.
4. The system of Claim 3, wherein pre-filtering can be performed on text strings, graphics, and audio that are associated with the identifier or the Internet website or page.
5. The system of Claim 3, wherein the one or more indicators can include a category flag.
6. The system of Claim 5, wherein the filter system uses the one or more indicators to screen the identifier prior to sending the identifier to the database factory.
7. The system of Claim 1, wherein the Internet gateway system comprises:

a firewall module configured to provide an electronic boundary between the workstation and the Internet; and a router module configured to find a best path from the firewall module to the Internet website or page associated with the identifier.
8. The system of Claim 7, wherein the filter system comprises:

a management module configured to provide an interface for a system administrator to select the one or more rules that are applied to the one or more categories associated with the identifier;

an uncategorized database configured to store the identifier if the identifier is not in the master database; and a manager module configured to send the stored identifier to the database factory and to receive the one or more categories from the database factory.
9. The system of Claim 8, wherein the uncategorized database includes a request frequency that is associated with the identifier and indicates the frequency of requests for the identifier in the uncategorized database.
10. The system of Claim 9, wherein the manager module is configured to send the request frequency from the uncategorized database to the database factory.
11. The system of Claim 10, wherein the master database includes a request frequency that is associated with the identifier and indicates the frequency of requests for the identifier in the master database.
12. The system of Claim 11, wherein the manager module is configured to send the request frequency from the master database to the database factory.
13. The system of Claim 8, wherein the one or more rules include blocking access to the Internet website or page based on the one or more categories associated with the identifier and the user.
14. The system of Claim 8, wherein the one or more rules include allowing access to the Internet website or page based on the one or more categories associated with the identifier and the user.
15. The system of Claim 1, wherein the database factory comprises:

a module configured to receive the identifier from the filter system and provide the one or more categories to the filter system;

an identifier processing module configured to receive the identifier from the module and determine whether the identifier has been previously categorized by the database factory;

a categorization system module configured to categorize the identifier if not previously categorized by the database factory; and a database of categorized identifiers configured to store the identifier and the one or more categories.
16. The system of Claim 15, wherein the module is configured to receive a request frequency from the filter system to prioritize the identifier.
17. The system of Claim 16, wherein the request frequency is associated with the identifier and indicates the frequency of requests for the identifier in the uncategorized database.
18. The system of Claim 16, wherein the request frequency is associated with the identifier and indicates the frequency of requests for the identifier in the master database.
19. The system of Claim 15, wherein the identifier is a uniform resource locator (URL).
20. The system of Claim 15, wherein the identifier is an Internet Protocol (I.P.) address.
21. The system of Claim 15, wherein the identifier is a domain name.
22. The system of Claim 15, further comprising:

a second filter system; and a second Internet gateway system coupled to the second filter system and the database factory.
23. The system of Claim 22, wherein the identifier processing module is further configured to merge and sort the identifier and a second identifier received from the second Internet gateway system.
24. A method for adapting a filter system which controls access to Internet sites, the method comprising:

receiving a request from a user in the form of an identifier to access a website or page;

determining whether the identifier is in a master database of categorized identifiers and one or more categories associated with the identifier;

if the identifier is not in the master database, determining whether the identifier is in an uncategorized database, else applying one or more rules to the one or more categories associated with the identifier;

if the identifier is not in the uncategorized database, posting the identifier to the uncategorized database, else updating an uncategorized database request frequency in the uncategorized database that is associated with the identifier;

uploading the uncategorized database to a database factory;
determining whether each identifier has been previously categorized by the database factory;

for each identifier that was not previously categorized, categorizing each identifier or website or page associated with the identifier to select one or more categories to associate with each identifier; and posting each identifier along with its selected one or more categories into a database of categorized sites; and downloading the database of categorized sites to the filter system for incorporation into the master database.
25. The method of Claim 24, further comprising:

updating a master database request frequency in the master database if the identifier is in the master database; and uploading the master database request frequency and the associated identifier to the database factory.
26. The method of Claim 24, wherein the one or more rules include blocking access to the website or page based on the one or more categories associated with the identifier and the user.
27. The method of Claim 24, wherein the one or more rules include allowing access to the website or page based on the one or more categories associated with the identifier and the user.
28. The method of Claim 24, wherein the uncategorized database further includes additional data associated with the identifier.
29. The method of Claim 28, wherein the additional data includes a request frequency.
30. The method of Claim 28, wherein the additional data includes an indicator.
31. The method of Claim 28, wherein the additional data includes a trace ID.
32. The method of Claim 28, wherein the additional data includes a primary language used by the filter system.
33. The method of Claim 28, further comprising merging and sorting the uncategorized database based on each identifier and the additional data associated with each identifier.
34. The method of Claim 28, further comprising:

pre-filtering the identifier or website or page associated with the identifier for data characteristics that are indicative of the one or more categories; and associating one or more indicators with the identifier.
35. The method of Claim 34, wherein the pre-filtering is performed on text strings, graphics, and audio that are associated with the identifier and or website or page associated with the identifier.
36. The method of Claim 34, wherein the one or more indicators can include a category flag.
37. The method of Claim 36, further comprising screening the identifier using the one or more indicators prior to sending the identifier to the database factory.
38. The method of Claim 37, wherein the identifier is a uniform resource locator (URL).
39. The method of Claim 37, wherein the identifier is an Internet Protocol (I.P.) address.
40. The method of Claim 37, wherein the identifier is a domain name.
41. A method for collecting collection data for updating a filtering system which controls access to Internet sites, the method comprising:

receiving a request from a user in the form of an identifier to access a website or page;

determining whether the identifier is stored in a master database of categorized identifiers;

if the identifier is stored, recalling a category that is associated with the identifier and applying a rule to the identifier that is associated with the category;

if the identifier is not stored, determining whether the identifier is stored in an uncategorized database; and if the identifier is not stored in the uncategorized database, posting the identifier to the uncategorized database, else updating an uncategorized database request frequency associated with the identifier.
42. The method of Claim 41, further comprising:

updating a master database request frequency in the master database if the identifier is stored in the master database.
43. The method of Claim 41, further comprising:

pre-filtering the identifier or website or page associated with the identifier for data characteristics that are indicative of one or more categories;

determining whether data characteristics were found during the pre-filtering;
and if data characteristics were found, associating one or more indicators with the identifier in the uncategorized database.
44. The method of Claim 43, wherein the rule blocks access to the website or page based on the category associated with the identifier and the user.
45. The method of Claim 43, wherein the rule allows access to the website or page based on the category associated with the identifier and the user.
46. The method of Claim 43, wherein the identifier is a uniform resource locator (URL).
47. The method of Claim 43, wherein the identifier is an Internet Protocol (I.P.) address.
48. The method of Claim 43, wherein the identifier is a domain name.
49. The method of Claim 43, wherein the uncategorized database further includes additional data associated with the identifier.
50. The method of Claim 49, wherein the additional data includes a trace ID.
51. The method of Claim 49, wherein the additional data includes a primary language used by the filter system.
52. The method of Claim 49, wherein the additional data includes the uncategorized database request frequency.
53. The method of Claim 43, wherein the master database further includes additional data associated with the identifier.
54. The method of Claim 53, wherein the master database further includes the master database request frequency.
55. A system for collecting identifiers for updating a filtering system which controls access to a wide area network (WAN) of websites or pages, comprising:

a master database including one or more identifiers received from a user to request access to an Internet website or page, and one or more categories associated with each of the one or more identifiers;

an access system coupled to the WAN and configured to send an identifier request if the identifier request is not in the master database;
and a database factory configured to receive the identifier request, select one or more categories to associate with the identifier request if the one or more categories were not previously associated with the identifier, and provide the selected one or more categories to the master database.
56. The system of Claim 55, wherein the access system comprises an Internet gateway system coupled to a filter system.
57. The system of Claim 56, wherein the identifier is a uniform resource locator (URL).
58. The system of Claim 56, wherein the identifier is an Internet Protocol (I.P.) address.
59. The system of Claim 56, wherein the identifier is a domain name.
60. The system of Claim 56, wherein the master database includes a request frequency that is associated with the identifier and indicative of the frequency of requests for the identifier at the filter system.
61. The system of Claim 60, wherein the database factory is configured to receive the request frequency to prioritize the received identifiers.
CA2413057A 2001-12-07 2002-11-27 System and method for adapting an internet filter Expired - Fee Related CA2413057C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/017,750 US7194464B2 (en) 2001-12-07 2001-12-07 System and method for adapting an internet filter
US10/017,750 2001-12-07

Publications (2)

Publication Number Publication Date
CA2413057A1 CA2413057A1 (en) 2003-06-07
CA2413057C true CA2413057C (en) 2010-11-16

Family

ID=21784328

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2413057A Expired - Fee Related CA2413057C (en) 2001-12-07 2002-11-27 System and method for adapting an internet filter

Country Status (4)

Country Link
US (4) US7194464B2 (en)
EP (1) EP1318468A3 (en)
JP (1) JP2003233623A (en)
CA (1) CA2413057C (en)

Families Citing this family (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6606659B1 (en) 2000-01-28 2003-08-12 Websense, Inc. System and method for controlling access to internet sites
KR100354207B1 (en) * 2000-05-22 2002-09-27 (주)인터정보 Method and apparatus for protecting contents of porno on internet
US7174453B2 (en) 2000-12-29 2007-02-06 America Online, Inc. Message screening system
US7194464B2 (en) 2001-12-07 2007-03-20 Websense, Inc. System and method for adapting an internet filter
US20030163731A1 (en) * 2002-02-28 2003-08-28 David Wigley Method, system and software product for restricting access to network accessible digital information
AU2003229773A1 (en) * 2002-05-06 2003-11-17 Software Engineering Gmbh Comparison of processing protocols
US7640336B1 (en) * 2002-12-30 2009-12-29 Aol Llc Supervising user interaction with online services
US7529754B2 (en) 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
US7185015B2 (en) 2003-03-14 2007-02-27 Websense, Inc. System and method of monitoring and controlling application files
US7680886B1 (en) * 2003-04-09 2010-03-16 Symantec Corporation Suppressing spam using a machine learning based spam filter
US8290948B2 (en) * 2003-06-30 2012-10-16 Hoshiko, Llc Method and apparatus for content filtering
US7421498B2 (en) * 2003-08-25 2008-09-02 Microsoft Corporation Method and system for URL based filtering of electronic communications and web pages
US7444403B1 (en) 2003-11-25 2008-10-28 Microsoft Corporation Detecting sexually predatory content in an electronic communication
GB2416879B (en) 2004-08-07 2007-04-04 Surfcontrol Plc Device resource access filtering system and method
US20060069746A1 (en) * 2004-09-08 2006-03-30 Davis Franklin A System and method for smart persistent cache
GB2418037B (en) * 2004-09-09 2007-02-28 Surfcontrol Plc System, method and apparatus for use in monitoring or controlling internet access
GB2418108B (en) * 2004-09-09 2007-06-27 Surfcontrol Plc System, method and apparatus for use in monitoring or controlling internet access
GB2418999A (en) * 2004-09-09 2006-04-12 Surfcontrol Plc Categorizing uniform resource locators
US20060064469A1 (en) * 2004-09-23 2006-03-23 Cisco Technology, Inc. System and method for URL filtering in a firewall
US7818809B1 (en) * 2004-10-05 2010-10-19 Symantec Corporation Confidential data protection through usage scoping
US8499337B1 (en) 2004-10-06 2013-07-30 Mcafee, Inc. Systems and methods for delegation and notification of administration of internet access
US7529760B2 (en) * 2004-12-08 2009-05-05 International Business Machines Corporation Use of positive and negative filtering with flexible comparison operations
US8005913B1 (en) 2005-01-20 2011-08-23 Network Protection Sciences, LLC Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications
GB0512744D0 (en) * 2005-06-22 2005-07-27 Blackspider Technologies Method and system for filtering electronic messages
US20070005652A1 (en) * 2005-07-02 2007-01-04 Electronics And Telecommunications Research Institute Apparatus and method for gathering of objectional web sites
US20070061459A1 (en) * 2005-09-12 2007-03-15 Microsoft Corporation Internet content filtering
US7725737B2 (en) * 2005-10-14 2010-05-25 Check Point Software Technologies, Inc. System and methodology providing secure workspace environment
FR2893731B1 (en) * 2005-11-24 2008-01-11 Bertrand Issard METHOD AND SYSTEM FOR CONTROLLING ACCESS TO MULTIMEDIA CONTENT AND FILTERING SOLICITATION MESSAGES
US8533199B2 (en) 2005-12-14 2013-09-10 Unifi Scientific Advances, Inc Intelligent bookmarks and information management system based on the same
US8453243B2 (en) 2005-12-28 2013-05-28 Websense, Inc. Real time lockdown
US8615800B2 (en) 2006-07-10 2013-12-24 Websense, Inc. System and method for analyzing web content
US8020206B2 (en) 2006-07-10 2011-09-13 Websense, Inc. System and method of analyzing web content
GB2441350A (en) * 2006-08-31 2008-03-05 Purepages Group Ltd Filtering access to internet content
US20080065746A1 (en) * 2006-09-07 2008-03-13 Ace*Comm Corporation Consumer configurable mobile communication web filtering solution
US9654495B2 (en) 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
GB2458094A (en) * 2007-01-09 2009-09-09 Surfcontrol On Demand Ltd URL interception and categorization in firewalls
GB2445764A (en) 2007-01-22 2008-07-23 Surfcontrol Plc Resource access filtering system and database structure for use therewith
EP2127311B1 (en) 2007-02-02 2013-10-09 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US8015174B2 (en) 2007-02-28 2011-09-06 Websense, Inc. System and method of controlling access to the internet
US8626930B2 (en) * 2007-03-15 2014-01-07 Apple Inc. Multimedia content filtering
GB0709527D0 (en) 2007-05-18 2007-06-27 Surfcontrol Plc Electronic messaging system, message processing apparatus and message processing method
US7792846B1 (en) 2007-07-27 2010-09-07 Sonicwall, Inc. Training procedure for N-gram-based statistical content classification
US8560692B1 (en) 2007-09-05 2013-10-15 Trend Micro Incorporated User-specific cache for URL filtering
US8838741B1 (en) 2007-09-05 2014-09-16 Trend Micro Incorporated Pre-emptive URL filtering technique
US8024267B2 (en) * 2007-09-14 2011-09-20 Ebay Inc. Centralized transaction record storage
US8086678B2 (en) 2007-09-24 2011-12-27 Zipit Wireless, Inc. Device centric controls for a device controlled through a web portal
US9130986B2 (en) 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US9015842B2 (en) * 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US8370948B2 (en) * 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US8407784B2 (en) 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US9237166B2 (en) * 2008-05-13 2016-01-12 Rpx Corporation Internet search engine preventing virus exchange
US8296255B1 (en) * 2008-06-19 2012-10-23 Symantec Corporation Method and apparatus for automatically classifying an unknown site to improve internet browsing control
EP2318955A1 (en) 2008-06-30 2011-05-11 Websense, Inc. System and method for dynamic and real-time categorization of webpages
WO2010011180A1 (en) 2008-07-25 2010-01-28 Resolvo Systems Pte Ltd Method and system for securing against leakage of source code
CA2743144C (en) * 2008-11-12 2016-04-05 Level 3 Communications, Llc Dynamic processing of streamed content
US9130972B2 (en) * 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
CA3099355C (en) * 2009-07-07 2022-08-23 Netsweeper (Barbados) Inc. System and method for providing customized response messages based on requested website
GB2488274A (en) * 2009-12-11 2012-08-22 Neuralitic Systems A method and system for efficient and exhaustive url categorization
US8671175B2 (en) * 2011-01-05 2014-03-11 International Business Machines Corporation Managing security features of a browser
US8955128B1 (en) 2011-07-27 2015-02-10 Francesco Trama Systems and methods for selectively regulating network traffic
US9043434B1 (en) 2011-09-12 2015-05-26 Polyvore, Inc. Alternate page determination for a requested target page
US9397978B1 (en) 2012-12-21 2016-07-19 Western Digital Technologies, Inc. Cloud to local router security
US9117054B2 (en) 2012-12-21 2015-08-25 Websense, Inc. Method and aparatus for presence based resource management
US9118603B2 (en) 2013-03-08 2015-08-25 Edward Blake MILLER System and method for managing attempted access of objectionable content and/or tampering with a content filtering device
US9832196B2 (en) * 2014-09-15 2017-11-28 Bank Of America Corporation Network monitoring device
US10079876B1 (en) 2014-09-30 2018-09-18 Palo Alto Networks, Inc. Mobile URL categorization
CN104683496B (en) * 2015-02-13 2018-06-19 小米通讯技术有限公司 address filtering method and device
US10523711B2 (en) 2016-06-15 2019-12-31 Tracfone Wireless, Inc. Network filtering service system and process
US11748433B2 (en) 2019-08-16 2023-09-05 Palo Alto Networks, Inc. Communicating URL categorization information
US11580163B2 (en) 2019-08-16 2023-02-14 Palo Alto Networks, Inc. Key-value storage for URL categorization

Family Cites Families (200)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4423414A (en) 1981-08-27 1983-12-27 Burroughs Corporation System and method for name-lookup in a local area network data communication system
JPS6170654A (en) 1984-09-14 1986-04-11 Hitachi Ltd Resource control system of decentralized processing system
US4734036A (en) 1984-11-30 1988-03-29 Helene Kasha Method and device for learning a language
JPH04127370A (en) 1990-09-19 1992-04-28 Toshiba Corp Information collecting system
WO1992019054A1 (en) 1991-04-12 1992-10-29 Concord Communications, Inc. Network monitoring
US5408642A (en) 1991-05-24 1995-04-18 Symantec Corporation Method for recovery of a computer program infected by a computer virus
JPH04372037A (en) 1991-06-21 1992-12-25 Matsushita Electric Ind Co Ltd System management information setting device
US5555376A (en) 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
US5493692A (en) 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US5606668A (en) 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US6769009B1 (en) 1994-05-31 2004-07-27 Richard R. Reisman Method and system for selecting a personalized set of information channels
US5682325A (en) 1994-09-12 1997-10-28 Bell Atlantic Network Services, Inc. Level 1 gateway for video tone networks
US5864683A (en) 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5541911A (en) 1994-10-12 1996-07-30 3Com Corporation Remote smart filtering communication management system
US5758257A (en) 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5832503A (en) 1995-02-24 1998-11-03 Cabletron Systems, Inc. Method and apparatus for configuration management in communications networks
US5696486A (en) 1995-03-29 1997-12-09 Cabletron Systems, Inc. Method and apparatus for policy-based alarm notification in a distributed network management environment
US5699513A (en) 1995-03-31 1997-12-16 Motorola, Inc. Method for secure network access via message intercept
WO1996035994A1 (en) 1995-05-08 1996-11-14 Compuserve Incorporated Rules based electronic message management system
CA2176775C (en) 1995-06-06 1999-08-03 Brenda Sue Baker System and method for database access administration
US5678041A (en) 1995-06-06 1997-10-14 At&T System and method for restricting user access rights on the internet based on rating information stored in a relational database
US5696898A (en) 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
EP0830774B1 (en) 1995-06-07 2004-10-06 divine technology ventures Internet server access control and monitoring systems
US5774668A (en) 1995-06-07 1998-06-30 Microsoft Corporation System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
US6456306B1 (en) 1995-06-08 2002-09-24 Nortel Networks Limited Method and apparatus for displaying health status of network devices
US6807558B1 (en) 1995-06-12 2004-10-19 Pointcast, Inc. Utilization of information “push” technology
US5706507A (en) 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5941947A (en) 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
CA2236320A1 (en) 1995-11-02 1997-05-09 Andrew Timothy Hunter Service creation apparatus for a communications network
WO1997024665A1 (en) 1995-12-28 1997-07-10 Eyal Dotan Method for protecting executable software programs against infection by software viruses
US5787427A (en) 1996-01-03 1998-07-28 International Business Machines Corporation Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies
US5768519A (en) 1996-01-18 1998-06-16 Microsoft Corporation Method and apparatus for merging user accounts from a source security domain into a target security domain
US5855020A (en) 1996-02-21 1998-12-29 Infoseek Corporation Web scan process
US5832212A (en) 1996-04-19 1998-11-03 International Business Machines Corporation Censoring browser method and apparatus for internet viewing
US5787253A (en) 1996-05-28 1998-07-28 The Ag Group Apparatus and method of analyzing internet activity
US5920859A (en) 1997-02-05 1999-07-06 Idd Enterprises, L.P. Hypertext document retrieval system and method
US5850523A (en) 1996-06-21 1998-12-15 National Instruments Corporation Method and system for monitoring fieldbus network with multiple packet filters
US5991807A (en) 1996-06-24 1999-11-23 Nortel Networks Corporation System for controlling users access to a distributive network in accordance with constraints present in common access distributive network interface separate from a server
US5835722A (en) 1996-06-27 1998-11-10 Logon Data Corporation System to control content and prohibit certain interactive attempts by a person using a personal computer
US5799002A (en) 1996-07-02 1998-08-25 Microsoft Corporation Adaptive bandwidth throttling for network services
US6052723A (en) 1996-07-25 2000-04-18 Stockmaster.Com, Inc. Method for aggregate control on an electronic network
US5832228A (en) 1996-07-30 1998-11-03 Itt Industries, Inc. System and method for providing multi-level security in computer devices utilized with non-secure networks
EP0822502A1 (en) 1996-07-31 1998-02-04 BRITISH TELECOMMUNICATIONS public limited company Data access system
US5828833A (en) 1996-08-15 1998-10-27 Electronic Data Systems Corporation Method and system for allowing remote procedure calls through a network firewall
US5983279A (en) * 1996-08-30 1999-11-09 Apple Computer, Inc. Buffer management mechanism for distributed multimedia applications
US6253188B1 (en) 1996-09-20 2001-06-26 Thomson Newspapers, Inc. Automated interactive classified ad system for the internet
US5933827A (en) 1996-09-25 1999-08-03 International Business Machines Corporation System for identifying new web pages of interest to a user
US5911043A (en) 1996-10-01 1999-06-08 Baker & Botts, L.L.P. System and method for computer-based rating of information retrieved from a computer network
US5884325A (en) 1996-10-09 1999-03-16 Oracle Corporation System for synchronizing shared data between computers
US5958015A (en) 1996-10-29 1999-09-28 Abirnet Ltd. Network session wall passively listening to communication session, with use of access rules, stops further communication between network devices by emulating messages to the devices
US5801747A (en) 1996-11-15 1998-09-01 Hyundai Electronics America Method and apparatus for creating a television viewer profile
US5848412A (en) 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US6078914A (en) 1996-12-09 2000-06-20 Open Text Corporation Natural language meta-search system and method
US5848233A (en) 1996-12-09 1998-12-08 Sun Microsystems, Inc. Method and apparatus for dynamic packet filter assignment
US6065059A (en) 1996-12-10 2000-05-16 International Business Machines Corporation Filtered utilization of internet data transfers to reduce delay and increase user control
US5896502A (en) 1996-12-10 1999-04-20 International Business Machines Corporation Internet data transfer control via a client system to reduce delay
US5889958A (en) 1996-12-20 1999-03-30 Livingston Enterprises, Inc. Network access control system and process
US5892905A (en) 1996-12-23 1999-04-06 International Business Machines Corporation Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide web
IT1288019B1 (en) 1996-12-23 1998-09-10 Holmac Sas CUTTING EQUIPMENT PARTICULARLY FOR CUTTING COTS AND PLANT REMOVAL
US5987611A (en) 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6052730A (en) 1997-01-10 2000-04-18 The Board Of Trustees Of The Leland Stanford Junior University Method for monitoring and/or modifying web browsing sessions
US6173364B1 (en) 1997-01-15 2001-01-09 At&T Corp. Session cache and rule caching method for a dynamic filter
US6233686B1 (en) 1997-01-17 2001-05-15 At & T Corp. System and method for providing peer level access control on a network
EP1486891A3 (en) 1997-02-12 2005-03-09 Kokusai Denshin Denwa Co., Ltd Document retrieval apparatus
AUPO525497A0 (en) 1997-02-21 1997-03-20 Mills, Dudley John Network-based classified information systems
JP3466039B2 (en) 1997-02-26 2003-11-10 株式会社東芝 Communication device and communication method
US6076051A (en) 1997-03-07 2000-06-13 Microsoft Corporation Information retrieval utilizing semantic representation of text
US6105027A (en) 1997-03-10 2000-08-15 Internet Dynamics, Inc. Techniques for eliminating redundant access checking by access filters
US6178505B1 (en) 1997-03-10 2001-01-23 Internet Dynamics, Inc. Secure delivery of information in a network
US5983270A (en) 1997-03-11 1999-11-09 Sequel Technology Corporation Method and apparatus for managing internetwork and intranetwork activity
US5987606A (en) 1997-03-19 1999-11-16 Bascom Global Internet Services, Inc. Method and system for content filtering information retrieved from an internet computer network
US6539430B1 (en) * 1997-03-25 2003-03-25 Symantec Corporation System and method for filtering data received by a computer system
US5996011A (en) 1997-03-25 1999-11-30 Unified Research Laboratories, Inc. System and method for filtering data received by a computer system
US5974549A (en) 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US5937404A (en) 1997-04-23 1999-08-10 Appaloosa Interactive Corporation Apparatus for bleaching a de-activated link in a web page of any distinguishing color or feature representing an active link
US5961591A (en) 1997-05-13 1999-10-05 Microsoft Corporation Downloading data while rejection of its use may be overridden
US5899995A (en) 1997-06-30 1999-05-04 Intel Corporation Method and apparatus for automatically organizing information
US5893086A (en) 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US5956734A (en) 1997-07-11 1999-09-21 International Business Machines Corporation Parallel file system with a quota check utility
US7117358B2 (en) 1997-07-24 2006-10-03 Tumbleweed Communications Corp. Method and system for filtering communication
US6356864B1 (en) 1997-07-25 2002-03-12 University Technology Corporation Methods for analysis and evaluation of the semantic content of a writing based on vector length
US5999929A (en) 1997-09-29 1999-12-07 Continuum Software, Inc World wide web link referral system and method for generating and providing related links for links identified in web pages
US5978807A (en) 1997-09-30 1999-11-02 Sony Corporation Apparatus for and method of automatically downloading and storing internet web pages
US6266664B1 (en) 1997-10-01 2001-07-24 Rulespace, Inc. Method for scanning, analyzing and rating digital information content
US5987457A (en) 1997-11-25 1999-11-16 Acceleration Software International Corporation Query refinement method for searching documents
JPH11219363A (en) 1998-01-30 1999-08-10 Toshiba Corp Retrieval supporting system for data base
US6073135A (en) 1998-03-10 2000-06-06 Alta Vista Company Connectivity server for locating linkage information between Web pages
US6055564A (en) 1998-03-11 2000-04-25 Hewlett Packard Company Admission control where priority indicator is used to discriminate between messages
US6233618B1 (en) 1998-03-31 2001-05-15 Content Advisor, Inc. Access control of networked data
US6065055A (en) * 1998-04-20 2000-05-16 Hughes; Patrick Alan Inappropriate site management software
US6219667B1 (en) 1998-05-28 2001-04-17 International Business Machines Corporation Efficient large-scale access control for internet/intranet information systems
JP3665480B2 (en) 1998-06-24 2005-06-29 富士通株式会社 Document organizing apparatus and method
US6742003B2 (en) 2001-04-30 2004-05-25 Microsoft Corporation Apparatus and accompanying methods for visualizing clusters of data and hierarchical cluster classifications
US6377577B1 (en) 1998-06-30 2002-04-23 Cisco Technology, Inc. Access control list processing in hardware
US6446061B1 (en) * 1998-07-31 2002-09-03 International Business Machines Corporation Taxonomy generation for document collections
US6266668B1 (en) 1998-08-04 2001-07-24 Dryken Technologies, Inc. System and method for dynamic data-mining and on-line communication of customized information
US6907425B1 (en) 1998-10-01 2005-06-14 At&T Corp. System and method for searching information stored on a network
US6567800B1 (en) 1998-10-01 2003-05-20 At&T Corp. System and method for searching information stored on a network
US7603685B2 (en) 1998-11-03 2009-10-13 United Video Properties, Inc. Program guide system with combination category search
US7194554B1 (en) 1998-12-08 2007-03-20 Nomadix, Inc. Systems and methods for providing dynamic network authorization authentication and accounting
US6564327B1 (en) 1998-12-23 2003-05-13 Worldcom, Inc. Method of and system for controlling internet access
US6295529B1 (en) 1998-12-24 2001-09-25 Microsoft Corporation Method and apparatus for indentifying clauses having predetermined characteristics indicative of usefulness in determining relationships between different texts
US6654787B1 (en) 1998-12-31 2003-11-25 Brightmail, Incorporated Method and apparatus for filtering e-mail
US6654735B1 (en) 1999-01-08 2003-11-25 International Business Machines Corporation Outbound information analysis for generating user interest profiles and improving user productivity
US6418433B1 (en) 1999-01-28 2002-07-09 International Business Machines Corporation System and method for focussed web crawling
JP3220104B2 (en) 1999-02-16 2001-10-22 ケイディーディーアイ株式会社 Automatic information filtering method and apparatus using URL hierarchical structure
US6286001B1 (en) 1999-02-24 2001-09-04 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network
US6366298B1 (en) 1999-06-03 2002-04-02 Netzero, Inc. Monitoring of individual internet usage
US6904609B1 (en) 1999-03-18 2005-06-07 Microsoft Corporation Systems and methods for electronic program guide data services
US20010044800A1 (en) 2000-02-22 2001-11-22 Sherwin Han Internet organizer
US6486892B1 (en) 1999-04-07 2002-11-26 Joseph L. Stern System and method for accessing, manipulating and viewing internet and non-internet related information and for controlling networked devices
US6175830B1 (en) 1999-05-20 2001-01-16 Evresearch, Ltd. Information management, retrieval and display system and associated method
US6519571B1 (en) 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US6493744B1 (en) 1999-08-16 2002-12-10 International Business Machines Corporation Automatic rating and filtering of data files for objectionable content
US6295559B1 (en) 1999-08-26 2001-09-25 International Business Machines Corporation Rating hypermedia for objectionable content
US6862713B1 (en) 1999-08-31 2005-03-01 International Business Machines Corporation Interactive process for recognition and evaluation of a partial search query and display of interactive results
US6675169B1 (en) 1999-09-07 2004-01-06 Microsoft Corporation Method and system for attaching information to words of a trie
US6839680B1 (en) 1999-09-30 2005-01-04 Fujitsu Limited Internet profiling
US6792458B1 (en) 1999-10-04 2004-09-14 Urchin Software Corporation System and method for monitoring and analyzing internet traffic
US6516337B1 (en) 1999-10-14 2003-02-04 Arcessa, Inc. Sending to a central indexing site meta data or signatures from objects on a computer network
US6434662B1 (en) 1999-11-02 2002-08-13 Juniper Networks, Inc. System and method for searching an associative memory utilizing first and second hash functions
WO2001033371A1 (en) * 1999-11-05 2001-05-10 Surfmonkey.Com, Inc. System and method of filtering adult content on the internet
US6954783B1 (en) 1999-11-12 2005-10-11 Bmc Software, Inc. System and method of mediating a web page
JP4279427B2 (en) 1999-11-22 2009-06-17 富士通株式会社 Communication support method and system
US20020069368A1 (en) 1999-12-07 2002-06-06 Keith Hines Data farming of network access
US6832230B1 (en) * 1999-12-22 2004-12-14 Nokia Corporation Apparatus and associated method for downloading an application with a variable lifetime to a mobile terminal
US6574660B1 (en) 1999-12-28 2003-06-03 Intel Corporation Intelligent content delivery system based on user actions with client application data
CA2397757C (en) * 2000-01-28 2009-09-08 Websense, Inc. System and method for controlling access to internet sites
WO2001055905A1 (en) 2000-01-28 2001-08-02 Websense, Inc. Automated categorization of internet data
US6606659B1 (en) * 2000-01-28 2003-08-12 Websense, Inc. System and method for controlling access to internet sites
US20010044818A1 (en) * 2000-02-21 2001-11-22 Yufeng Liang System and method for identifying and blocking pornogarphic and other web content on the internet
AU2001250017A1 (en) 2000-03-03 2001-09-17 Dun And Bradstreet, Inc. Facilitating a transaction in electronic commerce
GB0006721D0 (en) 2000-03-20 2000-05-10 Mitchell Thomas A Assessment methods and systems
US20010032258A1 (en) 2000-03-31 2001-10-18 Kabushiki Kaisha Free Bit.Com System for internet connections, system for providing internet user information, method for providing internet user preference information, and method for distributing digital contents using the internet
US7418440B2 (en) 2000-04-13 2008-08-26 Ql2 Software, Inc. Method and system for extraction and organizing selected data from sources on a network
US6772214B1 (en) * 2000-04-27 2004-08-03 Novell, Inc. System and method for filtering of web-based content stored on a proxy cache server
US20030158923A1 (en) * 2000-05-04 2003-08-21 Reed Burkhart System and method for automated negotiation for and allocation of a broadcast satellite, communication and caching system resource
US20040073617A1 (en) 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US6981281B1 (en) 2000-06-21 2005-12-27 Microsoft Corporation Filtering a permission set using permission requests associated with a code assembly
US7350204B2 (en) 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US6778986B1 (en) 2000-07-31 2004-08-17 Eliyon Technologies Corporation Computer method and apparatus for determining site type of a web site
US6785732B1 (en) 2000-09-11 2004-08-31 International Business Machines Corporation Web server apparatus and method for virus checking
US6886099B1 (en) 2000-09-12 2005-04-26 Networks Associates Technology, Inc. Computer virus detection
US6701317B1 (en) 2000-09-19 2004-03-02 Overture Services, Inc. Web page connectivity server construction
US6571249B1 (en) 2000-09-27 2003-05-27 Siemens Aktiengesellschaft Management of query result complexity in hierarchical query result data structure using balanced space cubes
US20020073089A1 (en) * 2000-09-29 2002-06-13 Andrew Schwartz Method and system for creating and managing relational data over the internet
JP2002175010A (en) * 2000-09-29 2002-06-21 Shinu Ko Home page falsification preventing system
US6650890B1 (en) 2000-09-29 2003-11-18 Postini, Inc. Value-added electronic messaging services and transparent implementation thereof using intermediate server
AU2002211349A1 (en) 2000-10-03 2002-04-15 Sun Microsystems, Inc. Http transaction monitor with capacity to replay in debugging session
CA2323883C (en) * 2000-10-19 2016-02-16 Patrick Ryan Morin Method and device for classifying internet objects and objects stored oncomputer-readable media
US20030177187A1 (en) 2000-11-27 2003-09-18 Butterfly.Net. Inc. Computing grid for massively multi-player online games and other multi-user immersive persistent-state and session-based applications
US7209893B2 (en) 2000-11-30 2007-04-24 Nokia Corporation Method of and a system for distributing electronic content
WO2002050703A1 (en) 2000-12-15 2002-06-27 The Johns Hopkins University Dynamic-content web crawling through traffic monitoring
US6928051B2 (en) 2000-12-18 2005-08-09 Intel Corporation Application based bandwidth limiting proxies
US20030028564A1 (en) 2000-12-19 2003-02-06 Lingomotors, Inc. Natural language method and system for matching and ranking documents in terms of semantic relatedness
JP4329264B2 (en) 2000-12-27 2009-09-09 セイコーエプソン株式会社 Access authority level control apparatus and method
US6782388B2 (en) * 2000-12-29 2004-08-24 Bellsouth Intellectual Property Corporation Error usage investigation and disposal system
US7213069B2 (en) 2001-02-28 2007-05-01 Microsoft Corporation Category name service able to override the category name based on requestor privilege information
US7681032B2 (en) 2001-03-12 2010-03-16 Portauthority Technologies Inc. System and method for monitoring unauthorized transport of digital content
US7058663B2 (en) * 2001-03-13 2006-06-06 Koninklijke Philips Electronics, N.V. Automatic data update
US6947935B1 (en) * 2001-04-04 2005-09-20 Microsoft Corporation Training, inference and user interface for guiding the caching of media content on local stores
US20020152284A1 (en) 2001-04-13 2002-10-17 John Cambray System and method for performing real time monitoring and control of an interactive network
US7895445B1 (en) 2001-04-26 2011-02-22 Nokia Corporation Token-based remote data access
US7228565B2 (en) 2001-05-15 2007-06-05 Mcafee, Inc. Event reporting between a reporting computer and a receiving computer
US20030182420A1 (en) 2001-05-21 2003-09-25 Kent Jones Method, system and apparatus for monitoring and controlling internet site content access
US7289980B2 (en) 2001-06-12 2007-10-30 International Business Machines Corporation Method and system for managing preferred web site links
US6741997B1 (en) * 2001-06-14 2004-05-25 Oracle International Corporation Instantiating objects in distributed database systems
US6910049B2 (en) * 2001-06-15 2005-06-21 Sony Corporation System and process of managing media content
MXPA03011976A (en) * 2001-06-22 2005-07-01 Nervana Inc System and method for knowledge retrieval, management, delivery and presentation.
US20030009495A1 (en) 2001-06-29 2003-01-09 Akli Adjaoute Systems and methods for filtering electronic content
US7133409B1 (en) * 2001-07-19 2006-11-07 Richard Willardson Programmable packet filtering in a prioritized chain
US7225430B2 (en) * 2001-07-26 2007-05-29 Landesk Software Limited Software code management method and apparatus
US20060036874A1 (en) 2001-08-08 2006-02-16 Igt Data pattern verification in a gaming machine environment
US20040019656A1 (en) * 2001-10-04 2004-01-29 Smith Jeffrey C. System and method for monitoring global network activity
US7526654B2 (en) * 2001-10-16 2009-04-28 Marc Charbonneau Method and system for detecting a secure state of a computer system
US6947985B2 (en) * 2001-12-05 2005-09-20 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
US7194464B2 (en) 2001-12-07 2007-03-20 Websense, Inc. System and method for adapting an internet filter
US20030110272A1 (en) 2001-12-11 2003-06-12 Du Castel Bertrand System and method for filtering content
US7096500B2 (en) 2001-12-21 2006-08-22 Mcafee, Inc. Predictive malware scanning of internet data
US20030126139A1 (en) * 2001-12-28 2003-07-03 Lee Timothy A. System and method for loading commercial web sites
US20030135611A1 (en) 2002-01-14 2003-07-17 Dean Kemp Self-monitoring service system with improved user administration and user access control
US6792510B1 (en) * 2002-02-14 2004-09-14 Novell, Inc. System and method for updating a cache
WO2003069470A1 (en) * 2002-02-15 2003-08-21 Image Corporation Application creation system, creation apparatus, creation method, application providing system, providing apparatus, providing method, application operation system, operation apparatus, and operation method
US7631318B2 (en) 2002-06-28 2009-12-08 Microsoft Corporation Secure server plug-in architecture for digital rights management systems
JP4038717B2 (en) 2002-09-13 2008-01-30 富士ゼロックス株式会社 Text sentence comparison device
US20040068479A1 (en) * 2002-10-04 2004-04-08 International Business Machines Corporation Exploiting asynchronous access to database operations
US6850943B2 (en) 2002-10-18 2005-02-01 Check Point Software Technologies, Inc. Security system and methodology for providing indirect access control
US7600234B2 (en) * 2002-12-10 2009-10-06 Fisher-Rosemount Systems, Inc. Method for launching applications
US20040153305A1 (en) 2003-02-03 2004-08-05 Enescu Mircea Gabriel Method and system for automated matching of text based electronic messages
US7444515B2 (en) 2003-08-14 2008-10-28 Washington University Method and apparatus for detecting predefined signatures in packet payload using Bloom filters
US20050060140A1 (en) 2003-09-15 2005-03-17 Maddox Paul Christopher Using semantic feature structures for document comparisons
US7756930B2 (en) 2004-05-28 2010-07-13 Ironport Systems, Inc. Techniques for determining the reputation of a message sender
US7971245B2 (en) 2004-06-21 2011-06-28 Ebay Inc. Method and system to detect externally-referenced malicious data for access and/or publication via a computer system
CA2577259A1 (en) 2004-09-09 2006-03-16 Surfcontrol Plc System, method and apparatus for use in monitoring or controlling internet access
WO2006036170A1 (en) 2004-09-15 2006-04-06 Pcsafe, Inc. Methods and systems for filtering urls, webpages, and content
US8010685B2 (en) 2004-11-09 2011-08-30 Cisco Technology, Inc. Method and apparatus for content classification
WO2006062546A2 (en) 2004-12-07 2006-06-15 Ayman, Llc System and method of filtering electronic messages
US7519818B2 (en) 2004-12-09 2009-04-14 Microsoft Corporation Method and system for processing a communication based on trust that the communication is not unwanted as assigned by a sending domain
US7831834B2 (en) 2005-03-14 2010-11-09 Yahoo! Inc Associating a postmark with a message to indicate trust
US8010609B2 (en) 2005-06-20 2011-08-30 Symantec Corporation Method and apparatus for maintaining reputation lists of IP addresses to detect email spam

Also Published As

Publication number Publication date
EP1318468A3 (en) 2006-03-15
US9503423B2 (en) 2016-11-22
JP2003233623A (en) 2003-08-22
EP1318468A2 (en) 2003-06-11
US20140282861A1 (en) 2014-09-18
US8751514B2 (en) 2014-06-10
US20110307513A1 (en) 2011-12-15
US20070179950A1 (en) 2007-08-02
US8010552B2 (en) 2011-08-30
CA2413057A1 (en) 2003-06-07
US7194464B2 (en) 2007-03-20
US20030110168A1 (en) 2003-06-12

Similar Documents

Publication Publication Date Title
CA2413057C (en) System and method for adapting an internet filter
US9692790B2 (en) System and method of monitoring and controlling application files
US9607149B2 (en) System and method of monitoring and controlling application files
US6233618B1 (en) Access control of networked data
EP1706832B1 (en) Improved user interface
US20050120054A1 (en) Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
US20020021665A1 (en) Network usage monitoring device and associated method
JP2001526804A (en) Database access control system and method
US20060015472A1 (en) Filtering cached content based on embedded URLs
US20030163731A1 (en) Method, system and software product for restricting access to network accessible digital information
AU2007202284B2 (en) System and method for adapting an Internet filter
EP1449342A1 (en) Internet access system and method

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20121127