Unlock instant, AI-driven research and patent intelligence for your innovation.

Web site filter, method and medium of controlling access to content

A filter and content technology, applied in the field of network management, can solve problems such as inability to complete

Active Publication Date: 2020-10-09
MICROSOFT TECH LICENSING LLC
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If managers wish to prevent employees from accessing news sites during business hours, this cannot be done without a list of such sites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web site filter, method and medium of controlling access to content
  • Web site filter, method and medium of controlling access to content
  • Web site filter, method and medium of controlling access to content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The detailed description provided below in conjunction with the accompanying drawings is intended as a description of the present embodiments and is not intended to represent the only forms in which the present embodiments may be constructed or utilized. The description sets forth the functionality of the example and the sequence of steps used to build and operate the example. However, the same or equivalent functions and sequences can be implemented by different examples.

[0017] In various examples, an improved web site filter is provided that automatically determines whether to allow, block, or recommend blocking content at a given address. This is achieved by using a measure of similarity between addresses of content based on large-scale browsing session co-occurrence data. One or more addresses where the content to block is known from user input or other sources. The similarity of other addresses to the blocked address is calculated using a metric based on the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of controlling access to content, such as web sites, on an intranet or the Internet is described. For example, the method includes receiving an address of content to be accessed, and obtaining a similarity of the address to previously marked addresses of other content items. The similarity is based on the co-occurrence of addresses of content items in records of browsing sessions from many agreeing users. For example, a browsing session record includes addresses of content items accessed by the user during the time period during which the user actively accessed the content. Co-occurrence of content item addresses is the presence of addresses in the same browsing session record. Access to content is then controlled based on similarity.

Description

Background technique [0001] Embodiments of the present disclosure relate generally to network management, and more specifically, to website access control. Background technique [0002] A big problem for controlling access to parts of the World Wide Web is that the number of web addresses is enormous, and the ownership and content of addresses change over time. [0003] Previous approaches for web access control used manually composed whitelists and blacklists, which could be collaboratively maintained by many users. Whitelists and blacklists rely on human manual input for updates and are binary in nature. For example, if the lists are about sites with violent content, they don't contain information about any other types of sites. If managers wish to prevent employees from accessing news sites during business hours, this cannot be done without a list of such sites. This means that administrators, parents, or others trying to control Internet access must tailor their requi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/955G06F21/62H04L29/06
CPCG06F16/955G06F21/6218G06F21/6254G06F2221/2149G06F2221/2137H04L63/102H04L63/101
Inventor P·科利Y·巴克拉克F·拉德林斯基U·帕克特邱利权
Owner MICROSOFT TECH LICENSING LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More