Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protective system

A technology for protecting systems, computers, used in the field of Internet user identification and filtering

Inactive Publication Date: 2007-03-07
SHANGHAI ZHONGCE IND & TRADING +1
View PDF0 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But none of the above identification / distinguishment / control is to identify the identity / age and then control and / or limit and / or classify the Internet access of children / adults / criminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protective system
  • Protective system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0010] Embodiment 1: Referring to FIG. 1, the block diagram of the present invention includes: a computer, a control module 1 inside the computer, an input / output module 2, a display module 3, a communication module 4, an age identification device 5, and a storage module 6.

[0011] The control module 1 is connected with the I / O module 2 , the display module 3 , the communication module 4 , the age identification device 5 and the storage module 6 .

[0012] Age recognition device 5 comprises biometrics (hand shape, palm print, face image, handwriting, facial camera, fingerprint, the position of eye corner, pupil center, pupil radius, the position of eye corner, iris, pulse, DNA, specific protein, smell, Sound, ear shape, retina, hand shape, footprint, infrared thermogram, height, weight, lip pattern, brain pattern, blood pattern, key pressure recognition and other biometric devices, ID card, smart card, smart label, certificate) more than one , other age and / or identity identi...

Embodiment 2

[0022] Embodiment 2: Referring to FIG. 2, the system block diagram of the present invention includes: an age identification device 21, a computer 22, a network 23, and a server 24;

[0023] The age recognition device 21 is connected to a computer 22, and the computer 22 is connected to a server 24 through a network 23;

[0024] Age identification device 21 and / or computer 22 and / or network 23 and / or server 24 install age identification program, data identification program, age code and / or password classification / processing program, comparison database, transmission control program, encryption and decryption program , the remote notifier.

[0025] Age identification device 21 and / or computer 22 and / or network 23 and / or server 24 perform age / gender and / or identity and / or password and / or bad crime and / or credit identification and filter / classify data for users .

[0026] The age identification program identifies and / or compares the data read by the age identification device 21 ...

Embodiment 3

[0033]Embodiment 3: In the computer and / or network and / or server, the age identification program identifies and / or compares the data read by the age identification device 21, and performs age / sex and / or identity and / or password for the user. And / or bad crime and / or credit identification, age code and / or password classification / processing program automatically performs age code and / or password classification / processing on the input data (add age identification code and / or identification code / bad crime / Credit identification code) (such as identification code 10 for ages 3-10, code 20 for ages 11-20, code 30 for ages 20-30, code 40 for ages 30-40; if the identification code for bad crimes is 1-20, it is distinguished according to the crime level; For example, credit identification code grades 1-10 are distinguished according to credit grades), and the content includes URLs, web pages, multimedia (text, sound, music, images) materials and other materials.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to protection system in the user identification and filter technique, wherein, current network user can download each kind of materials with most not suitable for children; and we can adopts biological collection technique to judge age of biology but the current device has not the control, limitation or degree on internet for children.

Description

(1) Technical field: [0001] The invention relates to a protection system and belongs to the technical field of Internet user identification and filtering. (two) background technology: [0002] At present, the use of the Internet is widespread, and everyone, children / adults / criminals can view / download / upload various materials online, but many materials are not suitable for children to read, nor are they suitable for children to download and / or upload (violence, blood, sex, pornography) Text, image, video, short message, email, music, game, virus program and other multimedia data), many criminals can also transmit data arbitrarily, the current relevant patents such as: content filtering for web browsing, similar patents such as: An Internet content filtering system and filtering method, which is used to identify the Internet system of member profile information, but the effect of the above patents is not good. For text, chat, short message, and instant communication, virus pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06K9/00
Inventor 林明耀
Owner SHANGHAI ZHONGCE IND & TRADING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products