Internet lockout device

ABSTRACT

A lockout system for preventing a person from accessing electronic information through an interface device of a computer having a signal cable operably coupled at one end with a signal port and at the other end with an interface device of a computer, the signal cable configured to pass electronic information back and forth between the interface device and the port and a locking device including a relay having a set of contacts, the set of contacts coupled in-line with the signal cable, the relay when actuated, disabling the signal cable to prevent electronic information from passing between the interface device and the port. A plug lock insertable with the signal cable proximate the other end of the cable may be included for maintaining the other end of the signal cable in operable connection with the interface device to hinder a bypass of the lockout system.

FIELD OF THE INVENTION

This invention relates generally to a system and method for preventingchildren from accessing parentally-restricted electronic informationthrough their computers, and is specifically related to preventingchildren from accessing pornography and other undesirable informationover the Internet, as well as limiting the amount of time a child hasaccess to the Internet.

BACKGROUND OF THE INVENTION

With the widespread access to on-line computer information and services,which continues to grow each year, collectively referred to as theInternet, computer users are able to obtain a wide variety ofinformation, which is delivered directly into their homes. All that isnecessary to access the Internet is a computer with a modem orinterfacing capability, a telephone or digital subscriber line (DSL),and a telephone port or jack.

To meet the demand for Internet information, there has also been aproliferation of Internet services and access software packages whichallow a user to move through or browse the available on-line options.This has made it very easy for users to obtain the information theyneed. Internet users are not only adults, but children as well, andironically, children, as a class, are probably more computer literatethan many adults due to the great amount of exposure to computers thatchildren now receive at an early age. The user-friendly atmosphere ofthe Internet allows children with even minimal computer skills to accessinformation at defined “sites” which are related to a particular topic.

Unfortunately, not all information sites contain material which issuitable for children. Pornographic material, for example, is abundanton the Internet, and children can access and view pornographic picturesmuch the same way that they might view pictures in a pornographicmagazine. While access to magazines and other printed materials islimited to adults, access to Internet pornography is not so limited. Asmay be appreciated, child access to pornography through the Internet isan alarming concern for parents and other adults, such as educators, whodo not want their own children or children in their care exposed topornography.

Additionally, pornographic materials and sites are not the onlyinformational avenues to which parents and other adults would like torestrict their children's access. The Internet also provides access toinformation regarding body piercing, child pornography, violent topics,and other similar information which would be detrimental to the propermental and physical development of a child. Seemingly innocuous chatgroups on the Internet may also expose a child to harmful adult topics.Chat groups are not only mentally dangerous to children but alsophysically dangerous, as evidenced by numerous incidences whereinchildren have been abducted by pedophiles who they have met and talkedwith over the Internet.

Therefore, parents and other adults have a substantial interest inpreventing children from accessing the Internet through their computers.This is becoming ever more difficult, since personal and home computersare very popular and are becoming more widespread, much the same waythat television did in the 1950's and 1960's. Parents' frustrations arefurther exacerbated by the fact that personal computers are usuallyplaced in a home office, bedroom, or other designated room and are notreadily visible to a supervising adult. A child may be accessingparentally-restricted information right under the nose of a parent.

While censorship efforts have been made to prevent certain categories ofmaterials from appearing on or being accessible through the Internet,they have been generally unsuccessful. Despite the possible harm tochildren from these materials, First Amendment arguments and concernshave prevented the removal of the above-discussed material from theInternet. Furthermore, since adults and children share the same accessto such materials, widespread database prevention for children at thesource will inevitably prevent adult access to information whicharguably should be available to them. Therefore, parents and otheradults are left with the task of preventing children from accessingcertain Internet materials.

Furthermore, not only are parents and adults interested in preventingInternet access to potentially damaging and harmful materials, but theyare also interested in preventing any additional Internet access at all.Internet shopping is also a concern, as companies offer numerousproducts for sale over the Internet which require only a credit cardnumber. In the case of some on-line services, they may already have theparent's credit card number and all that a child has to do is make theorder. There are more than a few parents that have been unpleasantlysurprised by credit card bills directly related to their child's accessto the Internet. Finally, a parent may simply be interested inpreventing a child from spending too much time on the computer to thedetriment of their school work or other activities, such as sports. Forexample, with the use of messaging products, children may use theInternet to chat with one another, and a parent may desire to limit suchchatting.

A simple solution to preventing a child's access to the Internet wouldbe to remove the computer and lock it away until a child may besupervised by an adult. Such a solution is not only impractical, but itis also inconvenient. Computers are usually bulky and heavy and are noteasy to move around. Furthermore, the various peripherals such asprinters, monitors, and phone line connections will constantly have tobe disconnected and then reconnected each time the computer is to beused. Still further, removing the computer prevents adult use andnon-Internet use. Computers are very useful tools and are used by adultsand children alike for a number of constructive tasks such asaccounting, document generation, and homework. Locking the computer awayprevents such constructive use. Even when the computer is to beconstructively used, such as by a child for homework, most parents donot want to have to stand behind the child or even stay in the same roomto prevent Internet access altogether or to prevent access toundesirable or adult materials.

One electronic information lockout device that prevents Internet accessthrough a computer is disclosed in U.S. Pat. No. 5,661,786 (the '786patent), held by the inventor of the present invention. Using thisdevice, Internet access may be prevented using a keyed switch. Althoughthe device of the '786 patent performs well, a user must be proximatethe device and use the key to prevent Internet access. Moreover, a usermust keep track of the physical location of the key. For these reasons,improvements related to the ability of preventing Internet accesswithout being proximate a lockout device and requiring a key are incontinuing need.

One electronic information lockout system that prevents Internet accessthrough a computer is disclosed in U.S. Pat. No. 5,938,767 (the '767patent), also held by the inventor of the present invention. Such asystem comprises a controller unit and a locking device including a keyoperated switch. Although the system of the '767 patent performs well,again, due to the key, improvements related to the ability of preventingInternet access without being proximate a lockout device and requiring akey are in continuing need.

Therefore, it is an objective of the present invention to assist parentsand other adults in preventing a child's exposure to harmful andundesirable information available on the Internet.

It is another objective of the invention to provide parents with theability to limit the amount of time a child spends using the Internet.

It is still another objective of the invention to restrict unsupervisedaccess to the Internet to reduce the monetary costs associatedtherewith.

It is another objective to provide to an adult such restrictive measureswithout substantial modification to or removal of a computer to allowconstructive use of a computer by a child.

It is still another objective to provide assistance to adults in arelatively inexpensive and easily understood manner so that restrictivemeasures may be implemented without substantial financial or timeexpenditures by an adult.

It is another objective to restrict a child's access to the Internet ina way which is not easily or readily overcome or bypassed by the child.

It is still another objective to provide a parent the ability torestrict Internet access without knowing how to use a computer.

It is another objective to provide a parent with the ability to restrictInternet access remotely.

SUMMARY OF THE INVENTION

The above objectives and other objectives are met by the lockout systemof the present invention which prevents children from accessingparentally-restricted and undesirable electronic information through aninterface device of a computer, while further allowing a parent to limitthe amount of time a child has access. The lockout system preventsexposure to undesirable information while maintaining the operationalintegrity of the computer so that it may be used for constructivepurposes. The lockout system is easy to use and may be installed withoutmodification to the computer. The lockout system is not easily orreadily bypassed by a child and provides a parent or other adult theability to restrict Internet access without themselves intimatelyknowing how to use a computer.

More specifically, the lockout system of the invention comprises alocking device which is operably coupled in-line with a signal line,such as a telephone or digital subscriber line (DSL). The telephone lineextends between a telephone jack and an interface device in thecomputer, such as a modem. The DSL extends between a telephone or cablejack and a cable/DSL modem external to the computer. The cable/DSL modemis then coupled to an interface device in the computer, such as anEthernet port. The locking device is operable to decouple the modem cardfrom the telephone jack or the computer from the cable/DSL modem. Thelocking device, when actuated, prevents electronic information frompassing between the modem and the jack or the cable/DSL modem and thecomputer. In that way, children cannot gain access to on-lineinformation through the Internet, when the locking device is actuated.Deactuating the locking device will provide the necessary connectionbetween the modem and the telephone jack or the cable/DSL modem and thecomputer so that access to the Internet may be achieved by an adult oran adult-supervised child.

In one embodiment of the invention, the locking device is a keyed switchcoupled to a relay which is mounted in-line with the signal line andwhich may be energized and de-energized using a key. The key is turnedto open the switch and then removed thereby leaving the switch open,de-energizing the relay, and effectively breaking the electricalcoupling between the modem card and telephone jack or the cable/DSLmodem and the computer. Preferably, the keyed switch relay are containedwithin an enclosed case to prevent the child from physically bypassingthe locking device.

In another embodiment of the invention, the locking device includes alock controller coupled and configured to control the relay.

In yet another embodiment of the invention, a reading device may serveas an alternative to a keyed switch, the reading device also coupled tothe lock controller.

In yet another embodiment of the invention, an interactive telephonecomponent coupled to the lock controller allows a user to enable/disableInternet access using a telephone.

In yet another embodiment of the invention, a web based device coupledto the lock controller allows a user to enable/disable Internet accessusing a web-based interface.

In yet other embodiments of the invention, a display or lights indicatewhether an Internet connection is enabled or disabled.

The lockout system of the invention thereby assists parents and otheradults in preventing a child's exposure to harmful and undesirableon-line information and reduces or eliminates the costs that might beassociated therewith. Further, the invention allows a parent to limitthe amount of time a child has access to on-line information. Thelockout system does not affect the stand-alone operational capability ofthe computer and only prevents access to information through a telephoneline or DSL. The lockout system may be installed quickly and easilywithout modification to the computer equipment. Furthermore, the lockoutsystem does not require the adult to be able to operate the computer.The lockout system is not easily or readily overcome or bypassed by thechild without blocking or ruining the modem or alerting an adult that abypass attempt is underway so that it may be stopped.

While the lockout system of the present invention is preferably directedto computer modem use and telephone line access and/or cable/DSL modemand DSL access, it will be readily understood that other interfacedevices and signal capabilities might be utilized as well, and thelockout system is equally applicable to those technologies whereinaccess to on-line services is provided through a computer-basedinterface device. For example, on-line access utilizing ISDN cards,cable cards, asynchronous transfer mode (ATMs), dial-up modems, cablemodems, asymmetric digital subscriber lines (ADSLs), or satellites mightalso be prevented utilizing the present invention. Further, the lockoutsystem of the present invention may be used with technologies such asWebTV, televisions and cable boxes with Internet capabilities, or othercomputer systems capable of providing on-line services.

The objectives and benefits of the present invention will become morereadily apparent from the brief description of the drawings and detaileddescription of the invention given below.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments of the invention and,together with a general description of the invention given above, andthe detailed description of the embodiments given below, serve toexplain the principles of the invention.

FIG. 1 is a perspective view of the lockout system of the inventioncoupled between a computer and a telephone jack;

FIG. 2 is a perspective view of the lockout system of the inventioncoupled between a computer and a cable/digital subscriber line (DSL)modem;

FIG. 3 is a schematic view of an embodiment of a locking device for thelockout system for the invention;

FIG. 4 is a block diagram for a lockout system including a readingdevice and a display;

FIG. 5 is a flowchart illustrating the program flow of a process ofauthenticating and authorizing a user in the lockout system of FIG. 4;

FIG. 6 is a block diagram for a lockout system including a readingdevice, a display, and an interactive telephone component;

FIG. 7 is a flowchart illustrating the program flow of a process ofverifying a user and enabling/disabling Internet access usinginteractive telephone component of the lockout system of FIG. 6;

FIG. 8 is a block diagram for a lockout system including a readingdevice, a display, and a web-based interface; and,

FIG. 9 is a flowchart illustrating the program flow of a process ofverifying a user and enabling/disabling Internet access using aweb-based device of the lockout system of FIG. 8 is illustrated.

DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS

With reference to FIGS. 1 and 2, there is shown one embodiment 10 of alockout system in accordance with principles of the present invention.Lockout system 10 comprises a locking device 12, a telephone cable 14 (aportion 14 a of which may be a coaxial cable, as shown in FIG. 2), and aplug lock 16. As shown in FIG. 1, lockout system 10 may be installedbetween a computer 18 and a signal port, such as telephone jack 20. Asshown in FIG. 2, lockout system 10 may also be installed between acomputer 18 and a cable/digital subscriber line (DSL) modem 22. Ineither installation, when the locking device 12 is actuated, Internetaccess is prevented.

As will be appreciated by those of skill in the art, lockout system 10may also be installed between a cable/DSL modem and a router such thatInternet access by multiple computers coupled to the router may beprevented. In such an installation, a plug lock 16 would be installed onthe cable/DSL modem, rather than on each individual computer, as shownin FIGS. 1 and 2.

Computer 18 may be any suitable computer device, such as a personalcomputer, which utilizes a modem or network card for access to remoteinformation sites, such as the Internet. Generally, such personalcomputers include an outer metal or plastic case 24 which surrounds theelectronics of the computer. The case 24 will generally stand alone (asshown) or will provide a base for mounting other equipment, such as amonitor (not shown). Case 24 may include a plurality of slotted openings26 generally located at a rearward side thereof. Such slotted openings26 generally correspond to card slots which are located inside thecomputer and are configured to receive interface cards, such as a modemcard for providing telephone line communication or a network card forconnecting the computer 18 to communicate with cable/DSL modem 22. Thoseskilled in the art will also appreciate that interface cards, such as amodem or network card, may be incorporated onto the motherboard of acomputer, in which case, slotted openings 26 may or may not be provided.

The lockout system 10 of the present invention will be described hereinfor being used with a modem card, or between a telephone modem in acomputer and a telephone wall jack, as shown in FIG. 1. Likewise, and asshown in FIG. 2, lockout system 10 of the present invention will also bedescribed herein for being used with a network card, or between anEthernet card in a computer and a cable/DSL modem. However, it should beunderstood that the lockout system will be equally applicable for otherinterface cards such as ISDN cards, cable cards, asynchronous transfermode (ATM) cards, dial-up modems, cable modems, asymmetric digitalsubscriber lines (ADSLs), and satellite modems both internal andexternal to a computer to generally prevent unauthorized access toparentally-restricted electronic information. It should be furtherunderstood that the lockout system may be used with technologies such asWebTV, televisions and cable boxes with built-in Internet capabilities,and other computer systems capable of providing on-line services.

The telephone jack 20 is a conventional jack used for telephonecommunication or data transfer in a computer network. Other signal portsmight be utilized depending upon the interface device and thecommunication scheme as appropriate.

The present invention operates by decoupling computer 18 from thetelephone jack 20 using locking device 12 and effectively preventingbypassing of the locking device 12 by a child.

More specifically, plug lock 16, described in U.S. Pat. No. 5,556,295 toMcFadden et al. and entitled “Modular Plug Locking System,” thedisclosure of which is fully incorporated herein by reference, may beused to prevent a child from unplugging telephone cable 14 and bypassinglockout device 12. In the alternative, a clamp may be substituted forplug lock 16. U.S. Pat. No. 4,647,726 to Blum, entitled “TelephoneSecurity Clamp,” describes such a clamp, the disclosure of which is alsofully incorporated herein by reference. Irrespective of whether a pluglock 16 or a clamp is used, those skilled in the art will appreciatethat the primary goal of such a plug lock or clamp is to secure atelephone cable to the computer, thereby preventing a child frombypassing locking device 12.

Moreover, in one embodiment of the invention a locking device includes akey controlled relay and a display that indicates the status of thelocking device. FIG. 3 shows a schematic for such an embodiment. Inanother embodiment of the invention, a locking device includes a readingdevice and display. FIG. 4 shows a block diagram for a locking deviceincluding a reading device and a display. In yet other embodiments ofthe invention, a locking device includes a reading device and indicatorlights as well as an interactive telephone component or a web-baseddevice. FIGS. 6 and 8 show block diagrams for the operation of twoembodiments of a locking device including an interactive telephonecomponent and a web-based device, respectively.

Referring now to FIG. 3, one embodiment of the locking device isschematically illustrated wherein a relay 28 coupled to a key-operatedswitch or keyed switch 27, is utilized for actuation and deactuation ofthe locking device 12. One set of contacts of relay 28 is coupledin-line with telephone cable 14 and is opened and closed by turning aninserted key 30 in keyhole 32 thereby energizing and de-energizing therelay 28. The relay 28 is operable such that when the switch is open,the relay is de-energized and the cable is effectively opened anddisabled. The key may then be removed so that a parent or other adultcan keep it in a safe place away from a child. Thus, when relay 28 isde-energized, cable 14 is disabled and no communication can take placetherethrough. To enable the cable 14, the key is inserted and turned toclose the switch 27, energizing the relay 28. Another set of contacts ofrelay 28 is coupled to display 34, indicating the whether the lockingdevice 12 is activated or deactivated.

As will be understood by a person of ordinary skill in the art, therelay may be arranged so that opening the switch enables the cable andclosing the switch disables the cable.

As shown in FIG. 3, power source 35 is controlled by keyed switch 27 toenergize relay 28. Further, power source 35 may be mounted internal tocase 29, as also shown in FIG. 3. It will be understood that a powersource may also be external to an enclosure or case in some embodimentsof the invention. Moreover, in some embodiments of the invention a powersource may be provided by or taken from cable 14.

Thus, by using a relay in a locking device to open and close an Internetconnection, a switch, such as switch 27, may be a single-pullsingle-throw (SPST) switch rather than a double-pull double-throw (DPDT)switch that itself opens and closes the Internet connection. The use ofa SPST switch rather than a DPDT switch reduces the cost of a lockingdevice. The use of a relay also facilitates the inclusion of a display.A display allows a parent to easily see whether the Internet is enabledor disabled from across a room, potentially eliminating the need tostand directly behind a child while the child is using the computer.

Telephone cable 14 may have any number of wire conductors for carryingthe necessary communication signals. A typical telephone line would havefour conductors. Relay 28 may be effectively coupled in-line withtelephone cable 14 by routing at least one of the operative conductorsthrough the relay while allowing one or more of the other operativeconductors to be unswitched. Alternatively, all of the conductors ofcable 14 might be operably coupled through the relay 28. Therefore,Internet access may be prevented by using key 30. An adult does not haveto have any particular computer knowledge to use the locking device. Asmentioned, the locking device may be deactuated by using key 30 to closeswitch 27, energize the relay 28, and thereby enable telephone cable 14.

The lockout system 10 of the present invention is easy to install andmay not be readily bypassed by a child. Referring to FIGS. 1-3, apreferred embodiment of plug lock 16 is illustrated. As shown in FIGS. 1and 2, plug lock 16 is inserted with plug 50 and prevents cable 14 frombeing unplugged from the modem or network card of a computer. Morespecifically, and as shown in FIG. 3, plug lock 16 prevents access totab 52 thereby preventing removal of plug 50 from the modem or networkcard.

If any attempt is made to physically remove plug 50 from the modem ornetwork card, the use of plug lock 16 and its insertion with plug 50will maintain the plug in the modem or network card and will only allowremoval of the cable 14, leaving plug 50 inserted. In that case, themodem or network card will essentially be blocked from receiving anotherplug and Internet access will be prevented. Moreover, cable 14 or pluglock 16 will likely be damaged, indicating to a parent that the childwas attempting to bypass lockout system 10.

Still referring to FIG. 3, the keyed switch 27 is preferably surroundedby a rigid case which prevents tampering with the locking device 12.Preferably, the case 29 will be a metal or rigid plastic which isfactory sealed so that the only way to access the internal parts of thelocking device will be to break or cut the case 29. Again, suchdestruction of the case will also be a visual indication for an adultthat the child is trying to bypass the lockout system 10.

The lockout system 10 of the invention provides an inexpensive andeasy-to-use tool for preventing unauthorized access to electronicinformation through on-line services. The locking device 12 of theinvention may be actuated and deactuated, or locked and unlocked, asnecessary to prevent Internet access or to provide adult supervisedaccess. The lockout system does not affect the stand-alone operationalcapability of the computer, and therefore, a child may use the computerfor other constructive tasks. The lockout system might be installedquickly and easily without a substantial modification to the computerequipment and the operation of the lockout system does not require thatthe adult be able to actually operate the computer. This is a particularadvantage of the invention, as some adults will want to supervise theirchildren without having to become computer experts themselves.Furthermore, the lockout system of the invention is not easily orreadily overcome or bypassed by a child without ruining the cable oralerting an adult that a bypass attempt is underway so that it may bestopped.

The remaining embodiments of the present invention, shown in FIGS. 4-9and described herein after, include various features described inconjunction with lockout system 10 shown in FIGS. 1-3. Moreover, theembodiments shown in FIGS. 4-9 provide additional or alternativefeatures with still further benefits. For example, FIG. 4 shows a blockdiagram for a lockout system including a reading device and a display,while FIGS. 6 and 8 show a block diagram for two embodiments of lockoutsystems including an interactive telephone component and a web-baseddevice, respectively.

Referring now to FIG. 4, a block diagram for lockout system 60 isillustrated. Lockout system 60 comprises a relay 62, a lock controller68, a reading device 70, and a display 72. Relay 62, lock controller 68,reading device 70, and display 72 may be mounted in an enclosure orcase, such as case 24 shown in FIG. 3.

As described above, relay 62 is coupled intermediate a computerinterface card 64 and an Internet connection 66, and configured toenable/disable Internet access. Again, a computer interface card may bea telephone modem, an Ethernet card, an internal cable or ADSL modem, aUSB or Firewire port, or other yet unknown computer interfaces.Similarly, an Internet connection may be a telephone wall jack, anexternal cable/DSL modem, a satellite dish system, or any yet unknownInternet connection.

Generally, relay 62 is coupled to and controlled by lock controller 68.Lock controller 68 energizes/de-energizes relay 62 in response toreading device 70. The Internet status, or whether Internet access isenable/disable, is indicated by display 72.

A reading device 70 may be any one of many reading devices known tothose of skill in the art. A reading device may be a magnetic cardreader, a numeric or alphanumeric keypad, a keyboard, a touch screen, afingerprint or retinal scanner, or a voice or facial recognition device.A reading device is generally used to authenticate, or provide a useridentity, and grant Internet access based thereon.

Lock controller 68 includes a processor, or microprocessor, preferablyincluding a timer 67 and memory 69. In addition to controlling relay 62,lock controller 68 is configured to store authentication information,e.g., magnetic card personal identification numbers (PINs), images offinger prints, etc., using included memory 69, to which informationpresented through reading device 70 is then compared. Lock controllermay be further configured to assign temporary authentication for a fixedamount of time using included timer 67. For example, a babysitter couldbe assigned a temporary access code for the night that the babysitter isto watch a child, thereby limiting access to the Internet for thatparticular evening. Moreover, timer 67 provides the ability to limit theamount of time that a child has access to the Internet. For example,lockout device 60 may limit one child's Internet access to one hour perday, while limiting another child to two hours per day. Timer 67 mayalso be used to provide Internet access only during specified timesduring weekdays, while providing different access times during weekends.For example, Internet access may be enabled between the hours of 7:00 pmand 8:30 pm, Monday through Friday, and 9:00 am and 11:00 am, Saturdayand Sunday. Other uses of a timer for enabling Internet access will beunderstood by those skilled in the art.

Those skilled in the art will also appreciate that a processor may bereplaced with specialized circuitry capable of performing like tasks.Despite incurring time and expense, such a replacement would notconstitute a departure from the spirit of the present invention.

Display 72 in its simplest form may utilize indicator lights orlight-emitting diodes (LEDs). Indicator lights or LEDs may be coupled tolock controller 68 and alternately illuminated to indicated whetherInternet access is enabled or disabled. In other embodiments of theinvention a display may be a liquid crystal display (LCD). In stillother embodiments of the invention a display may be a video screen, suchas those commonly used in cellular telephones. In addition to indicatingwhether Internet access is enabled or disabled, a LCD and a video screenare particularly advantageous in a lockout system 60 in setting thesystem to limit access to the Internet based on user, time, day of week,etc., as described herein above.

In operation, a person or user wishing to enable access to the Internetwould interact with reading device 70, entering a PIN through a keypad,passing an access card through a magnetic card reader, etc. The readingdevice 70 then passes information, e.g., PIN, magnetic code, etc., tolock controller 68. Lock controller 68 then authenticates the user.Next, lock controller authorizes the user. If the user is authenticatedand authorized, lock controller 68 either energizes or de-energizesrelay 68 to either enable or disable Internet access. Lock controller 68then displays whether the Internet is enabled or disabled on display 72.

Referring now to FIG. 5, a flowchart illustrating the program flow of aprocess of authenticating and authorizing a user in the lockout systemof FIG. 4 is illustrated. Process 73 begins in step 74 wherein a userenters a PIN through a keypad, passes an access card through a magneticcard reader, etc. using reading device 70. This PIN, magnetic code,etc., is compared or verified against information stored in memory 69 bylock controller 68 to authenticate or identify the user in step 76. Ifthe user is authenticated, step 78 is entered. Otherwise, control isreturned to step 74, and the process awaits further entry from a userwhile display 72 indicates an authenticating and/or authorizing failureto the user.

In step 78, lock controller 78 makes a comparison against informationstored in memory 69 to ascertain whether the authenticated user isauthorized at the current time, such as by using timer 67. For example,if a user is a parent, the parent might be authorized to use theInternet at all times. However, if the authenticated user is child,there may be some time restriction or limits on Internet access.

Once, the user is authorized, lock controller 68 sends a signal to relay62 to enable or disable Internet access, in step 80. In some embodimentsof the present invention, a display may also be updated in this step toindicate whether the Internet is enabled or disabled. However, if at thecurrent time, the user is not authorized, control is returned to step 74until such time as the user is authorized.

As another example, lockout system may comprise a keypad. A parent mightenter a master code using the keypad, assigning a new code to ababysitter, authorizing that code, or the babysitter for some timeperiod, such as the evening the babysitter is to watch a child. In thisexample, the babysitter would enter the new code via the keypad to usethe Internet, and only be able to use the Internet during the eveningthe babysitter is to watch the child.

As yet another example, a lockout system may comprise a video display,wherein a lock controller 68 is configured to, display menu-drivenoptions thereon. Such a video display has the benefit of allowingadditional information to be provided to a user. For example, if a childis only allowed to use the Internet for one hour each day, the videodisplay may indicate to the child the time that they have remaining touse the Internet.

Thus, process 73 provides a way of authenticating and authorizing a userof a lockout system.

Referring now to FIG. 6, a block diagram for lockout system 82 isillustrated. Like lockout system 60, shown in FIG. 4, lockout system 82comprises relay 62, lock controller 68, reading device 70, and display72. Further, lockout system 82 operates in a generally similar manner aslockout system 60, relay 62 being coupled intermediate a computerinterface card 64 and an Internet connection 66, and configured toenable/disable Internet access.

Lockout system 82 further comprises an interactive telephone component84. Interactive telephone component 84 allows a user to control lockoutsystem 82 remotely over a telephone line, such as one available throughcable 14 shown in FIG. 1. Further, interactive telephone component 84allows a user to access lockout system 82 in much the same way onetypically accesses an interactive telephone voice mail system.Generally, interactive telephone component prompts a user to enter anaccess or PIN code via a telephone keypad. Once the access code isverified, the user may then program lockout device 82 through amenu-driven system similar to most interactive telephone responsesystems, including enabling/disabling Internet access.

Referring now to FIG. 7, a flowchart illustrating the program flow of aprocess of verifying a user and enabling/disabling Internet access usinginteractive telephone component 84 of lockout system 82 of FIG. 6 isillustrated. Process 86 begins in step 88 wherein a user dialsinteractive telephone component 84 and interactive telephone component84 answers the call.

Next, in step 90, interactive telephone component 84 prompts the user toenter an access code or PIN, followed by, for example, the “#” key. Instep 92, interactive telephone component 84 verifies the access codethrough lock controller 68, through a comparison with information storedin memory 69. If the access code is verified, control is passed to step94. Otherwise, control is returned to step 90, and the user is againprompted to enter an access code.

In step 94, the user is prompted to press “1” to enable Internet accessor “2” to disable Internet access. In step 96, based on this selectionof “1” or “2,” interactive telephone component 84 signals lockcontroller 68 to indicating to lock controller 68 whether to enable ordisable Internet access using relay 62.

Thus, process 86 provides a way of remotely enabling/disabling Internetaccess using a lockout system and a telephone. Those skilled in the artwill appreciate that an interactive telephone component may usevoice-prompting as an alternative to key-entry, and that such a use doesnot constitute a departure from the spirit of the present invention.Further, a similar process may be used to remotely enable/disableInternet access based upon times, or to set up timed access. It willalso be appreciated that such a process may be executed by lockcontroller, such as lock controller 68, rather than an interactivetelephone component, and that such an incorporation also does notconstitute a departure from the spirit of the present invention.Finally, those skilled in the art will also appreciate that a similarprocess may be used to select other menu selections and/or settings,such as will be described herein after.

Referring now to FIG. 8, a block diagram for lockout system 100 isillustrated. Like lockout systems 60 and 82, shown in FIGS. 4 and 6,respectively, lockout system 100 comprises relay 62, lock controller 68,reading device 70, and display 72. Further, lockout system 100 isconfigured like and operates generally similar to lockout systems 60 and82, relay 62 being coupled intermediate a computer interface card 64 andan Internet connection 66, and configured to enable/disable Internetaccess.

Lockout system 100 further comprises a web-based device 102. Web-baseddevice 102 provides a user the ability to configure lockout device 100using an Internet browser, e.g., Microsoft Internet Explorer, NetscapeNavigator, etc., either remotely or locally by entering the uniformresource locator (URL) or IP address of the lockout system.

Even though an Internet or web browser is suggested by this embodiment,those skilled in the art will appreciate that a lockout system may alsobe locally or remotely accessed over a network using other technologies.In such a networked application, a user may enter the network addressfor the lockout system. For example, in a “smart home,” a remote touchpad may allow a user to configure a lockout device. Similarly, anapplication on a computer or wireless device, such a cellular phone,palm, hand-held computer, etc., may allow a user to configure a lockoutdevice.

For example, lockout device 100 may be configured locally using acomputer through which that computer is coupled to the Internet, such asusing computer 18 shown in FIG. 1. Alternatively, lockout device 100 maybe accessed and configured through a network or Internet connectionusing some computer remote to lockout system 100.

Irrespectively of whether lockout system 100 is accessed and configuredlocally or remotely, a user would see a web-like screen on the browserused that would allow them to configure lock controller 68 or system100. It will be understood that a network may be either wired orwireless.

Referring now to FIG. 9, a flowchart illustrating the program flow of aprocess of verifying a user and enabling/disabling Internet access usingweb-based device 102 of lockout system 100 of FIG. 8 is illustrated.Process 104 begins in step 106 wherein a user enters the network addressof the lockout system using an Internet browser and a web-like screenappears to prompt the user to enter an access code or PIN. Next, and asreflected in step 108, the user enters the access code or PIN, perhapsalso entering a carriage return or pressing a login button.

Next, in step 110, web-based device 102 verifies the access code throughlock controller 68, through a comparison with information stored inmemory 69. If the access code is verified, control is passed to step112. Otherwise, control is returned to step 106, and the user is againprompted to enter an access code.

In step 112, web-based device 102 prompts the user to enable or disableInternet access. In step 114, and based on a selection by the user,web-based device 102 signals lock controller 68 to either enable ordisable Internet access using relay 62, based on the user selection.

Thus, process 104 provides a way of locally or remotely configuring alockout system to enabling/disabling Internet access using a web-basedinterface. Those skilled in the art will appreciate that in otherembodiments of the present invention, such a process may also beincorporated into a lock controller, such as lock controller 68, shownin FIG. 6.

Those skilled in the art will also appreciate that similar programmingmay be used such that a local or remote user may set timer information.For example, the user may enter start and stop times for enablingInternet access or assign PINs, etc.

While the present invention has been illustrated by a description ofvarious embodiments and while these embodiments have been described inconsiderable detail, it is not the intention of the applicants torestrict or in any way limit the scope of the appended claims to suchdetail. Additional advantages and modifications will readily appear tothose skilled in the art. The invention in its broader aspects istherefore not limited to the specific details, representative apparatusand method, and illustrative examples shown and described. Accordingly,departures may be made from such details without departing from thespirit or scope of applicant's general inventive concept.

1. A lockout system for preventing a person from accessing electronicinformation through an interface device of a computer comprising: asignal cable configured for being operably coupled at one end with asignal port and at the other end with an interface device of a computer,the signal cable configured to pass electronic information back andforth between the interface device and the port; a locking deviceincluding a relay having a set of contacts, the set of contacts coupledin-line with the signal cable, the relay when actuated, disabling thesignal cable to prevent electronic information from passing between theinterface device and the port; a plug lock insertable with the signalcable proximate said other end, the plug lock configured for maintainingthe other end of the signal cable in operable connection with theinterface device to hinder a bypass of the lockout system.
 2. Thelockout system of claim 1 wherein the signal cable is a telephone cableoperable for carrying modem signals and is configured for beingconnected between a telephone port and a modem to prevent access toprohibited information over a phone line.
 3. The lockout system of claim1 wherein the signal cable is a telephone cable operable for carryingnetwork signals and is configured for being connected between atelephone port and a cable/digital subscriber line modem to preventaccess to prohibited information over a digital subscriber line.
 4. Thelockout system of claim 1 wherein the locking device includes a keyedswitch coupled to the relay which is opened and closed using a keystructure, the switch energizing and de-energizing the relay therebydisabling and enabling the signal cable.
 5. The lockout system of claim4 wherein the locking device includes an outer housing, a portion of thekeyed switch being located inside of said housing to further hinder achild from bypassing the lockout system.
 6. The lockout system of claim5 wherein the relay has a second set of contacts and the locking devicefurther comprises a display coupled to the second set of contacts, thedisplay indicating whether electronic information may pass between theinterface device and the port.
 7. The lockout system of claim 1 whereinthe locking device includes a processor coupled to the relay, theprocessor configured to selectively energize and de-energize the relaythereby disabling and enabling the signal cable.
 8. The lockout systemof claim 7 wherein the locking device includes a display coupled to theprocessor for indicating whether the signal cable is enabled ordisabled.
 9. The lockout system of claim 7 wherein the locking deviceincludes a reading device coupled to the processor, the processorconfigured to energize and de-energize the relay in response to inputreceived through the reading device.
 10. The lockout system of claim 9wherein the reading device is a magnetic card reader.
 11. The lockoutsystem of claim 9 wherein the reading device is a keypad.
 12. Thelockout system of claim 9 wherein the reading device is a touch screen.13. The lockout system of claim 9 wherein the processor includes amemory, the processor is configured to store user authenticationinformation, compare the input received through the reading device tothe store user authentication information, and energize and de-energizethe relay in response to the comparison.
 14. The lockout system of claim13 wherein the processor includes a timer and the processor isconfigured to limit the amount of time a user has access to electronicinformation.
 15. The lockout system of claim 14 wherein the lockingdevice includes an interactive telephone component coupled to theprocessor, the interactive telephone component configured to allow auser to disable and enable the signal cable remotely.
 16. The lockoutsystem of claim 15 wherein the locking device includes a web-baseddevice coupled to the processor, the web-based device to allow a user todisable and enable the signal cable using a computer.
 17. A lockoutsystem for preventing a person from accessing electronic informationthrough an interface device of a computer comprising: a signal cableconfigured for being operably coupled at one end with a signal port andat the other end with an interface device of a computer, the signalcable configured to pass electronic information back and forth betweenthe interface device and the port; a locking device including a relayhaving a set of contacts, the set of contacts coupled in-line with thesignal cable, the relay when actuated, disabling the signal cable toprevent electronic information from passing between the interface deviceand the port.
 18. The lockout system of claim 17 wherein the signalcable is a telephone cable operable for carrying modem signals and isconfigured for being connected between a telephone port and a modem toprevent access to prohibited information over a phone line.
 19. Thelockout system of claim 17 wherein the signal cable is a telephone cableoperable for carrying network signals and is configured for beingconnected between a telephone port and a cable/digital subscriber linemodem to prevent access to prohibited information over a digitalsubscriber line.
 20. The lockout system of claim 17 wherein the lockingdevice includes a keyed switch coupled to the relay which is opened andclosed using a key structure, the switch energizing and de-energizingthe relay thereby disabling and enabling the signal cable.
 21. Thelockout system of claim 20 wherein the locking device includes an outerhousing, a portion of the keyed switch being located inside of saidhousing to further hinder a child from bypassing the lockout system. 22.The lockout system of claim 21 wherein the relay has a second set ofcontacts and the locking device further comprises a display coupled tothe second set of contacts, the display indicating whether electronicinformation may pass between the interface device and the port.
 23. Thelockout system of claim 17 wherein the locking device includes aprocessor coupled to the relay, the processor configured to selectivelyenergize and de-energize the relay thereby disabling and enabling thesignal cable.
 24. The lockout system of claim 23 wherein the lockingdevice includes a display coupled to the processor for indicatingwhether the signal cable is enabled or disabled.
 25. The lockout systemof claim 23 wherein the locking device includes a reading device coupledto the processor, the processor configured to energize and de-energizethe relay in response to input received through the reading device. 26.The lockout system of claim 25 wherein the reading device is a magneticcard reader.
 27. The lockout system of claim 25 wherein the readingdevice is a keypad.
 28. The lockout system of claim 25 wherein thereading device is a touch screen.
 29. The lockout system of claim 25wherein the processor includes a memory, the processor is configured tostore user authentication information, compare the input receivedthrough the reading device to the store user authentication information,and energize and de-energize the relay in response to the comparison.30. The lockout system of claim 29 wherein the processor includes atimer and the processor is configured to limit the amount of time a userhas access to electronic information.
 31. The lockout system of claim 30wherein the locking device includes an interactive telephone componentcoupled to the processor, the interactive telephone component configuredto allow a user to disable and enable the signal cable remotely.
 32. Thelockout system of claim 30 wherein the locking device includes aweb-based device coupled to the processor, the web-based device to allowa user to disable and enable the signal cable using a computer.