Method and apparatus for managing internet content

ABSTRACT

A method and apparatus for managing Internet content is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, an Internet content manager (ICM) having a computing element that monitors Internet content supplied to subscribers of an Internet Service Provider (ISP) by one or more Internet content providers according to a process established by the ISP to certify said Internet content of the one or more Internet content providers. Additional embodiments are disclosed.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to communication systems, andmore specifically to a method and apparatus for managing Internetcontent.

BACKGROUND

The number of Internet content providers continues to grow rapidly. Thefreedom to access content on the Internet brings many benefits, but alsomany issues. This freedom has emboldened some content providers topervasively push unsolicited content to end users by way of pop-upwindows containing advertisements and at times sexually explicitcontent. In other circumstances some content providers have injectedspyware applications which can cause havoc with computing systems aswell as draw consumers to purchase unwanted applications to ridthemselves of these hidden applications.

These activities have led to the creation of software and hardwarecompanies that produce pop-up blockers, content screening applications,URL blockers, applications that detect and eliminate spyware, and so on.Although helpful, these solutions have had limited success.

A need therefore arises for a method and apparatus that manages Internetcontent.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an exemplary embodiment of a communication system;

FIG. 2 depicts an exemplary method operating in portions of thecommunication system; and

FIG. 3 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system within which a set of instructions, whenexecuted, may cause the machine to perform any one or more of themethodologies disclosed herein.

DETAILED DESCRIPTION OF THE DRAWINGS

Embodiments in accordance with the present disclosure provide a methodand apparatus for managing Internet content.

In a first embodiment of the present disclosure, a method applied by anInternet Service Provider (ISP) can have the step of the ISP certifyingInternet content from each of one or more Internet content providersprior to making available said Internet content to a subscriber of theISP.

In a second embodiment of the present disclosure, an Internet contentmanager (ICM) can have a computing element that monitors Internetcontent supplied to subscribers of an Internet Service Provider (ISP) byone or more Internet content providers according to a processestablished by the ISP to certify said Internet content of the one ormore Internet content providers.

In a third embodiment of the present disclosure, a method applied by anInternet Content Provider (ICP) can have the step of submitting arequest to an Internet Service Provider (ISP) to certify Internetcontent of said ICP according to a certification process established bythe ISP.

In a fourth embodiment of the present disclosure, a computer-readablestorage medium can have computer instructions for monitoring Internetcontent supplied to subscribers of an Internet Service Provider (ISP) byone or more Internet content providers according to a certificationprocess established by the ISP.

FIG. 1 depicts an exemplary embodiment of a communication system 100.The communication system 100 can comprise a number of Wireline orWireless Access Networks (WANs) 116 which support any number of accesstechnologies such as Public Switched Telephone Network (PSTN), xDSL,cable, WiFi, WiMAX, cellular (e.g., GSM, CDMA, UMTS, etc.), Bluetooth,software defined radio (SDR), ultra wide band (UWB), and so on. In oneof several embodiments, WANs 116 can represent, for example, WiFihotspots established by retailers to draw patrons to their establishmentfor additional business. Alternatively, a WAN 116 can be established ina residence, or in a commercial enterprise with a number of usersutilizing a terminal device 114 such as a computer to access Internetcontent, submit and receive emails, and so on.

The terminal devices 114 in FIG. 1 can represent single-mode ormultimode roaming communication devices capable of interfacing to theWANs 116 by wire or wirelessly. The terminal devices 114 can comprise anumber of embodiments including without limitation computing devices(e.g., a laptop, desktop computer, or server), a cellular phone withsingle-mode or multimode capability (e.g., WiFi and cellular), and apersonal digital assistant (PDA) with wireless capability. In the caseof a wireless terminal device 114, an end user of said device can beafforded the flexibility of roaming between WANs 116 of thecommunication system 100.

The WANs 116 can be coupled to a packet-switched (PS) network 118. ThePS network 118 and the WANs 116 can be supported by, for example, a Tier1 Internet Service Provider (ISP) utilizing common packet-switchedrouting technologies (e.g., an IP, Frame Relay, Asynchronous TransferMode or ATM, Multi-protocol Label Switching or MPLS) for transportingpacket traffic between end users that have subscribed to services of thecommunication system 100. Internet Content Providers (ICPs) 112 can becoupled to the PS network 118 by way of an Internet Content Manager(ICM) 110. The ICM 110 can be used for managing Internet contentsupplied by the ICPs 112 to subscribers of the communication system 100.The Internet content supplied by the ICPs 112 can conform to anyexisting or future Internet protocol (e.g., XML, VXML, SessionInitiation Protocol or SIP, IP Multimedia Subsystem or IMS) for thepurposes of delivering content to subscribers by way of an Internetapplication such as an Internet browser.

The Internet content can comprise software applications, services (e.g.,HTTP services, Voice over IP or VoIP services, IP Multimedia Subsystemor IMS services, etc.), multimedia content with visual and/or audiocontent, flash media, pop-up windows, advertisements, spyware, cookies,or any other form of content that can be delivered or retrieved from aterminal device 114 of a subscriber. The ICPs 112 can be independentlyoperated or can be aggregated by an Internet content broker by way of acommon portal. The ICPs 112 can represent Internet content publishers,advertisement brokers, or brokers of Internet tracking applications(e.g., spyware)—just to name a few.

FIG. 2 depicts an exemplary method 200 operating in portions of thecommunication system 100. Method 200 as will be described shortly can beimplemented in whole or in part by ICM 110 and one or more agents of theISP managing communication system 100. With this in mind, method 200begins with step 202 in which one of the ICPs 112 submits forcertification Internet content to the ISP. The ISP screens the Internetcontent and can certify said content according to a certification policyestablished by the ISP. A certification policy can comprise a group ofclassifications that can include, for example, an age groupclassification, a nature of content classification, a content typeclassification, and an audience maturity classification. The foregoingclassifications can be applied with any criteria defined by the ISP.

For example, the ISP can define an age group classification based on theappropriateness of presenting the Internet content to various audiencetypes much like the Movie Picture Association of America (MPAA) filmrating system (e.g., movies rated as G, PG, PG-13, R, and NC-17). TheISP can establish criteria screening the content for any number of agegroup classifications. For example, the ISP can determine that Internetcontent is appropriate for general audiences if it avoids use ofprofanity, violence of any kind, and explicit or implicit sexualmaterial or innuendos. Other criteria can be used for other age groupclassifications.

Similarly, the ISP can establish criteria for a nature of contentclassification. For example, the ISP can define a variety of nature ofcontent classifications such as mild violence, violence, extremeviolence, sexually explicit or implicit content or innuendos, adultlanguage, profanity, language and images inappropriate for childrenunder the age of 7, etc. The ISP can thus define any number of nature ofcontent classifications considered suitable for screening the Internetcontent. The ISP can also define a number of content typeclassifications such as educational, entertainment, gaming, gambling,pornographic, etc. The ISP can also define a number of audience maturityclassifications which are less specific than age group classificationssuch as, for example, mature audiences only, not intended for youngchildren, suitable for young children, and so on.

The ISP can thus screen the Internet content supplied in step 202according to criteria established for one or more of the aboveclassifications (or other classifications conceived of by the ISP notdisclosed herein). The certification process can be mechanized byexecuting one or more content screening applications by way of acomputing element of the ICM 110. The computing element can represent adesktop computer, or server that can execute any number of applicationsor steps depicted by method 200. The content screening applications cansearch and identify characteristics of the Internet content for purposesclassifying said content.

Content screening applications can be implemented with common softwareand/or hardware techniques and can operate as an integral part of theICM 110. Accordingly, the ICM 110 can be programmed to perform image anddata processing on the Internet content supplied by the ICP 112. Forinstance, the content screening applications may be able to process theInternet content using common image processing techniques and detecttherefrom visual images of violence or explicit sexual behavior (e.g.,detect weaponry, nudity, sexual intercourse, or violence betweenindividuals or animation objects or characters). The ICM 110 can also beprogrammed to screen audible or textual language (e.g., languageappropriate for any audience, language requiring parental guidance—mildprofanity or innuendos, language for adults only—excessive profanity,etc.). The content screening applications can also be programmed withthe ISPs criteria for classifications. Accordingly, the ICM 110 canscreen and generate recommendations to the ISP for classifying theInternet content. In more sophisticated applications, the ICM 110 canalso perform the classification exclusively.

Alternatively, the screening process can be combined or replaced withscreening performed by an agent of the ISP. The agent can, for example,review the Internet content without automation, or view the resultsdelivered by the ICM 110 as well as apply his or her own judgment forclassifying the Internet content based on the criteria established bythe ISP. The agent and/or ICM 110 can also determine in step 206 thatthe Internet content supplied by the ICP 112 does not conform to asubmission policy defined by the ISP. For example, the ICP 112 may havenot complied with the submission requirements that the ISP determinesare necessary to adequately screen the Internet content. For example,part of the submission policy may require documentation to explain thenature of the content, how it will be invoked while a subscriber isnavigating through a website of the ICP 112, and so on.

If the Internet content satisfies the submission policy, an agent of theISP, or the ICM 110 certifies in step 210 the Internet content accordingto one or more of the classifications set forth above and notifies theICP 112 of the results. The ICP 112 can then make the certified Internetcontent available at a website or portal if not already available.

To enhance the experience of its subscribers, the ICM 110 can beprogrammed in step 212 to receive a request to screen certified Internetcontent according to one or more classifications selected by asubscriber of the communication system 100. For instance, the subscribercan request that the ISP by way of the ICM 110 monitor and restrictaccess to any certified Internet content that has explicit sexualcontent. The ICM 110 can thus prevent a common Internet browser of thesubscriber or any parties associated therewith (e.g., members of thesame household, or employees of an enterprise) from accessing certifiedInternet content that has been classified as containing explicit sexualcontent. The subscriber can submit this request in a number of ways. Forexample, the subscriber can log into a website of the ISP by way of theICM 110 and select check boxes with classifications for screeningcertified Internet content. The website can, for example, provide abrief description of each classification and the impact of selecting aclassification for screening purposes.

With a screening list selected by a subscriber, the ICM 110 can proceedto step 214 where it detects a request for access by one of thesubscriber's terminal devices 114 to Internet content of one or more ofthe ICPs 112. The ICM 110 checks in step 216 if said content iscertified by the ISP according to the process previously described. Ifit is not certified, the ICM proceeds to step 218 where it blocks accessto the Internet content by common means such as, for example, notresolving a Domain Name Service (DNS) request, or presenting a web pagenotice to the subscriber's browser in step 220 indicating the site isblocked due to lack of certification of said content.

If, on the other hand, the Internet content requested is certified, theICM 110 proceeds to step 222 and checks if the classification of thecertified Internet content requested is in the subscriber's screeninglist. If it is, then the ICM 110 proceeds to steps 218 where it blocksaccess, and notifies the subscriber by way of the browser in step 220that the content has been blocked in compliance with the screening list.Otherwise, the ICM 110 proceeds to step 224 where it grants thesubscriber's browser access to said content.

The aforementioned steps of method 200 are repeated as often as neededto certify new Internet content from the ICPs 112, and for managing theInternet content presented to the subscribers of the ISP as discussedabove. Method 200 as disclosed provides subscribers of the IPS analternative means to purchasing complex and expensive screening softwarefor his or her terminal devices 114. It benefits the ISP in competingand differentiating itself from other ISPs that do not supply suchcertification and screening services to its subscribers.

Upon reviewing the present disclosure, it would be evident to an artisanwith ordinary skill in the art that the aforementioned embodiments canbe modified, reduced, or enhanced without departing from the scope andspirit of the claims described below. Accordingly, the reader isdirected to the claims below for a fuller understanding of the breadthand scope of the present disclosure.

FIG. 3 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 300 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethodologies discussed above. In some embodiments, the machine operatesas a standalone device. In some embodiments, the machine may beconnected (e.g., using a network) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient user machine in server-client user network environment, or as apeer machine in a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet PC, a laptop computer, a desktopcomputer, a control system, a network router, switch or bridge, or anymachine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a device of the present disclosure includes broadly anyelectronic device that provides voice, video or data communication.Further, while a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute a set (or multiple sets) of instructions to perform anyone or more of the methodologies discussed herein.

The computer system 300 may include a processor 302 (e.g., a centralprocessing unit (CPU), a graphics processing unit (GPU, or both), a mainmemory 304 and a static memory 306, which communicate with each othervia a bus 308. The computer system 300 may further include a videodisplay unit 310 (e.g., a liquid crystal display (LCD), a flat panel, asolid state display, or a cathode ray tube (CRT)). The computer system300 may include an input device 312 (e.g., a keyboard), a cursor controldevice 314 (e.g., a mouse), a disk drive unit 316, a signal generationdevice 318 (e.g., a speaker or remote control) and a network interfacedevice 320.

The disk drive unit 316 may include a machine-readable medium 322 onwhich is stored one or more sets of instructions (e.g., software 324)embodying any one or more of the methodologies or functions describedherein, including those methods illustrated above. The instructions 324may also reside, completely or at least partially, within the mainmemory 304, the static memory 306, and/or within the processor 302during execution thereof by the computer system 300. The main memory 304and the processor 302 also may constitute machine-readable media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Applications that may include the apparatusand systems of various embodiments broadly include a variety ofelectronic and computer systems. Some embodiments implement functions intwo or more specific interconnected hardware modules or devices withrelated control and data signals communicated between and through themodules, or as portions of an application-specific integrated circuit.Thus, the example system is applicable to software, firmware, andhardware implementations.

In accordance with various embodiments of the present disclosure, themethods described herein are intended for operation as software programsrunning on a computer processor. Furthermore, software implementationscan include, but not limited to, distributed processing orcomponent/object distributed processing, parallel processing, or virtualmachine processing can also be constructed to implement the methodsdescribed herein.

The present disclosure contemplates a machine readable medium containinginstructions 324, or that which receives and executes instructions 324from a propagated signal so that a device connected to a networkenvironment 326 can send or receive voice, video or data, and tocommunicate over the network 326 using the instructions 324. Theinstructions 324 may further be transmitted or received over a network326 via the network interface device 320.

While the machine-readable medium 322 is shown in an example embodimentto be a single medium, the term “machine-readable medium” should betaken to include a single medium or multiple media (e.g., a centralizedor distributed database, and/or associated caches and servers) thatstore the one or more sets of instructions. The term “machine-readablemedium” shall also be taken to include any medium that is capable ofstoring, encoding or carrying a set of instructions for execution by themachine and that cause the machine to perform any one or more of themethodologies of the present disclosure.

The term “machine-readable medium” shall accordingly be taken toinclude, but not be limited to: solid-state memories such as a memorycard or other package that houses one or more read-only (non-volatile)memories, random access memories, or other re-writable (volatile)memories; magneto-optical or optical medium such as a disk or tape; andcarrier wave signals such as a signal embodying computer instructions ina transmission medium; and/or a digital file attachment to e-mail orother self-contained information archive or set of archives isconsidered a distribution medium equivalent to a tangible storagemedium. Accordingly, the disclosure is considered to include any one ormore of a machine-readable medium or a distribution medium, as listedherein and including art-recognized equivalents and successor media, inwhich the software implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are periodicallysuperseded by faster or more efficient equivalents having essentiallythe same functions. Accordingly, replacement standards and protocolshaving the same functions are considered equivalents.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Otherembodiments may be utilized and derived therefrom, such that structuraland logical substitutions and changes may be made without departing fromthe scope of this disclosure. Figures are also merely representationaland may not be drawn to scale. Certain proportions thereof may beexaggerated, while others may be minimized. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense.

Such embodiments of the inventive subject matter may be referred toherein, individually and/or collectively, by the term “invention” merelyfor convenience and without intending to voluntarily limit the scope ofthis application to any single invention or inventive concept if morethan one is in fact disclosed. Thus, although specific embodiments havebeen illustrated and described herein, it should be appreciated that anyarrangement calculated to achieve the same purpose may be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, will be apparent to those of skill in theart upon reviewing the above description.

The Abstract of the Disclosure is provided to comply with 37 C.F.R.§1.72(b), requiring an abstract that will allow the reader to quicklyascertain the nature of the technical disclosure. It is submitted withthe understanding that it will not be used to interpret or limit thescope or meaning of the claims. In addition, in the foregoing DetailedDescription, it can be seen that various features are grouped togetherin a single embodiment for the purpose of streamlining the disclosure.This method of disclosure is not to be interpreted as reflecting anintention that the claimed embodiments require more features than areexpressly recited in each claim. Rather, as the following claimsreflect, inventive subject matter lies in less than all features of asingle disclosed embodiment. Thus the following claims are herebyincorporated into the Detailed Description, with each claim standing onits own as a separately claimed subject matter.

What is claimed is:
 1. A method comprising: receiving, by a server of an Internet service provider, content from content providers; analyzing, by the server, the content by performing image recognition on images of the content to apply classifications to each of the content according to a certification policy, wherein the content is certified to generate certified content after completion of the analyzing; receiving, by the server, a request for access to target content from an end user device; responsive to a determination that the target content is not included in the certified content, blocking, by the server, the access to the target content by the end user device; and responsive to a determination that the target content is included in the certified content and is included on a screening list, blocking, by the server, the access to the target content by the end user device, wherein the screening list is based on the classifications.
 2. The method of claim 1, wherein the content providers comprise an advertisement broker, an Internet content publisher, a broker of Internet content, a broker of Internet tracking applications, or combinations thereof, and wherein the server blocks access by not resolving a domain name service request.
 3. The method of claim 1, wherein the performing of the image recognition on the images of the content to generate the classifications comprises detecting objects in the images corresponding to weapons, and wherein the classifications comprise violence between individuals.
 4. The method of claim 3, wherein the classifications are generated by the server based on criteria established by the Internet service provider.
 5. The method of claim 3, wherein the classifications comprise an age group classification, a nature of content classification, a content type classification, and an audience maturity classification.
 6. The method of claim 5, wherein the content is certified based in part on information provided by the content provider that describes the content.
 7. The method of claim 1, wherein the blocking of access to the target content comprises providing notification to the end user device that the corresponding content provider has not submitted the target content to the Internet service provider for a pre-certification analysis.
 8. The method of claim 1, wherein the blocking of access to the target content comprises providing a web page notice from the server.
 9. An Internet content manager, comprising: a computing server that monitors Internet content supplied to subscribers of an Internet service provider by content providers according to a pre-certification established by the Internet service provider to certify the Internet content of the content providers, wherein the certifying of the Internet content is performed by analyzing the Internet content prior to detecting a request for the Internet content from a subscriber, wherein the analyzing of the Internet content comprises performing image recognition to determine if an image of the Internet content satisfies a certification policy, and wherein the computing server selectively blocks access to select Internet content in response to the subscriber request according to the certifying of the Internet content and selectively blocks access to all Internet content that has not received the pre-certification prior to the request from the subscriber for access.
 10. The Internet content manager of claim 9, wherein the content providers comprise at least one among an advertisement broker, an Internet content publisher, a broker of Internet content, and a broker of Internet tracking applications.
 11. The Internet content manager of claim 9, wherein the computing server receives a request from one among the content providers to certify Internet content supplied with the request and submits to the content provider making the request a certification for the Internet content according to at least one among a group of classifications.
 12. The Internet content manager of claim 11, wherein the computing server receives the certification from the Internet service provider which screens the Internet content by way of at least one among a content screening application and an agent of the Internet service provider.
 13. The Internet content manager of claim 11, wherein the group of classifications comprises at least one among an age group classification, a nature of content classification, a content type classification, and an audience maturity classification.
 14. The Internet content manager of claim 11, wherein the computing server receives from a terminal device of the subscriber a request to screen the certified Internet content of the content providers according to classifications selected from the group of classifications, and prevents access to the certified Internet content of the content providers by a browser of the terminal device when classifications associated with the certified Internet content match the selected classifications.
 15. The Internet content manager of claim 9, wherein the computing server selectively blocks access to select Internet content by providing a notification that Internet content has not been pre-certified.
 16. The Internet content manager of claim 15, wherein the computing server selectively blocks access to select Internet content by not resolving a Domain Name Service request submitted by the browser.
 17. A method, comprising: using an Internet content provider server, submitting a request to an Internet service provider for pre-certifying Internet content of the Internet content provider according to a certification process established by the Internet service provider, wherein the pre-certifying of the Internet content is performed by scanning of the Internet content using a proxy server prior to a request for the Internet content from a subscriber, wherein the scanning of the Internet content comprises the proxy server performing image recognition to determine if an image of the Internet content satisfies a certification policy, and wherein the Internet service provider selectively blocks access to select Internet content in response to the subscriber request according to the certifying of the Internet content and according to a failure by the Internet content provider to obtain the pre-certifying.
 18. The method of claim 17, wherein the Internet service provider selectively blocks access to the select Internet content by providing a notification that the select Internet content has not been pre-certified.
 19. The method of claim 17, wherein the Internet content provider comprises at least one among an advertisement broker, an Internet content publisher, a broker of Internet content, and a broker of Internet tracking applications.
 20. The method of claim 17, wherein the Internet service provider certifies the Internet content according to at least one among a group of classifications comprising at least one among an age group classification, a nature of content classification, a content type classification, and an audience maturity classification.
 21. A non-transitory computer-readable storage medium, comprising computer instructions which, when executed by a processor of a server managed by an Internet service provider, causes the processor to perform operations comprising: receiving content from content providers; analyzing the content by performing image recognition on images of the content to apply classifications to each of the content according to a certification policy, wherein the content is certified to generate certified content after completion of the analyzing; receiving a request for access to target content from an end user device; responsive to a determination that the target content is not included in the certified content, blocking, by the server, the access to the target content by the end user device; and responsive to a determination that the target content is included in the certified content and is included on a screening list, blocking, by the server, the access to the target content by the end user device, wherein the screening list is based on the classifications. 