Abstract:
Embodiments of the present invention disclose systems and methods for controlled access to a website from a mobile device when the mobile device is connected with an external public or private network away from home. Certain embodiments provide for such protection and security through the use of smart and secure home router which is connected to the mobile device through a virtual private network, whether in a module form or as a standalone server.
Abstract:
The MetaSafe platform disclosed in this application is a decentralized storage and peer-to-peer network that utilizes Internet Gateway's (Routers) resources such as processor, storage, and network bandwidth to run a Blockchain network and provides services such as decentralized secured storage and peer-to-peer internet traffic routine for privacy that enables anyone with an Internet connection to store their information securely from any computing device and retrieve it on demand or share it at will. Due to its decentralized nature, and no single authority controlling or running the network, data is almost hackproof and not subject to any commercial exploitation. The enhancements comprise Proof of Stake consensus protocol vs. Proof of work to make it low-cost participation, utility token to incentivize the developers and network validators, and finally the ability to run the network validation on thousands of routers, the most under-utilized but the most important piece of hardware that's always online.
Abstract:
Various embodiments provide an approach to controlled access to online content. Such control may be based on a multitude of factors including but not limited to website content, profile for the person consuming the data. In operation, machine-learning techniques are used to classify the websites based on community and social media inputs, crowd-sourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine-learning techniques. Embodiments may also allow for real, or near real-time, approval or denial of access to websites by registered admins.
Abstract:
Various embodiments provide an approach to controlled access of websites based on website content, and profile for the person consuming the data. In operation, machine learning techniques are used to classify the websites based on community and social media inputs, crowdsourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine learning techniques.
Abstract:
Various embodiments provide an approach to controlled access to online content. Such control may be based on a multitude of factors including but not limited to website content, profile for the person consuming the data. In operation, machine-learning techniques are used to classify the websites based on community and social media inputs, crowd-sourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine-learning techniques. Embodiments may also allow for real, or near real-time, approval or denial of access to websites by registered admins.
Abstract:
Various embodiments provide an approach to controlled access of websites based on website content, and profile for the person consuming the data. In operation, machine learning techniques are used to classify the websites based on community and social media inputs, crowdsourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine learning techniques.
Abstract:
A system and a method for intelligently learning a list of allowed IP content at one or more internet connected devices by implementing an intelligent parental control means is provided. The means includes a router and a filter. The router monitors and records web based operations done at the internet connected devices during a learning mode to create a list of allowed IP content at the internet connected devices. The filter implements the list and accordingly allows and blocks the content. Further, a remote device communicating with the router via a central server remotely controls and configures the router and the filter. The remote device permits the router to approve or disapprove a blocked IP content, when the blocked content is accessed at the internet connected devices.
Abstract:
Various embodiments provide an approach to controlled access to online content. Such control may be based on a multitude of factors including but not limited to website content, profile for the person consuming the data. In operation, machine-learning techniques are used to classify the websites based on community and social media inputs, crowd-sourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine-learning techniques. Embodiments may also allow for real, or near real-time, approval or denial of access to websites by registered admins.
Abstract:
Various embodiments provide an approach to controlled access to online content. Such control may be based on a multitude of factors including but not limited to website content, profile for the person consuming the data. In operation, machine-learning techniques are used to classify the websites based on community and social media inputs, crowd-sourced data, as well as access rules implemented by parents or system administrators. Feedback from users/admins of the system, including the instances of allowed or denied access to websites, in conjunction with other relevant parameters, is used for iterative machine-learning techniques. Embodiments may also allow for real, or near real-time, approval or denial of access to websites by registered admins.
Abstract:
Embodiments of the present invention disclose systems and methods for controlled access to a website from a mobile device when the mobile device is connected with an external public or private network away from home. Certain embodiments provide for such protection and security through the use of smart and secure home router which is connected to the mobile device through a virtual private network, whether in a module form or as a standalone server.