专利摘要:
An electronic bulletin board system is disclosed. The electronic bulletin board system according to the present invention selectively processes a post registration request by referring to a publisher location tracking unit that extracts a publisher's initial location, a Mac address, and an Internet address, and the results of the publisher's location information and / or censoring of the post. The bulletin board operation unit, and the publisher location / post database for storing the extracted Mac address and the Internet address with the post, characterized in that it comprises. According to the present invention, when a problem occurs in the content of a post, it is possible to keep certain evidence of who the publisher is, and to support the use of the bulletin board only in an institution entitled to use the bulletin board. In addition, by searching for hacking patterns and forbidden words, it is possible to effectively prevent a publisher from hacking a web server or posting obscene articles or abusive words.
公开号:KR20020003327A
申请号:KR1020010071322
申请日:2001-11-16
公开日:2002-01-12
发明作者:김완수
申请人:정지후;(주)아이디에스테크날러지;
IPC主号:
专利说明:

Electronic bulletin board system
[9] The present invention relates to an electronic bulletin board system and a method of operating the bulletin board. More specifically, the present invention relates to an electronic bulletin board system and a method of operating the bulletin board. The present invention relates to an electronic bulletin board and a method of operating the electronic bulletin board, which can be used to support the use of the electronic bulletin board and to effectively prevent the publisher from hacking a web server or posting obscene articles or abusive words by searching for hacking patterns and forbidden words.
[10] Recently, the use of electronic bulletin boards has been maximized by the rapid increase of Internet users and information transmission methods using the Internet. However, in the case of anonymous bulletin boards, their identity or location is not exposed, and more and more cases are being used to steal someone else's name or post an unresponsive article to damage others. Therefore, who posted the posts and where they are published is important legal evidence. In addition, in some cases, there is a case of hacking a web server by uploading a file including an executable code on a bulletin board and then executing the uploaded file. In addition, the necessity of using the bulletin board anonymously only in the Internet network of an institution is emerging.
[11] A proxy server, on the other hand, is a server that acts as an intermediary between a PC user and the Internet. The proxy server is associated with or is part of a gateway server that separates the corporate network from the external network, and a firewall server that protects the corporate network from outside intrusion. The presence of such a proxy server is not visible to the user, and all Internet requests and responses appear to be performed directly with the Internet server. The proxy server is not completely invisible to the user, because the proxy server's IP address must be specified when configuring the browser. For example, the proxy server may be on the same computer as the firewall server, or it may be on a separate server and forward the request through the firewall. The conventional internet bulletin board system cannot find the concealment of the publisher through the proxy server.
[12] In addition, ASL (Asymmetric Digital Subscriber Line) is a technology for transmitting digital information at high bandwidth through telephone lines installed in homes and businesses. ADSL is used to transmit most of the channel down to the user side. It is an asymmetric structure that allocates very little to the information received from the user. It can accept analog (voice) information as well as digital information on the same line. This method of accessing the Internet through ADSL is widely used at home, and the IP address fluctuates every time the Internet is accessed, and the log of whose computer the IP was used at the corresponding time of the ADSL service provider is not properly maintained. It is very difficult to track criminals during investigation.
[13] In addition, in response to one person's post, a bulletin board may continue on one topic, swear words, or slander others. It is a realistic problem that the administrator cannot keep an eye on the management of such bulletin boards, and an electronic bulletin board system that prevents postings corresponding to the patterns by inputting word patterns by the administrators to overcome the problems. It is disclosed in Korean Laid-Open Patent No. 2001-0012393, filed November 9, 1999 by Gara.
[14] However, the system disclosed in the patent document discloses only a method of inputting a word pattern by an administrator and not posting a posting corresponding to the input pattern, and does not disclose a method of tracking a user who posted the article. There is no disclosure on how to insert a hacking code into a bulletin board to prevent attempts to hack the website and the bulletin board.
[15] In addition, conventional bulletin boards are difficult to locate if users hide their internet addresses using a proxy server when posting anonymous posts on bulletin boards. In the case of ADSL, each time a publisher computer accesses the Internet, It is difficult to find the location of the publisher because of the change. In addition, there is an increasing number of hacking websites and bulletin boards by inserting hacking codes into bulletin boards, but there is no function to prevent such hacking attempts from bulletin boards. In addition, there are no bulletin boards that have the ability to set the range of Internet addresses to be posted only at schools or some institutions, or prevent some posts from posting.
[16] The technical problem to be achieved by the present invention is to be able to keep a solid evidence of who the publisher is when a problem occurs in the content of the post, it is possible to support the use of the bulletin board only in institutions qualified to use the bulletin board, hacking It is to provide an electronic bulletin board system that can effectively prevent a publisher from hacking a web server or posting obscene articles or abusive words by searching for patterns and forbidden words.
[17] Another technical problem to be achieved by the present invention is to carry out the above bulletin board system, and when there is a problem with the content of the post, it is possible to keep certain evidence of who the publisher is, and use the bulletin board only in an institution entitled to use the bulletin board. It is possible to support the system, and to provide a method of operating an electronic bulletin board system that can effectively prevent a publisher from hacking a web server or posting obscene articles or abusive words by searching for hacking patterns and forbidden words.
[1] 1 is a block diagram showing the structure of an electronic bulletin board system according to an embodiment of the present invention.
[2] 2 is a flowchart illustrating main steps of a method for operating an electronic bulletin board system according to an embodiment of the present invention performed in the electronic bulletin board system of FIG.
[3] 3 is an example of a screen in which an administrator inputs a hacking pattern.
[4] 4 is an example of a screen in which an administrator checks a hacking pattern.
[5] 5 is an example of a screen in which an administrator inputs a prohibited word.
[6] 6 is an example of a screen for setting a publishable IP band and a non-postable IP band.
[7] 7 is an example of a screen for searching a computer information of a publisher through a WHOIS service.
[8] 8 is an example of a post displayed on an administrator screen.
[18] An electronic bulletin board system according to the present invention for achieving the above object is a publisher location tracking unit for extracting the publisher's initial location and MAC address and Internet address; A bulletin board operator configured to selectively process a post registration request by referring to the location information of the publisher and / or the result of the censoring of the post; And a publisher location / post database that stores the extracted Mac address and Internet address with the post.
[19] The bulletin board operating unit may include a hacking pattern database that stores a hacking pattern registered by an administrator; A hacking pattern search unit for searching whether a post and / or an attached file of a publisher includes a hacking pattern previously stored in the hacking pattern database; A prohibited word database for storing registered prohibited words registered by an administrator; And a prohibition word search unit for searching whether the prohibition word is stored in the prohibition word database.
[20] The publisher location tracking unit may include an initial location extracting unit that extracts an initial location of the publisher by using an agent that grasps the intermediate waypoint of the proxy server by including a Java applet in a post writing part of the publisher. .
[21] The publisher location tracking unit may further include a MAC address extracting unit extracting a MAC address using the original location of the publisher.
[22] In addition, the publisher location tracking unit, it is preferable to connect the location of the publisher to the WHOIS service to acquire the address information of the publisher using the inputted initial location information of the publisher.
[23] In addition, the bulletin board operation unit, Internet address band information database for storing the Internet address band information of users authorized to register the post; includes, and uses the initial location information of the publisher extracted by the first location extraction unit By identifying whether the publisher's initial location belongs to the Internet address band stored in the Internet address band information database, if the extracted publisher's initial location belongs to the stored Internet address band, it is preferable to normally register the post.
[24] In addition, the bulletin board operation unit, it is preferable to display the result of comparing the Internet address and the word and the hacking or a complex pattern of the input post composed of the administrator screen and the general user screen.
[25] In addition, the bulletin board operation unit displays the result of comparing the hacking or the complex pattern of the input posts with the Internet address composed of the administrator screen and the general user screen, and on the administrator screen the Internet address, words and hacking of the input posts And / or it is preferable to display the result of comparing the combined information by distinguishing the color.
[26] In addition, the electronic bulletin board system operation method according to the present invention for achieving the above another object is (a) extracting the publisher's initial location, MAC address and Internet address using the agent to determine the intermediate waypoint of the proxy server; (b) storing the post along with the Mac address and the Internet address; And (c) optionally processing the post registration request with reference to the location information of the publisher and / or the result of the censoring of the post.
[27] In addition, the step (a), (a-1) receiving a post registration request; (a-2) sending the agent to the user computer; (a-3) receiving publisher location information from a user computer by executing an agent; (a-4) sending the Mac address request to the user computer using the publisher location information; And (a-5) receiving the MAC address from the user computer.
[28] In addition, the step (a), (a-1) including the Java applet in the post writing portion of the publisher extracting the original location of the publisher; And (a-2) extracting the MAC address using the original location of the publisher.
[29] In addition, the step (a), it is preferable to include the step of acquiring the address information of the publisher by connecting the location of the publisher to the WHOIS service using the first location information of the publisher entered.
[30] In addition, the step (c), (c-1) Internet address band information of users authorized to register a post by the initial location of the publisher using the initial location information of the publisher extracted by the initial location extraction unit Identifying whether it belongs to an Internet address band previously stored in an Internet address band information database for storing the information; And (c-2) if the initial location of the publisher is identified as belonging to a pre-stored Internet address band in step (c-1), registering the post normally.
[31] In addition, if the electronic bulletin board system operating method is identified in step (c-1) that the publisher's initial location does not belong to a pre-stored Internet address band, (c-3) a hacking pattern in the publisher's posts and / or attachments. Determining whether the database includes a hacking pattern previously stored by the administrator; And / or (c-4) determining whether the prohibited word database includes a prohibited word previously stored by the administrator.
[32] In addition, the method of operating an electronic bulletin board system, after the step (c), (d) displaying the result of comparing the hacking or a complex pattern with the internet address and the word of the input post, by configuring the administrator screen and the general user screen. It is preferable to further include;
[33] In addition, the step (d), (d-1) comprising the step of configuring the administrator screen and the general user screen to display the result of comparing the Internet address and the word and hacking or complex patterns of the input post; And (d-2) displaying, on a manager screen, a color-coded display of a result of comparing an input post address with a word, hacking, and / or combination information thereof.
[34] In addition, the step (d), (d-1) comprising the step of configuring the administrator screen and the general user screen to display the result of comparing the Internet address and the word and hacking or complex patterns of the input post; And (d-2) displaying, on the administrator screen, a predetermined flag configured to include an internet address range, a prohibited word, and a hacking pattern of the input post, and / or to not display on the general user screen according to the administrator's selection; It is preferable to include.
[35] Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the present specification, as well as the preferred embodiment, further objects and effects will be more clearly understood through the following detailed description of the invention and the description of the embodiments with reference to the accompanying drawings.
[36] 1 is a block diagram illustrating a structure of an electronic bulletin board system according to an embodiment of the present invention, and FIG. 2 is a main step of a method of operating an electronic bulletin board system according to an embodiment of the present invention performed in the electronic bulletin board system of FIG. Are shown as a flow chart. 2 is often referenced below.
[37] Referring to FIG. 1, an electronic bulletin board system according to an embodiment of the present invention includes a publisher location tracking unit 10, a bulletin board operating unit 12, and a database unit 14. The publisher location tracking unit 10 includes an initial location extraction unit 102 and a MAC address extraction unit 104. In addition, the bulletin board operator 12 includes a hacking pattern searcher 122 and a prohibited word searcher 124, and the database unit 14 includes a publisher location / post database 142, a hacking pattern database 144, and a prohibition. A word database 146, an Internet address band information database 148, and an administrator database 150. According to the present invention, by inputting the hacking pattern by the administrator, by identifying the code that can hack a website or bulletin board in the post or upload file to determine whether to determine the post. To this end, the hacking pattern stored in advance by the administrator is stored in the hacking pattern database 144 in advance. 3 shows an example of a screen for the administrator to input a hacking pattern. Referring to FIG. 3, the administrator inputs a hacking pattern to be registered in advance in the input window 302 and stores the hacking pattern in the hacking pattern database 144 by clicking the insertion icon 304. 4 shows an example of a screen in which an administrator checks a hacking pattern. Referring to FIG. 4, the hacking pattern registered in advance is displayed in the display field 402 on the screen where the administrator confirms the hacking pattern. In addition, the forbidden word database 146 stores the forbidden words previously stored by the administrator in advance. 5 illustrates an example of a screen on which an administrator inputs a prohibited word. Referring to FIG. 5, an administrator may search for a prohibited word registered in advance by a manager in a screen for inputting a prohibited word. If a word pattern is entered in the search word input box 502 and the search icon is clicked, the result can be searched. In addition, when the administrator inputs a prohibited word pattern to be newly registered in the input field 504 and clicks the add icon 506, the prohibited word is stored in the prohibited word database 146. In addition, the Internet address band information database 148 stores Internet address band information of users authorized to register a post. 6 shows an example of a screen for setting a postable IP band and a non-postable IP band. Referring to FIG. 6, on a screen where an administrator sets a postable IP band and a non-postable IP band, a postable IP band is displayed in a display field 602 and a non-postable IP band in a display field 604.
[38] The operation of the electronic bulletin board system as described above will be described.
[39] First, when a post registration request is received from the user computer 16 (step 202), the initial location extracting unit 102 includes a Java applet in the post writing portion of the publisher to identify an intermediate route of the proxy server. Send to computer (step 204). The end user does not know that the agent is dispatched. By using a Java applet that runs automatically on the publisher's computer, the bulletin board system communicates with the publisher's computer to find out whether or not a proxy server is used.
[40] Korean Patent Application Publication No. 2001-0078887, filed on May 9, 2001 by the present applicant, and incorporated herein by reference, discloses an illegal intruder tracking system for finding illegal intruders invading a web server. According to the patent data, the agent is mounted in a web page displayed on the user's screen, and the user's information is transmitted to the agent server without the user's knowledge, and the illegal intruder's location is compared by comparing the transmitted information with HTTP header information generated when the user accesses it. Track information and waypoints. According to the invention, the first location of the publisher is extracted by using the agent.
[41] An agent, or intelligent agent, refers to a program that collects information or performs some other service on the Internet according to a predetermined schedule without an administrator's intervention. Typical agent programs include searching all or part of the internet using pre-supplied parameters to gather information of interest, and providing it daily or over time. Examples of agent programs include Pointcast Network ™ and URL-Minder ™, which inform users when a preconfigured web page changes. Other agent programs have been developed to provide individual information based on the information registered on a specific web site or performance analysis. Other types of agents include the role of a site watcher to notify you when a site has been updated or when an event is waiting for you, as well as analytical agents that organize and interpret information as well as gathering data for you. Such agents are sometimes called bots (short for "robots"). The technology of delivering the information collected by the agent to the user belongs to the push technology.
[42] Java ™ is a programming language specifically designed for use in the distributed environment of the Internet. Java looks like a C ++ language, but it is simpler to use than C ++ and enhances the full object-oriented nature of programming. Java can be used to create applications that run on a single computer or in a distributed client / server environment on a network. It can also be used to create small application modules or applets that are used as part of a web page. Applets allow users to interact with web pages. Applets are small applications. On the Web, programs written in small form that can be sent to the user with a web page using an object-oriented programming language such as Java are called applets.
[43] Next, when the agent is run in the browser of the user's computer, the publisher location information is received from the user's computer (step 206). In other words, if a Java applet sent to the bulletin board system is executed in the publisher's computer web browser, the original location is determined by the agent made of the Java applet even if the publisher conceals his location information to the proxy server.
[44] Next, the MAC address extracting unit 104 sends the MAC address request to the user computer using the publisher location information (step 208) and receives the MAC address from the user computer (step 210). That is, using the original location obtained in step 206, the bulletin board system can obtain the MAC address by requesting the MAC address of the corresponding IP. For efficient routing on the Internet, a 32-bit address given with the concept of matching a physical network address is called an IP address. IP addresses can be used to identify the network on which the host resides, as well as identify the only host on the network. IP addresses are divided into classes and all hosts in a network share the same prefix. The Internet address can be changed by the computer user. In the case of ADSL, the Internet address changes every time the Internet is accessed, but the MAC address is used by the MAC layer of the data link layer in the local area network As an address, it is the only address globally added to the hardware on the LAN card. This process can be used as legal evidence and the exact location of the computer where the post was posted when the post slandered someone or caused social problems.
[45] As a result, the publisher location tracking unit 10 extracts the publisher's initial location, MAC address, and Internet address. In the present embodiment, the MAC address extracting unit 104 acquires the address information of the publisher by connecting the publisher's location to the WHOIS service using the inputted publisher's initial location information. WHOIS ™ service refers to a service using a program that tells who owns a domain name. For example, if you enter a domain name in the search box of the WHOIS ™ service to know who owns a domain, WHOIS ™ tells you the owner of the domain name. This WHOIS ™ service is also used to determine if the domain name is already in use by someone else or if you can apply for it. If you enter a domain name of your choice in WHOIS or you receive a message saying "No match" or "The domain name is not registered," you can consider that domain as a new domain. . In Korea, WHOIS ™ provided by the Korea Internet Information Center, and in the United States, WHOIS ™ services of Network Solutions ™ can be used. There are programs that provide similar services on Gopher Servers, and some sites use WHOIS for internal organizational services. For example, you can find IBM employees at http://whois.ibm.com. Also uses WHOIS services to find information about students. 7 illustrates an example of a screen for inquiring a computer information of a publisher through a WHOIS service. Referring to FIG. 7, the MAC address 702 is displayed as the publisher computer information on the screen for inquiring the publisher's computer information through the WHOIS service.
[46] Next, the bulletin board operator 12 stores the Internet address band information of users authorized to register a post using the publisher's initial location information extracted by the initial location extraction unit 102. It identifies whether it belongs to the Internet address band previously stored in the Internet address band information database 148 (step 212). If the publisher's initial location is identified as belonging to the pre-stored Internet address band in step 212, the post is normally registered (step 214) and the publisher's Internet address and post is stored in the publisher location / post database 142 ( Step 216). With this feature, universities and some institutions allow postings only within the range of their Internet addresses. For example, you can implement an anonymous bulletin board that allows you to post only on a university campus network or post on a library bulletin only within a computer in the library.
[47] On the other hand, if in step 212 the publisher's initial location is identified as not belonging to the pre-stored Internet address band, then the publisher's Internet address and post is stored in the publisher location / post database 142 (step 218), and the post That is, it is determined whether the post and / or attachment of the publisher include the hacking pattern previously stored by the administrator in the hacking pattern database 144 (step 220). In this embodiment, the hacking pattern database 144 stores the hacking pattern registered by the administrator. If it is determined in step 220 that the post contains a hacking pattern previously stored by the administrator in the hacking pattern database 144, the hacking pattern is stored in the publisher location / post database 142 (step 222), and the publisher Notify that the post is not registered (step 224).
[48] There is a problem that the information can be obtained by executing the file using the upload file upload vulnerability of the bulletin board. For example, on Unix or Linux systems, you can upload files such as .php .ph to obtain local nobody permissions, obtain nobody permissions, and infiltrate the system through bindshell. . In order to prevent such a problem, in this embodiment, the administrator inputs a hacking pattern to identify a code for hacking a website or a bulletin board in a post or upload file to determine whether to judge the post. That is, if it is determined in step 220 that the post does not include the hacking pattern stored in advance in the hacking pattern database 144 by the administrator, the input post contains the banned words previously stored by the administrator in the prohibited word database 146. It is determined whether to include (step 230). If it is determined in step 230 that the post contains a forbidden word previously stored by the administrator, the prohibition pattern is stored in the publisher location / post database 142 (step 232) and the post has not been registered with the publisher. (Step 224).
[49] On the other hand, even if the publisher's initial location is identified as not belonging to the pre-stored Internet address band in step 212, the post does not include the hacking pattern pre-stored by the administrator in the hacking pattern database 144 in step 220. If it is judged not to be, and in step 230 it is not determined that the post includes a forbidden word stored in advance by the administrator, the post is normally registered (step 234), and the publisher is notified that the post has been registered (step 240). do. Thus, if there is no violation by comparing the hacking pattern and the word pattern for the article to be posted, the post registration notification is notified to the publisher. If it violates the word pattern and the hacking pattern, the publisher's location and postings are recorded in the post database and the publisher is notified that they could not be registered.
[50] In the bulletin board system as described above, the publisher location / post database 142 stores the location information of the user who posted the post along with the post, that is, the Mac address and the Internet address together with the post. Therefore, when a problem occurs in the content of the post can be used as a solid evidence of who the publisher.
[51] In addition, in this embodiment, the Internet address band information database 148 stores the Internet address band information of users authorized to register a post, and the bulletin board operator 12 is a publisher extracted by the initial location extracting unit. If the publisher's original location belongs to the Internet address band stored in the Internet address band information database 148 by using the initial location information of the publisher, the post is normally registered. do. The administrator computer 18 can access the bulletin board system using a web browser and manage the creation, modification, deletion, hacking patterns, words, and IP bands of the bulletin board.
[52] As a result, the bulletin board operator 12 selectively processes the post registration request with reference to the location information of the publisher and / or the result of the censoring of the post.
[53] In addition, in the present embodiment, the bulletin board operator 12 stores the post along with the Mac address and the Internet address in the publisher location / post database 142, and compares the input post with the internet address and the word and the hacking or complex pattern. The result is composed of the administrator screen and the general user screen, and the administrator screen displays the result of comparing the Internet address of the input post with the word and the hack and / or combination information thereof by color coding.
[54] 8 illustrates an example of a post displayed on an administrator screen. Referring to FIG. 8, in the administrator screen, an administrator may check the IP 802 of the proxy server if the IP 802, the Mac address 804, and the proxy server corresponding to the post of the publisher are used. If you access the bulletin board without using the proxy server, the part corresponding to the proxy IP is displayed as blank, and if you use the proxy IP, the corresponding proxy IP is displayed. In addition, if the post contains a hacking pattern, the post is marked in blue and the flag is checked and displayed only on the administrator screen. In addition, when the prohibition word is registered in advance, the post is displayed in a different color, for example, gray, from the post, and the flag 808 is checked and displayed only on the administrator screen. The general user screen is similar to a general bulletin board, so description thereof is omitted. In addition, if the IP band is set by the administrator and the publisher's location corresponds to the IP band, it is preferable to display the article in green. In addition, the word pattern, the hacking pattern, and the posts included in the two or more corresponding to the IP band are preferably displayed in yellow, for example, to be easily identified by the administrator. On the other hand, if it does not correspond to the word pattern, hacking pattern, and IP band, it is displayed in white for distinction. Posts included in the word pattern, hacking pattern, and IP pattern are set to be displayed only on the administrator screen by the flag checked and not to the general user. Of course, if you want to make the posts invisible to the public by the administrator, if you check the flag, the corresponding posts will not be shown to the general user.
[55] According to the above electronic bulletin board system and operation method, when a problem occurs in the contents of the post, the publisher can prepare as a solid evidence of who the publisher is, and through the extracted IP, the bulletin board can be used only by the relevant institution. have. In addition, the hacking pattern protects the web server from hacking by preventing the publisher from inserting the hacking code into the web server or posting it on the bulletin board. In addition, the word pattern can be used to prevent sexually explicit posts or swear words in the post. You can prevent disputes over posts that occur between publishers.
[56] Although the present invention has been disclosed for purposes of illustration and description, it is not intended to be limited to the form of the foregoing embodiment. Those skilled in the art will appreciate that many variations and modifications are possible. While the present invention has been selected and disclosed with respect to the preferred embodiments described above in order to illustrate the best principles of the invention, those skilled in the art will recognize that various modifications and changes can be made without departing from the spirit and scope of the invention. .
[57] As described above, according to the present invention, when a problem occurs in the content of a post, it is possible to keep certain evidence of who the publisher is, and to support the use of the bulletin board only in an institution entitled to use the bulletin board. In addition, by searching for hacking patterns and forbidden words, it is possible to effectively prevent a publisher from hacking a web server or posting obscene articles or abusive words.
权利要求:
Claims (17)
[1" claim-type="Currently amended] A publisher location tracking unit for extracting the publisher's original location, Mac address, and Internet address;
A bulletin board operator configured to selectively process a post registration request by referring to the location information of the publisher and / or the result of the censoring of the post; And
And a publisher location / post database for storing the extracted Mac address and Internet address with the post.
[2" claim-type="Currently amended] According to claim 1, The bulletin board operating unit,
A hacking pattern database for storing hacking patterns registered by an administrator;
A hacking pattern search unit for searching whether a post and / or an attached file of a publisher includes a hacking pattern previously stored in the hacking pattern database;
A prohibited word database for storing registered prohibited words registered by an administrator; And
And a prohibition word search unit for searching whether the prohibition word is stored in the prohibition word database.
[3" claim-type="Currently amended] The method of claim 1, wherein the publisher location tracking unit,
An electronic bulletin board system comprising: an initial location extracting unit for extracting a publisher's initial location by using a Java applet in a writing part of a publisher to identify an intermediate waypoint of a proxy server.
[4" claim-type="Currently amended] The method of claim 3, wherein the publisher location tracking unit,
The electronic bulletin board system of claim 1, further comprising a mac address extracting unit for extracting a mac address using the original location of the publisher.
[5" claim-type="Currently amended] The method of claim 4, wherein the publisher location tracking unit,
An electronic bulletin board system that uses the inputted location information of the publisher to connect the publisher's location to the WHOIS service to obtain the address information of the publisher.
[6" claim-type="Currently amended] According to claim 3, The bulletin board operating unit,
And an internet address band information database for storing internet address band information of users authorized to register a post.
The first location information extracted by the first location extracting unit is used to identify whether the publisher's original location belongs to the Internet address band stored in the Internet address band information database. If it belongs to an electronic bulletin board system, it characterized in that the normal post processing.
[7" claim-type="Currently amended] According to claim 1, The bulletin board operation unit,
An electronic bulletin board system, comprising an administrator screen and a general user screen for displaying a result of comparing an input post with an internet address, a word, and a hacking or complex pattern.
[8" claim-type="Currently amended] The method of claim 7, wherein the bulletin board operation unit,
The result of comparing the hacking or complex pattern of the entered post's internet address with words is displayed by organizing the administrator screen and the general user screen. The administrator screen shows the internet address and the word and the hack and / or combination thereof. An electronic bulletin board system, characterized in that the result of comparing the information displayed in color.
[9" claim-type="Currently amended] (a) extracting the publisher's initial location, Mac address and Internet address using an agent identifying the intermediate waypoint of the proxy server;
(b) storing the post along with the Mac address and the Internet address; And
(c) optionally processing the post registration request with reference to the location information of the publisher and / or the result of the censoring of the post.
[10" claim-type="Currently amended] The method of claim 9, wherein step (a) comprises:
(a-1) receiving a post registration request;
(a-2) sending the agent to the user computer;
(a-3) receiving publisher location information from a user computer by executing an agent;
(a-4) sending the Mac address request to the user computer using the publisher location information; And
(a-5) receiving a MAC address from a user computer.
[11" claim-type="Currently amended] The method of claim 9, wherein step (a) comprises:
(a-1) extracting the original location of the publisher by including a Java applet in the post writing part of the publisher; And
(a-2) extracting the MAC address using the original location of the publisher.
[12" claim-type="Currently amended] The method of claim 9, wherein step (a) comprises:
And connecting the publisher's location to the WHOIS service to obtain the address information of the publisher using the inputted publisher's initial location information.
[13" claim-type="Currently amended] The method of claim 9, wherein step (c) comprises:
(c-1) In the Internet address band information database that stores the Internet address band information of users authorized to register a post by using the initial location information of the publisher extracted by the initial location extracting unit. Identifying whether it belongs to a pre-stored Internet address band; And
(c-2) if the initial location of the publisher is identified as belonging to the pre-stored Internet address band in step (c-1), registering the post normally.
[14" claim-type="Currently amended] The method of claim 13, wherein in step (c-1), if the initial location of the publisher is identified as not belonging to a pre-stored Internet address band,
(c-3) determining whether the article and / or attachment of the publisher includes a hacking pattern previously stored by the administrator in the hacking pattern database; And / or
(c-4) determining whether a prohibited word stored in advance by the administrator is included in the prohibited word database.
[15" claim-type="Currently amended] The method of claim 9, wherein after step (c),
and (d) displaying the result of comparing the input post with an internet address, a word, and a hacking or complex pattern by configuring an administrator screen and a general user screen.
[16" claim-type="Currently amended] The method of claim 15, wherein step (d)
(d-1) displaying a result of comparing an internet address, a word, and a hack or a complex pattern of an input post by configuring an administrator screen and a general user screen; And
(d-2) In the administrator screen operation of the bulletin board system comprising the step of displaying the result of comparing the Internet address and the word and the hack and / or combination information thereof of the input posts by color; Way.
[17" claim-type="Currently amended] The method of claim 15, wherein step (d)
(d-1) displaying a result of comparing an internet address, a word, and a hack or a complex pattern of an input post by configuring an administrator screen and a general user screen; And
(d-2) displaying, on the administrator screen, a predetermined flag configured to include an internet address range, a prohibited word, a hacking pattern, and / or to be displayed on the general user screen according to the administrator's selection; Electronic bulletin board system operating method comprising a.
类似技术:
公开号 | 公开日 | 专利标题
US9923900B2|2018-03-20|Online privacy management system with enhanced automatic information detection
US9756068B2|2017-09-05|Blocking domain name access using access patterns and domain name registrations
US20180129818A1|2018-05-10|System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US9773109B2|2017-09-26|Alternate files returned for suspicious processes in a compromised computer network
US9065817B2|2015-06-23|Authenticating linked accounts
US9432403B2|2016-08-30|Method, system and computer program product for tagging content on uncontrolled web application
US8826155B2|2014-09-02|System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US9094434B2|2015-07-28|System and method for automated policy audit and remediation management
US9860251B2|2018-01-02|Dynamic encryption of a universal resource locator
Krishnamurthy et al.2009|On the leakage of personally identifiable information via online social networks
US8635536B2|2014-01-21|Third-party-secured zones on web pages
US9712457B2|2017-07-18|Server directed client originated search aggregator
US9391946B2|2016-07-12|System and method for enabling identification of network users having similar interests and facilitating communication between them
US9917827B2|2018-03-13|Internet server access control and monitoring systems
US8578481B2|2013-11-05|Method and system for determining a probability of entry of a counterfeit domain in a browser
Wang et al.2006|Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.
US7861285B2|2010-12-28|System, method and computer program product for authenticating users using a lightweight directory access protocol | directory server
DE69921455T2|2005-08-18|System and method for access control to stored documents
US10078660B2|2018-09-18|Methods and systems for presenting online content elements based on information known to a service provider
US10009356B2|2018-06-26|Redirection method for electronic content
DE69633564T2|2005-11-24|Access control and monitoring system for internet servers
KR100498052B1|2005-07-01|Method and apparatus for domain hosting by using logo domain
US7272639B1|2007-09-18|Internet server access control and monitoring systems
US8661119B1|2014-02-25|Determining a number of users behind a set of one or more internet protocol | addresses
US8688813B2|2014-04-01|Using identity/resource profile and directory enablers to support identity management
同族专利:
公开号 | 公开日
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
2001-11-16|Application filed by 정지후, (주)아이디에스테크날러지
2001-11-16|Priority to KR1020010071322A
2002-01-12|Publication of KR20020003327A
优先权:
申请号 | 申请日 | 专利标题
KR1020010071322A|KR20020003327A|2001-11-16|2001-11-16|Electronic bulletin board system|
[返回顶部]