Browse Prior Art Database

Mobile Phone Service that Controls the Access to the Harmful Web Sites (BMP)

IP.com Disclosure Number: IPCOM000015640D
Original Publication Date: 2002-Jul-01
Included in the Prior Art Database: 2003-Jun-20
Document File: 2 page(s) / 80K

Publishing Venue

IBM

Abstract

This business model is for cellular/mobile phone companies that provide the internet access service the users. The service restricts an access to the harmful x-rate internet web sites from the cellular/mobile phone.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Mobile Phone Service that Controls the Access to the Harmful Web Sites (BMP)

This business model is for cellular/mobile phone companies that provide the internet access service the users. The service restricts an access to the harmful ( x-rate ) internet web sites from the cellular/mobile phone.

Background: In the recent years, the use of the mobile phone is widespread among younger generations. If they wish, they can easily gain access to the harmful web sites. It is now common conception that the use of mobile phone for such purposes has an adverse effect on the sound growth of the youth. Also, the rapid increase of the crime originated from the malicious use of the mobile phone is also drawing high attention. Such situation is considered to be an obstacle to the further growth of mobile phone market.

Through this service, the mobile phone companies can obtain the benefit of:

Promotion of cellular mobile phone to younger generations. Easily charge on the service. Differentiation from the competitors. Development of the phone exclusively for the younger generations ( labeled "Harmful web site censored", for example. )

How it is accomplished:

Mobile Phone Maker:

Develop a cellular mobile phone that can include machine ID in the protocol. ( Implementation by either H/W or S/W would be acceptable. ) This can be accomplished by conforming to the standard protocol, for example, WAP (Wireless Application Protocol).

Mobile Phone Service Provider:

Set up two gateways (See the figure below.) The redirector redirects the request to eith...