[go: up one dir, main page]

WO2001050364A1 - Procede de publicite en ligne sur reseaux informatiques - Google Patents

Procede de publicite en ligne sur reseaux informatiques Download PDF

Info

Publication number
WO2001050364A1
WO2001050364A1 PCT/KR2000/001373 KR0001373W WO0150364A1 WO 2001050364 A1 WO2001050364 A1 WO 2001050364A1 KR 0001373 W KR0001373 W KR 0001373W WO 0150364 A1 WO0150364 A1 WO 0150364A1
Authority
WO
WIPO (PCT)
Prior art keywords
web server
harmful information
client computer
contents
code module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2000/001373
Other languages
English (en)
Inventor
Yeon-Sub Jung
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inca Internet Co Ltd
Original Assignee
Inca Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inca Internet Co Ltd filed Critical Inca Internet Co Ltd
Priority to AU18997/01A priority Critical patent/AU1899701A/en
Publication of WO2001050364A1 publication Critical patent/WO2001050364A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E02HYDRAULIC ENGINEERING; FOUNDATIONS; SOIL SHIFTING
    • E02DFOUNDATIONS; EXCAVATIONS; EMBANKMENTS; UNDERGROUND OR UNDERWATER STRUCTURES
    • E02D1/00Investigation of foundation soil in situ
    • EFIXED CONSTRUCTIONS
    • E02HYDRAULIC ENGINEERING; FOUNDATIONS; SOIL SHIFTING
    • E02DFOUNDATIONS; EXCAVATIONS; EMBANKMENTS; UNDERGROUND OR UNDERWATER STRUCTURES
    • E02D17/00Excavations; Bordering of excavations; Making embankments
    • E02D17/18Making embankments, e.g. dikes, dams
    • EFIXED CONSTRUCTIONS
    • E02HYDRAULIC ENGINEERING; FOUNDATIONS; SOIL SHIFTING
    • E02DFOUNDATIONS; EXCAVATIONS; EMBANKMENTS; UNDERGROUND OR UNDERWATER STRUCTURES
    • E02D17/00Excavations; Bordering of excavations; Making embankments
    • E02D17/20Securing of slopes or inclines
    • E02D17/205Securing of slopes or inclines with modular blocks, e.g. pre-fabricated
    • EFIXED CONSTRUCTIONS
    • E02HYDRAULIC ENGINEERING; FOUNDATIONS; SOIL SHIFTING
    • E02DFOUNDATIONS; EXCAVATIONS; EMBANKMENTS; UNDERGROUND OR UNDERWATER STRUCTURES
    • E02D2600/00Miscellaneous
    • E02D2600/20Miscellaneous comprising details of connection between elements

Definitions

  • the present invention relates to an online advertising method carried out in conjunction with execution of an online harmful information blocking program capable of blocking in real time harmful information, for example, for computer viruses, over a computer network via which a client is linked to a web server.
  • the Web World Wide Web
  • the number of users on computer networks, and particularly, on the Internet is rapidly expanding.
  • Computer users are able to explore the Internet by launching a web browser and just clicking what they desire to access with a mouse, and are provided with a variety of useful resources or services through the Internet.
  • the Internet is no longer a new technology and service field in virtual space, but is getting into the realities of life.
  • a banner advertising technique which provides advertisements through hompages of popular web sites, is the predominant form of advertising on the Internet.
  • the key idea of such banner advertising is to impress all kinds of Internet users accessing popular web sites.
  • banner advertisements are inserted in a particular home page, so that the visitors are no longer impressed with the ads if they move to another web site. This is an inherent problem of the conventional banner advertising technique.
  • concerns about highly possible illegal extraction of personal information or damage caused by a variety of computer viruses through computer networks are also quickly increasing. The damage caused by harmful information such as computer viruses can be serious.
  • An existing counterplan for protection against various harmful information is based on the first damage/post-repair policy.
  • This protection counterplan assumes a passive position by taking measures (for example, follow-up development of appropriate antivirus programs) after computer systems have been suffered from unidentified harmful information.
  • Another disadvantage found in the protection policy lies in that a variety of antivirus programs for protecting against harmful information need to be manually installed on individual personal computers, which is an inefficient process overloading computer users with the installation activity. Furthermore, since various harmful information is created and distributed ever quickly through the Internet, it is not easy to consistently equip computers with the latest releases of antivirus programs.
  • an objective of the present invention to provide an online advertising method for offering advertisements (ads) on a computer network through which a web server and a client computer are linked to each other, wherein ad contents are displayed on a separate window or frame in conjunction with the execution of an online harmful information blocking program, which is automatically provided to and installed in the client computer to block in real time harmful information including computer viruses, upon accessing to the web server.
  • a method for providing advertisements (ads) on a computer network through which a first web server and a client computer are linked to each other comprising the steps of: (a) the first web server receiving a connection request from the client computer over the computer network; (b) the first web server transmitting a harmful information blocking code module and ad contents to the client computer; and (c) the harmful information blocking code module automatically running on the client computer to block in real time harmful information including computer viruses, and the ad contents delivered in step (b) being displayed on a separate window, wherein when the ad contents display window is closed, the execution of the harmful information blocking code module is aborted.
  • step (c) the running status of the harmful information blocking code module may be also displayed on the ad contents display window. It is preferable that the ad contents delivered in step (b) and displayed in step (c) are periodically updated by a server push or client pull technique. The ad contents delivered in step (b) and displayed in step (c) may contain a plurality of banner images.
  • the harmful information blocking code module transmitted in step (b) may be an ActiveXTM or JavaTM program. It is preferable that the harmful information blocking code module running in step (c) and the ad contents display window remain activated even when the client computer accesses another web server.
  • the client computer is primarily connected to a second web server and requests a connection to the first web server using information provided by the second web server.
  • the ad contents delivered in step (b) may be designated by the second web server.
  • the present invention provides a method for providing advertisements (ads) on a computer network through which a first web server and a client computer are linked to each other, the method comprising the steps of: (a) the first web server receiving a connection request from the client computer over the computer network; (b) the first web server transmitting a harmful information blocking code module and ad contents including a plurality of banner images to the client computer; (c) the harmful information blocking code module automatically running on the client computer to block in real time harmful information including computer viruses, and the ad contents delivered in step (b) being displayed on a separate window; and (d) when each of the plurality of banner images is copied to a predetermined application program which is downloaded from the first web server and runs on the client computer, using a drag and
  • Step (d) preferably includes: (d1) when each of the plurality of banner images is copied to a predetermined application program which is downloaded from the first web server and runs on the client computer, using a drag and drop technique, the client computer informing the first web server of the occurrence of the drag and drop event; (d2) the first web server sending ads e-mails associated with each of the plurality of banner images downloaded; and (d3) the first web server providing a predetermined compensation to the client computer if the reception of the e-mails sent in step (d2) is ascertained.
  • the present invention provides a method for providing advertisements (ads) on a computer network through which a first web server and a client computer are linked to each other, the method comprising the steps of: (a) the first web server receiving a connection request from the client computer over the computer network; (b) the first web server transmitting a harmful information blocking code module and ad contents including a plurality of banner images to the client computer; (c) the harmful information blocking code module automatically running on the client computer to block in real time harmful information including computer viruses, and the ad contents delivered in step (b) being displayed on a frame created in a specific area of a web browser screen; and (d) when each of the plurality of banner images is copied to a predetermined application program which is downloaded from the first web server and runs on the client computer, using a drag and drop technique, the first web server providing a predetermined compensation to the client computer, wherein when the ad contents display frame is closed, the execution of the harmful information blocking code is aborted.
  • step (d) includes: (d1 ) when each of the plurality of banner images is copied to a predetermined application program which is downloaded from the first web server and runs on the client computer, using a drag and drop technique, the client computer informing the first web server of the occurrence of the drag and drop event; (d2) the first web server sending ads e-mails associated with each of the plurality of banner images downloaded; and (d3) the first web server providing a predetermined compensation to the client computer if the reception of the e-mails sent in step (d2) is ascertained.
  • a method for providing advertisements (ads) on a computer network through which a first web server and a client computer are linked to each other comprising the steps of: (a) the first web server receiving a connection request from the client computer over the computer network; (b) the first web server transmitting a harmful information blocking code module and ad contents to the client computer; and (c) the harmful information blocking code module automatically running on the client computer to block in real time harmful information including computer viruses, and the ad contents delivered in step (b) being displayed on a frame created in a specific area of a web browser screen, wherein when the ad contents display frame is closed, the execution of the harmful information blocking code is aborted.
  • step (c) a predetermined icon associated with the ad contents display frame, which is kept consistent when the web browser is launched again, is created on a tool bar of the web browser, and the client computer is automatically connected to the first web server by just clicking the predetermined icon.
  • the running status of the harmful information blocking code module may also displayed on the ad contents display frame.
  • the present invention provides a method for providing advertisements (ads) on a computer network through which a first web server and a client computer are linked to each other, the method comprising the steps of: (a) the first web server receiving a connection request from the client computer over the computer network; (b) the first web server transmitting a harmful information blocking code module and ad contents including a plurality of banner images to the client computer; (c) the harmful information blocking code module automatically running on the client computer to block in real time harmful information including computer viruses, and the ad contents delivered in step (b) being displayed on a frame created in a specific area of a web browser screen; and (d) when each of the plurality of banner images is copied to a predetermined application program which is downloaded from the first web server and runs on the client computer, using a drag and drop technique, the first web server providing a predetermined compensation to the client computer, wherein when the ad contents display frame is closed, the execution of the harmful information blocking code is aborted.
  • the present invention provides a method for providing advertisements (ads) on a computer network through which a web server and a client computer are linked to each other, the method comprising the steps of: (a) the web server receiving a connection request from the client computer over the computer network; and (b) the web server transmitting a harmful information blocking code module to automatically run on the client computer and block in real time harmful information including computer viruses, and ad contents to be displayed on a separate window or a frame created in a specific place of a web browser screen, to the client computer, wherein when the ad contents display window or frame is closed, the execution of the harmful information blocking code module is aborted.
  • FIGS. 1A and 1 B are schematic views of systems applied to implement the present invention.
  • FIGS. 2A and 2B are flowcharts illustrating preferred embodiments of a method for offering online advertisements (ads) along with an online harmful information blocking code module according to the present invention
  • FIG. 3 is a schematic view showing the configuration of an example of a harmful information blocking code module adopted in the present invention
  • FIG. 4 is a flowchart illustrating the operation of the harmful information blocking code module shown in FIG. 3;
  • FIG. 5 illustrates a graphic screen on which ad contents are displayed in conjunction with the execution of the online harmful information blocking code module;
  • FIG. 6 illustrates another graphic screen on which ad contents are displayed in conjunction with the execution of the online harmful information blocking code module.
  • a harmful information management server 110 which is a web server, has a homepage, and is linked with a client computer 130 via a computer network, such as the
  • the harmful information management server 110 provides an online service for providing a harmful information blocking code module (including associated online advertisement (ad) contents), which is capable of blocking in real time harmful information, to the client computer 130.
  • a harmful information blocking code module including associated online advertisement (ad) contents
  • “harmful information” collectively refers to an undesirable object or action that adversely effects computer systems and/or computer networks, including computer viruses, undesirable lascivious web sites on the Internet, and the act of illegally extracting personal information.
  • FIG. 2A A first embodiment of a method for offering online advertising in connection with a harmful information blocking code module will be described with reference to FIG. 2A.
  • An example of graphic screen on which ad contents are displayed in connection with the harmful information blocking code module is shown in FIG. 5.
  • the method begins with a homepage being constructed for online services on the harmful information management server 110 (step 210).
  • a computer user launches a web browser on the client computer (hereinafter, referred to as merely "client") 130 (step 220).
  • client 130 is connected to the harmful information management server 110 (step 240).
  • the harmful information management server 110 transmits a harmful information blocking code module and ad contents to the client 130 (step 250).
  • the connection between the client 130 and the harmful information management server 110 is accomplished by a HyperText Transfer Protocol formatted request (HTTP request), and the transferring of the harmful information blocking code module from the harmful information management server 110 to the client 130 is performed by a HTTP response.
  • HTTP request is carried out by typing the Universal Resource Locator (URL) of the harmful information management server 110 or clicking a hyperlink associated with the URL on the web browser.
  • URL Universal Resource Locator
  • the harmful information blocking code module is an executable application program which runs on the client 130.
  • the harmful information blocking code module is an executable application program which runs on the client 130.
  • an object coded program designed with a high-level language may be linked to a web browser to run.
  • the harmful information blocking code module transferred in step 250 is automatically executed on the client 130 and blocks in real time harmful information including computer viruses, and the ad contents transferred in step 250 are displayed in a separate window (step 260).
  • the ad contents transferred in step 250 can be displayed by creating a frame in a predetermined portion of the web browser screen. This will be described later.
  • the harmful information management server 110 For the display of ad contents in a separate window, it is preferable that when the client 130 is connected to the harmful information management server 110, the harmful information management server 110 provides an HTTP response, which enables the creation of a window, to the client 130, and then provides the ad contents as an HTTP response with respect to an HTTP request issued from the client 130, through the separate window.
  • the harmful information blocking code module and the ad contents are operated/managed in conjunction with each other, and thus it is preferable to display a running status of the harmful information blocking code module and the ad contents on the same window.
  • the client 130 may request the harmful information management server 110 to provide both the harmful information blocking code module and the ad contents through a separate window created as an HTTP response from the harmful information management server 110.
  • the harmful information management server 110 provides an HTTP response such that the client 130 is able to request the harmful information blocking code module and ad contents through a separate window.
  • the window is closed, the execution of the harmful information blocking code and the display of ad contents are aborted.
  • the client 130 may be connected to the harmful information management server 110 through each of the frames within the same window.
  • the separate connections for the harmful information blocking code module and the ad contents can be achieved in parallel.
  • FIG. 5 illustrates a graphic screen displaying the running status of the harmful information blocking code module and the ad contents in different frames within the separate window. Since the harmful information blocking code module and the ad contents are provided through the window and then run in real time on the client 130, the execution of the harmful information blocking code module and the ad contents is continued on the client 130 even when the client 130 accesses another web server. Thus, the client 130 can be provided with a harmful information blocking service for security in real time by accessing the harmful information management server 110 only once.
  • the ad contents transferred in step 250 and displayed on the separate window in step 260 may include a plurality of banner images, which can be periodically updated by a server push or client pull technique.
  • the server push technique supports the server's periodic data transfer to the client even when there is no request from users. This technique is extensively applied to online stock information service sites.
  • the client pull supports the transfer of a client's HTTP request to the server even when there is no request from users. This is implemented by setting a timer at a sever's HTTP response to count the time period between the server's HTTP response and the next client's HTTP request.
  • the client 120 can be optionally provided with a compensation event for the client' dragging and dropping of ad banner images (step 270).
  • a particular object on the window is clicked with a button (left button) of a mouse, dragged by moving the mouse, and then dropped by releasing the mouse button to move the object (or a copy).
  • the harmful information management server 110 For the compensation event for the dragging & dropping of banner images in step 270, there is a need to download and run on the client 130 a predetermined application program for communications between the client 130 and the harmful information management server 110.
  • a user's preregistration in the harmful information management server 110 is required to receive the benefits of the compensation.
  • the harmful information management server 110 is informed of the dragging and dropping of the images, and provides a predetermined compensation to the user.
  • the information provided to the harmful information management server 110 can be utilized for statistical purposes, for example, relating information on effectiveness of the advertisement to the client 130.
  • the drag & drop based advertising technique described in the present embodiment is applicable in connection with e-mail services.
  • the harmful information management server 110 e-mails ads relating to the banner images selected through the drag & drop event by the user, or directs advertisers to send such mails to the user.
  • a predetermined compensation is provided.
  • the execution of the harmful information blocking code module is also aborted (step 280).
  • FIG. 1 B illustrates the configuration of a system applied for the second embodiment according to the present invention
  • FIG. 2B is a flowchart illustrating the second embodiment of the method for offering online ads along with an online harmful information blocking code module according to the present invention.
  • the system further comprises a web server 120
  • second web server other than the harmful information management server 1 10, for providing online services on a network.
  • the second web server 120 is a common web sever linked with a client system via a computer network such as the Internet.
  • the client 130 primarily accesses the second web server 120 (step 230).
  • the second web server 120 provides hyperlink information for use in accessing the harmful information management server 110 as well as information relating to online services to the client 130 (step 235). It is preferable that the hyperlink information is not link information for the front
  • the client 130 performs an HTTP request to the harmful o information management server 110, according to the hyperlink information from the second web server 120 (step 245).
  • the harmful information management server 110 transmits the harmful information blocking code module and ad contents, which are an HTTP response with respect to the HTTP request issued from the client 130, to the client 130 (step 255).
  • the harmful information blocking code module is automatically executed on the client 130 to block in real time harmful information including computer viruses, and outputs the ad contents on a separate window (step 260), as in the first embodiment. It is preferable that the harmful 0 information blocking code module and ad contents are managed through separate frames within the same window, as in the first embodiment.
  • the second web server 120 it is preferable to support the second web server 120 to designate link information relating to the ad contents.
  • the ad contents provided to the client 130 can be varied by various 5 web servers which the client 130 visits in the course of connecting to the harmful information management server 110. It is apparent that the ad contents may be periodically updated by the server push or client pull technique.
  • the client 120 can be optionally o provided with a compensation event for the client's dragging and dropping of banner images of the ad contents (step 270).
  • the execution of the harmful information blocking code module is also aborted (step 280). While in the first and second embodiments the ad contents are displayed on a separate window, the ad contents can be output on a frame created for displaying the ad contents in a specific place on the web browser screen.
  • FIG. 6 illustrates a graphic screen on which ad contents are displayed on a separate frame in conjunction with the execution of the online harmful information blocking code module.
  • the ad contents delivered from the harmful information management server 110 are displayed on a new frame created in a specific place on the web browser screen of the client.
  • the new frame which displays the ad contents is shown in the lower portion of the web browser screen in FIG. 6, but the frame can be located in another portion (for example, on the left or right) of the web browser.
  • the frame includes a sub-frame on which ad contents are output and a sub-frame on which information on running status of the harmful information blocking code module are output.
  • the harmful information blocking code module and ad contents are managed through separate frames within the window. Even when the client 130 accesses another web server, the display of ad contents through the frame is continued. When the frame for ad contents is closed, the execution of the harmful information blocking code module is also aborted.
  • the ad contents may contain a plurality of banner images, and can be updated periodically by the server push or client pull technique.
  • additional compensation events can be served for the client's dragging & dropping of ad banner images, and for the client's reception of an e-mail with ads associated with the banner image dragged and dropped by the user.
  • the connecting of the client 130 to the harmful information management server 110 can be established using the link information provided from another web server, such as the second web server 120 shown in FIG. 1 B.
  • the ad contents can be designated by the second web server 120.
  • the mechanism of providing ad contents in the present embodiment is similar to that described with reference to FIG. 5, except that a new frame, rather than a separated window, is created on the web browser screen to display the ad contents thereon.
  • the frame for displaying the ad contents is based on the web browser, the ad display frame is aborted when the web browser is closed.
  • a predetermined icon associated with the frames displaying the ad contents and the running status of the harmful information blocking code module for example, an icon appearing along with the text "security" in FIG. 6, is created on the tool bar of the web browser. More preferably, the related icon is kept consistent in the tool bar when the web browser is launched again. In this way, a window registry relating to the web browser must be changed.
  • the automatic connecting to the harmful information management server 110 which is established by just clinking the related icon, is favorable in terms of user interface.
  • the preferred embodiments of the online advertising method have been described. Now, the harmful information blocking code module for blocking harmful information, which is executed in conjunction with the display of ad contents, will be described.
  • FIG. 3 shows the configuration of an example of the harmful information blocking code module adopted in the present invention.
  • the harmful information blocking code module includes an input/output management unit 310, a harmful information blocking unit 320, and an information transferring unit 330.
  • the harmful information blocking code module is executed in connection with the separate window or frame 340 on which its running status and ad contents are displayed. When the window or frame 340 is closed, the execution of the harmful information blocking code module is aborted as described previously.
  • the input/output management unit 310 inspects file input/output (I/O) on the client 130.
  • the inspection of the file I/O refers to the action taken to get file information by hooking up file I/O routines.
  • the input/output management unit 310 also inspects network packet I/O on the client 130 so as to block harmful information from the network.
  • a computer virus capable of illegally extracting personal information such as the Back Orifice virus, may be blocked by checking file I/O, or checking processes, which will be described below.
  • the input/output management unit 310 further has a function for monitoring any Internet address that the client 130 attempts accessing, which prevents computer users from accessing undesirable lascivious web sites.
  • the harmful information blocking unit 320 diagnoses whether or not a file or packet is harmful, and takes appropriate remedial action if the file or packet is harmful.
  • the information transferring unit 330 informs the harmful information management server 110 of information on the file or packet determined to be harmful.
  • the harmful information blocking code module which is automatically executed on the client 130, inspects whether processes currently running on the client 130 are harmful or not (step 410). This is because all future processes can be influenced by the current processes in memory. Another reason for this is that the Back Orifice virus capable of illegally extracting personal information from a system, which operates in the form of processes and enables an external computer system to remote control a user computer.
  • a method for checking whether or not processes are harmful involves making a list of the ongoing processes loaded in the memory, and examining whether the files corresponding to each of the processes are harmful or not. If a file is determined to be harmful, the corresponding process is determined to be a harmful process and is then aborted. It is appreciated that an appropriate treatment may also be performed on the corresponding harmful file.
  • the harmful information blocking code module informs a user of the presence of the harmful information, and requests the user's approval to take remedial action.
  • the harmful information blocking code module inspects every file I/O on the client 140 (step 420).
  • the file I/O inspection is performed by hooking up file I/O routines.
  • VxD which is the I/O routine under the Windows environment, may be hooked up for the inspection.
  • network packet I/O may be inspected along with the file I/O so as to block harmful information infiltrating from a network, which was also previously mentioned.
  • the network packet I/O inspection may be accomplished by hooking up socket I/O routines (such as the so-called
  • Winsock module in the Windows environment.
  • any Internet address that the client 130 attempts to access may be further monitored, which prevents the accessing of undesirable lascivious web sites.
  • This monitoring for preventing undesirable accessing can be accomplished by checking the header of an HTTP request message or a Domain Name Service (DNS) lookup message.
  • DNS Domain Name Service
  • step 420 may involve additional functions for checking for possible occurrences of harmful information on the client 130. Subsequent operations of the harmful information blocking code module will be described with reference to file I/O inspection, however, file I/O inspection is only an example and should not be contrived as limiting the scope of the invention.
  • step 430 it is determined whether files which are monitored in step 420 are harmful or not (step 430).
  • This determination can be performed by various methods, according to the type of harmful information or the necessities of applications. For example, a pattern comparison with known harmful information, for example, identified computer viruses, may be performed for the purpose of the determination.
  • a pattern comparison with known harmful information for example, identified computer viruses, may be performed for the purpose of the determination.
  • computer viruses operate in a predetermined pattern, and thus the pattern comparison technique can be a tool for identifying new species of viruses.
  • step 430 it is preferable to make a determination as to whether or not a network packet is harmful, or whether the client 130 attempts to access an undesirable lascivious web site.
  • the harmful information code module performs no specified treatment on the file. Accordingly, a user is allowed to continue his or her task on the client 130 irrespective of the harmful information code blocking module.
  • the monitored information is determined to be harmful, it is further determined whether the monitored information is related to file I/O or packet I/O to provide a proper treatment consistent with the harmful file or packet.
  • file I/O or packet I/O to provide a proper treatment consistent with the harmful file or packet.
  • HTTP request message can be reformulated to guide the client 130 to a desirable web site good for users.
  • step 450 it is determined whether the harmful file can be properly treated.
  • step 454 If the treatment is possible, the corresponding file is treated (step 454). If the treatment is impossible, execution of the corresponding file is merely aborted (step 452). In step 454, it is preferable to notify a user that harmful information was detected, and to request approval for performing treatment on the harmful information.
  • the harmful information management server 110 it is preferable to notify the harmful information management server 110 if information indicative of harmful information is detected from the client 130 online, using the harmful information blocking code module (step 470). If the detected information is a new kind of harmful information and thus cannot be treated, it is preferable to transmit the entire file related to the unidentified harmful information to the harmful information management server 110. Of course, it is preferable to get pre-approval regarding notification of the harmful information detection and/or the transmission of the unidentified harmful information file to the harmful information management server 110.
  • the present embodiment provides the function of automatically providing the harmful information management server 110 with information on harmful information detected in the client 130.
  • the harmful information management server 110 is allowed to acquire statistical data on harmful information, and can thus instantaneously counteract the occurrence of an unidentified computer virus, for example, by developing an effective antivirus program.
  • the harmful information management server 110 analyzes the unidentified harmful information from the client 130 to develop a proper treatment program, and provides an appropriate security service for blocking harmful information from attacking the client 130, with the latest version of the harmful information blocking code module. Therefore, the present invention can prevent user computers operating in an open network environment from damage caused by various harmful information.
  • a communications channel for use by the harmful information blocking code module in automatically transmitting harmful information to the harmful information management server 110 may be implemented with Internet mail transfer protocol such as Simple Mail Transfer Protocol (SMTP), or File Transfer Protocol (FTP). More preferably, a specified communication channel is provided exclusively for the transmission of the harmful information.
  • SMTP Simple Mail Transfer Protocol
  • FTP File Transfer Protocol
  • step 440 if it is determined in step 440 that harmful information is related to the packet I/O, a communication port assigned for the packet I/O is blocked (step 460). If internal processes for supporting the network packet I/O via the communication channel is in progress, it is preferable to abort the processes.
  • step 462 a proper treatment is performed on the harmful information infiltrating through the communications port in a similar way as for the harmful information related with the file I/O (step 462).
  • step 470 the harmful information management server 110 is informed of the detection of the harmful information from the network packet I/O.
  • the present embodiments may be implemented as a computer readable program code.
  • the invention may be embodied in a general purpose digital computer by running a program from a computer readable medium, including but not limited to magnetic storage media (e.g., ROM's, floppy disks, hard disks, etc.), optically readable media (e.g., CD-ROMs, DVDs, etc.) and carrier waves (e.g., transmissions over the Internet).
  • magnetic storage media e.g., ROM's, floppy disks, hard disks, etc.
  • optically readable media e.g., CD-ROMs, DVDs, etc.
  • carrier waves e.g., transmissions over the Internet
  • the harmful information blocking program upon the connecting of the client system to the harmful information management server on a computer network, the harmful information blocking program is automatically provided to and installed in the client system, so that harmful information detected on the client system can be actively blocked in real time.
  • the harmful information blocking program is provided along with ad contents, and management of the program and the ad contents is performed through the same window or frame, thereby boosting effectiveness of the advertisement.
  • the ad display window or frame which is managed in connection with the harmful information blocking program, remains displayed on the client's screen, thus enhancing effectiveness of the advertisement.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mining & Mineral Resources (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Paleontology (AREA)
  • Civil Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Structural Engineering (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Soil Sciences (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Cette invention concerne un procédé de publicité en ligne sur un réseau d'ordinateurs au sein duquel sont reliés un serveur Internet et un système client, le procédé de publicité en ligne allant de pair avec un programme en ligne de blocage d'informations nuisibles, dont des virus informatiques. Le procédé de publicité en ligne comprend un premier serveur Internet qui reçoit une demande de connexion de la part d'un ordinateur client via le réseau informatique. Ce premier serveur transmet alors un module avec code de blocage d'informations nuisibles et des contenus publicitaires à l'ordinateur client. Le module avec code de blocage d'informations nuisibles, notamment de virus informatiques, intervient automatiquement en temps réel sur l'ordinateur client, cependant que les contenus publicitaires sont affichés dans une fenêtre séparée. Ainsi, lorsque la fenêtre d'affichage des contenus publicitaires se ferme, la mise en oeuvre du module de blocage d'informations nuisibles est interrompue. Le programme de blocage d'informations nuisibles en temps réel et les contenus publicitaires, qui sont transmis automatiquement dès que l'ordinateur client est connecté au serveur Internet, sont gérés dans la même fenêtre ou le même cadre. De plus, la fenêtre ou le cadre restent actifs même lorsque le client accède à un autre serveur Internet, ce qui accroît l'efficacité de la publicité.
PCT/KR2000/001373 1999-12-31 2000-11-28 Procede de publicite en ligne sur reseaux informatiques Ceased WO2001050364A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU18997/01A AU1899701A (en) 1999-12-31 2000-11-28 Online advertising method on computer networks

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR19990068606 1999-12-31
KR1999/68606 1999-12-31
KR2000/11284 2000-03-07
KR1020000011284A KR100684987B1 (ko) 1999-12-31 2000-03-07 인터넷을 이용한 전자상거래 시스템에서의 유해정보 및 해킹 차단방법

Publications (1)

Publication Number Publication Date
WO2001050364A1 true WO2001050364A1 (fr) 2001-07-12

Family

ID=26636629

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2000/001373 Ceased WO2001050364A1 (fr) 1999-12-31 2000-11-28 Procede de publicite en ligne sur reseaux informatiques

Country Status (3)

Country Link
KR (1) KR100684987B1 (fr)
AU (1) AU1899701A (fr)
WO (1) WO2001050364A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1303540C (zh) * 2003-05-12 2007-03-07 英业达股份有限公司 在客户端实时显示服务器端程序运行情况的方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100609839B1 (ko) * 2004-06-08 2006-08-08 (주)파인핸즈 인터넷 유해정보 접촉 관제방법

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10240828A (ja) * 1997-02-28 1998-09-11 Net Biretsuji Kk 広告配信サービスシステム
JPH10320336A (ja) * 1997-04-14 1998-12-04 Adletts Internatl Llc 空き時間中に表示する目的でインターネットにネットワーク接続されたクライアントのデータストリーム内に広告等を挿入するための方法及び装置
JPH1125176A (ja) * 1997-07-03 1999-01-29 Fujitsu Ltd 告知情報の作成発信装置
US6014698A (en) * 1997-05-19 2000-01-11 Matchlogic, Inc. System using first banner request that can not be blocked from reaching a server for accurately counting displays of banners on network terminals

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5960170A (en) * 1997-03-18 1999-09-28 Trend Micro, Inc. Event triggered iterative virus detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10240828A (ja) * 1997-02-28 1998-09-11 Net Biretsuji Kk 広告配信サービスシステム
JPH10320336A (ja) * 1997-04-14 1998-12-04 Adletts Internatl Llc 空き時間中に表示する目的でインターネットにネットワーク接続されたクライアントのデータストリーム内に広告等を挿入するための方法及び装置
US6014698A (en) * 1997-05-19 2000-01-11 Matchlogic, Inc. System using first banner request that can not be blocked from reaching a server for accurately counting displays of banners on network terminals
JPH1125176A (ja) * 1997-07-03 1999-01-29 Fujitsu Ltd 告知情報の作成発信装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1303540C (zh) * 2003-05-12 2007-03-07 英业达股份有限公司 在客户端实时显示服务器端程序运行情况的方法

Also Published As

Publication number Publication date
KR20000030564A (ko) 2000-06-05
AU1899701A (en) 2001-07-16
KR100684987B1 (ko) 2007-02-22

Similar Documents

Publication Publication Date Title
USRE42196E1 (en) System and method for blocking harmful information online, and computer readable medium therefor
US7831672B2 (en) Systems and methods for securing computers
US10027690B2 (en) Electronic message analysis for malware detection
US6968507B2 (en) Method and apparatus for defeating a mechanism that blocks windows
US7996902B1 (en) System and method for certifying that data received over a computer network has been checked for viruses
EP1288767B1 (fr) Mise à jour des fichiers informatiques
US8219849B2 (en) Method and apparatus for controlling a computer over a wide area network
EP2053555A1 (fr) Procédé et appareil de détection de la fraude cliquée
NZ569980A (en) Network devices for replacing an advertisement with another advertisement
US20040006715A1 (en) System and method for providing security to a remote computer over a network browser interface
US20070300178A1 (en) Handling of secondary pop-ups or pop-behinds within a web browser
WO2001050364A1 (fr) Procede de publicite en ligne sur reseaux informatiques
WO2006052714A2 (fr) Appareil et procede pour proteger des systemes de communication
CN1661982B (zh) 自动配置访问控制的方法和系统
US20050010814A1 (en) System and method for preventing and delaying the distribution of electronic mail virus
US20160378982A1 (en) Local environment protection method and protection system of terminal responding to malicious code in link information
KR20220037803A (ko) 인터넷을 활용한 전자상거래 시스템에서의 해킹 차단방법
CA2548783A1 (fr) Procede et dispositif pour service d'appel client
KR20030003640A (ko) 웜 바이러스 경고 메일 및 웜 백신 자동 발송 방법 및시스템
KR20030021859A (ko) 무선 웜 바이러스 경고 메시지 자동 발송 방법 및 시스템
Brusco Implementing safe computer practices
Hintz Internet Privacy-Fact or Fiction?
KR20070114674A (ko) 무선 바이러스 처리 서버
KR20060108575A (ko) 무선 웜 바이러스 경고 메시지 자동 발송 시스템

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC (COMMUNICATION OF 17-01-2003, EPO FORM 1205)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP