CFP last date
20 December 2024
Reseach Article

An Adult Site Access Verification System for Non-Adults

Published on March 2012 by Shalini Puri, Sona Kaushik
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 13
March 2012
Authors: Shalini Puri, Sona Kaushik
1865f28d-c6e6-4b26-9bb9-a971932d3879

Shalini Puri, Sona Kaushik . An Adult Site Access Verification System for Non-Adults. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 13 (March 2012), 15-20.

@article{
author = { Shalini Puri, Sona Kaushik },
title = { An Adult Site Access Verification System for Non-Adults },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 13 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 15-20 },
numpages = 6,
url = { /proceedings/icwet2012/number13/5408-1099/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Shalini Puri
%A Sona Kaushik
%T An Adult Site Access Verification System for Non-Adults
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 13
%P 15-20
%D 2012
%I International Journal of Computer Applications
Abstract

Internet is a huge information center and is used in everyday life essentially. Concerns and issues from parents regarding their children below the age of 18; i.e., unauthentic user surfing adult sites on the Internet, has been regularly reported. As just a careful self-watch by the parents does not get the solution to their concerns, so the proposed idea is to provide an automated system that help parents to stop their children from doing such activities. Therefore, an Adult Site Access Verification System (ASAVS) for non-adults is proposed, in which surfing of such objectionable sites by the users below the minimum legal age bounds can be highly reduced. This proposed system works in the service of the people of the nation to have a healthy and mature grown up of their kids. The possible embodiment of the proposal is to use a server program that includes the entrusted third party as a verifier of the user surfing on the Internet. This third party represents the national/government authority. The proposed system verifies the user authenticity who wants to access adult sites and contents by cross verification of the user credentials; a special password, called user key password. If user is an adult, then he/she can access such sites after successful authentication, otherwise the request will be denied as a non-adult will not have voter id number, driving license etc. or a special user key password. With this, an immediate SMS and a mail will be sent to the authenticated user’s mobile and email id to intimate him about such access. Therefore, if any user hits such URLs unintentionally, he/she gets a warning message and system asks the user to share the credentials for authentication of his/her legal age eligibility. As any unauthentic user will not be having third party registered credentials, thus if he/she uses parent’s or other’s information for authentication, the credentials owner will be immediately informed via SMS or email services

References
  1. Hamade, S. N. 2008. Internet Filtering and Censorship. IEEE 5th International Conference on Information Technology: New Generations (ITNG), pp. 1081-1086.
  2. Crystal Roberts, J. D. Internet Filtering and Blocking Technology.
  3. Sun, H. M. 2009. Recognizing Adult Image Groups Using Dynamically Optimized Parameter Settings. Journal of Computer Science and Application, pp. 57-70.
  4. www.labnol.org. Protect Your Kids from Adult Content on the Internet. Digital Inspiration.
  5. www.timesofindia.indiatimes.com. 2011. No Access to Pornography in Cyber Cafes, Declare New Rules (April 2011).
  6. Arch, A. 2008. Web Accessibility for Older Users: A Literature Review. W3C Working Draft (W3C).
  7. Shahreza, S. S. and Shahrez, M. S. 2008. Identifying Child Users: Is It Possible? IEEE SICE Annual Conference, pp. 3241-3244.
  8. Kim, Y. and Nam, T. 2006. An Efficient Text Filter for Adult Web Documents. IEEE Eighth International Conference on Advanced Communication Technology, (ICACT), pp. 438-440.
  9. Kim, S. H. and Jin, S. H. 2006. Virtual Route Scheme for Preventing Authentication Bypass in the WWW Environment. IEEE 8th International Conference on Advanced Communication Technology (ICACT), pp. 822-827.
  10. Fong, A. C. M. Hui, S. C. and Hong, G. Y. 2010. An Intelligent Offline Filtering Agent for Website Analysis and Content Rating. IEEE 2nd Symposium on Web Society (SWS), pp. 1-4.
  11. Wang, J. Li, B. Hu, W. and Wu o.. 2010. Horror Movie Scene Recognition Based On Emotional Perception. Proceedings of IEEE 17th International Conference on Image Processing (ICIP), pp. 1489-1492.
  12. Wang, J. Li, B. Hu, W. and Wu, O. 2011. Horror Video Scene Recognition via Multiple – Instance Learning. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1325-1328.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Adult Site Access Child Users Credentials