January 04, 2007

Ronald J. DeHaas announces provisional patent pending status on his following
Invention:

System and method for blocking Internet access and/or applications when a specified string of characters is entered from a keyboard or other input device:

Many programs already provide methods of blocking access to the Internet. Programs also allow the capturing of keyboard entries, such that all typing on a keyboard (or other equivalent input device) would be stored for potential monitoring and/or filtering. However, there is a need for providing software which would allow a user to specify a string of characters (for instance, a home address or telephone number), and when that string of characters is entered, the same software would block access to specified protocols, or would terminate the Internet connection altogether. Therefore this invention claims the following System and Method.


Claim 1. Wherein a computer user would install a program on a computer device (such as a desktop, laptop, cell phone, pda, etc.) which: 1. permits the user to specify a string of keystrokes or other specified input characters; and 2. permits the user to specify Internet protocols that may be blocked by the software; and 3. when that specified string of keystrokes or other specified input characters is entered, blocks said computer from Internet access through said specified Internet protocols.
Claim 2. The system and method of claim 1 wherein all Internet protocols are blocked by terminating the Internet connection.
Claim 3. The system and method of claim 1 wherein said specified string of keystrokes or other specified input characters are stored internally on said computer.
Claim 4. The system and method of claim 1 wherein said computer user has secure means (such as password protection) to edit the string of keystrokes or other specified input characters.
Claim 5. The system and method of claim 1 wherein, when said string of keystrokes or other specified input characters are entered, said computer user is notified by telephone, email, or other electronic means.
Claim 6. The system and method of claim 1 wherein said computer user may provide, for himself or other desired users, a means of overriding said blocking of protocols or termination of Internet connection.
Claim 7. The system and method of claim 1 wherein said constraints are limited to specified time ranges throughout the day.
Claim 8. The system and method of claim 7 wherein specified time ranges may be different on different days, as specified.
Claim 9. The system and method of claim 1 wherein said computer device would have said program pre-installed and activated by said computer user.
Claim 10. Wherein a computer user would install a program on a computer device (such as a desktop, laptop, cell phone, pda, etc.) which: 1. permits the user to specify a string of keystrokes or other specified input characters; and 2. permits the user to specify computer programs and applications that may be disabled by the software; and 3. when that specified string of keystrokes or other specified input characters is entered, blocks said computer from using said programs.
Claim 11. The system and method of claim 10 wherein all programs are blocked by terminating the computer session.
Claim 12. The system and method of claim 10 wherein said specified string of keystrokes or other specified input characters are stored internally on said computer.
Claim 13. The system and method of claim 10 wherein said computer user has secure means (such as password protection) to edit the string of keystrokes or other specified input characters.
Claim 14. The system and method of claim 10 wherein, when said string of keystrokes or other specified input characters are entered, said computer user is notified by telephone, email, or other electronic means.
Claim 15. The system and method of claim 10 wherein said computer user may provide, for himself or other desired users, a means of overriding said disabling of programs or computer session.
Claim 16. The system and method of claim 10 wherein said constraints are limited to specified time ranges throughout the day.
Claim 17. The system and method of claim 16 wherein specified time ranges may be different on different days, as specified.
Claim 18. The system and method of claim 10 wherein said computer device would have said program pre-installed and activated by said computer user.