Abstract: A computer system is configured to monitor and analyze the use of a client device by a minor and compute a risk for that minor. Examples of client devices include personal computers, laptops, cellular phones, “smart phones”, and other personal electronic devices. The analysis includes receiving text blocks from the client, processing the text block to discover “hit strings”, compute risk scores for the hit strings, and then to compute an overall risk score for the minor. A hit string is a string of characters such as a word or phrase that is indicative of a risk to the minor such as depression, “cyber bullying”, or an “adult predator”.
Type:
Application
Filed:
August 21, 2010
Publication date:
February 24, 2011
Applicant:
PARENTAL OPTIONS
Inventors:
Timothy A. Withers, Leonard W. Fisk, Jeffrey L. Rinek, Christopher J. Hopkins