Advertisement

Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment

  • Namje Park
  • Youngsoo Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6422)

Abstract

This paper provides a privacy-enhanced method of verifying adults in mobile RFID environment. It can be applied to check whether a user is an adult or not when he or she would like to use some adult contents using mobile terminals playing a role of tag readers in mobile RFID environment. Instead of current adult verification method utilizing the user’s own mobile terminals, the proposed method uses any mobile terminal and provides users with anonymity. Additionally, instead of a conventional rating system based on the user’s age, we proposed four-level rating system (0 to 3) in detail. The adult content is classified based on each category (for example, swear word, nudity, sex, and foul language) and the rating information gets assigned to the adult content based on each category. The rating information is assigned to the user data region of the RFID tag. Through this method, the rating of multi-media content can be expressed with respect to each category using the detailed rating criteria. The weight factors may be differently applied to the categories according to applications.

Keywords

Mobile Terminal Rating Information Content Provider Trusted Third Party User Terminal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    MRF Forum: Adult Certification for Mobile RFID Services. MRFS-4-04 (2005) Google Scholar
  2. 2.
    BBC News: Children can access mobile porn, http://news.bbc.co.uk/1/hi/uk/4671334.stm
  3. 3.
    Lubinski, A.: Security issues in mobile database access. In: Proc. of the IFIP WG 11.3 Twelfth International Conference on Database Security (1998)Google Scholar
  4. 4.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)CrossRefGoogle Scholar
  6. 6.
    Needham, R.M., Schroeder, M.D.: Authentication Revisited. Operating System Review 21(1) (1987)Google Scholar
  7. 7.
    MRF Forum: Application Data Format for Mobile RFID Services. MRFS-3-02 (2005) Google Scholar
  8. 8.
    Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments. In: Proc. of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)Google Scholar
  9. 9.
    Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association 9(1), 131–138 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Namje Park
    • 1
  • Youngsoo Kim
    • 2
  1. 1.Department of Computer Education, Teachers CollegeJeju National University,Jeju Special Self-Governing ProvinceKorea
  2. 2.Information Security Research DivisionElectronics and Telecommunications Research Institute (ETRI)DaejeonKorea

Personalised recommendations