Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment
Abstract
This paper provides a privacy-enhanced method of verifying adults in mobile RFID environment. It can be applied to check whether a user is an adult or not when he or she would like to use some adult contents using mobile terminals playing a role of tag readers in mobile RFID environment. Instead of current adult verification method utilizing the user’s own mobile terminals, the proposed method uses any mobile terminal and provides users with anonymity. Additionally, instead of a conventional rating system based on the user’s age, we proposed four-level rating system (0 to 3) in detail. The adult content is classified based on each category (for example, swear word, nudity, sex, and foul language) and the rating information gets assigned to the adult content based on each category. The rating information is assigned to the user data region of the RFID tag. Through this method, the rating of multi-media content can be expressed with respect to each category using the detailed rating criteria. The weight factors may be differently applied to the categories according to applications.
Keywords
Mobile Terminal Rating Information Content Provider Trusted Third Party User TerminalPreview
Unable to display preview. Download preview PDF.
References
- 1.MRF Forum: Adult Certification for Mobile RFID Services. MRFS-4-04 (2005) Google Scholar
- 2.BBC News: Children can access mobile porn, http://news.bbc.co.uk/1/hi/uk/4671334.stm
- 3.Lubinski, A.: Security issues in mobile database access. In: Proc. of the IFIP WG 11.3 Twelfth International Conference on Database Security (1998)Google Scholar
- 4.Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 5.Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)CrossRefGoogle Scholar
- 6.Needham, R.M., Schroeder, M.D.: Authentication Revisited. Operating System Review 21(1) (1987)Google Scholar
- 7.MRF Forum: Application Data Format for Mobile RFID Services. MRFS-3-02 (2005) Google Scholar
- 8.Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments. In: Proc. of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)Google Scholar
- 9.Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association 9(1), 131–138 (2009)CrossRefGoogle Scholar