Method and system for detecting and remediating misleading hyperlinks

A technology of hyperlinks and domain names, used in transmission systems, digital transmission systems, digital data information retrieval, etc., can solve the problem of not knowing or understanding how hyperlinks operate.

Inactive Publication Date: 2008-07-16
INT BUSINESS MASCH CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A careless recipient may not understand how a hyperlink operates, or may not even know that a hyperlink can be manipulated to lead the recipient to a different website than what appears to be in the text

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting and remediating misleading hyperlinks
  • Method and system for detecting and remediating misleading hyperlinks
  • Method and system for detecting and remediating misleading hyperlinks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention provides a method for verifying the legitimacy of a hyperlink contained within an electronic document and for determining whether the domain name of a website contained within the hyperlink may have been created for fraudulent purposes. Hyperlinks that typically appear within electronic documents are easily distinguishable from surrounding text. Hyperlinks are often displayed in electronic documents using highly visible font colors or font sizes and by underlining the hyperlinks. Hyperlinks appearing in electronic documents generally have several components. The main hyperlink components of interest in the present invention are the link label and the Uniform Resource Locator (URL) encoding the link destination.

[0014] Although URLs can be copied directly into electronic documents, URLs embedded with hyperlinks are not displayed. A link tag is a string of characters that an electronic document displays to a user on a computer monitor. The link ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for verifying the validity of a hyperlink, and determining whether the domain name of the website that the user is directed to is valid. In one embodiment, the method identifies a hyperlink, a URL within the hyperlink and a domain name within the URL. The identified domain name is then assigned a page rank parameter. If the page rank parameter is below a threshold value, then the method compares the identified domain name to a list of well-known or high page rank domain names. A similarity parameter is then assigned to the identified domain name to indicate if the hyperlink is misleading. If the link is misleading, the method may implement some configurable remedial action, such as alerting the user or disabling the hyperlink.

Description

technical field [0001] The present invention relates to methods of preventing computer crimes. More specifically, the present invention relates to detecting security threats caused by misleading hyperlinks. Background technique [0002] More than one billion people use the Internet on a regular basis. The most commonly used applications available on the Internet are email and instant messaging. These applications are widely used by many commercial entities because of the low cost of sending messages to many recipients. [0003] Many Internet users are not computer savvy and have little understanding of the vulnerability of personal and confidential information stored on their personal computers. These users are attractive prey for fraud masters. The same factors that make e-mail and instant messaging attractive to businesses and consumers also make these applications attractive to scammers and con artists. Scammers can cheaply craft and send messages to large numbers of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20H04L12/58
CPCH04L29/12594G06F17/30887H04L63/1483G06F2221/2119G06F21/64H04L61/303H04L63/1466H04L63/0236G06F16/9566H04L61/30H04L2101/30
Inventor 卡里·L·贝茨詹姆斯·E·凯里贾森·J·伊尔格
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products