Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for analyzing web content

A technology for web content and content, applied in the field of data and application security, to solve problems such as inefficiency

Active Publication Date: 2015-09-16
福斯平特有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This brute force approach is also inefficient in many environments because selective access to certain types of content is necessary for the software to function correctly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for analyzing web content
  • Systems and methods for analyzing web content
  • Systems and methods for analyzing web content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Certain embodiments provide systems and methods for identifying and categorizing web content found at locations identified by Uniform Resource Locators (URLs), the content including potentially executable web content and malicious content. As used herein, possibly executable web content generally refers to any type of content that contains instructions for execution by a web browser or web client computer. Web content that may be executable may include, for example, applets, executable code embedded in HTML or other hypertext documents (including scripting languages ​​such as Javascript or VBScript), embedded in other documents (such as Microsoft Word macros or style sheets), executable code. Web content that may be executable can also refer to a document that executes code located in another location, such as another web page, another computer, or the web browser computer itself. For example, an HTML web page that contains an "object" element and thus can cause the ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Computer-implemented methods and systems for categorizing a uniform resource locator (URL) based on web content associated with the URL are disclosed. In one aspect, a method includes identifying a first URL using a first URL collection method, assigning, using an electronic processor, a first categorization priority to the first URL based on the first URL being identified using the first URL collection method, categorizing, the first URL based on the first categorization priority, identifying a second URL using a second URL collection method, assigning, using an electronic processor, a second categorization priority different than the first categorization priority based on the second URL having been identified using the second URL collection method; and categorizing, using an electronic processor, the second URL based on the second categorization priority.

Description

[0001] Related applications [0002] This application is related to US Patent Application Serial No. 11 / 484,335 (Attorney Docket No. WEBSEN.084A), filed July 10, 2006, which is hereby incorporated by reference in its entirety. technical field [0003] This application deals with data and application security. Specifically, the present application discloses a systematic method of collecting and mining data to determine whether the data contains malicious content. Background technique [0004] Traditionally, computer viruses and other malicious content have been delivered to client computers most often by inserting an infected disk or some other physical media into the computer. With the increased use of email and the Internet, email attachment attacks have become a common method for distributing virus code to computers. In order to infect a computer with these types of viruses with malicious content, some kind of consent action by the user is usually required, such as open...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
CPCG06F17/30864H04L63/1441G06F17/30598G06F16/285G06F16/951
Inventor 丹·哈伯德尼古拉斯·J·维雷尼尼
Owner 福斯平特有限公司