Obtaining and assessing objective data relating to network resources

a network resource and objective data technology, applied in the field of obtaining and assessing objective data relating to network resources, can solve the problems of user's inability to determine whether his transmission is done, most users' inability to detect untrustworthy targets, and user's inability to use highly technical information

Inactive Publication Date: 2013-01-31
CALLING ID
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0031]In summary, it is a main object of the present invention to provide information about the connection target when a user connects to a network server or sends a message to a recipient or opens a communication session (voice, chat, etc.), thereby enabling the user to better know to whom he is connecting.
[0043]break page into objects and test each object to determine whether a scam target is hidden in the page—this is an innovation of the present invention —verify page address in multiple directory servers to negate possibility of attack on a directory—this is an innovation of the present invention

Problems solved by technology

In addition, even where the site ownership appears to be legitimate, the user still needs to determine whether the site is an inappropriate target to transmit sensitive data to.
In addition, the user is rarely able to determine whether his transmission is done in a manner such that ensures only the authenticated target receives the information.
In summary, users are confronted with many combinations and permutations of seemingly easy-to-respond formats with reassuring text and most users are unable to detect untrustworthy targets.
And even if the user knew how to obtain information about a suspect target, the user would not be sure how to use that highly technical information.
However it is not enough that the session is secure.
A user may not be aware that the network resource is an unauthorized destination.
“micrusoft” example), sometimes the interpretation of the address by the user is wrong, sometimes the address is an alias to a different address that was sent in order to confuse the sender, and sometimes the cost of sending the message to the address is high and if the user had known that he would not have sent it.
Web “phishing” is a threat that occurs when a user gets a link to set his web browser to a page in a site which was designed to receive from him proprietary information.
There is no systematic method that checks the unverified information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Obtaining and assessing objective data relating to network resources
  • Obtaining and assessing objective data relating to network resources
  • Obtaining and assessing objective data relating to network resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0112]A network resource in the context of the present invention is a physical or virtual device connected to a network that can receive and / or send data (text, audio, graphic and / or video). Examples of network resources are clients (defined later), E-commerce servers (e.g. web sites, FTP sites), messaging servers, and other similar resources.

[0113]Users connect to a network resource (for example, a web site) through a network (for example, the Internet) using a device such as a personal computer, telephone, mobile phone or other user controlled network-attached device. In the device they use an application such as web browser application, Telnet application, voice conversation or other built-in or programmatic user interface for connecting to a network resource. The device receives output from the application. Typically the output is displayed on the device's display system, although other output like audio, vibration etc. may be used. In most cases the output is a page. In the cas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The subject matter discloses a network comprising a plurality of network resources a method for automatically providing a user device with information regarding communication with a network resource, the method comprising: prior to sending data from the user device to the network resource in communication, retrieving information about the network resource from a directory server; evaluating the data to determine if sending the data to the network resource complies with security criteria according to the information about the network resource; providing the user device with a choice whether to send the data in case the data comprises confidential data.

Description

FIELD OF THE INVENTION[0001]The present invention relates to determining the ownership of a network resource, assessing the legitimacy of the network resource, and identifying sensitive data requested by, or sent to, the network resource via public networks such as Internet messaging systems and peer to peer communication.BACKGROUND OF THE INVENTION[0002]A first problem addressed by the present invention is providing a user with objective information about a network resource:[0003]Users connect to a network—such as the Internet, a public switched telephone network (PSTN), or a cellular (mobile) telephony network-through a user-controlled network-connective client device—such as a personal computer, telephone, or cell (mobile) phone. The user has an interface to the device—such as web browser application, phone display, or man-machine interface[0004]For the purposes of this background discussion, we will focus on a connection to a popular type of network resource: a web site. The use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/16
CPCH04L63/08H04L63/20H04L63/166
Inventor NISSENNBOIM, YORAM
Owner CALLING ID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products