Rotation of web site content to prevent e-mail spam/phishing attacks
First Claim
1. A computer system comprising:
- at least one processor;
memory; and
a server module including a phishing attack management module, the server module including program code that, when executed in the memory of the host computer, causes the processor(s) to;
store a multiplicity of visual component variations, with at least one of the visual component variations not including a visual representation indicating an alert;
intermittently re-assign one of the visual component variations as the currently-assigned visual component variation;
receive a request for a web page component from the web page of the Web site that specifies a retrieval and incorporation of one of the visual component variations, yet that differs from the currently-assigned visual component variation for the web page;
responsive to the request, determine if the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the web page;
on condition that the request is determined to specify a retrieval and incorporation of one of the visual component variations that does not differ from a variation of the component set forth in a current configuration for the the web page, returning the web page with the currently-assigned visual component variation of the visual component variations, but otherwise on condition that the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the the web page, return the web page with a visual component variation of the visual component variations that includes a visual representation indicating an alert.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
-
Citations
21 Claims
-
1. A computer system comprising:
-
at least one processor; memory; and a server module including a phishing attack management module, the server module including program code that, when executed in the memory of the host computer, causes the processor(s) to; store a multiplicity of visual component variations, with at least one of the visual component variations not including a visual representation indicating an alert; intermittently re-assign one of the visual component variations as the currently-assigned visual component variation; receive a request for a web page component from the web page of the Web site that specifies a retrieval and incorporation of one of the visual component variations, yet that differs from the currently-assigned visual component variation for the web page; responsive to the request, determine if the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the web page; on condition that the request is determined to specify a retrieval and incorporation of one of the visual component variations that does not differ from a variation of the component set forth in a current configuration for the the web page, returning the web page with the currently-assigned visual component variation of the visual component variations, but otherwise on condition that the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the the web page, return the web page with a visual component variation of the visual component variations that includes a visual representation indicating an alert. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method phishing attack management through Web site content rotation comprising:
-
storing a multiplicity of visual component variations for a web page, with at least one of the visual component variations not including a visual representation indicating an alert; intermittently re-assigning one of the visual component variations as the currently-assigned visual component variation; receiving a request for the web page component from the web page of the Web site that specifies a retrieval and incorporation of one of the visual component variations, yet that differs from the currently-assigned visual component variation for the web page; responsive to the request, determining if the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the the web page; and on condition that the request is determined to specify a retrieval and incorporation of one of the visual component variations that does not differ from a variation of the component set forth in a current configuration for the the web page, returning the web page with the currently-assigned visual component variation of the visual component variations, but otherwise on condition that the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the web page, returning the web page with that a visual component variation of the visual component variations includes a visual representation indicating an alert. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for phishing attack management through Web site content rotation, the computer program product for comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code for; storing a multiplicity of visual component variations for a web page, with at least one of the visual component variations not including a visual representation indicating an alert; intermittently re-assigning one of the visual component variations as the currently-assigned visual component variation; receiving a request for the web page component from the web page of the Web site that specifies a retrieval and incorporation of one of the visual component variations, yet that differs from the currently-assigned visual component variation for the web page; responsive to the request, determining if the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the the web page; and on condition that the request is determined to specify a retrieval and incorporation of one of the visual component variations that does not differ from a variation of the component set forth in a current configuration for the the web page, returning the web page with the currently-assigned visual component variation of the visual component variations, but otherwise on condition that the request specifies a retrieval and incorporation of one of the visual component variations that differs from a variation of the component set forth in a current configuration for the web page, returning the web page with a visual component variation of the visual component variations that includes a visual representation indicating an alert. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification