System and method for identifying undesirable content in responses sent in reply to a user request for content
First Claim
1. A system for identifying undesirable content in responses sent in reply to a user request for content, the system comprising:
- a user input device that generates a request for content including an address of a target server;
a scan module that receives the user request for content and identifies the request as a request for content;
a proxy module that modifies the request for content to be redirected to a proxy server;
a network that routes the request for content to the proxy server; and
a proxy server that receives the request, forwards the request to the target server, and receives a response from the target server.
2 Assignments
0 Petitions
Accused Products
Abstract
A system identifies undesirable content in responses sent to a user, such as in e-mail or in downloadable files, from an Internet or intranet site. The system utilizes a redirection program that identifies content requests from a user to a target server. The redirection program redirects the request to a proxy server that sends the request to the target server. Upon receipt of the response from the target server, the proxy server scans the response, which includes any attachments, for undesirable content, such as junk e-mails, computer viruses, pornographic material, and/or other undesirable content. The proxy server then acts upon the response, and any undesirable content, in accordance with default or user-defined parameters, such as removal of the undesirable content. The proxy server may then send the response, as modified, or a notification message to the redirection program forwarding to the user.
264 Citations
35 Claims
-
1. A system for identifying undesirable content in responses sent in reply to a user request for content, the system comprising:
-
a user input device that generates a request for content including an address of a target server;
a scan module that receives the user request for content and identifies the request as a request for content;
a proxy module that modifies the request for content to be redirected to a proxy server;
a network that routes the request for content to the proxy server; and
a proxy server that receives the request, forwards the request to the target server, and receives a response from the target server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
16. A method for identifying undesirable content in responses sent in reply to a user request for content, the method comprising:
-
receiving input from a user including at least one request for content addressed to a target server;
identifying the request for content;
redirecting the request for content to a proxy server;
receiving the request for content at the proxy server;
sending the request for content from the proxy server to the target server for generation of a response;
receiving the response from the target server at the proxy server;
scanning the response for undesirable content; and
processing the response according to defined parameters.
-
-
27. A computer-readable medium for redirecting a user request for content addressed to a target server, the medium comprising instructions for:
-
receiving user input that includes at least one user request for content;
identifying the request for content;
forwarding the request for content to a proxy module;
the proxy module for receiving the request for content; and
redirecting the request for content to a proxy server.
-
Specification