SYSTEM FOR DETECTING SPOOFED HYPERLINKS
First Claim
1. A computer program for assisting a user to determine whether a hyperlink to a target uniform resource locator (URL) is spoofed, the method comprising:
- a code segment that listens with a computerized system for an activation of the hyperlink;
a code segment that extracts an originator identifier and encrypted data from the hyperlink;
a code segment that decrypts said encrypted data into decrypted data based on said originator identifier;
a code segment that presents information on a display unit;
a code segment that redirects; and
a code segment that determines whether the hyperlink includes said originator identifier and said encrypted data decrypts successfully, and then;
runs said code segment that presents, to present a confirmation of authentication to the user conveying the name of the owner and the domain name of the target URL, and runs said code segment that redirects, to redirect the user to the target URL;
and otherwise, runs said code segment that presents, to present a warning dialog to the user.
5 Assignments
0 Petitions
Accused Products
Abstract
A system (50, 150) for assisting a user (14) to determine whether a hyperlink (152) to a target uniform resource locator (URL) is spoofed. A computerized system having a display unit is provided and logic (158) therein listens for activation of the hyperlink (152) in a message (154). The logic (158) extracts an originator identifier (102) and encrypted data from the hyperlink (152), and decrypts the encrypted data into decrypted data based on the originator identifier (102). The logic (158) determines whether the hyperlink (152) includes the originator identifier (102) and the encrypted data decrypts successfully. Responsive to this it then presents a confirmation of authentication conveying the name of the owner and the domain name of the target URL on the display unit, and it redirects the user (14) to the target URL. Otherwise, it presents a warning dialog to the user (14) on the display unit.
146 Citations
26 Claims
-
1. A computer program for assisting a user to determine whether a hyperlink to a target uniform resource locator (URL) is spoofed, the method comprising:
-
a code segment that listens with a computerized system for an activation of the hyperlink;
a code segment that extracts an originator identifier and encrypted data from the hyperlink;
a code segment that decrypts said encrypted data into decrypted data based on said originator identifier;
a code segment that presents information on a display unit;
a code segment that redirects; and
a code segment that determines whether the hyperlink includes said originator identifier and said encrypted data decrypts successfully, and then;
runs said code segment that presents, to present a confirmation of authentication to the user conveying the name of the owner and the domain name of the target URL, and runs said code segment that redirects, to redirect the user to the target URL;
and otherwise, runs said code segment that presents, to present a warning dialog to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for assisting a user to determine whether a hyperlink to a target uniform resource locator (URL) is spoofed, the system comprising:
-
a computerized system having a display unit;
a logic in said computerized system that listens for activation of the hyperlink;
a logic that extracts an originator identifier and encrypted data from the hyperlink;
a logic that decrypts said encrypted data into decrypted data based on said originator identifier;
a logic that determines whether the hyperlink includes said originator identifier and that said encrypted data decrypts successfully;
a logic responsive to said logic that determines, that presents on said display unit a confirmation of authentication conveying the name of the owner and the domain name of the target URL and that redirects the user to the target URL; and
a logic responsive to said logic that determines, that presents on said display unit a warning dialog to the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for assisting a user to determine whether a hyperlink to a target uniform resource locator (URL) is spoofed, the method comprising:
-
listening for an activation of the hyperlink;
extracting an originator identifier and encrypted data from the hyperlink;
decrypting said encrypted data into decrypted data based on said originator identifier;
when the hyperlink includes said originator identifier and said encrypted data decrypts successfully;
presenting a confirmation of authentication to the user, wherein said confirmation of authentication conveys the name of the owner and the domain name of the target URL; and
redirecting the user to the target URL;
and otherwise, presenting a warning dialog to the user. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification