Method and system for extracting, analyzing, storing, comparing and reporting on data stored in web and/or other network repositories and apparatus to detect, prevent and obfuscate information removal from information servers
First Claim
1. In a computer network having a plurality of interconnected computer resources, the computer network having associated with it a data repository that includes a plurality of data items in electronic format distributed widely among the interconnected computer resources, a method of locating portions of the electronic data in the data repository based on a search query, comprising:
- processing the search query to determine at least one meaning associated with the search query; and
locating the portions of the electronic data based on the determined meaning and in accordance with a context ascribed to the determined meaning with reference to meanings associated with previous result data, located in response to previous search queries.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and apparatus providing for the search, identification, retrieval and analysis of data contained in World Wide Web (WWW) and network pages and storage repositories. Mechanisms are provided to facilitate selection of such data as is required by a user, to report in a manner required by the user and to present the results in a plurality of ways. Also disclosed is a system, method to protect information retrieval from Information Servers such as those found on the world wide web (WWW). A method is described to analyze accesses to the information server for patterns indicating the type of system accessing the server. A method is described to format information such that it cannot be easily machine analyzed by such apparatus as lexical analysis and textual search methods. A method is described to include information into information server contents such that it would mislead and otherwise confuse non-human systems used to retrieve the data. Other methods describe access signature analysis and how this can be used to detect and optionally prevent or modify information requests.
-
Citations
25 Claims
-
1. In a computer network having a plurality of interconnected computer resources, the computer network having associated with it a data repository that includes a plurality of data items in electronic format distributed widely among the interconnected computer resources, a method of locating portions of the electronic data in the data repository based on a search query, comprising:
-
processing the search query to determine at least one meaning associated with the search query; and
locating the portions of the electronic data based on the determined meaning and in accordance with a context ascribed to the determined meaning with reference to meanings associated with previous result data, located in response to previous search queries. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of emulating access to a data repository by a particular type of access mechanism, comprising:
-
analyzing a collection of representative accesses by the access mechanism to determine a collective access signature; and
accessing the data repository by performing actions in accordance with the determined access signature.
-
-
15. A method of detecting whether a collection of actions to access a data repository is not by a particular type of access mechanism, comprising:
-
analyzing the collection of actions to determine a collective access signature; and
processing the collective access signature to determine a probability that the collection of accesses is not by the particular type of access mechanism. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification