METHOD AND SYSTEM FOR PROTECTING AN INTERNET USER FROM FRAUDULENT IP ADDRESSES ON A DNS SERVER
First Claim
1. A method for authenticating internet protocol (IP) addresses received from a domain name system (DNS) server, comprising the steps of:
- a) storing in an IP address database located on an Internet user'"'"'s computer the IP addresses and corresponding domain names of a plurality of websites;
b) after step (a), receiving from the DNS server a newly received IP address corresponding to a domain name of a desired website;
c) comparing the newly-received IP address with the IP address for the desired website stored in the IP address database.
1 Assignment
0 Petitions
Accused Products
Abstract
Domain name system (DNS) servers provide Internet protocol (IP) addresses that computers must have for finding websites on the Internet. A recent problem with navigating the Internet is that hackers have discovered ways to change the IP addresses stored on the DNS servers. An altered IP address will cause an Internet user to be directed to an incorrect or fraudulent website. In the present invention, an Internet user'"'"'s computer stores domain names and corresponding IP addresses of all websites visited with the computer. Each time a website is accessed, the IP address received from the DNS server is compared to the IP address stored in the database. If the IP addresses are identical, then the newly received IP address is likely legitimate. If the IP addresses are different, then the newly received IP address is likely fraudulent, and the user can be warned before loading the website.
-
Citations
21 Claims
-
1. A method for authenticating internet protocol (IP) addresses received from a domain name system (DNS) server, comprising the steps of:
-
a) storing in an IP address database located on an Internet user'"'"'s computer the IP addresses and corresponding domain names of a plurality of websites;
b) after step (a), receiving from the DNS server a newly received IP address corresponding to a domain name of a desired website;
c) comparing the newly-received IP address with the IP address for the desired website stored in the IP address database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for protecting a computer user from a fraudulent internet protocol (IP) address stored on a domain name system (DNS) server, comprising:
-
a) a computer having a memory;
b) an internet protocol (IP) address database stored in the memory, wherein the IP address database stores a list of domain names and corresponding IP addresses;
c) software instructions stored in the memory, operable for comparing an IP address stored in the IP address database with a newly received IP address received from the DNS server. - View Dependent Claims (10, 11, 12)
-
-
13. A method for authenticating universal resource locators (URLs) received in an email message, comprising the steps of:
-
a) storing in an IP address database located on an Internet user'"'"'s computer the IP addresses and corresponding domain names of a plurality of websites;
b) scanning an incoming email message for URLs;
c) if a URL is detected, then pinging the URL and identifying the domain name of the URL;
d) receiving from a DNS server a newly received IP address in response to the ping; and
e) comparing the IP address of the domain name corresponding to the URL with the newly-received IP address from the DNS server. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer system for protecting a computer user from a fraudulent universal resource locators (URLs) received in an email message, comprising:
-
a) a computer having a memory;
b) an internet protocol (IP) address database stored in the memory, wherein the IP address database stores a list of domain names and corresponding IP addresses;
c) software instructions stored in the memory, operable for performing the following steps;
1) scanning an incoming email message for URLs and, if a URL is detected, then pinging the URL and identifying the domain name of the URL;
2) receiving from a DNS server a newly received IP address in response to the ping; and
3) comparing the IP address of the domain name corresponding to the URL with the newly-received IP address from the DNS server. - View Dependent Claims (19, 20, 21)
-
Specification