Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier
First Claim
Patent Images
1. A machine implemented method comprising:
- obtaining a URL;
determining automatically, in response to obtaining the URL, whether to add the URL to a list of trusted URLs.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for improving security when accessing a URL, such as a Web site. In one exemplary method, a user is warned if a previously unvisited Web site being accessed originated from an email message or other electronic source external to a Web browser being used to access the Web site. Other methods, as well as data processing systems and machine-readable media, are also described.
-
Citations
87 Claims
-
1. A machine implemented method comprising:
-
obtaining a URL;
determining automatically, in response to obtaining the URL, whether to add the URL to a list of trusted URLs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of managing data, the method comprising:
-
obtaining a URL;
determining automatically, in response to obtaining the URL, whether to add the URL to a list of trusted URLs. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data processing system comprising:
-
means for receiving an input from a user to access a Web site through a URL included in an electronic document presented by other than a Web browser;
means for verifying if the Web site has been deemed trusted by at least one of the user or the data processing system; and
means for presenting a warning to the user if the Web site has not been previously accessed.
-
-
21. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of a URL (Uniform Resource Locator), wherein the determining results in classifying the source as at least one of a first class or a second class and wherein the URL includes a first portion;
determining, in response to determining that the source is classified in the second class, whether the data processing system has previously accepted another URL as trusted and if not then presenting a warning, wherein the another URL includes the first portion. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A machine implemented method on a data processing system, the method comprising:
-
determining a source of a URL (Uniform Resource Locator), wherein the determining results in classifying the source as at least one of a first class or a second class and wherein the URL includes a first portion;
determining, in response to determining that the source is classified in the second class, whether the data processing system has previously accepted another URL as trusted and if not then presenting a warning, wherein the another URL includes the first portion. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A data processing system comprising:
-
means for determining a source of a URL (Uniform Resource Locator), wherein the determining results in classifying the source as at least one of a first class or a second class and wherein the URL includes a first portion;
means for determining, in response to determining that the source is classified in the second class, whether the data processing system has previously accepted another URL as trusted and if not then presenting a warning, wherein the another URL includes the first portion.
-
-
34. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
classifying a source of a URL (Uniform Resource Locator) as at least one of trustworthy or untrustworthy; and
recording automatically, in response to classifying that the source is trustworthy, a representation of the URL into a list of trusted URLs. - View Dependent Claims (35)
-
-
36. A machine implemented method comprising:
-
receiving an input from a user to access an information on a network through an address included in an electronic document;
verifying if the information has been deemed trusted by at least one of the user or the machine; and
presenting a warning to the user if the information has not been previously accessed. - View Dependent Claims (37, 38)
-
-
39. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of managing data, the method comprising:
-
receiving an input from a user to access an information on a network through an address in an electronic document;
verifying if the information has been deemed trusted by at least one of the user or the data processing system; and
presenting a warning to the user if the information has not been previously accessed. - View Dependent Claims (40, 41)
-
-
42. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
classifying an address of information on a network as at least one of a first class or a second class, wherein the address includes a first portion;
determining, in response to classifying the address in the second class, whether the data processing system has previously accepted another address as trusted and if not then presenting a warning, wherein the another address includes the first portion. - View Dependent Claims (43, 44, 45, 46)
-
-
47. A machine implemented method on a data processing system, the method comprising:
-
classifying an address of information on a network as at least one of a first class or a second class and wherein the address includes a first portion;
determining, in response to classifying the address in the second class, whether the data processing system has previously accepted another address as trusted and if not then presenting a warning, wherein the another address includes the first portion. - View Dependent Claims (48, 49, 50, 51)
-
-
52. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an address of information on a network, wherein the determining results in classifying the source as at least one of trustworthy or untrustworthy; and
recording automatically, in response to determining that the source is trustworthy, a representation of the address into a list of trusted addresses. - View Dependent Claims (53)
-
-
54. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an address of information on a data network;
determining automatically whether to warn a user based on whether the source is trustworthy or not. - View Dependent Claims (55)
-
-
56. A machine implemented method comprising:
-
determining a source of an address of information on a data network;
determining automatically whether to warn a user based on whether the source is trustworthy or not. - View Dependent Claims (57)
-
-
58. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an address of information on a data network;
classifying automatically the address based on whether the source is trustworthy or not. - View Dependent Claims (59, 60)
-
-
61. A machine implemented method comprising:
-
determining a source of an address of information on a data network;
classifying automatically the address based on whether the source is trustworthy or not. - View Dependent Claims (62, 63)
-
-
64. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method, the method comprising:
-
classifying an identifier of information on a network as at least one of a first class or a second class and wherein the identifier includes a first portion;
determining, in response to classifying the identifier in the second class, whether the data processing system has previously accepted another identifier as trusted and if not then presenting a warning, wherein the another identifier includes the first portion. - View Dependent Claims (65)
-
-
66. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an identifier of information on a network, wherein the determining results in classifying the source as at least one of trustworthy or untrustworthy; and
recording automatically, in response to determining that the source is trustworthy, a representation of the identifier into a list of trusted addresses. - View Dependent Claims (67)
-
-
68. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an identifier of information on a data network;
determining automatically whether to warn a user based on whether the source is trustworthy or not. - View Dependent Claims (69)
-
-
70. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an identifier of information on a data network;
classifying automatically the identifier based on whether the source is trustworthy or not. - View Dependent Claims (71, 72)
-
-
73. A machine-readable medium providing executable program instructions for causing a data processing system to perform a method comprising:
-
determining, prior to displaying information designated by an identifier, whether the information is believed to be trustworthy by consulting a list having representations of identifiers for trusted information;
displaying the information normally if the consulting indicates that the identifier is believed trustworthy;
displaying the information in a safe mode if the consulting indicates that the identifier is believed to be not trustworthy. - View Dependent Claims (74, 75, 76, 77, 78, 79, 80, 86, 87)
-
-
81. A Web browser stored on a machine-readable medium providing executable program instructions for causing a data processing system to perform a method, the method comprising:
-
classifying an identifier of information on a network as at least one of a first class or a second class and wherein the identifier includes a first portion;
determining, in response to classifying the identifier in the second class, whether the data processing system has previously accepted another identifier as trusted and if not then presenting a warning, wherein the another identifier includes the first portion. - View Dependent Claims (82)
-
-
83. A Web browser stored on a machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an identifier of information on a network, wherein the determining results in classifying the source as at least one of trustworthy or untrustworthy; and
recording automatically, in response to determining that the source is trustworthy, a representation of the identifier into a list of trusted addresses. - View Dependent Claims (84)
-
-
85. A Web browser stored on a machine-readable medium providing executable program instructions for causing a data processing system to perform a method of processing data, the method comprising:
-
determining a source of an identifier of information on a data network;
determining automatically whether to warn a user based on whether the source is trustworthy or not.
-
Specification