Method and apparatus for improving security during web-browsing
First Claim
1. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for improving security during web-browsing, the method comprising:
- receiving a URL (Universal Resource Locator) from a user;
determining an IP (Internet Protocol) address for the URL by querying a DNS (Domain Name System) server;
determining a public-key associated with the URL;
encrypting a string using the public-key to obtain an encrypted-string;
sending the encrypted-string to a remote-system which is associated with the IP address;
receiving a response from the remote-system;
determining whether the DNS server has been compromised using the string and the response; and
if the DNS server has been compromised, alerting the user, thereby improving security during web-browsing.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that improves security during web-browsing. During operation, the system can receive a URL from a user. Next, the system can determine an IP address for the URL by querying a DNS server. The system can then determine a public-key associated with the URL. Next, the system can encrypt a string using the public-key to obtain an encrypted-string. The system can then send the encrypted-string to a remote-system which is associated with the IP address. Next, the system can receive a response from the remote-system. The system can then determine whether the DNS server has been compromised using the string and the response. If the system determines that the DNS server has been compromised, the system can alert the user, and in doing so, improve security during web-browsing.
72 Citations
26 Claims
-
1. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for improving security during web-browsing, the method comprising:
-
receiving a URL (Universal Resource Locator) from a user; determining an IP (Internet Protocol) address for the URL by querying a DNS (Domain Name System) server; determining a public-key associated with the URL; encrypting a string using the public-key to obtain an encrypted-string; sending the encrypted-string to a remote-system which is associated with the IP address; receiving a response from the remote-system; determining whether the DNS server has been compromised using the string and the response; and if the DNS server has been compromised, alerting the user, thereby improving security during web-browsing. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for improving security during web-browsing, the apparatus comprising:
-
a first receiving mechanism configured to receive a URL (Universal Resource Locator) from a user; a first determining mechanism configured to determine an IP (Internet Protocol) address for the URL by querying a DNS (Domain Name System) server; a second determining mechanism configured to determine a public-key associated with the URL; an encrypting mechanism configured to encrypt a string using the public-key to obtain an encrypted-string; a sending mechanism configured to send the encrypted-string to a remote-system which is associated with the IP address; a second receiving mechanism configured to receive a response from the remote-system; a third determining mechanism configured to determine whether the DNS server has been compromised using the string and the response; and an alerting mechanism, wherein if the DNS server has been compromised, the alerting mechanism is configured to alert the user, thereby improving security during web-browsing. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method to determine whether a network has been compromised, the method comprising:
-
determining a public-key which is associated with a URL (Universal Resource Locator) which contains a domain name; querying a DNS (Domain Name System) server to determine an IP (Internet Protocol) address for the domain name; sending an encrypted-string to the IP address using a network, wherein the encrypted-string is determined using a string and the public-key; receiving a response from a remote-system which is associated with the IP address; and determining whether the network has been compromised using the string and the response. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. An apparatus to determine whether a network has been compromised, the apparatus comprising:
-
a first determining mechanism configured to determine a public-key which is associated with a URL (Universal Resource Locator) which contains a domain name; a querying mechanism configured to query a DNS (Domain Name System) server to determine an IP (Internet Protocol) address which is associated with the domain name; a sending mechanism configured to send an encrypted-string to the IP address using a network, wherein the encrypted-string is determined using a string and the public-key; a receiving mechanism configured to receive a response from a remote-system which is associated with the IP address; and a second determining mechanism configured to determine whether the network has been compromised using the string and the response. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A method for improving security during web-browsing, the method comprising:
-
receiving a URL (Universal Resource Locator) from a user; determining an IP (Internet Protocol) address for the URL by querying a DNS (Domain Name System) server; determining a public-key associated with the URL; encrypting a string using the public-key to obtain an encrypted-string; sending the encrypted-string to a remote-system which is associated with the IP address; receiving a response from the remote-system; determining whether the DNS server has been compromised using the string and the response; and if the DNS server has been compromised, alerting the user, thereby improving security during web-browsing.
-
-
26. A method to determine whether a network has been compromised, the method comprising:
-
determining a public-key which is associated with a URL (Universal Resource Locator) which contains a domain name; querying a DNS (Domain Name System) server to determine an IP (Internet Protocol) address for the domain name; sending an encrypted-string to the IP address using a network, wherein the encrypted-string is determined using a string and the public-key; receiving a response from a remote-system which is associated with the IP address; and determining whether the network has been compromised using the string and the response.
-
Specification