PROTECTING USERS FROM MALICIOUS POP-UP ADVERTISEMENTS
First Claim
Patent Images
1. A method for detecting a spoofed command button comprising:
- tracking a creation process for a pop-up window;
detecting a command button created in the pop-up window;
checking an assigned value of the command button; and
determining a follow-up action generated on selection of the command button.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a solution for detecting a spoofed command button in a pop-up window. The solution tracks the creation process of a pop-up window, detects the presence of command buttons in the pop-up window, verifies the value labeled on each command button in the pop-up window and determines a follow-up action generated from selecting a command button on the pop-up window.
-
Citations
20 Claims
-
1. A method for detecting a spoofed command button comprising:
-
tracking a creation process for a pop-up window; detecting a command button created in the pop-up window; checking an assigned value of the command button; and determining a follow-up action generated on selection of the command button. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for detecting a spoofed command button comprising:
-
validating a closing action of a pop-up window against a web browser Application Program Interface (API) for closing a window to detect an anomaly; alerting a user on detecting that a follow-up action generated by the user on selecting the command button fails to communicate with the web browser API. - View Dependent Claims (7)
-
-
8. A system for detecting a spoofed command button comprising:
-
a component for tracking a creation process for a pop-up window; a component for detecting creation of a command button in the pop-up window; a component for checking an assigned value of the command button; and a component for determining a follow-up action generated on selection of the command button. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program stored on a machine-readable medium, for detecting a spoofed command button, the computer program including program code for:
-
tracking a creation process for a pop-up window; detecting a command button created in the pop-up window; checking an assigned value of the command button; and determining a follow-up action generated on selection of the command button. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method for deploying an application for detecting a spoofed command button, the method comprising:
-
providing a computer infrastructure being operable to; track a pop-up window creation process; detect a command button created in the pop-up window; check an assigned value of the command button; and determine a follow-up action generated on selection of the command button.
-
Specification