SECURE SERVER AUTHENTICATION AND BROWSING
First Claim
1. A server that is in communication with a content-provider server via a communication network, wherein the server performs an authentication method comprising:
- determining a domain name of the content-provider server;
obtaining a fragment of a database of IP addresses, wherein the fragment corresponds to the domain name of the content-provider server and a store of one or more IP addresses associated with the domain name;
comparing the IP address of the content-provider server against the IP addresses of the fragment; and
providing an indication that the IP address of the content-provider server is included or excluded from the IP addresses of the fragment.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods of authenticating a content-provider server by a server are provided. One method comprises determining a domain name of the content-provider server; obtaining a fragment of a database of IP addresses, the fragment corresponding to the domain name of the content-provider server and storing one or more IP addresses associated with the domain name; comparing the IP address of the content-provider server against the IP addresses of the fragment; and providing an indication that the IP address of the content-provider server is included or excluded from the fragment of IP addresses.
204 Citations
27 Claims
-
1. A server that is in communication with a content-provider server via a communication network, wherein the server performs an authentication method comprising:
-
determining a domain name of the content-provider server; obtaining a fragment of a database of IP addresses, wherein the fragment corresponds to the domain name of the content-provider server and a store of one or more IP addresses associated with the domain name; comparing the IP address of the content-provider server against the IP addresses of the fragment; and providing an indication that the IP address of the content-provider server is included or excluded from the IP addresses of the fragment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method that facilitates authentication of a content-provider server by a server on a server side comprising:
-
filtering content from being served to a client computer when the IP address of the content-provider server is excluded from the IP addresses of a fragment, wherein the filtering comprises; determining a domain name of the content-provider server; obtaining a fragment of a database of IP addresses, wherein the fragment corresponds to the domain name of the content-provider server and a store of one or more IP addresses associated with the domain name; comparing the IP address of the content-provider server against the IP addresses of the fragment; and providing an indication that the IP address of the content-provider server is included or excluded from the IP addresses of the fragment. - View Dependent Claims (9, 10, 11)
-
-
12. A method that facilitates authentication of a content-provider server by at least one of a server on a server side or a client computer comprising:
-
filtering content from being viewable on a client computer when the IP address of the content-provider server is excluded from the IP addresses of a fragment, wherein the filtering comprises; determining a domain name of the content-provider server; obtaining a fragment of a database of IP addresses, wherein the fragment corresponds to the domain name of the content-provider server and a store of one or more IP addresses associated with the domain name; comparing the IP address of the content-provider server against the IP addresses of the fragment; and providing an indication that the IP address of the content-provider server is included or excluded from the IP addresses of the fragment. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A secured browsing system that mitigates personal data communicated to a server comprising:
-
a browser request generation component that generates browser requests to one or more URLs without intervention of a user so as to appear to be produced by the user, thereby generating false browsing activity; and a white noise database that stores a plurality of the URLs that, when selected, are included in a browser request without intervention from the user. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification