Method and system for extracting, analyzing, storing, comparing and reporting on data stored in web and/or other network repositories and apparatus to detect, prevent and obfuscate information removal from information servers
First Claim
1. A method of emulating access to a data repository by a particular type of access mechanism, comprising:
- analyzing a collection of representative accesses by the access mechanism to determine a collective access signature; and
accessing the data repository by performing actions in accordance with the determined access signature.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method and apparatus providing for the search, identification, retrieval and analysis of data contained in World Wide Web (WWW) and network pages and storage repositories. Mechanisms are provided to facilitate selection of such data as is required by a user, to report in a manner required by the user and to present the results in a plurality of ways. Also disclosed is a system, method to protect information retrieval from Information Servers such as those found on the world wide web (WWW). A method is described to analyze accesses to the information server for patterns indicating the type of system accessing the server. A method is described to format information such that it cannot be easily machine analyzed by such apparatus as lexical analysis and textual search methods. A method is described to include information into information server contents such that it would mislead and otherwise confuse non-human systems used to retrieve the data. Other methods describe access signature analysis and how this can be used to detect and optionally prevent or modify information requests.
-
Citations
12 Claims
-
1. A method of emulating access to a data repository by a particular type of access mechanism, comprising:
-
analyzing a collection of representative accesses by the access mechanism to determine a collective access signature; and accessing the data repository by performing actions in accordance with the determined access signature.
-
-
2. A method of detecting whether a collection of actions to access a data repository is not by a particular type of access mechanism, comprising:
-
analyzing the collection of actions to determine a collective access signature; and processing the collective access signature to determine a probability that the collection of accesses is not by the particular type of access mechanism. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification