SYSTEM AND METHOD FOR NETWORK ADMINISTRATION AND LOCAL ADMINISTRATION OF PRIVACY PROTECTION CRITERIA
First Claim
1. A method of screening cookie files in a client machine, wherein a cookie file includes a cookie file source, the method comprising:
- (a) receiving, at a server, a request from a subscriber to send a list of untrusted cookie file sources to the client machine;
(b) downloading the list of untrusted cookie file sources from the server to the client machine; and
(c) using the downloaded list of untrusted cookie file sources to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list.
0 Assignments
0 Petitions
Accused Products
Abstract
Cookie files are screened in a client machine, wherein a cookie file includes a cookie file source. A request from a subscriber is received at a server to send a list of untrusted cookie file sources to the client machine. The list of untrusted cookie file sources is downloaded from the server to the client machine. The downloaded list of untrusted cookie file sources is used to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list.
-
Citations
28 Claims
-
1. A method of screening cookie files in a client machine, wherein a cookie file includes a cookie file source, the method comprising:
-
(a) receiving, at a server, a request from a subscriber to send a list of untrusted cookie file sources to the client machine; (b) downloading the list of untrusted cookie file sources from the server to the client machine; and (c) using the downloaded list of untrusted cookie file sources to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of creating a composite list of cookie file sources in a client machine, the method comprising:
-
(a) creating a first exception list including the identity of cookie file sources that are permitted to store cookie files in the client machine, wherein a cookie file includes a cookie file source; (b) creating a second exception list including the identity of cookie file sources that are not permitted to store cookie files in the client machine; (c) receiving at the client machine, from a service provider, a master list of untrusted cookie file sources; and (d) modifying the master list in accordance with the first and second exception lists, wherein the composite list is the modified master list. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of creating a composite list of cookie file sources in a client machine, the method comprising:
-
(a) receiving at the client machine, from a service provider, a master list of untrusted cookie file sources; (b) deleting cookie file sources from the master list that correspond to one or more trusted cookie file sources listed in the client machine; and (c) adding cookie file sources to the master list that correspond to one or more untrusted cookie file sources listed in the client machine, wherein the composite list is the master list as modified by any additions and deletions of trusted and untrusted cookie file sources. - View Dependent Claims (12, 13, 14)
-
-
15. An article of manufacture for screening cookie files in a client machine, wherein a cookie file includes a cookie file source, the article of manufacture comprising a computer-readable medium holding computer-executable instructions for performing a method comprising:
-
(a) receiving, at a server, a request from a subscriber to send a list of untrusted cookie file sources to the client machine; (b) downloading the list of untrusted cookie file sources from the server to the client machine; and (c) using the downloaded list of untrusted cookie file sources to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An article of manufacture for creating a composite list of cookie file sources in a client machine, the article of manufacture comprising a computer-readable medium holding computer-executable instructions for performing a method comprising:
-
(a) creating a first exception list including the identity of cookie file sources that are permitted to store cookie files in the client machine, wherein a cookie file includes a cookie file source; (b) creating a second exception list including the identity of cookie file sources that are not permitted to store cookie files in the client machine; (c) receiving at the client machine, from a service provider, a master list of untrusted cookie file sources; and (d) modifying the master list in accordance with the first and second exception lists, wherein the composite list is the modified master list. - View Dependent Claims (21, 22, 23, 24)
-
-
25. An article of manufacture for creating a composite list of cookie file sources in a client machine, the article of manufacture comprising a computer-readable medium holding computer-executable instructions for performing a method comprising:
-
(a) receiving at the client machine, from a service provider, a master list of untrusted cookie file sources; (b) deleting cookie file sources from the master list that correspond to one or more trusted cookie file sources listed in the client machine; and (c) adding cookie file sources to the master list that correspond to one or more untrusted cookie file sources listed in the client machine, wherein the composite list is the master list as modified by any additions and deletions of trusted and untrusted cookie file sources. - View Dependent Claims (26, 27, 28)
-
Specification