SYSTEMS AND METHODS FOR ENFORCING POLICIES IN THE DISCOVERY OF ANONYMIZING PROXY COMMUNICATIONS
First Claim
Patent Images
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, identifies a proxy website by performing the steps of:
- analyzing website content that is retrieved based on a website request, wherein the analysis involves looking for patterns within the website content that are similar to patterns found in a known non-proxy website'"'"'s content;
in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website; and
in response to finding a mismatch between the two website identifiers, categorizing at least a portion of the requested website'"'"'s identifier as a suspected proxy website identifier.
9 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for systems and methods that enforce policies with respect to proxy communications.
-
Citations
18 Claims
-
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, identifies a proxy website by performing the steps of:
-
analyzing website content that is retrieved based on a website request, wherein the analysis involves looking for patterns within the website content that are similar to patterns found in a known non-proxy website'"'"'s content; in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website; and in response to finding a mismatch between the two website identifiers, categorizing at least a portion of the requested website'"'"'s identifier as a suspected proxy website identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product embodied in a computer readable medium that, when executing on one or more computers, identifies a proxy website by performing the steps of:
-
analyzing website content that is retrieved based on a website request, wherein the analysis involves looking for patterns within the website content that are similar to patterns found in a known non-proxy website'"'"'s content, wherein the patterns are characterized as checksums; in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website; and in response to finding a mismatch between the two website identifiers, categorizing at least a portion of the requested website'"'"'s identifier as a suspected proxy website identifier.
-
-
18. A computer program product embodied in a computer readable medium that, when executing on one or more computers, identifies a proxy website by performing the steps of:
-
intercepting a website request; analyzing website content that is retrieved based on the website request, wherein the analysis involves looking for patterns within the website content that are similar to patterns found in a known non-proxy website'"'"'s content; in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website; and in response to finding a mismatch between the two website identifiers, blocking a requester that initiated the website request from interacting with the requested website.
-
Specification