Validating Visitor Internet-Based Security Threats
First Claim
1. A method in a validating server for validating visitor Internet-based security threats, comprising:
- receiving from a first client device a first request that does not include a cookie for a validating domain that resolves to the validating server, wherein the first request is received as a result of a proxy server redirecting the first client device to the validating domain upon a determination that a visitor belonging to the first client device is a potential threat based on an IP (Internet Protocol) address assigned to the first client device used for a second request to perform an action on an identified resource hosted on an origin server for an origin domain;
setting a cookie for the first client device;
determining a set of one or more characteristics associated with the first client device; and
transmitting the cookie and a block page to the client device that has been customized based on one or more of the set of characteristics, wherein the block page indicates that the second request has been blocked.
1 Assignment
0 Petitions
Accused Products
Abstract
A validating server receives from a client device a first request that does not include a cookie for a validating domain that resolves to the validating sever. The first request is received at the validating server as a result of a proxy server redirecting the client device to the validating domain upon a determination that a visitor belonging to the client device is a potential threat based on an IP (Internet Protocol) address assigned to the client device used for a second request to perform an action on an identified resource hosted on an origin server for an origin domain. The validating server sets a cookie for the client device, determines a set of characteristics associated with the first client device, and transmits the cookie and a block page to the client device that has been customized based on the set of characteristics, the block page indicating that the second request has been blocked.
121 Citations
26 Claims
-
1. A method in a validating server for validating visitor Internet-based security threats, comprising:
-
receiving from a first client device a first request that does not include a cookie for a validating domain that resolves to the validating server, wherein the first request is received as a result of a proxy server redirecting the first client device to the validating domain upon a determination that a visitor belonging to the first client device is a potential threat based on an IP (Internet Protocol) address assigned to the first client device used for a second request to perform an action on an identified resource hosted on an origin server for an origin domain; setting a cookie for the first client device; determining a set of one or more characteristics associated with the first client device; and transmitting the cookie and a block page to the client device that has been customized based on one or more of the set of characteristics, wherein the block page indicates that the second request has been blocked. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method in a proxy server for validating visitor Internet-based security threats, comprising
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities, and wherein the proxy server and the plurality of origin servers are owned by different entities; -
determining, based on an IP (Internet Protocol) address assigned to the client device and associated with the request, that a visitor belonging to the client device is a potential threat; and transmitting a response to the client device that includes a redirection to a validating domain that resolves to a validating domain server that is to determine whether the visitor is a threat based on a cookie associated with the visitor for the validating domain. - View Dependent Claims (12, 13)
-
-
14. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor of a validating server, cause said processor to perform operations comprising:
-
receiving from a first client device a first request that does not include a cookie for a validating domain that resolves to the validating server, wherein the first request is received as a result of a proxy server redirecting the first client device to the validating domain upon a determination that a visitor belonging to the first client device is a potential threat based on an IP (Internet Protocol) address assigned to the first client device used for a second request to perform an action on an identified resource hosted on an origin server for an origin domain; setting a cookie for the first client device; determining a set of one or more characteristics associated with the first client device; and transmitting the cookie and a block page to the client device that has been customized based on one or more of the set of characteristics, wherein the block page indicates that the second request has been blocked. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor of a proxy server, cause said processor to perform operations comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities, and wherein the proxy server and the plurality of origin servers are owned by different entities; determining, based on an IP (Internet Protocol) address assigned to the client device and associated with the request, that a visitor belonging to the client device is a potential threat; and transmitting a response to the client device that includes a redirection to a validating domain that resolves to a validating domain server that is to determine whether the visitor is a threat based on a cookie associated with the visitor for the validating domain. - View Dependent Claims (25, 26)
-
Specification