SCARECROW FOR DATA SECURITY
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving information pertaining to network data traffic being communicated from and/or to a user'"'"'s computer which is operated by a user;
analyzing the information to determine whether the user is engaged in potential hacking transaction(s) with respect to a network accessible resource; and
on condition that the user is determined to be engaged in potential hacking transaction(s);
generating a scarecrow message designed for display in human understandable form and format to the user on a computer operated by the user, andsending the scarecrow message to the user'"'"'s computer;
wherein potential hacking transaction(s) are defined as any set of communication(s) to and/or from the user'"'"'s computer that tend to indicate that the user'"'"'s computer is engaged in subverting computer security for malicious purposes.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes the information to determine whether a user is engaged in potential hacking transaction(s) with respect to the resource. On condition that the user is determined to be engaged in potential hacking transaction(s), a “scarecrow” message designed for display to the user, is generated and sent to the user.
14 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving information pertaining to network data traffic being communicated from and/or to a user'"'"'s computer which is operated by a user; analyzing the information to determine whether the user is engaged in potential hacking transaction(s) with respect to a network accessible resource; and on condition that the user is determined to be engaged in potential hacking transaction(s); generating a scarecrow message designed for display in human understandable form and format to the user on a computer operated by the user, and sending the scarecrow message to the user'"'"'s computer; wherein potential hacking transaction(s) are defined as any set of communication(s) to and/or from the user'"'"'s computer that tend to indicate that the user'"'"'s computer is engaged in subverting computer security for malicious purposes. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising a computer readable storage medium having stored thereon:
-
first program instructions programmed to receive information pertaining to network data traffic being communicated from and/or to a user'"'"'s computer which is operated by a user; second program instructions programmed to analyze the information to determine whether the user is engaged in potential hacking transaction with respect to a network accessible resource; and on condition that the user is determined to be engaged in potential hacking conduct; third program instructions programmed to generate scarecrow message designed for display in human understandable form and format to the user on a computer operated by the user, and fourth program instructions programmed to send the scarecrow message to the user'"'"'s computer; wherein potential hacking transaction(s) are defined as any set of communication(s) to and/or from the user'"'"'s computer that tend to indicate that the user'"'"'s computer is engaged in subverting computer security for malicious purposes. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
a processor(s) set; and a computer readable storage medium; wherein; the processor(s) set is structured, located, connected and/or programmed to run program instructions stored on the computer readable storage medium; and the program instructions include; first program instructions programmed to receive information pertaining to network data traffic being communicated from and/or to a user'"'"'s computer which is operated by a user; second program instructions programmed to analyze the information to determine whether the user is engaged in potential hacking transaction with respect to a network accessible resource; and on condition that the user is determined to be engaged in potential hacking conduct; third program instructions programmed to generate scarecrow message designed for display in human understandable form and format to the user on a computer operated by the user, and fourth program instructions programmed to send the scarecrow message to the user'"'"'s computer; wherein potential hacking transaction(s) are defined as any set of communication(s) to and/or from the user'"'"'s computer that tend to indicate that the user'"'"'s computer is engaged in subverting computer security for malicious purposes. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification