System and method for alerting computer users of digital security intrusions
First Claim
1. A computer-readable medium having computer-executable instructions for performing a process to prevent digital intrusions, the process comprising:
- (a) detecting a request for access by a second computer of a digital tracking component residing on a first computer;
(b) automatically determining if the second computer is associated with the digital tracking component that is being requested by the second computer;
(c) in response to determining that the second computer is associated with the digital tracking component, automatically allowing the second computer to access the digital tracking component;
(d) comparing a domain name of the second computer with a domain name associated with the digital tracking component;
(e) in response to a match of the domain names, determining that the second computer is associated with the digital tracking component; and
(f) in response to a mis-match of the domain names, determining that the second computer is not associated with the digital tracking component, wherein a browser operating within the first computer performs steps (a) through (f).
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is embodied in a system and method for monitoring and alerting remote client users of digital intrusions of their computers by host servers. In general, the present invention monitors actions taken by host servers relating to information about the remote client and displays graphical alerts when a digital intrusion or a breach of security occurs during a network connection, such as a connection to the Internet, with the host server. Specifically, the present invention monitors certain aspects of the remote client user s interaction with host servers. Based on certain interaction, such as an attempt by the host server to retrieve non-related information about the remote client, the remote client user can be provided with a graphical alert. This allows the remote client user to make an informed decision whether or not to allow certain host server sites to retrieve the client user s personal information.
30 Citations
26 Claims
-
1. A computer-readable medium having computer-executable instructions for performing a process to prevent digital intrusions, the process comprising:
-
(a) detecting a request for access by a second computer of a digital tracking component residing on a first computer; (b) automatically determining if the second computer is associated with the digital tracking component that is being requested by the second computer; (c) in response to determining that the second computer is associated with the digital tracking component, automatically allowing the second computer to access the digital tracking component; (d) comparing a domain name of the second computer with a domain name associated with the digital tracking component; (e) in response to a match of the domain names, determining that the second computer is associated with the digital tracking component; and (f) in response to a mis-match of the domain names, determining that the second computer is not associated with the digital tracking component, wherein a browser operating within the first computer performs steps (a) through (f). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for protecting a first computer from digital intrusions by a second computer, the method comprising:
-
(a) sending by the second computer to the first computer a request for access of a digital tracking component residing on the first computer; (b) if the second computer is associated with the digital tracking component that is being requested, the second computer automatically receiving access to the digital tracking component by the first computer; (c) if the second computer is not associated with the digital tracking component, the second computer automatically being denied access to the digital tracking component by the first computer; (d) comparing a domain name of the second commuter with a domain name associated with the digital tracking component; (e) in response to a match of the domain names, determining that the second computer is associated with the digital tracking component; and (f) in response to a mis-match of the domain names, automatically determining that the second computer is not associated with the digital tracking component, wherein steps (a) through (f) are performed by a browser operating within the first computer. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-implemented method for protecting a first computer from digital intrusions by a second computer, comprising:
-
(a) detecting a request for access by the second computer of a digital tracking component residing on the first computer; (b) automatically determining if the second computer is associated with the digital tracking component that is being requested by the second computer; (c) in response to determining that the second computer is associated with the digital tracking component, automatically allowing the second computer to access the digital tracking component; (d) comparing a domain name of the second computer with a domain name associated with the digital tracking component; (e) in response to a match of the domain names, determining that the second computer is associated with the digital tracking component; and (f) in response to a mismatch of the domain names, automatically determining that the second computer is not associated with the digital tracking component, wherein steps (a) through (f) are performed by a browser operating within the first computer. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer security system for preventing host servers from taking inappropriate self-contained packets of information residing on a remote client, the system comprising:
-
a monitor module that monitors requests for access by the host servers of the self-contained packets of information residing on a remote client during digital communication between the remote client and the host server; a notify module that sends an alert to the remote client if a domain name associated with a particular host server does not match a domain name associated with one of the self-contained packets of information residing on a remote client that is being requested by the particular host server; a compare module that compares a domain name of the host server with a domain name associated with the self-contained packet; wherein the compare module, in response to a match of the domain names, determines that the host server is associated with the self-contained packet; wherein the monitor module, in response to a mis-match of the domain names, automatically determines that the host server is not associated with the digital tracking component; and wherein the monitor module and the compare module are within a browser operating within the remote client. - View Dependent Claims (25, 26)
-
Specification