Method and system for screening remote site connections and filtering data based on a community trust assessment
First Claim
1. A computer-implemented method of screening remote site connections, the method comprising:
- (a) receiving at a server from a plurality of end-users, data based on a plurality of end-user assessments of particular remote sites websites, each end-user being associated with a specific client machine which is in communication with the server, wherein for at least some of the remote websites, the server receives end-user assessment data for the same remote website from a plurality of end-users;
(b) the server generating assessment scores for the particular remote websites based on the data, wherein each of the assessment scores is a ratio of end-users;
(c) the server transmitting the assessment scores to the client machines; and
(d) each specific client machine selectively taking protective action against ones of the particular remote sites websites that have an undesirable assessment score generated by the server, wherein the protective action is determined by comparing the assessment score against an individually specified end-user rule, and wherein at least two client machines have different rules, and wherein the end-users and the remote sites websites are different and unrelated types of entities.
2 Assignments
0 Petitions
Accused Products
Abstract
Remote site connections are screened based on assessments performed by members of a trust community. Data based on a plurality of end-user assessments of particular remote sites are received at a server from a plurality of end-users. Each end-user is associated with a specific client machine which is in communication with the server. The server generates assessment scores based on the data. Each of the assessment scores may be a ratio of end-users. The server transmits the assessment scores to the client machines. The client machine selectively takes protective action against ones of the particular remote sites that have an undesirable assessment score generated by the server. The protective action may be determined by comparing the assessment score against an individually specified end-user rule, wherein at least two client machines have different rules.
-
Citations
20 Claims
-
1. A computer-implemented method of screening remote site connections, the method comprising:
(a) receiving at a server from a plurality of end-users, data based on a plurality of end-user assessments of particular remote sites websites, each end-user being associated with a specific client machine which is in communication with the server, wherein for at least some of the remote websites, the server receives end-user assessment data for the same remote website from a plurality of end-users;
(b) the server generating assessment scores for the particular remote websites based on the data, wherein each of the assessment scores is a ratio of end-users;
(c) the server transmitting the assessment scores to the client machines; and
(d) each specific client machine selectively taking protective action against ones of the particular remote sites websites that have an undesirable assessment score generated by the server, wherein the protective action is determined by comparing the assessment score against an individually specified end-user rule, and wherein at least two client machines have different rules, and wherein the end-users and the remote sites websites are different and unrelated types of entities.- View Dependent Claims (2, 3, 4)
-
5. A computer-implemented method of screening remote site connections, the method comprising:
(a) each of a plurality of users of respective client machines creating a first list of particular remote websites which the user trusts, wherein for at least some of the remote websites on the first lists, there are list entries for the same remote websites on the lists of a plurality of the client machines;
(b) each of the plurality of client machine users creating a second list of particular remote websites which the user does not trust, wherein for at least some of the particular remote websites on the second lists, there are list entries for the same remote websites on the lists of a plurality of client machines;
(c) a remote entity receiving the first and second lists from each of the client machines and storing the first and second lists in a database;
(d) the remote entity aggregating and quantitatively assessing the first and second lists to generate a community aggregate trust assessment for the particular remote websites and transmitting the community aggregate trust assessment of the particular remote websites to the client machines; and
(e) each specific client machine selectively taking protective action against ones of the particular remote websites based on one or more of (i) the first list created by the specific client machine, (ii) the second list created by the specific client machine, and (iii) the community aggregate trust assessment, wherein the client machine users and the remote websites are different and unrelated types of entities.- View Dependent Claims (6, 7, 8)
-
9. A computer-implemented method of screening remote site connections, the method comprising:
(a) receiving at a server from a plurality of end-users, data based on a plurality of end-user assessments of particular remote websites, each end-user being associated with a specific client machine which is in communication with the server, wherein for at least some of the remote websites, the server receives end-user assessment data for the same remote websites from a plurality of end-users;
(b) for each particular remote website, the server generating assessment scores based on the number of the end-users who trust the particular remote website, and the number of the end-users who do not trust the particular remote site website, wherein each of the assessment scores is a ratio of end-users;
(c) the server transmitting the assessment scores to the client machines; and
(d) each specific client machine selectively taking protective action against ones of the particular remote websites that have an undesirable assessment score generated by the server, wherein the protective action is determined by comparing the assessment score against an individually specified end-user rule, and wherein at least two client machines have different rules, and wherein the end-users and the remote websites are different and unrelated types of entities.- View Dependent Claims (10, 11)
-
12. A system for screening remote connections, the system comprising:
(a) a plurality of client machines; and
(b) a server in communication with the client machines, the server receiving data based on a plurality of end-user assessments of particular remote websites, each end-user being associated with a specific one of the client machines, wherein for at least some of the remote websites, the server receives end-user assessment data for the same remote website from a plurality of end-users and wherein;
(i) the server generates assessment scores for the particular remote websites based on the data, wherein each of the assessment scores is a ratio of end-users;
(ii) the server transmits the assessment scores to the client machines; and
(iii) each specific client machine selectively takes protective action against ones of the particular remote websites that have an undesirable assessment score generated by the server, wherein the protective action is determined by comparing the assessment score against an individually specified end-user rule, and wherein at least two client machines have different rules, the end-users and the remote websites being different and unrelated types of entities.- View Dependent Claims (13, 14)
-
15. A system for screening remote site connections, the system comprising:
(a) a plurality of client machines; and
(b) a server in communication with the client machines, wherein;
(i) the server receives from each specific client machine a first list of particular remote websites which a user of the specific client machine trusts and a second list of particular remote websites which the user does not trust, wherein for at least some of the particular remote websites on the first and second lists, the server receives a remote site list entry for the same remote site website from a plurality of client machines;
(ii) the server aggregates and quantitatively assesses the first and second lists to generate a community aggregate trust assessment for the particular remote websites and transmits the community aggregate trust assessments to the client machines; and
(iii) each specific client machine selectively takes protective action against ones of the particular remote websites based on one or more of (I) the first list created by the specific client machine, (II) the second list created by the specific client machine, and (III) the community aggregate trust assessment, wherein the client machine users and the remote websites are different and unrelated types of entities.- View Dependent Claims (16, 17)
-
18. A system for screening remote site connections, the system comprising:
(a) a plurality of client machines that generate data based on a plurality of end-user assessments of particular remote websites, each end-user being associated with a specific one of the client machines, wherein for at least some of the remote websites, end user-assessment data is generated for the same remote website from a plurality of end-users; and
(b) a server in communication with the client machines, the server receiving the data based on a plurality of end-user assessments of particular remote websites, wherein;
(i) the server generates assessment scores for the particular remote websites based on the number of the end-users who trust the particular remote websites, and the number of the end-users who do not trust the particular remote websites, wherein each of the assessment scores is a ratio of end-users;
(ii) the server transmits the assessment scores to the client machines; and
(iii) each specific client machine selectively takes protective action against ones of the particular remote websites that have an undesirable assessment score generated by the server, wherein the protective action is determined by comparing the assessment score against an individually specified end-user rule, and wherein at least two client machines have different rules, the end-users and the remote websites being different and unrelated types of entities.- View Dependent Claims (19, 20)
Specification