Protecting users from malicious pop-up advertisements
First Claim
Patent Images
1. A method for detecting a spoofed command button comprising:
- tracking a creation process for a pop-up window;
detecting a command button created in the pop-up window;
comparing an assigned value of the command button with a value assigned to at least one of a valid “
No”
or a valid “
Cancel”
button;
determining a follow-up action generated on selection of the command button;
verifying that the follow-up action generated closes the pop-up window; and
alerting a user that the pop-up window poses a potential danger when the follow-up action from selecting the command button includes an action other than closing the pop-up window.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a solution for detecting a spoofed command button in a pop-up window. The solution tracks the creation process of a pop-up window, detects the presence of command buttons in the pop-up window, verifies the value labeled on each command button in the pop-up window and determines a follow-up action generated from selecting a command button on the pop-up window.
19 Citations
13 Claims
-
1. A method for detecting a spoofed command button comprising:
-
tracking a creation process for a pop-up window; detecting a command button created in the pop-up window; comparing an assigned value of the command button with a value assigned to at least one of a valid “
No”
or a valid “
Cancel”
button;determining a follow-up action generated on selection of the command button; verifying that the follow-up action generated closes the pop-up window; and alerting a user that the pop-up window poses a potential danger when the follow-up action from selecting the command button includes an action other than closing the pop-up window. - View Dependent Claims (2, 3)
-
-
4. A method for detecting a spoofed command button comprising:
-
validating a closing action of a command button of a pop-up window against a web browser Application Program Interface (API) for closing a window, wherein the validating detects an anomaly when the command button does not call on the web browser API; and alerting a user in response to detecting the anomaly that a follow-up action generated in response to selecting the command button fails to communicate with the web browser API; and closing the pop-up window in response to detecting the anomaly.
-
-
5. A system comprising:
-
at least one computing device configured for detecting a spoofed command button, comprising; a component for tracking a creation process for a pop-up window; a component for detecting creation of a command button in the pop-up window; a component for comparing an assigned value of the command button with a value assigned to at least one of a valid “
No”
or a valid “
Cancel”
button;a component for determining a follow-up action generated on selection of the command button; a component for verifying that the follow-up action generated closes the pop-up window; and a component for alerting a user that the pop-up window poses a potential danger when the follow-up action performs an action other than closing the pop-up window. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program stored on a non-transitory machine-readable storage medium, for detecting a spoofed command button, the computer program including program code for:
-
tracking a creation process for a pop-up window; detecting a command button created in the pop-up window; comparing an assigned value of the command button with a value assigned to at least one of a valid “
No”
or a valid “
Cancel”
button;determining a follow-up action generated on selection of the command button; program code for verifying that the follow-up action generated closes the pop-up window; and program code for alerting the user that the pop-up window poses a potential danger when the follow-up action for selecting a command button includes an action other than closing the pop-up window. - View Dependent Claims (10, 11, 12)
-
-
13. A method for deploying an application for detecting a spoofed command button, the method comprising:
-
providing a computer infrastructure being operable to; track a pop-up window creation process; detect a command button created in the pop-up window; compare an assigned value of the command button with a value assigned to at least one of a valid “
No”
or a valid “
Cancel”
button;determine a follow-up action generated on selection of the command button; verify that the follow-up action generated closes the pop-up window; and alert a user that the pop-up window poses a potential danger when the follow-up action from selecting the command button includes an action other than closing the pop-up window.
-
Specification