Method for evaluating and accessing a network address
First Claim
Patent Images
1. A method for a computer having at least one processing device for evaluating a network address, comprising the steps of the at least one processing device:
- receiving a network address;
generating a plurality of derivatives of the received network address;
assigning a trust level value to each of the generated derivatives and a trust level value to the received network address;
comparing the trust level values of each of the derivatives with the trust level value of the received network address; and
issuing a response based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method for evaluating or accessing a network address, comprising the steps of: receiving a network address (50); generating derivatives (60) of the received network address (50); assigning a trust level to the generated derivatives (60) and the received network address (50); comparing the trust levels of the derivatives (60) with the trust level of the received network address (50); and issuing a response based on the comparison.
-
Citations
19 Claims
-
1. A method for a computer having at least one processing device for evaluating a network address, comprising the steps of the at least one processing device:
-
receiving a network address; generating a plurality of derivatives of the received network address; assigning a trust level value to each of the generated derivatives and a trust level value to the received network address; comparing the trust level values of each of the derivatives with the trust level value of the received network address; and issuing a response based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program stored on a non-transitory computer readable medium and comprising instructions for a computer to execute a method for evaluating a network address, the method comprising the steps of:
-
receiving a network address; generating a plurality of derivatives of the received network address; assigning a trust level value to each of the generated derivatives and a trust level value to the received network address; comparing the trust level values of the derivatives with the trust level value of the received network address; and issuing a response based on the comparison.
-
-
17. A computer system, having at least one processor for executing components, for evaluating a network address comprising:
-
a receiving component for receiving a network address; and a processing component for generating a plurality of derivatives of the received network address, for assigning a trust level value to each of the generated derivatives and a trust level value to the received network address, for comparing the trust level values of the derivatives with the trust level value of the received network address and for issuing a response based on the comparison.
-
-
18. A method for deploying computing infrastructure, comprising integrating computer readable code into a computer system, wherein the code in combination with the computer system is capable of performing the following:
-
requesting a network address; generating a plurality of derivatives of the requested network address; assigning a trust level value to each of the generated derivatives and a trust level value to the generated derivatives and the requested network address; comparing the trust level values of the derivatives with the trust level value of the requested network address; and issuing a response based on the comparison.
-
-
19. A method for performing an analysis of the network communication traffic of a business entity, the method comprising the steps of:
-
compiling a list of network addresses accessed by the business entity; generating a plurality of derivatives of the accessed network addresses; assigning a trust level value to each of the generated derivatives and a trust level value to the generated derivatives and the accessed network addresses; comparing the trust level values of the derivatives with the trust level value of the accessed network addresses; and compiling a list of accessed network addresses with low trustworthiness based on the comparison.
-
Specification