Web page privacy risk detection
First Claim
1. A computer-implemented method comprising:
- receiving HTML code associated with a webpage;
processing the HTML code to identify one or more third parties providing content for the webpage based at least in part upon domain names and file names associated with the content;
for individual identified third parties, storing data to relate a third party to one or more webpages for which the third party provides content;
detecting whether a particular third party is in a position to observe browsing habits of a user according to data stored relative to the particular third party, the data representing a number of times the user has encountered the same particular third party across multiple websites;
responsive to said detecting, assigning one of multiple levels of perceived risk to the particular third party based at least in part upon the data exceeding a configurable threshold value that corresponds to the one of the multiple levels of perceived risk; and
responsive to said detecting, outputting a user interface instrumentality that can enable the user to take one or more actions regarding content from the particular third party.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments enable detection of third party content sources that may pose a privacy risk to a user. In at least some embodiments, webpages navigated to via a browser can be processed to identify third party content sources that provide content for the webpages. Data may be stored to relate the third party content sources to webpages in which the third party content is encountered. The data may then be analyzed to determine when a particular third party is in a position to observe browsing habits of a user. Responsive to determining a privacy risk, notification may be output in a variety of ways to inform a user of potentially risky content. In at least some other embodiments, notification can be made by way of a user interface instrumentality that is automatically presented to a user to inform the user of a potentially risky third party content source.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving HTML code associated with a webpage; processing the HTML code to identify one or more third parties providing content for the webpage based at least in part upon domain names and file names associated with the content; for individual identified third parties, storing data to relate a third party to one or more webpages for which the third party provides content; detecting whether a particular third party is in a position to observe browsing habits of a user according to data stored relative to the particular third party, the data representing a number of times the user has encountered the same particular third party across multiple websites; responsive to said detecting, assigning one of multiple levels of perceived risk to the particular third party based at least in part upon the data exceeding a configurable threshold value that corresponds to the one of the multiple levels of perceived risk; and responsive to said detecting, outputting a user interface instrumentality that can enable the user to take one or more actions regarding content from the particular third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method comprising:
-
receiving HTML code associated with a webpage; processing the HTML code to identify a content item from a third party content source to be included in the webpage; merging a record for the content item with another record for another content item based at least in part upon the content item and the other content item having a sufficiently similar domain name and file name to associate the content item and the other content item with the third party content source; calculating a number of times content from the same third party content source has been encountered in webpages navigated to by an application across multiple websites; based at least in part upon a calculated number of times, ascertaining whether the third party content source is in a position to observe browsing habits of the user of the application; assigning one of multiple different levels of perceived risk to the third party content source based at least in part upon the calculated number of times exceeding a configurable threshold value that corresponds to the one of the multiple different levels of perceived risk; and providing a user interface instrumentality output configured to facilitate one or more selectable actions regarding the third party content source. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more processing devices; one or more computer readable storage media; computer readable instructions embodied on the one or more computer readable storage media which, when executed by the one or more processing devices, implement a Web browser that performs operations to; determine that a content item and another content item are provided by a third party content source based at least in part upon the content item and the other content item having path data that shares a domain name and a file name; calculate a number of times a third party content source provides content for webpages navigated to by the Web browser that reflects opportunities of the same third party content source across multiple websites to collect browsing data associated with a user based at least in part upon a number of times the third party content source provides the content item or the other content item; determine when the third party content source is in a position to observe browsing habits of the user based at least in part upon the calculated number of times being within a range of values that correspond to one of multiple different levels of perceived risk, the multiple different levels of perceived risk being assignable to the third party content source; and output a notification to communicate that the third party content source is in a position to observe browsing habits of the user, the notification including selectable actions regarding the third party content source. - View Dependent Claims (17, 18, 19, 20)
-
Specification