Systems and methods for preventing unauthorized modification of network resources
First Claim
1. A computer-implemented method for preventing modification of network resources in the absence of a user'"'"'s consent, at least a portion of the method being performed by a client device comprising at least one processor, the method comprising:
- identifying an attempt by the client device to modify a local network resource at least in part by;
detecting content received from an intranet indicating that the content originated from the local network resource;
determining, at the client device, that the content received from the local network resource may facilitate modification of at least one setting of the network resource by determining that the content received from the local network resource facilitates user input via a web-based form;
in response to the determination that the content received from the local network resource may facilitate modification of at least one setting of the local network resource, determining, at the client device, whether the attempt by the client device to modify the local network resource represents an unauthorized attempt to modify the local network resource without the consent of a user of the client device at least in part by;
embedding, at the client device, a human-verification test within the content received from the local network resource;
administering the human-verification test at the client device;
determining, at the client device based on the outcome of the human-verification test, whether to prevent modification of the local network resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for preventing modification of network resources in the absence of a user'"'"'s consent is disclosed. The method may comprise: 1) identifying an attempt to modify a network resource, 2) administering a human-verification test, and 3) determining, based on the outcome of the human-verification test, whether to prevent modification of the network resource. In addition, a computer-implemented method for preventing unauthorized communication with network resources may comprise: 1) identifying a communication attempt between a network resource and an untrusted resource, 2) determining whether communication between the network resource and the untrusted resource is authorized, and 3) determining, based on whether communication between the network resource and the untrusted resource is authorized, whether to allow communication between the network resource and the untrusted resource. Corresponding systems and computer-readable media are also disclosed.
28 Citations
11 Claims
-
1. A computer-implemented method for preventing modification of network resources in the absence of a user'"'"'s consent, at least a portion of the method being performed by a client device comprising at least one processor, the method comprising:
-
identifying an attempt by the client device to modify a local network resource at least in part by; detecting content received from an intranet indicating that the content originated from the local network resource; determining, at the client device, that the content received from the local network resource may facilitate modification of at least one setting of the network resource by determining that the content received from the local network resource facilitates user input via a web-based form; in response to the determination that the content received from the local network resource may facilitate modification of at least one setting of the local network resource, determining, at the client device, whether the attempt by the client device to modify the local network resource represents an unauthorized attempt to modify the local network resource without the consent of a user of the client device at least in part by; embedding, at the client device, a human-verification test within the content received from the local network resource; administering the human-verification test at the client device; determining, at the client device based on the outcome of the human-verification test, whether to prevent modification of the local network resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for preventing unauthorized modification of network resources, the system comprising:
-
a client device, the client device comprising at least one processor configured to execute at least one module programmed to; identify an attempt by the client device to modify a local network resource at least in part by; detecting content received from an intranet indicating that the content originated from the local network resource; determining, at the client device, that the content received from the local network resource may facilitate modification of at least one setting of the network resource by determining that the content received from the local resource facilitates user input via a web-based form; in response to the determination that the content received from the local network resource may facilitate modification of at least one setting of the local network resource, determining, at the client device, whether the attempt by the client device to modify the local network resource represents an unauthorized attempt to modify the local network resource without the consent of a user of the client device at least in part by; embedding, at the client device, a human-verification test within the content received from the local network resource; administering the human-verification test at the client device; determine, at the client device based on the outcome of the human-verification test, whether to prevent the client device from modifying the local network resource. - View Dependent Claims (11)
-
Specification