Recording internet visitor threat information through an internet-based proxy service
First Claim
1. A method in an Internet-based proxy service server to record Internet visitor threat information, the method comprising:
- accessing a set of one or more visitor characteristics for a plurality of visitors to a set of one or more domains owned or operated by a first customer, the set of visitor characteristics being reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains;
causing the set of visitor characteristics to be displayed through a threat reporting interface of the Internet-based proxy service server that allows the first customer to report visitors as posing an Internet security threat;
receiving input from the first customer through the threat reporting interface that at least one of the visitors poses an Internet security threat; and
recording the at least one of the visitors poses an Internet security threat in one or more threat databases that are used by the set of proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers.
1 Assignment
0 Petitions
Accused Products
Abstract
An Internet-based proxy service server accesses a set of visitor characteristics for multiple visitors to a set of one or more domains operated by a customer. The set of visitor characteristics are reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains. The service server causes the set of visitor characteristics to be displayed through a threat reporting interface that allows the customer to report visitors as posing an Internet security threat. The service server receives input from the customer through the threat reporting interface that at least one of the visitors poses an Internet security threat, and records that visitor as an Internet security threat in one or more threat databases that are used by the proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers.
94 Citations
21 Claims
-
1. A method in an Internet-based proxy service server to record Internet visitor threat information, the method comprising:
-
accessing a set of one or more visitor characteristics for a plurality of visitors to a set of one or more domains owned or operated by a first customer, the set of visitor characteristics being reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains; causing the set of visitor characteristics to be displayed through a threat reporting interface of the Internet-based proxy service server that allows the first customer to report visitors as posing an Internet security threat; receiving input from the first customer through the threat reporting interface that at least one of the visitors poses an Internet security threat; and recording the at least one of the visitors poses an Internet security threat in one or more threat databases that are used by the set of proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An Internet-based proxy service server, comprising:
-
a memory to store instructions; a processor coupled with the memory to process the stored instructions to; access a set of one or more visitor characteristics for a plurality of visitors to a set of one or more domains owned or operated by a first customer, the set of visitor characteristics being reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains; cause the set of visitor characteristics to be displayed through a threat reporting interface of the Internet-based proxy service server that allows the first customer to report visitors as posing an Internet security threat; receive input from the first customer through the threat reporting interface that at least one of the visitors poses an Internet security threat; and record the at least one of the visitors poses an Internet security threat in one or more threat databases that are used by the set of proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor of an Internet-based proxy service server, cause said processor to perform operations comprising:
-
accessing a set of one or more visitor characteristics for a plurality of visitors to a set of one or more domains owned or operated by a first customer, the set of visitor characteristics being reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains; causing the set of visitor characteristics to be displayed through a threat reporting interface of the Internet-based proxy service server that allows the first customer to report visitors as posing an Internet security threat; receiving input from the first customer through the threat reporting interface that at least one of the visitors poses an Internet security threat; and recording the at least one of the visitors poses an Internet security threat in one or more threat databases that are used by the set of proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification