Protection from malicious web content
First Claim
Patent Images
1. A method for analyzing content for malicious components, the method comprising:
- monitoring, at a sender device, a submission of electronic instructions to access content, wherein the monitoring comprises identifying content based at least in part on the instructions, the submission being performed by a first user and being directed to a host-server, and the instructions being directed to a second user;
scanning, using a data processing device at the host server, the content identified from the monitoring step for one or more malicious components to obtain a scan result prior to the second user receiving the instructions; and
presenting an indicator associated with the content, wherein the indicator is based on the scan result.
11 Assignments
0 Petitions
Accused Products
Abstract
Instructions allowing their recipient to access content via a computer network are intercepted at a destination device sending the instructions via a host-server. Content of an instruction is analyzed at the destination device for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content.
-
Citations
31 Claims
-
1. A method for analyzing content for malicious components, the method comprising:
-
monitoring, at a sender device, a submission of electronic instructions to access content, wherein the monitoring comprises identifying content based at least in part on the instructions, the submission being performed by a first user and being directed to a host-server, and the instructions being directed to a second user; scanning, using a data processing device at the host server, the content identified from the monitoring step for one or more malicious components to obtain a scan result prior to the second user receiving the instructions; and presenting an indicator associated with the content, wherein the indicator is based on the scan result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for analyzing content for malicious components, the method comprising:
-
monitoring, at a sender device, a submission of electronic instructions to access content, the submission being performed by a first user and being directed to a host-server designating a site to the first user, wherein the monitoring comprises identifying content based at least in part on the instructions, and wherein the instructions are directed to a second user and comprise a destination link to content at a destination node; replacing, at the sender device, the destination link identified during the monitoring step with an alternate link; presenting, by the host-server, the alternate link; in response to a request by the second user to access content associated with the alternate link, scanning, using a data processing device, content at the destination link associated with the alternate link for one or more malicious components to obtain a scan result; and directing the second user to the content at the destination link in response to the scan result. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for analyzing content for malicious components, the system comprising:
-
a sender device configured to facilitate electronic communications, via a host-server, among a first user who is associated with the sender device and a second user, the sender device further comprising; a monitor for monitoring electronic instructions to access content instructions to access content, the instructions being directed to the second user, wherein the monitor is configured to identify content associated with the submission; a presenter for presenting an indicator associated with the content wherein the indicator is based on the scan result, and wherein the presenter replaces a destination link to the content with an alternate link; the system further comprising; a scanner, at the host server, to scan the content identified by the monitor for one or more malicious components to obtain a scan result before the second user receives the instructions. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A system for analyzing content for malicious components, the system comprising:
-
a sender device for submitting electronic instructions to access content to a host-server designating a site to a first user associated with the sender device, the instructions being directed to a second user, the sender device comprising; a monitor for monitoring submissions of electronic instructions to access content, wherein the monitoring comprises identifying content based at least in part on the instructions, and wherein the instructions comprise a destination link to the content at a destination node; and a presenter for presenting an alternate link associated with the destination link identified by the monitor; and a host-server designating a site to the first user, the host-server comprising; a first scanner to scan content at the destination node for one or more malicious components to obtain a scan result, in response to the second user requesting access to content associated with the alternate link; and a director to direct the second user to the content at the destination node in response to the scan result. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification