Method and system for abuse route aggregation and distribution
First Claim
1. A computer-implemented method comprising:
- receiving, by at least one microprocessor, wherein the host provides a prohibited content via a computer network;
verifying that the host provide the prohibited content with a spider program;
generating an abuse route list, wherein the abuse route list comprises an internet protocol address of the host;
providing the abuse route list to a network operator with a computer networking protocol;
providing a search engine of a database of infringing hosts, wherein the database of infringing host comprises the internet protocol address of the host;
reverifying that the host provides the prohibited content with a third-party review, wherein the third party comprises a third-party that determines that the prohibited content comprises a copyright violation or trademark infringing material; and
removing the host from the abuse route list if the third-party review determines that the host does not provide prohibited content.
0 Assignments
0 Petitions
Accused Products
Abstract
In one exemplary embodiment, a computer-implemented method includes receiving a request to block a host, wherein the host provides a prohibited content via a computer network. A spider program can verify that the host provides the prohibited content. An abuse route list can be generated. The abuse route list can include an internet protocol address of the host. The abuse route list is provided to a network operator with a computer networking protocol. A search engine of a database of infringing hosts can be provided. The database of infringing hosts can include the internet protocol address of the host. Whether the host provides the prohibited content can be reverified with a third-party review. The host from can be removed from the abuse route list if the third-party review determines that the host does not provide prohibited content.
-
Citations
15 Claims
-
1. A computer-implemented method comprising:
-
receiving, by at least one microprocessor, wherein the host provides a prohibited content via a computer network; verifying that the host provide the prohibited content with a spider program; generating an abuse route list, wherein the abuse route list comprises an internet protocol address of the host; providing the abuse route list to a network operator with a computer networking protocol; providing a search engine of a database of infringing hosts, wherein the database of infringing host comprises the internet protocol address of the host; reverifying that the host provides the prohibited content with a third-party review, wherein the third party comprises a third-party that determines that the prohibited content comprises a copyright violation or trademark infringing material; and removing the host from the abuse route list if the third-party review determines that the host does not provide prohibited content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium containing program instructions for dropping traffic destined to hosts that provide prohibited content, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to carry out the steps of;
-
receiving a request to block a host, wherein the host provides a prohibited content via a computer network, and wherein the prohibited content comprises a copyright violation; verifying that the host provides the prohibited content with a spider program; generating an abuse route list, wherein the abuse route list comprises an internet protocol address of the host; providing the abuse route list to a network operator with a computer networking protocol; providing a search engine of a database of infringing hosts, wherein the database of infringing host comprises the internet protocol address of the host, reverifying that the host provides the prohibited content with a third-party review, wherein the third party comprises a third-party that determines that the prohibited content comprises a copyright violation; and removing the host from the abuse route list if the third-party review determines that the host does not provide prohibited content. - View Dependent Claims (12, 13, 14)
-
-
15. A method comprising:
-
determining, by at least one microprocessor, an infringing host, wherein the infringing host comprises a host that provides a prohibited content, wherein the prohibited content comprises a copyright violation; providing an infringing host'"'"'s identification to a network operator; algorithmically confirming that the infringing host provides the prohibited content; enabling a search of the infringing host, wherein the infringing host'"'"'s identification comprises an internet protocol address of the infringing host, and wherein the database comprises the internet protocol address of the infringing host; providing the internet protocol address of the infringing host to the network operator with a Border Gateway Protocol; determining that the infringing host provides the prohibited content with a third-party review if an end user requests a review of a status of the infringing host; and generating a list of internet protocol addresses comprising at least one of a list of bogon routes, a list of botnet command and control hosts, and a list of hosts provided by a governmental organization.
-
Specification