System, method and computer program product for publishing non-malicious third party content to a data feed
First Claim
Patent Images
1. A computer program product, comprising a non-transitory computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed by a computer to implement a method, the method comprising:
- receiving, by a first system providing a data feed as a service, a request to publish within the data feed to one or more users a link to content stored by a second system;
prior to publishing the link within the data feed, determining, by the first system, whether the content is at least potentially malicious, by applying at least one predefined rule to the link without retrieving the content from the second system;
when it is determined that the content is not at least potentially malicious, publishing the link within the data feed, by the first system, for allowing the one or more users to access the content from the second system via selection of the link within the data feed; and
,when it is determined that the content is at least potentially malicious;
retrieving, by the first system, the content from the second system using the link,determining, by the first system, which portion of the retrieved content is at least potentially malicious,cleaning, by the first system, the portion determined to be at least potentially malicious,storing the cleaned content in memory of the first system,creating, by the first system, a new link to the stored cleaned content, andpublishing within the data feed, by the first system, the new link to the stored cleaned content.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for publishing non-malicious third party content to a data feed. These mechanisms and methods for publishing non-malicious third party content to a data feed can provide analysis of third party content requested to be published to a data feed, which can be used to safeguard against the publication of malicious content to the data feed.
160 Citations
12 Claims
-
1. A computer program product, comprising a non-transitory computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed by a computer to implement a method, the method comprising:
-
receiving, by a first system providing a data feed as a service, a request to publish within the data feed to one or more users a link to content stored by a second system; prior to publishing the link within the data feed, determining, by the first system, whether the content is at least potentially malicious, by applying at least one predefined rule to the link without retrieving the content from the second system; when it is determined that the content is not at least potentially malicious, publishing the link within the data feed, by the first system, for allowing the one or more users to access the content from the second system via selection of the link within the data feed; and
,when it is determined that the content is at least potentially malicious; retrieving, by the first system, the content from the second system using the link, determining, by the first system, which portion of the retrieved content is at least potentially malicious, cleaning, by the first system, the portion determined to be at least potentially malicious, storing the cleaned content in memory of the first system, creating, by the first system, a new link to the stored cleaned content, and publishing within the data feed, by the first system, the new link to the stored cleaned content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, by a first system providing a data feed as a service, a request to publish within the data feed to one or more users a link to content stored by a second system; prior to publishing the link within the data feed, determining, by the first system, whether the content is at least potentially malicious, by applying at least one predefined rule to the link without retrieving the content from the second system; when it is determined that the content is not at least potentially malicious, publishing the link within the data feed, by the first system, for allowing the one or more users to access the content from the second system via selection of the link within the data feed; and when it is determined that the content is at least potentially malicious; retrieving, by the first system, the content from the second system using the link, determining, by the first system, which portion of the retrieved content is at least potentially malicious, cleaning, by the first system, the portion determined to be at least potentially malicious, storing the cleaned content in memory of the first system, creating, by the first system, a new link to the stored cleaned content, and publishing within the data feed, by the first system, the new link to the stored cleaned content.
-
-
11. An apparatus, comprising:
-
a first system providing a data feed as a service and having a processor for; receiving, by the first system providing the data feed as the service, a request to publish within the data feed to one or more users a link to content stored by a second system; prior to publishing the link within the data feed, determining, by the first system, whether the content is at least potentially malicious, by applying at least one predefined rule to the link without retrieving the content from the second system; when it is determined that the content is not at least potentially malicious, publishing the link within the data feed, by the first system, for allowing the one or more users to access the content from the second system via selection of the link within the data feed; and when it is determined that the content is at least potentially malicious; retrieving, by the first system, the content from the second system using the link, determining, by the first system, which portion of the retrieved content is at least potentially malicious, cleaning, by the first system, the portion determined to be at least potentially malicious, storing the cleaned content in memory of the first system, creating, by the first system, a new link to the stored cleaned content, and publishing within the data feed, by the first system, the new link to the stored cleaned content. - View Dependent Claims (12)
-
Specification