Data counter measures
First Claim
Patent Images
1. A method of blocking unwanted calls, comprising:
- generating, by an authorized third party code included on a web page, a third party call to a web server, wherein the third party call is associated with content that the authorized third party code is attempting to write to the web page;
intercepting the third party call from the authorized third party code included on the web server to the web server at least in part by overriding, by a control tag included in code of the web page, a behavior of a content writing function associated with the web page to inspect content before the content is written to the web page;
determining that the third party call is to an unauthorized third party; and
at least partially in response to determining that the third party call is to an unauthorized third party, blocking the third party call, at least in part by modifying data comprising a tag to cause the browser not to execute the third party call.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques to block unwanted third party calls are disclosed. In various embodiments, an indication is received that third party code included on a web page is attempting to write to the web page content associated with an unauthorized third party call. The unauthorized third party call is blocked. In some embodiments, the unauthorized third party call is blocked by blocking the web page content associated with the unauthorized third party call from being written to the web page.
-
Citations
28 Claims
-
1. A method of blocking unwanted calls, comprising:
-
generating, by an authorized third party code included on a web page, a third party call to a web server, wherein the third party call is associated with content that the authorized third party code is attempting to write to the web page; intercepting the third party call from the authorized third party code included on the web server to the web server at least in part by overriding, by a control tag included in code of the web page, a behavior of a content writing function associated with the web page to inspect content before the content is written to the web page; determining that the third party call is to an unauthorized third party; and at least partially in response to determining that the third party call is to an unauthorized third party, blocking the third party call, at least in part by modifying data comprising a tag to cause the browser not to execute the third party call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 25, 26, 27, 28)
-
-
15. A system to block unwanted calls, comprising:
-
a processor configured to; generate, by an authorized third party code included on a web page, a third party call to a web server, wherein the third party call is associated with content that the authorized third party code is attempting to write to the web page; intercept the third party call from the authorized third party code included on the web server to the web server at least in part by overriding, by a control tag included in code of the web page, a behavior of a content writing function associated with the web page to inspect content before the content is written to the web page; determine that the third party call is to an unauthorized third party; and at least partially in response to determining that the third party call is to an unauthorized third party, block the third party call, at least in part by modifying data comprising a tag to cause the browser not to execute the third party call; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer program product to block unwanted calls, the computer program product being embodied in a tangible, non-transitory computer readable storage medium and comprising computer instructions for:
-
generating, by an authorized third party code included on a web page, a third party call to a web server, wherein the third party call is associated with content that the authorized third party code is attempting to write to the web page; intercepting the third party call from the authorized third party code included on the web server to the web server at least in part by overriding, by a control tag included in code of the web page, a behavior of a content writing function associated with the web page to inspect content before the content is written to the web page; determining that the third party call is to an unauthorized third party; and at least partially in response to determining that the third party call is to an unauthorized third party, blocking the third party call, at least in part by modifying data comprising a tag to cause the browser not to execute the third party call. - View Dependent Claims (21, 22, 23, 24)
-
Specification