Systems and methods for generating reputation-based ratings for uniform resource locators
First Claim
1. A computer-implemented method for generating reputation-based ratings for uniform resource locators, at least a portion of the method being performed by a reputation server comprising at least one processor, the method comprising:
- identifying, by the reputation server, a Uniform Resource Locator (URL) that identifies a location of at least one web resource;
identifying, by the reputation server, at least one reputation rating assigned to the web resource identified by the URL, wherein the reputation rating assigned to the web resource indicates whether the web resource is potentially malicious;
generating, by the reputation server, a reputation score for the URL that indicates whether the URL represents a potential security risk, wherein generating the reputation score for the URL comprises generating the reputation score for the URL based at least in part on;
the reputation rating assigned to the web resource identified by the URL;
numeric computing-health scores assigned to computing devices within a computing community that previously accessed the URL;
the number of computing devices within the computing community that have previously accessed the URL;
providing, by the reputation server, the reputation score for the URL to at least one additional computing device to enable the additional computing device to evaluate whether the URL represents a potential security risk.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary computer-implemented method for generating reputation ratings for URLs may include (1) identifying a URL that identifies the location of at least one web resource, (2) identifying the computing health of at least one member of a computing community that has accessed the URL, (3) generating, based at least in part on the computing health of the member(s) that accessed the URL, a reputation rating for the URL that indicates whether the URL represents a potential security risk, and then (4) providing the reputation rating for the URL to at least one additional computing device to enable the additional computing device to evaluate whether the URL represents a potential security risk. In addition, a client-side, computer-implemented method for determining whether a URL represents a potential security risk may be based at least in part on such a reputation rating. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
18 Claims
-
1. A computer-implemented method for generating reputation-based ratings for uniform resource locators, at least a portion of the method being performed by a reputation server comprising at least one processor, the method comprising:
-
identifying, by the reputation server, a Uniform Resource Locator (URL) that identifies a location of at least one web resource; identifying, by the reputation server, at least one reputation rating assigned to the web resource identified by the URL, wherein the reputation rating assigned to the web resource indicates whether the web resource is potentially malicious; generating, by the reputation server, a reputation score for the URL that indicates whether the URL represents a potential security risk, wherein generating the reputation score for the URL comprises generating the reputation score for the URL based at least in part on; the reputation rating assigned to the web resource identified by the URL; numeric computing-health scores assigned to computing devices within a computing community that previously accessed the URL; the number of computing devices within the computing community that have previously accessed the URL; providing, by the reputation server, the reputation score for the URL to at least one additional computing device to enable the additional computing device to evaluate whether the URL represents a potential security risk. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for generating reputation ratings for uniform resource locators, the system comprising:
-
an identification module, stored in memory, that identifies a Uniform Resource Locator (URL) that identifies a location of at least one web resource; a reputation module, stored in memory, that; identifies at least one reputation rating assigned to the web resource identified by the URL, wherein the reputation rating assigned to the web resource indicates whether the web resource is potentially malicious; generates a reputation score for the URL that indicates whether the URL represents a potential security risk, wherein generating the reputation score for the URL comprises generating the reputation score for the URL based at least in part on; the reputation rating assigned to the web resource identified by the URL; numeric computing-health scores assigned to computing devices within a computing community that previously accessed the URL; the number of computing devices within the computing community that have previously accessed the URL; a communication module, stored in memory, that provides the reputation score for the URL to at least one additional computing device to enable the additional computing device to evaluate whether the URL represents a potential security risk; at least one physical processor that executes at least one of the identification module, the reputation module, and the communication module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method for determining whether uniform resource locators represent potential security risks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
detecting, by the computing device, an attempt to access a Uniform Resource Locator (URL) that identifies a location of at least one web resource; obtaining, by the computing device, a reputation score for the URL from a reputation service, wherein the reputation score for the URL indicates whether the URL represents a potential security risk and is based at least in part on; at least one reputation rating assigned to the web resource identified by the URL, wherein the reputation rating assigned to the web resource indicates whether the web resource is potentially malicious; numeric computing-health scores assigned to computing devices within a computing community that previously accessed the URL; the number of computing devices within the computing community that have previously accessed the URL; determining, by the computing device, that the URL represents a potential security risk based at least in part on the reputation score for the URL; blocking, by the computing device, the attempt to access the URL. - View Dependent Claims (18)
-
Specification