Reputation-based safe access user experience
First Claim
Patent Images
1. A method performed by one or more computing devices comprising:
- receiving a request to access a desired resource;
accessing a reputation lookup database that includes a reputation record for at least the desired resource;
determining that a reputation of the desired resource is known to be suspicious, based at least in part on the reputation record for the desired resource;
determining whether to block the desired resource;
providing a user interface at a computing device, wherein content displayed via the user interface is dependent upon the reputation of the desired resource, the determination of whether to block the desired resource, and meta-information associated with a user of the computing device;
presenting an option for selecting access to the desired resource in response to determining that the desired resource has a suspicious reputation, the option comprising informational text having a predetermined text size and a predetermined text color;
in response to determining that the desired resource is to be blocked, prompting additional user actions before access to the desired resource is allowed;
determining user behavior data associated with the additional user actions, the user behavior data identifying a number of selections received via the user interface to access a single instance of the desired resource;
in response to determining that the additional user actions have been performed, providing access to the desired resource via the user interface; and
altering the predetermined text size or the predetermined text color based at least in part on the user behavior data.
3 Assignments
0 Petitions
Accused Products
Abstract
Reputation-based resource lookup may include determining the reputation of resources that are to be accessed. Based on the reputation of the resource, a user experience is provided. Protection can be provided from known and suspicious resources, by providing warnings, such as unique graphical visual warnings and textual messages. Furthermore, additional information may be provided as to the desired resource. A user may be further required to go through several pages or asked various questions before accessing a resource.
-
Citations
19 Claims
-
1. A method performed by one or more computing devices comprising:
-
receiving a request to access a desired resource; accessing a reputation lookup database that includes a reputation record for at least the desired resource; determining that a reputation of the desired resource is known to be suspicious, based at least in part on the reputation record for the desired resource; determining whether to block the desired resource; providing a user interface at a computing device, wherein content displayed via the user interface is dependent upon the reputation of the desired resource, the determination of whether to block the desired resource, and meta-information associated with a user of the computing device; presenting an option for selecting access to the desired resource in response to determining that the desired resource has a suspicious reputation, the option comprising informational text having a predetermined text size and a predetermined text color; in response to determining that the desired resource is to be blocked, prompting additional user actions before access to the desired resource is allowed; determining user behavior data associated with the additional user actions, the user behavior data identifying a number of selections received via the user interface to access a single instance of the desired resource; in response to determining that the additional user actions have been performed, providing access to the desired resource via the user interface; and altering the predetermined text size or the predetermined text color based at least in part on the user behavior data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
accessing a reputation lookup database that includes a reputation record for a desired resource; determining that a reputation of the desired resource is known to be suspicious, based at least in part on the reputation record for the desired resource; presenting, via a user interface of a computing device, content associated with the desired resource, the content being based at least in part on the reputation of the desired resource; presenting a first option for accessing the desired resource in response to determining that the reputation of the desired resource is suspicious, the first option being associated with text having a predetermined text size and a predetermined text color; determining that the desired resource is to be blocked; prompting additional user actions before access to the desired resource is allowed; determining user behavior data associated with the additional user actions, the user behavior data identifying a number of selections received via the user interface to access a single instance of the desired resource; based at least partly on a determination that the additional user actions have been performed, providing, via the user interface, access to the desired resource; presenting a second option for providing feedback associated with the desired resource; and altering at least one of the predetermined text size or the predetermined text color based at least in part on at least one of the user behavior data or the feedback. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computing device comprising:
-
one or more processors; a memory storing executable instructions that, when executed by the one or more processors, cause the computing device to; request access to a requested resource; determine that a reputation of the requested resource is suspicious based at least in part on a reputation record for the requested resource; present, via a user interface, an option to access the requested resource based at least partly on a determination that the requested resource has a suspicious reputation, the option including a prompt to perform additional user actions to access the requested resource, the option being associated with text having a predetermined text size and a predetermined text color; determine user behavior data associated with the additional user actions, the user behavior data identifying a number of selections received via a user interface to access a single instance of the requested resource; display, via the user interface, content associated with the requested resource, wherein the content is determined at least in part on the reputation of the requested resource, and wherein the user interface prompts the additional user actions to access the requested resource; and alter at least one of the predetermined text size or the predetermined text color based at least in part on the user behavior data.
-
Specification