Price mining prevention systems and related methods
First Claim
1. A non-transitory computer-readable medium storing computer-executable instructions for:
- detecting an access request for a particular web site, the particular web page including pricing information for one or more particular products;
at least partially in response to detecting the access request, determining, based at least in part on the access request, a source of the request;
determining, based at least in part on the source, whether the source is an unwanted automated source attempting to mine the pricing information;
at least partially in response to determining that the source is an unwanted automated source, taking one or more defensive actions against the source; and
at least partially in response to determining that the source is a wanted automated source, not taking one or more defensive actions against the source.
1 Assignment
0 Petitions
Accused Products
Abstract
A price-mining prevention system, in various embodiments, is configured for: (A) detecting an access request for a particular web page; (B) at least partially in response to detecting the access request, determining, based at least in part on the access request, a source of the request; (C) determining, based at least in part on the source, whether the source is an unwanted source; and (D) at least partially in response to determining that the source is an unwanted source, taking one or more defensive actions against the source. The one or more defensive actions may include, for example: (1) requiring the source of the access to complete one or more CAPTCHAs; (2) blocking access to the particular web page from the source; and/or (3) providing access to a modified version of the particular webpage to the source.
12 Citations
7 Claims
-
1. A non-transitory computer-readable medium storing computer-executable instructions for:
-
detecting an access request for a particular web site, the particular web page including pricing information for one or more particular products; at least partially in response to detecting the access request, determining, based at least in part on the access request, a source of the request; determining, based at least in part on the source, whether the source is an unwanted automated source attempting to mine the pricing information; at least partially in response to determining that the source is an unwanted automated source, taking one or more defensive actions against the source; and at least partially in response to determining that the source is a wanted automated source, not taking one or more defensive actions against the source. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification