Computer security system and method based on user-intended final destination
First Claim
Patent Images
1. A system for protecting applications and computing devices against malicious URL links, the system comprising:
- a computing device comprising a processor and an associated memory;
a software application running on the computing device and comprising a link;
a communications network;
a final destination determination process; and
a user process for connecting the software application to a remote destination;
wherein the computing device is communicatively connected to the communications network;
wherein the final destination determination process identifies a final destination of the link;
wherein the user process connects to the final destination;
wherein the computing device provides a connect option that may be toggled between;
(i) a user-selectable instruction to follow a path to connect from the link to the final destination, wherein the path comprises one or more sites between the link and the final destination, or (ii) a user-selectable instruction to connect directly to the final destination without following the path.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method is described for protecting applications against malicious URL links by identifying a final destination. The system and method also includes enabling a user process to directly connect to the final destination, bypassing the original URL altogether; thereby bypassing the hacker'"'"'s ability to use that URL to programmatically send the application to a malicious site.
18 Citations
28 Claims
-
1. A system for protecting applications and computing devices against malicious URL links, the system comprising:
-
a computing device comprising a processor and an associated memory; a software application running on the computing device and comprising a link; a communications network; a final destination determination process; and a user process for connecting the software application to a remote destination; wherein the computing device is communicatively connected to the communications network; wherein the final destination determination process identifies a final destination of the link; wherein the user process connects to the final destination; wherein the computing device provides a connect option that may be toggled between;
(i) a user-selectable instruction to follow a path to connect from the link to the final destination, wherein the path comprises one or more sites between the link and the final destination, or (ii) a user-selectable instruction to connect directly to the final destination without following the path. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for protecting applications and computing devices against malicious URL links, the system comprising:
-
a computing device comprising a processor and an associated memory; a software application running on the computing device and comprising a link; a display communicatively connected to the computing device; a user input device communicatively connected to the computing device; a communications network; a final destination determination process; and a user process for connecting the software application to a remote destination via the communications network; wherein the computing device is communicatively connected to the communications network; wherein the final destination determination process identifies a final destination; wherein the final destination of the link is shown on the display upon selection of the link; wherein a user makes a user selection using the user input device to produce an instruction to connect to the final destination or declines to connect to the final destination based on the final destination shown by the display; wherein the computing device allows or disallows a connection to the final destination based on the instruction; wherein the computing device provides a connect option that may be toggled between;
(i) a user-selectable instruction to follow a path to connect from the link to the final destination, wherein the path comprises one or more sites between the link and the final destination, or (ii) a user-selectable instruction to connect directly to the final destination without following the path. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for protecting applications and computing devices against malicious URL links, the method comprising the steps of:
-
(a) protecting a software application and a computing device against malicious URL links using a system comprising; (i) the computing device, which comprises a processor and an associated memory; (ii) the software application, which runs on the computing device and comprises a link; (iii) a communications network; (iv) a final destination determination process; and (v) a user process for connecting the software application to a remote destination; wherein the computing device is communicatively connected to the communications network; (b) using the final destination determination process, identifying a final destination of the link; and (c) using the user process, connecting to the final destination; wherein the computing device provides a connect option that may be toggled between;
(i) a user-selectable instruction to follow a path to connect from the link to the final destination, wherein the path comprises one or more sites between the link and the final destination, or (ii) a user-selectable instruction to connect directly to the final destination without following the path.
-
Specification