Method, system, and computer program product for security within a global computer network
First Claim
Patent Images
1. A tangible computer-readable memory medium storing program instructions within a security program that are executable on an information handling system to:
- receive data from an external network coupled to the information handling system, wherein the received data includes a first set of data for a web page;
analyze the first set of data to make a determination whether the first set of data indicates that it is from a first source coupled to the external network, but is actually from a second source coupled to the external network, wherein the determination is based, at least in part, on an age of the first set of data;
upon the determination that the first set of data is actually from the second source, provide output from the information handling system indicative of the determination.
5 Assignments
0 Petitions
Accused Products
Abstract
In a first embodiment, an information handling system determines whether a resource is likely misrepresented as a trusted resource within a global computer network. In a second embodiment, the information handling system outputs an indication of whether a resource within a global computer network is recognized as a known trusted resource.
138 Citations
41 Claims
-
1. A tangible computer-readable memory medium storing program instructions within a security program that are executable on an information handling system to:
-
receive data from an external network coupled to the information handling system, wherein the received data includes a first set of data for a web page; analyze the first set of data to make a determination whether the first set of data indicates that it is from a first source coupled to the external network, but is actually from a second source coupled to the external network, wherein the determination is based, at least in part, on an age of the first set of data; upon the determination that the first set of data is actually from the second source, provide output from the information handling system indicative of the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
a security program on a first computing device receiving a web page via a wide-area network, wherein the web page includes information indicating that its origin is a first source that is trusted by a user of the first computing device; the security program on the first computing device sending data that is requested by the web page to the origin of the web page; the security program on the first computing device analyzing the origin'"'"'s response to the sent data to make a determination whether the origin of the web page is the first source; and upon the determination that the origin of the web page is not the first source, providing output from the first computing device that is indicative of the determination. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method, comprising:
-
a security program on a computing device making a determination of the likelihood that a web page received via a computer network is misrepresented as being from a trusted source, including; the security program analyzing a layout of the received web page; the security program determining that the layout of the received web page is similar to a layout of a known mistrusted web page; upon determining that the layout of the received web page is similar to the layout of the known mistrusted web page, the computing device providing output indicative of the likelihood that the received web page is misrepresented as being from the trusted source. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method, comprising:
-
a security program on a computing device making a determination of the likelihood that a web page received via a computer network is misrepresented as being from a trusted source, wherein the determination is based on one or more of the following criteria;
an age of the web page, a size of the web page, a number of hyperlinks to the web page from trusted sources; andthe computing device providing output indicative of the determination. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A tangible computer-readable memory medium storing program instructions within a security program that are executable on a computing device to:
-
make a determination of the likelihood that a web page received via a computer network is misrepresented as being from a trusted source coupled to the computer network, including; analyzing a layout of the received web page; determining that the layout of the received web page is similar to a layout of a known mistrusted web page; upon determining that the layout of the received web page is similar to the layout of the known mistrusted web page, provide output from the computing device indicative of the likelihood that the received web page is misrepresented as being from the trusted source. - View Dependent Claims (26, 27, 28)
-
-
29. A tangible computer-readable memory medium storing program instructions within a security program that are executable on a computing device to:
-
make a determination of the likelihood that a web page received at the computing device from a computer network is misrepresented as being from a trusted source, wherein the determination is based on one or more of the following criteria;
an age of the web page, a size of the web page, a number of hyperlinks to the web page from known trusted sources; andprovide output from the computing device indicative of the determination. - View Dependent Claims (30, 31, 32)
-
-
33. A tangible computer-readable memory medium storing program instructions within a security program that are executable on a computing device to:
-
receive a web page via a wide-area network, wherein the web page includes information indicating that its origin is a first source that is trusted by a user of the computing device; send data that is requested by the web page to the origin of the web page; analyze the origin'"'"'s response to the sent data to make a determination whether the origin of the web page is the first source; and upon the determination that the origin of the web page is not the first source, provide output from the computing device indicative of the determination. - View Dependent Claims (34, 35, 36)
-
-
37. A tangible computer-readable memory medium storing program instructions within a security program that are executable on an information handling system to:
-
receive data from an external network coupled to the information handling system; analyze the received data to make a determination whether the received data indicates that it is from a first source coupled to the external network, but is actually from a second source coupled to the external network, and wherein the determination is based, at least in part, on a size of the received data; upon the determination that the received data is actually from the second source, provide output from the information handling system indicative of the determination. - View Dependent Claims (38, 39, 40, 41)
-
Specification