×

Cooperative identification of malicious remote objects

  • US 8,429,180 B1
  • Filed: 03/31/2008
  • Issued: 04/23/2013
  • Est. Priority Date: 03/31/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of cooperative identification of potentially malicious remote objects, comprising:

  • in response to detection of client device access to an instance of a remote object;

    identifying a location associated with the instance of the remote object;

    creating a unique content identification value for content associated with the instance of the remote object;

    identifying content identification values associated with previous object instances of the remote object associated with the location;

    comparing the created unique content identification value for the instance of the remote object to the identified content identification values to determine whether the created content identification value for the instance of the remote object does not match at least one of the identified content identification values associated with the previous object instances of the remote object;

    in response to determining that the created unique content identification value for the instance of the remote object does not match at least one of the identified content identification values associated with the previous object instances of the remote object, analyzing the identified content identification values seeking to identify a legitimate reason why the created unique content identification value does not match at least one of the identified content identification values associated with the previous object instances of the remote object, the legitimate reason indicating that the instance of the remote object is not malicious due to the location returning unique content to each of a plurality of different geographical regions; and

    in response to identifying no legitimate reason why the created unique identification value does not match at least one of the identified content identification values associated with the previous object instance of the remote object, labeling the instance of the remote object as potentially malicious.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×