Web page protection against phishing
First Claim
Patent Images
1. A method comprising:
- integrating, by a processing device of a client machine, a user interface control into a graphical user interface (GUI) of a network access application executing on the client machine;
receiving, by a user input device of the client machine, a request from a user via the user interface control to protect a first web page from a second web page;
caching first content of the first web page in a storage device at the client machine in response to the request;
followed by caching the first content of the first web page in the storage device at the client machine at predetermined periods of time;
comparing, by a processing device of the client machine, the first content of the first web page with second content of the second web page for a similarity between the first and second content;
assigning, by the processing device, a value to the similarity between the first and second content;
determining, by the processing device, that the value of the similarity passed a threshold value of a plurality of threshold values each corresponding to a different protective action of a plurality of protective actions that protect the first web page from the second web page; and
performing, by the processing device, a protective action of the plurality of protective actions corresponding to the threshold value that the value of the similarity passed;
wherein the plurality of threshold values are adjustable independent of each other by the user via the user interface control.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments of a method and apparatus for protecting web pages against phishing have been presented. In one embodiment, a user interface control is created at a client machine. A user may submit a request to protect a web page via the user interface control. In response to the request, a web page protection module may protect the web page against phishing based on content of the web page. In some embodiments, the web page protection module may be integrated with a network access application, such as, for example, as a plug-in to a browser.
17 Citations
24 Claims
-
1. A method comprising:
-
integrating, by a processing device of a client machine, a user interface control into a graphical user interface (GUI) of a network access application executing on the client machine; receiving, by a user input device of the client machine, a request from a user via the user interface control to protect a first web page from a second web page; caching first content of the first web page in a storage device at the client machine in response to the request; followed by caching the first content of the first web page in the storage device at the client machine at predetermined periods of time; comparing, by a processing device of the client machine, the first content of the first web page with second content of the second web page for a similarity between the first and second content; assigning, by the processing device, a value to the similarity between the first and second content; determining, by the processing device, that the value of the similarity passed a threshold value of a plurality of threshold values each corresponding to a different protective action of a plurality of protective actions that protect the first web page from the second web page; and performing, by the processing device, a protective action of the plurality of protective actions corresponding to the threshold value that the value of the similarity passed; wherein the plurality of threshold values are adjustable independent of each other by the user via the user interface control. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a storage device; a network interface device communicably coupled to the storage device, the network interface device to access a network; a user input device communicably coupled to the storage device and the network interface device, the user input device to control a first user interface control coupled to a graphical user interface (GUI) of a network access application executing on the apparatus, the first user interface control to allow the user to submit the request; and a processing device communicably coupled to the storage device, the network interface device, and the user input device, the processing device to; execute a web page protection module to protect a first web page accessible by the network access application over the network from a second web page in response to a request from a user received via the first user interface control; cache first content of the first web page in the storage device responsive to the request; followed by cache the first content of the first web page in the storage device at the client machine at predetermined periods of time; compare the first content of the first web page with second content of the second web page for a similarity between the first and second content; assign a value to the similarity between the first and second content; determine that the value of the similarity passed a threshold value of a plurality of threshold values each corresponding to a different protective action of a plurality of protective actions that protect the first web page from the second web page; and perform a protective action of the plurality of protective actions corresponding to the threshold value that the value of the similarity passed; wherein the plurality of threshold values are adjustable independent of each other by the user via the user interface control. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory machine-readable storage medium that provides instructions that, if executed by a processing device, will cause the processing device to perform operations comprising:
-
integrating, by the processing device of a client machine, a user interface control into a graphical user interface (GUI) of a network access application executing on the client machine; receiving, by a user input device of the client machine, a request from a user via the user interface control to protect a first web page from a second web page; caching first content of the first web page in a storage device at the client machine in response to the request; followed by caching the first content of the first web page in the storage device at the client machine at predetermined periods of time; comparing, by a processing device of the client machine, the first content of the first web page with second content of the second web page for a similarity between the first and second content; assigning, by the processing device, a value to the similarity between the first and second content; determining, by the processing device, that the value of the similarity passed a threshold value of a plurality of threshold values each corresponding to a different protective action of a plurality of protective actions that protect the first web page from the second web page; and performing, by the processing device, a protective action of the plurality of protective actions corresponding to the threshold value that the value of the similarity passed; wherein the plurality of threshold values are adjustable independent of each other by the user via the user interface control. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification