Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites
First Claim
Patent Images
1. A method, comprising:
- receiving, via a network, a user request to analyze data prior to downloading the data, wherein the user request includes history information associated with the data, and wherein the history information includes information indicative of a number of times an instance of the data has been previously sent to users;
analyzing the data and the history information to determine whether the data includes one or more of unwanted content and unwanted sites; and
sending a response to the user request via the network indicative of whether the data includes one or more of unwanted content and unwanted sites.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for scanning data for unwanted content and unwanted sites in response to a user request. In use, a user request is received via a network to scan data prior to downloading the data utilizing a network browser. In addition, the data is scanned for unwanted content and associated unwanted sites in response to the user request. Further, a response is sent to the user via the network.
40 Citations
25 Claims
-
1. A method, comprising:
-
receiving, via a network, a user request to analyze data prior to downloading the data, wherein the user request includes history information associated with the data, and wherein the history information includes information indicative of a number of times an instance of the data has been previously sent to users; analyzing the data and the history information to determine whether the data includes one or more of unwanted content and unwanted sites; and sending a response to the user request via the network indicative of whether the data includes one or more of unwanted content and unwanted sites. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product embodied on a non-transitory computer readable medium that includes code for execution and when executed by a processor operable to perform operations comprising:
-
receiving, via a network, a user request to analyze data prior to downloading the data, wherein the user request includes history information associated with the data, and wherein the history information includes information indicative of a number of times an instance of the data has been previously sent to users; analyzing the data and the history information to determine whether the data includes one or more of unwanted content and unwanted sites; and sending a response to the user request via the network indicative of whether the data includes one or more of unwanted content and unwanted sites.
-
-
18. A method, comprising:
-
transmitting, via a network, a user request to analyze data prior to downloading the data, wherein the user request includes history information associated with the data, and wherein the history information includes information indicative of a number of times an instance of the data has been previously sent to users; and receiving a response to the user request via the network, the response reflecting an analysis of the data and the history information to determine whether the data includes one or more of unwanted content and unwanted sites that was performed, wherein the response is indicative of whether the data includes one or more of unwanted content and unwanted data. - View Dependent Claims (19)
-
-
20. A system, comprising:
-
a client configured to; transmit, via a network, a user request to analyze data prior to downloading the data, wherein the user request includes history information associated with the data, and wherein the history information includes information indicative of a number of times an instance of the data has been previously sent to users; and receive a response to the user request via the network; a server coupled to a memory configured to; receive the user request via the network; analyze the data and the history information to determine whether the data includes one or more of unwanted content and unwanted sites; and send a response to the user request to the client via the network, wherein the response is indicative of whether the data includes one or more of unwanted content and unwanted sites. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification