Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2011-06-07
2011-06-07
Poltorak, Peter (Department: 2434)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S025000
Reexamination Certificate
active
07958555
ABSTRACT:
Protecting computer users from online frauds, such as phishing and pharming. A client computer may include a page signature extractor and a policy enforcer. The page signature extractor may encode a web page to generate its signature, which may be provided to a remote server computer for comparison with signatures of phishing pages. The client computer and the server computer may communicate using the DNS protocol. The policy enforcer may perform one or more predetermined actions when a match is found. Examples of such actions include replacing the web page with a blocking page, displaying a warning message, or both. The policy enforcer may be configured to determine if the web page is part of a phishing or pharming attack by comparing the URL of the web page to URLs of legitimate web pages.
REFERENCES:
patent: 7021534 (2006-04-01), Kiliccote
patent: 2006/0064374 (2006-03-01), Helsper et al.
patent: 2006/0068755 (2006-03-01), Shraim et al.
patent: 2006/0101120 (2006-05-01), Helsper et al.
patent: 2006/0123478 (2006-06-01), Rehfuss et al.
patent: 2006/0168066 (2006-07-01), Helsper et al.
patent: 2007/0073630 (2007-03-01), Greene et al.
patent: 2007/0094500 (2007-04-01), Shannon et al.
patent: 2007/0094727 (2007-04-01), Singh
patent: 2007/0118528 (2007-05-01), Choi et al.
patent: 2007/0124582 (2007-05-01), Shannon et al.
patent: 2007/0136806 (2007-06-01), Berman
patent: 2007/0143845 (2007-06-01), Jeong et al.
patent: 2007/0150743 (2007-06-01), Weatherford et al.
patent: 2007/0174630 (2007-07-01), Shanon et al.
patent: 2007/0192855 (2007-08-01), Hulten et al.
patent: 2008/0028444 (2008-01-01), Loesch et al.
patent: 2008/0082662 (2008-04-01), Dandliker et al.
patent: 2008/0104182 (2008-05-01), Jimmei
patent: 2008/0172741 (2008-07-01), Reumann et al.
“Regular Expression” from Wikipedia, the free encyclopedia, pp. 1-11, [retrieved on Aug. 25, 2007]. Retrieved from the internet: <URL: http://en.wikipedia.org/wiki/Regular—expression>.
“Phishing” from Wikipedia, the free encyclopedia, pp. 1-11, [retrieved on Aug. 24, 2007]. Retrieved from the internet: <URL: http://en.wikipedia.org/wiki/Phishing>.
“Pharming” from Wikipedia, the free encyclopedia, pp. 1-4, [retrieved on Aug. 24, 2007]. Retrieved from the internet: <URL: http://en.wikipedia.org/wiki/Pharming>.
“MD5” from Wikipedia, the free encyclopedia, pp. 1-6, [retrieved on Aug. 24, 2007]. Retrieved from the internet: <URL: http://en.wikipedia.org/wiki/MD5>.
“SHA Hash Functions” from Wikipedia, the free encyclopedia, pp. 1-13, [retrieved on Aug. 25, 2007]. Retrieved from the internet: <URL: http://en.wikipedia.org/wiki/SHA-1>.
Chen Chih Sheng
Hung Yi-Chan
Su Shr-An
Okamoto & Benedicto LLP
Poltorak Peter
Trend Micro Incorporated
LandOfFree
Protecting computer users from online frauds does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protecting computer users from online frauds, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting computer users from online frauds will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2702636