Patent application number | Description | Published |
20120191691 | METHOD FOR ASSESSING AND IMPROVING SEARCH ENGINE VALUE AND SITE LAYOUT BASED ON PASSIVE SNIFFING AND CONTENT MODIFICATION - A method for determining the value of a given page or pages in aggregate to a search engine based on key-word search results and optionally modifying the outbound results to optimize the value and layout of the page or pages. A listening system is inserted within the network for the purpose of listening to both inbound to and outbound traffic from the web server and optionally modifying outbound responses. The device uses an algorithm to decide the relative value of the page as it is traversed. The system also detects web server errors, scanning depth of the search engine and makes recommendations based on the examined traffic and desired results. Human visitors are distinguished from search engines by looking at the HTTP headers and therefore search engine depth and effectiveness in page scanning can be calculated. | 07-26-2012 |
20130275595 | NETWORK ELEMENT FAILURE DETECTION - A network element failure detector provides a fallback mechanism when external resources fail to load. For example, a “contingency” tag allows a consumer to load local resources when third party resources specified by a webpage developed by a service provider fail to load. Thus, the webpage developer can specify the functionality of a webpage when the referenced third party external resource fails to load. The consumer can also alert the service provider and/or the third party of the failure to load the referenced third party external resource. | 10-17-2013 |
20130326617 | CLICKJACKING PROTECTION - A clickjacking protector in an electronic system helps prevent unwanted clickjacking. The elements clicked on by the click position are evaluated to determine whether any of the elements clicked on by the click position is obscured (including being transparent or partially transparent). A protective action is generated in response to a determination that an element clicked on by the click position is obscured. | 12-05-2013 |
20140020101 | TRUSTED ZONE PROTECTION - A trusted zone protector in exemplary embodiments of an electronic system helps reduce unwanted attempts to use a consumer machine in a trusted zone to address a network resource that lies inside the trusted zone on behalf of a website that lies outside of the trusted zone. An address manager in the electronic system is arranged to provide an indication whether an element retrieved by a network-enabled application executing on the consumer machine is arranged to address a network resource that lies inside the trusted zone. The trusted zone protector is arranged to generate a protective action in response to the indication that the element retrieved by the network-enabled application is arranged to address the network resource that lies inside the trusted zone. | 01-16-2014 |
20140068786 | Securing Operating System/Web Server Systems and Methods - Systems and methods for securely operating web servers, operating systems, etc. Methods of embodiments include creating virtual roots for executive jails and corresponding administrative jails within parent operating systems. Embodiments also include setting privileges associated with each of the executive jails to disk read-only. Moreover, administrative jails are hidden from executive jails and the parent operating system is hidden from both sets of jails. Also, the methods include cross mounting user configuration information and/or applications from the administrative jails and in to the corresponding executive jails. Methods can include password protecting the administrative jails and/or restricting the executive jails from initiating outbound communications. Methods can also include storing security related syslog data in locations associated with parent file structure of the parent operating systems. Methods can also include storing web log related syslog data in locations associated with the administrative jails thereby providing, as desired, compliance/auditing reporting functions. | 03-06-2014 |
20140075553 | DOMAIN NAME SYSTEM REBINDING ATTACK PROTECTION - A network-enabled electronic system is arranged to determine whether a subsequent DNS request uses a selected domain name of a previous DNS request. A protective action is taken in response to an indication that the subsequent DNS request uses the selected domain name of a previous DNS request. The protective action can include flushing state information that could be used to generate a request using an address that is (maliciously, for example) rebound to the selected domain name. | 03-13-2014 |
20140137189 | CROSS-SITE REQUEST FORGERY PROTECTION - A cross-site request forgeries (CSRF) protection system helps protect against cross-site request forgeries attacks. A CSRF protector is arranged to receive a signal from a service provider that notifies a browser running on a potential victim consumer machine to selectively permit and/or deny cross-site requests in accordance with a set of one or more security policies. The policies can be selected and applied on a domain name basis, IP address basis, trusted zone basis, and combinations thereof. The CSRF protector can also provide a context of the event that triggers a request that contains a cross-site request, where the context provides indicia of circumstances that indicate a likelihood of a cross-site request forgery is being attempted. | 05-15-2014 |
20140201270 | DISTRIBUTED COMMENT MODERATION - A distributed comment moderation service is arranged to help mediate the moderation of blog comments using a (for example) centralized moderation queue. The centralized moderation queue can be used to automatically (including semi-automatically) outsource blog comment moderation to third party resource providers. The distributed comment moderation service is optionally arranged to provide an indication of an assessment of the quality of the third party resource providers. | 07-17-2014 |
20140250296 | STRICT COMMUNICATIONS TRANSPORT SECURITY - Strict transport security controls are arranged to detect a first navigation command of a network-enabled application to navigate from a secure connection established with a first network address and to navigate to a second network address using an unsecure reference. A filter is used to filter, in response to the detection of the first navigation command, referring information in a second navigation command used to establish a second address secure connection with a device having the second network address. The strict transport security controls service is optionally arranged to provide a warning signal upon detecting formation of the second navigation command. | 09-04-2014 |
20140304839 | ELECTRONIC CLIPBOARD PROTECTION - A clipboard in an electronic system protects sensitive data by copying data into a clipboard of an electronic system as an entry and selectively blocking access to the sensitive data. An entry protect status is associated with a clipboard entry that is arranged to store copied data that is sensitive. The entry protect status is changed to indicate the entry protect status is set to block access to the copied data. Access to the copied data for which the entry protect status has been changed is selectively blocked. | 10-09-2014 |