Abstract: Certain embodiments provide for systems and methods of monitoring data sent from a requested device to a requesting device and removing certain portions of the data such as malevolent or otherwise objectionable content. Objectionable content may include, for example, potentially executable web content. In certain embodiments, the systems and methods remove uniform resource locator (URL) links from the intercepted data which point to web pages having malicious or otherwise objectionable content.
Claims:1. A method of monitoring data sent from a requested device to a requesting device, the method comprising:
a. identifying, at a gateway server, comprising a search engine;
b. intercepting, at the gateway server, content sent from the requested device
c. response to the outgoing request, the intercepted content comprising search results for display on a web page
d. determining categories of at least some of the intercepted uniform resource
• URL-content database based on at least:
a. a record of a several of repeated requests for a web content referenced
by a URL
b. a priority associated with a collection source, to provide the web content data referenced by the URL; and
c. an indication of whether a web content referenced by a URL comprises active content;
d. modifying the content by removing at least one of the uniform resources
e. locators from the list of uniform resource locators on the web page
f. in the search results; and
g. sending the modified content for display on the requesting device.
2. The method of claim 1, further comprising sending the intercepted content to a collection module
3. The method of claim 2, further comprising collecting data related to the intercepted content.
4. The method of claim 3, further comprising determining a candidate status for the one or more URL links
5. The method of any one of the preceding claims, wherein the list of uniform resource locators is identified by the search engine
6. The method of any one of the preceding claims, wherein uniform resource locators categorized as being potentially harmful content are removed from the content
7. The method of any one of the preceding claims, wherein the URL-content database is located on a server separate from the gateway server
8. The method of any one of the preceding claims, wherein modifying the content is further based in part on instructions from a policy module, the policy module located on the gateway server
, Description:Technical Field of the Invention
This application relates to controlling access to the Internet by monitoring data received in response to a data request to the Internet. More particularly, the application relates to systems and methods for monitoring results to user requests for content or information.
Background of the Invention
It is estimated that large percent of website visits are initiated through search engines. As a result, website pages that appear in a list of returned search results or hyperlinks tend to receive significant inbound traffic through the search engine. The higher a website is on the list of returned hyperlinks, the more likely the user will select that hyperlink. Unfortunately, techniques such as "Google-bombing" or "Spamdexing" allow website operators to deliberately modify HTMVIL pages associated with their websites so as to increase the chance that their pages are placed higher on the list of search engine results, or to influence the category to which their pages are assigned in a misleading or dishonest manner. Thus, operators of websites having undesirable or malevolent content often employ such tactics to generate traffic to their websites. In addition, as the use of the Internet evolves, more and more content is delivered to users from disparate and sometimes unknown sources. For example, the desire on the part of users for quicker and easier access to frequently updated content has led to the development of technologies such as web feeds which serve frequently updated content. In one common scenario of using web feeds, a content provider publishes a web feed link on their site which allows an aggregator program (also called a feed reader or a news reader) to register to receive updated content. The aggregator is configured to periodically ask each server in its feed list if they have new content. For each of the servers having new content, the aggregator either makes a note of the new content or downloads the content. Although various types of content may be delivered by web feeds, typically, HTMVIL pages or URL links -1to web pages are delivered. As with the search engine results discussed above, operators of websites having undesirable or malevolent content may utilize misleading techniques with the purpose of having their malevolent content included in the web feeds.
Object of the Invention
The primary object of present invention is to provides System and Method for Monitoring Data and remove Malevolent Content
Summary of the Invention
The system, method, and devices of the present invention each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this invention, several of its features will now be discussed briefly
In a first aspect, the invention provides a method of monitoring data sent from a requested device to a requesting device, the method comprising: identifying at a gateway server, an outgoing request from the requesting device, the outgoing request comprising a search request and the requested device comprising a search engine; In a second aspect, the invention provides a system for monitoring content sent from a first device comprising a search engine to a second device comprising a user workstation in response to a request by the second device for data from the first device, the system comprising a gateway server module executed by a processor on a gateway server computer configured to: intercept the content sent from the first device to the second device, wherein the content comprises a collection of uniform resource locators sent in response to .a search engine query, the search engine query being sent from the second device to the first device and determine categories associated with uniform resource locators within the content based at least partially on a comparison of the intercepted content with a portion of data in a categorized URL-content database, the database configured to store data indicative of categorized uniform resource locators and uncategorized uniform resource locators, wherein the data in the URL-content database is based on at least: a record of a number of repeated requests for a web content referenced by a URL, the number exceeding a threshold; a priority associated with a collection source, the collection source configured to provide a URL referencing a web content and to provide data regarding the web content referenced by the URL
Brief Description of the Drawings
FIG. 1 is a block diagram of various components of a system
Detailed Description of Invention
Figure 1 is an illustration of a system according to a preferred embodiment of the present invention. The system includes a network. The network may be a local area network, a wide area network, or some other type of network. The network may include one or more workstations. The workstations may be various types of client computers that are attached to the network. The workstations may be desktop computers, notebook computers, handheld computers or the like. The workstations may also be loaded with operating systems that allow them to utilize the network through various software modules such as web browsers, e-mail programs, or the like. Each of the workstations may be in electrical communication with a gateway server module. The gateway server module may reside at the edge of the network so that traffic sent to and from the Internet may pass through it on its way into or out of the network. The gateway server module may take the form of a software module that is installed on a server that stands as a gateway to a wider area network than the network to which the workstations are directly attached. Also connected to the Internet is a database management module. The database management module also may be a software module (or one or more hardware appliances) which resides on one or more computing devices. The database management module may reside on a machine that includes some sort of network connecting hardware, such as a network interface card, which allows the database management module to send and receive data and information to and from the Internet. One or more search engines are connected to the Internet. The search engine is typically a web site which receives user requests for information and websites which are relevant to the parameters of the submitted user requests. Well known examples of search engines are Google, Yahoo, and Ask.com. One or more syndicated websites are connected to the Internet. The syndicated website offers a web feed of content from the website. Typically, the content from the syndicated website is accessed by web feed readers installed on client workstations.
| # | Name | Date |
|---|---|---|
| 1 | 201921031736-Proof of Right [29-11-2020(online)].pdf | 2020-11-29 |
| 1 | 201921031736-STATEMENT OF UNDERTAKING (FORM 3) [06-08-2019(online)].pdf | 2019-08-06 |
| 2 | Abstract1.jpg | 2019-10-29 |
| 2 | 201921031736-POWER OF AUTHORITY [06-08-2019(online)].pdf | 2019-08-06 |
| 3 | 201921031736-ORIGINAL UR 6(1A) FORM 26-170919.pdf | 2019-09-21 |
| 3 | 201921031736-FORM FOR STARTUP [06-08-2019(online)].pdf | 2019-08-06 |
| 4 | 201921031736-COMPLETE SPECIFICATION [06-08-2019(online)].pdf | 2019-08-06 |
| 4 | 201921031736-FORM FOR SMALL ENTITY(FORM-28) [06-08-2019(online)].pdf | 2019-08-06 |
| 5 | 201921031736-FORM 1 [06-08-2019(online)].pdf | 2019-08-06 |
| 5 | 201921031736-DRAWINGS [06-08-2019(online)].pdf | 2019-08-06 |
| 6 | 201921031736-FIGURE OF ABSTRACT [06-08-2019(online)].jpg | 2019-08-06 |
| 6 | 201921031736-EVIDENCE FOR REGISTRATION UNDER SSI [06-08-2019(online)].pdf | 2019-08-06 |
| 7 | 201921031736-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [06-08-2019(online)].pdf | 2019-08-06 |
| 8 | 201921031736-FIGURE OF ABSTRACT [06-08-2019(online)].jpg | 2019-08-06 |
| 8 | 201921031736-EVIDENCE FOR REGISTRATION UNDER SSI [06-08-2019(online)].pdf | 2019-08-06 |
| 9 | 201921031736-FORM 1 [06-08-2019(online)].pdf | 2019-08-06 |
| 9 | 201921031736-DRAWINGS [06-08-2019(online)].pdf | 2019-08-06 |
| 10 | 201921031736-COMPLETE SPECIFICATION [06-08-2019(online)].pdf | 2019-08-06 |
| 10 | 201921031736-FORM FOR SMALL ENTITY(FORM-28) [06-08-2019(online)].pdf | 2019-08-06 |
| 11 | 201921031736-FORM FOR STARTUP [06-08-2019(online)].pdf | 2019-08-06 |
| 11 | 201921031736-ORIGINAL UR 6(1A) FORM 26-170919.pdf | 2019-09-21 |
| 12 | Abstract1.jpg | 2019-10-29 |
| 12 | 201921031736-POWER OF AUTHORITY [06-08-2019(online)].pdf | 2019-08-06 |
| 13 | 201921031736-STATEMENT OF UNDERTAKING (FORM 3) [06-08-2019(online)].pdf | 2019-08-06 |
| 13 | 201921031736-Proof of Right [29-11-2020(online)].pdf | 2020-11-29 |