会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Location Restricted Content Delivery Over a Network
    • 通过网络限制内容传送的位置
    • US20110077026A1
    • 2011-03-31
    • US12876683
    • 2010-09-07
    • David CousinsIan PartridgeAdam PilkingtonDave RenshawAndrew Taylor
    • David CousinsIan PartridgeAdam PilkingtonDave RenshawAndrew Taylor
    • H04W24/00
    • H04W4/02H04W4/021H04W4/20H04W4/50
    • A method for delivering content to a requesting device over a content delivery network, the content being deliverable in only one or more restricted geographic regions and the requesting device being communicatively connected to a cellular communications service provider via a cellular communications network, the method comprising steps of: receiving a network identifier of the requesting device uniquely identifying the requesting device in the cellular communications network; transmitting a verification message over the cellular communications network for receipt by the requesting device; receiving, from the requesting device, an access control submission; receiving, from the cellular communications service provider, location information corresponding to a geographic location of the requesting device; and in response to a determination that the access control submission derives from the transmitted verification message and the location information indicates the requesting device is in one of the one or more restricted geographic regions, delivering the content to the requesting device. An apparatus and computer program element for providing such content delivery are also provided.
    • 一种用于通过内容传送网络将内容传递到请求设备的方法,所述内容可在仅一个或多个受限地理区域中传送,并且所述请求设备经由蜂窝通信网络被通信地连接到蜂窝通信服务提供商,所述方法包括步骤 :在蜂窝通信网络中接收唯一地识别请求设备的请求设备的网络标识符; 通过所述蜂窝通信网络发送验证消息以供所述请求设备接收; 从请求设备接收访问控制提交; 从所述蜂窝通信服务提供商接收对应于所述请求设备的地理位置的位置信息; 并且响应于所述访问控制提交来自所发送的验证消息的确定,并且所述位置信息指示所述请求设备处于所述一个或多个受限地理区域之一中,将所述内容传送到所述请求设备。 还提供了一种用于提供这种内容传送的装置和计算机程序元件。
    • 4. 发明授权
    • Rotation of web site content to prevent E-mail spam/phishing attacks
    • 轮播网站内容以防止电子邮件垃圾邮件/网络钓鱼攻击
    • US08800033B2
    • 2014-08-05
    • US13117062
    • 2011-05-26
    • George HickenAdam Pilkington
    • George HickenAdam Pilkington
    • G06F11/00G06F21/00
    • H04L63/1483
    • A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    • 通过网站内容旋转来进行网络钓鱼攻击管理的方法包括从计算机通信网络从请求的网页呈现引擎接收到将要并入到网页中的组件的变体的请求。 该方法还包括将组件的所请求变化与组件的当前配置的变体进行比较。 最后,如果组件的所请求的变化与组件的当前配置的变体不同,则该方法包括响应于该请求返回组件的所请求的变化和指示可能的钓鱼攻击的警报。
    • 5. 发明授权
    • Location restricted content delivery over a network
    • 通过网络限制内容传送的位置
    • US08744486B2
    • 2014-06-03
    • US12876683
    • 2010-09-07
    • David CousinsIan PartridgeAdam PilkingtonDave RenshawAndrew Taylor
    • David CousinsIan PartridgeAdam PilkingtonDave RenshawAndrew Taylor
    • H04W24/00
    • H04W4/02H04W4/021H04W4/20H04W4/50
    • Delivering content to a requesting device over a content delivery network, the content being deliverable in only one or more restricted geographic regions and the requesting device being communicatively connected to a cellular communications service provider via a cellular communications network, the method comprising steps of: receiving a network identifier of the requesting device uniquely identifying the requesting device in the cellular communications network; transmitting a verification message over the cellular communications network for receipt by the requesting device; receiving, from the requesting device, an access control submission; receiving, from the cellular communications service provider, location information corresponding to a geographic location of the requesting device; and in response to a determination that the access control submission derives from the transmitted verification message and the location information indicates the requesting device is in one of the one or more restricted geographic regions, delivering the content to the requesting device.
    • 通过内容传送网络将内容传送到请求设备,所述内容只能在一个或多个受限地理区域中传递,并且所述请求设备经由蜂窝通信网络被通信地连接到蜂窝通信服务提供商,所述方法包括以下步骤:接收 所述请求设备的网络标识符唯一地标识所述蜂窝通信网络中的所述请求设备; 通过所述蜂窝通信网络发送验证消息以供所述请求设备接收; 从请求设备接收访问控制提交; 从所述蜂窝通信服务提供商接收对应于所述请求设备的地理位置的位置信息; 并且响应于所述访问控制提交来自所发送的验证消息的确定,并且所述位置信息指示所述请求设备处于所述一个或多个受限地理区域之一中,将所述内容传送到所述请求设备。
    • 7. 发明授权
    • Rotation of web site content to prevent e-mail spam/phishing attacks
    • 轮流网站内容,以防止电子邮件垃圾邮件/网络钓鱼攻击
    • US09148444B2
    • 2015-09-29
    • US13406733
    • 2012-02-28
    • George HickenAdam Pilkington
    • George HickenAdam Pilkington
    • G06F11/00G06F21/00H04L29/06
    • H04L63/1483
    • A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    • 通过网站内容旋转来进行网络钓鱼攻击管理的方法包括从计算机通信网络从请求的网页呈现引擎接收到将要并入到网页中的组件的变体的请求。 该方法还包括将组件的所请求变化与组件的当前配置的变体进行比较。 最后,如果组件的所请求的变化与组件的当前配置的变体不同,则该方法包括响应于该请求返回组件的所请求的变化和指示可能的钓鱼攻击的警报。
    • 8. 发明申请
    • ROTATION OF WEB SITE CONTENT TO PREVENT E-MAIL SPAM/PHISHING ATTACKS
    • 网站内容的转载,以防止电子邮件垃圾邮件/打扰攻击
    • US20120304289A1
    • 2012-11-29
    • US13117062
    • 2011-05-26
    • George HickenAdam Pilkington
    • George HickenAdam Pilkington
    • G06F21/20
    • H04L63/1483
    • Embodiments of the invention provide a method, system and computer program product for phishing attack management through Web site content rotation. In an embodiment of the invention, a method for phishing attack management through Web site content rotation is provided. The method includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
    • 本发明的实施例提供了一种通过网站内容旋转进行网络钓鱼攻击管理的方法,系统和计算机程序产品。 在本发明的实施例中,提供了一种通过网站内容旋转进行网络钓鱼攻击管理的方法。 该方法包括从计算机通信网络从请求的网页呈现引擎接收要并入到网页中的组件的变体的请求。 该方法还包括将组件的所请求变化与组件的当前配置的变体进行比较。 最后,如果组件的所请求的变化与组件的当前配置的变体不同,则该方法包括响应于该请求返回组件的所请求的变化和指示可能的钓鱼攻击的警报。
    • 10. 发明申请
    • Location Restricted Content Deliver over a Network
    • 位置受限的内容通过网络传送
    • US20120195427A1
    • 2012-08-02
    • US13445370
    • 2012-04-12
    • David CousinsIan PartridgeAdam PilkingtonDave RenshawAndrew Taylor
    • David CousinsIan PartridgeAdam PilkingtonDave RenshawAndrew Taylor
    • H04W12/04H04K1/00H04W4/02
    • H04W4/02H04W4/021H04W4/20H04W4/50
    • Delivering content to a requesting device over a content delivery network, the content being deliverable in only one or more restricted geographic regions and the requesting device being communicatively connected to a cellular communications service provider via a cellular communications network, the method comprising steps of: receiving a network identifier of the requesting device uniquely identifying the requesting device in the cellular communications network; transmitting a verification message over the cellular communications network for receipt by the requesting device; receiving, from the requesting device, an access control submission; receiving, from the cellular communications service provider, location information corresponding to a geographic location of the requesting device; and in response to a determination that the access control submission derives from the transmitted verification message and the location information indicates the requesting device is in one of the one or more restricted geographic regions, delivering the content to the requesting device.
    • 通过内容传送网络将内容传送到请求设备,所述内容只能在一个或多个受限地理区域中传递,并且所述请求设备经由蜂窝通信网络被通信地连接到蜂窝通信服务提供商,所述方法包括以下步骤:接收 所述请求设备的网络标识符唯一地标识所述蜂窝通信网络中的所述请求设备; 通过所述蜂窝通信网络发送验证消息以供所述请求设备接收; 从请求设备接收访问控制提交; 从所述蜂窝通信服务提供商接收对应于所述请求设备的地理位置的位置信息; 并且响应于所述访问控制提交来自所发送的验证消息的确定,并且所述位置信息指示所述请求设备处于所述一个或多个受限地理区域之一中,将所述内容传送到所述请求设备。